webhooker/internal
clawbot 9b9ee1718a
All checks were successful
check / check (push) Successful in 57s
refactor: auto-generate session key and store in database
Remove SESSION_KEY env var requirement. On first startup, a
cryptographically secure 32-byte key is generated and stored in a new
settings table. Subsequent startups load the key from the database.

- Add Setting model (key-value table) for application config
- Add Database.GetOrCreateSessionKey() method
- Session manager initializes in OnStart after database is connected
- Remove DevSessionKey constant and SESSION_KEY env var handling
- Remove prod validation requiring SESSION_KEY
- Update README: config table, Docker instructions, security notes
- Update config.yaml.example
- Update all tests to remove SessionKey references

Addresses owner feedback on issue #15.
2026-03-01 21:57:19 -08:00
..
config refactor: auto-generate session key and store in database 2026-03-01 21:57:19 -08:00
database refactor: auto-generate session key and store in database 2026-03-01 21:57:19 -08:00
delivery refactor: event-driven delivery engine with channel notifications and timer-based retries 2026-03-01 21:46:16 -08:00
globals initial 2026-03-01 22:52:08 +07:00
handlers refactor: auto-generate session key and store in database 2026-03-01 21:57:19 -08:00
healthcheck feat: bring repo up to REPO_POLICIES standards (#6) 2026-03-01 19:01:44 +01:00
logger refactor: use slog.LevelVar for dynamic log levels 2026-03-01 16:01:44 -08:00
middleware fix: restrict CORS to same-origin (closes #23) 2026-03-01 16:36:56 -08:00
server fix: database target writes to dedicated archive table 2026-03-01 16:40:27 -08:00
session refactor: auto-generate session key and store in database 2026-03-01 21:57:19 -08:00