feat: Initialize Zastava Webhook service with TLS and Authority authentication
- Added Program.cs to set up the web application with Serilog for logging, health check endpoints, and a placeholder admission endpoint. - Configured Kestrel server to use TLS 1.3 and handle client certificates appropriately. - Created StellaOps.Zastava.Webhook.csproj with necessary dependencies including Serilog and Polly. - Documented tasks in TASKS.md for the Zastava Webhook project, outlining current work and exit criteria for each task.
This commit is contained in:
		
							
								
								
									
										9
									
								
								samples/runtime/npm-monorepo/README.md
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										9
									
								
								samples/runtime/npm-monorepo/README.md
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,9 @@ | ||||
| # NPM Monorepo Fixture | ||||
|  | ||||
| This fixture represents a trimmed monorepo layout used by the analyzer microbench. It contains four packages under `node_modules/` with realistic metadata and dependency edges. | ||||
|  | ||||
| - `@stella/core` depends on `lodash`. | ||||
| - `@stella/web` depends on `@stella/core` and `rxjs`. | ||||
| - Third-party packages expose standard `name`, `version`, and `license` fields. | ||||
|  | ||||
| The files are intentionally small so that the bench harness focuses on directory traversal and metadata parsing overhead. | ||||
		Reference in New Issue
	
	Block a user