This repository was archived by the owner on Jul 15, 2025. It is now read-only.
feat: add global kv-storage prototype#74
Merged
backwardspy merged 1 commit intomasterfrom Oct 6, 2023
Merged
Conversation
3201173 to
d48b1a1
Compare
Co-authored-by: Haffi Mazhar <haffimazhar96@gmail.com>
d48b1a1 to
40d9d64
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
this change implements the beginnings of a generic kv-storage mechanism that allows us to simulate things like authentication flows.
#61 prototypes this from an auth perspective, and i have taken inspiration from that PR to create this implementation. in recognition of this i have co-authored this commit.
some of the differences from #61:
example mocked auth setup
we have two endpoints,

POST /authandGET /secretthe

POST /authendpoint is configured with an action that setsauthenticated=1in storagethe

GET /secretendpoint has two responses; a 401 default response and a 200 response with a rule ofauthenticated == 1this enables the following series of requests:
running the same requests again within the 15 second expiry window gives a slightly different result where the first
GET /secretsucceeds:waiting 15 seconds causes the
authenticatedkey to expire and the result goes back to the first example again.resolves #53