-
Notifications
You must be signed in to change notification settings - Fork 187
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
implement basic auth cache #958
Conversation
https://drone.owncloud.com/owncloud/ocis/1754/20/1
When the admin changes the password of a user, the cache needs to get invalidated. It looks like the new password worked - |
at this stage we won't notice any updates. As far as i understood it, basic auth should be non production only. But you`re right that could get us into trouble. Maybe a better place could be the accounts service where the isPasswordValid func is... there we can react to password changes and invalidate it. |
move cache to ocis-pkg add password validation cache to accounts service
remove unused mux cleanup k6 test
Kudos, SonarCloud Quality Gate passed! |
Run times of the API suites are typically less than half what they were before this change. That's amazing! The API tests do intensive API requests. As well as the obvious API requests that are done by the test steps in a scenario, there is lots of setup and teardown - creating users, uploading "skeleton" files... And every request has some basic auth that needs to be validated. The UI tests do not show any obvious difference in run time. That is because most of their time is spent in rendering the UI and the selenium web driver querying the state of the DOM in the browser, waiting for browser state... |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This works. There are test scenarios that try to access resources using invalid auth (wrong password, no password etc) and that change the user's password and try to use the old password... They are all passing - so the cache is not opening holes in the auth. From an external point-of-view this is "a great thing" - performance improves and behaviour is preserved.
I will let someone else review the detail of the structural code changes.
No description provided.