feat: use postgres

This commit is contained in:
Ilia Denisov
2026-04-26 20:34:39 +02:00
committed by GitHub
parent 48b0056b49
commit fe829285a6
365 changed files with 29223 additions and 24049 deletions
+5 -22
View File
@@ -231,17 +231,13 @@ func newHardeningApp(t *testing.T, env *hardeningEnvironment, options hardeningA
env.redisServer.Set(gatewayCompatibilitySessionLimitKey, strconv.Itoa(*options.SessionLimit))
}
challengeStore, err := challengestore.New(challengestore.Config{
Addr: env.redisAddr,
DB: 0,
challengeStore, err := challengestore.New(env.redisClient, challengestore.Config{
KeyPrefix: gatewayCompatibilityChallengeKeyPrefix,
OperationTimeout: 250 * time.Millisecond,
})
require.NoError(t, err)
redisSessionStore, err := sessionstore.New(sessionstore.Config{
Addr: env.redisAddr,
DB: 0,
redisSessionStore, err := sessionstore.New(env.redisClient, sessionstore.Config{
SessionKeyPrefix: gatewayCompatibilitySessionKeyPrefix,
UserSessionsKeyPrefix: gatewayCompatibilityUserSessionsKeyPrefix,
UserActiveSessionsKeyPrefix: gatewayCompatibilityUserActiveKeyPrefix,
@@ -249,17 +245,13 @@ func newHardeningApp(t *testing.T, env *hardeningEnvironment, options hardeningA
})
require.NoError(t, err)
configStore, err := configprovider.New(configprovider.Config{
Addr: env.redisAddr,
DB: 0,
configStore, err := configprovider.New(env.redisClient, configprovider.Config{
SessionLimitKey: gatewayCompatibilitySessionLimitKey,
OperationTimeout: 250 * time.Millisecond,
})
require.NoError(t, err)
redisPublisher, err := projectionpublisher.New(projectionpublisher.Config{
Addr: env.redisAddr,
DB: 0,
redisPublisher, err := projectionpublisher.New(env.redisClient, projectionpublisher.Config{
SessionCacheKeyPrefix: gatewayCompatibilitySessionCacheKeyPrefix,
SessionEventsStream: gatewayCompatibilitySessionEventsStream,
StreamMaxLen: gatewayCompatibilityStreamMaxLen,
@@ -373,10 +365,6 @@ func newHardeningApp(t *testing.T, env *hardeningEnvironment, options hardeningA
app.closeFn = func() {
stopPublic()
stopInternal()
assert.NoError(t, challengeStore.Close())
assert.NoError(t, redisSessionStore.Close())
assert.NoError(t, configStore.Close())
assert.NoError(t, redisPublisher.Close())
}
t.Cleanup(func() {
app.Close()
@@ -678,18 +666,13 @@ func TestProductionHardeningDuplicatePublishKeepsGatewayCacheCanonical(t *testin
t.Parallel()
env := newHardeningEnvironment(t)
publisher, err := projectionpublisher.New(projectionpublisher.Config{
Addr: env.redisAddr,
DB: 0,
publisher, err := projectionpublisher.New(env.redisClient, projectionpublisher.Config{
SessionCacheKeyPrefix: gatewayCompatibilitySessionCacheKeyPrefix,
SessionEventsStream: gatewayCompatibilitySessionEventsStream,
StreamMaxLen: gatewayCompatibilityStreamMaxLen,
OperationTimeout: 250 * time.Millisecond,
})
require.NoError(t, err)
defer func() {
assert.NoError(t, publisher.Close())
}()
snapshot := gatewayprojection.Snapshot{
DeviceSessionID: common.DeviceSessionID("device-session-1"),