Skip to content
Snippets Groups Projects
Commit b5d3dffb authored by Maksim Gorelik's avatar Maksim Gorelik
Browse files

added to readme

parent 4720baf4
No related branches found
No related tags found
No related merge requests found
Pipeline #55664 failed with stages
......@@ -101,7 +101,7 @@ Using docker compose directly:
```
docker compose -f docker-compose.yml rm
docker compose -f docker-compose.yml --env-file=.env up --build --detach
```
```
## Using Cassandra
......@@ -135,6 +135,13 @@ The cassandra database was inserted for a very large scale of credentials combin
All records are <b>signed</b> during insertion which ensures that records can't be tampered outside of the software. This is realized by the [auth middleware](./internal/middleware/authMiddleware.go) The sign/verify key must be created before hand in the crypto engine.
#### Retrieve credentials
```bash
cqlsh <cassandra host> <cassandra port> -u <cassandra user> -p <cassandra password> -e "SELECT * FROM tenant_space.credentials;"
```
#### Datamodel
The database schema of the credential table is designed in such a way that a cassandra table clustering can be constructed accross regions (Country/Region Field) together with the first 4 bytes of the account id as cluster identifier.
......
......@@ -156,9 +156,7 @@ func getCredentials(ctx context.Context, authModel model.AuthModel, env *common.
foundCredentials[k] = string(msg)
}
}
for _, o := range foundCredentials {
logger.Info(o.(string))
}
logger.Info("Found credentials before filter", "amount", len(foundCredentials))
res, err := filter.Filter(foundCredentials)
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment