forked from ryyst/kalzu-value-store
Add configuration options to disable optional functionalities
Implemented feature toggles for: - Authentication system (auth_enabled) - Tamper-evident logging (tamper_logging_enabled) - Clustering/gossip (clustering_enabled) - Rate limiting (rate_limiting_enabled) - Revision history (revision_history_enabled) All features are enabled by default to maintain backward compatibility. When disabled, features are gracefully skipped to reduce overhead. 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <noreply@anthropic.com>
This commit is contained in:
63
main.go
63
main.go
@@ -294,6 +294,13 @@ type Config struct {
|
||||
BackupSchedule string `yaml:"backup_schedule"` // Cron schedule format
|
||||
BackupPath string `yaml:"backup_path"` // Directory to store backups
|
||||
BackupRetention int `yaml:"backup_retention"` // Days to keep backups
|
||||
|
||||
// Feature toggles for optional functionalities
|
||||
AuthEnabled bool `yaml:"auth_enabled"` // Enable/disable authentication system
|
||||
TamperLoggingEnabled bool `yaml:"tamper_logging_enabled"` // Enable/disable tamper-evident logging
|
||||
ClusteringEnabled bool `yaml:"clustering_enabled"` // Enable/disable clustering/gossip
|
||||
RateLimitingEnabled bool `yaml:"rate_limiting_enabled"` // Enable/disable rate limiting
|
||||
RevisionHistoryEnabled bool `yaml:"revision_history_enabled"` // Enable/disable revision history
|
||||
}
|
||||
|
||||
// Server represents the KVS node
|
||||
@@ -652,6 +659,12 @@ func (s *Server) checkResourcePermission(authCtx *AuthContext, resourceKey strin
|
||||
func (s *Server) authMiddleware(requiredScopes []string, resourceKeyExtractor func(*http.Request) string, operation string) func(http.HandlerFunc) http.HandlerFunc {
|
||||
return func(next http.HandlerFunc) http.HandlerFunc {
|
||||
return func(w http.ResponseWriter, r *http.Request) {
|
||||
// Skip authentication if disabled
|
||||
if !s.config.AuthEnabled {
|
||||
next(w, r)
|
||||
return
|
||||
}
|
||||
|
||||
// Authenticate request
|
||||
authCtx, err := s.authenticateRequest(r)
|
||||
if err != nil {
|
||||
@@ -1082,6 +1095,12 @@ func (s *Server) checkRateLimit(userUUID string) (bool, error) {
|
||||
// rateLimitMiddleware is the HTTP middleware that enforces rate limiting
|
||||
func (s *Server) rateLimitMiddleware(next http.HandlerFunc) http.HandlerFunc {
|
||||
return func(w http.ResponseWriter, r *http.Request) {
|
||||
// Skip rate limiting if disabled
|
||||
if !s.config.RateLimitingEnabled {
|
||||
next(w, r)
|
||||
return
|
||||
}
|
||||
|
||||
// Extract auth context to get user UUID
|
||||
authCtx, ok := r.Context().Value("auth").(*AuthContext)
|
||||
if !ok || authCtx == nil {
|
||||
@@ -1148,8 +1167,8 @@ func (s *Server) isActionLogged(action string) bool {
|
||||
|
||||
// createTamperLogEntry creates a new tamper-evident log entry
|
||||
func (s *Server) createTamperLogEntry(action, userUUID, resource string) *TamperLogEntry {
|
||||
if !s.isActionLogged(action) {
|
||||
return nil // Action not configured for logging
|
||||
if !s.config.TamperLoggingEnabled || !s.isActionLogged(action) {
|
||||
return nil // Tamper logging disabled or action not configured for logging
|
||||
}
|
||||
|
||||
timestamp := time.Now().UTC().Format(time.RFC3339)
|
||||
@@ -1486,6 +1505,13 @@ func defaultConfig() *Config {
|
||||
BackupSchedule: "0 0 * * *", // Daily at midnight
|
||||
BackupPath: "./backups",
|
||||
BackupRetention: 7, // Keep backups for 7 days
|
||||
|
||||
// Default feature toggle settings (all enabled by default)
|
||||
AuthEnabled: true,
|
||||
TamperLoggingEnabled: true,
|
||||
ClusteringEnabled: true,
|
||||
RateLimitingEnabled: true,
|
||||
RevisionHistoryEnabled: true,
|
||||
}
|
||||
}
|
||||
|
||||
@@ -2100,8 +2126,8 @@ func (s *Server) Start() error {
|
||||
// Start gossip and sync routines
|
||||
s.startBackgroundTasks()
|
||||
|
||||
// Try to join cluster if seed nodes are configured
|
||||
if len(s.config.SeedNodes) > 0 {
|
||||
// Try to join cluster if seed nodes are configured and clustering is enabled
|
||||
if s.config.ClusteringEnabled && len(s.config.SeedNodes) > 0 {
|
||||
go s.bootstrap()
|
||||
}
|
||||
|
||||
@@ -2131,15 +2157,18 @@ func (s *Server) Stop() error {
|
||||
|
||||
// Background tasks (gossip, sync, Merkle tree rebuild, etc.)
|
||||
func (s *Server) startBackgroundTasks() {
|
||||
// Start gossip routine
|
||||
s.wg.Add(1)
|
||||
go s.gossipRoutine()
|
||||
// Start clustering-related routines only if clustering is enabled
|
||||
if s.config.ClusteringEnabled {
|
||||
// Start gossip routine
|
||||
s.wg.Add(1)
|
||||
go s.gossipRoutine()
|
||||
|
||||
// Start sync routine (now Merkle-based)
|
||||
s.wg.Add(1)
|
||||
go s.syncRoutine()
|
||||
// Start sync routine (now Merkle-based)
|
||||
s.wg.Add(1)
|
||||
go s.syncRoutine()
|
||||
}
|
||||
|
||||
// Start Merkle tree rebuild routine
|
||||
// Start Merkle tree rebuild routine (always needed for data integrity)
|
||||
s.wg.Add(1)
|
||||
go s.merkleTreeRebuildRoutine()
|
||||
}
|
||||
@@ -3194,6 +3223,12 @@ func (s *Server) createTokenHandler(w http.ResponseWriter, r *http.Request) {
|
||||
|
||||
// getRevisionHistoryHandler handles GET /api/data/{key}/history
|
||||
func (s *Server) getRevisionHistoryHandler(w http.ResponseWriter, r *http.Request) {
|
||||
// Check if revision history is enabled
|
||||
if !s.config.RevisionHistoryEnabled {
|
||||
http.Error(w, "Revision history is disabled", http.StatusServiceUnavailable)
|
||||
return
|
||||
}
|
||||
|
||||
vars := mux.Vars(r)
|
||||
key := vars["key"]
|
||||
|
||||
@@ -3224,6 +3259,12 @@ func (s *Server) getRevisionHistoryHandler(w http.ResponseWriter, r *http.Reques
|
||||
|
||||
// getSpecificRevisionHandler handles GET /api/data/{key}/history/{revision}
|
||||
func (s *Server) getSpecificRevisionHandler(w http.ResponseWriter, r *http.Request) {
|
||||
// Check if revision history is enabled
|
||||
if !s.config.RevisionHistoryEnabled {
|
||||
http.Error(w, "Revision history is disabled", http.StatusServiceUnavailable)
|
||||
return
|
||||
}
|
||||
|
||||
vars := mux.Vars(r)
|
||||
key := vars["key"]
|
||||
revisionStr := vars["revision"]
|
||||
|
Reference in New Issue
Block a user