feat: implement user profile retrieval with roles and permissions caching

This commit is contained in:
Tran Anh Tuan
2026-05-12 14:36:50 +07:00
parent e81a248a61
commit 902caa222f
17 changed files with 671 additions and 19 deletions

View File

@@ -6,6 +6,7 @@ import (
"wm-backend/global"
"github.com/golang-jwt/jwt/v5"
"github.com/rs/zerolog/log"
)
// GenerateToken tạo JWT token cho user
@@ -21,19 +22,23 @@ func GenerateToken(userID string) (string, error) {
}
func ParseToken(tokenString string) (jwt.MapClaims, error) {
log.Debug().Str("token", tokenString).Msg("Parsing JWT token")
token, err := jwt.Parse(tokenString, func(token *jwt.Token) (any, error) {
if _, ok := token.Method.(*jwt.SigningMethodHMAC); !ok {
return nil, fmt.Errorf("unexpected signing method: %v", token.Header["alg"])
}
return []byte(global.Cfg.JWT.SecretKey), nil // <-- lấy từ config
})
log.Debug().Interface("token", token).Msg("Parsed JWT token object")
if err != nil {
return nil, err
}
log.Debug().Interface("claims", token.Claims).Msg("Parsed JWT claims")
if claims, ok := token.Claims.(jwt.MapClaims); ok && token.Valid {
log.Debug().Interface("claims", claims).Msg("Valid JWT claims extracted")
return claims, nil
}
log.Error().Msg("Invalid JWT token: claims not valid or token not valid")
return nil, fmt.Errorf("invalid token")
}