✨ feat(auth): JWT TTL hot-reload + fix hardcoded 24h bug (ADR-0023 Phase 2) (#44)
Co-authored-by: Gabriel Radureau <arcodange@gmail.com> Co-committed-by: Gabriel Radureau <arcodange@gmail.com>
This commit was merged in pull request #44.
This commit is contained in:
@@ -139,10 +139,16 @@ func initializeUserServices(cfg *config.Config) (user.UserRepository, user.UserS
|
||||
return nil, nil, fmt.Errorf("failed to create PostgreSQL user repository: %w", err)
|
||||
}
|
||||
|
||||
// Create JWT config
|
||||
// Create JWT config.
|
||||
// GetTTL is a method value — it captures cfg, so when WatchAndApply
|
||||
// re-unmarshals into the same Config struct on file changes, every
|
||||
// subsequent token generation reads the new TTL (ADR-0023 Phase 2).
|
||||
// ExpirationTime is kept as a static fallback for tests that build
|
||||
// JWTConfig manually without a Config.
|
||||
jwtConfig := user.JWTConfig{
|
||||
Secret: cfg.GetJWTSecret(),
|
||||
ExpirationTime: time.Hour * 24, // 24 hours
|
||||
ExpirationTime: 24 * time.Hour,
|
||||
GetTTL: cfg.GetJWTTTL,
|
||||
Issuer: "dance-lessons-coach",
|
||||
}
|
||||
|
||||
|
||||
Reference in New Issue
Block a user