diff --git a/internal/http/graph/messages_resolvers.go b/internal/http/graph/messages_resolvers.go index 8f61d5b..982c96b 100644 --- a/internal/http/graph/messages_resolvers.go +++ b/internal/http/graph/messages_resolvers.go @@ -3,6 +3,7 @@ package graph import ( "context" "fmt" + "log" "tailly_back_v2/internal/domain" "tailly_back_v2/proto" "time" @@ -128,15 +129,18 @@ func (r *subscriptionResolver) MessageStream(ctx context.Context, userID int) (< stream, err := r.MessageClient.StreamMessages(ctx, &proto.StreamMessagesRequest{ UserId: int32(userID), }) + log.Printf("stream messages: %v", stream) if err != nil { return nil, fmt.Errorf("failed to stream messages: %w", err) } messageChan := make(chan *domain.Message) + log.Printf("messageChan: %d", messageChan) go func() { defer close(messageChan) for { msg, err := stream.Recv() + log.Printf("recv message: %v", msg) if err != nil { return } diff --git a/internal/http/middleware/ws_auth.go b/internal/http/middleware/ws_auth.go index 4926a82..67d366a 100644 --- a/internal/http/middleware/ws_auth.go +++ b/internal/http/middleware/ws_auth.go @@ -2,6 +2,7 @@ package middleware import ( "context" + "log" "net/http" "tailly_back_v2/pkg/auth" ) @@ -14,6 +15,7 @@ func WSAuthMiddleware(tokenAuth *auth.TokenAuth) func(http.Handler) http.Handler if r.Header.Get("Upgrade") == "websocket" { // Извлекаем токен из query параметров или заголовков token := extractTokenFromRequest(r) + log.Printf("token ws: %s", token) if token != "" { userID, err := tokenAuth.ValidateAccessToken(token) diff --git a/internal/http/server.go b/internal/http/server.go index 943548e..2bfde71 100644 --- a/internal/http/server.go +++ b/internal/http/server.go @@ -76,6 +76,7 @@ func (s *Server) configureRouter() { Upgrader: websocket.Upgrader{ CheckOrigin: func(r *http.Request) bool { origin := r.Header.Get("Origin") + log.Printf("origin: %s", origin) for _, allowed := range allowedOrigins { if origin == allowed { return true