Compare commits

8 Commits

Author SHA1 Message Date
088d32984c Made some small adjustments to e7da8c9443 2026-03-03 16:29:26 +01:00
e7da8c9443 Removed hardcoded string
- Roles are not hardcoded anymore (closes #4)
2026-03-03 15:55:39 +01:00
0afd5bfc3a Bugfix
- Role is now again listed in jwt when retrieving new access token (closes #3)
2026-03-03 15:45:53 +01:00
ef7ef3cf74 New Endpoint and security enhancement
- Userinfo endpoint is now available
- HTTPS is now required (closes #2)
2026-03-03 15:41:07 +01:00
c75c405200 Added .run dir to .gitignore 2026-03-01 13:49:17 +01:00
c735261f0c Removed comments from Dockerfile 2026-03-01 13:46:16 +01:00
188b238e7d Finished first part of balance calculation 2026-03-01 13:45:49 +01:00
87ae8cc0b9 Added logs 2026-03-01 13:25:27 +01:00
10 changed files with 228 additions and 61 deletions

3
.gitignore vendored
View File

@@ -1,4 +1,5 @@
appdata appdata
.idea .idea
*.exe *.exe
*.cmd *.cmd
.run

View File

@@ -1,24 +1,19 @@
# Wir sagen Docker: Der Builder soll IMMER auf der Architektur deines PCs laufen (schnell!)
FROM --platform=$BUILDPLATFORM golang:1.26-alpine AS builder FROM --platform=$BUILDPLATFORM golang:1.26-alpine AS builder
RUN apk add --no-cache git RUN apk add --no-cache git
WORKDIR /app WORKDIR /app
# Cache für Module nutzen
COPY go.mod go.sum ./ COPY go.mod go.sum ./
RUN go mod download RUN go mod download
COPY . . COPY . .
# buildx übergibt diese Variablen automatisch
ARG TARGETOS ARG TARGETOS
ARG TARGETARCH ARG TARGETARCH
# Hier passiert die Magie: Go kompiliert NATIV für das Ziel (Cross-Compilation)
RUN CGO_ENABLED=0 GOOS=$TARGETOS GOARCH=$TARGETARCH \ RUN CGO_ENABLED=0 GOOS=$TARGETOS GOARCH=$TARGETARCH \
go build -ldflags "-s -w" -o shap-planner-backend . go build -ldflags "-s -w" -o shap-planner-backend .
# Final Stage (bleibt gleich klein)
FROM scratch FROM scratch
COPY --from=builder /app/shap-planner-backend /shap-planner-backend COPY --from=builder /app/shap-planner-backend /shap-planner-backend
ENTRYPOINT ["/shap-planner-backend"] ENTRYPOINT ["/shap-planner-backend"]

View File

@@ -9,9 +9,11 @@ import (
) )
type Config struct { type Config struct {
HouseholdName string `yaml:"household_name"` HouseholdName string `yaml:"household_name"`
Port string `yaml:"port"` Port string `yaml:"port"`
DatabasePath string `yaml:"database_path"` DatabasePath string `yaml:"database_path"`
CertificatePath string `yaml:"certificate_path"`
PrivateKeyPath string `yaml:"private_key_path"`
} }
const configPath = "./appdata/config.yaml" const configPath = "./appdata/config.yaml"
@@ -33,9 +35,11 @@ func CheckIfExists() error {
} }
defaultConfig := Config{ defaultConfig := Config{
Port: "8080", Port: "8080",
DatabasePath: "./appdata/database.db", DatabasePath: "./appdata/database.db",
HouseholdName: "Example-Household", HouseholdName: "Example-Household",
CertificatePath: "./appdata/cert.pem",
PrivateKeyPath: "./appdata/key.pem",
} }
data, err := yaml.Marshal(defaultConfig) data, err := yaml.Marshal(defaultConfig)

View File

@@ -18,35 +18,35 @@ var cfg, _ = config.LoadConfig()
func Register(w http.ResponseWriter, r *http.Request) { func Register(w http.ResponseWriter, r *http.Request) {
var user models.User var user models.User
if err := json.NewDecoder(r.Body).Decode(&user); err != nil { if err := json.NewDecoder(r.Body).Decode(&user); err != nil {
log.Println("[api/register] " + r.RemoteAddr + ": " + err.Error()) log.Println("POST [api/register] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "Invalid request body", http.StatusBadRequest) http.Error(w, "Invalid request body", http.StatusBadRequest)
return return
} }
if user.Username == "" || user.Password == "" { if user.Username == "" || user.Password == "" {
log.Println("[api/register] " + r.RemoteAddr + ": Username or Password is empty") log.Println("POST [api/register] " + r.RemoteAddr + ": Username or Password is empty")
http.Error(w, "username and password required", http.StatusBadRequest) http.Error(w, "username and password required", http.StatusBadRequest)
return return
} }
hashed, err := auth.HashPassword(user.Password) hashed, err := auth.HashPassword(user.Password)
if err != nil { if err != nil {
log.Println("[api/register] " + r.RemoteAddr + ": " + err.Error()) log.Println("POST [api/register] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "internal error", http.StatusInternalServerError) http.Error(w, "internal error", http.StatusInternalServerError)
return return
} }
user.Password = hashed user.Password = hashed
user.ID = utils.GenerateUUID() user.ID = utils.GenerateUUID()
user.Role = "user" user.Role = models.RoleUser
if err := storage.AddUser(&user); err != nil { if err := storage.AddUser(&user); err != nil {
log.Println("[api/register] " + r.RemoteAddr + ": " + err.Error()) log.Println("POST [api/register] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "user already exists", http.StatusBadRequest) http.Error(w, "user already exists", http.StatusBadRequest)
return return
} }
w.WriteHeader(http.StatusCreated) w.WriteHeader(http.StatusCreated)
log.Println("[api/register] " + r.RemoteAddr + ": Successfully created user") log.Println("POST [api/register] " + r.RemoteAddr + ": Successfully created user")
} }
func Login(w http.ResponseWriter, r *http.Request) { func Login(w http.ResponseWriter, r *http.Request) {
var creds struct { var creds struct {
@@ -54,41 +54,41 @@ func Login(w http.ResponseWriter, r *http.Request) {
Password string `json:"password"` Password string `json:"password"`
} }
if err := json.NewDecoder(r.Body).Decode(&creds); err != nil { if err := json.NewDecoder(r.Body).Decode(&creds); err != nil {
log.Println("[api/login] " + r.RemoteAddr + ": " + err.Error()) log.Println("POST [api/login] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "Invalid request", http.StatusBadRequest) http.Error(w, "Invalid request", http.StatusBadRequest)
return return
} }
user, err := storage.GetUserByUsername(creds.Username) user, err := storage.GetUserByUsername(creds.Username)
if err != nil { if err != nil {
log.Println("[api/login] " + r.RemoteAddr + ": " + err.Error()) log.Println("POST [api/login] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "Invalid credentials", http.StatusUnauthorized) http.Error(w, "Invalid credentials", http.StatusUnauthorized)
return return
} }
if !auth.CheckPasswordHash(creds.Password, user.Password) { if !auth.CheckPasswordHash(creds.Password, user.Password) {
log.Println("[api/login] " + r.RemoteAddr + ": Invalid credentials") log.Println("POST [api/login] " + r.RemoteAddr + ": Invalid credentials")
http.Error(w, "Invalid credentials", http.StatusUnauthorized) http.Error(w, "Invalid credentials", http.StatusUnauthorized)
return return
} }
secret := []byte(os.Getenv("SHAP_JWT_SECRET")) secret := []byte(os.Getenv("SHAP_JWT_SECRET"))
if len(secret) == 0 { if len(secret) == 0 {
log.Println("[api/login] " + r.RemoteAddr + ": Server misconfiguration") log.Println("POST [api/login] " + r.RemoteAddr + ": Server misconfiguration")
http.Error(w, "Server misconfiguration", http.StatusInternalServerError) http.Error(w, "Server misconfiguration", http.StatusInternalServerError)
return return
} }
accessToken, err := auth.GenerateJWT(user.ID, user.Role, secret) accessToken, err := auth.GenerateJWT(user.ID, user.Role, secret)
if err != nil { if err != nil {
log.Println("[api/login] " + r.RemoteAddr + ": " + err.Error()) log.Println("POST [api/login] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "Could not generate token", http.StatusInternalServerError) http.Error(w, "Could not generate token", http.StatusInternalServerError)
return return
} }
refreshTokenPlain, err := utils.GenerateRefreshToken() refreshTokenPlain, err := utils.GenerateRefreshToken()
if err != nil { if err != nil {
log.Println("[api/login] " + r.RemoteAddr + ": " + err.Error()) log.Println("POST [api/login] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "could not generate refresh token", http.StatusInternalServerError) http.Error(w, "could not generate refresh token", http.StatusInternalServerError)
return return
} }
@@ -107,7 +107,7 @@ func Login(w http.ResponseWriter, r *http.Request) {
CreatedAt: time.Now().Unix(), CreatedAt: time.Now().Unix(),
Revoked: false, Revoked: false,
}); err != nil { }); err != nil {
log.Println("[api/login] " + r.RemoteAddr + ": " + err.Error()) log.Println("POST [api/login] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "could not save refresh token", http.StatusInternalServerError) http.Error(w, "could not save refresh token", http.StatusInternalServerError)
return return
} }
@@ -127,17 +127,17 @@ func Login(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json") w.Header().Set("Content-Type", "application/json")
err = json.NewEncoder(w).Encode(resp) err = json.NewEncoder(w).Encode(resp)
if err != nil { if err != nil {
log.Println("[api/login] " + r.RemoteAddr + ": " + err.Error()) log.Println("POST [api/login] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "Something went wrong", http.StatusInternalServerError) http.Error(w, "Something went wrong", http.StatusInternalServerError)
return return
} }
log.Println("[api/login] " + r.RemoteAddr + ": Successfully logged in") log.Println("POST [api/login] " + r.RemoteAddr + ": Successfully logged in")
} }
func Logout(w http.ResponseWriter, r *http.Request) { func Logout(w http.ResponseWriter, r *http.Request) {
claims := r.Context().Value(auth.UserContextKey).(*auth.Claims) claims := r.Context().Value(auth.UserContextKey).(*auth.Claims)
err := storage.RevokeAllRefreshTokensForUser(claims.UserID) err := storage.RevokeAllRefreshTokensForUser(claims.UserID)
if err != nil { if err != nil {
log.Println("[api/logout] " + r.RemoteAddr + ": " + err.Error()) log.Println("GET [api/logout] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "Internal server error", http.StatusInternalServerError) http.Error(w, "Internal server error", http.StatusInternalServerError)
return return
} }
@@ -150,20 +150,20 @@ func TestHandler(w http.ResponseWriter, r *http.Request) {
err := json.NewEncoder(w).Encode(map[string]interface{}{ err := json.NewEncoder(w).Encode(map[string]interface{}{
"user_id": claims.UserID, "user_id": claims.UserID,
"role": claims.Role, "role": claims.Role,
"msg": "access granted to protected endpoint", "msg": "Authentication successful",
}) })
if err != nil { if err != nil {
log.Println("[api/ping] " + r.RemoteAddr + ": " + err.Error()) log.Println("GET [api/ping] " + r.RemoteAddr + ": " + err.Error())
return return
} }
log.Println("[api/login] " + r.RemoteAddr + ": Successfully tested connection") log.Println("GET [api/login] " + r.RemoteAddr + ": Successfully tested connection")
} }
func RefreshToken(w http.ResponseWriter, r *http.Request) { func RefreshToken(w http.ResponseWriter, r *http.Request) {
var req struct { var req struct {
RefreshToken string `json:"refresh_token"` RefreshToken string `json:"refresh_token"`
} }
if err := json.NewDecoder(r.Body).Decode(&req); err != nil { if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
log.Println("[api/refresh] " + r.RemoteAddr + ": " + err.Error()) log.Println("POST [api/refresh] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "Invalid request", http.StatusBadRequest) http.Error(w, "Invalid request", http.StatusBadRequest)
return return
} }
@@ -172,7 +172,7 @@ func RefreshToken(w http.ResponseWriter, r *http.Request) {
tokenRow, err := storage.GetRefreshToken(hashed) tokenRow, err := storage.GetRefreshToken(hashed)
if err != nil || tokenRow.Revoked || tokenRow.ExpiresAt < time.Now().Unix() { if err != nil || tokenRow.Revoked || tokenRow.ExpiresAt < time.Now().Unix() {
log.Println("[api/refresh] " + r.RemoteAddr + ": Invalid refresh token") log.Println("POST [api/refresh] " + r.RemoteAddr + ": Invalid refresh token")
http.Error(w, "Invalid refresh token", http.StatusUnauthorized) http.Error(w, "Invalid refresh token", http.StatusUnauthorized)
return return
} }
@@ -195,19 +195,52 @@ func RefreshToken(w http.ResponseWriter, r *http.Request) {
Revoked: false, Revoked: false,
DeviceInfo: deviceInfo, DeviceInfo: deviceInfo,
}); err != nil { }); err != nil {
log.Println("[api/refresh] " + r.RemoteAddr + ": " + err.Error()) log.Println("POST [api/refresh] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "Could not generate new refresh token", http.StatusInternalServerError) http.Error(w, "Could not generate new refresh token", http.StatusInternalServerError)
return return
} }
accessToken, _ := auth.GenerateJWT(tokenRow.UserID, "", []byte(os.Getenv("SHAP_JWT_SECRET"))) user, err := storage.GetUserById(tokenRow.UserID)
if err != nil {
log.Println("POST [api/refresh] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "Internal server error", http.StatusInternalServerError)
return
}
accessToken, _ := auth.GenerateJWT(tokenRow.UserID, user.Role, []byte(os.Getenv("SHAP_JWT_SECRET")))
if err = json.NewEncoder(w).Encode(map[string]string{ if err = json.NewEncoder(w).Encode(map[string]string{
"access_token": accessToken, "access_token": accessToken,
"refresh_token": newToken, "refresh_token": newToken,
}); err != nil { }); err != nil {
log.Println("[api/refresh] " + r.RemoteAddr + ": " + err.Error()) log.Println("POST [api/refresh] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "Internal server error", http.StatusInternalServerError) http.Error(w, "Internal server error", http.StatusInternalServerError)
return return
} }
log.Println("POST [api/refresh] " + r.RemoteAddr + ": Successfully refreshed token")
}
func UserInfo(w http.ResponseWriter, r *http.Request) {
if r.Method != http.MethodGet {
log.Println("GET [api/userinfo] " + r.RemoteAddr + ": Method " + r.Method + " not allowed")
http.Error(w, "Method not allowed", http.StatusMethodNotAllowed)
return
}
query := r.URL.Query()
idParam := query.Get("id")
user, err := storage.GetUserById(idParam)
if err != nil {
log.Println("GET [api/userinfo] " + r.RemoteAddr + ": User " + idParam + " not found")
http.Error(w, "User not found", http.StatusNotFound)
return
}
w.Header().Set("Content-Type", "application/json")
err = json.NewEncoder(w).Encode(map[string]interface{}{
"id": user.ID,
"name": user.Username,
"avatar_url": nil,
})
if err != nil {
log.Println("GET [api/userinfo] " + r.RemoteAddr + ": " + err.Error())
return
}
log.Println("GET [api/userinfo] " + r.RemoteAddr + ": Successfully retrieved user info")
} }

View File

@@ -1,12 +1,32 @@
package handlers package handlers
import "net/http" import (
"encoding/json"
"log"
"net/http"
"shap-planner-backend/storage"
)
func GetBalance(w http.ResponseWriter, r *http.Request) { func GetBalance(w http.ResponseWriter, r *http.Request) {
query := r.URL.Query() query := r.URL.Query()
userParam := query.Get("user") userParam := query.Get("user")
if userParam == "" { if userParam == "all" {
// TODO: add later
} else {
balance, err := storage.ComputeBalance(userParam)
if err != nil {
log.Println("GET [api/balance] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "Invalid request query", http.StatusBadRequest)
return
}
err = json.NewEncoder(w).Encode(map[string]interface{}{
"balance": balance,
})
if err != nil {
log.Println("GET [api/balance] " + r.RemoteAddr + ": " + err.Error())
return
}
log.Println("GET [api/balance] " + r.RemoteAddr + ": Successfully retrieved balance")
} }
} }

View File

@@ -2,10 +2,12 @@ package handlers
import ( import (
"encoding/json" "encoding/json"
"log"
"net/http" "net/http"
"shap-planner-backend/models" "shap-planner-backend/models"
"shap-planner-backend/storage" "shap-planner-backend/storage"
"shap-planner-backend/utils" "shap-planner-backend/utils"
"time"
) )
func Expenses(w http.ResponseWriter, r *http.Request) { func Expenses(w http.ResponseWriter, r *http.Request) {
@@ -13,6 +15,18 @@ func Expenses(w http.ResponseWriter, r *http.Request) {
switch r.Method { switch r.Method {
case http.MethodGet: // -> Get Expenses case http.MethodGet: // -> Get Expenses
expenses, err := storage.GetAllExpenses()
if err != nil {
log.Println("GET [api/expense] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "Something went wrong", http.StatusInternalServerError)
return
}
err = json.NewEncoder(w).Encode(expenses)
if err != nil {
log.Println("GET [api/expense] " + r.RemoteAddr + ": " + err.Error())
return
}
log.Println("GET [api/expense] " + r.RemoteAddr + ": Successfully retrieved expenses")
break break
case http.MethodPost: // -> Create Expense case http.MethodPost: // -> Create Expense
var body struct { var body struct {
@@ -20,37 +34,54 @@ func Expenses(w http.ResponseWriter, r *http.Request) {
Shares []models.ExpenseShare `json:"shares"` Shares []models.ExpenseShare `json:"shares"`
} }
if err := json.NewDecoder(r.Body).Decode(&body); err != nil { if err := json.NewDecoder(r.Body).Decode(&body); err != nil {
log.Println("POST [api/expense] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "Invalid request body", http.StatusBadRequest) http.Error(w, "Invalid request body", http.StatusBadRequest)
return return
} }
if claims.UserID != body.Expense.PayerID { // You cannot create an expense in the name of another user if claims.UserID != body.Expense.PayerID { // You cannot create an expense in the name of another user
http.Error(w, "Invalid request", http.StatusUnauthorized) log.Println("POST [api/expense] " + r.RemoteAddr + ": claims.UserID and expense.PayerID does not match")
http.Error(w, "Invalid request", http.StatusBadRequest)
return return
} }
// Set ExpenseID
if body.Expense.ID != "" { if body.Expense.ID != "" {
http.Error(w, "Invalid request", http.StatusUnauthorized) log.Println("POST [api/expense] " + r.RemoteAddr + ": Expense ID must be empty")
http.Error(w, "Invalid request", http.StatusBadRequest)
return return
} }
body.Expense.ID = utils.GenerateUUID() body.Expense.ID = utils.GenerateUUID()
if body.Expense.CreatedAt == 0 {
body.Expense.CreatedAt = time.Now().Unix()
}
if body.Expense.Amount <= 0 {
log.Println("POST [api/expense] " + r.RemoteAddr + ": Amount must be greater than zero")
http.Error(w, "Invalid request", http.StatusBadRequest)
return
}
// Set ShareIDs and save them
for _, share := range body.Shares { for _, share := range body.Shares {
if share.ID != "" { if share.ID != "" {
http.Error(w, "Invalid request", http.StatusUnauthorized) log.Println("POST [api/expense] " + r.RemoteAddr + ": Share ID must be empty")
http.Error(w, "Invalid request", http.StatusBadRequest)
return return
} }
if share.ExpenseID != "" { if share.ExpenseID != "" {
http.Error(w, "Invalid request", http.StatusUnauthorized) log.Println("POST [api/expense] " + r.RemoteAddr + ": Expense ID of Share must be empty")
http.Error(w, "Invalid request", http.StatusBadRequest)
return return
} }
share.ExpenseID = body.Expense.ID share.ExpenseID = body.Expense.ID
share.ID = utils.GenerateUUID() share.ID = utils.GenerateUUID()
err := storage.AddShare(&share) err := storage.AddShare(&share)
if err != nil { if err != nil {
log.Println("POST [api/expense] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "Error adding expense", http.StatusBadRequest) // Should never happen http.Error(w, "Error adding expense", http.StatusBadRequest) // Should never happen
return return
} }
} }
err := storage.AddExpense(&body.Expense) err := storage.AddExpense(&body.Expense)
if err != nil { if err != nil {
log.Println("POST [api/expense] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "Error adding expense", http.StatusBadRequest) http.Error(w, "Error adding expense", http.StatusBadRequest)
return return
} }
@@ -59,13 +90,16 @@ func Expenses(w http.ResponseWriter, r *http.Request) {
"shares": body.Shares, "shares": body.Shares,
}) })
if err != nil { if err != nil {
println(err.Error()) log.Println("POST [api/expense] " + r.RemoteAddr + ": " + err.Error())
return return
} }
log.Println("POST [api/expense] " + r.RemoteAddr + ": Successfully added expense and its shares")
break break
case http.MethodPut: // -> Update Expense case http.MethodPut: // -> Update Expense
break break
case http.MethodDelete: // -> Delete Expense case http.MethodDelete: // -> Delete Expense
default:
http.Error(w, "Invalid request method", http.StatusMethodNotAllowed)
} }
} }
func AdminPanel(w http.ResponseWriter, r *http.Request) {} func AdminPanel(w http.ResponseWriter, r *http.Request) {}

10
main.go
View File

@@ -7,17 +7,13 @@ import (
) )
func main() { func main() {
var SERVER = server.InitServer() var _server = server.InitServer()
err := storage.InitDB(SERVER.DatabasePath) err := storage.InitDB(_server.DatabasePath)
if err != nil { if err != nil {
log.Fatal(err) log.Fatal(err)
return return
} }
SERVER.Run() _server.Run()
}
func Setup() {
//TODO: first configuration
} }

View File

@@ -24,3 +24,8 @@ type ExpenseShare struct {
UserID string `json:"user_id"` UserID string `json:"user_id"`
ShareCents int64 `json:"share_cents"` ShareCents int64 `json:"share_cents"`
} }
const (
RoleUser = "user"
RoleAdmin = "admin"
)

View File

@@ -10,13 +10,13 @@ import (
) )
type Server struct { type Server struct {
Port string Port string
JWTSecret []byte JWTSecret []byte
DatabasePath string DatabasePath string
CertificatePath string
PrivateKeyPath string
} }
var cfg, _ = config.LoadConfig()
func InitServer() *Server { func InitServer() *Server {
err := config.CheckIfExists() err := config.CheckIfExists()
@@ -42,9 +42,11 @@ func InitServer() *Server {
} }
return &Server{ return &Server{
Port: cfg.Port, Port: cfg.Port,
JWTSecret: []byte(jwtSecret), JWTSecret: []byte(jwtSecret),
DatabasePath: cfg.DatabasePath, DatabasePath: cfg.DatabasePath,
CertificatePath: cfg.CertificatePath,
PrivateKeyPath: cfg.PrivateKeyPath,
} }
} }
@@ -62,10 +64,11 @@ func (server *Server) Run() {
mux.Handle("/api/expenses", auth.AuthMiddleware(server.JWTSecret)(http.HandlerFunc(handlers.Expenses))) mux.Handle("/api/expenses", auth.AuthMiddleware(server.JWTSecret)(http.HandlerFunc(handlers.Expenses)))
mux.Handle("/api/balance", auth.AuthMiddleware(server.JWTSecret)(http.HandlerFunc(handlers.GetBalance))) mux.Handle("/api/balance", auth.AuthMiddleware(server.JWTSecret)(http.HandlerFunc(handlers.GetBalance)))
mux.Handle("/api/ping", auth.AuthMiddleware(server.JWTSecret)(http.HandlerFunc(handlers.TestHandler))) mux.Handle("/api/ping", auth.AuthMiddleware(server.JWTSecret)(http.HandlerFunc(handlers.TestHandler)))
mux.Handle("/api/userinfo", auth.AuthMiddleware(server.JWTSecret)(http.HandlerFunc(handlers.UserInfo)))
// Admin-only // Admin-only
mux.Handle("/api/admin", auth.AuthMiddleware(server.JWTSecret)(auth.RequireRole("admin")(http.HandlerFunc(handlers.AdminPanel)))) mux.Handle("/api/admin", auth.AuthMiddleware(server.JWTSecret)(auth.RequireRole("admin")(http.HandlerFunc(handlers.AdminPanel))))
log.Printf("Listening on port %s", server.Port) log.Printf("Listening on port %s", server.Port)
log.Fatal(http.ListenAndServe(":"+server.Port, mux)) log.Fatal(http.ListenAndServeTLS(":"+server.Port, server.CertificatePath, server.PrivateKeyPath, mux))
} }

View File

@@ -120,7 +120,35 @@ func GetExpensesByUserId(userId string) ([]models.Expense, error) {
return nil, nil return nil, nil
} }
func GetAllExpenses() ([]models.Expense, error) { func GetAllExpenses() ([]models.Expense, error) {
return nil, nil query := "SELECT * FROM expenses"
rows, err := DB.Query(query)
if err != nil {
return nil, err
}
defer rows.Close()
var expenses []models.Expense
for rows.Next() {
var expense models.Expense
var attachmentsJSON []byte
err := rows.Scan(&expense.ID, &expense.PayerID, &expense.Amount, &expense.Title, &expense.Description, &attachmentsJSON, &expense.CreatedAt, &expense.LastUpdatedAt)
if err != nil {
return nil, err
}
if len(attachmentsJSON) > 0 {
err := json.Unmarshal(attachmentsJSON, &expense.Attachments)
if err != nil {
return nil, err
}
}
expenses = append(expenses, expense)
}
if err = rows.Err(); err != nil {
return nil, err
}
return expenses, nil
} }
// Expense Shares // Expense Shares
@@ -133,6 +161,54 @@ func AddShare(share *models.ExpenseShare) error {
return err return err
} }
// Balances
func ComputeBalance(userId string) (float64, error) {
var balance float64
query := `
SELECT
COALESCE(p.paid, 0) - COALESCE(s.shared, 0) AS balance
FROM (SELECT ? AS id) u
LEFT JOIN (
SELECT payer_id, SUM(amount_cents) AS paid
FROM expenses
WHERE payer_id = ?
GROUP BY payer_id
) p ON u.id = p.payer_id
LEFT JOIN (
SELECT user_id, SUM(share_cents) AS shared
FROM expense_shares
WHERE user_id = ?
GROUP BY user_id
) s ON u.id = s.user_id`
err := DB.QueryRow(query, userId, userId, userId).Scan(&balance)
if err != nil {
return 0, err
}
return balance, nil
}
func ComputeWGBalance() (float64, error) {
var balance float64
query := `SELECT u.id AS user_id,
COALESCE(p.paid_cents,0) - COALESCE(s.share_cents,0) AS balance_cents
FROM users u
LEFT JOIN (
SELECT payer_id, SUM(amount_cents) AS paid_cents
FROM expenses
GROUP BY payer_id
) p ON u.id = p.payer_id
LEFT JOIN (
SELECT es.user_id, SUM(es.share_cents) AS share_cents
FROM expense_shares es
JOIN expenses e ON es.expense_id = e.id
GROUP BY es.user_id
) s ON u.id = s.user_id)`
err := DB.QueryRow(query).Scan(&balance)
if err != nil {
return 0, err
}
return balance, nil
}
// Users // Users
func AddUser(user *models.User) error { func AddUser(user *models.User) error {
_, err := DB.Exec("INSERT INTO users(id, username, password, role) VALUES (?, ?, ?, ?)", user.ID, strings.ToLower(user.Username), user.Password, user.Role) _, err := DB.Exec("INSERT INTO users(id, username, password, role) VALUES (?, ?, ?, ?)", user.ID, strings.ToLower(user.Username), user.Password, user.Role)