25 Commits

Author SHA1 Message Date
91997686d1 Added endpoint for shares 2026-03-04 14:23:09 +01:00
2f4e0bb8ce Updated refresh-token property names 2026-03-03 20:07:35 +01:00
56cc1c50a7 Updated refresh-token property names 2026-03-03 19:54:21 +01:00
088d32984c Made some small adjustments to e7da8c9443 2026-03-03 16:29:26 +01:00
e7da8c9443 Removed hardcoded string
- Roles are not hardcoded anymore (closes #4)
2026-03-03 15:55:39 +01:00
0afd5bfc3a Bugfix
- Role is now again listed in jwt when retrieving new access token (closes #3)
2026-03-03 15:45:53 +01:00
ef7ef3cf74 New Endpoint and security enhancement
- Userinfo endpoint is now available
- HTTPS is now required (closes #2)
2026-03-03 15:41:07 +01:00
c75c405200 Added .run dir to .gitignore 2026-03-01 13:49:17 +01:00
c735261f0c Removed comments from Dockerfile 2026-03-01 13:46:16 +01:00
188b238e7d Finished first part of balance calculation 2026-03-01 13:45:49 +01:00
87ae8cc0b9 Added logs 2026-03-01 13:25:27 +01:00
2a1da08216 Removed typo
- closes #1
2026-03-01 13:07:49 +01:00
ddf06554f8 Added start of balances 2026-03-01 13:07:22 +01:00
54a8292234 Added ExpenseAdder Endpoint 2026-03-01 12:46:40 +01:00
6a974cbbf1 Changed startup logic 2026-03-01 11:16:20 +01:00
d5642ccadf Added logs 2026-02-28 19:01:48 +01:00
1f54f60d46 Updated README.md 2026-02-27 22:09:56 +01:00
b87fe71503 Added Dockerfile 2026-02-27 21:54:06 +01:00
6289830732 adjusted README.md 2026-02-27 19:36:43 +01:00
859df7819c names are always saved lowercase 2026-02-27 18:33:09 +01:00
8a92073066 removed unnecessary icon 2026-02-27 17:48:33 +01:00
f4501d0c04 - new license
- name of project is now provided when logging in
2026-02-27 17:46:12 +01:00
383d852545 Merge remote-tracking branch 'origin/main' 2026-02-27 15:58:31 +01:00
3ba8903de9 Finished login system with refresh-tokens 2026-02-27 15:58:05 +01:00
1eb179dac1 Optimized login system 2026-02-27 14:33:08 +01:00
19 changed files with 975 additions and 137 deletions

2
.gitignore vendored
View File

@@ -1,3 +1,5 @@
appdata appdata
.idea .idea
*.exe *.exe
*.cmd
.run

19
Dockerfile Normal file
View File

@@ -0,0 +1,19 @@
FROM --platform=$BUILDPLATFORM golang:1.26-alpine AS builder
RUN apk add --no-cache git
WORKDIR /app
COPY go.mod go.sum ./
RUN go mod download
COPY . .
ARG TARGETOS
ARG TARGETARCH
RUN CGO_ENABLED=0 GOOS=$TARGETOS GOARCH=$TARGETARCH \
go build -ldflags "-s -w" -o shap-planner-backend .
FROM scratch
COPY --from=builder /app/shap-planner-backend /shap-planner-backend
ENTRYPOINT ["/shap-planner-backend"]

121
LICENSE Normal file
View File

@@ -0,0 +1,121 @@
Creative Commons Legal Code
CC0 1.0 Universal
CREATIVE COMMONS CORPORATION IS NOT A LAW FIRM AND DOES NOT PROVIDE
LEGAL SERVICES. DISTRIBUTION OF THIS DOCUMENT DOES NOT CREATE AN
ATTORNEY-CLIENT RELATIONSHIP. CREATIVE COMMONS PROVIDES THIS
INFORMATION ON AN "AS-IS" BASIS. CREATIVE COMMONS MAKES NO WARRANTIES
REGARDING THE USE OF THIS DOCUMENT OR THE INFORMATION OR WORKS
PROVIDED HEREUNDER, AND DISCLAIMS LIABILITY FOR DAMAGES RESULTING FROM
THE USE OF THIS DOCUMENT OR THE INFORMATION OR WORKS PROVIDED
HEREUNDER.
Statement of Purpose
The laws of most jurisdictions throughout the world automatically confer
exclusive Copyright and Related Rights (defined below) upon the creator
and subsequent owner(s) (each and all, an "owner") of an original work of
authorship and/or a database (each, a "Work").
Certain owners wish to permanently relinquish those rights to a Work for
the purpose of contributing to a commons of creative, cultural and
scientific works ("Commons") that the public can reliably and without fear
of later claims of infringement build upon, modify, incorporate in other
works, reuse and redistribute as freely as possible in any form whatsoever
and for any purposes, including without limitation commercial purposes.
These owners may contribute to the Commons to promote the ideal of a free
culture and the further production of creative, cultural and scientific
works, or to gain reputation or greater distribution for their Work in
part through the use and efforts of others.
For these and/or other purposes and motivations, and without any
expectation of additional consideration or compensation, the person
associating CC0 with a Work (the "Affirmer"), to the extent that he or she
is an owner of Copyright and Related Rights in the Work, voluntarily
elects to apply CC0 to the Work and publicly distribute the Work under its
terms, with knowledge of his or her Copyright and Related Rights in the
Work and the meaning and intended legal effect of CC0 on those rights.
1. Copyright and Related Rights. A Work made available under CC0 may be
protected by copyright and related or neighboring rights ("Copyright and
Related Rights"). Copyright and Related Rights include, but are not
limited to, the following:
i. the right to reproduce, adapt, distribute, perform, display,
communicate, and translate a Work;
ii. moral rights retained by the original author(s) and/or performer(s);
iii. publicity and privacy rights pertaining to a person's image or
likeness depicted in a Work;
iv. rights protecting against unfair competition in regards to a Work,
subject to the limitations in paragraph 4(a), below;
v. rights protecting the extraction, dissemination, use and reuse of data
in a Work;
vi. database rights (such as those arising under Directive 96/9/EC of the
European Parliament and of the Council of 11 March 1996 on the legal
protection of databases, and under any national implementation
thereof, including any amended or successor version of such
directive); and
vii. other similar, equivalent or corresponding rights throughout the
world based on applicable law or treaty, and any national
implementations thereof.
2. Waiver. To the greatest extent permitted by, but not in contravention
of, applicable law, Affirmer hereby overtly, fully, permanently,
irrevocably and unconditionally waives, abandons, and surrenders all of
Affirmer's Copyright and Related Rights and associated claims and causes
of action, whether now known or unknown (including existing as well as
future claims and causes of action), in the Work (i) in all territories
worldwide, (ii) for the maximum duration provided by applicable law or
treaty (including future time extensions), (iii) in any current or future
medium and for any number of copies, and (iv) for any purpose whatsoever,
including without limitation commercial, advertising or promotional
purposes (the "Waiver"). Affirmer makes the Waiver for the benefit of each
member of the public at large and to the detriment of Affirmer's heirs and
successors, fully intending that such Waiver shall not be subject to
revocation, rescission, cancellation, termination, or any other legal or
equitable action to disrupt the quiet enjoyment of the Work by the public
as contemplated by Affirmer's express Statement of Purpose.
3. Public License Fallback. Should any part of the Waiver for any reason
be judged legally invalid or ineffective under applicable law, then the
Waiver shall be preserved to the maximum extent permitted taking into
account Affirmer's express Statement of Purpose. In addition, to the
extent the Waiver is so judged Affirmer hereby grants to each affected
person a royalty-free, non transferable, non sublicensable, non exclusive,
irrevocable and unconditional license to exercise Affirmer's Copyright and
Related Rights in the Work (i) in all territories worldwide, (ii) for the
maximum duration provided by applicable law or treaty (including future
time extensions), (iii) in any current or future medium and for any number
of copies, and (iv) for any purpose whatsoever, including without
limitation commercial, advertising or promotional purposes (the
"License"). The License shall be deemed effective as of the date CC0 was
applied by Affirmer to the Work. Should any part of the License for any
reason be judged legally invalid or ineffective under applicable law, such
partial invalidity or ineffectiveness shall not invalidate the remainder
of the License, and in such case Affirmer hereby affirms that he or she
will not (i) exercise any of his or her remaining Copyright and Related
Rights in the Work or (ii) assert any associated claims and causes of
action with respect to the Work, in either case contrary to Affirmer's
express Statement of Purpose.
4. Limitations and Disclaimers.
a. No trademark or patent rights held by Affirmer are waived, abandoned,
surrendered, licensed or otherwise affected by this document.
b. Affirmer offers the Work as-is and makes no representations or
warranties of any kind concerning the Work, express, implied,
statutory or otherwise, including without limitation warranties of
title, merchantability, fitness for a particular purpose, non
infringement, or the absence of latent or other defects, accuracy, or
the present or absence of errors, whether or not discoverable, all to
the greatest extent permissible under applicable law.
c. Affirmer disclaims responsibility for clearing rights of other persons
that may apply to the Work or any use thereof, including without
limitation any person's Copyright and Related Rights in the Work.
Further, Affirmer disclaims responsibility for obtaining any necessary
consents, permissions or other rights required for any use of the
Work.
d. Affirmer understands and acknowledges that Creative Commons is not a
party to this document and has no duty or obligation with respect to
this CC0 or use of the Work.

View File

@@ -1,24 +0,0 @@
This is free and unencumbered software released into the public domain.
Anyone is free to copy, modify, publish, use, compile, sell, or
distribute this software, either in source code form or as a compiled
binary, for any purpose, commercial or non-commercial, and by any
means.
In jurisdictions that recognize copyright laws, the author or authors
of this software dedicate any and all copyright interest in the
software to the public domain. We make this dedication for the benefit
of the public at large and to the detriment of our heirs and
successors. We intend this dedication to be an overt act of
relinquishment in perpetuity of all present and future rights to this
software under copyright law.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY CLAIM, DAMAGES OR
OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
OTHER DEALINGS IN THE SOFTWARE.
For more information, please refer to <https://unlicense.org/>

View File

@@ -3,43 +3,42 @@
ShAp-Planner is a **self-hosted app** for managing finances, tasks, and data within shared households. ShAp-Planner is a **self-hosted app** for managing finances, tasks, and data within shared households.
The app is fully open source, lightweight, and can run on small devices like Raspberry Pi or older computers. The app is fully open source, lightweight, and can run on small devices like Raspberry Pi or older computers.
**Backend:** Go **[Backend](https://git.miaurizius.de/MiauRizius/shap-planner-backend):** Go
**Frontend:** Android (Kotlin) **[Frontend](https://git.miaurizius.de/MiauRizius/shap-planner-android):** Android (Kotlin)
**License:** Unlicense - complete freedom for everyone **[License](https://git.miaurizius.de/MiauRizius/shap-planner-backend/src/branch/main/LICENSE):** [CC0 1.0](https://creativecommons.org/publicdomain/zero/1.0/)
--- ---
## Summary ## Installation
1. [Features](#-features)
2. [Configuration](#-configuration)
3. [Setup](#-setup)
4. [Contributing](#-contributing)
5. [License](#-license)
--- ### Docker Compose (recommended)
1. Download docker-compose.yaml
````shell
$ curl -L https://git.miaurizius.de/MiauRizius/shap-planner-backend/raw/branch/main/docker-compose.yaml -o docker-compose.yaml
````
or create it yourself and enter the following content
````yaml
services:
shap-planner:
image: git.miaurizius.de/miaurizius/shap-planner-backend:latest
container_name: shap-planner
restart: unless-stopped
ports:
- "8080:8080"
environment:
- SHAP_JWT_SECRET=SECURE_RANDOM_STRING # Must be at least 32 characters long
volumes:
- ./appdata:/appdata # To edit your configuration files
````
## ⚡ Features 2. Start the container
````shell
$ docker compose up -d
````
- Multi-account support 3. Edit configuration as you like
- JWT-based login system
- Role-based access control (user/admin)
- Self-hosted, lightweight backend
- Configuration via environment variables
- Easy to extend with custom modules
--- ### Build from source
## ⚙️ Configuration
### Environment Variables
| Variable | Description | Example |
|----------------|-------------------------------------------------------|----------------|
| `SHAP-JWT_SECRET` | Secret used to sign JWT tokens | `superrandomsecret123` |
---
## 📝 Setup
1. Clone the repository: 1. Clone the repository:
```bash ```bash
@@ -59,18 +58,15 @@ export SHAP_JWT_SECRET="your_super_random_secret"
go run main.go go run main.go
``` ```
--- ## Configuration
### Environment Variables
## 🧩 Contributing | Variable | Description | Example |
|-------------------|-------------------------------------------------------|----------------|
* Fork the repo | `SHAP_JWT_SECRET` | Secret used to sign JWT tokens | `superrandomsecret123` |
* Make changes
* Submit pull requests
We welcome bug fixes, new features, and documentation improvements.
--- ---
## 📜 License ## License
This project is licensed under **[The Unlicense](https://unlicense.org/)** it is free for anyone to use, modify, and distribute for any purpose, without restrictions. This work is marked <a href="https://creativecommons.org/publicdomain/zero/1.0/">CC0 1.0</a>

View File

@@ -1,7 +1,6 @@
package auth package auth
import ( import (
"os"
"time" "time"
"github.com/golang-jwt/jwt/v5" "github.com/golang-jwt/jwt/v5"
@@ -13,8 +12,6 @@ type Claims struct {
jwt.RegisteredClaims jwt.RegisteredClaims
} }
var secret = os.Getenv("SHAP_JWT_SECRET")
func GenerateJWT(userID, role string, secret []byte) (string, error) { func GenerateJWT(userID, role string, secret []byte) (string, error) {
claims := Claims{ claims := Claims{
UserID: userID, UserID: userID,

View File

@@ -9,8 +9,11 @@ import (
) )
type Config struct { type Config struct {
Port string `yaml:"port"` HouseholdName string `yaml:"household_name"`
DatabasePath string `yaml:"database_path"` Port string `yaml:"port"`
DatabasePath string `yaml:"database_path"`
CertificatePath string `yaml:"certificate_path"`
PrivateKeyPath string `yaml:"private_key_path"`
} }
const configPath = "./appdata/config.yaml" const configPath = "./appdata/config.yaml"
@@ -32,8 +35,11 @@ func CheckIfExists() error {
} }
defaultConfig := Config{ defaultConfig := Config{
Port: "8080", Port: "8080",
DatabasePath: "./appdata/database.db", DatabasePath: "./appdata/database.db",
HouseholdName: "Example-Household",
CertificatePath: "./appdata/cert.pem",
PrivateKeyPath: "./appdata/key.pem",
} }
data, err := yaml.Marshal(defaultConfig) data, err := yaml.Marshal(defaultConfig)

11
docker-compose.yaml Normal file
View File

@@ -0,0 +1,11 @@
services:
shap-planner:
image: git.miaurizius.de/miaurizius/shap-planner-backend:latest
container_name: shap-planner
restart: unless-stopped
ports:
- "8080:8080"
environment:
- SHAP_JWT_SECRET=SECURE_RANDOM_STRING # Must be at least 32 characters long
volumes:
- ./appdata:/appdata # To edit your configuration files

View File

@@ -2,50 +2,245 @@ package handlers
import ( import (
"encoding/json" "encoding/json"
"log"
"net/http" "net/http"
"os"
"shap-planner-backend/auth" "shap-planner-backend/auth"
"shap-planner-backend/config"
"shap-planner-backend/models" "shap-planner-backend/models"
"shap-planner-backend/storage" "shap-planner-backend/storage"
"shap-planner-backend/utils" "shap-planner-backend/utils"
"time"
) )
var cfg, _ = config.LoadConfig()
func Register(w http.ResponseWriter, r *http.Request) { func Register(w http.ResponseWriter, r *http.Request) {
var user models.User var user models.User
_ = json.NewDecoder(r.Body).Decode(&user) if err := json.NewDecoder(r.Body).Decode(&user); err != nil {
hashed, _ := auth.HashPassword(user.Password) log.Println("POST [api/register] " + r.RemoteAddr + ": " + err.Error())
user.Password = hashed http.Error(w, "Invalid request body", http.StatusBadRequest)
user.ID = utils.GenerateUUID()
err := storage.AddUser(user)
if err != nil {
http.Error(w, "User exists", http.StatusBadRequest)
return return
} }
w.WriteHeader(http.StatusCreated)
}
if user.Username == "" || user.Password == "" {
log.Println("POST [api/register] " + r.RemoteAddr + ": Username or Password is empty")
http.Error(w, "username and password required", http.StatusBadRequest)
return
}
hashed, err := auth.HashPassword(user.Password)
if err != nil {
log.Println("POST [api/register] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "internal error", http.StatusInternalServerError)
return
}
user.Password = hashed
user.ID = utils.GenerateUUID()
user.Role = models.RoleUser
if err := storage.AddUser(&user); err != nil {
log.Println("POST [api/register] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "user already exists", http.StatusBadRequest)
return
}
w.WriteHeader(http.StatusCreated)
log.Println("POST [api/register] " + r.RemoteAddr + ": Successfully created user")
}
func Login(w http.ResponseWriter, r *http.Request) { func Login(w http.ResponseWriter, r *http.Request) {
var creds struct { var creds struct {
Username string `json:"username"` Username string `json:"username"`
Password string `json:"password"` Password string `json:"password"`
} }
_ = json.NewDecoder(r.Body).Decode(&creds) if err := json.NewDecoder(r.Body).Decode(&creds); err != nil {
log.Println("POST [api/login] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "Invalid request", http.StatusBadRequest)
return
}
user, err := storage.GetUserByUsername(creds.Username) user, err := storage.GetUserByUsername(creds.Username)
if err != nil { if err != nil {
http.Error(w, "User not found", http.StatusUnauthorized) log.Println("POST [api/login] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "Invalid credentials", http.StatusUnauthorized)
return return
} }
if !auth.CheckPasswordHash(creds.Password, user.Password) { if !auth.CheckPasswordHash(creds.Password, user.Password) {
http.Error(w, "Wrong password", http.StatusUnauthorized) log.Println("POST [api/login] " + r.RemoteAddr + ": Invalid credentials")
http.Error(w, "Invalid credentials", http.StatusUnauthorized)
return return
} }
// TODO: JWT oder Session-Token erzeugen secret := []byte(os.Getenv("SHAP_JWT_SECRET"))
w.WriteHeader(http.StatusOK) if len(secret) == 0 {
err = json.NewEncoder(w).Encode(user) log.Println("POST [api/login] " + r.RemoteAddr + ": Server misconfiguration")
if err != nil { http.Error(w, "Server misconfiguration", http.StatusInternalServerError)
return return
} }
accessToken, err := auth.GenerateJWT(user.ID, user.Role, secret)
if err != nil {
log.Println("POST [api/login] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "Could not generate token", http.StatusInternalServerError)
return
}
refreshTokenPlain, err := utils.GenerateRefreshToken()
if err != nil {
log.Println("POST [api/login] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "could not generate refresh token", http.StatusInternalServerError)
return
}
refreshHash := utils.HashToken(refreshTokenPlain)
refreshID := utils.GenerateUUID()
refreshExpires := time.Now().Add(7 * 24 * time.Hour).Unix() // expiry: 7 days
deviceInfo := r.Header.Get("User-Agent")
if err := storage.AddRefreshToken(&models.RefreshToken{
ID: refreshID,
UserID: user.ID,
Token: refreshHash,
ExpiresAt: refreshExpires,
DeviceInfo: deviceInfo,
CreatedAt: time.Now().Unix(),
Revoked: false,
}); err != nil {
log.Println("POST [api/login] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "could not save refresh token", http.StatusInternalServerError)
return
}
// Return access + refresh token (refresh in plain for client to store securely)
resp := map[string]interface{}{
"access_token": accessToken,
"refresh_token": refreshTokenPlain,
"user": map[string]interface{}{
"id": user.ID,
"username": user.Username,
"role": user.Role,
},
"wgName": cfg.HouseholdName,
}
w.Header().Set("Content-Type", "application/json")
err = json.NewEncoder(w).Encode(resp)
if err != nil {
log.Println("POST [api/login] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "Something went wrong", http.StatusInternalServerError)
return
}
log.Println("POST [api/login] " + r.RemoteAddr + ": Successfully logged in")
}
func Logout(w http.ResponseWriter, r *http.Request) {
claims := r.Context().Value(auth.UserContextKey).(*auth.Claims)
err := storage.RevokeAllRefreshTokensForUser(claims.UserID)
if err != nil {
log.Println("GET [api/logout] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "Internal server error", http.StatusInternalServerError)
return
}
w.WriteHeader(204)
}
func TestHandler(w http.ResponseWriter, r *http.Request) {
claims, _ := utils.IsLoggedIn(w, r)
w.Header().Set("Content-Type", "application/json")
err := json.NewEncoder(w).Encode(map[string]interface{}{
"user_id": claims.UserID,
"role": claims.Role,
"msg": "Authentication successful",
})
if err != nil {
log.Println("GET [api/ping] " + r.RemoteAddr + ": " + err.Error())
return
}
log.Println("GET [api/login] " + r.RemoteAddr + ": Successfully tested connection")
}
func RefreshToken(w http.ResponseWriter, r *http.Request) {
var req struct {
RefreshToken string `json:"refresh_token"`
}
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
log.Println("POST [api/refresh] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "Invalid request", http.StatusBadRequest)
return
}
hashed := utils.HashToken(req.RefreshToken)
tokenRow, err := storage.GetRefreshToken(hashed)
if err != nil || tokenRow.Revoked || tokenRow.ExpiresAt < time.Now().Unix() {
log.Println("POST [api/refresh] " + r.RemoteAddr + ": Invalid refresh token")
http.Error(w, "Invalid refresh token", http.StatusUnauthorized)
return
}
if err := storage.RevokeRefreshToken(tokenRow.ID); err != nil {
log.Println(err)
}
newToken, _ := utils.GenerateRefreshToken()
newHash := utils.HashToken(newToken)
newExpires := time.Now().Add(7 * 24 * time.Hour).Unix() //7 days
newID := utils.GenerateUUID()
deviceInfo := r.Header.Get("User-Agent")
if err = storage.AddRefreshToken(&models.RefreshToken{
ID: newID,
UserID: tokenRow.UserID,
Token: newHash,
ExpiresAt: newExpires,
CreatedAt: time.Now().Unix(),
Revoked: false,
DeviceInfo: deviceInfo,
}); err != nil {
log.Println("POST [api/refresh] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "Could not generate new refresh token", http.StatusInternalServerError)
return
}
user, err := storage.GetUserById(tokenRow.UserID)
if err != nil {
log.Println("POST [api/refresh] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "Internal server error", http.StatusInternalServerError)
return
}
accessToken, _ := auth.GenerateJWT(tokenRow.UserID, user.Role, []byte(os.Getenv("SHAP_JWT_SECRET")))
if err = json.NewEncoder(w).Encode(map[string]string{
"access_token": accessToken,
"refresh_token": newToken,
}); err != nil {
log.Println("POST [api/refresh] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "Internal server error", http.StatusInternalServerError)
return
}
log.Println("POST [api/refresh] " + r.RemoteAddr + ": Successfully refreshed token")
}
func UserInfo(w http.ResponseWriter, r *http.Request) {
if r.Method != http.MethodGet {
log.Println("GET [api/userinfo] " + r.RemoteAddr + ": Method " + r.Method + " not allowed")
http.Error(w, "Method not allowed", http.StatusMethodNotAllowed)
return
}
query := r.URL.Query()
idParam := query.Get("id")
user, err := storage.GetUserById(idParam)
if err != nil {
log.Println("GET [api/userinfo] " + r.RemoteAddr + ": User " + idParam + " not found")
http.Error(w, "User not found", http.StatusNotFound)
return
}
w.Header().Set("Content-Type", "application/json")
err = json.NewEncoder(w).Encode(map[string]interface{}{
"id": user.ID,
"name": user.Username,
"avatar_url": "",
})
if err != nil {
log.Println("GET [api/userinfo] " + r.RemoteAddr + ": " + err.Error())
return
}
log.Println("GET [api/userinfo] " + r.RemoteAddr + ": Successfully retrieved user info")
} }

32
handlers/balance.go Normal file
View File

@@ -0,0 +1,32 @@
package handlers
import (
"encoding/json"
"log"
"net/http"
"shap-planner-backend/storage"
)
func GetBalance(w http.ResponseWriter, r *http.Request) {
query := r.URL.Query()
userParam := query.Get("user")
if userParam == "all" {
// TODO: add later
} else {
balance, err := storage.ComputeBalance(userParam)
if err != nil {
log.Println("GET [api/balance] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "Invalid request query", http.StatusBadRequest)
return
}
err = json.NewEncoder(w).Encode(map[string]interface{}{
"balance": balance,
})
if err != nil {
log.Println("GET [api/balance] " + r.RemoteAddr + ": " + err.Error())
return
}
log.Println("GET [api/balance] " + r.RemoteAddr + ": Successfully retrieved balance")
}
}

View File

@@ -1,7 +1,160 @@
package handlers package handlers
import "net/http" import (
"encoding/json"
"log"
"net/http"
"shap-planner-backend/models"
"shap-planner-backend/storage"
"shap-planner-backend/utils"
"strings"
"time"
)
func GetExpenses(w http.ResponseWriter, r *http.Request) {} func Expenses(w http.ResponseWriter, r *http.Request) {
claims, _ := utils.IsLoggedIn(w, r)
switch r.Method {
case http.MethodGet: // -> Get Expenses
expenses, err := storage.GetAllExpenses()
if err != nil {
log.Println("GET [api/expense] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "Something went wrong", http.StatusInternalServerError)
return
}
err = json.NewEncoder(w).Encode(map[string]interface{}{
"expenses": expenses,
})
if err != nil {
log.Println("GET [api/expense] " + r.RemoteAddr + ": " + err.Error())
return
}
log.Println("GET [api/expense] " + r.RemoteAddr + ": Successfully retrieved expenses")
break
case http.MethodPost: // -> Create Expense
var body struct {
Expense models.Expense `json:"expense"`
Shares []models.ExpenseShare `json:"shares"`
}
if err := json.NewDecoder(r.Body).Decode(&body); err != nil {
log.Println("POST [api/expense] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "Invalid request body", http.StatusBadRequest)
return
}
if claims.UserID != body.Expense.PayerID { // You cannot create an expense in the name of another user
log.Println("POST [api/expense] " + r.RemoteAddr + ": claims.UserID and expense.PayerID does not match")
http.Error(w, "Invalid request", http.StatusBadRequest)
return
}
// Set ExpenseID
if body.Expense.ID != "" {
log.Println("POST [api/expense] " + r.RemoteAddr + ": Expense ID must be empty")
http.Error(w, "Invalid request", http.StatusBadRequest)
return
}
body.Expense.ID = utils.GenerateUUID()
if body.Expense.CreatedAt == 0 {
body.Expense.CreatedAt = time.Now().Unix()
}
if body.Expense.Amount <= 0 {
log.Println("POST [api/expense] " + r.RemoteAddr + ": Amount must be greater than zero")
http.Error(w, "Invalid request", http.StatusBadRequest)
return
}
// Set ShareIDs and save them
for _, share := range body.Shares {
if share.ID != "" {
log.Println("POST [api/expense] " + r.RemoteAddr + ": Share ID must be empty")
http.Error(w, "Invalid request", http.StatusBadRequest)
return
}
if share.ExpenseID != "" {
log.Println("POST [api/expense] " + r.RemoteAddr + ": Expense ID of Share must be empty")
http.Error(w, "Invalid request", http.StatusBadRequest)
return
}
share.ExpenseID = body.Expense.ID
share.ID = utils.GenerateUUID()
err := storage.AddShare(&share)
if err != nil {
log.Println("POST [api/expense] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "Error adding expense", http.StatusBadRequest) // Should never happen
return
}
}
err := storage.AddExpense(&body.Expense)
if err != nil {
log.Println("POST [api/expense] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "Error adding expense", http.StatusBadRequest)
return
}
err = json.NewEncoder(w).Encode(map[string]interface{}{
"expense": body.Expense,
"shares": body.Shares,
})
if err != nil {
log.Println("POST [api/expense] " + r.RemoteAddr + ": " + err.Error())
return
}
log.Println("POST [api/expense] " + r.RemoteAddr + ": Successfully added expense and its shares")
break
case http.MethodPut: // -> Update Expense
break
case http.MethodDelete: // -> Delete Expense
default:
http.Error(w, "Invalid request method", http.StatusMethodNotAllowed)
}
}
func ExpenseShares(w http.ResponseWriter, r *http.Request) {
switch r.Method {
case http.MethodGet:
query := r.URL.Query()
idParam := query.Get("id")
idTypeParam := strings.ToLower(query.Get("idType"))
if idTypeParam == models.IDTypeEXPENSE {
println(idParam)
shares, err := storage.GetSharesByExpenseId(idParam)
if err != nil {
log.Println("GET [api/shares] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "Something went wrong", http.StatusInternalServerError)
return
}
w.Header().Set("Content-Type", "application/json")
err = json.NewEncoder(w).Encode(map[string]interface{}{
"shares": shares,
})
if err != nil {
log.Println("GET [api/shares] " + r.RemoteAddr + ": " + err.Error())
return
}
log.Println("GET [api/shares] " + r.RemoteAddr + ": Successfully retrieved shares")
} else if idTypeParam == models.IDTypeSHARE || idTypeParam == "" {
share, err := storage.GetShareById(idParam)
if err != nil {
log.Println("GET [api/shares] " + r.RemoteAddr + ": " + err.Error())
http.Error(w, "Something went wrong", http.StatusInternalServerError)
return
}
w.Header().Set("Content-Type", "application/json")
err = json.NewEncoder(w).Encode(map[string]interface{}{
"id": share.ID,
"expense_id": share.ExpenseID,
"user_id": share.UserID,
"share_cents": share.ShareCents,
})
if err != nil {
log.Println("GET [api/shares] " + r.RemoteAddr + ": " + err.Error())
return
}
log.Println("GET [api/shares] " + r.RemoteAddr + ": Successfully retrieved shares")
}
break
case http.MethodPut:
break
case http.MethodDelete:
break
default:
http.Error(w, "Invalid request method", http.StatusMethodNotAllowed)
}
}
func AdminPanel(w http.ResponseWriter, r *http.Request) {} func AdminPanel(w http.ResponseWriter, r *http.Request) {}

11
main.go
View File

@@ -7,16 +7,13 @@ import (
) )
func main() { func main() {
var SERVER = server.InitServer() var _server = server.InitServer()
err := storage.InitDB(SERVER.DatabasePath) err := storage.InitDB(_server.DatabasePath)
if err != nil { if err != nil {
log.Fatal(err) log.Fatal(err)
return
} }
SERVER.Run() _server.Run()
}
func Setup() {
//TODO: first configuration
} }

14
models/constants.go Normal file
View File

@@ -0,0 +1,14 @@
package models
// Roles
const (
RoleUser = "user"
RoleAdmin = "admin"
)
// ID-Types
const (
IDTypeSHARE = "share"
IDTypeEXPENSE = "expense"
IDTypeUSER = "user"
)

26
models/dbmodels.go Normal file
View File

@@ -0,0 +1,26 @@
package models
type User struct {
ID string `json:"id"`
Username string `json:"username"`
Password string `json:"password"`
Role string `json:"role"`
}
type Expense struct {
ID string `json:"id"`
PayerID string `json:"payer_id"`
Amount int64 `json:"amount"`
Title string `json:"title"`
Description string `json:"description"`
Attachments []string `json:"attachments"`
CreatedAt int64 `json:"created_at"`
LastUpdatedAt int64 `json:"last_updated_at"`
}
type ExpenseShare struct {
ID string `json:"id"`
ExpenseID string `json:"expense_id"`
UserID string `json:"user_id"`
ShareCents int64 `json:"share_cents"`
}

11
models/loginmodels.go Normal file
View File

@@ -0,0 +1,11 @@
package models
type RefreshToken struct {
ID string `json:"id"`
UserID string `json:"user_id"`
Token string `json:"token"`
ExpiresAt int64 `json:"expires_at"`
CreatedAt int64 `json:"created_at"`
Revoked bool `json:"revoked"`
DeviceInfo string `json:"device_info"`
}

View File

@@ -1,16 +0,0 @@
package models
type User struct {
ID string `json:"id"`
Username string `json:"username"`
Password string `json:"password"`
}
type Expense struct {
ID string `json:"id"`
Amount int `json:"amt"`
Description string `json:"desc"`
Payer User `json:"payer"`
Debtors []User `json:"debtors"`
}

View File

@@ -10,9 +10,11 @@ import (
) )
type Server struct { type Server struct {
Port string Port string
JWTSecret []byte JWTSecret []byte
DatabasePath string DatabasePath string
CertificatePath string
PrivateKeyPath string
} }
func InitServer() *Server { func InitServer() *Server {
@@ -20,39 +22,54 @@ func InitServer() *Server {
err := config.CheckIfExists() err := config.CheckIfExists()
if err != nil { if err != nil {
log.Fatal(err) log.Fatal(err)
return nil
} }
cfg, err := config.LoadConfig() cfg, err := config.LoadConfig()
if err != nil { if err != nil {
log.Fatal(err) log.Fatal(err)
return nil
} }
jwtSecret := os.Getenv("SHAP_JWT_SECRET") jwtSecret := os.Getenv("SHAP_JWT_SECRET")
if jwtSecret == "" { if jwtSecret == "" {
log.Fatal("SHAP_JWT_SECRET environment variable not set.") log.Fatal("SHAP_JWT_SECRET environment variable not set.")
return nil
} }
if len(jwtSecret) < 32 { if len(jwtSecret) < 32 {
log.Fatal("SHAP_JWT_SECRET must be at least 32 characters long.") log.Fatal("SHAP_JWT_SECRET must be at least 32 characters long.")
return nil
} }
return &Server{ return &Server{
Port: cfg.Port, Port: cfg.Port,
JWTSecret: []byte(jwtSecret), JWTSecret: []byte(jwtSecret),
DatabasePath: cfg.DatabasePath, DatabasePath: cfg.DatabasePath,
CertificatePath: cfg.CertificatePath,
PrivateKeyPath: cfg.PrivateKeyPath,
} }
} }
func (server *Server) Run() { func (server *Server) Run() {
log.Println("Starting server...")
mux := http.NewServeMux() mux := http.NewServeMux()
mux.HandleFunc("/login", handlers.Login) // Public
mux.HandleFunc("/api/login", handlers.Login)
mux.HandleFunc("/api/register", handlers.Register)
mux.HandleFunc("/api/refresh", handlers.RefreshToken)
mux.HandleFunc("/api/logout", handlers.Logout)
protected := auth.AuthMiddleware(server.JWTSecret)(http.HandlerFunc(handlers.GetExpenses)) // Login required
mux.Handle("/expenses", protected) mux.Handle("/api/expenses", auth.AuthMiddleware(server.JWTSecret)(http.HandlerFunc(handlers.Expenses)))
mux.Handle("/api/shares", auth.AuthMiddleware(server.JWTSecret)(http.HandlerFunc(handlers.ExpenseShares)))
mux.Handle("/api/balance", auth.AuthMiddleware(server.JWTSecret)(http.HandlerFunc(handlers.GetBalance)))
mux.Handle("/api/ping", auth.AuthMiddleware(server.JWTSecret)(http.HandlerFunc(handlers.TestHandler)))
mux.Handle("/api/userinfo", auth.AuthMiddleware(server.JWTSecret)(http.HandlerFunc(handlers.UserInfo)))
adminOnly := auth.AuthMiddleware(server.JWTSecret)(auth.RequireRole("admin")(http.HandlerFunc(handlers.AdminPanel))) // Admin-only
mux.Handle("/admin", adminOnly) mux.Handle("/api/admin", auth.AuthMiddleware(server.JWTSecret)(auth.RequireRole("admin")(http.HandlerFunc(handlers.AdminPanel))))
log.Printf("Listening on port %s", server.Port) log.Printf("Listening on port %s", server.Port)
log.Fatal(http.ListenAndServe(":"+server.Port, mux)) log.Fatal(http.ListenAndServeTLS(":"+server.Port, server.CertificatePath, server.PrivateKeyPath, mux))
} }

View File

@@ -2,10 +2,15 @@ package storage
import ( import (
"database/sql" "database/sql"
_ "github.com/glebarez/go-sqlite" "encoding/json"
"errors"
"shap-planner-backend/models" "shap-planner-backend/models"
"strings"
_ "github.com/glebarez/go-sqlite"
) )
var ErrNotFound = sql.ErrNoRows
var DB *sql.DB var DB *sql.DB
func InitDB(filepath string) error { func InitDB(filepath string) error {
@@ -18,36 +23,283 @@ func InitDB(filepath string) error {
//Create Users-Table //Create Users-Table
_, err = DB.Exec(`CREATE TABLE IF NOT EXISTS users( _, err = DB.Exec(`CREATE TABLE IF NOT EXISTS users(
id TEXT PRIMARY KEY, id TEXT PRIMARY KEY,
username TEXT UNIQUE, username TEXT UNIQUE NOT NULL,
password TEXT password TEXT NOT NULL,
role TEXT NOT NULL
);`) );`)
if err != nil { if err != nil {
return err return err
} }
//Create refresh token-table
_, err = DB.Exec(`CREATE TABLE IF NOT EXISTS refresh_tokens(
id TEXT PRIMARY KEY,
user_id TEXT NOT NULL,
token_hash TEXT NOT NULL,
expires_at INTEGER NOT NULL,
created_at INTEGER NOT NULL,
revoked INTEGER NOT NULL DEFAULT 0,
device_info TEXT,
FOREIGN KEY(user_id) REFERENCES users(id)
)`)
if err != nil {
return err
}
_, err = DB.Exec(`CREATE INDEX IF NOT EXISTS idx_refresh_token_hash ON refresh_tokens(token_hash)`)
if err != nil {
return err
}
//Create Expenses-Table //Create Expenses-Table
_, err = DB.Exec(`CREATE TABLE IF NOT EXISTS expenses( _, err = DB.Exec(`CREATE TABLE IF NOT EXISTS expenses(
id TEXT PRIMARY KEY id TEXT PRIMARY KEY,
payer_id TEXT NOT NULL,
amount_cents INTEGER NOT NULL,
title TEXT NOT NULL,
description TEXT,
attachments TEXT,
created_at INTEGER NOT NULL,
last_updated_at INTEGER NOT NULL,
FOREIGN KEY(payer_id) REFERENCES users(id)
)`) )`)
if err != nil {
return err
}
_, err = DB.Exec(`CREATE TABLE IF NOT EXISTS expense_shares(
id TEXT PRIMARY KEY,
expense_id TEXT NOT NULL,
user_id TEXT NOT NULL,
share_cents INTEGER NOT NULL,
FOREIGN KEY(user_id) REFERENCES users(id)
)`)
if err != nil {
return err
}
_, err = DB.Exec(`CREATE INDEX IF NOT EXISTS idx_shares_expense ON expense_shares(expense_id)`)
if err != nil {
return err
}
_, err = DB.Exec(`CREATE INDEX IF NOT EXISTS idx_shares_user ON expense_shares(user_id)`)
return err return err
} }
func AddUser(user models.User) error { // Expenses
_, err := DB.Exec("INSERT INTO users(id, username, password) VALUES (?, ?, ?)", user.ID, user.Username, user.Password) func AddExpense(expense *models.Expense) error {
var attachmentsData interface{}
if len(expense.Attachments) > 0 {
jsonBytes, err := json.Marshal(expense.Attachments)
if err != nil {
return err
}
attachmentsData = string(jsonBytes)
} else {
attachmentsData = nil
}
_, err := DB.Exec(`INSERT INTO expenses(id, payer_id, amount_cents, title, description, attachments, created_at, last_updated_at) VALUES (?, ?, ?, ?, ?, ?, ?, ?)`,
expense.ID,
expense.PayerID,
expense.Amount,
expense.Title,
expense.Description,
attachmentsData,
expense.CreatedAt,
expense.LastUpdatedAt)
return err return err
} }
func UpdateExpense(expense *models.Expense) error {
return nil
}
func DeleteExpense(expense *models.Expense) error {
return nil
}
// func GetExpenseById(id string) (models.Expense, error) {
// return nil, nil
// }
func GetExpensesByUserId(userId string) ([]models.Expense, error) {
return nil, nil
}
func GetAllExpenses() ([]models.Expense, error) {
query := "SELECT * FROM expenses"
rows, err := DB.Query(query)
if err != nil {
return nil, err
}
defer rows.Close()
var expenses []models.Expense
for rows.Next() {
var expense models.Expense
var attachmentsJSON []byte
err := rows.Scan(&expense.ID, &expense.PayerID, &expense.Amount, &expense.Title, &expense.Description, &attachmentsJSON, &expense.CreatedAt, &expense.LastUpdatedAt)
if err != nil {
return nil, err
}
if len(attachmentsJSON) > 0 {
err := json.Unmarshal(attachmentsJSON, &expense.Attachments)
if err != nil {
return nil, err
}
}
expenses = append(expenses, expense)
}
if err = rows.Err(); err != nil {
return nil, err
}
return expenses, nil
}
// Expense Shares
func AddShare(share *models.ExpenseShare) error {
_, err := DB.Exec("INSERT INTO expense_shares(id, expense_id, user_id, share_cents) VALUES (?, ?, ?, ?)",
share.ID,
share.ExpenseID,
share.UserID,
share.ShareCents)
return err
}
func GetShareById(id string) (models.ExpenseShare, error) {
row := DB.QueryRow("SELECT * FROM expense_shares WHERE id = ?", id)
var share models.ExpenseShare
err := row.Scan(&share.ID, &share.ExpenseID, &share.UserID, &share.ShareCents)
return share, err
}
func GetSharesByExpenseId(id string) ([]models.ExpenseShare, error) {
query := "SELECT * FROM expense_shares WHERE expense_id = ?"
rows, err := DB.Query(query, id)
if err != nil {
return nil, err
}
defer rows.Close()
var shares []models.ExpenseShare
for rows.Next() {
var share models.ExpenseShare
err := rows.Scan(&share.ID, &share.ExpenseID, &share.UserID, &share.ShareCents)
if err != nil {
return nil, err
}
shares = append(shares, share)
}
if err = rows.Err(); err != nil {
return nil, err
}
return shares, nil
}
// Balances
func ComputeBalance(userId string) (float64, error) {
var balance float64
query := `
SELECT
COALESCE(p.paid, 0) - COALESCE(s.shared, 0) AS balance
FROM (SELECT ? AS id) u
LEFT JOIN (
SELECT payer_id, SUM(amount_cents) AS paid
FROM expenses
WHERE payer_id = ?
GROUP BY payer_id
) p ON u.id = p.payer_id
LEFT JOIN (
SELECT user_id, SUM(share_cents) AS shared
FROM expense_shares
WHERE user_id = ?
GROUP BY user_id
) s ON u.id = s.user_id`
err := DB.QueryRow(query, userId, userId, userId).Scan(&balance)
if err != nil {
return 0, err
}
return balance, nil
}
func ComputeWGBalance() (float64, error) {
var balance float64
query := `SELECT u.id AS user_id,
COALESCE(p.paid_cents,0) - COALESCE(s.share_cents,0) AS balance_cents
FROM users u
LEFT JOIN (
SELECT payer_id, SUM(amount_cents) AS paid_cents
FROM expenses
GROUP BY payer_id
) p ON u.id = p.payer_id
LEFT JOIN (
SELECT es.user_id, SUM(es.share_cents) AS share_cents
FROM expense_shares es
JOIN expenses e ON es.expense_id = e.id
GROUP BY es.user_id
) s ON u.id = s.user_id)`
err := DB.QueryRow(query).Scan(&balance)
if err != nil {
return 0, err
}
return balance, nil
}
// Users
func AddUser(user *models.User) error {
_, err := DB.Exec("INSERT INTO users(id, username, password, role) VALUES (?, ?, ?, ?)", user.ID, strings.ToLower(user.Username), user.Password, user.Role)
return err
}
func GetUserByUsername(username string) (models.User, error) { func GetUserByUsername(username string) (models.User, error) {
row := DB.QueryRow("SELECT * FROM users WHERE username = ?", username) row := DB.QueryRow("SELECT * FROM users WHERE username = ?", strings.ToLower(username))
var user models.User var user models.User
err := row.Scan(&user.ID, &user.Username, &user.Password) err := row.Scan(&user.ID, &user.Username, &user.Password, &user.Role)
return user, err return user, err
} }
func GetUserById(id string) (models.User, error) { func GetUserById(id string) (models.User, error) {
row := DB.QueryRow("SELECT * FROM users WHERE id = ?", id) row := DB.QueryRow("SELECT * FROM users WHERE id = ?", id)
var user models.User var user models.User
err := row.Scan(&user.ID, &user.Username, &user.Password) err := row.Scan(&user.ID, &user.Username, &user.Password, &user.Role)
return user, err return user, err
} }
// Refresh Tokens
func AddRefreshToken(token *models.RefreshToken) error {
_, err := DB.Exec("INSERT INTO refresh_tokens(id, user_id, token_hash, expires_at, created_at, revoked, device_info) VALUES (?, ?, ?, ?, ?, ?, ?)",
token.ID, token.UserID, token.Token, token.ExpiresAt, token.CreatedAt, token.Revoked, token.DeviceInfo)
return err
}
func GetRefreshToken(token string) (models.RefreshToken, error) {
row := DB.QueryRow("SELECT * FROM refresh_tokens WHERE token_hash = ?", token)
var refresh_token models.RefreshToken
err := row.Scan(&refresh_token.ID, &refresh_token.UserID, &refresh_token.Token, &refresh_token.ExpiresAt, &refresh_token.CreatedAt, &refresh_token.Revoked, &refresh_token.DeviceInfo)
return refresh_token, err
}
func RevokeRefreshToken(tokenID string) error {
if DB == nil {
return errors.New("db not initialized")
}
res, err := DB.Exec(`
UPDATE refresh_tokens
SET revoked = 1
WHERE id = ?
`, tokenID)
if err != nil {
return err
}
n, err := res.RowsAffected()
if err != nil {
return err
}
if n == 0 {
return ErrNotFound
}
return nil
}
func RevokeAllRefreshTokensForUser(userID string) error {
if DB == nil {
return errors.New("db not initialized")
}
_, err := DB.Exec(`
UPDATE refresh_tokens
SET revoked = 1
WHERE user_id = ?
`, userID)
return err
}

View File

@@ -2,7 +2,11 @@ package utils
import ( import (
"crypto/rand" "crypto/rand"
"crypto/sha256"
"encoding/base64" "encoding/base64"
"encoding/hex"
"net/http"
"shap-planner-backend/auth"
"github.com/google/uuid" "github.com/google/uuid"
) )
@@ -18,3 +22,28 @@ func GenerateSecret() string {
} }
return base64.StdEncoding.EncodeToString(b) return base64.StdEncoding.EncodeToString(b)
} }
func GenerateRefreshToken() (string, error) {
b := make([]byte, 32)
if _, err := rand.Read(b); err != nil {
return "", err
}
return base64.RawURLEncoding.EncodeToString(b), nil
}
func HashToken(token string) string {
hash := sha256.Sum256([]byte(token))
return hex.EncodeToString(hash[:])
}
func IsLoggedIn(w http.ResponseWriter, r *http.Request) (*auth.Claims, bool) {
claimsRaw := r.Context().Value(auth.UserContextKey)
if claimsRaw == nil {
http.Error(w, "No claims in context", http.StatusUnauthorized)
return nil, false
}
claims, ok := claimsRaw.(*auth.Claims)
if !ok {
http.Error(w, "Invalid claims", http.StatusUnauthorized)
return nil, false
}
return claims, true
}