Compare commits
6 Commits
v0.1.0-alp
...
2a1da08216
| Author | SHA1 | Date | |
|---|---|---|---|
|
2a1da08216
|
|||
|
ddf06554f8
|
|||
|
54a8292234
|
|||
|
6a974cbbf1
|
|||
|
d5642ccadf
|
|||
|
1f54f60d46
|
33
README.md
33
README.md
@@ -11,6 +11,35 @@ The app is fully open source, lightweight, and can run on small devices like Ras
|
|||||||
|
|
||||||
## Installation
|
## Installation
|
||||||
|
|
||||||
|
### Docker Compose (recommended)
|
||||||
|
1. Download docker-compose.yaml
|
||||||
|
````shell
|
||||||
|
$ curl -L https://git.miaurizius.de/MiauRizius/shap-planner-backend/raw/branch/main/docker-compose.yaml -o docker-compose.yaml
|
||||||
|
````
|
||||||
|
or create it yourself and enter the following content
|
||||||
|
````yaml
|
||||||
|
services:
|
||||||
|
shap-planner:
|
||||||
|
image: git.miaurizius.de/miaurizius/shap-planner-backend:latest
|
||||||
|
container_name: shap-planner
|
||||||
|
restart: unless-stopped
|
||||||
|
ports:
|
||||||
|
- "8080:8080"
|
||||||
|
environment:
|
||||||
|
- SHAP_JWT_SECRET=SECURE_RANDOM_STRING # Must be at least 32 characters long
|
||||||
|
volumes:
|
||||||
|
- ./appdata:/appdata # To edit your configuration files
|
||||||
|
````
|
||||||
|
|
||||||
|
2. Start the container
|
||||||
|
````shell
|
||||||
|
$ docker compose up -d
|
||||||
|
````
|
||||||
|
|
||||||
|
3. Edit configuration as you like
|
||||||
|
|
||||||
|
### Build from source
|
||||||
|
|
||||||
1. Clone the repository:
|
1. Clone the repository:
|
||||||
```bash
|
```bash
|
||||||
git clone https://git.miaurizius.de/MiauRizius/shap-planner-backend.git
|
git clone https://git.miaurizius.de/MiauRizius/shap-planner-backend.git
|
||||||
@@ -33,8 +62,8 @@ go run main.go
|
|||||||
### Environment Variables
|
### Environment Variables
|
||||||
|
|
||||||
| Variable | Description | Example |
|
| Variable | Description | Example |
|
||||||
|----------------|-------------------------------------------------------|----------------|
|
|-------------------|-------------------------------------------------------|----------------|
|
||||||
| `SHAP-JWT_SECRET` | Secret used to sign JWT tokens | `superrandomsecret123` |
|
| `SHAP_JWT_SECRET` | Secret used to sign JWT tokens | `superrandomsecret123` |
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
11
docker-compose.yaml
Normal file
11
docker-compose.yaml
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
services:
|
||||||
|
shap-planner:
|
||||||
|
image: git.miaurizius.de/miaurizius/shap-planner-backend:latest
|
||||||
|
container_name: shap-planner
|
||||||
|
restart: unless-stopped
|
||||||
|
ports:
|
||||||
|
- "8080:8080"
|
||||||
|
environment:
|
||||||
|
- SHAP_JWT_SECRET=SECURE_RANDOM_STRING # Must be at least 32 characters long
|
||||||
|
volumes:
|
||||||
|
- ./appdata:/appdata # To edit your configuration files
|
||||||
@@ -18,17 +18,20 @@ var cfg, _ = config.LoadConfig()
|
|||||||
func Register(w http.ResponseWriter, r *http.Request) {
|
func Register(w http.ResponseWriter, r *http.Request) {
|
||||||
var user models.User
|
var user models.User
|
||||||
if err := json.NewDecoder(r.Body).Decode(&user); err != nil {
|
if err := json.NewDecoder(r.Body).Decode(&user); err != nil {
|
||||||
|
log.Println("[api/register] " + r.RemoteAddr + ": " + err.Error())
|
||||||
http.Error(w, "Invalid request body", http.StatusBadRequest)
|
http.Error(w, "Invalid request body", http.StatusBadRequest)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
if user.Username == "" || user.Password == "" {
|
if user.Username == "" || user.Password == "" {
|
||||||
|
log.Println("[api/register] " + r.RemoteAddr + ": Username or Password is empty")
|
||||||
http.Error(w, "username and password required", http.StatusBadRequest)
|
http.Error(w, "username and password required", http.StatusBadRequest)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
hashed, err := auth.HashPassword(user.Password)
|
hashed, err := auth.HashPassword(user.Password)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
log.Println("[api/register] " + r.RemoteAddr + ": " + err.Error())
|
||||||
http.Error(w, "internal error", http.StatusInternalServerError)
|
http.Error(w, "internal error", http.StatusInternalServerError)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
@@ -36,12 +39,14 @@ func Register(w http.ResponseWriter, r *http.Request) {
|
|||||||
user.ID = utils.GenerateUUID()
|
user.ID = utils.GenerateUUID()
|
||||||
user.Role = "user"
|
user.Role = "user"
|
||||||
|
|
||||||
if err := storage.AddUser(user); err != nil {
|
if err := storage.AddUser(&user); err != nil {
|
||||||
|
log.Println("[api/register] " + r.RemoteAddr + ": " + err.Error())
|
||||||
http.Error(w, "user already exists", http.StatusBadRequest)
|
http.Error(w, "user already exists", http.StatusBadRequest)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
w.WriteHeader(http.StatusCreated)
|
w.WriteHeader(http.StatusCreated)
|
||||||
|
log.Println("[api/register] " + r.RemoteAddr + ": Successfully created user")
|
||||||
}
|
}
|
||||||
func Login(w http.ResponseWriter, r *http.Request) {
|
func Login(w http.ResponseWriter, r *http.Request) {
|
||||||
var creds struct {
|
var creds struct {
|
||||||
@@ -49,36 +54,41 @@ func Login(w http.ResponseWriter, r *http.Request) {
|
|||||||
Password string `json:"password"`
|
Password string `json:"password"`
|
||||||
}
|
}
|
||||||
if err := json.NewDecoder(r.Body).Decode(&creds); err != nil {
|
if err := json.NewDecoder(r.Body).Decode(&creds); err != nil {
|
||||||
|
log.Println("[api/login] " + r.RemoteAddr + ": " + err.Error())
|
||||||
http.Error(w, "Invalid request", http.StatusBadRequest)
|
http.Error(w, "Invalid request", http.StatusBadRequest)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
user, err := storage.GetUserByUsername(creds.Username)
|
user, err := storage.GetUserByUsername(creds.Username)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
log.Println("[api/login] " + r.RemoteAddr + ": " + err.Error())
|
||||||
http.Error(w, "Invalid credentials", http.StatusUnauthorized)
|
http.Error(w, "Invalid credentials", http.StatusUnauthorized)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
if !auth.CheckPasswordHash(creds.Password, user.Password) {
|
if !auth.CheckPasswordHash(creds.Password, user.Password) {
|
||||||
println("invalid password")
|
log.Println("[api/login] " + r.RemoteAddr + ": Invalid credentials")
|
||||||
http.Error(w, "Invalid credentials", http.StatusUnauthorized)
|
http.Error(w, "Invalid credentials", http.StatusUnauthorized)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
secret := []byte(os.Getenv("SHAP_JWT_SECRET"))
|
secret := []byte(os.Getenv("SHAP_JWT_SECRET"))
|
||||||
if len(secret) == 0 {
|
if len(secret) == 0 {
|
||||||
|
log.Println("[api/login] " + r.RemoteAddr + ": Server misconfiguration")
|
||||||
http.Error(w, "Server misconfiguration", http.StatusInternalServerError)
|
http.Error(w, "Server misconfiguration", http.StatusInternalServerError)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
accessToken, err := auth.GenerateJWT(user.ID, user.Role, secret)
|
accessToken, err := auth.GenerateJWT(user.ID, user.Role, secret)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
log.Println("[api/login] " + r.RemoteAddr + ": " + err.Error())
|
||||||
http.Error(w, "Could not generate token", http.StatusInternalServerError)
|
http.Error(w, "Could not generate token", http.StatusInternalServerError)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
refreshTokenPlain, err := utils.GenerateRefreshToken()
|
refreshTokenPlain, err := utils.GenerateRefreshToken()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
log.Println("[api/login] " + r.RemoteAddr + ": " + err.Error())
|
||||||
http.Error(w, "could not generate refresh token", http.StatusInternalServerError)
|
http.Error(w, "could not generate refresh token", http.StatusInternalServerError)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
@@ -88,7 +98,7 @@ func Login(w http.ResponseWriter, r *http.Request) {
|
|||||||
|
|
||||||
deviceInfo := r.Header.Get("User-Agent")
|
deviceInfo := r.Header.Get("User-Agent")
|
||||||
|
|
||||||
if err := storage.AddRefreshToken(models.RefreshToken{
|
if err := storage.AddRefreshToken(&models.RefreshToken{
|
||||||
ID: refreshID,
|
ID: refreshID,
|
||||||
UserID: user.ID,
|
UserID: user.ID,
|
||||||
Token: refreshHash,
|
Token: refreshHash,
|
||||||
@@ -97,6 +107,7 @@ func Login(w http.ResponseWriter, r *http.Request) {
|
|||||||
CreatedAt: time.Now().Unix(),
|
CreatedAt: time.Now().Unix(),
|
||||||
Revoked: false,
|
Revoked: false,
|
||||||
}); err != nil {
|
}); err != nil {
|
||||||
|
log.Println("[api/login] " + r.RemoteAddr + ": " + err.Error())
|
||||||
http.Error(w, "could not save refresh token", http.StatusInternalServerError)
|
http.Error(w, "could not save refresh token", http.StatusInternalServerError)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
@@ -114,38 +125,45 @@ func Login(w http.ResponseWriter, r *http.Request) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
w.Header().Set("Content-Type", "application/json")
|
w.Header().Set("Content-Type", "application/json")
|
||||||
json.NewEncoder(w).Encode(resp)
|
err = json.NewEncoder(w).Encode(resp)
|
||||||
|
if err != nil {
|
||||||
|
log.Println("[api/login] " + r.RemoteAddr + ": " + err.Error())
|
||||||
|
http.Error(w, "Something went wrong", http.StatusInternalServerError)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
log.Println("[api/login] " + r.RemoteAddr + ": Successfully logged in")
|
||||||
}
|
}
|
||||||
func Logout(w http.ResponseWriter, r *http.Request) {
|
func Logout(w http.ResponseWriter, r *http.Request) {
|
||||||
claims := r.Context().Value(auth.UserContextKey).(*auth.Claims)
|
claims := r.Context().Value(auth.UserContextKey).(*auth.Claims)
|
||||||
storage.RevokeAllRefreshTokensForUser(claims.UserID)
|
err := storage.RevokeAllRefreshTokensForUser(claims.UserID)
|
||||||
|
if err != nil {
|
||||||
|
log.Println("[api/logout] " + r.RemoteAddr + ": " + err.Error())
|
||||||
|
http.Error(w, "Internal server error", http.StatusInternalServerError)
|
||||||
|
return
|
||||||
|
}
|
||||||
w.WriteHeader(204)
|
w.WriteHeader(204)
|
||||||
}
|
}
|
||||||
func TestHandler(w http.ResponseWriter, r *http.Request) {
|
func TestHandler(w http.ResponseWriter, r *http.Request) {
|
||||||
claimsRaw := r.Context().Value(auth.UserContextKey)
|
claims, _ := utils.IsLoggedIn(w, r)
|
||||||
if claimsRaw == nil {
|
|
||||||
http.Error(w, "No claims in context", http.StatusUnauthorized)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
claims, ok := claimsRaw.(*auth.Claims)
|
|
||||||
if !ok {
|
|
||||||
http.Error(w, "Invalid claims", http.StatusUnauthorized)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
w.Header().Set("Content-Type", "application/json")
|
w.Header().Set("Content-Type", "application/json")
|
||||||
json.NewEncoder(w).Encode(map[string]interface{}{
|
err := json.NewEncoder(w).Encode(map[string]interface{}{
|
||||||
"user_id": claims.UserID,
|
"user_id": claims.UserID,
|
||||||
"role": claims.Role,
|
"role": claims.Role,
|
||||||
"msg": "access granted to protected endpoint",
|
"msg": "access granted to protected endpoint",
|
||||||
})
|
})
|
||||||
|
if err != nil {
|
||||||
|
log.Println("[api/ping] " + r.RemoteAddr + ": " + err.Error())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
log.Println("[api/login] " + r.RemoteAddr + ": Successfully tested connection")
|
||||||
}
|
}
|
||||||
func RefreshToken(w http.ResponseWriter, r *http.Request) {
|
func RefreshToken(w http.ResponseWriter, r *http.Request) {
|
||||||
var req struct {
|
var req struct {
|
||||||
RefreshToken string `json:"refresh_token"`
|
RefreshToken string `json:"refresh_token"`
|
||||||
}
|
}
|
||||||
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
||||||
|
log.Println("[api/refresh] " + r.RemoteAddr + ": " + err.Error())
|
||||||
http.Error(w, "Invalid request", http.StatusBadRequest)
|
http.Error(w, "Invalid request", http.StatusBadRequest)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
@@ -154,6 +172,7 @@ func RefreshToken(w http.ResponseWriter, r *http.Request) {
|
|||||||
|
|
||||||
tokenRow, err := storage.GetRefreshToken(hashed)
|
tokenRow, err := storage.GetRefreshToken(hashed)
|
||||||
if err != nil || tokenRow.Revoked || tokenRow.ExpiresAt < time.Now().Unix() {
|
if err != nil || tokenRow.Revoked || tokenRow.ExpiresAt < time.Now().Unix() {
|
||||||
|
log.Println("[api/refresh] " + r.RemoteAddr + ": Invalid refresh token")
|
||||||
http.Error(w, "Invalid refresh token", http.StatusUnauthorized)
|
http.Error(w, "Invalid refresh token", http.StatusUnauthorized)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
@@ -167,7 +186,7 @@ func RefreshToken(w http.ResponseWriter, r *http.Request) {
|
|||||||
newExpires := time.Now().Add(7 * 24 * time.Hour).Unix() //7 days
|
newExpires := time.Now().Add(7 * 24 * time.Hour).Unix() //7 days
|
||||||
newID := utils.GenerateUUID()
|
newID := utils.GenerateUUID()
|
||||||
deviceInfo := r.Header.Get("User-Agent")
|
deviceInfo := r.Header.Get("User-Agent")
|
||||||
if err = storage.AddRefreshToken(models.RefreshToken{
|
if err = storage.AddRefreshToken(&models.RefreshToken{
|
||||||
ID: newID,
|
ID: newID,
|
||||||
UserID: tokenRow.UserID,
|
UserID: tokenRow.UserID,
|
||||||
Token: newHash,
|
Token: newHash,
|
||||||
@@ -176,6 +195,8 @@ func RefreshToken(w http.ResponseWriter, r *http.Request) {
|
|||||||
Revoked: false,
|
Revoked: false,
|
||||||
DeviceInfo: deviceInfo,
|
DeviceInfo: deviceInfo,
|
||||||
}); err != nil {
|
}); err != nil {
|
||||||
|
log.Println("[api/refresh] " + r.RemoteAddr + ": " + err.Error())
|
||||||
|
http.Error(w, "Could not generate new refresh token", http.StatusInternalServerError)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -185,6 +206,8 @@ func RefreshToken(w http.ResponseWriter, r *http.Request) {
|
|||||||
"access_token": accessToken,
|
"access_token": accessToken,
|
||||||
"refresh_token": newToken,
|
"refresh_token": newToken,
|
||||||
}); err != nil {
|
}); err != nil {
|
||||||
|
log.Println("[api/refresh] " + r.RemoteAddr + ": " + err.Error())
|
||||||
|
http.Error(w, "Internal server error", http.StatusInternalServerError)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
12
handlers/balance.go
Normal file
12
handlers/balance.go
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
package handlers
|
||||||
|
|
||||||
|
import "net/http"
|
||||||
|
|
||||||
|
func GetBalance(w http.ResponseWriter, r *http.Request) {
|
||||||
|
query := r.URL.Query()
|
||||||
|
userParam := query.Get("user")
|
||||||
|
|
||||||
|
if userParam == "" {
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -1,7 +1,71 @@
|
|||||||
package handlers
|
package handlers
|
||||||
|
|
||||||
import "net/http"
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"net/http"
|
||||||
|
"shap-planner-backend/models"
|
||||||
|
"shap-planner-backend/storage"
|
||||||
|
"shap-planner-backend/utils"
|
||||||
|
)
|
||||||
|
|
||||||
func GetExpenses(w http.ResponseWriter, r *http.Request) {}
|
func Expenses(w http.ResponseWriter, r *http.Request) {
|
||||||
|
claims, _ := utils.IsLoggedIn(w, r)
|
||||||
|
|
||||||
|
switch r.Method {
|
||||||
|
case http.MethodGet: // -> Get Expenses
|
||||||
|
break
|
||||||
|
case http.MethodPost: // -> Create Expense
|
||||||
|
var body struct {
|
||||||
|
Expense models.Expense `json:"expense"`
|
||||||
|
Shares []models.ExpenseShare `json:"shares"`
|
||||||
|
}
|
||||||
|
if err := json.NewDecoder(r.Body).Decode(&body); err != nil {
|
||||||
|
http.Error(w, "Invalid request body", http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if claims.UserID != body.Expense.PayerID { // You cannot create an expense in the name of another user
|
||||||
|
http.Error(w, "Invalid request", http.StatusUnauthorized)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if body.Expense.ID != "" {
|
||||||
|
http.Error(w, "Invalid request", http.StatusUnauthorized)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
body.Expense.ID = utils.GenerateUUID()
|
||||||
|
for _, share := range body.Shares {
|
||||||
|
if share.ID != "" {
|
||||||
|
http.Error(w, "Invalid request", http.StatusUnauthorized)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if share.ExpenseID != "" {
|
||||||
|
http.Error(w, "Invalid request", http.StatusUnauthorized)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
share.ExpenseID = body.Expense.ID
|
||||||
|
share.ID = utils.GenerateUUID()
|
||||||
|
err := storage.AddShare(&share)
|
||||||
|
if err != nil {
|
||||||
|
http.Error(w, "Error adding expense", http.StatusBadRequest) // Should never happen
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
err := storage.AddExpense(&body.Expense)
|
||||||
|
if err != nil {
|
||||||
|
http.Error(w, "Error adding expense", http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
err = json.NewEncoder(w).Encode(map[string]interface{}{
|
||||||
|
"expense": body.Expense,
|
||||||
|
"shares": body.Shares,
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
println(err.Error())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
break
|
||||||
|
case http.MethodPut: // -> Update Expense
|
||||||
|
break
|
||||||
|
case http.MethodDelete: // -> Delete Expense
|
||||||
|
}
|
||||||
|
}
|
||||||
func AdminPanel(w http.ResponseWriter, r *http.Request) {}
|
func AdminPanel(w http.ResponseWriter, r *http.Request) {}
|
||||||
|
|||||||
1
main.go
1
main.go
@@ -12,6 +12,7 @@ func main() {
|
|||||||
err := storage.InitDB(SERVER.DatabasePath)
|
err := storage.InitDB(SERVER.DatabasePath)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Fatal(err)
|
log.Fatal(err)
|
||||||
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
SERVER.Run()
|
SERVER.Run()
|
||||||
|
|||||||
@@ -9,9 +9,18 @@ type User struct {
|
|||||||
|
|
||||||
type Expense struct {
|
type Expense struct {
|
||||||
ID string `json:"id"`
|
ID string `json:"id"`
|
||||||
Amount int `json:"amt"`
|
PayerID string `json:"payer_id"`
|
||||||
Description string `json:"desc"`
|
Amount int64 `json:"amount"`
|
||||||
|
Title string `json:"title"`
|
||||||
Payer User `json:"payer"`
|
Description string `json:"description"`
|
||||||
Debtors []User `json:"debtors"`
|
Attachments []string `json:"attachments"`
|
||||||
|
CreatedAt int64 `json:"created_at"`
|
||||||
|
LastUpdatedAt int64 `json:"last_updated_at"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ExpenseShare struct {
|
||||||
|
ID string `json:"id"`
|
||||||
|
ExpenseID string `json:"expense_id"`
|
||||||
|
UserID string `json:"user_id"`
|
||||||
|
ShareCents int64 `json:"share_cents"`
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -22,19 +22,23 @@ func InitServer() *Server {
|
|||||||
err := config.CheckIfExists()
|
err := config.CheckIfExists()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Fatal(err)
|
log.Fatal(err)
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
cfg, err := config.LoadConfig()
|
cfg, err := config.LoadConfig()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Fatal(err)
|
log.Fatal(err)
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
jwtSecret := os.Getenv("SHAP_JWT_SECRET")
|
jwtSecret := os.Getenv("SHAP_JWT_SECRET")
|
||||||
if jwtSecret == "" {
|
if jwtSecret == "" {
|
||||||
log.Fatal("SHAP_JWT_SECRET environment variable not set.")
|
log.Fatal("SHAP_JWT_SECRET environment variable not set.")
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
if len(jwtSecret) < 32 {
|
if len(jwtSecret) < 32 {
|
||||||
log.Fatal("SHAP_JWT_SECRET must be at least 32 characters long.")
|
log.Fatal("SHAP_JWT_SECRET must be at least 32 characters long.")
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
return &Server{
|
return &Server{
|
||||||
@@ -45,6 +49,7 @@ func InitServer() *Server {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (server *Server) Run() {
|
func (server *Server) Run() {
|
||||||
|
log.Println("Starting server...")
|
||||||
mux := http.NewServeMux()
|
mux := http.NewServeMux()
|
||||||
|
|
||||||
// Public
|
// Public
|
||||||
@@ -54,7 +59,8 @@ func (server *Server) Run() {
|
|||||||
mux.HandleFunc("/api/logout", handlers.Logout)
|
mux.HandleFunc("/api/logout", handlers.Logout)
|
||||||
|
|
||||||
// Login required
|
// Login required
|
||||||
mux.Handle("/api/expenses", auth.AuthMiddleware(server.JWTSecret)(http.HandlerFunc(handlers.GetExpenses)))
|
mux.Handle("/api/expenses", auth.AuthMiddleware(server.JWTSecret)(http.HandlerFunc(handlers.Expenses)))
|
||||||
|
mux.Handle("/api/balance", auth.AuthMiddleware(server.JWTSecret)(http.HandlerFunc(handlers.GetBalance)))
|
||||||
mux.Handle("/api/ping", auth.AuthMiddleware(server.JWTSecret)(http.HandlerFunc(handlers.TestHandler)))
|
mux.Handle("/api/ping", auth.AuthMiddleware(server.JWTSecret)(http.HandlerFunc(handlers.TestHandler)))
|
||||||
|
|
||||||
// Admin-only
|
// Admin-only
|
||||||
|
|||||||
@@ -2,6 +2,7 @@ package storage
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"database/sql"
|
"database/sql"
|
||||||
|
"encoding/json"
|
||||||
"errors"
|
"errors"
|
||||||
"shap-planner-backend/models"
|
"shap-planner-backend/models"
|
||||||
"strings"
|
"strings"
|
||||||
@@ -51,14 +52,89 @@ func InitDB(filepath string) error {
|
|||||||
|
|
||||||
//Create Expenses-Table
|
//Create Expenses-Table
|
||||||
_, err = DB.Exec(`CREATE TABLE IF NOT EXISTS expenses(
|
_, err = DB.Exec(`CREATE TABLE IF NOT EXISTS expenses(
|
||||||
id TEXT PRIMARY KEY
|
id TEXT PRIMARY KEY,
|
||||||
|
payer_id TEXT NOT NULL,
|
||||||
|
amount_cents INTEGER NOT NULL,
|
||||||
|
title TEXT NOT NULL,
|
||||||
|
description TEXT,
|
||||||
|
attachments TEXT,
|
||||||
|
created_at INTEGER NOT NULL,
|
||||||
|
last_updated_at INTEGER NOT NULL,
|
||||||
|
FOREIGN KEY(payer_id) REFERENCES users(id)
|
||||||
)`)
|
)`)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
_, err = DB.Exec(`CREATE TABLE IF NOT EXISTS expense_shares(
|
||||||
|
id TEXT PRIMARY KEY,
|
||||||
|
expense_id TEXT NOT NULL,
|
||||||
|
user_id TEXT NOT NULL,
|
||||||
|
share_cents INTEGER NOT NULL,
|
||||||
|
FOREIGN KEY(user_id) REFERENCES users(id)
|
||||||
|
)`)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
_, err = DB.Exec(`CREATE INDEX IF NOT EXISTS idx_shares_expense ON expense_shares(expense_id)`)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
_, err = DB.Exec(`CREATE INDEX IF NOT EXISTS idx_shares_user ON expense_shares(user_id)`)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Expenses
|
||||||
|
func AddExpense(expense *models.Expense) error {
|
||||||
|
var attachmentsData interface{}
|
||||||
|
if len(expense.Attachments) > 0 {
|
||||||
|
jsonBytes, err := json.Marshal(expense.Attachments)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
attachmentsData = string(jsonBytes)
|
||||||
|
} else {
|
||||||
|
attachmentsData = nil
|
||||||
|
}
|
||||||
|
_, err := DB.Exec(`INSERT INTO expenses(id, payer_id, amount_cents, title, description, attachments, created_at, last_updated_at) VALUES (?, ?, ?, ?, ?, ?, ?, ?)`,
|
||||||
|
expense.ID,
|
||||||
|
expense.PayerID,
|
||||||
|
expense.Amount,
|
||||||
|
expense.Title,
|
||||||
|
expense.Description,
|
||||||
|
attachmentsData,
|
||||||
|
expense.CreatedAt,
|
||||||
|
expense.LastUpdatedAt)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
func UpdateExpense(expense *models.Expense) error {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
func DeleteExpense(expense *models.Expense) error {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// func GetExpenseById(id string) (models.Expense, error) {
|
||||||
|
// return nil, nil
|
||||||
|
// }
|
||||||
|
func GetExpensesByUserId(userId string) ([]models.Expense, error) {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
func GetAllExpenses() ([]models.Expense, error) {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Expense Shares
|
||||||
|
func AddShare(share *models.ExpenseShare) error {
|
||||||
|
_, err := DB.Exec("INSERT INTO expense_shares(id, expense_id, user_id, share_cents) VALUES (?, ?, ?, ?)",
|
||||||
|
share.ID,
|
||||||
|
share.ExpenseID,
|
||||||
|
share.UserID,
|
||||||
|
share.ShareCents)
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
// Users
|
// Users
|
||||||
func AddUser(user models.User) error {
|
func AddUser(user *models.User) error {
|
||||||
_, err := DB.Exec("INSERT INTO users(id, username, password, role) VALUES (?, ?, ?, ?)", user.ID, strings.ToLower(user.Username), user.Password, user.Role)
|
_, err := DB.Exec("INSERT INTO users(id, username, password, role) VALUES (?, ?, ?, ?)", user.ID, strings.ToLower(user.Username), user.Password, user.Role)
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
@@ -76,7 +152,7 @@ func GetUserById(id string) (models.User, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Refresh Tokens
|
// Refresh Tokens
|
||||||
func AddRefreshToken(token models.RefreshToken) error {
|
func AddRefreshToken(token *models.RefreshToken) error {
|
||||||
_, err := DB.Exec("INSERT INTO refresh_tokens(id, user_id, token_hash, expires_at, created_at, revoked, device_info) VALUES (?, ?, ?, ?, ?, ?, ?)",
|
_, err := DB.Exec("INSERT INTO refresh_tokens(id, user_id, token_hash, expires_at, created_at, revoked, device_info) VALUES (?, ?, ?, ?, ?, ?, ?)",
|
||||||
token.ID, token.UserID, token.Token, token.ExpiresAt, token.CreatedAt, token.Revoked, token.DeviceInfo)
|
token.ID, token.UserID, token.Token, token.ExpiresAt, token.CreatedAt, token.Revoked, token.DeviceInfo)
|
||||||
return err
|
return err
|
||||||
|
|||||||
@@ -5,6 +5,8 @@ import (
|
|||||||
"crypto/sha256"
|
"crypto/sha256"
|
||||||
"encoding/base64"
|
"encoding/base64"
|
||||||
"encoding/hex"
|
"encoding/hex"
|
||||||
|
"net/http"
|
||||||
|
"shap-planner-backend/auth"
|
||||||
|
|
||||||
"github.com/google/uuid"
|
"github.com/google/uuid"
|
||||||
)
|
)
|
||||||
@@ -31,3 +33,17 @@ func HashToken(token string) string {
|
|||||||
hash := sha256.Sum256([]byte(token))
|
hash := sha256.Sum256([]byte(token))
|
||||||
return hex.EncodeToString(hash[:])
|
return hex.EncodeToString(hash[:])
|
||||||
}
|
}
|
||||||
|
func IsLoggedIn(w http.ResponseWriter, r *http.Request) (*auth.Claims, bool) {
|
||||||
|
claimsRaw := r.Context().Value(auth.UserContextKey)
|
||||||
|
if claimsRaw == nil {
|
||||||
|
http.Error(w, "No claims in context", http.StatusUnauthorized)
|
||||||
|
return nil, false
|
||||||
|
}
|
||||||
|
|
||||||
|
claims, ok := claimsRaw.(*auth.Claims)
|
||||||
|
if !ok {
|
||||||
|
http.Error(w, "Invalid claims", http.StatusUnauthorized)
|
||||||
|
return nil, false
|
||||||
|
}
|
||||||
|
return claims, true
|
||||||
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user