Go backend with domain-based packages (volunteer, schedule, timeoff, checkin, notification), SQLite storage, JWT auth, and chi router. React TypeScript frontend with routing, auth context, and pages for all core features. Multi-stage Dockerfile and docker-compose included. Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
122 lines
3.2 KiB
Go
122 lines
3.2 KiB
Go
package volunteer
|
|
|
|
import (
|
|
"encoding/json"
|
|
"net/http"
|
|
"strconv"
|
|
|
|
"github.com/go-chi/chi/v5"
|
|
"git.unsupervised.ca/walkies/internal/auth"
|
|
"git.unsupervised.ca/walkies/internal/respond"
|
|
)
|
|
|
|
type Handler struct {
|
|
store *Store
|
|
authSvc *auth.Service
|
|
}
|
|
|
|
func NewHandler(store *Store, authSvc *auth.Service) *Handler {
|
|
return &Handler{store: store, authSvc: authSvc}
|
|
}
|
|
|
|
// POST /api/v1/auth/register
|
|
func (h *Handler) Register(w http.ResponseWriter, r *http.Request) {
|
|
var in CreateInput
|
|
if err := json.NewDecoder(r.Body).Decode(&in); err != nil {
|
|
respond.Error(w, http.StatusBadRequest, "invalid request body")
|
|
return
|
|
}
|
|
if in.Name == "" || in.Email == "" || in.Password == "" {
|
|
respond.Error(w, http.StatusBadRequest, "name, email, and password are required")
|
|
return
|
|
}
|
|
if in.Role == "" {
|
|
in.Role = "volunteer"
|
|
}
|
|
hash, err := auth.HashPassword(in.Password)
|
|
if err != nil {
|
|
respond.Error(w, http.StatusInternalServerError, "could not hash password")
|
|
return
|
|
}
|
|
v, err := h.store.Create(in.Name, in.Email, hash, in.Role)
|
|
if err != nil {
|
|
respond.Error(w, http.StatusConflict, "email already in use")
|
|
return
|
|
}
|
|
respond.JSON(w, http.StatusCreated, v)
|
|
}
|
|
|
|
// POST /api/v1/auth/login
|
|
func (h *Handler) Login(w http.ResponseWriter, r *http.Request) {
|
|
var body struct {
|
|
Email string `json:"email"`
|
|
Password string `json:"password"`
|
|
}
|
|
if err := json.NewDecoder(r.Body).Decode(&body); err != nil {
|
|
respond.Error(w, http.StatusBadRequest, "invalid request body")
|
|
return
|
|
}
|
|
token, err := h.authSvc.Login(body.Email, body.Password)
|
|
if err != nil {
|
|
respond.Error(w, http.StatusUnauthorized, "invalid credentials")
|
|
return
|
|
}
|
|
respond.JSON(w, http.StatusOK, map[string]string{"token": token})
|
|
}
|
|
|
|
// GET /api/v1/volunteers
|
|
func (h *Handler) List(w http.ResponseWriter, r *http.Request) {
|
|
volunteers, err := h.store.List(true)
|
|
if err != nil {
|
|
respond.Error(w, http.StatusInternalServerError, "could not list volunteers")
|
|
return
|
|
}
|
|
if volunteers == nil {
|
|
volunteers = []Volunteer{}
|
|
}
|
|
respond.JSON(w, http.StatusOK, volunteers)
|
|
}
|
|
|
|
// GET /api/v1/volunteers/{id}
|
|
func (h *Handler) Get(w http.ResponseWriter, r *http.Request) {
|
|
id, err := strconv.ParseInt(chi.URLParam(r, "id"), 10, 64)
|
|
if err != nil {
|
|
respond.Error(w, http.StatusBadRequest, "invalid id")
|
|
return
|
|
}
|
|
v, err := h.store.GetByID(id)
|
|
if err != nil {
|
|
respond.Error(w, http.StatusInternalServerError, "could not get volunteer")
|
|
return
|
|
}
|
|
if v == nil {
|
|
respond.Error(w, http.StatusNotFound, "volunteer not found")
|
|
return
|
|
}
|
|
respond.JSON(w, http.StatusOK, v)
|
|
}
|
|
|
|
// PUT /api/v1/volunteers/{id}
|
|
func (h *Handler) Update(w http.ResponseWriter, r *http.Request) {
|
|
id, err := strconv.ParseInt(chi.URLParam(r, "id"), 10, 64)
|
|
if err != nil {
|
|
respond.Error(w, http.StatusBadRequest, "invalid id")
|
|
return
|
|
}
|
|
var in UpdateInput
|
|
if err := json.NewDecoder(r.Body).Decode(&in); err != nil {
|
|
respond.Error(w, http.StatusBadRequest, "invalid request body")
|
|
return
|
|
}
|
|
v, err := h.store.Update(id, in)
|
|
if err != nil {
|
|
respond.Error(w, http.StatusInternalServerError, "could not update volunteer")
|
|
return
|
|
}
|
|
if v == nil {
|
|
respond.Error(w, http.StatusNotFound, "volunteer not found")
|
|
return
|
|
}
|
|
respond.JSON(w, http.StatusOK, v)
|
|
}
|