2019-12-20 23:12:05 +00:00
|
|
|
// Initialize project
|
|
|
|
const express = require('express');
|
|
|
|
const Sequelize = require('sequelize');
|
2019-12-20 23:00:10 +00:00
|
|
|
const Op = Sequelize.Op
|
2019-12-20 23:12:05 +00:00
|
|
|
const app = express();
|
2019-12-20 21:36:14 +00:00
|
|
|
|
2019-12-20 23:12:05 +00:00
|
|
|
// Setup database, using credentials set in .env
|
2019-12-20 21:36:14 +00:00
|
|
|
var sequelize = new Sequelize('database', process.env.DB_USER, process.env.DB_PASS, {
|
|
|
|
dialect: 'sqlite',
|
|
|
|
storage: '.data/database.sqlite'
|
|
|
|
});
|
|
|
|
var Readings;
|
|
|
|
|
2019-12-20 23:12:05 +00:00
|
|
|
// Authenticate with the database
|
2019-12-20 21:36:14 +00:00
|
|
|
sequelize.authenticate()
|
|
|
|
.then(function(err) {
|
|
|
|
console.log('Connection has been established successfully.');
|
2019-12-20 22:24:04 +00:00
|
|
|
|
2019-12-20 23:12:05 +00:00
|
|
|
// Define 'readings' table structure
|
2019-12-20 21:36:14 +00:00
|
|
|
Readings = sequelize.define('readings', {
|
|
|
|
timestamp: {
|
|
|
|
type: Sequelize.DATE
|
|
|
|
},
|
|
|
|
reading: {
|
|
|
|
type: Sequelize.INTEGER
|
|
|
|
}
|
|
|
|
});
|
2020-01-04 19:19:04 +00:00
|
|
|
|
2019-12-20 23:12:05 +00:00
|
|
|
// Read data
|
2019-12-20 22:00:14 +00:00
|
|
|
Readings.sync();
|
2019-12-20 21:36:14 +00:00
|
|
|
})
|
|
|
|
.catch(function (err) {
|
|
|
|
console.log('Unable to connect to the database: ', err);
|
|
|
|
});
|
|
|
|
|
2019-12-20 23:12:05 +00:00
|
|
|
// Handle requests for the root page by serving the static index.html from the views folder
|
2019-12-20 22:00:14 +00:00
|
|
|
app.get("/", function(req, res) {
|
|
|
|
res.sendFile(__dirname + "/views/index.html");
|
2018-03-13 20:25:39 +00:00
|
|
|
});
|
|
|
|
|
2019-12-20 23:12:05 +00:00
|
|
|
// Handle requests to /newreading by posting a new reading to the database
|
2019-12-20 22:00:14 +00:00
|
|
|
app.get('/newreading', (req, res) => {
|
|
|
|
// Filter out requests that don't include the secret key, or don't contain the required data
|
|
|
|
if (req.query.s != process.env.SECRET || !RegExp('^\\d*$').test(req.query.v)) return res.status(400).send('Bad Request').end();
|
2020-01-04 19:19:04 +00:00
|
|
|
|
2019-12-20 22:00:14 +00:00
|
|
|
Readings.create({ timestamp: new Date(), reading: req.query.v });
|
|
|
|
res.status(200).send('Reading received: ' + req.query.v).end();
|
2019-12-16 19:05:18 +00:00
|
|
|
});
|
|
|
|
|
2019-12-20 22:24:04 +00:00
|
|
|
// Handle requests for /getdata by returning a JSON object of data for the relevant time period
|
|
|
|
app.get('/getdata', (req, res) => {
|
|
|
|
const iso8601 = /^([\+-]?\d{4}(?!\d{2}\b))((-?)((0[1-9]|1[0-2])(\3([12]\d|0[1-9]|3[01]))?|W([0-4]\d|5[0-2])(-?[1-7])?|(00[1-9]|0[1-9]\d|[12]\d{2}|3([0-5]\d|6[1-6])))([T\s]((([01]\d|2[0-3])((:?)[0-5]\d)?|24\:?00)([\.,]\d+(?!:))?)?(\17[0-5]\d([\.,]\d+)?)?([zZ]|([\+-])([01]\d|2[0-3]):?([0-5]\d)?)?)?)?$/
|
|
|
|
|
|
|
|
if (!req.query.from || !req.query.to || !RegExp(iso8601).test(req.query.from) || !RegExp(iso8601).test(req.query.to)) {
|
|
|
|
res.status(400).send('Bad Request').end();
|
|
|
|
return;
|
|
|
|
}
|
2020-01-04 19:19:04 +00:00
|
|
|
|
2019-12-20 23:00:10 +00:00
|
|
|
Readings.findAll({
|
|
|
|
attributes: ['timestamp', 'reading'],
|
|
|
|
where: {
|
|
|
|
timestamp: {
|
|
|
|
[Op.between]: [new Date(req.query.from), new Date(req.query.to)]
|
|
|
|
}
|
|
|
|
},
|
|
|
|
order: [
|
|
|
|
['timestamp', 'DESC']
|
|
|
|
]
|
|
|
|
}).then((result) => {
|
|
|
|
res.status(200).send(result).end();
|
|
|
|
})
|
|
|
|
});
|
2019-12-20 22:24:04 +00:00
|
|
|
|
2020-04-10 17:51:31 +00:00
|
|
|
// Export all data for development
|
|
|
|
app.get('/exportall', (req, res) => {
|
|
|
|
// Check that the expected key has been included with the web request
|
|
|
|
if (!req.headers['export-key'] || req.headers['export-key'] != process.env.SECRET) {
|
|
|
|
return res.status(401).send('Authorization header not found').end();
|
|
|
|
}
|
2020-04-11 18:10:24 +00:00
|
|
|
|
2020-04-10 17:51:31 +00:00
|
|
|
Readings.findAll().then((result) => {
|
|
|
|
res.status(200).send(result).end();
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2019-12-20 23:12:05 +00:00
|
|
|
// Handle requests to /cleanup by deleting any data older than 90 days from the datastore
|
|
|
|
app.get('/cleanup', (req, res) => {
|
2020-01-04 19:19:04 +00:00
|
|
|
if (!req.headers['cleanup-key'] || req.headers['cleanup-key'] != process.env.SECRET) {
|
|
|
|
return res.status(401).send('Authorization header not found').end();
|
|
|
|
}
|
|
|
|
|
2019-12-20 23:12:05 +00:00
|
|
|
var before = new Date();
|
|
|
|
before.setDate(before.getDate()-91);
|
|
|
|
before.setHours(0);
|
|
|
|
before.setMinutes(0);
|
|
|
|
before.setSeconds(0);
|
2020-01-04 19:19:04 +00:00
|
|
|
|
2019-12-20 23:12:05 +00:00
|
|
|
Readings.destroy({
|
2019-12-20 23:00:10 +00:00
|
|
|
where: {
|
|
|
|
timestamp: {
|
2019-12-20 23:12:05 +00:00
|
|
|
[Op.lt]: before
|
2019-12-20 23:00:10 +00:00
|
|
|
}
|
2019-12-20 23:12:05 +00:00
|
|
|
}
|
2019-12-20 23:24:05 +00:00
|
|
|
}).then((numRows) => {
|
|
|
|
res.status(200).send('Deleted rows: ' + numRows).end();
|
2019-12-20 23:12:05 +00:00
|
|
|
});
|
|
|
|
});
|
2019-12-20 22:24:04 +00:00
|
|
|
|
|
|
|
|
2018-03-13 20:25:39 +00:00
|
|
|
// listen for requests :)
|
2020-04-11 18:10:24 +00:00
|
|
|
const listener = app.listen(process.env.PORT || 4200, function() {
|
2019-09-30 21:05:06 +00:00
|
|
|
console.log("Your app is listening on port " + listener.address().port);
|
2020-01-04 19:19:04 +00:00
|
|
|
});
|