2019-12-20 23:12:05 +00:00
|
|
|
// Initialize project
|
2020-04-25 20:07:32 +00:00
|
|
|
const db = require('./src/db')
|
2020-04-11 19:00:00 +00:00
|
|
|
const path = require('path')
|
|
|
|
require('dotenv').config({path: path.join(__dirname, '../.env')})
|
2019-12-20 23:12:05 +00:00
|
|
|
const express = require('express');
|
|
|
|
const app = express();
|
2019-12-20 21:36:14 +00:00
|
|
|
|
2019-12-20 23:12:05 +00:00
|
|
|
// Handle requests for the root page by serving the static index.html from the views folder
|
2019-12-20 22:00:14 +00:00
|
|
|
app.get("/", function(req, res) {
|
2020-05-06 02:20:43 +00:00
|
|
|
if (!req.headers['x-real-host'] && req.headers.host.includes('glitch.me')) {
|
|
|
|
return res.redirect('https://www.jasonsplant.ml' + req.url);
|
|
|
|
}
|
|
|
|
|
2019-12-20 22:00:14 +00:00
|
|
|
res.sendFile(__dirname + "/views/index.html");
|
2018-03-13 20:25:39 +00:00
|
|
|
});
|
|
|
|
|
2019-12-20 23:12:05 +00:00
|
|
|
// Handle requests to /newreading by posting a new reading to the database
|
2019-12-20 22:00:14 +00:00
|
|
|
app.get('/newreading', (req, res) => {
|
|
|
|
// Filter out requests that don't include the secret key, or don't contain the required data
|
|
|
|
if (req.query.s != process.env.SECRET || !RegExp('^\\d*$').test(req.query.v)) return res.status(400).send('Bad Request').end();
|
2020-01-04 19:19:04 +00:00
|
|
|
|
2020-04-11 19:07:57 +00:00
|
|
|
db.Readings.create({ timestamp: new Date(), reading: req.query.v });
|
2019-12-20 22:00:14 +00:00
|
|
|
res.status(200).send('Reading received: ' + req.query.v).end();
|
2019-12-16 19:05:18 +00:00
|
|
|
});
|
|
|
|
|
2019-12-20 22:24:04 +00:00
|
|
|
// Handle requests for /getdata by returning a JSON object of data for the relevant time period
|
|
|
|
app.get('/getdata', (req, res) => {
|
|
|
|
const iso8601 = /^([\+-]?\d{4}(?!\d{2}\b))((-?)((0[1-9]|1[0-2])(\3([12]\d|0[1-9]|3[01]))?|W([0-4]\d|5[0-2])(-?[1-7])?|(00[1-9]|0[1-9]\d|[12]\d{2}|3([0-5]\d|6[1-6])))([T\s]((([01]\d|2[0-3])((:?)[0-5]\d)?|24\:?00)([\.,]\d+(?!:))?)?(\17[0-5]\d([\.,]\d+)?)?([zZ]|([\+-])([01]\d|2[0-3]):?([0-5]\d)?)?)?)?$/
|
|
|
|
|
|
|
|
if (!req.query.from || !req.query.to || !RegExp(iso8601).test(req.query.from) || !RegExp(iso8601).test(req.query.to)) {
|
|
|
|
res.status(400).send('Bad Request').end();
|
|
|
|
return;
|
|
|
|
}
|
2020-01-04 19:19:04 +00:00
|
|
|
|
2020-04-11 18:57:35 +00:00
|
|
|
db.Readings.findAll({
|
2019-12-20 23:00:10 +00:00
|
|
|
attributes: ['timestamp', 'reading'],
|
|
|
|
where: {
|
|
|
|
timestamp: {
|
2020-04-11 18:57:35 +00:00
|
|
|
[db.Op.between]: [new Date(req.query.from), new Date(req.query.to)]
|
2019-12-20 23:00:10 +00:00
|
|
|
}
|
|
|
|
},
|
|
|
|
order: [
|
|
|
|
['timestamp', 'DESC']
|
|
|
|
]
|
|
|
|
}).then((result) => {
|
|
|
|
res.status(200).send(result).end();
|
|
|
|
})
|
|
|
|
});
|
2019-12-20 22:24:04 +00:00
|
|
|
|
2020-04-13 17:34:37 +00:00
|
|
|
// Handle requests for /exportall by retrieving all data and returning a JSON object
|
2020-04-10 17:51:31 +00:00
|
|
|
app.get('/exportall', (req, res) => {
|
|
|
|
// Check that the expected key has been included with the web request
|
|
|
|
if (!req.headers['export-key'] || req.headers['export-key'] != process.env.SECRET) {
|
|
|
|
return res.status(401).send('Authorization header not found').end();
|
|
|
|
}
|
2020-04-11 18:10:24 +00:00
|
|
|
|
2020-04-11 19:07:57 +00:00
|
|
|
db.Readings.findAll().then((result) => {
|
2020-04-10 17:51:31 +00:00
|
|
|
res.status(200).send(result).end();
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2020-04-13 17:34:37 +00:00
|
|
|
// Handle requests for /showsettings by retrieving all settings from the database and returning a JSON object
|
|
|
|
app.get('/showsettings', (req, res) => {
|
2020-04-25 21:30:47 +00:00
|
|
|
// Check that the expected key has been included with the web request
|
|
|
|
if (!req.headers['export-key'] || req.headers['export-key'] != process.env.SECRET) {
|
|
|
|
return res.status(401).send('Authorization header not found').end();
|
|
|
|
}
|
|
|
|
|
2020-04-13 17:34:37 +00:00
|
|
|
db.Settings.findAll().then((result) => {
|
|
|
|
res.status(200).send(result).end();
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2019-12-20 23:12:05 +00:00
|
|
|
// Handle requests to /cleanup by deleting any data older than 90 days from the datastore
|
|
|
|
app.get('/cleanup', (req, res) => {
|
2020-01-04 19:19:04 +00:00
|
|
|
if (!req.headers['cleanup-key'] || req.headers['cleanup-key'] != process.env.SECRET) {
|
|
|
|
return res.status(401).send('Authorization header not found').end();
|
|
|
|
}
|
|
|
|
|
2019-12-20 23:12:05 +00:00
|
|
|
var before = new Date();
|
|
|
|
before.setDate(before.getDate()-91);
|
|
|
|
before.setHours(0);
|
|
|
|
before.setMinutes(0);
|
|
|
|
before.setSeconds(0);
|
2020-01-04 19:19:04 +00:00
|
|
|
|
2020-04-11 19:07:57 +00:00
|
|
|
db.Readings.destroy({
|
2019-12-20 23:00:10 +00:00
|
|
|
where: {
|
|
|
|
timestamp: {
|
2020-04-11 18:57:35 +00:00
|
|
|
[db.Op.lt]: before
|
2019-12-20 23:00:10 +00:00
|
|
|
}
|
2019-12-20 23:12:05 +00:00
|
|
|
}
|
2019-12-20 23:24:05 +00:00
|
|
|
}).then((numRows) => {
|
|
|
|
res.status(200).send('Deleted rows: ' + numRows).end();
|
2019-12-20 23:12:05 +00:00
|
|
|
});
|
|
|
|
});
|
2019-12-20 22:24:04 +00:00
|
|
|
|
|
|
|
|
2018-03-13 20:25:39 +00:00
|
|
|
// listen for requests :)
|
2020-04-11 18:10:24 +00:00
|
|
|
const listener = app.listen(process.env.PORT || 4200, function() {
|
2019-09-30 21:05:06 +00:00
|
|
|
console.log("Your app is listening on port " + listener.address().port);
|
2020-01-04 19:19:04 +00:00
|
|
|
});
|