2023-11-08 10:59:15 +00:00
|
|
|
using System.Net;
|
2023-03-08 12:20:33 +00:00
|
|
|
using InnovEnergy.App.Backend.Database;
|
2023-03-15 13:38:06 +00:00
|
|
|
using InnovEnergy.App.Backend.DataTypes;
|
|
|
|
using InnovEnergy.App.Backend.DataTypes.Methods;
|
|
|
|
using InnovEnergy.App.Backend.Relations;
|
2023-11-08 10:59:15 +00:00
|
|
|
using InnovEnergy.App.Backend.Websockets;
|
2023-03-23 13:23:03 +00:00
|
|
|
using InnovEnergy.Lib.Utils;
|
2023-02-16 12:57:06 +00:00
|
|
|
using Microsoft.AspNetCore.Mvc;
|
|
|
|
|
2023-07-05 12:31:53 +00:00
|
|
|
namespace InnovEnergy.App.Backend;
|
2023-02-16 12:57:06 +00:00
|
|
|
|
2023-03-20 09:20:56 +00:00
|
|
|
using Token = String;
|
|
|
|
|
2023-11-08 10:59:15 +00:00
|
|
|
|
2023-07-27 11:23:17 +00:00
|
|
|
[Controller]
|
2023-03-15 13:38:06 +00:00
|
|
|
[Route("api/")]
|
2023-03-20 07:33:44 +00:00
|
|
|
public class Controller : ControllerBase
|
2023-02-16 12:57:06 +00:00
|
|
|
{
|
2023-11-08 10:59:15 +00:00
|
|
|
|
2023-03-20 07:33:44 +00:00
|
|
|
[HttpPost(nameof(Login))]
|
2023-07-06 09:06:55 +00:00
|
|
|
public ActionResult<Session> Login(String username, String? password)
|
2023-02-16 12:57:06 +00:00
|
|
|
{
|
2023-07-06 09:09:16 +00:00
|
|
|
var user = Db.GetUserByEmail(username);
|
2023-04-13 12:30:01 +00:00
|
|
|
|
2023-03-23 11:47:25 +00:00
|
|
|
if (user is null)
|
2023-10-26 12:09:38 +00:00
|
|
|
throw new Exceptions(400, "Null User Exception", "Must provide a user to log in as.", Request.Path.Value!);
|
2023-04-13 12:30:01 +00:00
|
|
|
|
2023-10-26 12:09:38 +00:00
|
|
|
if (!(user.Password.IsNullOrEmpty() && user.MustResetPassword) && !user.VerifyPassword(password))
|
2023-03-23 11:47:25 +00:00
|
|
|
{
|
2023-10-26 12:09:38 +00:00
|
|
|
//return Unauthorized("No Password set");
|
|
|
|
throw new Exceptions(401, "Wrong Password Exception", "Please try again.", Request.Path.Value!);
|
2023-03-23 11:47:25 +00:00
|
|
|
}
|
|
|
|
|
2023-03-30 07:27:18 +00:00
|
|
|
var session = new Session(user.HidePassword().HideParentIfUserHasNoAccessToParent(user));
|
2023-03-23 11:47:25 +00:00
|
|
|
|
|
|
|
//TODO The Frontend should check for the MustResetPassword Flag
|
2023-03-20 09:20:56 +00:00
|
|
|
|
|
|
|
return Db.Create(session)
|
|
|
|
? session
|
2023-04-13 12:30:01 +00:00
|
|
|
: throw new Exceptions(401,"Session Creation Exception", "Not allowed to log in.", Request.Path.Value!);
|
2023-02-16 12:57:06 +00:00
|
|
|
}
|
2023-02-23 10:26:55 +00:00
|
|
|
|
|
|
|
|
2023-03-20 07:33:44 +00:00
|
|
|
[HttpPost(nameof(Logout))]
|
2023-03-20 09:20:56 +00:00
|
|
|
public ActionResult Logout(Token authToken)
|
2023-02-21 08:58:21 +00:00
|
|
|
{
|
2023-03-20 09:20:56 +00:00
|
|
|
var session = Db.GetSession(authToken);
|
2023-02-21 08:58:21 +00:00
|
|
|
|
2023-03-15 13:38:06 +00:00
|
|
|
return session.Logout()
|
2023-03-20 07:33:44 +00:00
|
|
|
? Ok()
|
|
|
|
: Unauthorized();
|
2023-02-21 08:58:21 +00:00
|
|
|
}
|
|
|
|
|
2023-11-15 16:22:42 +00:00
|
|
|
|
|
|
|
|
2023-11-08 10:59:15 +00:00
|
|
|
[HttpGet(nameof(CreateWebSocket))]
|
|
|
|
public async Task CreateWebSocket(Token authToken)
|
|
|
|
{
|
|
|
|
var session = Db.GetSession(authToken)?.User;
|
|
|
|
|
|
|
|
if (session is null)
|
|
|
|
{
|
2023-11-13 16:51:36 +00:00
|
|
|
Console.WriteLine("------------------------------------Unauthorized user----------------------------------------------");
|
2023-11-08 10:59:15 +00:00
|
|
|
HttpContext.Response.StatusCode = (int)HttpStatusCode.Unauthorized;
|
|
|
|
HttpContext.Abort();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!HttpContext.WebSockets.IsWebSocketRequest)
|
|
|
|
{
|
2023-11-13 16:51:36 +00:00
|
|
|
Console.WriteLine("------------------------------------Not a websocket request ----------------------------------------------");
|
2023-11-08 10:59:15 +00:00
|
|
|
HttpContext.Response.StatusCode = (int)HttpStatusCode.Unauthorized;
|
|
|
|
HttpContext.Abort();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
var webSocketContext = await HttpContext.WebSockets.AcceptWebSocketAsync();
|
|
|
|
var webSocket = webSocketContext;
|
|
|
|
|
|
|
|
//Handle the WebSocket connection
|
2023-11-08 11:07:49 +00:00
|
|
|
await WebsocketManager.HandleWebSocketConnection(webSocket);
|
2023-11-08 10:59:15 +00:00
|
|
|
}
|
2023-11-15 16:22:42 +00:00
|
|
|
|
|
|
|
[HttpGet(nameof(GetAllErrorsForInstallation))]
|
|
|
|
public ActionResult<IEnumerable<Error>> GetAllErrorsForInstallation(Int64 id, Token authToken)
|
|
|
|
{
|
|
|
|
var user = Db.GetSession(authToken)?.User;
|
|
|
|
if (user == null)
|
|
|
|
return Unauthorized();
|
|
|
|
|
|
|
|
var installation = Db.GetInstallationById(id);
|
|
|
|
|
|
|
|
if (installation is null || !user.HasAccessTo(installation))
|
|
|
|
return Unauthorized();
|
|
|
|
|
|
|
|
return Db.Errors
|
|
|
|
.Where(error => error.InstallationId == id)
|
2023-11-22 15:49:47 +00:00
|
|
|
.OrderByDescending(error => error.Date)
|
|
|
|
.ThenByDescending(error => error.Time)
|
2023-11-15 16:22:42 +00:00
|
|
|
.ToList();
|
|
|
|
}
|
2023-11-20 16:29:45 +00:00
|
|
|
|
2024-06-11 12:31:08 +00:00
|
|
|
[HttpGet(nameof(GetHistoryForInstallation))]
|
|
|
|
public ActionResult<IEnumerable<UserAction>> GetHistoryForInstallation(Int64 id, Token authToken)
|
|
|
|
{
|
|
|
|
var user = Db.GetSession(authToken)?.User;
|
|
|
|
if (user == null)
|
|
|
|
return Unauthorized();
|
|
|
|
|
|
|
|
var installation = Db.GetInstallationById(id);
|
|
|
|
|
|
|
|
if (installation is null || !user.HasAccessTo(installation))
|
|
|
|
return Unauthorized();
|
|
|
|
|
|
|
|
return Db.UserActions
|
|
|
|
.Where(action =>action.InstallationId == id)
|
|
|
|
.OrderByDescending(action => action.Timestamp)
|
|
|
|
.ToList();
|
|
|
|
}
|
|
|
|
|
2023-11-20 16:29:45 +00:00
|
|
|
[HttpGet(nameof(GetAllWarningsForInstallation))]
|
|
|
|
public ActionResult<IEnumerable<Warning>> GetAllWarningsForInstallation(Int64 id, Token authToken)
|
|
|
|
{
|
|
|
|
var user = Db.GetSession(authToken)?.User;
|
|
|
|
if (user == null)
|
|
|
|
return Unauthorized();
|
|
|
|
|
|
|
|
var installation = Db.GetInstallationById(id);
|
|
|
|
|
|
|
|
if (installation is null || !user.HasAccessTo(installation))
|
|
|
|
return Unauthorized();
|
|
|
|
|
|
|
|
return Db.Warnings
|
|
|
|
.Where(error => error.InstallationId == id)
|
2023-11-22 15:49:47 +00:00
|
|
|
.OrderByDescending(error => error.Date)
|
|
|
|
.ThenByDescending(error => error.Time)
|
2023-11-20 16:29:45 +00:00
|
|
|
.ToList();
|
|
|
|
}
|
2023-03-09 11:50:21 +00:00
|
|
|
|
2024-06-26 15:05:27 +00:00
|
|
|
[HttpGet(nameof(GetCsvTimestampsForInstallation))]
|
|
|
|
public ActionResult<IEnumerable<CsvTimestamp>> GetCsvTimestampsForInstallation(Int64 id, Int32 start, Int32 end, Token authToken)
|
|
|
|
{
|
|
|
|
var user = Db.GetSession(authToken)?.User;
|
|
|
|
if (user == null)
|
|
|
|
return Unauthorized();
|
|
|
|
|
|
|
|
var installation = Db.GetInstallationById(id);
|
|
|
|
|
|
|
|
if (installation is null || !user.HasAccessTo(installation))
|
|
|
|
return Unauthorized();
|
|
|
|
|
|
|
|
var sampleSize = 100;
|
|
|
|
var allTimestamps = new List<CsvTimestamp>();
|
|
|
|
|
|
|
|
if (start != 0 && end != 0)
|
|
|
|
{
|
|
|
|
allTimestamps = Db.CsvTimestamps
|
|
|
|
.Where(csvTimestamp => csvTimestamp.InstallationId == id && csvTimestamp.Timestamp > start && csvTimestamp.Timestamp < end)
|
|
|
|
.OrderBy(csvTimestamp => csvTimestamp.Timestamp).ToList();
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
allTimestamps = Db.CsvTimestamps
|
|
|
|
.Where(csvTimestamp => csvTimestamp.InstallationId == id)
|
|
|
|
.OrderBy(csvTimestamp => csvTimestamp.Timestamp).ToList();
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
int totalRecords = allTimestamps.Count;
|
|
|
|
if (totalRecords <= sampleSize)
|
|
|
|
{
|
|
|
|
// If the total records are less than or equal to the sample size, return all records
|
|
|
|
Console.WriteLine("Start timestamp = "+start +" end timestamp = "+end);
|
|
|
|
Console.WriteLine("SampledTimestamps = " + allTimestamps.Count);
|
|
|
|
return allTimestamps;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
int interval = totalRecords / sampleSize;
|
|
|
|
var sampledTimestamps = new List<CsvTimestamp>();
|
|
|
|
|
|
|
|
for (int i = 0; i < totalRecords; i += interval)
|
|
|
|
{
|
|
|
|
sampledTimestamps.Add(allTimestamps[i]);
|
|
|
|
}
|
|
|
|
|
|
|
|
// If we haven't picked enough records (due to rounding), add the latest record to ensure completeness
|
|
|
|
if (sampledTimestamps.Count < sampleSize)
|
|
|
|
{
|
|
|
|
sampledTimestamps.Add(allTimestamps.Last());
|
|
|
|
}
|
|
|
|
|
|
|
|
Console.WriteLine("Start timestamp = "+start +" end timestamp = "+end);
|
|
|
|
Console.WriteLine("TotalRecords = "+totalRecords + " interval = "+ interval);
|
|
|
|
Console.WriteLine("SampledTimestamps = " + sampledTimestamps.Count);
|
|
|
|
|
|
|
|
return sampledTimestamps;
|
|
|
|
|
|
|
|
// return Db.CsvTimestamps
|
|
|
|
// .Where(csvTimestamp => csvTimestamp.InstallationId == id)
|
|
|
|
// .OrderByDescending(csvTimestamp => csvTimestamp.Timestamp)
|
|
|
|
// .ToList();
|
|
|
|
}
|
|
|
|
|
2023-03-20 07:33:44 +00:00
|
|
|
[HttpGet(nameof(GetUserById))]
|
2023-03-20 09:20:56 +00:00
|
|
|
public ActionResult<User> GetUserById(Int64 id, Token authToken)
|
2023-03-16 10:16:23 +00:00
|
|
|
{
|
2023-03-20 09:20:56 +00:00
|
|
|
var session = Db.GetSession(authToken)?.User;
|
|
|
|
if (session == null)
|
2023-03-20 07:33:44 +00:00
|
|
|
return Unauthorized();
|
2023-03-16 10:16:23 +00:00
|
|
|
|
|
|
|
var user = Db.GetUserById(id);
|
|
|
|
|
2023-03-20 09:20:56 +00:00
|
|
|
if (user is null || !session.HasAccessTo(user))
|
2023-03-20 07:33:44 +00:00
|
|
|
return Unauthorized();
|
2023-03-16 11:49:25 +00:00
|
|
|
|
2023-10-26 12:09:38 +00:00
|
|
|
return user
|
|
|
|
.HidePassword()
|
|
|
|
.HideParentIfUserHasNoAccessToParent(session);
|
2023-03-16 10:16:23 +00:00
|
|
|
}
|
2023-03-15 13:38:06 +00:00
|
|
|
|
2023-03-16 10:16:23 +00:00
|
|
|
|
2023-03-20 07:33:44 +00:00
|
|
|
[HttpGet(nameof(GetInstallationById))]
|
2023-03-20 09:20:56 +00:00
|
|
|
public ActionResult<Installation> GetInstallationById(Int64 id, Token authToken)
|
2023-03-16 10:16:23 +00:00
|
|
|
{
|
2023-03-20 09:20:56 +00:00
|
|
|
var user = Db.GetSession(authToken)?.User;
|
2023-03-16 10:16:23 +00:00
|
|
|
if (user == null)
|
2023-03-20 07:33:44 +00:00
|
|
|
return Unauthorized();
|
2023-03-16 10:16:23 +00:00
|
|
|
|
|
|
|
var installation = Db.GetInstallationById(id);
|
|
|
|
|
|
|
|
if (installation is null || !user.HasAccessTo(installation))
|
2023-03-20 07:33:44 +00:00
|
|
|
return Unauthorized();
|
2023-07-13 07:40:04 +00:00
|
|
|
|
2023-07-05 12:31:53 +00:00
|
|
|
return installation
|
|
|
|
.FillOrderNumbers()
|
2023-07-13 07:40:04 +00:00
|
|
|
.HideParentIfUserHasNoAccessToParent(user)
|
2024-04-02 12:36:43 +00:00
|
|
|
.HideWriteKeyIfUserIsNotAdmin(user.UserType);
|
2023-03-16 10:16:23 +00:00
|
|
|
}
|
2023-03-16 15:13:04 +00:00
|
|
|
|
2023-03-23 07:23:36 +00:00
|
|
|
[HttpGet(nameof(GetUsersWithDirectAccessToInstallation))]
|
|
|
|
public ActionResult<IEnumerable<Object>> GetUsersWithDirectAccessToInstallation(Int64 id, Token authToken)
|
2023-03-16 15:13:04 +00:00
|
|
|
{
|
2023-03-20 09:20:56 +00:00
|
|
|
var user = Db.GetSession(authToken)?.User;
|
2023-03-16 15:13:04 +00:00
|
|
|
if (user == null)
|
2023-03-20 07:33:44 +00:00
|
|
|
return Unauthorized();
|
2023-03-16 15:13:04 +00:00
|
|
|
|
|
|
|
var installation = Db.GetInstallationById(id);
|
|
|
|
|
|
|
|
if (installation is null || !user.HasAccessTo(installation))
|
2023-03-20 07:33:44 +00:00
|
|
|
return Unauthorized();
|
2023-03-09 11:50:21 +00:00
|
|
|
|
2023-03-23 07:23:36 +00:00
|
|
|
return installation
|
2023-10-26 12:09:38 +00:00
|
|
|
.UsersWithDirectAccess()
|
|
|
|
.Where(u => u.IsDescendantOf(user))
|
|
|
|
.Select(u => u.HidePassword())
|
|
|
|
.ToList();
|
2023-03-23 07:23:36 +00:00
|
|
|
}
|
2023-03-16 15:13:04 +00:00
|
|
|
|
2023-03-23 07:23:36 +00:00
|
|
|
[HttpGet(nameof(GetUsersWithInheritedAccessToInstallation))]
|
|
|
|
public ActionResult<IEnumerable<Object>> GetUsersWithInheritedAccessToInstallation(Int64 id, Token authToken)
|
|
|
|
{
|
|
|
|
var user = Db.GetSession(authToken)?.User;
|
|
|
|
if (user == null)
|
|
|
|
return Unauthorized();
|
|
|
|
|
|
|
|
var installation = Db.GetInstallationById(id);
|
|
|
|
|
|
|
|
if (installation is null || !user.HasAccessTo(installation))
|
|
|
|
return Unauthorized();
|
|
|
|
|
|
|
|
return installation
|
2023-10-26 12:09:38 +00:00
|
|
|
.Ancestors()
|
|
|
|
.SelectMany(f => f.UsersWithDirectAccess()
|
|
|
|
.Where(u => u.IsDescendantOf(user))
|
|
|
|
.Select(u => new { folderId = f.Id, folderName = f.Name, user = u.HidePassword() }))
|
|
|
|
.ToList();
|
2023-03-16 15:13:04 +00:00
|
|
|
}
|
2023-03-23 07:23:36 +00:00
|
|
|
|
2023-03-23 07:27:29 +00:00
|
|
|
[HttpGet(nameof(GetUsersWithDirectAccessToFolder))]
|
|
|
|
public ActionResult<IEnumerable<Object>> GetUsersWithDirectAccessToFolder(Int64 id, Token authToken)
|
2023-03-16 15:13:04 +00:00
|
|
|
{
|
2023-03-20 09:20:56 +00:00
|
|
|
var user = Db.GetSession(authToken)?.User;
|
2023-03-16 15:13:04 +00:00
|
|
|
if (user == null)
|
2023-03-20 07:33:44 +00:00
|
|
|
return Unauthorized();
|
2023-03-16 15:13:04 +00:00
|
|
|
|
|
|
|
var folder = Db.GetFolderById(id);
|
|
|
|
|
|
|
|
if (folder is null || !user.HasAccessTo(folder))
|
2023-03-20 07:33:44 +00:00
|
|
|
return Unauthorized();
|
2023-03-16 15:13:04 +00:00
|
|
|
|
|
|
|
return folder
|
2023-03-23 07:27:29 +00:00
|
|
|
.UsersWithDirectAccess()
|
|
|
|
.Where(u => u.IsDescendantOf(user))
|
2023-03-30 07:27:18 +00:00
|
|
|
.Select(u => u.HidePassword())
|
2023-03-23 07:27:29 +00:00
|
|
|
.ToList();
|
|
|
|
}
|
|
|
|
|
|
|
|
[HttpGet(nameof(GetUsersWithInheritedAccessToFolder))]
|
|
|
|
public ActionResult<IEnumerable<Object>> GetUsersWithInheritedAccessToFolder(Int64 id, Token authToken)
|
|
|
|
{
|
|
|
|
var user = Db.GetSession(authToken)?.User;
|
|
|
|
if (user == null)
|
|
|
|
return Unauthorized();
|
|
|
|
|
|
|
|
var folder = Db.GetFolderById(id);
|
|
|
|
|
|
|
|
if (folder is null || !user.HasAccessTo(folder))
|
|
|
|
return Unauthorized();
|
|
|
|
|
|
|
|
return folder
|
|
|
|
.Ancestors()
|
|
|
|
.SelectMany(f => f.UsersWithDirectAccess()
|
|
|
|
.Where(u => u.IsDescendantOf(user))
|
2023-03-23 13:23:03 +00:00
|
|
|
.Select(u => new { folderId = f.Id, folderName = f.Name, user = u.HidePassword() }))
|
2023-03-23 07:27:29 +00:00
|
|
|
.ToList();
|
2023-03-16 15:13:04 +00:00
|
|
|
}
|
2023-02-22 13:46:36 +00:00
|
|
|
|
2023-03-20 07:33:44 +00:00
|
|
|
[HttpGet(nameof(GetFolderById))]
|
2023-03-20 09:20:56 +00:00
|
|
|
public ActionResult<Folder> GetFolderById(Int64 id, Token authToken)
|
2023-03-16 10:16:23 +00:00
|
|
|
{
|
2023-03-20 09:20:56 +00:00
|
|
|
var user = Db.GetSession(authToken)?.User;
|
2023-03-16 10:16:23 +00:00
|
|
|
if (user == null)
|
2023-03-20 07:33:44 +00:00
|
|
|
return Unauthorized();
|
2023-03-16 10:16:23 +00:00
|
|
|
|
|
|
|
var folder = Db.GetFolderById(id);
|
|
|
|
|
|
|
|
if (folder is null || !user.HasAccessTo(folder))
|
2023-03-20 07:33:44 +00:00
|
|
|
return Unauthorized();
|
2023-03-30 07:27:18 +00:00
|
|
|
|
|
|
|
return folder.HideParentIfUserHasNoAccessToParent(user);
|
2023-03-16 10:16:23 +00:00
|
|
|
}
|
2023-02-16 14:08:50 +00:00
|
|
|
|
2023-03-23 14:45:40 +00:00
|
|
|
[HttpGet(nameof(GetAllDirectChildUsers))]
|
|
|
|
public ActionResult<IEnumerable<User>> GetAllDirectChildUsers(Token authToken)
|
2023-03-23 07:23:36 +00:00
|
|
|
{
|
|
|
|
var user = Db.GetSession(authToken)?.User;
|
|
|
|
if (user == null)
|
|
|
|
return Unauthorized();
|
|
|
|
|
2023-03-30 07:27:18 +00:00
|
|
|
return user.ChildUsers().Select(u => u.HidePassword()).ToList();
|
2023-03-23 07:23:36 +00:00
|
|
|
}
|
2023-03-23 14:46:19 +00:00
|
|
|
|
2023-03-23 14:45:40 +00:00
|
|
|
[HttpGet(nameof(GetAllChildUsers))]
|
|
|
|
public ActionResult<IEnumerable<User>> GetAllChildUsers(Token authToken)
|
|
|
|
{
|
|
|
|
var user = Db.GetSession(authToken)?.User;
|
|
|
|
if (user == null)
|
|
|
|
return Unauthorized();
|
|
|
|
|
2023-09-15 11:34:28 +00:00
|
|
|
return user
|
|
|
|
.DescendantUsers()
|
|
|
|
.Select(u => u.HidePassword())
|
|
|
|
.ToList();
|
2023-03-23 14:46:19 +00:00
|
|
|
}
|
|
|
|
|
2023-03-23 14:45:40 +00:00
|
|
|
|
2023-03-20 07:33:44 +00:00
|
|
|
[HttpGet(nameof(GetAllInstallations))]
|
2023-03-20 09:20:56 +00:00
|
|
|
public ActionResult<IEnumerable<Installation>> GetAllInstallations(Token authToken)
|
2023-02-16 12:57:06 +00:00
|
|
|
{
|
2023-03-20 09:20:56 +00:00
|
|
|
var user = Db.GetSession(authToken)?.User;
|
2023-03-20 07:33:44 +00:00
|
|
|
|
|
|
|
if (user is null)
|
|
|
|
return Unauthorized();
|
2023-03-30 07:27:18 +00:00
|
|
|
|
2023-06-30 06:58:50 +00:00
|
|
|
return user
|
2024-04-16 11:57:04 +00:00
|
|
|
.AccessibleInstallations(product:0)
|
2024-04-02 12:36:43 +00:00
|
|
|
.Select(i => i.FillOrderNumbers().HideParentIfUserHasNoAccessToParent(user).HideWriteKeyIfUserIsNotAdmin(user.UserType))
|
2023-06-30 06:58:50 +00:00
|
|
|
.ToList();
|
2023-02-16 12:57:06 +00:00
|
|
|
}
|
|
|
|
|
2024-04-16 11:57:04 +00:00
|
|
|
[HttpGet(nameof(GetAllSalidomoInstallations))]
|
|
|
|
public ActionResult<IEnumerable<Installation>> GetAllSalidomoInstallations(Token authToken)
|
|
|
|
{
|
|
|
|
var user = Db.GetSession(authToken)?.User;
|
|
|
|
|
|
|
|
if (user is null)
|
|
|
|
return Unauthorized();
|
|
|
|
|
|
|
|
return user
|
|
|
|
.AccessibleInstallations(product:1)
|
|
|
|
.ToList();
|
|
|
|
}
|
|
|
|
|
2023-02-24 11:58:47 +00:00
|
|
|
|
2023-03-20 07:33:44 +00:00
|
|
|
|
|
|
|
[HttpGet(nameof(GetAllFolders))]
|
2023-03-20 09:20:56 +00:00
|
|
|
public ActionResult<IEnumerable<Folder>> GetAllFolders(Token authToken)
|
2023-02-16 12:57:06 +00:00
|
|
|
{
|
2023-03-20 09:20:56 +00:00
|
|
|
var user = Db.GetSession(authToken)?.User;
|
2023-03-20 07:33:44 +00:00
|
|
|
|
|
|
|
if (user is null)
|
|
|
|
return Unauthorized();
|
2023-02-24 12:59:56 +00:00
|
|
|
|
2023-03-30 07:27:18 +00:00
|
|
|
return new(user.AccessibleFolders().HideParentIfUserHasNoAccessToParent(user));
|
2023-02-24 12:59:56 +00:00
|
|
|
}
|
2023-03-15 13:38:06 +00:00
|
|
|
|
2023-03-20 07:33:44 +00:00
|
|
|
|
|
|
|
[HttpGet(nameof(GetAllFoldersAndInstallations))]
|
2023-03-21 10:42:49 +00:00
|
|
|
public ActionResult<IEnumerable<Object>> GetAllFoldersAndInstallations(Token authToken)
|
2023-03-08 12:40:34 +00:00
|
|
|
{
|
2023-03-20 09:20:56 +00:00
|
|
|
var user = Db.GetSession(authToken)?.User;
|
2023-06-30 06:58:50 +00:00
|
|
|
|
2023-03-20 07:33:44 +00:00
|
|
|
if (user is null)
|
|
|
|
return Unauthorized();
|
2023-03-21 10:42:49 +00:00
|
|
|
|
|
|
|
var foldersAndInstallations = user
|
2024-04-16 11:57:04 +00:00
|
|
|
.AccessibleFoldersAndInstallations(product:0)
|
2023-03-30 07:27:18 +00:00
|
|
|
.Do(o => o.FillOrderNumbers())
|
|
|
|
.Select(o => o.HideParentIfUserHasNoAccessToParent(user))
|
|
|
|
.OfType<Object>(); // Important! JSON serializer must see Objects otherwise
|
|
|
|
// it will just serialize the members of TreeNode %&@#!!!
|
2023-03-08 12:40:34 +00:00
|
|
|
|
2023-07-13 07:40:04 +00:00
|
|
|
// TODO Filter out write keys
|
2023-03-21 10:42:49 +00:00
|
|
|
return new (foldersAndInstallations);
|
2023-03-08 12:40:34 +00:00
|
|
|
}
|
2023-03-09 15:33:14 +00:00
|
|
|
|
2023-03-15 13:38:06 +00:00
|
|
|
|
2023-03-20 07:33:44 +00:00
|
|
|
[HttpPost(nameof(CreateUser))]
|
2023-10-26 12:09:38 +00:00
|
|
|
public async Task<ActionResult<User>> CreateUser([FromBody] User newUser, Token authToken)
|
2023-03-09 15:33:14 +00:00
|
|
|
{
|
2023-11-27 15:43:42 +00:00
|
|
|
|
2023-10-23 14:25:34 +00:00
|
|
|
var create = Db.GetSession(authToken).Create(newUser);
|
2023-11-27 15:43:42 +00:00
|
|
|
if (create)
|
|
|
|
{
|
|
|
|
var mail_success= await Db.SendNewUserEmail(newUser);
|
|
|
|
if (!mail_success)
|
|
|
|
{
|
|
|
|
Db.GetSession(authToken).Delete(newUser);
|
|
|
|
}
|
|
|
|
|
|
|
|
return mail_success ? newUser.HidePassword():Unauthorized();
|
|
|
|
}
|
2023-10-23 14:35:43 +00:00
|
|
|
|
2023-11-27 15:43:42 +00:00
|
|
|
return Unauthorized() ;
|
2023-03-09 15:33:14 +00:00
|
|
|
}
|
|
|
|
|
2023-03-20 07:33:44 +00:00
|
|
|
[HttpPost(nameof(CreateInstallation))]
|
2023-09-15 11:34:28 +00:00
|
|
|
public async Task<ActionResult<Installation>> CreateInstallation([FromBody] Installation installation, Token authToken)
|
2023-03-09 15:33:14 +00:00
|
|
|
{
|
2024-04-16 11:57:04 +00:00
|
|
|
|
2023-03-30 07:27:18 +00:00
|
|
|
var session = Db.GetSession(authToken);
|
|
|
|
|
|
|
|
if (! await session.Create(installation))
|
2023-03-20 07:33:44 +00:00
|
|
|
return Unauthorized();
|
|
|
|
|
2023-07-27 14:51:57 +00:00
|
|
|
return installation;
|
2023-03-09 15:33:14 +00:00
|
|
|
}
|
|
|
|
|
2023-03-20 07:33:44 +00:00
|
|
|
[HttpPost(nameof(CreateFolder))]
|
2023-09-15 11:34:28 +00:00
|
|
|
public ActionResult<Folder> CreateFolder([FromBody] Folder folder, Token authToken)
|
2023-03-09 15:33:14 +00:00
|
|
|
{
|
2023-03-20 09:20:56 +00:00
|
|
|
var session = Db.GetSession(authToken);
|
2023-03-09 15:33:14 +00:00
|
|
|
|
2023-03-20 07:33:44 +00:00
|
|
|
if (!session.Create(folder))
|
|
|
|
return Unauthorized();
|
|
|
|
|
2023-03-30 07:27:18 +00:00
|
|
|
return folder.HideParentIfUserHasNoAccessToParent(session!.User);
|
2023-03-09 15:33:14 +00:00
|
|
|
}
|
2023-03-16 12:33:51 +00:00
|
|
|
|
2023-03-20 07:33:44 +00:00
|
|
|
[HttpPost(nameof(GrantUserAccessToFolder))]
|
2023-03-20 09:20:56 +00:00
|
|
|
public ActionResult GrantUserAccessToFolder(FolderAccess folderAccess, Token authToken)
|
2023-03-16 12:33:51 +00:00
|
|
|
{
|
2023-03-20 09:20:56 +00:00
|
|
|
var session = Db.GetSession(authToken);
|
2023-03-16 12:33:51 +00:00
|
|
|
|
2023-03-19 16:53:00 +00:00
|
|
|
// TODO: automatic BadRequest when properties are null during deserialization
|
|
|
|
var folder = Db.GetFolderById(folderAccess.FolderId);
|
|
|
|
var user = Db.GetUserById(folderAccess.UserId);
|
|
|
|
|
|
|
|
return session.GrantUserAccessTo(user, folder)
|
2023-03-20 07:33:44 +00:00
|
|
|
? Ok()
|
|
|
|
: Unauthorized();
|
2023-03-16 12:33:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2023-03-20 07:33:44 +00:00
|
|
|
[HttpPost(nameof(RevokeUserAccessToFolder))]
|
2023-03-20 09:20:56 +00:00
|
|
|
public ActionResult RevokeUserAccessToFolder(FolderAccess folderAccess, Token authToken)
|
2023-03-16 12:33:51 +00:00
|
|
|
{
|
2023-03-20 09:20:56 +00:00
|
|
|
var session = Db.GetSession(authToken);
|
2023-03-16 12:33:51 +00:00
|
|
|
|
2023-03-19 16:53:00 +00:00
|
|
|
// TODO: automatic BadRequest when properties are null during deserialization
|
|
|
|
var folder = Db.GetFolderById(folderAccess.FolderId);
|
|
|
|
var user = Db.GetUserById(folderAccess.UserId);
|
|
|
|
|
|
|
|
return session.RevokeUserAccessTo(user, folder)
|
2023-03-20 07:33:44 +00:00
|
|
|
? Ok()
|
|
|
|
: Unauthorized();
|
2023-03-16 12:33:51 +00:00
|
|
|
}
|
|
|
|
|
2023-03-19 16:53:00 +00:00
|
|
|
|
2023-03-20 07:33:44 +00:00
|
|
|
[HttpPost(nameof(GrantUserAccessToInstallation))]
|
2023-03-20 09:20:56 +00:00
|
|
|
public ActionResult GrantUserAccessToInstallation(InstallationAccess installationAccess, Token authToken)
|
2023-03-16 12:33:51 +00:00
|
|
|
{
|
2023-03-20 09:20:56 +00:00
|
|
|
var session = Db.GetSession(authToken);
|
2023-03-19 16:53:00 +00:00
|
|
|
|
|
|
|
// TODO: automatic BadRequest when properties are null during deserialization
|
2023-07-20 11:57:12 +00:00
|
|
|
var installation = Db.GetInstallationById(installationAccess.InstallationId);
|
2023-03-19 16:53:00 +00:00
|
|
|
var user = Db.GetUserById(installationAccess.UserId);
|
2023-03-16 12:33:51 +00:00
|
|
|
|
2023-03-19 16:53:00 +00:00
|
|
|
return session.GrantUserAccessTo(user, installation)
|
2023-10-26 12:09:38 +00:00
|
|
|
? Ok()
|
|
|
|
: Unauthorized();
|
2023-03-16 12:33:51 +00:00
|
|
|
}
|
|
|
|
|
2023-03-20 07:33:44 +00:00
|
|
|
[HttpPost(nameof(RevokeUserAccessToInstallation))]
|
2023-03-20 09:20:56 +00:00
|
|
|
public ActionResult RevokeUserAccessToInstallation(InstallationAccess installationAccess, Token authToken)
|
2023-03-16 12:33:51 +00:00
|
|
|
{
|
2023-03-20 09:20:56 +00:00
|
|
|
var session = Db.GetSession(authToken);
|
2023-03-19 16:53:00 +00:00
|
|
|
|
|
|
|
// TODO: automatic BadRequest when properties are null during deserialization
|
2023-09-15 11:34:28 +00:00
|
|
|
var installation = Db.GetInstallationById(installationAccess.InstallationId);
|
2023-03-19 16:53:00 +00:00
|
|
|
var user = Db.GetUserById(installationAccess.UserId);
|
|
|
|
|
|
|
|
return session.RevokeUserAccessTo(user, installation)
|
2023-03-20 07:33:44 +00:00
|
|
|
? Ok()
|
|
|
|
: Unauthorized();
|
2023-03-16 12:33:51 +00:00
|
|
|
}
|
|
|
|
|
2023-03-19 16:53:00 +00:00
|
|
|
|
|
|
|
|
2023-03-20 07:33:44 +00:00
|
|
|
[HttpPut(nameof(UpdateUser))]
|
2023-09-15 11:34:28 +00:00
|
|
|
public ActionResult<User> UpdateUser([FromBody] User updatedUser, Token authToken)
|
2023-02-16 12:57:06 +00:00
|
|
|
{
|
2023-03-20 09:20:56 +00:00
|
|
|
var session = Db.GetSession(authToken);
|
2023-03-15 13:38:06 +00:00
|
|
|
|
2023-03-20 07:33:44 +00:00
|
|
|
if (!session.Update(updatedUser))
|
|
|
|
return Unauthorized();
|
2023-03-23 13:23:03 +00:00
|
|
|
|
2023-03-30 07:27:18 +00:00
|
|
|
return updatedUser.HidePassword();
|
2023-02-16 12:57:06 +00:00
|
|
|
}
|
|
|
|
|
2023-02-24 11:58:47 +00:00
|
|
|
|
2023-03-23 11:47:25 +00:00
|
|
|
[HttpPut(nameof(UpdatePassword))]
|
|
|
|
public ActionResult<User> UpdatePassword(String newPassword, Token authToken)
|
|
|
|
{
|
|
|
|
var session = Db.GetSession(authToken);
|
|
|
|
|
|
|
|
return session.UpdatePassword(newPassword)
|
|
|
|
? Ok()
|
|
|
|
: Unauthorized();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
2023-03-20 07:33:44 +00:00
|
|
|
[HttpPut(nameof(UpdateInstallation))]
|
2023-09-15 11:34:28 +00:00
|
|
|
public ActionResult<Installation> UpdateInstallation([FromBody] Installation installation, Token authToken)
|
2023-02-16 12:57:06 +00:00
|
|
|
{
|
2023-03-20 09:20:56 +00:00
|
|
|
var session = Db.GetSession(authToken);
|
2023-03-20 07:33:44 +00:00
|
|
|
|
|
|
|
if (!session.Update(installation))
|
|
|
|
return Unauthorized();
|
2024-04-16 11:57:04 +00:00
|
|
|
|
|
|
|
if (installation.Product == 0)
|
|
|
|
{
|
|
|
|
return installation.FillOrderNumbers().HideParentIfUserHasNoAccessToParent(session!.User).HideWriteKeyIfUserIsNotAdmin(session.User.UserType);
|
|
|
|
}
|
2023-02-16 12:57:06 +00:00
|
|
|
|
2024-04-16 11:57:04 +00:00
|
|
|
return installation.HideParentIfUserHasNoAccessToParent(session!.User);
|
2023-02-16 12:57:06 +00:00
|
|
|
}
|
|
|
|
|
2023-11-22 08:35:29 +00:00
|
|
|
[HttpPost(nameof(AcknowledgeError))]
|
|
|
|
public ActionResult AcknowledgeError(Int64 id, Token authToken)
|
|
|
|
{
|
|
|
|
var session = Db.GetSession(authToken);
|
|
|
|
|
|
|
|
if (session == null)
|
|
|
|
return Unauthorized();
|
|
|
|
|
|
|
|
var error=Db.Errors
|
|
|
|
.FirstOrDefault(error => error.Id == id);
|
|
|
|
|
|
|
|
error.Seen = true;
|
|
|
|
|
|
|
|
return Db.Update(error)
|
|
|
|
? Ok()
|
|
|
|
: Unauthorized();
|
|
|
|
}
|
|
|
|
|
|
|
|
[HttpPost(nameof(AcknowledgeWarning))]
|
|
|
|
public ActionResult AcknowledgeWarning(Int64 id, Token authToken)
|
|
|
|
{
|
|
|
|
var session = Db.GetSession(authToken);
|
|
|
|
|
|
|
|
if (session == null)
|
|
|
|
return Unauthorized();
|
|
|
|
|
|
|
|
var warning=Db.Warnings
|
|
|
|
.FirstOrDefault(warning => warning.Id == id);
|
|
|
|
|
|
|
|
warning.Seen = true;
|
|
|
|
|
|
|
|
return Db.Update(warning)
|
|
|
|
? Ok()
|
|
|
|
: Unauthorized();
|
|
|
|
}
|
2023-02-23 10:26:55 +00:00
|
|
|
|
2023-03-20 07:33:44 +00:00
|
|
|
[HttpPut(nameof(UpdateFolder))]
|
2023-09-15 11:34:28 +00:00
|
|
|
public ActionResult<Folder> UpdateFolder([FromBody] Folder folder, Token authToken)
|
2023-02-16 12:57:06 +00:00
|
|
|
{
|
2023-03-20 09:20:56 +00:00
|
|
|
var session = Db.GetSession(authToken);
|
2023-03-20 07:33:44 +00:00
|
|
|
|
|
|
|
if (!session.Update(folder))
|
|
|
|
return Unauthorized();
|
2023-02-16 12:57:06 +00:00
|
|
|
|
2023-03-30 07:28:44 +00:00
|
|
|
return folder.HideParentIfUserHasNoAccessToParent(session!.User);
|
2023-02-16 12:57:06 +00:00
|
|
|
}
|
|
|
|
|
2023-03-23 11:47:25 +00:00
|
|
|
[HttpPut(nameof(MoveInstallation))]
|
|
|
|
public ActionResult MoveInstallation(Int64 installationId,Int64 parentId, Token authToken)
|
|
|
|
{
|
|
|
|
var session = Db.GetSession(authToken);
|
|
|
|
|
|
|
|
return session.MoveInstallation(installationId, parentId)
|
|
|
|
? Ok()
|
|
|
|
: Unauthorized();
|
|
|
|
}
|
|
|
|
|
2024-03-19 15:41:36 +00:00
|
|
|
[HttpPost(nameof(UpdateFirmware))]
|
2024-04-30 12:07:50 +00:00
|
|
|
public async Task<ActionResult> UpdateFirmware(Int64 batteryNode, Int64 installationId,String version,Token authToken)
|
2024-03-19 15:41:36 +00:00
|
|
|
{
|
|
|
|
var session = Db.GetSession(authToken);
|
|
|
|
var installationToUpdate = Db.GetInstallationById(installationId);
|
2024-06-26 15:05:27 +00:00
|
|
|
|
2024-03-19 15:41:36 +00:00
|
|
|
|
|
|
|
if (installationToUpdate != null)
|
|
|
|
{
|
2024-06-27 10:01:01 +00:00
|
|
|
_ = session.RunScriptInBackground(installationToUpdate.VpnIp, batteryNode,version,installationToUpdate.Product);
|
2024-03-19 15:41:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return Ok();
|
|
|
|
}
|
|
|
|
|
2024-06-18 14:19:40 +00:00
|
|
|
[HttpPost(nameof(InsertNewAction))]
|
|
|
|
public async Task<ActionResult<IEnumerable<Object>>> InsertNewAction([FromBody] UserAction action, Token authToken)
|
|
|
|
{
|
|
|
|
var session = Db.GetSession(authToken);
|
|
|
|
var actionSuccess = await session.RecordUserAction(action);
|
|
|
|
return actionSuccess ? Ok() : Unauthorized();
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2023-10-16 09:27:19 +00:00
|
|
|
|
|
|
|
[HttpPost(nameof(EditInstallationConfig))]
|
2024-06-18 14:19:40 +00:00
|
|
|
public async Task<ActionResult<IEnumerable<Object>>> EditInstallationConfig([FromBody] Configuration config, Int64 installationId,Token authToken)
|
2023-10-16 09:27:19 +00:00
|
|
|
{
|
|
|
|
var session = Db.GetSession(authToken);
|
2024-06-11 12:31:08 +00:00
|
|
|
|
|
|
|
// Send configuration changes
|
|
|
|
var success = await session.SendInstallationConfig(installationId, config);
|
2023-10-16 09:27:19 +00:00
|
|
|
|
2024-06-11 12:31:08 +00:00
|
|
|
// Record configuration change
|
|
|
|
if (success)
|
|
|
|
{
|
2024-06-18 14:19:40 +00:00
|
|
|
// Create a new UserAction object
|
|
|
|
var action = new UserAction
|
|
|
|
{
|
|
|
|
InstallationId = installationId,
|
|
|
|
Timestamp = DateTime.Now,
|
|
|
|
Description = config.GetConfigurationString()
|
|
|
|
};
|
|
|
|
|
|
|
|
var actionSuccess = await session.RecordUserAction(action);
|
2024-06-11 12:31:08 +00:00
|
|
|
return actionSuccess?Ok():Unauthorized();
|
|
|
|
}
|
|
|
|
|
|
|
|
return Unauthorized();
|
2023-10-16 09:27:19 +00:00
|
|
|
|
|
|
|
}
|
|
|
|
|
2023-03-23 11:47:25 +00:00
|
|
|
[HttpPut(nameof(MoveFolder))]
|
|
|
|
public ActionResult MoveFolder(Int64 folderId,Int64 parentId, Token authToken)
|
|
|
|
{
|
|
|
|
var session = Db.GetSession(authToken);
|
|
|
|
|
|
|
|
return session.MoveFolder(folderId, parentId)
|
|
|
|
? Ok()
|
|
|
|
: Unauthorized();
|
|
|
|
}
|
|
|
|
|
2023-03-20 07:33:44 +00:00
|
|
|
[HttpDelete(nameof(DeleteUser))]
|
2023-03-20 09:20:56 +00:00
|
|
|
public ActionResult DeleteUser(Int64 userId, Token authToken)
|
2023-02-16 12:57:06 +00:00
|
|
|
{
|
2023-03-20 09:20:56 +00:00
|
|
|
var session = Db.GetSession(authToken);
|
2023-03-15 13:38:06 +00:00
|
|
|
var user = Db.GetUserById(userId);
|
2023-02-24 11:58:47 +00:00
|
|
|
|
2023-03-15 13:38:06 +00:00
|
|
|
return session.Delete(user)
|
2023-03-20 07:33:44 +00:00
|
|
|
? Ok()
|
|
|
|
: Unauthorized();
|
2023-02-16 12:57:06 +00:00
|
|
|
}
|
|
|
|
|
2023-03-20 07:33:44 +00:00
|
|
|
[HttpDelete(nameof(DeleteInstallation))]
|
2023-09-08 10:00:19 +00:00
|
|
|
public async Task<ActionResult> DeleteInstallation(Int64 installationId, Token authToken)
|
2023-02-16 12:57:06 +00:00
|
|
|
{
|
2023-03-20 09:20:56 +00:00
|
|
|
var session = Db.GetSession(authToken);
|
2023-03-15 13:38:06 +00:00
|
|
|
var installation = Db.GetInstallationById(installationId);
|
2023-02-23 10:26:55 +00:00
|
|
|
|
2023-09-08 10:00:19 +00:00
|
|
|
return await session.Delete(installation)
|
2023-03-20 07:33:44 +00:00
|
|
|
? Ok()
|
|
|
|
: Unauthorized();
|
2023-02-16 12:57:06 +00:00
|
|
|
}
|
2023-03-20 07:33:44 +00:00
|
|
|
|
|
|
|
[HttpDelete(nameof(DeleteFolder))]
|
2023-03-20 09:20:56 +00:00
|
|
|
public ActionResult DeleteFolder(Int64 folderId, Token authToken)
|
2023-02-16 12:57:06 +00:00
|
|
|
{
|
2023-03-20 09:20:56 +00:00
|
|
|
var session = Db.GetSession(authToken);
|
|
|
|
var folder = Db.GetFolderById(folderId);
|
2023-03-15 13:38:06 +00:00
|
|
|
|
|
|
|
return session.Delete(folder)
|
2023-03-20 07:33:44 +00:00
|
|
|
? Ok()
|
|
|
|
: Unauthorized();
|
2023-02-16 12:57:06 +00:00
|
|
|
|
|
|
|
}
|
2023-09-15 14:45:00 +00:00
|
|
|
|
2023-09-15 14:30:41 +00:00
|
|
|
[HttpPost(nameof(ResetPasswordRequest))]
|
2023-10-26 14:38:37 +00:00
|
|
|
public async Task<ActionResult<IEnumerable<Object>>> ResetPasswordRequest(String username)
|
2023-09-15 12:23:22 +00:00
|
|
|
{
|
2023-10-26 14:38:37 +00:00
|
|
|
var user = Db.GetUserByEmail(username);
|
2023-09-15 12:23:22 +00:00
|
|
|
|
|
|
|
if (user is null)
|
|
|
|
return Unauthorized();
|
|
|
|
|
|
|
|
var session = new Session(user.HidePassword().HideParentIfUserHasNoAccessToParent(user));
|
2023-10-26 12:09:38 +00:00
|
|
|
var success = Db.Create(session);
|
|
|
|
|
|
|
|
return success && await Db.SendPasswordResetEmail(user, session.Token)
|
|
|
|
? Ok()
|
|
|
|
: Unauthorized();
|
2023-09-15 12:23:22 +00:00
|
|
|
}
|
2023-10-16 09:27:19 +00:00
|
|
|
|
|
|
|
|
2023-09-15 14:30:41 +00:00
|
|
|
[HttpGet(nameof(ResetPassword))]
|
2023-10-16 09:27:19 +00:00
|
|
|
public ActionResult<Object> ResetPassword(Token token)
|
2023-09-15 12:23:22 +00:00
|
|
|
{
|
2023-09-15 14:45:00 +00:00
|
|
|
var user = Db.GetSession(token)?.User;
|
2023-10-16 09:27:19 +00:00
|
|
|
|
2023-09-15 12:23:22 +00:00
|
|
|
if (user is null)
|
|
|
|
return Unauthorized();
|
2023-10-16 09:27:19 +00:00
|
|
|
|
2023-10-23 15:04:27 +00:00
|
|
|
Db.DeleteUserPassword(user);
|
|
|
|
|
2023-10-26 14:43:48 +00:00
|
|
|
return Redirect($"https://monitor.innov.energy/?username={user.Email}&reset=true"); // TODO: move to settings file
|
2023-10-23 14:19:03 +00:00
|
|
|
}
|
2023-10-16 09:27:19 +00:00
|
|
|
|
2023-02-16 12:57:06 +00:00
|
|
|
}
|
|
|
|
|
2023-02-24 11:58:47 +00:00
|
|
|
|
|
|
|
|