Innovenergy_trunk/csharp/App/Backend/Controller.cs

999 lines
33 KiB
C#
Raw Normal View History

using System.Diagnostics;
using System.Net;
using System.Text.RegularExpressions;
2023-03-08 12:20:33 +00:00
using InnovEnergy.App.Backend.Database;
2023-03-15 13:38:06 +00:00
using InnovEnergy.App.Backend.DataTypes;
using InnovEnergy.App.Backend.DataTypes.Methods;
using InnovEnergy.App.Backend.Relations;
using InnovEnergy.App.Backend.Websockets;
using InnovEnergy.Lib.Utils;
2023-02-16 12:57:06 +00:00
using Microsoft.AspNetCore.Mvc;
namespace InnovEnergy.App.Backend;
2023-02-16 12:57:06 +00:00
2023-03-20 09:20:56 +00:00
using Token = String;
// create JobStatus class to track download battery log job
public class JobStatus
{
public string JobId { get; set; }
public string Status { get; set; }
public string FileName { get; set; }
public DateTime StartTime { get; set; }
}
2023-07-27 11:23:17 +00:00
[Controller]
2023-03-15 13:38:06 +00:00
[Route("api/")]
//All the http requests from the frontend that contain "/api" will be forwarded to this controller from the nginx reverse proxy.
2023-03-20 07:33:44 +00:00
public class Controller : ControllerBase
2023-02-16 12:57:06 +00:00
{
2023-03-20 07:33:44 +00:00
[HttpPost(nameof(Login))]
public ActionResult<Session> Login(String username, String? password)
2023-02-16 12:57:06 +00:00
{
//Find the user to the database, verify its password and create a new session.
//Store the new session to the database and return it to the frontend.
//If the user log out, the session will be deleted. Each session is valid for 24 hours. The db deletes all invalid/expired sessions every 30 minutes.
2023-07-06 09:09:16 +00:00
var user = Db.GetUserByEmail(username);
if (user is null)
2023-10-26 12:09:38 +00:00
throw new Exceptions(400, "Null User Exception", "Must provide a user to log in as.", Request.Path.Value!);
2023-10-26 12:09:38 +00:00
if (!(user.Password.IsNullOrEmpty() && user.MustResetPassword) && !user.VerifyPassword(password))
{
2023-10-26 12:09:38 +00:00
throw new Exceptions(401, "Wrong Password Exception", "Please try again.", Request.Path.Value!);
}
var session = new Session(user.HidePassword().HideParentIfUserHasNoAccessToParent(user));
2023-03-20 09:20:56 +00:00
return Db.Create(session)
? session
: throw new Exceptions(401,"Session Creation Exception", "Not allowed to log in.", Request.Path.Value!);
2023-02-16 12:57:06 +00:00
}
2023-03-20 07:33:44 +00:00
[HttpPost(nameof(Logout))]
2023-03-20 09:20:56 +00:00
public ActionResult Logout(Token authToken)
{
//Find the session and delete it from the database.
2023-03-20 09:20:56 +00:00
var session = Db.GetSession(authToken);
2023-03-15 13:38:06 +00:00
return session.Logout()
2023-03-20 07:33:44 +00:00
? Ok()
: Unauthorized();
}
[HttpGet(nameof(CreateWebSocket))]
public async Task CreateWebSocket(Token authToken)
{
var session = Db.GetSession(authToken)?.User;
if (session is null)
{
Console.WriteLine("------------------------------------Unauthorized user----------------------------------------------");
HttpContext.Response.StatusCode = (int)HttpStatusCode.Unauthorized;
HttpContext.Abort();
return;
}
if (!HttpContext.WebSockets.IsWebSocketRequest)
{
Console.WriteLine("------------------------------------Not a websocket request ----------------------------------------------");
HttpContext.Response.StatusCode = (int)HttpStatusCode.Unauthorized;
HttpContext.Abort();
return;
}
var webSocketContext = await HttpContext.WebSockets.AcceptWebSocketAsync();
var webSocket = webSocketContext;
//Handle the WebSocket connection
2023-11-08 11:07:49 +00:00
await WebsocketManager.HandleWebSocketConnection(webSocket);
}
[HttpGet(nameof(GetAllErrorsForInstallation))]
public ActionResult<IEnumerable<Error>> GetAllErrorsForInstallation(Int64 id, Token authToken)
{
var user = Db.GetSession(authToken)?.User;
if (user == null)
return Unauthorized();
var installation = Db.GetInstallationById(id);
if (installation is null || !user.HasAccessTo(installation))
return Unauthorized();
return Db.Errors
.Where(error => error.InstallationId == id)
.OrderByDescending(error => error.Date)
.ThenByDescending(error => error.Time)
.ToList();
}
2023-11-20 16:29:45 +00:00
2024-06-11 12:31:08 +00:00
[HttpGet(nameof(GetHistoryForInstallation))]
public ActionResult<IEnumerable<UserAction>> GetHistoryForInstallation(Int64 id, Token authToken)
{
var user = Db.GetSession(authToken)?.User;
if (user == null)
return Unauthorized();
var installation = Db.GetInstallationById(id);
if (installation is null || !user.HasAccessTo(installation))
return Unauthorized();
return Db.UserActions
.Where(action =>action.InstallationId == id)
.OrderByDescending(action => action.Timestamp)
.ToList();
}
2023-11-20 16:29:45 +00:00
[HttpGet(nameof(GetAllWarningsForInstallation))]
public ActionResult<IEnumerable<Warning>> GetAllWarningsForInstallation(Int64 id, Token authToken)
{
var user = Db.GetSession(authToken)?.User;
if (user == null)
return Unauthorized();
var installation = Db.GetInstallationById(id);
if (installation is null || !user.HasAccessTo(installation))
return Unauthorized();
return Db.Warnings
.Where(error => error.InstallationId == id)
.OrderByDescending(error => error.Date)
.ThenByDescending(error => error.Time)
2023-11-20 16:29:45 +00:00
.ToList();
}
2023-03-09 11:50:21 +00:00
[HttpGet(nameof(GetCsvTimestampsForInstallation))]
public ActionResult<IEnumerable<Int64>> GetCsvTimestampsForInstallation(Int64 id, Int32 start, Int32 end, Token authToken)
{
var user = Db.GetSession(authToken)?.User;
if (user == null)
return Unauthorized();
var installation = Db.GetInstallationById(id);
if (installation is null || !user.HasAccessTo(installation))
return Unauthorized();
var sampleSize = 100;
var allTimestamps = new List<Int64>();
static string FindCommonPrefix(string str1, string str2)
{
int minLength = Math.Min(str1.Length, str2.Length);
int i = 0;
while (i < minLength && str1[i] == str2[i])
{
i++;
}
return str1.Substring(0, i);
}
Int64 startTimestamp = Int64.Parse(start.ToString().Substring(0,5));
Int64 endTimestamp = Int64.Parse(end.ToString().Substring(0,5));
if (installation.Product == 1)
{
start = Int32.Parse(start.ToString().Substring(0, start.ToString().Length - 2));
end = Int32.Parse(end.ToString().Substring(0, end.ToString().Length - 2));
}
string configPath = "/home/ubuntu/.s3cfg";
while (startTimestamp <= endTimestamp)
{
string bucketPath = installation.Product==0? "s3://"+installation.S3BucketId + "-3e5b3069-214a-43ee-8d85-57d72000c19d/"+startTimestamp :
"s3://"+installation.S3BucketId + "-c0436b6a-d276-4cd8-9c44-1eae86cf5d0e/"+startTimestamp;
Console.WriteLine("Fetching data for "+startTimestamp);
try
{
// Set up process start info
ProcessStartInfo startInfo = new ProcessStartInfo
{
FileName = "s3cmd",
Arguments = $"--config {configPath} ls {bucketPath}",
RedirectStandardOutput = true,
RedirectStandardError = true,
UseShellExecute = false,
CreateNoWindow = true
};
// Start the process
Process process = new Process
{
StartInfo = startInfo
};
process.Start();
// Read the output
string output = process.StandardOutput.ReadToEnd();
string error = process.StandardError.ReadToEnd();
process.WaitForExit();
// Check for errors
if (process.ExitCode != 0)
{
Console.WriteLine("Error executing command:");
Console.WriteLine(error);
}
else
{
// Define a regex pattern to match the filenames without .csv extension
var pattern = @"/([^/]+)\.csv$";
var regex = new Regex(pattern);
// Process each line of the output
foreach (var line in output.Split('\n'))
{
var match = regex.Match(line);
if (match.Success && long.Parse(match.Groups[1].Value) >= start && long.Parse(match.Groups[1].Value) <= end)
{
allTimestamps.Add(long.Parse(match.Groups[1].Value));
//Console.WriteLine(match.Groups[1].Value);
}
}
}
}
catch (Exception e)
{
Console.WriteLine($"Exception: {e.Message}");
}
startTimestamp++;
}
int totalRecords = allTimestamps.Count;
if (totalRecords <= sampleSize)
{
// If the total records are less than or equal to the sample size, return all records
Console.WriteLine("Start timestamp = "+start +" end timestamp = "+end);
Console.WriteLine("SampledTimestamps = " + allTimestamps.Count);
return allTimestamps;
}
int interval = totalRecords / sampleSize;
var sampledTimestamps = new List<Int64>();
for (int i = 0; i < totalRecords; i += interval)
{
sampledTimestamps.Add(allTimestamps[i]);
}
// If we haven't picked enough records (due to rounding), add the latest record to ensure completeness
if (sampledTimestamps.Count < sampleSize)
{
sampledTimestamps.Add(allTimestamps.Last());
}
Console.WriteLine("Start timestamp = "+start +" end timestamp = "+end);
Console.WriteLine("TotalRecords = "+totalRecords + " interval = "+ interval);
Console.WriteLine("SampledTimestamps = " + sampledTimestamps.Count);
return sampledTimestamps;
}
2023-03-20 07:33:44 +00:00
[HttpGet(nameof(GetUserById))]
2023-03-20 09:20:56 +00:00
public ActionResult<User> GetUserById(Int64 id, Token authToken)
{
2023-03-20 09:20:56 +00:00
var session = Db.GetSession(authToken)?.User;
if (session == null)
2023-03-20 07:33:44 +00:00
return Unauthorized();
var user = Db.GetUserById(id);
2023-03-20 09:20:56 +00:00
if (user is null || !session.HasAccessTo(user))
2023-03-20 07:33:44 +00:00
return Unauthorized();
2023-03-16 11:49:25 +00:00
2023-10-26 12:09:38 +00:00
return user
.HidePassword()
.HideParentIfUserHasNoAccessToParent(session);
}
2023-03-15 13:38:06 +00:00
2023-03-20 07:33:44 +00:00
[HttpGet(nameof(GetInstallationById))]
2023-03-20 09:20:56 +00:00
public ActionResult<Installation> GetInstallationById(Int64 id, Token authToken)
{
2023-03-20 09:20:56 +00:00
var user = Db.GetSession(authToken)?.User;
if (user == null)
2023-03-20 07:33:44 +00:00
return Unauthorized();
var installation = Db.GetInstallationById(id);
if (installation is null || !user.HasAccessTo(installation))
2023-03-20 07:33:44 +00:00
return Unauthorized();
2023-07-13 07:40:04 +00:00
return installation
.FillOrderNumbers()
2023-07-13 07:40:04 +00:00
.HideParentIfUserHasNoAccessToParent(user)
.HideWriteKeyIfUserIsNotAdmin(user.UserType);
}
[HttpGet(nameof(GetUsersWithDirectAccessToInstallation))]
public ActionResult<IEnumerable<Object>> GetUsersWithDirectAccessToInstallation(Int64 id, Token authToken)
{
2023-03-20 09:20:56 +00:00
var user = Db.GetSession(authToken)?.User;
if (user == null)
2023-03-20 07:33:44 +00:00
return Unauthorized();
var installation = Db.GetInstallationById(id);
if (installation is null || !user.HasAccessTo(installation))
2023-03-20 07:33:44 +00:00
return Unauthorized();
2023-03-09 11:50:21 +00:00
return installation
2023-10-26 12:09:38 +00:00
.UsersWithDirectAccess()
.Where(u => u.IsDescendantOf(user))
.Select(u => u.HidePassword())
.ToList();
}
[HttpGet(nameof(GetUsersWithInheritedAccessToInstallation))]
public ActionResult<IEnumerable<Object>> GetUsersWithInheritedAccessToInstallation(Int64 id, Token authToken)
{
var user = Db.GetSession(authToken)?.User;
if (user == null)
return Unauthorized();
var installation = Db.GetInstallationById(id);
if (installation is null || !user.HasAccessTo(installation))
return Unauthorized();
return installation
2023-10-26 12:09:38 +00:00
.Ancestors()
.SelectMany(f => f.UsersWithDirectAccess()
.Where(u => u.IsDescendantOf(user))
.Select(u => new { folderId = f.Id, folderName = f.Name, user = u.HidePassword() }))
.ToList();
}
[HttpGet(nameof(GetUsersWithDirectAccessToFolder))]
public ActionResult<IEnumerable<Object>> GetUsersWithDirectAccessToFolder(Int64 id, Token authToken)
{
2023-03-20 09:20:56 +00:00
var user = Db.GetSession(authToken)?.User;
if (user == null)
2023-03-20 07:33:44 +00:00
return Unauthorized();
var folder = Db.GetFolderById(id);
if (folder is null || !user.HasAccessTo(folder))
2023-03-20 07:33:44 +00:00
return Unauthorized();
return folder
.UsersWithDirectAccess()
.Where(u => u.IsDescendantOf(user))
.Select(u => u.HidePassword())
.ToList();
}
[HttpGet(nameof(GetUsersWithInheritedAccessToFolder))]
public ActionResult<IEnumerable<Object>> GetUsersWithInheritedAccessToFolder(Int64 id, Token authToken)
{
var user = Db.GetSession(authToken)?.User;
if (user == null)
return Unauthorized();
var folder = Db.GetFolderById(id);
if (folder is null || !user.HasAccessTo(folder))
return Unauthorized();
return folder
.Ancestors()
.SelectMany(f => f.UsersWithDirectAccess()
.Where(u => u.IsDescendantOf(user))
.Select(u => new { folderId = f.Id, folderName = f.Name, user = u.HidePassword() }))
.ToList();
}
2023-02-22 13:46:36 +00:00
2023-03-20 07:33:44 +00:00
[HttpGet(nameof(GetFolderById))]
2023-03-20 09:20:56 +00:00
public ActionResult<Folder> GetFolderById(Int64 id, Token authToken)
{
2023-03-20 09:20:56 +00:00
var user = Db.GetSession(authToken)?.User;
if (user == null)
2023-03-20 07:33:44 +00:00
return Unauthorized();
var folder = Db.GetFolderById(id);
if (folder is null || !user.HasAccessTo(folder))
2023-03-20 07:33:44 +00:00
return Unauthorized();
return folder.HideParentIfUserHasNoAccessToParent(user);
}
2023-02-16 14:08:50 +00:00
2023-03-23 14:45:40 +00:00
[HttpGet(nameof(GetAllDirectChildUsers))]
public ActionResult<IEnumerable<User>> GetAllDirectChildUsers(Token authToken)
{
var user = Db.GetSession(authToken)?.User;
if (user == null)
return Unauthorized();
return user.ChildUsers().Select(u => u.HidePassword()).ToList();
}
2023-03-23 14:46:19 +00:00
2023-03-23 14:45:40 +00:00
[HttpGet(nameof(GetAllChildUsers))]
public ActionResult<IEnumerable<User>> GetAllChildUsers(Token authToken)
{
var user = Db.GetSession(authToken)?.User;
if (user == null)
return Unauthorized();
2023-09-15 11:34:28 +00:00
return user
.DescendantUsers()
.Select(u => u.HidePassword())
.ToList();
2023-03-23 14:46:19 +00:00
}
2023-03-23 14:45:40 +00:00
2023-03-20 07:33:44 +00:00
[HttpGet(nameof(GetAllInstallations))]
2023-03-20 09:20:56 +00:00
public ActionResult<IEnumerable<Installation>> GetAllInstallations(Token authToken)
2023-02-16 12:57:06 +00:00
{
2023-03-20 09:20:56 +00:00
var user = Db.GetSession(authToken)?.User;
2023-03-20 07:33:44 +00:00
if (user is null)
return Unauthorized();
2023-06-30 06:58:50 +00:00
return user
.AccessibleInstallations(product:0)
.Select(i => i.FillOrderNumbers().HideParentIfUserHasNoAccessToParent(user).HideWriteKeyIfUserIsNotAdmin(user.UserType))
2023-06-30 06:58:50 +00:00
.ToList();
2023-02-16 12:57:06 +00:00
}
[HttpGet(nameof(GetAllSalidomoInstallations))]
public ActionResult<IEnumerable<Installation>> GetAllSalidomoInstallations(Token authToken)
{
var user = Db.GetSession(authToken)?.User;
if (user is null)
return Unauthorized();
return user
.AccessibleInstallations(product:1)
.ToList();
}
2023-02-24 11:58:47 +00:00
2023-03-20 07:33:44 +00:00
[HttpGet(nameof(GetAllFolders))]
2023-03-20 09:20:56 +00:00
public ActionResult<IEnumerable<Folder>> GetAllFolders(Token authToken)
2023-02-16 12:57:06 +00:00
{
2023-03-20 09:20:56 +00:00
var user = Db.GetSession(authToken)?.User;
2023-03-20 07:33:44 +00:00
if (user is null)
return Unauthorized();
2023-02-24 12:59:56 +00:00
return new(user.AccessibleFolders().HideParentIfUserHasNoAccessToParent(user));
2023-02-24 12:59:56 +00:00
}
2023-03-15 13:38:06 +00:00
2023-03-20 07:33:44 +00:00
[HttpGet(nameof(GetAllFoldersAndInstallations))]
public ActionResult<IEnumerable<Object>> GetAllFoldersAndInstallations(int productId, Token authToken)
{
2023-03-20 09:20:56 +00:00
var user = Db.GetSession(authToken)?.User;
2023-06-30 06:58:50 +00:00
2023-03-20 07:33:44 +00:00
if (user is null)
return Unauthorized();
var foldersAndInstallations = user
.AccessibleFoldersAndInstallations(product:productId)
.Do(o => o.FillOrderNumbers())
.Select(o => o.HideParentIfUserHasNoAccessToParent(user))
.OfType<Object>(); // Important! JSON serializer must see Objects otherwise
// it will just serialize the members of TreeNode %&@#!!!
2023-07-13 07:40:04 +00:00
// TODO Filter out write keys
return new (foldersAndInstallations);
}
2023-03-09 15:33:14 +00:00
2023-03-15 13:38:06 +00:00
2023-03-20 07:33:44 +00:00
[HttpPost(nameof(CreateUser))]
2023-10-26 12:09:38 +00:00
public async Task<ActionResult<User>> CreateUser([FromBody] User newUser, Token authToken)
2023-03-09 15:33:14 +00:00
{
2023-10-23 14:25:34 +00:00
var create = Db.GetSession(authToken).Create(newUser);
if (create)
{
var mail_success= await Db.SendNewUserEmail(newUser);
if (!mail_success)
{
Db.GetSession(authToken).Delete(newUser);
}
return mail_success ? newUser.HidePassword():Unauthorized();
}
2023-10-23 14:35:43 +00:00
return Unauthorized() ;
2023-03-09 15:33:14 +00:00
}
2023-03-20 07:33:44 +00:00
[HttpPost(nameof(CreateInstallation))]
2023-09-15 11:34:28 +00:00
public async Task<ActionResult<Installation>> CreateInstallation([FromBody] Installation installation, Token authToken)
2023-03-09 15:33:14 +00:00
{
var session = Db.GetSession(authToken);
if (! await session.Create(installation))
2023-03-20 07:33:44 +00:00
return Unauthorized();
2023-07-27 14:51:57 +00:00
return installation;
2023-03-09 15:33:14 +00:00
}
2023-03-20 07:33:44 +00:00
[HttpPost(nameof(CreateFolder))]
2023-09-15 11:34:28 +00:00
public ActionResult<Folder> CreateFolder([FromBody] Folder folder, Token authToken)
2023-03-09 15:33:14 +00:00
{
2023-03-20 09:20:56 +00:00
var session = Db.GetSession(authToken);
2023-03-09 15:33:14 +00:00
2023-03-20 07:33:44 +00:00
if (!session.Create(folder))
return Unauthorized();
return folder.HideParentIfUserHasNoAccessToParent(session!.User);
2023-03-09 15:33:14 +00:00
}
2023-03-20 07:33:44 +00:00
[HttpPost(nameof(GrantUserAccessToFolder))]
2023-03-20 09:20:56 +00:00
public ActionResult GrantUserAccessToFolder(FolderAccess folderAccess, Token authToken)
{
2023-03-20 09:20:56 +00:00
var session = Db.GetSession(authToken);
// TODO: automatic BadRequest when properties are null during deserialization
var folder = Db.GetFolderById(folderAccess.FolderId);
var user = Db.GetUserById(folderAccess.UserId);
return session.GrantUserAccessTo(user, folder)
2023-03-20 07:33:44 +00:00
? Ok()
: Unauthorized();
}
2023-03-20 07:33:44 +00:00
[HttpPost(nameof(RevokeUserAccessToFolder))]
2023-03-20 09:20:56 +00:00
public ActionResult RevokeUserAccessToFolder(FolderAccess folderAccess, Token authToken)
{
2023-03-20 09:20:56 +00:00
var session = Db.GetSession(authToken);
// TODO: automatic BadRequest when properties are null during deserialization
var folder = Db.GetFolderById(folderAccess.FolderId);
var user = Db.GetUserById(folderAccess.UserId);
return session.RevokeUserAccessTo(user, folder)
2023-03-20 07:33:44 +00:00
? Ok()
: Unauthorized();
}
2023-03-20 07:33:44 +00:00
[HttpPost(nameof(GrantUserAccessToInstallation))]
2023-03-20 09:20:56 +00:00
public ActionResult GrantUserAccessToInstallation(InstallationAccess installationAccess, Token authToken)
{
2023-03-20 09:20:56 +00:00
var session = Db.GetSession(authToken);
// TODO: automatic BadRequest when properties are null during deserialization
var installation = Db.GetInstallationById(installationAccess.InstallationId);
var user = Db.GetUserById(installationAccess.UserId);
return session.GrantUserAccessTo(user, installation)
2023-10-26 12:09:38 +00:00
? Ok()
: Unauthorized();
}
2023-03-20 07:33:44 +00:00
[HttpPost(nameof(RevokeUserAccessToInstallation))]
2023-03-20 09:20:56 +00:00
public ActionResult RevokeUserAccessToInstallation(InstallationAccess installationAccess, Token authToken)
{
2023-03-20 09:20:56 +00:00
var session = Db.GetSession(authToken);
// TODO: automatic BadRequest when properties are null during deserialization
2023-09-15 11:34:28 +00:00
var installation = Db.GetInstallationById(installationAccess.InstallationId);
var user = Db.GetUserById(installationAccess.UserId);
return session.RevokeUserAccessTo(user, installation)
2023-03-20 07:33:44 +00:00
? Ok()
: Unauthorized();
}
2023-03-20 07:33:44 +00:00
[HttpPut(nameof(UpdateUser))]
2023-09-15 11:34:28 +00:00
public ActionResult<User> UpdateUser([FromBody] User updatedUser, Token authToken)
2023-02-16 12:57:06 +00:00
{
2023-03-20 09:20:56 +00:00
var session = Db.GetSession(authToken);
2023-03-15 13:38:06 +00:00
2023-03-20 07:33:44 +00:00
if (!session.Update(updatedUser))
return Unauthorized();
return updatedUser.HidePassword();
2023-02-16 12:57:06 +00:00
}
2023-02-24 11:58:47 +00:00
[HttpPut(nameof(UpdatePassword))]
public ActionResult<User> UpdatePassword(String newPassword, Token authToken)
{
var session = Db.GetSession(authToken);
return session.UpdatePassword(newPassword)
? Ok()
: Unauthorized();
}
2023-03-20 07:33:44 +00:00
[HttpPut(nameof(UpdateInstallation))]
2023-09-15 11:34:28 +00:00
public ActionResult<Installation> UpdateInstallation([FromBody] Installation installation, Token authToken)
2023-02-16 12:57:06 +00:00
{
2023-03-20 09:20:56 +00:00
var session = Db.GetSession(authToken);
2023-03-20 07:33:44 +00:00
if (!session.Update(installation))
return Unauthorized();
if (installation.Product == 0)
{
return installation.FillOrderNumbers().HideParentIfUserHasNoAccessToParent(session!.User).HideWriteKeyIfUserIsNotAdmin(session.User.UserType);
}
2023-02-16 12:57:06 +00:00
return installation.HideParentIfUserHasNoAccessToParent(session!.User);
2023-02-16 12:57:06 +00:00
}
2023-11-22 08:35:29 +00:00
[HttpPost(nameof(AcknowledgeError))]
public ActionResult AcknowledgeError(Int64 id, Token authToken)
{
var session = Db.GetSession(authToken);
if (session == null)
return Unauthorized();
var error=Db.Errors
.FirstOrDefault(error => error.Id == id);
error.Seen = true;
return Db.Update(error)
? Ok()
: Unauthorized();
}
[HttpPost(nameof(AcknowledgeWarning))]
public ActionResult AcknowledgeWarning(Int64 id, Token authToken)
{
var session = Db.GetSession(authToken);
if (session == null)
return Unauthorized();
var warning=Db.Warnings
.FirstOrDefault(warning => warning.Id == id);
warning.Seen = true;
return Db.Update(warning)
? Ok()
: Unauthorized();
}
2023-03-20 07:33:44 +00:00
[HttpPut(nameof(UpdateFolder))]
2023-09-15 11:34:28 +00:00
public ActionResult<Folder> UpdateFolder([FromBody] Folder folder, Token authToken)
2023-02-16 12:57:06 +00:00
{
2023-03-20 09:20:56 +00:00
var session = Db.GetSession(authToken);
2023-03-20 07:33:44 +00:00
if (!session.Update(folder))
return Unauthorized();
2023-02-16 12:57:06 +00:00
return folder.HideParentIfUserHasNoAccessToParent(session!.User);
2023-02-16 12:57:06 +00:00
}
[HttpPut(nameof(MoveInstallation))]
public ActionResult MoveInstallation(Int64 installationId,Int64 parentId, Token authToken)
{
var session = Db.GetSession(authToken);
return session.MoveInstallation(installationId, parentId)
? Ok()
: Unauthorized();
}
[HttpPost(nameof(UpdateFirmware))]
public async Task<ActionResult> UpdateFirmware(Int64 batteryNode, Int64 installationId,String version,Token authToken)
{
var session = Db.GetSession(authToken);
var installationToUpdate = Db.GetInstallationById(installationId);
if (installationToUpdate != null)
{
_ = session.RunScriptInBackground(installationToUpdate.VpnIp, batteryNode,version,installationToUpdate.Product);
}
return Ok();
}
private static Dictionary<string, JobStatus> JobStatuses = new Dictionary<string, JobStatus>();
[HttpPost("StartDownloadBatteryLog")]
public async Task<ActionResult<string>> StartDownloadBatteryLog(long batteryNode, long installationId, Token authToken)
{
var session = Db.GetSession(authToken);
var installationToDownload = Db.GetInstallationById(installationId);
if (installationToDownload != null)
{
string jobId = Guid.NewGuid().ToString();
_ = Task.Run(async () =>
{
await session.RunDownloadLogScript(installationToDownload.VpnIp, batteryNode, installationToDownload.Product);
string fileName = $"{installationToDownload.VpnIp}-node{batteryNode}-{DateTime.Now:dd-MM-yyyy}.bin";
string filePath = $"/home/ubuntu/backend/downloadBatteryLog/{fileName}";
if (System.IO.File.Exists(filePath))
{
SaveJobStatus(jobId, "Completed", fileName:fileName);
}
else
{
SaveJobStatus(jobId, "Failed");
}
});
// Store initial job status in in-memory storage
SaveJobStatus(jobId, "Processing");
return Ok(jobId);
}
return NotFound();
}
[HttpGet("DownloadBatteryLog")]
public async Task<ActionResult> DownloadBatteryLog(string jobId)
{
Console.WriteLine("-----------------------------------Start uploading battery log-----------------------------------");
var jobStatus = JobStatuses.TryGetValue(jobId, out var status) ? status : null;
if (jobStatus == null || jobStatus.Status != "Completed" || string.IsNullOrEmpty(jobStatus.FileName))
{
return NotFound();
}
string fileName = jobStatus.FileName;
string filePath = $"/home/ubuntu/backend/downloadBatteryLog/{fileName}";
if (!System.IO.File.Exists(filePath))
{
return NotFound();
}
string contentType = "application/octet-stream";
var memory = new MemoryStream();
await using (var stream = new FileStream(filePath, FileMode.Open))
{
await stream.CopyToAsync(memory);
}
memory.Position = 0;
var fileContentResult = new FileContentResult(memory.ToArray(), contentType)
{
//FileDownloadName = Path.GetFileName(filePath)
FileDownloadName = fileName
};
Console.WriteLine("-----------------------------------Stop uploading battery log-----------------------------------");
return fileContentResult;
}
[HttpDelete("DeleteBatteryLog")]
public IActionResult DeleteBatteryLog(string fileName)
{
Console.WriteLine("-----------------------------------Start deleting downloaded battery log-----------------------------------");
string filePath = $"/home/ubuntu/backend/downloadBatteryLog/{fileName}";
try
{
if (System.IO.File.Exists(filePath))
{
System.IO.File.Delete(filePath);
Console.WriteLine("-----------------------------------Stop deleting downloaded battery log-----------------------------------");
return Ok();
}
else
{
return NotFound("File not found.");
}
}
catch (Exception ex)
{
return StatusCode(500, $"Internal server error: {ex.Message}");
}
}
private void SaveJobStatus(string jobId, string status, string fileName = null)
{
JobStatuses[jobId] = new JobStatus
{
JobId = jobId,
Status = status,
FileName = fileName,
StartTime = DateTime.UtcNow // Initialize StartTime when saving
};
}
[HttpGet("GetJobResult")]
public ActionResult GetJobResult(string jobId)
{
if (string.IsNullOrEmpty(jobId))
{
return BadRequest(new { status = "Error", message = "Job ID is required." });
}
if (!JobStatuses.TryGetValue(jobId, out var jobStatus))
{
return NotFound();
}
if (jobStatus.Status == "Completed")
{
return Ok(new { status = "Completed", fileName = jobStatus.FileName });
}
else if (jobStatus.Status == "Failed")
{
return StatusCode(500, new { status = "Failed", message = "Job processing failed." });
}
else if (jobStatus.Status == "Processing")
{
// Check for timeout
var startTime = jobStatus.StartTime;
var currentTime = DateTime.UtcNow;
if ((currentTime - startTime).TotalMinutes > 60)//60 minutes as timeout => Running multiple tasks in parallel on a crowded backend server will increase the time each task takes to complete
{
return StatusCode(500, new { status = "Failed", message = "Job in back end timeout exceeded." });
}
return Ok(new { status = "Processing" });
}
else
{
return BadRequest(new { status = "Unknown", message = "Unknown job status." });
}
}
2024-06-18 14:19:40 +00:00
[HttpPost(nameof(InsertNewAction))]
public async Task<ActionResult<IEnumerable<Object>>> InsertNewAction([FromBody] UserAction action, Token authToken)
{
var session = Db.GetSession(authToken);
var actionSuccess = await session.InsertUserAction(action);
2024-06-18 14:19:40 +00:00
return actionSuccess ? Ok() : Unauthorized();
}
2024-07-18 07:37:40 +00:00
[HttpPost(nameof(UpdateAction))]
public async Task<ActionResult<IEnumerable<Object>>> UpdateAction([FromBody] UserAction action, Token authToken)
{
var session = Db.GetSession(authToken);
var actionSuccess = await session.UpdateUserAction(action);
return actionSuccess ? Ok() : Unauthorized();
}
[HttpPost(nameof(DeleteAction))]
public async Task<ActionResult<IEnumerable<Object>>> DeleteAction(Int64 actionId, Token authToken)
2024-07-18 07:37:40 +00:00
{
var session = Db.GetSession(authToken);
var actionSuccess = await session.DeleteUserAction(actionId);
2024-07-18 07:37:40 +00:00
return actionSuccess ? Ok() : Unauthorized();
}
2023-10-16 09:27:19 +00:00
[HttpPost(nameof(EditInstallationConfig))]
2024-06-18 14:19:40 +00:00
public async Task<ActionResult<IEnumerable<Object>>> EditInstallationConfig([FromBody] Configuration config, Int64 installationId,Token authToken)
2023-10-16 09:27:19 +00:00
{
var session = Db.GetSession(authToken);
2024-06-11 12:31:08 +00:00
// Send configuration changes
var success = await session.SendInstallationConfig(installationId, config);
2023-10-16 09:27:19 +00:00
2024-06-11 12:31:08 +00:00
// Record configuration change
if (success)
{
2024-06-18 14:19:40 +00:00
// Create a new UserAction object
var action = new UserAction
{
InstallationId = installationId,
Timestamp = DateTime.Now,
Description = config.GetConfigurationString()
};
var actionSuccess = await session.InsertUserAction(action);
2024-06-11 12:31:08 +00:00
return actionSuccess?Ok():Unauthorized();
}
return Unauthorized();
2023-10-16 09:27:19 +00:00
}
[HttpPut(nameof(MoveFolder))]
public ActionResult MoveFolder(Int64 folderId,Int64 parentId, Token authToken)
{
var session = Db.GetSession(authToken);
return session.MoveFolder(folderId, parentId)
? Ok()
: Unauthorized();
}
2023-03-20 07:33:44 +00:00
[HttpDelete(nameof(DeleteUser))]
2023-03-20 09:20:56 +00:00
public ActionResult DeleteUser(Int64 userId, Token authToken)
2023-02-16 12:57:06 +00:00
{
2023-03-20 09:20:56 +00:00
var session = Db.GetSession(authToken);
2023-03-15 13:38:06 +00:00
var user = Db.GetUserById(userId);
2023-02-24 11:58:47 +00:00
2023-03-15 13:38:06 +00:00
return session.Delete(user)
2023-03-20 07:33:44 +00:00
? Ok()
: Unauthorized();
2023-02-16 12:57:06 +00:00
}
2023-03-20 07:33:44 +00:00
[HttpDelete(nameof(DeleteInstallation))]
2023-09-08 10:00:19 +00:00
public async Task<ActionResult> DeleteInstallation(Int64 installationId, Token authToken)
2023-02-16 12:57:06 +00:00
{
2023-03-20 09:20:56 +00:00
var session = Db.GetSession(authToken);
2023-03-15 13:38:06 +00:00
var installation = Db.GetInstallationById(installationId);
2023-09-08 10:00:19 +00:00
return await session.Delete(installation)
2023-03-20 07:33:44 +00:00
? Ok()
: Unauthorized();
2023-02-16 12:57:06 +00:00
}
2023-03-20 07:33:44 +00:00
[HttpDelete(nameof(DeleteFolder))]
2023-03-20 09:20:56 +00:00
public ActionResult DeleteFolder(Int64 folderId, Token authToken)
2023-02-16 12:57:06 +00:00
{
2023-03-20 09:20:56 +00:00
var session = Db.GetSession(authToken);
var folder = Db.GetFolderById(folderId);
2023-03-15 13:38:06 +00:00
return session.Delete(folder)
2023-03-20 07:33:44 +00:00
? Ok()
: Unauthorized();
2023-02-16 12:57:06 +00:00
}
2023-09-15 14:45:00 +00:00
[HttpPost(nameof(ResetPasswordRequest))]
public async Task<ActionResult<IEnumerable<Object>>> ResetPasswordRequest(String username)
2023-09-15 12:23:22 +00:00
{
var user = Db.GetUserByEmail(username);
2023-09-15 12:23:22 +00:00
if (user is null)
return Unauthorized();
var session = new Session(user.HidePassword().HideParentIfUserHasNoAccessToParent(user));
2023-10-26 12:09:38 +00:00
var success = Db.Create(session);
return success && await Db.SendPasswordResetEmail(user, session.Token)
? Ok()
: Unauthorized();
2023-09-15 12:23:22 +00:00
}
2023-10-16 09:27:19 +00:00
[HttpGet(nameof(ResetPassword))]
2023-10-16 09:27:19 +00:00
public ActionResult<Object> ResetPassword(Token token)
2023-09-15 12:23:22 +00:00
{
2023-09-15 14:45:00 +00:00
var user = Db.GetSession(token)?.User;
2023-10-16 09:27:19 +00:00
2023-09-15 12:23:22 +00:00
if (user is null)
return Unauthorized();
2023-10-16 09:27:19 +00:00
2023-10-23 15:04:27 +00:00
Db.DeleteUserPassword(user);
2023-10-26 14:43:48 +00:00
return Redirect($"https://monitor.innov.energy/?username={user.Email}&reset=true"); // TODO: move to settings file
2023-10-23 14:19:03 +00:00
}
2023-10-16 09:27:19 +00:00
2023-02-16 12:57:06 +00:00
}
2023-02-24 11:58:47 +00:00