const express = require ( 'express' ) ;
const app = express ( )
const bodyParser = require ( 'body-parser' ) ;
const { Pool } = require ( 'pg' ) ;
const db = new Pool ( {
connectionString : process . env . DATABASE _URL ,
ssl : {
rejectUnauthorized : false
}
} ) ;
const PORT = process . env . PORT || 5000 ;
app . use ( bodyParser . json ( ) )
app . use (
bodyParser . urlencoded ( {
extended : true ,
} )
)
let allowCrossDomain = function ( req , res , next ) {
res . header ( 'Access-Control-Allow-Origin' , "*" ) ;
res . header ( 'Access-Control-Allow-Headers' , "*" ) ;
res . header ( 'Access-Control-Allow-Methods' , "*" ) ;
next ( ) ;
}
app . use ( allowCrossDomain ) ;
app . listen ( PORT , ( ) => console . log ( ` Listening on ${ PORT } ` ) ) ;
const db4 = db ;
const PREFIX = ""
const ENDPOINTDATA = [
{
endpoint : "class" ,
requiredfields : [ "name" ] ,
optionalfields : [ "icon" ] ,
excludedfields : [ ] //Fields to not output in GET.
} ,
{
endpoint : "class_level_data" ,
requiredfields : [ "class_id" , "level" , "hp" , "atk" , "def" , "name" ] ,
optionalfields : [ ] ,
excludedfields : [ ] //Fields to not output in GET.
} ,
{
endpoint : "class_weapon_type_data" ,
requiredfields : [ "class_id" , "weapon_type_id" ] ,
optionalfields : [ ] ,
excludedfields : [ ] //Fields to not output in GET.
} ,
{
endpoint : "weapon" ,
requiredfields : [ "name" , "rarity" , "level_req" , "atk" ] ,
optionalfields : [ "potential_id" , "variance" , "base_affix_slots" , "drop_info" , "pb_gauge_build" , "icon" ] ,
excludedfields : [ ] //Fields to not output in GET.
} ,
{
endpoint : "weapon_existence_data" ,
requiredfields : [ "weapon_type_id" , "weapon_id" ] ,
optionalfields : [ "popularity" , "editors_choice" , "icon" , "special_name" ] ,
excludedfields : [ ] //Fields to not output in GET.
} ,
{
endpoint : "weapon_type" ,
requiredfields : [ "name" , "dmg_type" ] ,
optionalfields : [ "icon" , "shorthand" ] ,
excludedfields : [ ] //Fields to not output in GET.
} ,
{
endpoint : "photon_art" ,
requiredfields : [ "name" , "weapon_type_id" , "potency" , "dps" ] ,
optionalfields : [ "power_distribution" , "pp" , "frames" , "icon" ] ,
excludedfields : [ ] //Fields to not output in GET.
} ,
{
endpoint : "armor" ,
requiredfields : [ "name" , "rarity" , "level_req" , "def" ] ,
optionalfields : [ "hp" , "pp" , "mel_dmg" , "rng_dmg" , "tec_dmg" , "crit_rate" , "crit_dmg" , "pp_cost_reduction" , "active_pp_recovery" , "natural_pp_recovery" , "dmg_res" , "all_down_res" , "burn_res" , "freeze_res" , "blind_res" , "shock_res" , "panic_res" , "poison_res" , "battle_power_value" , "slot" , "icon" , "popularity" , "editors_choice" ] ,
excludedfields : [ ] //Fields to not output in GET.
} ,
{
endpoint : "potential" ,
requiredfields : [ "name" ] ,
optionalfields : [ "icon" ] ,
excludedfields : [ ] //Fields to not output in GET.
} ,
{
endpoint : "potential_data" ,
requiredfields : [ "potential_id" , "level" , "name" ] ,
optionalfields : [ "mel_dmg" , "rng_dmg" , "tec_dmg" , "crit_rate" , "crit_dmg" , "pp_cost_reduction" , "active_pp_recovery" , "natural_pp_recovery" , "dmg_res" , "all_down_res" , "burn_res" , "freeze_res" , "blind_res" , "shock_res" , "panic_res" , "poison_res" , "battle_power_value" , "pb_gauge_build" , "description" ] ,
excludedfields : [ ] //Fields to not output in GET.
} ,
{
endpoint : "builds" ,
requiredfields : [ "users_id" , "creator" , "build_name" , "class1" , "created_on" , "last_modified" , "data" ] ,
optionalfields : [ "class2" , "likes" , "editors_choice" ] ,
excludedfields : [ ] //Fields to not output in GET.
} ,
{
endpoint : "skill" ,
requiredfields : [ "name" , "skill_type_id" ] ,
optionalfields : [ "icon" ] ,
excludedfields : [ ] //Fields to not output in GET.
} ,
{
endpoint : "skill_type" ,
requiredfields : [ "name" ] ,
optionalfields : [ ] ,
excludedfields : [ ] //Fields to not output in GET.
} ,
{
endpoint : "skill_data" ,
requiredfields : [ "skill_id" , "level" , "name" ] ,
optionalfields : [ "variance" , "mel_dmg" , "rng_dmg" , "tec_dmg" , "crit_rate" , "crit_dmg" , "pp_cost_reduction" , "active_pp_recovery" , "natural_pp_recovery" , "dmg_res" , "popularity" , "editors_choice" ] ,
excludedfields : [ ] //Fields to not output in GET.
} ,
{
endpoint : "class_skill" ,
requiredfields : [ "name" , "class_id" ] ,
optionalfields : [ "icon" , "description" ] ,
excludedfields : [ ] //Fields to not output in GET.
} ,
{
endpoint : "class_skill_data" ,
requiredfields : [ "name" , "class_skill_id" , "level" ] ,
optionalfields : [ "dependency" , "effect" , "duration" , "cooldown" , "damage_taken" , "pa_potency" , "conditional_buff" , "pp_recovery" , "property" , "all_damage_buff" , "active_pp_recovery" , "status_ailment_accum" , "status_ailment_duration" , "pp_consumption" , "max_hp_decrease" , "natural_pp_recovery" , "added_pp" , "pb_gauge_fortification" ] ,
excludedfields : [ ] //Fields to not output in GET.
} ,
{
endpoint : "augment" ,
requiredfields : [ "augment_type_id" , "name" ] ,
optionalfields : [ "variance" , "hp" , "pp" , "mel_dmg" , "rng_dmg" , "tec_dmg" , "crit_rate" , "crit_dmg" , "pp_cost_reduction" , "active_pp_recovery" , "natural_pp_recovery" , "dmg_res" , "affix_success_rate" , "all_down_res" , "burn_res" , "freeze_res" , "blind_res" , "shock_res" , "panic_res" , "poison_res" , "battle_power_value" , "pb_gauge_build" , "popularity" , "editors_choice" ] ,
excludedfields : [ ] //Fields to not output in GET.
} ,
{
endpoint : "augment_type" ,
requiredfields : [ "name" ] ,
optionalfields : [ "icon" ] ,
excludedfields : [ ] //Fields to not output in GET.
} ,
{
endpoint : "enemy_data" ,
requiredfields : [ "level" , "def" , "atk" ] ,
optionalfields : [ ] ,
excludedfields : [ ] //Fields to not output in GET.
} ,
{
endpoint : "food" ,
requiredfields : [ "name" ] ,
optionalfields : [ "potency" , "pp" , "dmg_res" , "hp" , "pp_consumption" , "pp_recovery" , "weak_point_dmg" , "hp_recovery" , "popularity" , "editors_choice" ] ,
excludedfields : [ ] //Fields to not output in GET.
} ,
{
endpoint : "food_mult" ,
requiredfields : [ "amount" ] ,
optionalfields : [ "potency" , "pp" , "dmg_res" , "hp" , "pp_consumption" , "pp_recovery" , "weak_point_dmg" , "hp_recovery" ] ,
excludedfields : [ ] //Fields to not output in GET.
} ,
{
endpoint : "roles" ,
requiredfields : [ "name" ] ,
optionalfields : [ ] ,
excludedfields : [ ] //Fields to not output in GET.
} ,
{
endpoint : "users" ,
requiredfields : [ "username" , "email" , "created_on" , "roles_id" ] ,
optionalfields : [ "avatar" , "editors_choice" , "recovery_hash" ] ,
excludedfields : [ "password_hash" ] //Fields to not output in GET.
} ,
{
endpoint : "database_audit" ,
requiredfields : [ "action" , "table_name" , "row_name" , "row_id" , "new_value" , "date" , "users_id" ] ,
optionalfields : [ "old_value" ] ,
excludedfields : [ ] //Fields to not output in GET.
} ,
{
endpoint : "skill_tree_data" ,
requiredfields : [ "class_id" , "data" , "skill_data" , "line_color" , "line_width" , "gridsizex" , "gridsizey" , "gridpaddingx" , "gridpaddingy" , "halflineheight" ] ,
optionalfields : [ ] ,
excludedfields : [ ] //Fields to not output in GET.
} ,
{
endpoint : "site_data" ,
requiredfields : [ "name" , "data" ] ,
optionalfields : [ ] ,
excludedfields : [ ] //Fields to not output in GET.
}
]
const MAXATTEMPTS = 5
const LOCKOUTTIME = 60000
var failedattempts = 0
var lockedTime = new Date ( ) . getTime ( ) - LOCKOUTTIME //Starts unlocked
for ( var test of [ "" , "/test" ] ) {
app . post ( PREFIX + test + "/passwordcheck" , ( req , res ) => {
db4 . query ( 'select * from password where password=$1' , [ req . body . pass ] )
. then ( ( data ) => {
if ( data . rows . length > 0 ) {
res . status ( 200 ) . json ( { verified : true } )
} else {
var msg = "Could not authenticate!" ; res . status ( 500 ) . send ( msg ) ; throw msg
}
} )
. catch ( ( err ) => {
res . status ( 500 ) . send ( err . message )
} )
} )
app . get ( PREFIX + test + "/databases" , ( req , res ) => {
db4 . query ( 'select * from password where password=$1' , [ req . query . pass ] )
. then ( ( data ) => {
if ( data . rows . length > 0 ) {
return db . query ( 'select * from pg_database where datname like \'ngsplanner%\' order by datname desc limit 100' )
} else {
var msg = "Could not authenticate!" ; res . status ( 500 ) . send ( msg ) ; throw msg
}
} )
. then ( ( data ) => {
res . status ( 200 ) . json ( data . rows )
} )
. catch ( ( err ) => {
res . status ( 500 ) . send ( err . message )
} )
} )
app . post ( PREFIX + test + "/databases/restorefrombackup" , ( req , res ) => {
if ( req . body . database ) {
db4 . query ( 'select * from password where password=$1' , [ req . body . pass ] )
. then ( ( data ) => {
if ( data . rows . length > 0 ) {
return db3 . query ( 'select * from pg_database where datname=$1' , [ req . body . database ] )
} else {
var msg = "Could not authenticate!" ; res . status ( 500 ) . send ( msg ) ; throw msg
}
} )
. then ( ( data ) => {
if ( data . rows . length > 0 ) {
db . end ( ( ) => { } )
return db3 . query ( 'select pg_terminate_backend (pid) from pg_stat_activity where pg_stat_activity.datname=\'ngsplanner\'' )
} else {
var msg = "Could not find requested database " + req . body . database ; res . status ( 500 ) . send ( msg ) ; throw msg
}
} )
. then ( ( ) => {
return db3 . query ( 'drop database ngsplanner' )
} )
. then ( ( ) => {
return db3 . query ( 'create database ngsplanner with template ' + req . body . database )
} )
. then ( ( ) => {
db = new Pool ( {
user : 'postgres' ,
password : '' ,
host : 'postgres' ,
database : 'ngsplanner' ,
port : 5432 ,
} )
res . status ( 200 ) . send ( "Done!" )
} )
. catch ( ( err ) => {
console . log ( err . message )
res . status ( 500 ) . send ( err . message )
} )
} else {
res . status ( 500 ) . send ( "Invalid data!" )
}
} )
app . post ( PREFIX + test + "/databases/testtolive" , ( req , res ) => {
db4 . query ( 'select * from password where password=$1' , [ req . body . pass ] )
. then ( ( data ) => {
if ( data . rows . length > 0 ) {
db . end ( ( ) => { } )
db2 . end ( ( ) => { } )
return db3 . query ( 'select pg_terminate_backend (pid) from pg_stat_activity where pg_stat_activity.datname=\'ngsplanner\' or pg_stat_activity.datname=\'ngsplanner2\'' )
} else {
var msg = "Could not authenticate!" ; res . status ( 500 ) . send ( msg ) ; throw msg
}
} )
. then ( ( ) => {
return db3 . query ( 'drop database ngsplanner' )
} )
. then ( ( ) => {
return db3 . query ( 'create database ngsplanner with template ngsplanner2' )
} )
. then ( ( ) => {
db = new Pool ( {
user : 'postgres' ,
password : '' ,
host : 'postgres' ,
database : 'ngsplanner' ,
port : 5432 ,
} )
db2 = new Pool ( {
user : 'postgres' ,
password : '' ,
host : 'postgres' ,
database : 'ngsplanner2' ,
port : 5432 ,
} )
res . status ( 200 ) . send ( "Done!" )
} )
. catch ( ( err ) => {
console . log ( err . message )
res . status ( 500 ) . send ( err . message )
} )
} )
app . post ( PREFIX + test + "/databases/livetotest" , ( req , res ) => {
db4 . query ( 'select * from password where password=$1' , [ req . body . pass ] )
. then ( ( data ) => {
if ( data . rows . length > 0 ) {
db . end ( ( ) => { } )
db2 . end ( ( ) => { } )
return db3 . query ( 'select pg_terminate_backend (pid) from pg_stat_activity where pg_stat_activity.datname=\'ngsplanner\' or pg_stat_activity.datname=\'ngsplanner2\'' )
} else {
var msg = "Could not authenticate!" ; res . status ( 500 ) . send ( msg ) ; throw msg
}
} )
. then ( ( ) => {
return db3 . query ( 'drop database ngsplanner2' )
} )
. then ( ( ) => {
return db3 . query ( 'create database ngsplanner2 with template ngsplanner' )
} )
. then ( ( ) => {
db = new Pool ( {
user : 'postgres' ,
password : '' ,
host : 'postgres' ,
database : 'ngsplanner' ,
port : 5432 ,
} )
db2 = new Pool ( {
user : 'postgres' ,
password : '' ,
host : 'postgres' ,
database : 'ngsplanner2' ,
port : 5432 ,
} )
res . status ( 200 ) . send ( "Done!" )
} )
. catch ( ( err ) => {
res . status ( 500 ) . send ( err . message )
} )
} )
app . post ( PREFIX + test + "/databases/backup" , ( req , res ) => {
var date = new Date ( )
db4 . query ( 'select * from password where password=$1' , [ req . body . pass ] )
. then ( ( data ) => {
if ( data . rows . length > 0 ) {
db . end ( ( ) => { } )
return db3 . query ( 'select pg_terminate_backend (pid) from pg_stat_activity where pg_stat_activity.datname=\'ngsplanner\'' )
} else {
var msg = "Could not authenticate!" ; res . status ( 500 ) . send ( msg ) ; throw msg
}
} )
. then ( ( ) => {
return db3 . query ( 'create database ngsplanner' + String ( date . getFullYear ( ) ) . padStart ( 4 , '0' ) + String ( date . getMonth ( ) ) . padStart ( 2 , '0' ) + String ( date . getDate ( ) ) . padStart ( 2 , '0' ) + String ( date . getHours ( ) ) . padStart ( 2 , '0' ) + String ( date . getMinutes ( ) ) . padStart ( 2 , '0' ) + String ( date . getSeconds ( ) ) . padStart ( 2 , '0' ) + ' with template ngsplanner' )
} )
. then ( ( ) => {
db = new Pool ( {
user : 'postgres' ,
password : '' ,
host : 'postgres' ,
database : 'ngsplanner' ,
port : 5432 ,
} )
res . status ( 200 ) . send ( "Done!" )
} )
. catch ( ( err ) => {
res . status ( 500 ) . send ( err . message )
} )
} )
}
function CreateDynamicEndpoints ( ) {
ENDPOINTDATA . forEach ( ( endpoint ) => {
app . get ( PREFIX + "/" + endpoint . endpoint , ( req , res ) => {
db4 . query ( 'select * from password where password=$1' , [ req . query . pass ] )
. then ( ( data ) => {
if ( data . rows . length > 0 ) {
if ( endpoint . requiredfields . includes ( "name" ) ) {
db . query ( 'select distinct on (name) name,* from ' + endpoint . endpoint + ' order by name,id desc' )
. then ( ( data ) => {
res . status ( 200 ) . json ( { fields : data . fields , rows : data . rows } )
} )
. catch ( ( err ) => {
res . status ( 500 ) . send ( err . message )
} )
} else {
db . query ( 'select * from ' + endpoint . endpoint + " order by id desc" )
. then ( ( data ) => {
res . status ( 200 ) . json ( { fields : data . fields , rows : data . rows } )
} )
. catch ( ( err ) => {
res . status ( 500 ) . send ( err . message )
} )
}
} else {
res . status ( 500 ) . send ( "Could not authenticate!" )
}
} )
} )
app . post ( PREFIX + "/" + endpoint . endpoint , async ( req , res ) => {
db4 . query ( 'select * from password where password=$1' , [ req . body . pass ] )
. then ( async ( data ) => {
if ( data . rows . length > 0 ) {
var allExist = true
endpoint . requiredfields . forEach ( ( field ) => {
if ( ! ( field in req . body ) ) {
allExist = false ;
}
} )
if ( ! allExist ) {
res . status ( 300 ) . send ( "Required fields are: " + endpoint . requiredfields . filter ( ( field ) => ! ( field in req . body ) ) . join ( ',' ) )
return
}
var combinedfields = [ ... endpoint . requiredfields , ... endpoint . optionalfields , ... endpoint . excludedfields ]
//console.log(combinedfields)
var all _filled _fields = combinedfields . filter ( ( field ) => ( field in req . body ) )
var requiresInsert = true
if ( endpoint . requiredfields . includes ( "name" ) ) {
await db . query ( 'update ' + endpoint . endpoint + ' set ' + all _filled _fields . map ( ( field , i ) => {
if ( ! field . includes ( "_id" ) ) { return field + "=$" + ( i + 1 ) } else {
if ( Number . isNaN ( Number ( req . body [ field ] ) ) ) { return field + "=(select id from " + field . replace ( "_id" , "" ) + " where name=$" + ( i + 1 ) + ")" } else { return field + "=$" + ( i + 1 ) }
} } ) . join ( "," ) + ' where name=$' + ( all _filled _fields . length + 1 ) + ' returning *' , [ ... all _filled _fields . map ( ( field ) => typeof req . body [ field ] === 'string' ? req . body [ field ] . trim ( ) : req . body [ field ] ) , req . body [ "name" ] ] )
. then ( ( data ) => {
if ( data . rows . length === 0 ) {
requiresInsert = true
} else {
requiresInsert = false
res . status ( 200 ) . json ( data . rows )
}
} )
. catch ( ( err ) => {
res . status ( 500 ) . send ( err . message )
} )
}
if ( requiresInsert ) {
db . query ( 'insert into ' + endpoint . endpoint + "(" + all _filled _fields . join ( ',' ) + ") values(" + all _filled _fields . map ( ( field , i ) => {
if ( ! field . includes ( "_id" ) ) { return "$" + ( i + 1 ) } else {
if ( Number . isNaN ( Number ( req . body [ field ] ) ) ) { return "(select id from " + field . replace ( "_id" , "" ) + " where name=$" + ( i + 1 ) + ")" } else { return "$" + ( i + 1 ) }
} } ) . join ( "," ) + ") returning *" , all _filled _fields . map ( ( field ) => typeof req . body [ field ] === 'string' ? req . body [ field ] . trim ( ) : req . body [ field ] ) )
. then ( ( data ) => {
res . status ( 200 ) . json ( data . rows )
} )
. catch ( ( err ) => {
res . status ( 500 ) . send ( err . message )
} )
} app . post ( PREFIX + "/" + endpoint . endpoint , async ( req , res ) => {
db4 . query ( 'select * from password where password=$1' , [ req . body . pass ] )
. then ( async ( data ) => {
if ( data . rows . length > 0 ) {
var allExist = true
endpoint . requiredfields . forEach ( ( field ) => {
if ( ! ( field in req . body ) ) {
allExist = false ;
}
} )
if ( ! allExist ) {
res . status ( 300 ) . send ( "Required fields are: " + endpoint . requiredfields . filter ( ( field ) => ! ( field in req . body ) ) . join ( ',' ) )
return
}
var combinedfields = [ ... endpoint . requiredfields , ... endpoint . optionalfields , ... endpoint . excludedfields ]
//console.log(combinedfields)
var all _filled _fields = combinedfields . filter ( ( field ) => ( field in req . body ) )
var requiresInsert = true
if ( endpoint . requiredfields . includes ( "name" ) ) {
await db . query ( 'update ' + endpoint . endpoint + ' set ' + all _filled _fields . map ( ( field , i ) => {
if ( ! field . includes ( "_id" ) ) { return field + "=$" + ( i + 1 ) } else {
if ( Number . isNaN ( Number ( req . body [ field ] ) ) ) { return field + "=(select id from " + field . replace ( "_id" , "" ) + " where name=$" + ( i + 1 ) + ")" } else { return field + "=$" + ( i + 1 ) }
} } ) . join ( "," ) + ' where name=$' + ( all _filled _fields . length + 1 ) + ' returning *' , [ ... all _filled _fields . map ( ( field ) => typeof req . body [ field ] === 'string' ? req . body [ field ] . trim ( ) : req . body [ field ] ) , req . body [ "name" ] ] )
. then ( ( data ) => {
if ( data . rows . length === 0 ) {
requiresInsert = true
} else {
requiresInsert = false
res . status ( 200 ) . json ( data . rows )
}
} )
. catch ( ( err ) => {
res . status ( 500 ) . send ( err . message )
} )
}
if ( requiresInsert ) {
db . query ( 'insert into ' + endpoint . endpoint + "(" + all _filled _fields . join ( ',' ) + ") values(" + all _filled _fields . map ( ( field , i ) => {
if ( ! field . includes ( "_id" ) ) { return "$" + ( i + 1 ) } else {
if ( Number . isNaN ( Number ( req . body [ field ] ) ) ) { return "(select id from " + field . replace ( "_id" , "" ) + " where name=$" + ( i + 1 ) + ")" } else { return "$" + ( i + 1 ) }
} } ) . join ( "," ) + ") returning *" , all _filled _fields . map ( ( field ) => typeof req . body [ field ] === 'string' ? req . body [ field ] . trim ( ) : req . body [ field ] ) )
. then ( ( data ) => {
res . status ( 200 ) . json ( data . rows )
} )
. catch ( ( err ) => {
res . status ( 500 ) . send ( err . message )
} )
}
} else {
res . status ( 500 ) . send ( "Could not authenticate!" )
}
} )
} )
} else {
res . status ( 500 ) . send ( "Could not authenticate!" )
}
} )
} )
app . patch ( PREFIX + "/" + endpoint . endpoint , ( req , res ) => {
if ( req . body . id ) {
db4 . query ( 'select * from password where password=$1' , [ req . body . pass ] )
. then ( ( data ) => {
if ( data . rows . length > 0 ) {
var combinedfields = [ ... endpoint . requiredfields , ... endpoint . optionalfields , ... endpoint . excludedfields ]
//console.log(combinedfields)
var all _filled _fields = combinedfields . filter ( ( field ) => ( field in req . body ) )
return db . query ( 'update ' + endpoint . endpoint + ' set ' + all _filled _fields . map ( ( field , i ) => field + "=$" + ( i + 1 ) ) . join ( "," ) + " where id=$" + ( all _filled _fields . length + 1 ) + " returning *" , [ ... all _filled _fields . map ( ( field ) => typeof req . body [ field ] === 'string' ? req . body [ field ] . trim ( ) : req . body [ field ] ) , req . body . id ] )
} else {
var msg = "Could not authenticate!" ; res . status ( 500 ) . send ( msg ) ; throw msg
}
} )
. then ( ( data ) => {
res . status ( 200 ) . json ( data . rows )
} )
. catch ( ( err ) => {
res . status ( 500 ) . send ( err . message )
} )
} else {
res . status ( 300 ) . send ( "Invalid query!" )
}
} )
app . delete ( PREFIX + "/" + endpoint . endpoint , ( req , res ) => {
if ( req . body . id ) {
db4 . query ( 'select * from password where password=$1' , [ req . body . pass ] )
. then ( ( data ) => {
if ( data . rows . length > 0 ) {
return db . query ( 'delete from ' + endpoint . endpoint + ' where id=$1 returning *' , [ req . body . id ] )
} else {
var msg = "Could not authenticate!" ; res . status ( 500 ) . send ( msg ) ; throw msg
}
} )
. then ( ( data ) => {
res . status ( 200 ) . json ( data . rows )
} )
. catch ( ( err ) => {
res . status ( 500 ) . send ( err . message )
} )
} else {
res . status ( 300 ) . send ( "Invalid query!" )
}
} )
app . get ( PREFIX + "/test/" + endpoint . endpoint , ( req , res ) => {
db4 . query ( 'select * from password where password=$1' , [ req . query . pass ] )
. then ( ( data ) => {
if ( data . rows . length > 0 ) {
if ( endpoint . requiredfields . includes ( "name" ) ) {
db2 . query ( 'select distinct on (name) name,* from ' + endpoint . endpoint + ' order by name,id desc' )
. then ( ( data ) => {
res . status ( 200 ) . json ( { fields : data . fields , rows : data . rows } )
} )
. catch ( ( err ) => {
res . status ( 500 ) . send ( err . message )
} )
} else {
db2 . query ( 'select * from ' + endpoint . endpoint + " order by id desc" )
. then ( ( data ) => {
res . status ( 200 ) . json ( { fields : data . fields , rows : data . rows } )
} )
. catch ( ( err ) => {
res . status ( 500 ) . send ( err . message )
} )
}
} else {
res . status ( 500 ) . send ( "Could not authenticate!" )
}
} )
} )
app . post ( PREFIX + "/test/" + endpoint . endpoint , async ( req , res ) => {
db4 . query ( 'select * from password where password=$1' , [ req . body . pass ] )
. then ( async ( data ) => {
if ( data . rows . length > 0 ) {
var allExist = true
endpoint . requiredfields . forEach ( ( field ) => {
if ( ! ( field in req . body ) ) {
allExist = false ;
}
} )
if ( ! allExist ) {
res . status ( 300 ) . send ( "Required fields are: " + endpoint . requiredfields . filter ( ( field ) => ! ( field in req . body ) ) . join ( ',' ) )
return
}
var combinedfields = [ ... endpoint . requiredfields , ... endpoint . optionalfields , ... endpoint . excludedfields ]
//console.log(combinedfields)
var all _filled _fields = combinedfields . filter ( ( field ) => ( field in req . body ) )
var requiresInsert = true
if ( endpoint . requiredfields . includes ( "name" ) ) {
await db2 . query ( 'update ' + endpoint . endpoint + ' set ' + all _filled _fields . map ( ( field , i ) => field + "=$" + ( i + 1 ) ) . join ( "," ) + ' where name=$' + ( all _filled _fields . length + 1 ) + ' returning *' , [ ... all _filled _fields . map ( ( field ) => typeof req . body [ field ] === 'string' ? req . body [ field ] . trim ( ) : req . body [ field ] ) , req . body [ "name" ] ] )
. then ( ( data ) => {
if ( data . rows . length === 0 ) {
requiresInsert = true
} else {
requiresInsert = false
res . status ( 200 ) . json ( data . rows )
}
} )
. catch ( ( err ) => {
res . status ( 500 ) . send ( err . message )
} )
}
if ( requiresInsert ) {
db2 . query ( 'insert into ' + endpoint . endpoint + "(" + all _filled _fields . join ( ',' ) + ") values(" + all _filled _fields . map ( ( field , i ) => "$" + ( i + 1 ) ) . join ( "," ) + ") returning *" , all _filled _fields . map ( ( field ) => typeof req . body [ field ] === 'string' ? req . body [ field ] . trim ( ) : req . body [ field ] ) )
. then ( ( data ) => {
res . status ( 200 ) . json ( data . rows )
} )
. catch ( ( err ) => {
res . status ( 500 ) . send ( err . message )
} )
}
} else {
res . status ( 500 ) . send ( "Could not authenticate!" )
}
} )
} )
app . patch ( PREFIX + "/test/" + endpoint . endpoint , ( req , res ) => {
if ( req . body . id ) {
db4 . query ( 'select * from password where password=$1' , [ req . body . pass ] )
. then ( ( data ) => {
if ( data . rows . length > 0 ) {
var combinedfields = [ ... endpoint . requiredfields , ... endpoint . optionalfields , ... endpoint . excludedfields ]
//console.log(combinedfields)
var all _filled _fields = combinedfields . filter ( ( field ) => ( field in req . body ) )
return db2 . query ( 'update ' + endpoint . endpoint + ' set ' + all _filled _fields . map ( ( field , i ) => field + "=$" + ( i + 1 ) ) . join ( "," ) + " where id=$" + ( all _filled _fields . length + 1 ) + " returning *" , [ ... all _filled _fields . map ( ( field ) => typeof req . body [ field ] === 'string' ? req . body [ field ] . trim ( ) : req . body [ field ] ) , req . body . id ] )
} else {
var msg = "Could not authenticate!" ; res . status ( 500 ) . send ( msg ) ; throw msg
}
} )
. then ( ( data ) => {
res . status ( 200 ) . json ( data . rows )
} )
. catch ( ( err ) => {
res . status ( 500 ) . send ( err . message )
} )
} else {
res . status ( 300 ) . send ( "Invalid query!" )
}
} )
app . delete ( PREFIX + "/test/" + endpoint . endpoint , ( req , res ) => {
if ( req . body . id ) {
db4 . query ( 'select * from password where password=$1' , [ req . body . pass ] )
. then ( ( data ) => {
if ( data . rows . length > 0 ) {
return db2 . query ( 'delete from ' + endpoint . endpoint + ' where id=$1 returning *' , [ req . body . id ] )
} else {
var msg = "Could not authenticate!" ; res . status ( 500 ) . send ( msg ) ; throw msg
}
} )
. then ( ( data ) => {
res . status ( 200 ) . json ( data . rows )
} )
. catch ( ( err ) => {
res . status ( 500 ) . send ( err . message )
} )
} else {
res . status ( 300 ) . send ( "Invalid query!" )
}
} )
} )
}
function CleanUp ( arr , vals ) {
return arr . map ( ( arrVal ) => {
vals . forEach ( ( val ) => {
arrVal [ val ] = undefined
} )
return arrVal
} )
}
app . get ( PREFIX + '/data' , async ( req , res ) => {
var finalresult = { }
var promises = [ ]
for ( var endpoint of ENDPOINTDATA ) {
if ( endpoint . endpoint !== "builds" && endpoint . endpoint !== "users" ) {
if ( endpoint . requiredfields . includes ( "name" ) ) {
await db . query ( 'select * from (select distinct on (name) name,* from ' + endpoint . endpoint + ' order by name,id desc)t order by id asc' )
. then ( ( data ) => {
finalresult [ endpoint . endpoint ] = { }
data . rows . forEach ( ( val ) => { finalresult [ endpoint . endpoint ] [ val . name ] = val } )
} )
} else {
await db . query ( 'select * from ' + endpoint . endpoint + " order by id desc" )
. then ( ( data ) => {
finalresult [ endpoint . endpoint ] = data . rows
} )
}
}
}
res . status ( 200 ) . json ( finalresult )
} )
app . get ( PREFIX + '/test/data' , async ( req , res ) => {
var finalresult = { }
var promises = [ ]
for ( var endpoint of ENDPOINTDATA ) {
if ( endpoint . endpoint !== "builds" && endpoint . endpoint !== "users" ) {
if ( endpoint . requiredfields . includes ( "name" ) ) {
await db2 . query ( 'select distinct on (name) name,* from ' + endpoint . endpoint + ' order by name,id desc' )
. then ( ( data ) => {
finalresult [ endpoint . endpoint ] = { }
data . rows . forEach ( ( val ) => { finalresult [ endpoint . endpoint ] [ val . name ] = val } )
} )
} else {
await db2 . query ( 'select * from ' + endpoint . endpoint + " order by id desc" )
. then ( ( data ) => {
finalresult [ endpoint . endpoint ] = data . rows
} )
}
}
}
res . status ( 200 ) . json ( finalresult )
} )
app . get ( PREFIX + '/dataid' , async ( req , res ) => {
var finalresult = { }
var promises = [ ]
for ( var endpoint of ENDPOINTDATA ) {
if ( endpoint . endpoint !== "builds" && endpoint . endpoint !== "users" ) {
await db . query ( 'select * from ' + endpoint . endpoint + ' order by id asc' )
. then ( ( data ) => {
finalresult [ endpoint . endpoint ] = { }
data . rows . forEach ( ( val ) => { finalresult [ endpoint . endpoint ] [ val . id ] = val } )
} )
}
}
res . status ( 200 ) . json ( finalresult )
} )
app . get ( PREFIX + '/test/dataid' , async ( req , res ) => {
var finalresult = { }
var promises = [ ]
for ( var endpoint of ENDPOINTDATA ) {
if ( endpoint . endpoint !== "builds" && endpoint . endpoint !== "users" ) {
await db2 . query ( 'select * from ' + endpoint . endpoint + ' order by id asc' )
. then ( ( data ) => {
finalresult [ endpoint . endpoint ] = { }
data . rows . forEach ( ( val ) => { finalresult [ endpoint . endpoint ] [ val . id ] = val } )
} )
}
}
res . status ( 200 ) . json ( finalresult )
} )
app . post ( PREFIX + "/validUser" , ( req , res ) => {
//console.log(sh.SecretHash("098f6bcd4621d373cade4e832627b4f6"))
db . query ( 'select * from users where username=$1 and password_hash=$2 limit 1' , [ req . body . username , sh . SecretHash ( req . body . password ) ] )
. then ( ( data ) => {
if ( data . rows . length > 0 ) {
res . status ( 200 ) . json ( { verified : true } )
} else {
res . status ( 200 ) . json ( { verified : false } )
}
} )
. catch ( ( err ) => {
res . status ( 500 ) . send ( err . message )
} )
} )
app . post ( PREFIX + "/saveskilltree" , ( req , res ) => {
db4 . query ( 'select * from password where password=$1' , [ req . body . pass ] )
. then ( ( data ) => {
if ( data . rows . length > 0 ) {
return db . query ( 'select * from skill_tree_data where class_id=$1 limit 1' , [ req . body . class _id ] )
} else {
var msg = "Could not authenticate!" ; res . status ( 500 ) . send ( msg ) ; throw msg
}
} )
. then ( ( data ) => {
if ( data . rows . length > 0 ) {
return db . query ( 'update skill_tree_data set data=$1,skill_data=$2,line_color=$3,line_width=$4,gridsizex=$5,gridsizey=$6,gridpaddingx=$7,gridpaddingy=$8,halflineheight=$9 where class_id=$10' ,
[ req . body . data , req . body . skill _data , req . body . line _color , req . body . line _width , req . body . gridsizex , req . body . gridsizey , req . body . gridpaddingx , req . body . gridpaddingy , req . body . halflineheight , req . body . class _id ] )
} else {
return db . query ( 'insert into skill_tree_data(data,skill_data,line_color,line_width,gridsizex,gridsizey,gridpaddingx,gridpaddingy,class_id,halflineheight) values($1,$2,$3,$4,$5,$6,$7,$8,$10,$9)' ,
[ req . body . data , req . body . skill _data , req . body . line _color , req . body . line _width , req . body . gridsizex , req . body . gridsizey , req . body . gridpaddingx , req . body . gridpaddingy , req . body . halflineheight , req . body . class _id ] )
}
} )
. then ( ( data ) => {
res . status ( 200 ) . send ( "OK!" )
} )
. catch ( ( err ) => {
res . status ( 500 ) . send ( err . message )
} )
} )
app . post ( PREFIX + "/test/saveskilltree" , ( req , res ) => {
db4 . query ( 'select * from password where password=$1' , [ req . body . pass ] )
. then ( ( data ) => {
if ( data . rows . length > 0 ) {
return db2 . query ( 'select * from skill_tree_data where class_id=$1 limit 1' , [ req . body . class _id ] )
} else {
var msg = "Could not authenticate!" ; res . status ( 500 ) . send ( msg ) ; throw msg
}
} )
. then ( ( data ) => {
if ( data . rows . length > 0 ) {
return db2 . query ( 'update skill_tree_data set data=$1,skill_data=$2,line_color=$3,line_width=$4,gridsizex=$5,gridsizey=$6,gridpaddingx=$7,gridpaddingy=$8,halflineheight=$9 where class_id=$10' ,
[ req . body . data , req . body . skill _data , req . body . line _color , req . body . line _width , req . body . gridsizex , req . body . gridsizey , req . body . gridpaddingx , req . body . gridpaddingy , req . body . halflineheight , req . body . class _id ] )
} else {
return db2 . query ( 'insert into skill_tree_data(data,skill_data,line_color,line_width,gridsizex,gridsizey,gridpaddingx,gridpaddingy,class_id,halflineheight) values($1,$2,$3,$4,$5,$6,$7,$8,$10,$9)' ,
[ req . body . data , req . body . skill _data , req . body . line _color , req . body . line _width , req . body . gridsizex , req . body . gridsizey , req . body . gridpaddingx , req . body . gridpaddingy , req . body . halflineheight , req . body . class _id ] )
}
} )
. then ( ( data ) => {
res . status ( 200 ) . send ( "OK!" )
} )
. catch ( ( err ) => {
res . status ( 500 ) . send ( err . message )
} )
} )
function submitBuild ( req , res , db , send ) {
if ( req . body . id ) {
db . query ( 'select users.username from builds join users on users_id=users.id where builds.id=$1' , [ req . body . id ] )
. then ( ( data ) => {
console . log ( data . rows )
if ( data . rows . length > 0 && data . rows [ 0 ] . username === req . body . username ) {
return db . query ( 'update builds set creator=$1,build_name=$2,class1=(SELECT id from class WHERE name=$3 limit 1),class2=(SELECT id from class WHERE name=$4 limit 1),last_modified=$5,data=$6 where id=$7 returning id' , [ req . body . creator , req . body . build _name , req . body . class1 , req . body . class2 , new Date ( ) , req . body . data , req . body . id ] )
. then ( ( data ) => {
if ( send ) {
res . status ( 200 ) . send ( data . rows [ 0 ] )
}
} )
. catch ( ( err ) => {
console . log ( err . message )
if ( send ) {
res . status ( 500 ) . send ( err . message )
}
} )
} else {
return db . query ( 'insert into builds(users_id,creator,build_name,class1,class2,created_on,last_modified,likes,data,editors_choice) values((SELECT id from users WHERE username=$1 limit 1),$2,$3,(SELECT id from class WHERE name=$4 limit 1),(SELECT id from class WHERE name=$5 limit 1),$6,$7,$8,$9,$10) returning id' , [ req . body . username , req . body . creator , req . body . build _name , req . body . class1 , req . body . class2 , new Date ( ) , new Date ( ) , 0 , req . body . data , 0 ] )
. then ( ( data ) => {
if ( send ) {
res . status ( 200 ) . send ( data . rows [ 0 ] )
}
} )
. catch ( ( err ) => {
console . log ( err . message )
if ( send ) {
res . status ( 500 ) . send ( err . message )
}
} )
}
} )
. catch ( ( err ) => {
console . log ( err . message )
if ( send ) {
res . status ( 500 ) . send ( err . message )
}
} )
} else {
db . query ( 'insert into builds(users_id,creator,build_name,class1,class2,created_on,last_modified,likes,data,editors_choice) values((SELECT id from users WHERE username=$1 limit 1),$2,$3,(SELECT id from class WHERE name=$4 limit 1),(SELECT id from class WHERE name=$5 limit 1),$6,$7,$8,$9,$10) returning id' , [ req . body . username , req . body . creator , req . body . build _name , req . body . class1 , req . body . class2 , new Date ( ) , new Date ( ) , 0 , req . body . data , 0 ] )
. then ( ( data ) => {
if ( send ) {
res . status ( 200 ) . send ( data . rows [ 0 ] )
}
} )
. catch ( ( err ) => {
console . log ( err . message )
if ( send ) {
res . status ( 500 ) . send ( err . message )
}
} )
}
}
app . post ( PREFIX + "/submitBuild" , ( req , res ) => {
submitBuild ( req , res , db , true )
submitBuild ( req , res , db2 , false )
} )
app . post ( PREFIX + "/test/submitBuild" , ( req , res ) => {
submitBuild ( req , res , db , true )
submitBuild ( req , res , db2 , false )
} )
//Generates our table schema:
ENDPOINTDATA . forEach ( ( endpoint ) => {
console . log ( endpoint . endpoint + ":\n\t" + endpoint . requiredfields . join ( '\t' ) + ( endpoint . optionalfields . length > 0 ? "\t" : "" ) + endpoint . optionalfields . join ( "\t" ) )
} )
CreateDynamicEndpoints ( )