2017-02-24 22:54:59 +01:00
|
|
|
var jsonServer = require('json-server');
|
|
|
|
var jwt = require('jsonwebtoken'); // used to create, sign, and verify tokens
|
|
|
|
var bodyParser = require('body-parser');
|
|
|
|
|
|
|
|
|
|
|
|
// Returns an Express server
|
|
|
|
var server = jsonServer.create();
|
|
|
|
server.set('superSecret', "mpwctmwprtwptwcwetr"); // secret variable
|
|
|
|
|
|
|
|
// Set default middlewares (logger, static, cors and no-cache)
|
|
|
|
server.use(jsonServer.defaults())
|
|
|
|
server.use(bodyParser.urlencoded({extended: false}));
|
|
|
|
server.use(bodyParser.json());
|
|
|
|
|
|
|
|
var http = require('http').Server(server);
|
|
|
|
|
|
|
|
var db = 'db.json';
|
|
|
|
var secured = false;
|
|
|
|
|
|
|
|
var args = process.argv.slice(2);
|
|
|
|
args.forEach(function (val, index, array) {
|
|
|
|
if (val) {
|
|
|
|
var splitted = val.split("=");
|
|
|
|
if (splitted.length == 2){
|
|
|
|
var key = splitted[0];
|
|
|
|
var value = splitted[1];
|
|
|
|
if (key == 'db') {
|
|
|
|
db = value;
|
|
|
|
}
|
|
|
|
if (key == 'secured') {
|
|
|
|
secured = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
var router = jsonServer.router(db);
|
|
|
|
|
|
|
|
server.use('/api', router);
|
|
|
|
|
|
|
|
var io = require('socket.io')(3001);
|
|
|
|
var _socketMap = {};
|
|
|
|
io.on('connection', function (socket) {
|
|
|
|
_socketMap[socket.id] = socket;
|
|
|
|
socket.on('broadcast_task', function (data) {
|
|
|
|
for (var socketKey in _socketMap) {
|
|
|
|
var broadcastTo = _socketMap[socketKey];
|
|
|
|
if (socket.id !== broadcastTo.id) {
|
|
|
|
broadcastTo.emit('task_saved', data)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
router.render = function (req, res, next) {
|
|
|
|
res.header('Access-Control-Expose-Headers', 'Content-Type, Location,Content-Length');
|
|
|
|
res.jsonp(res.locals.data);
|
|
|
|
};
|
|
|
|
|
|
|
|
server.listen(3000);
|
|
|
|
|
|
|
|
if (secured) {
|
|
|
|
|
|
|
|
server.post('/auth', function (req, res) {
|
|
|
|
var password = req.body.password;
|
|
|
|
var user = {
|
|
|
|
name: req.body.name,
|
2017-03-13 04:12:18 +01:00
|
|
|
password: req.body.password
|
2017-02-24 22:54:59 +01:00
|
|
|
};
|
|
|
|
if (password === "s3cret") {
|
|
|
|
var token = jwt.sign(user, server.get('superSecret'), {
|
|
|
|
expiresInMinutes: 1440 // expires in 24 hours
|
|
|
|
});
|
|
|
|
|
|
|
|
res.json({
|
|
|
|
success: true,
|
|
|
|
message: 'Enjoy your token!',
|
|
|
|
token: token
|
|
|
|
});
|
|
|
|
} else {
|
|
|
|
res.json({success: false, message: 'Authentication failed. User not found.'});
|
|
|
|
}
|
|
|
|
|
|
|
|
});
|
|
|
|
|
|
|
|
router.render = function (req, res, next) {
|
|
|
|
res.header('Access-Control-Expose-Headers', 'Content-Type, Location,Content-Length');
|
|
|
|
|
|
|
|
// check header or url parameters or post parameters for token
|
|
|
|
var token = req.body.token || req.query.token || req.headers['x-access-token'];
|
|
|
|
|
|
|
|
// decode token
|
|
|
|
if (token) {
|
|
|
|
|
|
|
|
// verifies secret and checks exp
|
|
|
|
jwt.verify(token, server.get('superSecret'), function (err, decoded) {
|
|
|
|
if (err) {
|
|
|
|
return res.json({success: false, message: 'Failed to authenticate token.'});
|
|
|
|
} else {
|
|
|
|
// if everything is good, save to request for use in other routes
|
|
|
|
req.decoded = decoded;
|
|
|
|
res.jsonp(res.locals.data)
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
} else {
|
|
|
|
// if there is no token
|
|
|
|
// return an error
|
|
|
|
return res.status(403).send({
|
|
|
|
success: false,
|
|
|
|
message: 'No token provided.'
|
|
|
|
});
|
|
|
|
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
}
|