Spaces:
Sleeping
Sleeping
| import os | |
| import json | |
| import uuid | |
| import datetime | |
| import pandas as pd | |
| from flask import Flask, request, jsonify | |
| from flask_cors import CORS | |
| from werkzeug.utils import secure_filename | |
| from flask_apscheduler import APScheduler | |
| import firebase_admin | |
| from firebase_admin import credentials, db, auth as firebase_auth | |
| from resend import Emails | |
| import logging | |
| from logging.handlers import RotatingFileHandler | |
| import time # <-- ADDED IMPORT | |
| import random # <-- ADDED IMPORT | |
| from datetime import datetime # <-- ADDED IMPORT FOR CONVENIENCE | |
| # === Logging Configuration === | |
| # Configure logging | |
| if not os.path.exists('logs'): | |
| os.mkdir('logs') | |
| # Create a custom logger | |
| logger = logging.getLogger('guards_api') | |
| logger.setLevel(logging.DEBUG) # Capture DEBUG and above | |
| # Create handlers | |
| file_handler = RotatingFileHandler('logs/guards_api.log', maxBytes=10240, backupCount=10) | |
| file_handler.setFormatter(logging.Formatter( | |
| '%(asctime)s %(levelname)s: %(message)s [in %(pathname)s:%(lineno)d]' | |
| )) | |
| file_handler.setLevel(logging.INFO) # File logs INFO and above | |
| console_handler = logging.StreamHandler() | |
| console_handler.setFormatter(logging.Formatter('%(levelname)s: %(message)s')) | |
| console_handler.setLevel(logging.DEBUG) # Console logs DEBUG and above | |
| # Add handlers to the logger | |
| logger.addHandler(file_handler) | |
| logger.addHandler(console_handler) | |
| # Also configure the root logger for Flask's default messages | |
| root_logger = logging.getLogger() | |
| root_logger.setLevel(logging.INFO) | |
| root_logger.addHandler(file_handler) | |
| root_logger.addHandler(console_handler) | |
| # === ENV Config === | |
| RESEND_API_KEY = os.getenv("RESEND_API_KEY") | |
| FIREBASE_CRED_JSON = json.loads(os.getenv("FIREBASE")) | |
| FIREBASE_DB_URL = os.getenv("Firebase_DB") | |
| ADMIN_EMAILS = ["rairorr@gmail.com", "nharingosheperd@gmail.com"] | |
| logger.info("Environment variables loaded.") | |
| logger.debug(f"FIREBASE_DB_URL: {FIREBASE_DB_URL}") | |
| # === Firebase Init === | |
| try: | |
| cred = credentials.Certificate(FIREBASE_CRED_JSON) | |
| firebase_admin.initialize_app(cred, { | |
| "databaseURL": FIREBASE_DB_URL | |
| }) | |
| logger.info("Firebase Admin initialized successfully.") | |
| except Exception as e: | |
| logger.error(f"Failed to initialize Firebase Admin: {e}") | |
| raise | |
| admin_emails = [ | |
| "rairorr@gmail.com", | |
| "nharingosheperd@gmail.com" | |
| ] | |
| for email in admin_emails: | |
| key = email.replace("@", "_").replace(".", "_") | |
| try: | |
| db.reference(f"admins/{key}").set({ | |
| "email": email, | |
| "is_admin": True | |
| }) | |
| logger.info(f"✅ Admin {email} added/updated in database.") | |
| except Exception as e: | |
| logger.error(f"Failed to add admin {email} to database: {e}") | |
| # === Flask App Setup === | |
| app = Flask(__name__) | |
| CORS(app) | |
| logger.info("Flask app initialized.") | |
| # === APScheduler Setup === | |
| class Config(object): | |
| SCHEDULER_API_ENABLED = True | |
| app.config.from_object(Config()) | |
| scheduler = APScheduler() | |
| scheduler.init_app(app) | |
| scheduler.start() | |
| logger.info("APScheduler initialized and started.") | |
| # === Resend Init === | |
| Emails.api_key = RESEND_API_KEY | |
| logger.info("Resend API key configured.") | |
| def send_email(to, subject, html): | |
| try: | |
| response = Emails.send({ | |
| "from": "Admin <admin@resend.dev>", | |
| "to": to, | |
| "subject": subject, | |
| "html": html | |
| }) | |
| # Check for None response, which might indicate an issue not raising an exception | |
| if response is None: | |
| logger.warning(f"Email API returned None for recipient {to}. Check Resend dashboard for suppression or other issues.") | |
| return None | |
| logger.info(f"Email sent successfully to {to}. Response: {response}") | |
| return response | |
| except Exception as e: | |
| logger.error(f"Email error to {to}: {e}") | |
| return None | |
| # === REFACTORED FUNCTION (send_rotation_notification) === | |
| def send_rotation_notification(job_id, shift_record): | |
| """Send email notification for rotation to all admins with rate-limiting prevention""" | |
| try: | |
| job_ref = db.reference(f"jobs/{job_id}") | |
| job_data = job_ref.get() | |
| if not job_data: | |
| logger.warning(f"Job {job_id} not found for rotation notification.") | |
| return | |
| job_name = job_data.get("name", "Unknown Job") | |
| shift_number = shift_record.get("shift_number", "Unknown") | |
| # --- DATE/TIME FORMATTING REFACTOR --- | |
| try: | |
| # Parse ISO string and format into a human-readable string | |
| assigned_time_iso = shift_record.get('assigned_at', '') | |
| dt_object = datetime.fromisoformat(assigned_time_iso) | |
| human_readable_time = dt_object.strftime("%B %d, %Y at %I:%M %p UTC") | |
| except (ValueError, TypeError): | |
| human_readable_time = shift_record.get('assigned_at', 'Unknown') | |
| # --- EMAIL CONTENT REFACTOR --- | |
| html_content = f""" | |
| <h2>Guard Rotation Notification</h2> | |
| <p><strong>Job:</strong> {job_name}</p> | |
| <p><strong>Job ID:</strong> {job_id}</p> | |
| <p><strong>Shift Number:</strong> {shift_number}</p> | |
| <p><strong>Rotation Time:</strong> {human_readable_time}</p> | |
| <h3>Assignments:</h3> | |
| <table border="1" style="border-collapse: collapse; width: 100%;"> | |
| <thead> | |
| <tr> | |
| <th>Guarding Point</th> | |
| <th>Assigned Members</th> | |
| <th>Special Case</th> | |
| </tr> | |
| </thead> | |
| <tbody> | |
| """ | |
| for assignment in shift_record.get("assignments", []): | |
| point_name = assignment.get("point", {}).get("name", "Unknown Point") | |
| # Create a list of member names for the point | |
| assigned_members = assignment.get("members", []) | |
| member_names = [member.get("name", "Unknown Member") for member in assigned_members] | |
| members_html = "<br>".join(member_names) if member_names else "None" | |
| is_special = "Yes" if assignment.get("is_special_case", False) else "No" | |
| html_content += f""" | |
| <tr> | |
| <td>{point_name}</td> | |
| <td>{members_html}</td> | |
| <td>{is_special}</td> | |
| </tr> | |
| """ | |
| html_content += """ | |
| </tbody> | |
| </table> | |
| <p><em>This is an automated notification from the Guard Rotation System.</em></p> | |
| """ | |
| # Send email to all admin emails | |
| subject = f"Guard Rotation - {job_name} (Shift {shift_number})" | |
| for admin_email in ADMIN_EMAILS: | |
| logger.info(f"Sending rotation notification to {admin_email}...") | |
| send_email(admin_email, subject, html_content) | |
| # --- RATE LIMIT PREVENTION --- | |
| time.sleep(1) # Add a 1-second delay between sending emails | |
| except Exception as e: | |
| logger.error(f"Error sending rotation notification for job {job_id}: {e}") | |
| # === Auth Middleware === | |
| def verify_token(req): | |
| auth_header = req.headers.get("Authorization") | |
| user_email = req.headers.get("X-User-Email") | |
| if not auth_header: | |
| print("Authorization header missing.") | |
| return None | |
| if not user_email: | |
| logging.info("X-User-Email header missing from request.") | |
| return None | |
| if user_email not in ADMIN_EMAILS: | |
| logging.info(f"Email {user_email} from X-User-Email header not found in ADMIN_EMAILS list.") | |
| return None | |
| try: | |
| if auth_header.startswith("Bearer "): | |
| token = auth_header[7:].strip() | |
| else: | |
| token = auth_header.strip() | |
| decoded = firebase_auth.verify_id_token(token) | |
| logging.info(f"User with email {user_email} (UID: {decoded.get('uid')}) is authorized as admin (email in ADMIN_EMAILS).") | |
| return decoded | |
| except Exception as e: | |
| print(f"Unexpected error during token verification: {e}") | |
| return None | |
| # === Admin Setup (Legacy - kept for compatibility) === | |
| def setup_admins(): | |
| ref = db.reference("admins") | |
| for email in ADMIN_EMAILS: | |
| uid = f"admin_{email.replace('@', '_').replace('.', '_')}" | |
| ref.child(uid).set({"email": email, "is_admin": True}) | |
| setup_admins() | |
| # === Core Functions === | |
| # === REFACTORED FUNCTION (assign_roster) === | |
| def assign_roster(job_id): | |
| """Assign roster for a job - implements the multi-guard rotation algorithm""" | |
| try: | |
| logger.info(f"Starting roster assignment for job {job_id}") | |
| job_ref = db.reference(f"jobs/{job_id}") | |
| job_data = job_ref.get() | |
| if not job_data: | |
| logger.error(f"Job {job_id} not found") | |
| return | |
| if job_data.get("status") != "active": | |
| logger.info(f"Job {job_id} is not active (status: {job_data.get('status')}), skipping assignment.") | |
| return | |
| guarding_points = job_data.get("guarding_points", []) | |
| assigned_members = job_data.get("assigned_members", []) | |
| if not guarding_points: | |
| logger.warning(f"No guarding points defined for job {job_id}") | |
| return | |
| if not assigned_members: | |
| logger.warning(f"No members assigned to job {job_id}") | |
| return | |
| # --- ALGORITHM REFACTOR --- | |
| # 1. Prepare for the new shift | |
| shift_number = len(job_data.get("assignments", [])) + 1 | |
| shift_assignments = [] | |
| # Create a shuffled, available list of members for this specific shift. | |
| # This ensures fairness and prevents a guard from being assigned to multiple points in one shift. | |
| available_for_shift_members = random.sample(assigned_members, len(assigned_members)) | |
| total_guards_required = sum(point.get('guards', 1) for point in guarding_points) | |
| if len(available_for_shift_members) < total_guards_required: | |
| logger.error(f"Not enough members ({len(available_for_shift_members)}) to fill all points ({total_guards_required}) for job {job_id}. Aborting shift creation.") | |
| # OPTIONAL: Send an alert email to admins here about guard shortage. | |
| return | |
| logger.info(f"Applying standard rotation for job {job_id}, shift {shift_number}") | |
| # 2. Loop through each point and assign the required number of unique guards | |
| for point in guarding_points: | |
| guards_for_point = [] | |
| num_guards_required = point.get('guards', 1) # Get required guards from point data, default to 1 | |
| # Assign the required number of guards to this point | |
| for _ in range(num_guards_required): | |
| if not available_for_shift_members: | |
| logger.warning(f"Ran out of available members while assigning to point {point.get('name')}") | |
| break | |
| selected_member = available_for_shift_members.pop(0) | |
| guards_for_point.append(selected_member) | |
| if guards_for_point: | |
| shift_assignments.append({ | |
| "point": point, | |
| "members": guards_for_point, # Key changed from "member" to "members" | |
| "is_special_case": False | |
| }) | |
| # 3. Update database and send notification | |
| if shift_assignments: | |
| shift_record = { | |
| "shift_number": shift_number, | |
| "assigned_at": datetime.now().isoformat(), | |
| "assignments": shift_assignments, | |
| "shift_id": str(uuid.uuid4()) | |
| } | |
| current_assignments = job_data.get("assignments", []) | |
| current_assignments.append(shift_record) | |
| job_ref.update({ | |
| "assignments": current_assignments, | |
| "last_updated": datetime.now().isoformat() | |
| }) | |
| logger.info(f"Shift {shift_number} assigned for job {job_id} with {len(shift_assignments)} point assignments.") | |
| send_rotation_notification(job_id, shift_record) | |
| rotation_period = job_data.get("rotation_period", 28800) | |
| next_run_time = datetime.now() + datetime.timedelta(seconds=rotation_period) | |
| scheduler.add_job( | |
| func=assign_roster, | |
| trigger="date", | |
| run_date=next_run_time, | |
| args=[job_id], | |
| id=f"rotate_{job_id}_{uuid.uuid4().hex[:8]}" | |
| ) | |
| logger.info(f"Scheduled next rotation for job {job_id} in {rotation_period} seconds.") | |
| else: | |
| logger.error(f"No assignments were created for job {job_id}, shift {shift_number}.") | |
| except Exception as e: | |
| logger.error(f"Error in assign_roster for job {job_id}: {e}", exc_info=True) | |
| def check_and_rotate_guards(): | |
| """Periodic function to check jobs and rotate guards""" | |
| try: | |
| logger.debug("🔍 Checking for guard rotations...") | |
| jobs_ref = db.reference("jobs") | |
| jobs = jobs_ref.get() | |
| if not jobs: | |
| logger.debug("No jobs found") | |
| return | |
| for job_id, job_data in jobs.items(): | |
| logger.debug(f"Evaluating job {job_id} for rotation...") | |
| if job_data.get("status") != "active": | |
| logger.debug(f"Job {job_id} is not active, skipping.") | |
| continue | |
| assignments = job_data.get("assignments", []) | |
| if not assignments: | |
| logger.debug(f"Job {job_id} has no assignments yet, not started.") | |
| continue | |
| last_assignment = assignments[-1] | |
| try: | |
| assigned_at_str = last_assignment.get("assigned_at", "") | |
| assigned_at = datetime.fromisoformat(assigned_at_str.replace("Z", "+00:00")) | |
| except (ValueError, TypeError): | |
| logger.warning(f"Could not parse assigned_at time for job {job_id}: {last_assignment.get('assigned_at')}") | |
| continue | |
| now = datetime.now(assigned_at.tzinfo) | |
| rotation_period = job_data.get("rotation_period", 28800) | |
| time_since_last_assignment = (now - assigned_at).total_seconds() | |
| logger.debug(f"Job {job_id}: Last assignment was {time_since_last_assignment:.0f}s ago. Period is {rotation_period}s.") | |
| if time_since_last_assignment > rotation_period: | |
| logger.info(f"Rotating guards for job {job_id} based on interval check.") | |
| assign_roster(job_id) | |
| else: | |
| logger.debug(f"Job {job_id} not due for rotation yet.") | |
| except Exception as e: | |
| logger.error(f"Error in check_and_rotate_guards: {e}", exc_info=True) | |
| # === Routes with Logging === | |
| def log_request_info(): | |
| """Log incoming request details.""" | |
| logger.info(f"Incoming request: {request.method} {request.url}") | |
| logger.debug(f"Headers: {dict(request.headers)}") | |
| def home(): | |
| """Simple health check or API root endpoint.""" | |
| return jsonify({"message": "Rairo Guards API is running.", "status": "ok"}), 200 | |
| def log_response_info(response): | |
| """Log outgoing response details.""" | |
| logger.info(f"Outgoing response: {response.status} for {request.method} {request.url}") | |
| return response | |
| def upload_members(): | |
| logger.info("Handling /upload_members request") | |
| user = verify_token(request) | |
| if not user: | |
| logger.warning("Unauthorized access attempt to /upload_members") | |
| return jsonify({"error": "Unauthorized"}), 401 | |
| file = request.files.get("file") | |
| if not file: | |
| logger.warning("No file uploaded in /upload_members request") | |
| return jsonify({"error": "No file uploaded"}), 400 | |
| try: | |
| df = pd.read_csv(file) if file.filename.endswith(".csv") else pd.read_excel(file) | |
| members = df.to_dict(orient="records") | |
| logger.info(f"Processing {len(members)} members from uploaded file.") | |
| for member in members: | |
| member_id = str(uuid.uuid4()) | |
| db.reference(f"members/{member_id}").set(member) | |
| logger.info("Members uploaded successfully.") | |
| return jsonify({"message": "Members uploaded successfully"}), 200 | |
| except Exception as e: | |
| logger.error(f"Error processing uploaded members file: {e}", exc_info=True) | |
| return jsonify({"error": "Error processing file"}), 500 | |
| def add_member(): | |
| logger.info("Handling /add_member request") | |
| user = verify_token(request) | |
| if not user: | |
| logger.warning("Unauthorized access attempt to /add_member") | |
| return jsonify({"error": "Unauthorized"}), 401 | |
| data = request.json | |
| logger.debug(f"Adding member with data: {data}") | |
| member_id = str(uuid.uuid4()) | |
| try: | |
| db.reference(f"members/{member_id}").set(data) | |
| logger.info(f"Member added successfully with ID: {member_id}") | |
| return jsonify({"message": "Member added", "member_id": member_id}), 200 | |
| except Exception as e: | |
| logger.error(f"Error adding member {member_id}: {e}", exc_info=True) | |
| return jsonify({"error": "Internal server error"}), 500 | |
| def update_member(member_id): | |
| logger.info(f"Handling /update_member/{member_id} request") | |
| user = verify_token(request) | |
| if not user: | |
| logger.warning(f"Unauthorized access attempt to /update_member/{member_id}") | |
| return jsonify({"error": "Unauthorized"}), 401 | |
| data = request.json | |
| if not data: | |
| logger.warning(f"Update member request for {member_id} has no JSON body.") | |
| return jsonify({"error": "Request body cannot be empty"}), 400 | |
| logger.debug(f"Updating member {member_id} with data: {data}") | |
| member_ref = db.reference(f"members/{member_id}") | |
| if not member_ref.get(): | |
| logger.warning(f"Attempted to update non-existent member {member_id}") | |
| return jsonify({"error": "Member not found"}), 404 | |
| try: | |
| member_ref.update(data) | |
| logger.info(f"Member {member_id} updated successfully.") | |
| updated_data = {**data, "id": member_id} | |
| return jsonify({"message": "Member updated", "member": updated_data}), 200 | |
| except Exception as e: | |
| logger.error(f"Error updating member {member_id}: {e}", exc_info=True) | |
| return jsonify({"error": "Internal server error"}), 500 | |
| def delete_member(member_id): | |
| logger.info(f"Handling /delete_member/{member_id} request") | |
| user = verify_token(request) | |
| if not user: | |
| logger.warning(f"Unauthorized access attempt to /delete_member/{member_id}") | |
| return jsonify({"error": "Unauthorized"}), 401 | |
| member_ref = db.reference(f"members/{member_id}") | |
| if not member_ref.get(): | |
| logger.warning(f"Attempted to delete non-existent member {member_id}") | |
| return jsonify({"error": "Member not found"}), 404 | |
| try: | |
| member_ref.delete() | |
| logger.info(f"Member {member_id} deleted successfully.") | |
| return jsonify({"message": f"Member {member_id} deleted"}), 200 | |
| except Exception as e: | |
| logger.error(f"Error deleting member {member_id}: {e}", exc_info=True) | |
| return jsonify({"error": "Internal server error"}), 500 | |
| def create_job(): | |
| logger.info("Handling /create_job request") | |
| user = verify_token(request) | |
| if not user: | |
| logger.warning("Unauthorized access attempt to /create_job") | |
| return jsonify({"error": "Unauthorized"}), 401 | |
| data = request.json | |
| logger.debug(f"Creating job with data: {data}") | |
| job_id = str(uuid.uuid4()) | |
| guarding_points = data.get("guarding_points", []) | |
| if len(guarding_points) < 5 or len(guarding_points) > 15: | |
| logger.warning(f"Invalid number of guarding points ({len(guarding_points)}) for job creation.") | |
| return jsonify({"error": "Guarding points must be between 5 and 15"}), 400 | |
| for i, point in enumerate(guarding_points): | |
| if "id" not in point: | |
| point["id"] = f"point_{i+1}" | |
| job_data = { | |
| **data, | |
| "guarding_points": guarding_points, | |
| "created_at": datetime.now().isoformat(), | |
| "status": "created", | |
| "assignments": [], | |
| "rotation_history": {}, | |
| "rotation_period": data.get("rotation_period", 28800), | |
| "scheduled_start_time": data.get("scheduled_start_time"), | |
| "has_scheduled_rotation": False, | |
| "special_cases": data.get("special_cases", []) | |
| } | |
| try: | |
| db.reference(f"jobs/{job_id}").set(job_data) | |
| logger.info(f"Job created successfully with ID: {job_id}") | |
| return jsonify({"message": "Job created", "job_id": job_id}), 200 | |
| except Exception as e: | |
| logger.error(f"Error creating job {job_id}: {e}", exc_info=True) | |
| return jsonify({"error": "Internal server error"}), 500 | |
| def update_job(job_id): | |
| logger.info(f"Handling /update_job/{job_id} request") | |
| user = verify_token(request) | |
| if not user: | |
| logger.warning(f"Unauthorized access attempt to /update_job/{job_id}") | |
| return jsonify({"error": "Unauthorized"}), 401 | |
| data = request.json | |
| if not data: | |
| logger.warning(f"Update job request for {job_id} has no JSON body.") | |
| return jsonify({"error": "Request body cannot be empty"}), 400 | |
| logger.debug(f"Updating job {job_id} with data: {data}") | |
| job_ref = db.reference(f"jobs/{job_id}") | |
| if not job_ref.get(): | |
| logger.warning(f"Attempted to update non-existent job {job_id}") | |
| return jsonify({"error": "Job not found"}), 404 | |
| try: | |
| data.pop('assignments', None) | |
| data.pop('rotation_history', None) | |
| data.pop('status', None) | |
| job_ref.update(data) | |
| logger.info(f"Job {job_id} updated successfully.") | |
| return jsonify({"message": f"Job {job_id} updated"}), 200 | |
| except Exception as e: | |
| logger.error(f"Error updating job {job_id}: {e}", exc_info=True) | |
| return jsonify({"error": "Internal server error"}), 500 | |
| def schedule_job(job_id): | |
| logger.info(f"Handling /schedule_job/{job_id} request") | |
| user = verify_token(request) | |
| if not user: | |
| logger.warning(f"Unauthorized access attempt to /schedule_job/{job_id}") | |
| return jsonify({"error": "Unauthorized"}), 401 | |
| data = request.json | |
| start_time_iso = data.get("start_time") | |
| logger.debug(f"Scheduling job {job_id} with data: {data}") | |
| if not start_time_iso: | |
| logger.warning("start_time is required for scheduling job.") | |
| return jsonify({"error": "start_time is required (ISO format)"}), 400 | |
| job_ref = db.reference(f"jobs/{job_id}") | |
| if not job_ref.get(): | |
| logger.warning(f"Job {job_id} not found for scheduling.") | |
| return jsonify({"error": "Job not found"}), 404 | |
| try: | |
| start_time = datetime.fromisoformat(start_time_iso.replace("Z", "+00:00")) | |
| logger.debug(f"Parsed start time: {start_time}") | |
| except ValueError: | |
| logger.error(f"Invalid start_time format provided: {start_time_iso}") | |
| return jsonify({"error": "Invalid start_time format."}), 400 | |
| try: | |
| job_ref.update({ | |
| "scheduled_start_time": start_time_iso, | |
| "status": "scheduled" | |
| }) | |
| logger.info(f"Job {job_id} status updated to scheduled.") | |
| except Exception as e: | |
| logger.error(f"Error updating job {job_id} for scheduling: {e}", exc_info=True) | |
| return jsonify({"error": "Internal server error"}), 500 | |
| try: | |
| scheduler.add_job( | |
| func=start_scheduled_job, | |
| trigger="date", | |
| run_date=start_time, | |
| args=[job_id], | |
| id=f"start_{job_id}_{uuid.uuid4().hex[:8]}" | |
| ) | |
| logger.info(f"Job {job_id} scheduled to start at {start_time_iso}") | |
| return jsonify({"message": f"Job {job_id} scheduled to start at {start_time_iso}"}), 200 | |
| except Exception as e: | |
| logger.error(f"Error scheduling start job for {job_id}: {e}", exc_info=True) | |
| return jsonify({"error": "Failed to schedule job start"}), 500 | |
| def start_scheduled_job(job_id): | |
| """Function to start a scheduled job""" | |
| try: | |
| logger.info(f"Executing scheduled start for job {job_id}") | |
| job_ref = db.reference(f"jobs/{job_id}") | |
| if not job_ref.get(): | |
| logger.error(f"Job {job_id} not found for scheduled start") | |
| return | |
| job_ref.update({ | |
| "status": "active", | |
| "started_at": datetime.now().isoformat() | |
| }) | |
| logger.info(f"Job {job_id} status updated to active.") | |
| assign_roster(job_id) | |
| logger.info(f"Job {job_id} started via schedule") | |
| except Exception as e: | |
| logger.error(f"Error starting scheduled job {job_id}: {e}", exc_info=True) | |
| def start_job(job_id): | |
| logger.info(f"Handling /start_job/{job_id} request") | |
| user = verify_token(request) | |
| if not user: | |
| logger.warning(f"Unauthorized access attempt to /start_job/{job_id}") | |
| return jsonify({"error": "Unauthorized"}), 401 | |
| job_ref = db.reference(f"jobs/{job_id}") | |
| if not job_ref.get(): | |
| logger.warning(f"Job {job_id} not found for starting.") | |
| return jsonify({"error": "Job not found"}), 404 | |
| try: | |
| job_ref.update({ | |
| "status": "active", | |
| "started_at": datetime.now().isoformat() | |
| }) | |
| logger.info(f"Job {job_id} status updated to active.") | |
| except Exception as e: | |
| logger.error(f"Error updating job {job_id} to active: {e}", exc_info=True) | |
| return jsonify({"error": "Internal server error"}), 500 | |
| try: | |
| scheduler.add_job( | |
| func=assign_roster, | |
| trigger="date", | |
| run_date=datetime.now() + datetime.timedelta(seconds=5), | |
| args=[job_id], | |
| id=f"start_{job_id}_{uuid.uuid4().hex[:8]}" | |
| ) | |
| logger.info(f"First assignment for job {job_id} scheduled.") | |
| return jsonify({"message": f"Job {job_id} started"}), 202 | |
| except Exception as e: | |
| logger.error(f"Error scheduling first assignment for job {job_id}: {e}", exc_info=True) | |
| return jsonify({"error": "Failed to start job assignments"}), 500 | |
| def pause_job(job_id): | |
| logger.info(f"Handling /pause_job/{job_id} request") | |
| user = verify_token(request) | |
| if not user: | |
| logger.warning(f"Unauthorized access attempt to /pause_job/{job_id}") | |
| return jsonify({"error": "Unauthorized"}), 401 | |
| job_ref = db.reference(f"jobs/{job_id}") | |
| if not job_ref.get(): | |
| logger.warning(f"Job {job_id} not found for pausing.") | |
| return jsonify({"error": "Job not found"}), 404 | |
| try: | |
| job_ref.update({"status": "paused"}) | |
| logger.info(f"Job {job_id} status updated to paused.") | |
| return jsonify({"message": f"Job {job_id} paused"}), 200 | |
| except Exception as e: | |
| logger.error(f"Error pausing job {job_id}: {e}", exc_info=True) | |
| return jsonify({"error": "Internal server error"}), 500 | |
| def delete_job(job_id): | |
| logger.info(f"Handling /delete_job/{job_id} request") | |
| user = verify_token(request) | |
| if not user: | |
| logger.warning(f"Unauthorized access attempt to /delete_job/{job_id}") | |
| return jsonify({"error": "Unauthorized"}), 401 | |
| job_ref = db.reference(f"jobs/{job_id}") | |
| if not job_ref.get(): | |
| logger.warning(f"Job {job_id} not found for deletion.") | |
| return jsonify({"error": "Job not found"}), 404 | |
| try: | |
| job_ref.delete() | |
| logger.info(f"Job {job_id} deleted successfully.") | |
| return jsonify({"message": f"Job {job_id} deleted"}), 200 | |
| except Exception as e: | |
| logger.error(f"Error deleting job {job_id}: {e}", exc_info=True) | |
| return jsonify({"error": "Internal server error"}), 500 | |
| def get_jobs(): | |
| logger.info("Handling /jobs request") | |
| user = verify_token(request) | |
| if not user: | |
| logger.warning("Unauthorized access attempt to /jobs") | |
| return jsonify({"error": "Unauthorized"}), 401 | |
| try: | |
| jobs_ref = db.reference("jobs") | |
| jobs = jobs_ref.get() | |
| if not jobs: | |
| logger.debug("No jobs found in database.") | |
| return jsonify({"jobs": []}), 200 | |
| jobs_list = [] | |
| for job_id, job_data in jobs.items(): | |
| job_data["id"] = job_id | |
| jobs_list.append(job_data) | |
| logger.debug(f"Retrieved {len(jobs_list)} jobs.") | |
| return jsonify({"jobs": jobs_list}), 200 | |
| except Exception as e: | |
| logger.error(f"Error retrieving jobs: {e}", exc_info=True) | |
| return jsonify({"error": "Internal server error"}), 500 | |
| def get_job(job_id): | |
| logger.info(f"Handling /job/{job_id} request") | |
| user = verify_token(request) | |
| if not user: | |
| logger.warning(f"Unauthorized access attempt to /job/{job_id}") | |
| return jsonify({"error": "Unauthorized"}), 401 | |
| try: | |
| job_ref = db.reference(f"jobs/{job_id}") | |
| job_data = job_ref.get() | |
| if not job_data: | |
| logger.warning(f"Job {job_id} not found.") | |
| return jsonify({"error": "Job not found"}), 404 | |
| job_data["id"] = job_id | |
| logger.debug(f"Retrieved job {job_id}.") | |
| return jsonify({"job": job_data}), 200 | |
| except Exception as e: | |
| logger.error(f"Error retrieving job {job_id}: {e}", exc_info=True) | |
| return jsonify({"error": "Internal server error"}), 500 | |
| def get_members(): | |
| logger.info("Handling /members request") | |
| user = verify_token(request) | |
| if not user: | |
| logger.warning("Unauthorized access attempt to /members") | |
| return jsonify({"error": "Unauthorized"}), 401 | |
| try: | |
| members_ref = db.reference("members") | |
| members = members_ref.get() | |
| if not members: | |
| logger.debug("No members found in database.") | |
| return jsonify({"members": []}), 200 | |
| members_list = [] | |
| for member_id, member_data in members.items(): | |
| member_data["id"] = member_id | |
| members_list.append(member_data) | |
| logger.debug(f"Retrieved {len(members_list)} members.") | |
| return jsonify({"members": members_list}), 200 | |
| except Exception as e: | |
| logger.error(f"Error retrieving members: {e}", exc_info=True) | |
| return jsonify({"error": "Internal server error"}), 500 | |
| def assign_members_to_job(): | |
| logger.info("Handling /assign_members_to_job request") | |
| user = verify_token(request) | |
| if not user: | |
| logger.warning("Unauthorized access attempt to /assign_members_to_job") | |
| return jsonify({"error": "Unauthorized"}), 401 | |
| data = request.json | |
| job_id = data.get("job_id") | |
| member_ids = data.get("member_ids", []) | |
| logger.debug(f"Assigning members to job {job_id} with data: {data}") | |
| if not job_id or not member_ids: | |
| logger.warning("job_id and member_ids are required for member assignment.") | |
| return jsonify({"error": "job_id and member_ids are required"}), 400 | |
| job_ref = db.reference(f"jobs/{job_id}") | |
| if not job_ref.get(): | |
| logger.warning(f"Job {job_id} not found for member assignment.") | |
| return jsonify({"error": "Job not found"}), 404 | |
| try: | |
| members_ref = db.reference("members") | |
| all_members = members_ref.get() | |
| except Exception as e: | |
| logger.error(f"Error retrieving members for assignment to job {job_id}: {e}", exc_info=True) | |
| return jsonify({"error": "Internal server error"}), 500 | |
| if not all_members: | |
| logger.warning("No members found in database for assignment.") | |
| return jsonify({"error": "No members found"}), 404 | |
| selected_members = [] | |
| for member_id in member_ids: | |
| if member_id in all_members: | |
| member_data = all_members[member_id] | |
| member_data["id"] = member_id | |
| selected_members.append(member_data) | |
| if len(selected_members) < 25: | |
| logger.warning(f"Insufficient members ({len(selected_members)}) assigned to job {job_id}. Minimum is 25.") | |
| return jsonify({"error": "At least 25 members must be assigned to the job"}), 400 | |
| try: | |
| job_ref.update({"assigned_members": selected_members}) | |
| logger.info(f"{len(selected_members)} members assigned to job {job_id}.") | |
| return jsonify({ | |
| "message": f"{len(selected_members)} members assigned to job {job_id}", | |
| "assigned_members": selected_members | |
| }), 200 | |
| except Exception as e: | |
| logger.error(f"Error updating assigned members for job {job_id}: {e}", exc_info=True) | |
| return jsonify({"error": "Internal server error"}), 500 | |
| def update_job_settings(job_id): | |
| logger.info(f"Handling /update_job_settings/{job_id} request") | |
| user = verify_token(request) | |
| if not user: | |
| logger.warning(f"Unauthorized access attempt to /update_job_settings/{job_id}") | |
| return jsonify({"error": "Unauthorized"}), 401 | |
| data = request.json | |
| rotation_period = data.get("rotation_period") | |
| logger.debug(f"Updating settings for job {job_id} with data: {data}") | |
| if rotation_period is None: | |
| logger.warning("rotation_period is required for job settings update.") | |
| return jsonify({"error": "rotation_period is required (in seconds)"}), 400 | |
| job_ref = db.reference(f"jobs/{job_id}") | |
| if not job_ref.get(): | |
| logger.warning(f"Job {job_id} not found for settings update.") | |
| return jsonify({"error": "Job not found"}), 404 | |
| try: | |
| job_ref.update({"rotation_period": rotation_period}) | |
| logger.info(f"Job {job_id} rotation period updated to {rotation_period} seconds.") | |
| return jsonify({ | |
| "message": f"Job {job_id} rotation period updated to {rotation_period} seconds", | |
| "rotation_period": rotation_period | |
| }), 200 | |
| except Exception as e: | |
| logger.error(f"Error updating rotation period for job {job_id}: {e}", exc_info=True) | |
| return jsonify({"error": "Internal server error"}), 500 | |
| def add_special_case(job_id): | |
| logger.info(f"Handling /add_special_case/{job_id} request") | |
| user = verify_token(request) | |
| if not user: | |
| logger.warning(f"Unauthorized access attempt to /add_special_case/{job_id}") | |
| return jsonify({"error": "Unauthorized"}), 401 | |
| data = request.json | |
| point_id = data.get("point_id") | |
| member_id = data.get("member_id") | |
| reason = data.get("reason", "Special Assignment") | |
| shift_number = data.get("shift_number") | |
| active = data.get("active", False) | |
| logger.debug(f"Adding special case to job {job_id} with data: {data}") | |
| if not point_id or not member_id: | |
| logger.warning("point_id and member_id are required for special case.") | |
| return jsonify({"error": "point_id and member_id are required"}), 400 | |
| job_ref = db.reference(f"jobs/{job_id}") | |
| job_data = job_ref.get() | |
| if not job_data: | |
| logger.warning(f"Job {job_id} not found for special case addition.") | |
| return jsonify({"error": "Job not found"}), 404 | |
| guarding_points = job_data.get("guarding_points", []) | |
| assigned_members = job_data.get("assigned_members", []) | |
| point_exists = any(p["id"] == point_id for p in guarding_points) | |
| member_exists = any(m["id"] == member_id for m in assigned_members) | |
| if not point_exists: | |
| logger.warning(f"Guarding point {point_id} not found in job {job_id}.") | |
| return jsonify({"error": "Guarding point not found in job"}), 404 | |
| if not member_exists: | |
| logger.warning(f"Member {member_id} not assigned to job {job_id}.") | |
| return jsonify({"error": "Member not assigned to job"}), 404 | |
| special_case = { | |
| "id": str(uuid.uuid4()), | |
| "point_id": point_id, | |
| "member_id": member_id, | |
| "reason": reason, | |
| "shift_number": shift_number, | |
| "active": active, | |
| "created_at": datetime.now().isoformat() | |
| } | |
| special_cases = job_data.get("special_cases", []) | |
| special_cases.append(special_case) | |
| try: | |
| job_ref.update({"special_cases": special_cases}) | |
| logger.info(f"Special case added to job {job_id}.") | |
| return jsonify({ | |
| "message": "Special case added", | |
| "special_case": special_case | |
| }), 200 | |
| except Exception as e: | |
| logger.error(f"Error adding special case to job {job_id}: {e}", exc_info=True) | |
| return jsonify({"error": "Internal server error"}), 500 | |
| def get_roster(job_id): | |
| logger.info(f"Handling /get_roster/{job_id} request") | |
| user = verify_token(request) | |
| if not user: | |
| logger.warning(f"Unauthorized access attempt to /get_roster/{job_id}") | |
| return jsonify({"error": "Unauthorized"}), 401 | |
| try: | |
| job_ref = db.reference(f"jobs/{job_id}") | |
| job_data = job_ref.get() | |
| if not job_data: | |
| logger.warning(f"Job {job_id} not found for roster retrieval.") | |
| return jsonify({"error": "Job not found"}), 404 | |
| assignments = job_data.get("assignments", []) | |
| roster_data = [] | |
| for shift in assignments: | |
| shift_number = shift["shift_number"] | |
| assigned_at = shift["assigned_at"] | |
| for assignment in shift.get("assignments", []): | |
| member_names = [m.get("name", "Unknown") for m in assignment.get("members", [])] | |
| roster_data.append({ | |
| "shift_number": shift_number, | |
| "assigned_at": assigned_at, | |
| "point_name": assignment.get("point", {}).get("name", "Unknown"), | |
| "member_names": ", ".join(member_names), # Join names for display | |
| "is_special_case": assignment.get("is_special_case", False), | |
| }) | |
| logger.debug(f"Retrieved roster for job {job_id} with {len(roster_data)} entries.") | |
| return jsonify({ | |
| "roster": roster_data, | |
| "job_name": job_data.get("name", "Unknown Job"), | |
| "total_shifts": len(assignments) | |
| }), 200 | |
| except Exception as e: | |
| logger.error(f"Error retrieving roster for job {job_id}: {e}", exc_info=True) | |
| return jsonify({"error": "Internal server error"}), 500 | |
| # === Schedule periodic guard rotation === | |
| try: | |
| # This job checks for any rotations that might have been missed if the server restarted | |
| scheduler.add_job( | |
| func=check_and_rotate_guards, | |
| trigger="interval", | |
| minutes=5, | |
| id="guard_rotation_check_job", | |
| replace_existing=True | |
| ) | |
| logger.info("Scheduled periodic guard rotation check job.") | |
| except Exception as e: | |
| logger.error(f"Failed to schedule periodic guard rotation check: {e}", exc_info=True) | |
| # === Run Server === | |
| if __name__ == "__main__": | |
| logger.info("Starting Flask application...") | |
| app.run(debug=True, host="0.0.0.0", port=int(os.getenv("PORT", 7860))) |