def get_all_cases(request, console=None, equipment=None): """ This function will return all the cases :param console: Console name :param equipment: equipment name :param request: request django object :return: json response """ obj = None try: if request.method == GET_REQUEST: jwt_value = _TokenValidation().validate_token(request) if jwt_value: obj = GetCases(console, equipment) return obj.get_cases_values() else: return JsonResponse({MESSAGE_KEY: "FORBIDDEN ERROR"}, status=HTTP_403_FORBIDDEN) log_debug(METHOD_NOT_ALLOWED) return JsonResponse({MESSAGE_KEY: METHOD_NOT_ALLOWED}, status=HTTP_405_METHOD_NOT_ALLOWED) except jwt.ExpiredSignatureError: token = request.META[HTTP_AUTHORIZATION_TOKEN].split(" ")[1] return JsonResponse({MESSAGE_KEY: "Token Expired"}, status=HTTP_401_UNAUTHORIZED) except Exception as e: return error_instance(e) finally: if obj: del obj
def update_algorithm_params(request, algorithm_name): """ This function will update the algorithm with the passed json values. :param request: request django object :param algorithm_name : this either can be none or else it will have the algorithm name :return: json response """ obj = None try: if request.method == PUT_REQUEST: request_payload = json.loads(request.body.decode(UTF8_FORMAT)) jwt_value = _TokenValidation().validate_token(request) if jwt_value: obj = UpdateAlgorithmParams(request_payload, algorithm_name) return obj.update_algorithms() else: return JsonResponse({MESSAGE_KEY: "FORBIDDEN ERROR"}, status=HTTP_403_FORBIDDEN) log_debug(METHOD_NOT_ALLOWED) return JsonResponse({MESSAGE_KEY: METHOD_NOT_ALLOWED}, status=HTTP_405_METHOD_NOT_ALLOWED) except jwt.ExpiredSignatureError: token = request.META[HTTP_AUTHORIZATION_TOKEN].split(" ")[1] return JsonResponse({MESSAGE_KEY: "Token Expired"}, status=HTTP_401_UNAUTHORIZED) except Exception as e: return error_instance(e) finally: if obj: del obj
def get_algorithm_list(request, algorithm_name=None): """ This function will return the algorithm list and will return error if generated. :param request: request django object :param algorithm_name : this either can be none or else it will have the algorithm name :return: json response """ obj = None try: if request.method == GET_REQUEST: jwt_value = _TokenValidation().validate_token(request) if jwt_value: obj = AllAlgorithmList() if algorithm_name: return obj.get_algorithms_by_name_and_type(algorithm_name) else: return obj.get_algorithm_list() else: return JsonResponse({MESSAGE_KEY: "FORBIDDEN ERROR"}, status=HTTP_403_FORBIDDEN) log_debug(METHOD_NOT_ALLOWED) return JsonResponse({MESSAGE_KEY: METHOD_NOT_ALLOWED}, status=HTTP_405_METHOD_NOT_ALLOWED) except jwt.ExpiredSignatureError: token = request.META[HTTP_AUTHORIZATION_TOKEN].split(" ")[1] return JsonResponse({MESSAGE_KEY: "Token Expired"}, status=HTTP_401_UNAUTHORIZED) except Exception as e: return error_instance(e) finally: if obj: del obj
def get_non_furnace(request): """ :param request: request django object :return: json response """ obj = None furnaces = None obj = query_params = None try: if request.method == GET_REQUEST: jwt_value = _TokenValidation().validate_token(request) if jwt_value: obj = lbt_non_furnace(furnaces) return obj.get_furnaces() else: return JsonResponse({MESSAGE_KEY: "FORBIDDEN ERROR"}, status=HTTP_403_FORBIDDEN) log_debug(METHOD_NOT_ALLOWED) return JsonResponse({MESSAGE_KEY: METHOD_NOT_ALLOWED}, status=HTTP_405_METHOD_NOT_ALLOWED) except jwt.ExpiredSignatureError: token = request.META[HTTP_AUTHORIZATION_TOKEN].split(" ")[1] return JsonResponse({MESSAGE_KEY: "Token Expired"}, status=HTTP_401_UNAUTHORIZED) except Exception as e: return error_instance(e) finally: if obj: del obj
def get_gap_analysis_overview_details_data(request): """ :param request: request django object :return: json response """ obj = None obj = query_params = None try: if request.method == GET_REQUEST: jwt_value = _TokenValidation().validate_token(request) parameter = str(request.GET.get("basis")) if jwt_value: obj = gap_analysis_overview_details() return obj.get_overview_details_data(parameter) else: return JsonResponse({MESSAGE_KEY: "FORBIDDEN ERROR"}, status=HTTP_403_FORBIDDEN) log_debug(METHOD_NOT_ALLOWED) return JsonResponse({MESSAGE_KEY: METHOD_NOT_ALLOWED}, status=HTTP_405_METHOD_NOT_ALLOWED) except jwt.ExpiredSignatureError as e: token = request.META[HTTP_AUTHORIZATION_TOKEN].split(" ")[1] return JsonResponse({MESSAGE_KEY: "Token Expired"}, status=HTTP_401_UNAUTHORIZED) except Exception as e: return error_instance(e) finally: if obj: del obj
def upload_algorithm_file(request, algorithm_name): """ This function will upload csv and xml files, file name and description and will return error if generated. :param request: request django object :param algorithm_name : this will have the algorithm name :return: json response """ obj = None try: if request.method == POST_REQUEST: jwt_value = _TokenValidation().validate_token(request) if jwt_value: obj = UploadAlgorithmFile(request.FILES.getlist('files'), algorithm_name, request.POST.get('description'), request.POST.get('file_names')) return obj.upload_file() else: return JsonResponse({MESSAGE_KEY: "FORBIDDEN ERROR"}, status=HTTP_403_FORBIDDEN) log_debug(METHOD_NOT_ALLOWED) return JsonResponse({MESSAGE_KEY: METHOD_NOT_ALLOWED}, status=HTTP_405_METHOD_NOT_ALLOWED) except jwt.ExpiredSignatureError: token = request.META[HTTP_AUTHORIZATION_TOKEN].split(" ")[1] return JsonResponse({MESSAGE_KEY: "Token Expired"}, status=HTTP_401_UNAUTHORIZED) except Exception as e: return error_instance(e) finally: if obj: del obj
def update_price_input_data(request): """ :param request: request django object :return: json response """ obj = None obj = query_params = None try: if request.method == PUT_REQUEST: request_payload = json.loads(request.body.decode(UTF8_FORMAT)) jwt_value = _TokenValidation().validate_token(request) if jwt_value: obj = update_price(request_payload) return obj.update_price_input() else: return JsonResponse({MESSAGE_KEY: "FORBIDDEN ERROR"}, status=HTTP_403_FORBIDDEN) log_debug(METHOD_NOT_ALLOWED) return JsonResponse({MESSAGE_KEY: METHOD_NOT_ALLOWED}, status=HTTP_405_METHOD_NOT_ALLOWED) except jwt.ExpiredSignatureError as e: token = request.META[HTTP_AUTHORIZATION_TOKEN].split(" ")[1] return JsonResponse({MESSAGE_KEY: "Token Expired"}, status=HTTP_401_UNAUTHORIZED) except Exception as e: return error_instance(e) finally: if obj: del obj
def get_equipment_plant_performance_tracker_data(request, unit_name=None, console_name=None, equipment_name=None): # *args, **kwargs """ This function will return the Instrument drift features value :param unit_name: unit name :param console_name: Console name :param equipment_name: equipment name :param request: request django object :return: json response """ query_params = obj = None try: if InputValidation.df[ (InputValidation.df.unit_name == unit_name) & (InputValidation.df.console_name == console_name) & ( InputValidation.df.equipment_tag_name == equipment_name)].empty: return JsonResponse( {MESSAGE_KEY: "This {} or {} or {} is not registered with us !".format(unit_name, console_name, equipment_name)}, safe=False, status=HTTP_404_NOT_FOUND) except Exception as e: log_error("Exception due to : %s" + str(e)) return JsonResponse({MESSAGE_KEY: EXCEPTION_CAUSE.format(str(e))}, safe=False, status=HTTP_500_INTERNAL_SERVER_ERROR) try: query_params = {"start_date": request.GET["start_date"], "end_date": request.GET["end_date"]} except: pass try: if request.method == GET_REQUEST: jwt_value = _TokenValidation().validate_token(request) if jwt_value: obj = PlantPerformanceTracker(query_params, unit_name, console_name, equipment_name) return obj.get_values() else: return JsonResponse({MESSAGE_KEY: "FORBIDDEN ERROR"}, status=HTTP_403_FORBIDDEN) log_debug(METHOD_NOT_ALLOWED) return JsonResponse({MESSAGE_KEY: METHOD_NOT_ALLOWED}, status=HTTP_405_METHOD_NOT_ALLOWED) except jwt.ExpiredSignatureError: token = request.META[HTTP_AUTHORIZATION_TOKEN].split(" ")[1] return JsonResponse({MESSAGE_KEY: "Token Expired"}, status=HTTP_401_UNAUTHORIZED) except Exception as e: return error_instance(e) finally: if obj: del obj
def create_user(request): """ This function will crete a new user :param request: request django object :return: json object """ obj = None try: if request.method == POST_REQUEST: jwt_value = _TokenValidation().validate_token(request) loggedin_user_details = _TokenValidation.validate_token(request) r_name = loggedin_user_details['role'] names = ['superadmin', 'admin'] if r_name in names: if loggedin_user_details: request_payload = _RequestValidation().validate_request( request, [ USERFIRSTNAME_KEY, USERMIDDLENAME_KEY, USERLASTNAME_KEY, USEREMAIL_KEY, USERPASSWORD_KEY, GENDER_KEY, AGE_KEY, PHONE_KEY, ADDRESS_KEY, STATUS_KEY, ROLE_ID ]) if jwt_value: obj = CreateUser(loggedin_user_details, request_payload) return obj.add_user() else: return JsonResponse({MESSAGE_KEY: "FORBIDDEN ERROR"}, status=HTTP_403_FORBIDDEN) else: return JsonResponse({MESSAGE_KEY: "Bad request"}, status=HTTP_400_BAD_REQUEST) log_debug(METHOD_NOT_ALLOWED) return JsonResponse({MESSAGE_KEY: METHOD_NOT_ALLOWED}, status=HTTP_405_METHOD_NOT_ALLOWED) except jwt.ExpiredSignatureError: token = request.META[HTTP_AUTHORIZATION_TOKEN].split(" ")[1] return JsonResponse({MESSAGE_KEY: "Token Expired"}, status=HTTP_401_UNAUTHORIZED) except Exception as e: return error_instance(e) finally: if obj: del obj
def get_namings_data(request): """ This function will return all the console name and equipment name :param request: request django object :return: json response """ obj = None try: if request.method == GET_REQUEST: jwt_value = _TokenValidation().validate_token(request) get_value = 0 if jwt_value['role'] in ['superadmin', 'admin', 'engineer']: get_value = 0 elif jwt_value['loggedin_useremail'] in ['*****@*****.**']: get_value = 1 elif jwt_value['loggedin_useremail'] in ['*****@*****.**']: get_value = 2 elif jwt_value['loggedin_useremail'] in ['*****@*****.**']: get_value = 3 elif jwt_value['loggedin_useremail'] in ['*****@*****.**']: get_value = 4 if jwt_value: obj = GetNamings(get_value) return obj.get_names_values() else: return JsonResponse({MESSAGE_KEY: "FORBIDDEN ERROR"}, status=HTTP_403_FORBIDDEN) log_debug(METHOD_NOT_ALLOWED) return JsonResponse({MESSAGE_KEY: METHOD_NOT_ALLOWED}, status=HTTP_405_METHOD_NOT_ALLOWED) except jwt.ExpiredSignatureError: token = request.META[HTTP_AUTHORIZATION_TOKEN].split(" ")[1] return JsonResponse({MESSAGE_KEY: "Token Expired"}, status=HTTP_401_UNAUTHORIZED) except Exception as e: return error_instance(e) finally: if obj: del obj
def get_unit_equipments_details(request, unit_name=None): """ This function will return the unit level overview :param unit_name: unit name :param request: request django object :return: json response """ obj = None try: if InputValidation.df[InputValidation.df.unit_name == unit_name].empty: return JsonResponse({MESSAGE_KEY: "This {} is not registered with us !".format(unit_name)}, safe=False, status=HTTP_404_NOT_FOUND) except Exception as e: log_error("Exception due to : %s" + str(e)) return JsonResponse({MESSAGE_KEY: EXCEPTION_CAUSE.format(str(e))}, safe=False, status=HTTP_500_INTERNAL_SERVER_ERROR) try: if request.method == GET_REQUEST: jwt_value = _TokenValidation().validate_token(request) if jwt_value['role'] not in ['superadmin', 'admin', 'engineer']: return JsonResponse({MESSAGE_KEY: ROLE_PERMISSION}, status=HTTP_403_FORBIDDEN) if jwt_value: obj = UnitLevelFeatures(unit_name, jwt_value) return obj.get_values() else: return JsonResponse({MESSAGE_KEY: "FORBIDDEN ERROR"}, status=HTTP_403_FORBIDDEN) log_debug(METHOD_NOT_ALLOWED) return JsonResponse({MESSAGE_KEY: METHOD_NOT_ALLOWED}, status=HTTP_405_METHOD_NOT_ALLOWED) except jwt.ExpiredSignatureError: token = request.META[HTTP_AUTHORIZATION_TOKEN].split(" ")[1] return JsonResponse({MESSAGE_KEY: "Token Expired"}, status=HTTP_401_UNAUTHORIZED) except Exception as e: return error_instance(e) finally: if obj: del obj
def put_lbt_equipment_update(request): """ :param request: request django object :param equipment: equipment name will be provided :param feed_name: feed name will be provided :param is_active: is_active name will be provided :return: json response """ obj = query_params = None try: query_params = { EQUIPMENT: request.GET[EQUIPMENT], FEED_NAME: request.GET[FEED_NAME], IS_ACTIVE: request.GET[IS_ACTIVE] } except: pass try: if request.method == PUT_REQUEST: jwt_value = _TokenValidation().validate_token(request) if jwt_value: obj = lbt_equipment_update(query_params, json.loads(request.body)) return obj.get_update_equip_query() else: return JsonResponse({MESSAGE_KEY: "FORBIDDEN ERROR"}, status=HTTP_403_FORBIDDEN) log_debug(METHOD_NOT_ALLOWED) return JsonResponse({MESSAGE_KEY: METHOD_NOT_ALLOWED}, status=HTTP_405_METHOD_NOT_ALLOWED) except jwt.ExpiredSignatureError: token = request.META[HTTP_AUTHORIZATION_TOKEN].split(" ")[1] return JsonResponse({MESSAGE_KEY: "Token Expired"}, status=HTTP_401_UNAUTHORIZED) except Exception as e: return error_instance(e) finally: if obj: del obj
def get_furnaces_config(request): """ :param request: request django object :param IS_ACTIVE: IS_ACTIVE will be provided :param FEED_NAME: FEED_NAME name will be provided :return: json response """ obj = query_params = None try: query_params = { IS_ACTIVE: request.GET[IS_ACTIVE], FEED_NAME: request.GET[FEED_NAME] } except: pass try: if request.method == GET_REQUEST: jwt_value = _TokenValidation().validate_token(request) if jwt_value: obj = furnaces_config(query_params) return obj.get_furnaces() else: return JsonResponse({MESSAGE_KEY: "FORBIDDEN ERROR"}, status=HTTP_403_FORBIDDEN) log_debug(METHOD_NOT_ALLOWED) return JsonResponse({MESSAGE_KEY: METHOD_NOT_ALLOWED}, status=HTTP_405_METHOD_NOT_ALLOWED) except jwt.ExpiredSignatureError: token = request.META[HTTP_AUTHORIZATION_TOKEN].split(" ")[1] return JsonResponse({MESSAGE_KEY: "Token Expired"}, status=HTTP_401_UNAUTHORIZED) except Exception as e: return error_instance(e) finally: if obj: del obj
def download_algorithm_file(request, algorithm_name): """ This function will download csv, xml files and will return error if generated. :param request: request django object :param algorithm_name : this will have the algorithm name :return: json response """ query_params = obj = None try: query_params = {FILES_NAME_REQUEST: request.GET[FILES_NAME_REQUEST]} except: pass try: if request.method == GET_REQUEST: jwt_value = _TokenValidation().validate_token(request) if jwt_value: obj = DownloadAlgorithmFile(algorithm_name, query_params) return obj.download_file() else: return JsonResponse({MESSAGE_KEY: "FORBIDDEN ERROR"}, status=HTTP_403_FORBIDDEN) log_debug(METHOD_NOT_ALLOWED) return JsonResponse({MESSAGE_KEY: METHOD_NOT_ALLOWED}, status=HTTP_405_METHOD_NOT_ALLOWED) except jwt.ExpiredSignatureError: token = request.META[HTTP_AUTHORIZATION_TOKEN].split(" ")[1] return JsonResponse({MESSAGE_KEY: "Token Expired"}, status=HTTP_401_UNAUTHORIZED) except Exception as e: return error_instance(e) finally: if obj: del obj
def get_equipment_health_data(request, unit_name=None, console_name=None, equipment_name=None): """ This function will return the Equipment Health value :param unit_name: unit name :param console_name: Console name :param equipment_name: equipment name :param request: request django object :return: json response """ obj = None try: if InputValidation.df[ (InputValidation.df.unit_name == unit_name) & (InputValidation.df.console_name == console_name) & (InputValidation.df.equipment_tag_name == equipment_name)].empty: return JsonResponse( { MESSAGE_KEY: "This {} or {} or {} is not registered with us !".format( unit_name, console_name, equipment_name) }, safe=False, status=HTTP_404_NOT_FOUND) except Exception as e: log_error("Exception due to : %s" + str(e)) return JsonResponse({MESSAGE_KEY: EXCEPTION_CAUSE.format(str(e))}, safe=False, status=HTTP_500_INTERNAL_SERVER_ERROR) try: if request.method == GET_REQUEST: query_parms = json.loads( json.dumps(parse_qs(request.GET.urlencode()))) jwt_value = _TokenValidation().validate_token(request) if jwt_value: obj = EquipmentHealth(query_parms, unit_name, console_name, equipment_name) return obj.get_values() else: return JsonResponse({MESSAGE_KEY: "FORBIDDEN ERROR"}, status=HTTP_403_FORBIDDEN) log_debug(METHOD_NOT_ALLOWED) return JsonResponse({MESSAGE_KEY: METHOD_NOT_ALLOWED}, status=HTTP_405_METHOD_NOT_ALLOWED) except jwt.ExpiredSignatureError: token = request.META[HTTP_AUTHORIZATION_TOKEN].split(" ")[1] return JsonResponse({MESSAGE_KEY: "Token Expired"}, status=HTTP_401_UNAUTHORIZED) except Exception as e: return error_instance(e) finally: if obj: del obj
@csrf_exempt def update_value(request, console=None, equipment=None, case=None): """ This function will return the dynamic benchmarking overview :param console: Console name :param equipment: equipment name :param request: request django object :return: json response """ obj = None try: if request.method == GET_REQUEST: jwt_value = _TokenValidation().validate_token(request) if jwt_value: obj = UpdateCase(console, equipment, case) return obj.update_case() else: return JsonResponse({MESSAGE_KEY: "FORBIDDEN ERROR"}, status=HTTP_403_FORBIDDEN) log_debug(METHOD_NOT_ALLOWED) return JsonResponse({MESSAGE_KEY: METHOD_NOT_ALLOWED}, status=HTTP_405_METHOD_NOT_ALLOWED) except jwt.ExpiredSignatureError: token = request.META[HTTP_AUTHORIZATION_TOKEN].split(" ")[1] return JsonResponse({MESSAGE_KEY: "Token Expired"}, status=HTTP_401_UNAUTHORIZED) except Exception as e: return error_instance(e)
def get_equipment_dynamic_benchmarking_data(request, unit=None, console=None, equipment=None): """ This function will get the values for the equipment level as well as console level dynamic benchmarking :param request: request django object :param unit: unit name :param console: console name will be provided :param equipment: equipment name will be provided :return: json response """ query_params = obj = None try: if InputValidation.df[(InputValidation.df.unit_name == unit) & (InputValidation.df.console_name == console) & (InputValidation.df.equipment_tag_name == equipment)].empty: return JsonResponse( { MESSAGE_KEY: "This {} or {} or {} is not registered with us !".format( unit, console, equipment) }, safe=False, status=HTTP_404_NOT_FOUND) except Exception as e: log_error(e) return JsonResponse({MESSAGE_KEY: EXCEPTION_CAUSE.format(str(e))}, safe=False, status=HTTP_500_INTERNAL_SERVER_ERROR) try: query_params = { TAG_NAME_REQUEST: request.GET[TAG_NAME_REQUEST], START_DATE_REQUEST: request.GET[START_DATE_REQUEST], END_DATE_REQUEST: request.GET[END_DATE_REQUEST] } except: pass try: if request.method == GET_REQUEST: jwt_value = _TokenValidation().validate_token(request) if jwt_value: obj = DynamicBenchmarking(query_params, unit, console, equipment) return obj.get_values() else: return JsonResponse({MESSAGE_KEY: "FORBIDDEN ERROR"}, status=HTTP_403_FORBIDDEN) log_debug(METHOD_NOT_ALLOWED) return JsonResponse({MESSAGE_KEY: METHOD_NOT_ALLOWED}, status=HTTP_405_METHOD_NOT_ALLOWED) except jwt.ExpiredSignatureError: token = request.META[HTTP_AUTHORIZATION_TOKEN].split(" ")[1] return JsonResponse({MESSAGE_KEY: "Token Expired"}, status=HTTP_401_UNAUTHORIZED) except Exception as e: return error_instance(e) finally: if obj: del obj
def get_console_level_data(request, unit_name=None, console_name=None): """ This function will return the console level overview :param unit: unit name :param console: Console name :param request: request django object :return: json response """ obj = None try: if InputValidation.df[(InputValidation.df.unit_name == unit_name) & ( InputValidation.df.console_name == console_name)].empty: return JsonResponse( { MESSAGE_KEY: "This {} or {} is not registered with us !".format( unit_name, console_name) }, safe=False, status=HTTP_404_NOT_FOUND) except Exception as e: log_error("Exception due to : %s" + str(e)) return JsonResponse({MESSAGE_KEY: EXCEPTION_CAUSE.format(str(e))}, safe=False, status=HTTP_500_INTERNAL_SERVER_ERROR) try: if request.method == GET_REQUEST: jwt_value = _TokenValidation().validate_token(request) if console_name == HOT_CONSOLE_1_VALUE and (jwt_value['role'] in [ 'superadmin', 'admin', 'engineer' ] or jwt_value['loggedin_useremail'] in ['*****@*****.**']): get_value = 1 elif console_name == HOT_CONSOLE_2_VALUE and ( jwt_value['role'] in ['superadmin', 'admin', 'engineer'] or jwt_value['loggedin_useremail'] in ['*****@*****.**']): get_value = 2 elif console_name == COLD_CONSOLE_1_VALUE and ( jwt_value['role'] in ['superadmin', 'admin', 'engineer'] or jwt_value['loggedin_useremail'] in ['*****@*****.**']): get_value = 3 elif console_name == COLD_CONSOLE_2_VALUE and ( jwt_value['role'] in ['superadmin', 'admin', 'engineer'] or jwt_value['loggedin_useremail'] in ['*****@*****.**']): get_value = 4 else: return JsonResponse({MESSAGE_KEY: ROLE_PERMISSION}, status=HTTP_403_FORBIDDEN) if jwt_value: obj = ConsoleLevelFeatures(unit_name, console_name, jwt_value, get_value) return obj.get_values() else: return JsonResponse({MESSAGE_KEY: "FORBIDDEN ERROR"}, status=HTTP_403_FORBIDDEN) log_debug(METHOD_NOT_ALLOWED) return JsonResponse({MESSAGE_KEY: METHOD_NOT_ALLOWED}, status=HTTP_405_METHOD_NOT_ALLOWED) except jwt.ExpiredSignatureError: token = request.META[HTTP_AUTHORIZATION_TOKEN].split(" ")[1] return JsonResponse({MESSAGE_KEY: "Token Expired"}, status=HTTP_401_UNAUTHORIZED) except Exception as e: return error_instance(e) finally: if obj: del obj