/server

Back-end server for UPchieve

Primary LanguageJavaScript

UPchieve web server

Web server providing endpoints for the UPchieve web client

CircleCI

Table of Contents

Local Development

Dependencies

The recommended tool for runtime version managment is asdf. To use asdf on Windows, first install the appropriate Linux shell distribution using WSL (Windows Subsystem for Linux).

Install the following asdf plugins:

  1. Node.js (see version listed in .tool-versions)
  2. MongoDB (see version listed in .tool-versions)
asdf plugin-add nodejs https://github.com/asdf-vm/asdf-nodejs.git
bash ~/.asdf/plugins/nodejs/bin/import-release-team-keyring
asdf install nodejs [VERSION]
asdf plugin-add mongodb https://github.com/UPchieve/asdf-mongodb
asdf install mongodb [VERSION]

Setup

  1. Start a local MongoDB server by running mongod. In a separate terminal, you can try connecting to the database by running mongo (mongod to start the database vs. mongo to connect via command line!). Run quit() to exit the shell. You can also interface with the database using a free MongoDB GUI such as MongoDB Compass Community
  2. Run bin/setup to set up the database with test users and install dependencies. Run with --verbose to debug if needed.
  3. Run node init to add "questions" collection to database
  4. Populate config.js with auth tokens (ask a teammate if you need any of these--improvements forthcoming).
  5. Run npm run dev to start the dev server on http://localhost:3000. If you get a bcrypt compilement error, run npm rebuild.
  6. See the web client repo for client installation

Test Users

The database is populated with the following users for local development:

email password
student1@upchieve.org Password123
volunteer1@upchieve.org Password123
volunteer2@upchieve.org Password123

Structure

The root folder of the repository provides the bootstrap file main.js and a package definitions file.

config.js

config.js contains a map of configuration keys for running the server. All keys and sensitive information should be placed in this file.

models

Model definitions that map to database models, along with related methods to act on those models, such as parsing, validation, and data transformations.

router

Directory structure mimics the endpoint structure exposed by the server. Each file provides one or more endpoint routes, responsible for request acceptance/rejection and error handling.

controllers

Routes use controllers to perform the business logic of the server, providing separation of concerns: the controllers have no need to be aware of how the endpoints work. Instead, a controller provides ways to allow the routes to trigger something (a user update, e.g.)

services

A service is a step higher than a controller. Services provide abstract functions to one or many controllers, often to interface with third party services.

Endpoints

POST /auth/login

Expects the following request body:

{
  "email": "String",
  "password": "String"
}

Authenticates the user with a session if credentials are correct.

GET /auth/logout

Removes the user's current session.

POST /auth/register/checkcred

Check whether the credential user entered is valid. (first step of registeration) The server will check is there any duplications for email and validate the password.

{
  "email": "String",
  "password": "String"
}

Possible errors:

  • Email/password not provided
  • Password does not meet requirements
  • Email is not valid
  • Email already exists

POST /auth/register

Create a new account based on the information posted.

{
  "email": "String",
  "password": "String",
  "code": "String",
  "highSchool": "String",
  "firstName": "String",
  "lastName": "String"
}

Possible errors:

  • Email/password not provided
  • Password does not meet requirements
  • Email is not valid
  • Email already exists
  • Could not hash password
  • Could not send verification email (for volunteers)

POST /auth/reset/send

{
  "email": "String"
}

POST /auth/reset/confirm

{
  "email": "String",
  "password": "String",
  "newpassword": "String",
  "token": "String"
}

POST /api/session/new

{
  "sessionType": "String",
  "sessionSubTopic": "String"
}

POST /api/session/check

{
  "sessionId": "String"
}

POST /api/training/questions

{
  "category": "String"
}

POST /api/training/score

{
  "userid": "String",
  "idAnswerMap": "String",
  "category": "String"
}

POST /api/calendar/init

{
  "userid": "String"
}

POST /api/calendar/get

{
  "userid": "String"
}

POST /api/calendar/save

{
  "userid": "String",
  "availability": "String"
}

POST /api/feedback

{
  "sessionId": "String",
  "responseData": "String"
}

GET /api/user

Returns a sanitized public user record for the currently authenticated user

PUT /api/user

Accepts a request body with fields mapping to profile fields to update for the currently authenticated user:

{
  "picture": "String"
}

GET /api/user/:id

Returns a sanitized public user record for a user with the given id. May perform checks on the authorization level of the current user to strip out priveliged information.

POST /api/verify/send

Sends an email to verify the current user with unique hash. The email provided will overwrite the user record's email, in the event that the two do not match.

{
  "email": "String"
}

POST /api/verify/confirm

Accepts a token used to verify the current user.

{
  "token": "String"
}

POST /moderate/message

Expects the following request body:

{
  "content": "string with the content of a message"
}

Returns a boolean indicating whether or not the message is clean.

The response body looks like this if no error occurred:

{
  "isClean": true // or false
}