Files
DashBoard/src/mes_dashboard/app.py

1095 lines
42 KiB
Python

# -*- coding: utf-8 -*-
"""Flask application factory for MES Dashboard."""
from __future__ import annotations
import atexit
import json
import logging
import os
import sys
import threading
from pathlib import Path
from flask import Flask, jsonify, redirect, render_template, request, send_from_directory, session, url_for
from mes_dashboard.config.settings import get_config
from mes_dashboard.core.cache import create_default_cache_backend
from mes_dashboard.core.database import (
get_table_data,
get_table_columns,
get_engine,
init_db,
start_keepalive,
dispose_engine,
install_log_redaction_filter,
)
from mes_dashboard.core.permissions import is_admin_logged_in, _is_ajax_request
from mes_dashboard.core.csrf import (
get_csrf_token,
should_enforce_csrf,
validate_csrf,
)
from mes_dashboard.routes import register_routes
from mes_dashboard.routes.auth_routes import auth_bp
from mes_dashboard.routes.admin_routes import admin_bp
from mes_dashboard.routes.health_routes import health_bp
from mes_dashboard.services.page_registry import (
get_navigation_config,
get_page_status,
is_api_public,
)
from mes_dashboard.core.cache_updater import start_cache_updater, stop_cache_updater
from mes_dashboard.services.realtime_equipment_cache import (
init_realtime_equipment_cache,
stop_equipment_status_sync_worker,
)
from mes_dashboard.services.scrap_reason_exclusion_cache import (
init_scrap_reason_exclusion_cache,
stop_scrap_reason_exclusion_cache_worker,
)
from mes_dashboard.core.query_spool_store import (
init_query_spool_cleanup,
stop_query_spool_cleanup_worker,
)
from mes_dashboard.core.modernization_policy import (
get_deferred_routes as get_deferred_routes_from_scope_matrix,
get_missing_in_scope_assets,
is_asset_readiness_enforced,
missing_in_scope_asset_response,
maybe_redirect_to_canonical_shell,
)
from mes_dashboard.core.feature_flags import resolve_bool_flag
from mes_dashboard.core.redis_client import close_redis
from mes_dashboard.core.runtime_contract import build_runtime_contract_diagnostics
_SHUTDOWN_LOCK = threading.Lock()
_ATEXIT_REGISTERED = False
_SHELL_ROUTE_CONTRACT_LOCK = threading.Lock()
_SHELL_ROUTE_CONTRACT_MAP: dict[str, dict[str, object]] | None = None
def _configure_logging(app: Flask) -> None:
"""Configure application logging.
Sets up logging to stderr (captured by Gunicorn's --capture-output).
Additionally sets up SQLite log store for admin dashboard queries.
Log levels:
- DEBUG: Query completion times, connection events
- WARNING: Slow queries (>1s)
- ERROR: Connection failures, query errors with ORA codes
"""
# Configure the mes_dashboard logger
logger = logging.getLogger('mes_dashboard')
logger.setLevel(logging.DEBUG if app.debug else logging.INFO)
# Only add handler if not already configured (avoid duplicates)
if not logger.handlers:
# Console handler (stderr - captured by Gunicorn)
handler = logging.StreamHandler(sys.stderr)
handler.setLevel(logging.DEBUG)
formatter = logging.Formatter(
'%(asctime)s [%(levelname)s] %(name)s: %(message)s',
datefmt='%Y-%m-%d %H:%M:%S'
)
handler.setFormatter(formatter)
logger.addHandler(handler)
# SQLite log handler for admin dashboard (INFO level and above)
try:
from mes_dashboard.core.log_store import get_sqlite_log_handler, LOG_STORE_ENABLED
if LOG_STORE_ENABLED:
sqlite_handler = get_sqlite_log_handler()
sqlite_handler.setLevel(logging.INFO)
logger.addHandler(sqlite_handler)
logger.debug("SQLite log handler registered")
except Exception as e:
logger.warning(f"Failed to initialize SQLite log handler: {e}")
# Prevent propagation to root logger (avoid duplicate logs)
logger.propagate = False
install_log_redaction_filter(logger)
def _is_production_env(app: Flask) -> bool:
env_value = str(app.config.get("ENV") or os.getenv("FLASK_ENV") or "production").lower()
return env_value in {"prod", "production"}
def _build_security_headers(production: bool, *, allow_unsafe_eval: bool = False) -> dict[str, str]:
script_directives = ["'self'", "'unsafe-inline'"]
if allow_unsafe_eval:
script_directives.append("'unsafe-eval'")
headers = {
"Content-Security-Policy": (
"default-src 'self'; "
f"script-src {' '.join(script_directives)}; "
"style-src 'self' 'unsafe-inline'; "
"img-src 'self' data: blob:; "
"font-src 'self' data:; "
"connect-src 'self'; "
"frame-ancestors 'self'; "
"base-uri 'self'; "
"form-action 'self'"
),
"X-Frame-Options": "SAMEORIGIN",
"X-Content-Type-Options": "nosniff",
"Referrer-Policy": "strict-origin-when-cross-origin",
}
if production:
headers["Strict-Transport-Security"] = "max-age=31536000; includeSubDomains"
return headers
def _resolve_secret_key(app: Flask) -> str:
env_name = str(app.config.get("ENV") or os.getenv("FLASK_ENV") or "development").lower()
configured = os.environ.get("SECRET_KEY") or app.config.get("SECRET_KEY")
insecure_defaults = {"", "dev-secret-key-change-in-prod"}
if configured and configured not in insecure_defaults:
return configured
if env_name in {"production", "prod"}:
raise RuntimeError(
"SECRET_KEY is required in production and cannot use insecure defaults."
)
# Development and testing get explicit environment-safe defaults.
if env_name in {"testing", "test"}:
return "test-secret-key"
return "dev-local-only-secret-key"
def _validate_production_security_settings(app: Flask) -> None:
"""Validate production security-sensitive runtime settings."""
if not _is_production_env(app):
return
trust_proxy_headers = resolve_bool_flag(
"TRUST_PROXY_HEADERS",
config=app.config,
default=bool(app.config.get("TRUST_PROXY_HEADERS", False)),
)
if trust_proxy_headers:
configured_sources = os.getenv("TRUSTED_PROXY_IPS")
if configured_sources is None:
configured_sources = app.config.get("TRUSTED_PROXY_IPS")
if isinstance(configured_sources, str):
trusted_sources = tuple(
part.strip()
for part in configured_sources.split(",")
if part.strip()
)
else:
trusted_sources = tuple(configured_sources or ())
if not trusted_sources:
raise RuntimeError(
"TRUST_PROXY_HEADERS=true requires TRUSTED_PROXY_IPS in production."
)
def _resolve_csp_allow_unsafe_eval(app: Flask) -> bool:
return resolve_bool_flag(
"CSP_ALLOW_UNSAFE_EVAL",
config=app.config,
default=bool(app.config.get("CSP_ALLOW_UNSAFE_EVAL", False)),
)
def _resolve_portal_spa_enabled(app: Flask) -> bool:
"""Resolve cutover flag for SPA shell navigation.
Environment variable takes precedence so operators can toggle behavior
without code changes during migration rehearsal/cutover.
"""
return resolve_bool_flag(
"PORTAL_SPA_ENABLED",
config=app.config,
default=bool(app.config.get("PORTAL_SPA_ENABLED", False)),
)
def _can_view_page_for_user(route: str, *, is_admin: bool) -> bool:
"""Mirror portal page visibility policy for shell navigation/API."""
status = get_page_status(route)
if status is None:
return True
if status == "released":
return True
return is_admin
def _safe_order(value: object, default: int = 9999) -> int:
try:
return int(value) # type: ignore[arg-type]
except (TypeError, ValueError):
return default
def _load_shell_route_contract_map() -> dict[str, dict[str, object]]:
"""Load shell route contract map used for navigation diagnostics."""
global _SHELL_ROUTE_CONTRACT_MAP
with _SHELL_ROUTE_CONTRACT_LOCK:
if _SHELL_ROUTE_CONTRACT_MAP is not None:
return _SHELL_ROUTE_CONTRACT_MAP
project_root = Path(__file__).resolve().parents[2]
contract_candidates = [
project_root
/ "docs"
/ "migration"
/ "full-modernization-architecture-blueprint"
/ "route_contracts.json",
project_root
/ "docs"
/ "migration"
/ "portal-shell-route-view-integration"
/ "route_migration_contract.json",
]
contract_map: dict[str, dict[str, object]] = {}
logger = logging.getLogger("mes_dashboard")
for index, contract_file in enumerate(contract_candidates):
if not contract_file.exists():
continue
try:
payload = json.loads(contract_file.read_text(encoding="utf-8"))
routes = payload.get("routes", [])
for item in routes:
if not isinstance(item, dict):
continue
route = str(item.get("route", "")).strip()
if route.startswith("/"):
contract_map[route] = dict(item)
if contract_map:
if index > 0:
logger.warning(
"Using legacy contract file fallback for shell route contracts: %s",
contract_file,
)
break
except Exception as exc: # pragma: no cover - defensive logging
logger.warning(
"Failed to load shell route contract from %s: %s",
contract_file,
exc,
)
_SHELL_ROUTE_CONTRACT_MAP = contract_map
return _SHELL_ROUTE_CONTRACT_MAP
def _load_shell_route_contract_routes() -> set[str]:
return set(_load_shell_route_contract_map().keys())
def _load_shell_deferred_routes() -> set[str]:
contract_map = _load_shell_route_contract_map()
deferred_from_contract = {
route
for route, metadata in contract_map.items()
if str(metadata.get("scope", "")).strip() == "deferred"
}
deferred_from_scope = set(get_deferred_routes_from_scope_matrix())
return deferred_from_contract | deferred_from_scope
def _validate_in_scope_asset_readiness(app: Flask) -> None:
"""Validate in-scope dist assets and enforce fail-fast policy when configured."""
dist_dir = Path(app.static_folder or "") / "dist"
missing_assets = get_missing_in_scope_assets(dist_dir)
diagnostics = {
"dist_dir": str(dist_dir),
"missing_in_scope_assets": missing_assets,
"enforced": False,
}
app.extensions["asset_readiness"] = diagnostics
if not missing_assets:
return
with app.app_context():
enforced = is_asset_readiness_enforced()
diagnostics["enforced"] = enforced
message = "In-scope asset readiness check failed: " + ", ".join(missing_assets)
if enforced:
raise RuntimeError(message)
logging.getLogger("mes_dashboard").warning(message)
def _shutdown_runtime_resources() -> None:
"""Stop background workers and shared clients during app/worker shutdown."""
logger = logging.getLogger("mes_dashboard")
try:
stop_cache_updater()
except Exception as exc:
logger.warning("Error stopping cache updater: %s", exc)
try:
stop_equipment_status_sync_worker()
except Exception as exc:
logger.warning("Error stopping equipment sync worker: %s", exc)
try:
stop_scrap_reason_exclusion_cache_worker()
except Exception as exc:
logger.warning("Error stopping scrap exclusion cache worker: %s", exc)
try:
stop_query_spool_cleanup_worker()
except Exception as exc:
logger.warning("Error stopping query spool cleanup worker: %s", exc)
try:
from mes_dashboard.core.metrics_history import stop_metrics_history
stop_metrics_history()
except Exception as exc:
logger.warning("Error stopping metrics history: %s", exc)
try:
close_redis()
except Exception as exc:
logger.warning("Error closing Redis client: %s", exc)
try:
dispose_engine()
except Exception as exc:
logger.warning("Error disposing DB engines: %s", exc)
def _register_shutdown_hooks(app: Flask) -> None:
global _ATEXIT_REGISTERED
app.extensions["runtime_shutdown"] = _shutdown_runtime_resources
if app.extensions.get("runtime_shutdown_registered"):
return
app.extensions["runtime_shutdown_registered"] = True
if app.testing or bool(app.config.get("TESTING")) or os.getenv("PYTEST_CURRENT_TEST"):
return
with _SHUTDOWN_LOCK:
if not _ATEXIT_REGISTERED:
atexit.register(_shutdown_runtime_resources)
_ATEXIT_REGISTERED = True
def _is_runtime_contract_enforced(app: Flask) -> bool:
return resolve_bool_flag(
"RUNTIME_CONTRACT_ENFORCE",
config=app.config,
default=_is_production_env(app),
)
def _validate_runtime_contract(app: Flask) -> None:
strict = _is_runtime_contract_enforced(app)
diagnostics = build_runtime_contract_diagnostics(strict=strict)
app.extensions["runtime_contract"] = diagnostics["contract"]
app.extensions["runtime_contract_validation"] = {
"valid": diagnostics["valid"],
"strict": diagnostics["strict"],
"errors": diagnostics["errors"],
}
if diagnostics["valid"]:
return
message = "Runtime contract validation failed: " + "; ".join(diagnostics["errors"])
if strict:
raise RuntimeError(message)
logging.getLogger("mes_dashboard").warning(message)
def create_app(config_name: str | None = None) -> Flask:
"""Create and configure the Flask app instance."""
app = Flask(__name__, template_folder="templates")
config_class = get_config(config_name)
app.config.from_object(config_class)
app.config["PORTAL_SPA_ENABLED"] = _resolve_portal_spa_enabled(app)
# Session configuration with environment-aware secret validation.
app.secret_key = _resolve_secret_key(app)
app.config["SECRET_KEY"] = app.secret_key
_validate_production_security_settings(app)
# Session cookie security settings
# SECURE: Only send cookie over HTTPS in production.
app.config['SESSION_COOKIE_SECURE'] = _is_production_env(app)
# HTTPONLY: Prevent JavaScript access to session cookie (XSS protection)
app.config['SESSION_COOKIE_HTTPONLY'] = True
# SAMESITE: strict in production, relaxed for local development usability.
app.config['SESSION_COOKIE_SAMESITE'] = 'Strict' if _is_production_env(app) else 'Lax'
# Configure logging first
_configure_logging(app)
_validate_runtime_contract(app)
_validate_in_scope_asset_readiness(app)
security_headers = _build_security_headers(
_is_production_env(app),
allow_unsafe_eval=_resolve_csp_allow_unsafe_eval(app),
)
# Route-level cache backend (L1 memory + optional L2 Redis)
app.extensions["cache"] = create_default_cache_backend()
# Initialize database teardown and pool
init_db(app)
running_pytest = bool(os.getenv("PYTEST_CURRENT_TEST"))
is_testing_runtime = bool(app.config.get("TESTING")) or app.testing or running_pytest
with app.app_context():
if not is_testing_runtime:
get_engine()
start_keepalive() # Keep database connections alive
start_cache_updater() # Start Redis cache updater
init_realtime_equipment_cache(app) # Start realtime equipment status cache
init_scrap_reason_exclusion_cache(app) # Start exclusion-policy cache sync
init_query_spool_cleanup(app) # Start parquet spool cleanup worker
from mes_dashboard.core.metrics_history import start_metrics_history
start_metrics_history(app) # Start metrics history collector
_register_shutdown_hooks(app)
# Register API routes
register_routes(app)
# Register auth, admin, and health routes
app.register_blueprint(auth_bp)
app.register_blueprint(admin_bp)
app.register_blueprint(health_bp)
# ========================================================
# Permission Middleware
# ========================================================
@app.before_request
def check_page_access():
"""Check page access permissions before each request."""
# Skip static files
if request.endpoint == "static":
return None
# Health check endpoint - no auth required
if request.path == "/health":
return None
# API endpoints check
if request.path.startswith("/api/"):
if is_api_public():
return None
if not is_admin_logged_in():
from mes_dashboard.core.response import unauthorized_error
return unauthorized_error()
return None
# Skip auth-related pages (login/logout)
if request.path.startswith("/admin/login") or request.path.startswith("/admin/logout"):
return None
# Admin pages require login
if request.path.startswith("/admin/"):
if not is_admin_logged_in():
# For AJAX requests, return JSON error instead of redirect
if _is_ajax_request():
return jsonify({"error": "請先登入管理員帳號", "login_required": True}), 401
return redirect(url_for("auth.login", next=request.url))
return None
# Check page status for registered pages only
# Unregistered pages pass through to Flask routing (may return 404)
page_status = get_page_status(request.path)
if page_status == "dev" and not is_admin_logged_in():
return render_template("403.html"), 403
return None
@app.before_request
def enforce_csrf():
if not should_enforce_csrf(
request,
enabled=bool(app.config.get("CSRF_ENABLED", True)),
):
return None
if validate_csrf(request):
return None
if request.path == "/admin/login":
return render_template("login.html", error="CSRF 驗證失敗,請重新提交"), 403
from mes_dashboard.core.response import error_response, FORBIDDEN
return error_response(
FORBIDDEN,
"CSRF 驗證失敗",
status_code=403,
)
@app.after_request
def apply_security_headers(response):
for header, value in security_headers.items():
response.headers.setdefault(header, value)
return response
# ========================================================
# Template Context Processor
# ========================================================
@app.context_processor
def inject_admin():
"""Inject admin info into all templates."""
admin = is_admin_logged_in()
def can_view_page(route: str) -> bool:
"""Check if current user can view a page."""
status = get_page_status(route)
# Unregistered pages (None) are viewable
if status is None:
return True
# Released pages are viewable by all
if status == "released":
return True
# Dev pages only viewable by admin
return admin
def frontend_asset(filename: str) -> str | None:
"""Resolve frontend asset path served from static/dist."""
if not filename:
return None
return url_for("static", filename=f"dist/{filename}")
return {
"is_admin": admin,
"admin_user": session.get("admin"),
"can_view_page": can_view_page,
"frontend_asset": frontend_asset,
"csrf_token": get_csrf_token,
"portal_spa_enabled": bool(app.config.get("PORTAL_SPA_ENABLED", False)),
}
# ========================================================
# Page Routes
# ========================================================
@app.route('/')
def portal_index():
"""Portal home with tabs."""
if bool(app.config.get("PORTAL_SPA_ENABLED", False)):
return redirect(url_for("portal_shell_page"))
return render_template('portal.html', drawers=get_navigation_config())
@app.route('/portal-shell')
@app.route('/portal-shell/')
@app.route('/portal-shell/<path:_subpath>')
def portal_shell_page(_subpath: str | None = None):
"""Portal SPA shell page served as pure Vite HTML output."""
dist_dir = os.path.join(app.static_folder or "", "dist")
dist_html = os.path.join(dist_dir, "portal-shell.html")
if os.path.exists(dist_html):
return send_from_directory(dist_dir, "portal-shell.html")
nested_dist_dir = os.path.join(dist_dir, "src", "portal-shell")
nested_dist_html = os.path.join(nested_dist_dir, "index.html")
if os.path.exists(nested_dist_html):
return send_from_directory(nested_dist_dir, "index.html")
return (
"<!doctype html><html lang=\"zh-Hant\"><head><meta charset=\"UTF-8\">"
"<meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\">"
"<title>MES Portal Shell</title>"
"<link rel=\"stylesheet\" href=\"/static/dist/tailwind.css\">"
"<link rel=\"stylesheet\" href=\"/static/dist/portal-shell.css\">"
"<script type=\"module\" src=\"/static/dist/portal-shell.js\"></script>"
"</head><body><div id='app'></div></body></html>",
200,
)
@app.route('/api/portal/navigation', methods=['GET'])
def portal_navigation_config():
"""Return effective drawer/page navigation config for current user."""
nav_logger = logging.getLogger("mes_dashboard.portal_navigation")
admin = is_admin_logged_in()
admin_user_payload = None
if admin:
raw_admin = session.get("admin") or {}
admin_user_payload = {
"displayName": raw_admin.get("displayName"),
"username": raw_admin.get("username"),
"mail": raw_admin.get("mail"),
}
source = get_navigation_config()
drawers: list[dict] = []
shell_contract_routes = _load_shell_route_contract_routes()
deferred_routes = _load_shell_deferred_routes()
diagnostics: dict[str, object] = {
"filtered_drawers": 0,
"filtered_pages": 0,
"invalid_drawers": 0,
"invalid_pages": 0,
"contract_mismatch_routes": [],
}
mismatch_routes: set[str] = set()
for drawer_index, drawer in enumerate(source):
drawer_id = str(drawer.get("id") or "").strip()
if not drawer_id:
diagnostics["invalid_drawers"] = int(diagnostics["invalid_drawers"]) + 1
nav_logger.warning(
"Skipping navigation drawer with missing id at index=%s",
drawer_index,
)
continue
admin_only = bool(drawer.get("admin_only", False))
if admin_only and not admin:
diagnostics["filtered_drawers"] = int(diagnostics["filtered_drawers"]) + 1
continue
raw_pages = drawer.get("pages", [])
if not isinstance(raw_pages, list):
diagnostics["invalid_drawers"] = int(diagnostics["invalid_drawers"]) + 1
nav_logger.warning(
"Skipping navigation drawer with invalid pages payload: drawer_id=%s type=%s",
drawer_id,
type(raw_pages).__name__,
)
continue
pages: list[dict] = []
for page_index, page in enumerate(raw_pages):
if not isinstance(page, dict):
diagnostics["invalid_pages"] = int(diagnostics["invalid_pages"]) + 1
nav_logger.warning(
"Skipping invalid page payload under drawer_id=%s index=%s type=%s",
drawer_id,
page_index,
type(page).__name__,
)
continue
route = str(page.get("route") or "").strip()
if not route or not route.startswith("/"):
diagnostics["invalid_pages"] = int(diagnostics["invalid_pages"]) + 1
nav_logger.warning(
"Skipping page with invalid route: drawer_id=%s route=%s",
drawer_id,
route,
)
continue
if not _can_view_page_for_user(route, is_admin=admin):
diagnostics["filtered_pages"] = int(diagnostics["filtered_pages"]) + 1
continue
if shell_contract_routes and route not in shell_contract_routes and route not in deferred_routes:
mismatch_routes.add(route)
nav_logger.warning(
"Navigation route missing shell contract: drawer_id=%s route=%s",
drawer_id,
route,
)
pages.append(
{
"route": route,
"name": page.get("name") or route,
"status": page.get("status", "dev"),
"order": _safe_order(page.get("order")),
}
)
if not pages:
continue
pages = sorted(
pages,
key=lambda p: (_safe_order(p.get("order")), str(p.get("name") or p.get("route") or "")),
)
drawers.append(
{
"id": drawer_id,
"name": drawer.get("name"),
"order": _safe_order(drawer.get("order")),
"admin_only": admin_only,
"pages": pages,
}
)
drawers = sorted(
drawers,
key=lambda d: (_safe_order(d.get("order")), str(d.get("name") or d.get("id") or "")),
)
diagnostics["contract_mismatch_routes"] = sorted(mismatch_routes)
return jsonify(
{
"drawers": drawers,
"is_admin": admin,
"admin_user": admin_user_payload,
"admin_links": {
"login": f"/admin/login?next={url_for('portal_shell_page')}",
"logout": "/admin/logout" if admin else None,
"pages": "/admin/pages" if admin else None,
"performance": "/admin/performance" if admin else None,
},
"diagnostics": diagnostics,
"portal_spa_enabled": bool(app.config.get("PORTAL_SPA_ENABLED", False)),
}
)
@app.route('/favicon.ico')
def favicon():
"""Serve favicon without 404 noise."""
return redirect(url_for('static', filename='favicon.svg'), code=302)
@app.route('/tables')
def tables_page():
"""Table viewer page served as pure Vite HTML output."""
canonical_redirect = maybe_redirect_to_canonical_shell('/tables')
if canonical_redirect is not None:
return canonical_redirect
dist_dir = os.path.join(app.static_folder or "", "dist")
dist_html = os.path.join(dist_dir, "tables.html")
if os.path.exists(dist_html):
return send_from_directory(dist_dir, 'tables.html')
nested_dist_dir = os.path.join(dist_dir, "src", "tables")
nested_dist_html = os.path.join(nested_dist_dir, "index.html")
if os.path.exists(nested_dist_html):
return send_from_directory(nested_dist_dir, "index.html")
# Test/local fallback when frontend build artifacts are absent.
return missing_in_scope_asset_response('/tables', (
"<!doctype html><html lang=\"zh-Hant\"><head><meta charset=\"UTF-8\">"
"<meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\">"
"<title>MES 數據表查詢工具</title>"
"<script type=\"module\" src=\"/static/dist/tables.js\"></script>"
"</head><body><div id='app'></div></body></html>",
200,
))
@app.route('/wip-overview')
def wip_overview_page():
"""WIP Overview Dashboard served as pure Vite HTML output."""
canonical_redirect = maybe_redirect_to_canonical_shell('/wip-overview')
if canonical_redirect is not None:
return canonical_redirect
dist_dir = os.path.join(app.static_folder or "", "dist")
dist_html = os.path.join(dist_dir, "wip-overview.html")
if os.path.exists(dist_html):
return send_from_directory(dist_dir, 'wip-overview.html')
# Test/local fallback when frontend build artifacts are absent.
return missing_in_scope_asset_response('/wip-overview', (
"<!doctype html><html lang=\"zh-Hant\"><head><meta charset=\"UTF-8\">"
"<meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\">"
"<title>WIP Overview Dashboard</title>"
"<script type=\"module\" src=\"/static/dist/wip-overview.js\"></script>"
"</head><body><div id='app'></div></body></html>",
200,
))
@app.route('/wip-detail')
def wip_detail_page():
"""WIP Detail Dashboard served as pure Vite HTML output."""
canonical_redirect = maybe_redirect_to_canonical_shell('/wip-detail')
if canonical_redirect is not None:
return canonical_redirect
dist_dir = os.path.join(app.static_folder or "", "dist")
dist_html = os.path.join(dist_dir, "wip-detail.html")
if os.path.exists(dist_html):
return send_from_directory(dist_dir, 'wip-detail.html')
# Test/local fallback when frontend build artifacts are absent.
return missing_in_scope_asset_response('/wip-detail', (
"<!doctype html><html lang=\"zh-Hant\"><head><meta charset=\"UTF-8\">"
"<meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\">"
"<title>WIP Detail Dashboard</title>"
"<script type=\"module\" src=\"/static/dist/wip-detail.js\"></script>"
"</head><body><div id='app'></div></body></html>",
200,
))
@app.route('/resource')
def resource_page():
"""Resource status report page served as pure Vite HTML output."""
canonical_redirect = maybe_redirect_to_canonical_shell('/resource')
if canonical_redirect is not None:
return canonical_redirect
dist_dir = os.path.join(app.static_folder or "", "dist")
dist_html = os.path.join(dist_dir, "resource-status.html")
if os.path.exists(dist_html):
return send_from_directory(dist_dir, 'resource-status.html')
# Test/local fallback when frontend build artifacts are absent.
return missing_in_scope_asset_response('/resource', (
"<!doctype html><html lang=\"zh-Hant\"><head><meta charset=\"UTF-8\">"
"<meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\">"
"<title>設備即時概況</title>"
"<script type=\"module\" src=\"/static/dist/resource-status.js\"></script>"
"</head><body><div id='app'></div></body></html>",
200,
))
@app.route('/excel-query')
def excel_query_page():
"""Excel batch query tool page."""
canonical_redirect = maybe_redirect_to_canonical_shell('/excel-query')
if canonical_redirect is not None:
return canonical_redirect
return render_template('excel_query.html')
@app.route('/resource-history')
def resource_history_page():
"""Resource history analysis page served as pure Vite HTML output."""
canonical_redirect = maybe_redirect_to_canonical_shell('/resource-history')
if canonical_redirect is not None:
return canonical_redirect
dist_dir = os.path.join(app.static_folder or "", "dist")
dist_html = os.path.join(dist_dir, "resource-history.html")
if os.path.exists(dist_html):
return send_from_directory(dist_dir, 'resource-history.html')
# Test/local fallback when frontend build artifacts are absent.
return missing_in_scope_asset_response('/resource-history', (
"<!doctype html><html lang=\"zh-Hant\"><head><meta charset=\"UTF-8\">"
"<meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\">"
"<title>設備歷史績效</title>"
"<script type=\"module\" src=\"/static/dist/resource-history.js\"></script>"
"</head><body><div id='app'></div></body></html>",
200,
))
@app.route('/reject-history')
def reject_history_page():
"""Reject history analysis page served as pure Vite HTML output."""
canonical_redirect = maybe_redirect_to_canonical_shell('/reject-history')
if canonical_redirect is not None:
return canonical_redirect
dist_dir = os.path.join(app.static_folder or "", "dist")
dist_html = os.path.join(dist_dir, "reject-history.html")
if os.path.exists(dist_html):
return send_from_directory(dist_dir, 'reject-history.html')
return missing_in_scope_asset_response('/reject-history', (
"<!doctype html><html lang=\"zh-Hant\"><head><meta charset=\"UTF-8\">"
"<meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\">"
"<title>報廢歷史查詢</title>"
"<script type=\"module\" src=\"/static/dist/reject-history.js\"></script>"
"</head><body><div id='app'></div></body></html>",
200,
))
@app.route('/qc-gate')
def qc_gate_page():
"""QC-GATE status report served as pure Vite HTML output."""
canonical_redirect = maybe_redirect_to_canonical_shell('/qc-gate')
if canonical_redirect is not None:
return canonical_redirect
dist_dir = os.path.join(app.static_folder or "", "dist")
dist_html = os.path.join(dist_dir, "qc-gate.html")
if os.path.exists(dist_html):
return send_from_directory(dist_dir, 'qc-gate.html')
return missing_in_scope_asset_response('/qc-gate', (
"<!doctype html><html lang=\"zh-Hant\"><head><meta charset=\"UTF-8\">"
"<meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\">"
"<title>QC-GATE 狀態</title>"
"<script type=\"module\" src=\"/static/dist/qc-gate.js\"></script>"
"</head><body><div id='app'></div></body></html>",
200,
))
@app.route('/mid-section-defect')
def mid_section_defect_page():
"""Mid-section defect traceability analysis page (pure Vite)."""
canonical_redirect = maybe_redirect_to_canonical_shell('/mid-section-defect')
if canonical_redirect is not None:
return canonical_redirect
dist_dir = os.path.join(app.static_folder or "", "dist")
dist_html = os.path.join(dist_dir, "mid-section-defect.html")
if os.path.exists(dist_html):
return send_from_directory(dist_dir, 'mid-section-defect.html')
return missing_in_scope_asset_response('/mid-section-defect', (
"<!doctype html><html lang=\"zh-Hant\"><head><meta charset=\"UTF-8\">"
"<meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\">"
"<title>中段製程不良追溯</title>"
"<script type=\"module\" src=\"/static/dist/mid-section-defect.js\"></script>"
"</head><body><div id='app'></div></body></html>",
200,
))
# ========================================================
# Table Query APIs (for table_data_viewer)
# ========================================================
from mes_dashboard.config.tables import TABLES_CONFIG
_ALLOWED_TABLES: dict[str, dict] = {}
for _tables in TABLES_CONFIG.values():
for _tbl in _tables:
_ALLOWED_TABLES[_tbl['name']] = _tbl
def _validate_table_request(table_name, time_field=None):
"""Validate table_name against TABLES_CONFIG whitelist."""
if not table_name:
return '請指定表名', 400
if table_name not in _ALLOWED_TABLES:
return '不允許查詢此表', 400
if time_field is not None:
allowed_time = _ALLOWED_TABLES[table_name].get('time_field')
if time_field != allowed_time:
return '不允許的時間欄位', 400
return None, None
@app.route('/api/query_table', methods=['POST'])
def query_table():
"""API: query table data with optional column filters."""
data = request.get_json()
table_name = data.get('table_name')
limit = data.get('limit', 1000)
time_field = data.get('time_field')
filters = data.get('filters')
error, status = _validate_table_request(table_name, time_field)
if error:
return jsonify({'error': error}), status
result = get_table_data(table_name, limit, time_field, filters)
return jsonify(result)
@app.route('/api/get_table_columns', methods=['POST'])
def api_get_table_columns():
"""API: get column names for a table."""
data = request.get_json()
table_name = data.get('table_name')
error, status = _validate_table_request(table_name)
if error:
return jsonify({'error': error}), status
columns = get_table_columns(table_name)
return jsonify({'columns': columns})
@app.route('/api/get_table_info', methods=['GET'])
def get_table_info():
"""API: get tables config."""
from mes_dashboard.config.tables import TABLES_CONFIG
return jsonify(TABLES_CONFIG)
# ========================================================
# Global Error Handlers
# ========================================================
_register_error_handlers(app)
return app
def _register_error_handlers(app: Flask) -> None:
"""Register global error handlers with standardized response format."""
from mes_dashboard.core.response import (
unauthorized_error,
forbidden_error,
not_found_error,
internal_error,
pool_exhausted_error,
error_response,
INTERNAL_ERROR
)
from mes_dashboard.core.database import (
DatabasePoolExhaustedError,
DatabaseCircuitOpenError,
)
from mes_dashboard.core.response import circuit_breaker_error
@app.errorhandler(401)
def handle_unauthorized(e):
"""Handle 401 Unauthorized errors."""
return unauthorized_error()
@app.errorhandler(403)
def handle_forbidden(e):
"""Handle 403 Forbidden errors."""
return forbidden_error()
@app.errorhandler(404)
def handle_not_found(e):
"""Handle 404 Not Found errors."""
# For API routes, return JSON; for pages, render template
if request.path.startswith('/api/'):
return not_found_error()
return render_template('404.html'), 404
def _is_api_request() -> bool:
"""Check if the current request is an API request."""
return (request.path.startswith('/api/') or
'/api/' in request.path or
request.accept_mimetypes.best == 'application/json')
@app.errorhandler(500)
def handle_internal_error(e):
"""Handle 500 Internal Server errors."""
logger = logging.getLogger('mes_dashboard')
logger.error(f"Internal server error: {e}", exc_info=True)
if _is_api_request():
return internal_error(str(e) if app.debug else None)
# Fallback to HTML template for non-API requests.
try:
return render_template('500.html'), 500
except Exception:
return internal_error(str(e) if app.debug else None)
@app.errorhandler(DatabasePoolExhaustedError)
def handle_pool_exhausted(e: DatabasePoolExhaustedError):
"""Handle DB pool exhaustion with degraded response contract."""
retry_after = max(int(getattr(e, "retry_after_seconds", 5)), 1)
return pool_exhausted_error(
str(e) if app.debug else None,
retry_after_seconds=retry_after,
)
@app.errorhandler(DatabaseCircuitOpenError)
def handle_circuit_open(e: DatabaseCircuitOpenError):
"""Handle circuit-open condition with degraded response contract."""
retry_after = max(int(getattr(e, "retry_after_seconds", 30)), 1)
return circuit_breaker_error(
str(e) if app.debug else None,
retry_after_seconds=retry_after,
)
@app.errorhandler(Exception)
def handle_exception(e):
"""Handle uncaught exceptions."""
logger = logging.getLogger('mes_dashboard')
logger.error(f"Uncaught exception: {e}", exc_info=True)
if _is_api_request():
return error_response(
INTERNAL_ERROR,
"伺服器發生未預期的錯誤",
str(e) if app.debug else None,
status_code=500
)
# Fallback to JSON if template not found
try:
return render_template('500.html'), 500
except Exception:
return error_response(
INTERNAL_ERROR,
"伺服器發生未預期的錯誤",
str(e) if app.debug else None,
status_code=500
)