2024-07-31 07:23:32 +02:00
|
|
|
-- migrate:up
|
|
|
|
|
CREATE EXTENSION pgcrypto;
|
2024-08-08 22:29:04 +02:00
|
|
|
|
2024-07-31 07:23:32 +02:00
|
|
|
CREATE EXTENSION pgjwt;
|
|
|
|
|
|
2024-08-08 22:29:04 +02:00
|
|
|
CREATE FUNCTION internal.check_role_exists ()
|
|
|
|
|
RETURNS TRIGGER
|
|
|
|
|
AS $$
|
2024-07-31 07:23:32 +02:00
|
|
|
BEGIN
|
2024-09-14 15:12:08 +02:00
|
|
|
IF (NOT EXISTS (
|
2024-08-08 22:29:04 +02:00
|
|
|
SELECT
|
|
|
|
|
1
|
|
|
|
|
FROM
|
|
|
|
|
pg_roles AS r
|
|
|
|
|
WHERE
|
2024-10-08 21:20:44 +02:00
|
|
|
r.rolname = NEW.user_role)) THEN
|
2024-09-14 15:12:08 +02:00
|
|
|
RAISE foreign_key_violation
|
2024-10-08 21:20:44 +02:00
|
|
|
USING message = 'Unknown database role: ' || NEW.user_role;
|
2024-09-14 15:12:08 +02:00
|
|
|
END IF;
|
|
|
|
|
RETURN NULL;
|
2024-07-31 07:23:32 +02:00
|
|
|
END
|
2024-08-08 22:29:04 +02:00
|
|
|
$$
|
|
|
|
|
LANGUAGE plpgsql;
|
2024-07-31 07:23:32 +02:00
|
|
|
|
|
|
|
|
CREATE CONSTRAINT TRIGGER ensure_user_role_exists
|
2024-08-08 22:29:04 +02:00
|
|
|
AFTER INSERT OR UPDATE ON internal.user
|
|
|
|
|
FOR EACH ROW
|
|
|
|
|
EXECUTE FUNCTION internal.check_role_exists ();
|
2024-07-31 07:23:32 +02:00
|
|
|
|
2024-08-08 22:29:04 +02:00
|
|
|
CREATE FUNCTION internal.encrypt_pass ()
|
|
|
|
|
RETURNS TRIGGER
|
|
|
|
|
AS $$
|
2024-07-31 07:23:32 +02:00
|
|
|
BEGIN
|
2024-08-08 16:30:01 +02:00
|
|
|
IF TG_OP = 'INSERT' OR NEW.password_hash != OLD.password_hash THEN
|
2024-08-08 22:29:04 +02:00
|
|
|
NEW.password_hash = CRYPT(NEW.password_hash, GEN_SALT('bf'));
|
2024-07-31 07:23:32 +02:00
|
|
|
END IF;
|
|
|
|
|
RETURN NEW;
|
|
|
|
|
END
|
2024-08-08 22:29:04 +02:00
|
|
|
$$
|
|
|
|
|
LANGUAGE plpgsql;
|
2024-07-31 07:23:32 +02:00
|
|
|
|
|
|
|
|
CREATE TRIGGER encrypt_pass
|
2024-08-08 22:29:04 +02:00
|
|
|
BEFORE INSERT OR UPDATE ON internal.user
|
|
|
|
|
FOR EACH ROW
|
|
|
|
|
EXECUTE FUNCTION internal.encrypt_pass ();
|
2024-07-31 07:23:32 +02:00
|
|
|
|
2024-09-10 17:29:57 +02:00
|
|
|
CREATE FUNCTION internal.user_role (username TEXT, pass TEXT, OUT role_name NAME)
|
|
|
|
|
AS $$
|
2024-07-31 07:23:32 +02:00
|
|
|
BEGIN
|
2024-09-10 17:29:57 +02:00
|
|
|
SELECT
|
2024-10-08 21:20:44 +02:00
|
|
|
u.user_role INTO role_name
|
2024-09-10 17:29:57 +02:00
|
|
|
FROM
|
|
|
|
|
internal.user AS u
|
|
|
|
|
WHERE
|
|
|
|
|
u.username = user_role.username
|
|
|
|
|
AND u.password_hash = CRYPT(user_role.pass, u.password_hash);
|
2024-07-31 07:23:32 +02:00
|
|
|
END;
|
2024-08-08 22:29:04 +02:00
|
|
|
$$
|
|
|
|
|
LANGUAGE plpgsql;
|
2024-07-31 07:23:32 +02:00
|
|
|
|
2024-09-10 17:29:57 +02:00
|
|
|
CREATE FUNCTION api.register (username TEXT, pass TEXT, OUT user_id UUID)
|
2024-08-08 22:29:04 +02:00
|
|
|
AS $$
|
2024-07-31 07:23:32 +02:00
|
|
|
DECLARE
|
|
|
|
|
_username_length_min CONSTANT INT := 3;
|
|
|
|
|
_username_length_max CONSTANT INT := 16;
|
|
|
|
|
_password_length_min CONSTANT INT := 12;
|
|
|
|
|
_password_length_max CONSTANT INT := 128;
|
|
|
|
|
BEGIN
|
2024-09-14 15:12:08 +02:00
|
|
|
IF (LENGTH(register.username)
|
|
|
|
|
NOT BETWEEN _username_length_min AND _username_length_max) THEN
|
|
|
|
|
RAISE string_data_length_mismatch
|
|
|
|
|
USING message = FORMAT('Username must be between %s and %s characters long', _username_length_min, _username_length_max);
|
|
|
|
|
ELSIF (EXISTS (
|
|
|
|
|
SELECT
|
|
|
|
|
1
|
|
|
|
|
FROM
|
|
|
|
|
internal.user AS u
|
|
|
|
|
WHERE
|
|
|
|
|
u.username = register.username)) THEN
|
2024-08-08 22:29:04 +02:00
|
|
|
RAISE unique_violation
|
2024-09-14 15:12:08 +02:00
|
|
|
USING message = 'Username is already taken';
|
|
|
|
|
ELSIF (LENGTH(register.pass)
|
|
|
|
|
NOT BETWEEN _password_length_min AND _password_length_max) THEN
|
|
|
|
|
RAISE string_data_length_mismatch
|
|
|
|
|
USING message = FORMAT('Password must be between %s and %s characters long', _password_length_min, _password_length_max);
|
|
|
|
|
ELSIF register.pass !~ '[a-z]' THEN
|
|
|
|
|
RAISE invalid_parameter_value
|
|
|
|
|
USING message = 'Password must contain at least one lowercase letter';
|
|
|
|
|
ELSIF register.pass !~ '[A-Z]' THEN
|
|
|
|
|
RAISE invalid_parameter_value
|
|
|
|
|
USING message = 'Password must contain at least one uppercase letter';
|
|
|
|
|
ELSIF register.pass !~ '[0-9]' THEN
|
|
|
|
|
RAISE invalid_parameter_value
|
|
|
|
|
USING message = 'Password must contain at least one number';
|
|
|
|
|
ELSIF register.pass !~ '[!@#$%^&*(),.?":{}|<>]' THEN
|
|
|
|
|
RAISE invalid_parameter_value
|
|
|
|
|
USING message = 'Password must contain at least one special character';
|
|
|
|
|
ELSE
|
2024-10-08 21:20:44 +02:00
|
|
|
INSERT INTO internal.user (username, password_hash, user_role)
|
|
|
|
|
SELECT
|
|
|
|
|
register.username,
|
|
|
|
|
register.pass,
|
|
|
|
|
CASE WHEN COUNT(*) = 0 THEN
|
|
|
|
|
'administrator'
|
|
|
|
|
ELSE
|
|
|
|
|
'authenticated_user'
|
|
|
|
|
END
|
|
|
|
|
FROM
|
|
|
|
|
internal.user
|
2024-09-14 15:12:08 +02:00
|
|
|
RETURNING
|
|
|
|
|
id INTO user_id;
|
|
|
|
|
END IF;
|
|
|
|
|
END;
|
2024-08-08 22:29:04 +02:00
|
|
|
$$
|
|
|
|
|
LANGUAGE plpgsql
|
|
|
|
|
SECURITY DEFINER;
|
2024-07-31 07:23:32 +02:00
|
|
|
|
2024-09-10 17:29:57 +02:00
|
|
|
CREATE FUNCTION api.login (username TEXT, pass TEXT, OUT token TEXT)
|
2024-08-08 22:29:04 +02:00
|
|
|
AS $$
|
2024-07-31 07:23:32 +02:00
|
|
|
DECLARE
|
|
|
|
|
_role NAME;
|
|
|
|
|
_user_id UUID;
|
2024-10-08 21:20:44 +02:00
|
|
|
_exp INT := EXTRACT(EPOCH FROM CLOCK_TIMESTAMP())::INT + 86400;
|
2024-07-31 07:23:32 +02:00
|
|
|
BEGIN
|
2024-08-08 22:29:04 +02:00
|
|
|
SELECT
|
2024-09-10 17:29:57 +02:00
|
|
|
internal.user_role (login.username, login.pass) INTO _role;
|
2024-07-31 07:23:32 +02:00
|
|
|
IF _role IS NULL THEN
|
2024-08-08 22:29:04 +02:00
|
|
|
RAISE invalid_password
|
|
|
|
|
USING message = 'Invalid username or password';
|
2024-09-14 15:12:08 +02:00
|
|
|
ELSE
|
2024-08-08 22:29:04 +02:00
|
|
|
SELECT
|
2024-10-03 18:51:30 +02:00
|
|
|
u.id INTO _user_id
|
2024-08-08 22:29:04 +02:00
|
|
|
FROM
|
|
|
|
|
internal.user AS u
|
|
|
|
|
WHERE
|
|
|
|
|
u.username = login.username;
|
|
|
|
|
SELECT
|
|
|
|
|
SIGN(JSON_BUILD_OBJECT('role', _role, 'user_id', _user_id, 'username', login.username, 'exp', _exp), CURRENT_SETTING('app.jwt_secret')) INTO token;
|
2024-09-14 15:12:08 +02:00
|
|
|
END IF;
|
2024-07-31 07:23:32 +02:00
|
|
|
END;
|
2024-08-08 22:29:04 +02:00
|
|
|
$$
|
|
|
|
|
LANGUAGE plpgsql
|
|
|
|
|
SECURITY DEFINER;
|
2024-07-31 07:23:32 +02:00
|
|
|
|
2024-09-10 17:29:57 +02:00
|
|
|
CREATE FUNCTION api.delete_account (pass TEXT, OUT was_deleted BOOLEAN)
|
2024-08-08 22:29:04 +02:00
|
|
|
AS $$
|
2024-07-31 07:23:32 +02:00
|
|
|
DECLARE
|
2024-08-08 22:29:04 +02:00
|
|
|
_username TEXT := CURRENT_SETTING('request.jwt.claims', TRUE)::JSON ->> 'username';
|
2024-07-31 07:23:32 +02:00
|
|
|
_role NAME;
|
|
|
|
|
BEGIN
|
2024-08-08 22:29:04 +02:00
|
|
|
SELECT
|
2024-09-10 17:29:57 +02:00
|
|
|
internal.user_role (_username, delete_account.pass) INTO _role;
|
2024-07-31 07:23:32 +02:00
|
|
|
IF _role IS NULL THEN
|
2024-08-08 22:29:04 +02:00
|
|
|
RAISE invalid_password
|
|
|
|
|
USING message = 'Invalid password';
|
2024-09-14 15:12:08 +02:00
|
|
|
ELSE
|
2024-08-08 22:29:04 +02:00
|
|
|
DELETE FROM internal.user AS u
|
|
|
|
|
WHERE u.username = _username;
|
|
|
|
|
was_deleted := TRUE;
|
2024-09-14 15:12:08 +02:00
|
|
|
END IF;
|
2024-07-31 07:23:32 +02:00
|
|
|
END;
|
2024-08-08 22:29:04 +02:00
|
|
|
$$
|
|
|
|
|
LANGUAGE plpgsql
|
|
|
|
|
SECURITY DEFINER;
|
2024-07-31 07:23:32 +02:00
|
|
|
|
2024-10-08 21:20:44 +02:00
|
|
|
GRANT EXECUTE ON FUNCTION api.register TO anon;
|
2024-07-31 07:23:32 +02:00
|
|
|
|
2024-10-08 21:20:44 +02:00
|
|
|
GRANT EXECUTE ON FUNCTION api.login TO anon;
|
2024-07-31 07:23:32 +02:00
|
|
|
|
2024-10-08 21:20:44 +02:00
|
|
|
GRANT EXECUTE ON FUNCTION api.delete_account TO authenticated_user;
|
2024-09-10 17:29:57 +02:00
|
|
|
|
2024-07-31 07:23:32 +02:00
|
|
|
-- migrate:down
|
2024-09-10 17:29:57 +02:00
|
|
|
DROP TRIGGER encrypt_pass ON internal.user;
|
|
|
|
|
|
|
|
|
|
DROP TRIGGER ensure_user_role_exists ON internal.user;
|
|
|
|
|
|
2024-10-08 21:20:44 +02:00
|
|
|
DROP FUNCTION api.register;
|
2024-08-08 22:29:04 +02:00
|
|
|
|
2024-10-08 21:20:44 +02:00
|
|
|
DROP FUNCTION api.login;
|
2024-07-31 07:23:32 +02:00
|
|
|
|
2024-10-08 21:20:44 +02:00
|
|
|
DROP FUNCTION api.delete_account;
|
2024-08-08 22:29:04 +02:00
|
|
|
|
2024-10-08 21:20:44 +02:00
|
|
|
DROP FUNCTION internal.user_role;
|
2024-07-31 07:23:32 +02:00
|
|
|
|
2024-10-08 21:20:44 +02:00
|
|
|
DROP FUNCTION internal.encrypt_pass;
|
2024-07-31 07:23:32 +02:00
|
|
|
|
2024-10-08 21:20:44 +02:00
|
|
|
DROP FUNCTION internal.check_role_exists;
|
2024-07-31 07:23:32 +02:00
|
|
|
|
|
|
|
|
DROP EXTENSION pgjwt;
|
2024-08-08 22:29:04 +02:00
|
|
|
|
|
|
|
|
DROP EXTENSION pgcrypto;
|
|
|
|
|
|