diff --git a/api/api.txt b/api/api.txt index 81ac90c..5702213 100644 --- a/api/api.txt +++ b/api/api.txt @@ -3,23 +3,27 @@ Personal Measure API ### Measure -☐ GET /measures Get a list of all defined measures for this user. -☐ POST /measures Create a new measure (post the definition). -☐ GET /measures/ Get the definition for a specific measure. -☐ DELETE /measures/ Delete a measure (and all values associated with it). +☑ GET /measures Get a list of all defined measures for this user. +☑ POST /measures Create a new measure (post the definition). +☑ GET /measures/ Get the definition for a specific measure. +☑ DELETE /measures/ Delete a measure (and all values associated with it). ### Values -☐ GET / Get a list of values for a measure. -☐ POST / Add a new value for a measure. -☐ GET // Get the details for a specific value by id. -☐ PUT // Update a value by id. -☐ DELETE / Delete a value by id. +☑ GET /measure/ Get a list of measurements for a measure. +☑ POST /measure/ Add a new measurements for a measure. +☑ GET /measure// Get the details for a specific measurements by id. +☐ PUT /measure// Update a measurements by id. +☑ DELETE /measure// Delete a measurements by id. ### Auth ☑ GET /auth-token Given a valid username/password combo, get an auth token. ☑ GET /user Given a valid auth token, return the user details. +☑ POST /user Given a valid auth token for an admin user, create a new user account. +☑ DELETE /user Given a valid auth token for an admin user, delete a user account. +☑ POST /change-pwd Given a valid auth token and a valid password, change the password +☑ POST /change-pwd/ Given a valid auth token for an admin user change the given user's password ☑ GET /api-tokens List api tokens. ☑ DELETE /api-tokens/ Delete a specific api token. ☑ POST /api-tokens With a valid session, create a new api token. diff --git a/api/src/main/nim/personal_measure_api b/api/src/main/nim/personal_measure_api new file mode 100755 index 0000000..b41ff76 Binary files /dev/null and b/api/src/main/nim/personal_measure_api differ diff --git a/api/src/main/nim/personal_measure_api.nim b/api/src/main/nim/personal_measure_api.nim index 8aa9bb1..7dbaf80 100644 --- a/api/src/main/nim/personal_measure_api.nim +++ b/api/src/main/nim/personal_measure_api.nim @@ -5,8 +5,10 @@ import personal_measure_apipkg/configuration import personal_measure_apipkg/service import personal_measure_apipkg/version +# temp for testing import personal_measure_apipkg/db import personal_measure_apipkg/models +import bcrypt const DEFAULT_CONFIG = PMApiConfig( authSecret: "change me", @@ -73,19 +75,19 @@ Options: # Initialize our service context let args = docopt(doc, version = PM_API_VERSION) - echo $args let ctx = initContext(args) if args["hashpwd"]: if args["--salt"]: - echo hashPwd($args[""], $args["--salt"]) + echo hashWithSalt($args[""], $args["--salt"]) else: let cost = ctx.cfg.pwdCost echo hashPwd($args[""], cast[int8](cost)) if args["test"]: echo "test" - echo ctx.db.getUsersByEmail("jonathan@jdbernard.com") + echo ctx.db.findUsersByEmail("jonathan@jdbernard.com") + echo genSalt(ctx.cfg.pwdCost) if args["serve"]: start(ctx) diff --git a/api/src/main/nim/personal_measure_apipkg/api.nim b/api/src/main/nim/personal_measure_apipkg/api.nim index 62a0b64..67e5306 100644 --- a/api/src/main/nim/personal_measure_apipkg/api.nim +++ b/api/src/main/nim/personal_measure_apipkg/api.nim @@ -1,5 +1,6 @@ import asyncdispatch, base64, jester, json, jwt, logging, options, sequtils, strutils, times, uuids +from unicode import capitalize import timeutils except `<` import ./db, ./configuration, ./models, ./service, ./version @@ -47,6 +48,17 @@ template json500Resp(ex: ref Exception, details: string = ""): void = error details & ":\n" & ex.msg jsonResp(Http500) +# internal JSON parsing utils +proc getIfExists(n: JsonNode, key: string): JsonNode = + ## convenience method to get a key from a JObject or return null + result = if n.hasKey(key): n[key] + else: newJNull() + +proc getOrFail(n: JsonNode, key: string, objName: string = ""): JsonNode = + ## convenience method to get a key from a JObject or raise an exception + if not n.hasKey(key): raiseEx BadRequestError, objName & " missing key '" & key & "'" + return n[key] + proc toJWT*(ctx: PMApiContext, session: Session): string = ## Make a JST token for this session. var jwt = JWT( @@ -78,25 +90,21 @@ proc fromJWT*(ctx: PMApiContext, strTok: string): Session = expires: fromUnix(jwt.claims["exp"].node.num)) proc fromApiToken*(ctx: PMApiContext, strTok: string): Session = - info "fromApiToken" let pairs = strTok.decode.split(":") let email = pairs[0] let apiTokVal = pairs[1] - info "email: " & email & "\tapiTokVal: " & apiTokVal # Look up the user var user: User try: - let users = ctx.db.getUsersByEmail(email) + let users = ctx.db.findUsersByEmail(email) if users.len != 1: raiseEx "" user = users[0] - info "Found user: " & $user except: raiseEx "invalid username or password" # look for the ApiToken record, hashing the token provided with the user's salt - let hashedToken = hashPwd(apiTokVal, user.salt) - echo "Hashed token: " & hashedToken - let foundTokens = ctx.db.getApiTokensByHashedToken(hashedToken) + let hashed = hashWithSalt(apiTokVal, user.salt) + let foundTokens = ctx.db.findApiTokensByHashedToken(hashed.hash) if foundTokens.len != 1: raiseEx "invalid username or password" let apiToken = foundTokens[0] @@ -137,23 +145,23 @@ proc makeAuthToken*(ctx: PMApiContext, email, pwd: string): string = ## token string. if email.len == 0 or pwd.len == 0: - raiseEx "fields 'username' and 'password' required" + raiseEx AuthError, "fields 'username' and 'password' required" # find the user record var user: User try: - let users = ctx.db.getUsersByEmail(email) + let users = ctx.db.findUsersByEmail(email) if users.len != 1: raiseEx "" user = users[0] - except: raiseEx "invalid username or password" + except: raiseEx AuthError, "invalid username or password" - if not validatePwd(user, pwd): raiseEx "invalid username or password" + if not validatePwd(user, pwd): raiseEx AuthError, "invalid username or password" let session = newSession(user) result = toJWT(ctx, session) -template checkAuth() = +template checkAuth(requiresAdmin = false) = ## Check this request for authentication and authorization information. ## Injects the session into the running context. If the request is not ## authorized, this template returns an appropriate 401 response. @@ -165,6 +173,9 @@ template checkAuth() = debug "Auth failed: " & getCurrentExceptionMsg() jsonResp(Http401, "Unauthorized", @{"WWW-Authenticate": "Bearer"}) + if requiresAdmin and not session.user.isAdmin: + jsonResp(Http401, "Unauthorized", @{"WWW-Authenticate": "Bearer"}) + proc start*(ctx: PMApiContext): void = if ctx.cfg.debug: setLogFilter(lvlDebug) @@ -181,48 +192,128 @@ proc start*(ctx: PMApiContext): void = resp($(%("personal_measure_api v" & PM_API_VERSION)), JSON) post "/auth-token": - var email, pwd: string - try: - let jsonBody = parseJson(request.body) - email = jsonBody["email"].getStr - pwd = jsonBody["password"].getStr - except: jsonResp(Http400) try: + let jsonBody = parseJson(request.body) + let email = jsonBody.getOrFail("email").getStr + let pwd = jsonBody.getOrFail("password").getStr let authToken = makeAuthToken(ctx, email, pwd) resp($(%authToken), JSON) + except JsonParsingError: jsonResp(Http400, getCurrentExceptionMsg()) except: jsonResp(Http401, getCurrentExceptionMsg()) + post "/change-pwd": + checkAuth() + + try: + let jsonBody = parseJson(request.body) + + if not validatePwd(session.user, jsonBody.getOrFail("oldPassword").getStr): + raiseEx AuthError, "old password is incorrect" + + let newHash = hashWithSalt(jsonBody.getOrFail("newPassword").getStr, session.user.salt) + session.user.hashedPwd = newHash.hash + if ctx.db.updateUser(session.user): jsonResp(Http200) + else: jsonResp(Http500, "unable to change pwd") + + except JsonParsingError: jsonResp(Http400, getCurrentExceptionMsg()) + except BadRequestError: jsonResp(Http400, getCurrentExceptionMsg()) + except AuthError: jsonResp(Http401, getCurrentExceptionMsg()) + except: + error "internal error changing password: " & getCurrentExceptionMsg() + jsonResp(Http500) + + post "/change-pwd/@userId": + checkAuth(true) + + try: + let jsonBody = parseJson(request.body) + + var user = ctx.db.getUser(parseUUID(@"userId")) + let newHash = hashWithSalt(jsonBody.getOrFail("newPassword").getStr, user.salt) + user.hashedPwd = newHash.hash + if ctx.db.updateUser(user): jsonResp(Http200) + else: jsonResp(Http500, "unable to change pwd") + + except ValueError: jsonResp(Http400, "invalid UUID") + except JsonParsingError: jsonResp(Http400, getCurrentExceptionMsg()) + except BadRequestError: jsonResp(Http400, getCurrentExceptionMsg()) + except AuthError: jsonResp(Http401, getCurrentExceptionMsg()) + except NotFoundError: jsonResp(Http404, "no such user") + except: + error "internal error changing password: " & getCurrentExceptionMsg() + jsonResp(Http500) + get "/user": checkAuth() resp(Http200, $(%session.user), JSON) + post "/users": + checkAuth(true) + + try: + let jsonBody = parseJson(request.body) + + let pwdAndSalt = jsonBody.getOrFail("password").getStr.hashPwd(ctx.cfg.pwdCost) + + let newUser = User( + displayName: jsonBody.getOrFail("displayName").getStr, + email: jsonBody.getOrFail("email").getStr, + hashedPwd: pwdAndSalt.pwd, + salt: pwdAndSalt.salt, + isAdmin: false) + + resp($(%ctx.db.createUser(newUser)), JSON) + + except JsonParsingError: jsonResp(Http400, getCurrentExceptionMsg()) + except BadRequestError: jsonResp(Http400, getCurrentExceptionMsg()) + except: + error "Could not create new user:\n\t" & getCurrentExceptionMsg() + jsonResp(Http500) + + delete "/users/@userId": + checkAuth(true) + + var user: User + try: + let userId = parseUUID(@"userId") + user = ctx.db.getUser(userId) + except: jsonResp(Http404) + + try: + if not ctx.db.deleteUser(user): raiseEx "unable to delete user" + except: jsonResp(Http500, getCurrentExceptionMsg()) + get "/api-tokens": checkAuth() - resp(Http200, $(%ctx.db.getApiTokensByUserId($session.user.id))) + resp(Http200, $(%ctx.db.findApiTokensByUserId($session.user.id))) post "/api-tokens": checkAuth() - var newToken: ApiToken try: let jsonBody = parseJson(request.body) - newToken = ApiToken( + var newToken = ApiToken( userId: session.user.id, - name: jsonBody["name"].getStr, + name: jsonBody.getOrFail("name").getStr, expires: none[DateTime](), hashedToken: "") - except: jsonResp(Http400) - try: let tokenValue = randomString(ctx.cfg.pwdCost) - newToken.hashedToken = hashPwd(tokenValue, session.user.salt) + let hashed = hashWithSalt(tokenValue, session.user.salt) + + newToken.hashedToken = hashed.hash newToken = ctx.db.createApiToken(newToken) + let respToken = %newToken respToken["value"] = %tokenValue resp($respToken, JSON) + + except JsonParsingError: jsonResp(Http400, getCurrentExceptionMsg()) + except BadRequestError: jsonResp(Http400, getCurrentExceptionMsg()) + except AuthError: jsonResp(Http401, getCurrentExceptionMsg()) except: debug getCurrentExceptionMsg() jsonResp(Http500) @@ -237,6 +328,148 @@ proc start*(ctx: PMApiContext): void = else: jsonResp(Http500) except: jsonResp(Http404) + get "/measures": + checkAuth() + + try: resp($(%ctx.db.findMeasuresByUserId($session.user.id)), JSON) + except: + error "unable to retrieve measures for user:\n\t" & getCurrentExceptionMsg() + jsonResp(Http500) + + post "/measures": + checkAuth() + + try: + let jsonBody = parseJson(request.body) + + if not (jsonBody.hasKey("slug") or jsonBody.hasKey("name")): + raiseEx BadRequestError, "body must contain either the 'slug' field (short name), or the 'name' field, or both" + + let slug = + if jsonBody.hasKey("slug"): jsonBody["slug"].getStr.nameToSlug + else: jsonBody["slug"].getStr.nameToSlug + + let name = + if jsonBody.hasKey("name"): jsonBody["name"].getStr + else: jsonBody["slug"].getStr.capitalize + + var newMeasure = Measure( + userId: session.user.id, + slug: slug, + name: name, + description: jsonBody.getIfExists("description").getStr(""), + domainSource: + if jsonBody.hasKey("domainSource"): some(jsonBody["domainSource"].getStr) + else: none[string](), + domainUnits: jsonBody.getIfExists("domainUnits").getStr(""), + rangeSource: + if jsonBody.hasKey("rangeSource"): some(jsonBody["rangeSource"].getStr) + else: none[string](), + rangeUnits: jsonBody.getIfExists("rangeUnits").getStr(""), + analysis: @[]) + + if jsonBody.hasKey("analysis"): + for a in jsonBody["analysis"].getElems: + newMeasure.analysis.add(a.getStr) + + resp($(%ctx.db.createMeasure(newMeasure)), JSON) + + except JsonParsingError: jsonResp(Http400, getCurrentExceptionMsg()) + except BadRequestError: jsonResp(Http400, getCurrentExceptionMsg()) + except: + error "unable to create new measure:\n\t" & getCurrentExceptionMsg() + jsonResp(Http500) + + get "/measures/@slug": + checkAuth() + + try: resp($(%ctx.getMeasureForSlug(session.user.id, @"slug")), JSON) + except NotFoundError: jsonResp(Http404, getCurrentExceptionMsg()) + except: + error "unable to look up a measure by id:\n\t" & getCurrentExceptionMsg() + jsonResp(Http500) + + delete "/measures/@slug": + checkAuth() + + try: + let measure = ctx.getMeasureForSlug(session.user.id, @"slug") + if ctx.db.deleteMeasure(measure): jsonResp(Http200) + else: raiseEx "" + except NotFoundError: jsonResp(Http404, getCurrentExceptionMsg()) + except: + error "unable to delete a measure:\n\t" & getCurrentExceptionMsg() + jsonResp(Http500) + + get "/measure/@slug": + checkAuth() + + try: + let measure = ctx.getMeasureForSlug(session.user.id, @"slug") + resp($(%ctx.db.findMeasurementsByMeasureId($measure.id)), JSON) + except NotFoundError: jsonResp(Http404, getCurrentExceptionMsg()) + except: + error "unable to list measurements:\n\t" & getCurrentExceptionMsg() + jsonResp(Http500) + + post "/measure/@slug": + checkAuth() + + try: + let measure = ctx.getMeasureForSlug(session.user.id, @"slug") + let jsonBody = parseJson(request.body) + + let newMeasurement = Measurement( + measureId: measure.id, + value: jsonBody.getOrFail("value").getInt, + timestamp: + if jsonBody.hasKey("timestamp"): jsonBody["timestamp"].getStr.parseIso8601.utc + else: getTime().utc, + extData: + if jsonBody.hasKey("extData"): jsonBody["extData"] + else: newJObject()) + + resp($(%ctx.db.createMeasurement(newMeasurement)), JSON) + + except JsonParsingError: jsonResp(Http400, getCurrentExceptionMsg()) + except BadRequestError: jsonResp(Http400, getCurrentExceptionMsg()) + except NotFoundError: jsonResp(Http404, getCurrentExceptionMsg()) + except: + error "unable to add measurement:\n\t" & getCurrentExceptionMsg() + jsonResp(Http500) + + get "/measure/@slug/@id": + checkAuth() + + try: + let measure = ctx.getMeasureForSlug(session.user.id, @"slug") + resp($(%ctx.getMeasurementForMeasure(measure.id, parseUUID(@"id"))), JSON) + + except ValueError: jsonResp(Http400, getCurrentExceptionMsg()) + except JsonParsingError: jsonResp(Http400, getCurrentExceptionMsg()) + except BadRequestError: jsonResp(Http400, getCurrentExceptionMsg()) + except NotFoundError: jsonResp(Http404, getCurrentExceptionMsg()) + except: + error "unable to retrieve measurement:\n\t" & getCurrentExceptionMsg() + jsonResp(Http500) + + delete "/measure/@slug/@id": + checkAuth() + + try: + let measure = ctx.getMeasureForSlug(session.user.id, @"slug") + let measurement = ctx.getMeasurementForMeasure(measure.id, parseUUID(@"id")) + if ctx.db.deleteMeasurement(measurement): jsonResp(Http200) + else: raiseEx "" + + except ValueError: jsonResp(Http400, getCurrentExceptionMsg()) + except JsonParsingError: jsonResp(Http400, getCurrentExceptionMsg()) + except BadRequestError: jsonResp(Http400, getCurrentExceptionMsg()) + except NotFoundError: jsonResp(Http404, getCurrentExceptionMsg()) + except: + error "unable to delete measurement:\n\t" & getCurrentExceptionMsg() + jsonResp(Http500) + post "/service/debug/stop": if not ctx.cfg.debug: jsonResp(Http404) else: diff --git a/api/src/main/nim/personal_measure_apipkg/configuration.nim b/api/src/main/nim/personal_measure_apipkg/configuration.nim index 8e4f6f7..c71d5c2 100644 --- a/api/src/main/nim/personal_measure_apipkg/configuration.nim +++ b/api/src/main/nim/personal_measure_apipkg/configuration.nim @@ -14,6 +14,9 @@ type cfg*: PMApiConfig db*: PMApiDb + BadRequestError* = object of CatchableError + AuthError* = object of CatchableError + proc `%`*(cfg: PMApiConfig): JsonNode = result = %* { "authSecret": cfg.authSecret, @@ -22,6 +25,10 @@ proc `%`*(cfg: PMApiConfig): JsonNode = "port": cfg.port, "pwdCost": cfg.pwdCost } +template raiseEx*(errorType: type, reason: string): void = + raise newException(errorType, reason) + proc raiseEx*(reason: string): void = raise newException(Exception, reason) + diff --git a/api/src/main/nim/personal_measure_apipkg/models.nim b/api/src/main/nim/personal_measure_apipkg/models.nim index e8bc36e..8a31771 100644 --- a/api/src/main/nim/personal_measure_apipkg/models.nim +++ b/api/src/main/nim/personal_measure_apipkg/models.nim @@ -7,6 +7,7 @@ type email*: string hashedPwd*: string salt*: string + isAdmin*: bool ApiToken* = object id*: UUID @@ -32,7 +33,7 @@ type measureId*: UUID value*: int timestamp*: DateTime - extData*: string + extData*: JsonNode proc `$`*(u: User): string = return "User " & ($u.id)[0..6] & " - " & u.displayName & " <" & u.email & ">" @@ -52,7 +53,8 @@ proc `%`*(u: User): JsonNode = result = %*{ "id": $u.id, "email": u.email, - "displayName": u.displayName + "displayName": u.displayName, + "isAdmin": u.isAdmin } proc `%`*(tok: ApiToken): JsonNode = @@ -85,6 +87,6 @@ proc `%`*(v: Measurement): JsonNode = "id": $v.id, "measureId": $v.measureId, "value": v.value, - "timestampe": v.timestamp.formatIso8601, + "timestamp": v.timestamp.formatIso8601, "extData": v.extData } diff --git a/api/src/main/nim/personal_measure_apipkg/service.nim b/api/src/main/nim/personal_measure_apipkg/service.nim index e815818..8f7df11 100644 --- a/api/src/main/nim/personal_measure_apipkg/service.nim +++ b/api/src/main/nim/personal_measure_apipkg/service.nim @@ -1,4 +1,4 @@ -import bcrypt +import bcrypt, nre, strutils, uuids import ./configuration import ./db @@ -6,14 +6,27 @@ import ./models proc randomString*(cost: int8): string = genSalt(cost) -proc hashPwd*(pwd: string, salt: string): string = - result = hash(pwd, salt) +proc hashWithSalt*(pwd: string, salt: string): tuple[hash, salt: string] = + result = (hash: hash(pwd, salt), salt: salt) -proc hashPwd*(pwd: string, cost: int8): string = - let salt = genSalt(cost) - result = hash(pwd, salt) +proc hashPwd*(pwd: string, cost: int8): tuple[pwd, salt:string] = + let hashed = hashWithSalt(pwd, genSalt(cost)) + result = (pwd: hashed.hash, salt: hashed.salt) proc validatePwd*(u: User, givenPwd: string): bool = let salt = u.salt result = compare(u.hashedPwd, hash(givenPwd, salt)) +proc nameToSlug*(name: string): string = + result = name.replace(re"\W+", "-").toLower + +proc getMeasureForSlug*(ctx: PMApiContext, userId: UUID, slug: string): Measure = + let measures = ctx.db.findMeasuresByUserIdAndSlug($userId, slug) + if measures.len < 1: raiseEx NotFoundError, "no measure named '" & slug & "'" + result = measures[0] + +proc getMeasurementForMeasure*(ctx: PMApiContext, measureId, measurementId: UUID): Measurement = + let measurements = ctx.db.findMeasurementsByMeasureIdAndId($measureId, $measurementId) + if measurements.len < 1: raiseEx NotFoundError, "no measurement for is '" & $measurementId & "'" + result = measurements[0] + diff --git a/api/src/main/sql/migrations/20190214122514-initial-schema-down.sql b/api/src/main/sql/migrations/20190214122514-initial-schema-down.sql index c31d3c6..39fed75 100644 --- a/api/src/main/sql/migrations/20190214122514-initial-schema-down.sql +++ b/api/src/main/sql/migrations/20190214122514-initial-schema-down.sql @@ -1,5 +1,5 @@ -- DOWN script for initial-schema (20190214122514) -drop table if exists "values"; +drop table if exists "measurements"; drop table if exists "measures"; drop table if exists "api_tokens"; drop table if exists "users"; diff --git a/api/src/main/sql/migrations/20190214122514-initial-schema-up.sql b/api/src/main/sql/migrations/20190214122514-initial-schema-up.sql index a90f8be..44e249d 100644 --- a/api/src/main/sql/migrations/20190214122514-initial-schema-up.sql +++ b/api/src/main/sql/migrations/20190214122514-initial-schema-up.sql @@ -6,7 +6,8 @@ create table "users" ( display_name varchar not null, email varchar not null unique, hashed_pwd varchar not null, - salt varchar not null + salt varchar not null, + is_admin boolean not null default false ); create table "api_tokens" ( @@ -27,13 +28,14 @@ create table "measures" ( domain_units varchar not null default '', range_source varchar default null, range_units varchar not null default '', - analysis varchar[] not null default '{}' + analysis varchar[] not null default '{}', + unique(user_id, slug) ); -create table "values" ( +create table "measurements" ( id uuid default uuid_generate_v4() primary key, measure_id uuid not null references measures (id) on delete cascade on update cascade, value integer not null, - "timestamp" timestamp not null default current_timestamp, + "timestamp" timestamp with time zone not null default current_timestamp, ext_data jsonb not null default '{}'::json );