Implementation of /measure, /measurements APIs.

This commit is contained in:
Jonathan Bernard 2019-02-19 17:51:38 -06:00
parent 33eff538f8
commit 02e0d1cae1
9 changed files with 314 additions and 51 deletions

View File

@ -3,23 +3,27 @@ Personal Measure API
### Measure ### Measure
GET /measures Get a list of all defined measures for this user. GET /measures Get a list of all defined measures for this user.
POST /measures Create a new measure (post the definition). POST /measures Create a new measure (post the definition).
GET /measures/<measure-slug> Get the definition for a specific measure. GET /measures/<measure-slug> Get the definition for a specific measure.
DELETE /measures/<measure-slug> Delete a measure (and all values associated with it). DELETE /measures/<measure-slug> Delete a measure (and all values associated with it).
### Values ### Values
☐ GET /<measure-slug> Get a list of values for a measure. ☑ GET /measure/<measure-slug> Get a list of measurements for a measure.
☐ POST /<measure-slug> Add a new value for a measure. ☑ POST /measure/<measure-slug> Add a new measurements for a measure.
☐ GET /<measure-slug>/<id> Get the details for a specific value by id. ☑ GET /measure/<measure-slug>/<id> Get the details for a specific measurements by id.
☐ PUT /<measure-slug>/<id> Update a value by id. ☐ PUT /measure/<measure-slug>/<id> Update a measurements by id.
☐ DELETE /<measure-slug> Delete a value by id. ☑ DELETE /measure/<measure-slug>/<id> Delete a measurements by id.
### Auth ### Auth
☑ GET /auth-token Given a valid username/password combo, get an auth token. ☑ GET /auth-token Given a valid username/password combo, get an auth token.
☑ GET /user Given a valid auth token, return the user details. ☑ GET /user Given a valid auth token, return the user details.
☑ POST /user Given a valid auth token for an admin user, create a new user account.
☑ DELETE /user Given a valid auth token for an admin user, delete a user account.
☑ POST /change-pwd Given a valid auth token and a valid password, change the password
☑ POST /change-pwd/<id> Given a valid auth token for an admin user change the given user's password
☑ GET /api-tokens List api tokens. ☑ GET /api-tokens List api tokens.
☑ DELETE /api-tokens/<id> Delete a specific api token. ☑ DELETE /api-tokens/<id> Delete a specific api token.
☑ POST /api-tokens With a valid session, create a new api token. ☑ POST /api-tokens With a valid session, create a new api token.

Binary file not shown.

View File

@ -5,8 +5,10 @@ import personal_measure_apipkg/configuration
import personal_measure_apipkg/service import personal_measure_apipkg/service
import personal_measure_apipkg/version import personal_measure_apipkg/version
# temp for testing
import personal_measure_apipkg/db import personal_measure_apipkg/db
import personal_measure_apipkg/models import personal_measure_apipkg/models
import bcrypt
const DEFAULT_CONFIG = PMApiConfig( const DEFAULT_CONFIG = PMApiConfig(
authSecret: "change me", authSecret: "change me",
@ -73,19 +75,19 @@ Options:
# Initialize our service context # Initialize our service context
let args = docopt(doc, version = PM_API_VERSION) let args = docopt(doc, version = PM_API_VERSION)
echo $args
let ctx = initContext(args) let ctx = initContext(args)
if args["hashpwd"]: if args["hashpwd"]:
if args["--salt"]: if args["--salt"]:
echo hashPwd($args["<password>"], $args["--salt"]) echo hashWithSalt($args["<password>"], $args["--salt"])
else: else:
let cost = ctx.cfg.pwdCost let cost = ctx.cfg.pwdCost
echo hashPwd($args["<password>"], cast[int8](cost)) echo hashPwd($args["<password>"], cast[int8](cost))
if args["test"]: if args["test"]:
echo "test" echo "test"
echo ctx.db.getUsersByEmail("jonathan@jdbernard.com") echo ctx.db.findUsersByEmail("jonathan@jdbernard.com")
echo genSalt(ctx.cfg.pwdCost)
if args["serve"]: start(ctx) if args["serve"]: start(ctx)

View File

@ -1,5 +1,6 @@
import asyncdispatch, base64, jester, json, jwt, logging, options, sequtils, import asyncdispatch, base64, jester, json, jwt, logging, options, sequtils,
strutils, times, uuids strutils, times, uuids
from unicode import capitalize
import timeutils except `<` import timeutils except `<`
import ./db, ./configuration, ./models, ./service, ./version import ./db, ./configuration, ./models, ./service, ./version
@ -47,6 +48,17 @@ template json500Resp(ex: ref Exception, details: string = ""): void =
error details & ":\n" & ex.msg error details & ":\n" & ex.msg
jsonResp(Http500) jsonResp(Http500)
# internal JSON parsing utils
proc getIfExists(n: JsonNode, key: string): JsonNode =
## convenience method to get a key from a JObject or return null
result = if n.hasKey(key): n[key]
else: newJNull()
proc getOrFail(n: JsonNode, key: string, objName: string = ""): JsonNode =
## convenience method to get a key from a JObject or raise an exception
if not n.hasKey(key): raiseEx BadRequestError, objName & " missing key '" & key & "'"
return n[key]
proc toJWT*(ctx: PMApiContext, session: Session): string = proc toJWT*(ctx: PMApiContext, session: Session): string =
## Make a JST token for this session. ## Make a JST token for this session.
var jwt = JWT( var jwt = JWT(
@ -78,25 +90,21 @@ proc fromJWT*(ctx: PMApiContext, strTok: string): Session =
expires: fromUnix(jwt.claims["exp"].node.num)) expires: fromUnix(jwt.claims["exp"].node.num))
proc fromApiToken*(ctx: PMApiContext, strTok: string): Session = proc fromApiToken*(ctx: PMApiContext, strTok: string): Session =
info "fromApiToken"
let pairs = strTok.decode.split(":") let pairs = strTok.decode.split(":")
let email = pairs[0] let email = pairs[0]
let apiTokVal = pairs[1] let apiTokVal = pairs[1]
info "email: " & email & "\tapiTokVal: " & apiTokVal
# Look up the user # Look up the user
var user: User var user: User
try: try:
let users = ctx.db.getUsersByEmail(email) let users = ctx.db.findUsersByEmail(email)
if users.len != 1: raiseEx "" if users.len != 1: raiseEx ""
user = users[0] user = users[0]
info "Found user: " & $user
except: raiseEx "invalid username or password" except: raiseEx "invalid username or password"
# look for the ApiToken record, hashing the token provided with the user's salt # look for the ApiToken record, hashing the token provided with the user's salt
let hashedToken = hashPwd(apiTokVal, user.salt) let hashed = hashWithSalt(apiTokVal, user.salt)
echo "Hashed token: " & hashedToken let foundTokens = ctx.db.findApiTokensByHashedToken(hashed.hash)
let foundTokens = ctx.db.getApiTokensByHashedToken(hashedToken)
if foundTokens.len != 1: raiseEx "invalid username or password" if foundTokens.len != 1: raiseEx "invalid username or password"
let apiToken = foundTokens[0] let apiToken = foundTokens[0]
@ -137,23 +145,23 @@ proc makeAuthToken*(ctx: PMApiContext, email, pwd: string): string =
## token string. ## token string.
if email.len == 0 or pwd.len == 0: if email.len == 0 or pwd.len == 0:
raiseEx "fields 'username' and 'password' required" raiseEx AuthError, "fields 'username' and 'password' required"
# find the user record # find the user record
var user: User var user: User
try: try:
let users = ctx.db.getUsersByEmail(email) let users = ctx.db.findUsersByEmail(email)
if users.len != 1: raiseEx "" if users.len != 1: raiseEx ""
user = users[0] user = users[0]
except: raiseEx "invalid username or password" except: raiseEx AuthError, "invalid username or password"
if not validatePwd(user, pwd): raiseEx "invalid username or password" if not validatePwd(user, pwd): raiseEx AuthError, "invalid username or password"
let session = newSession(user) let session = newSession(user)
result = toJWT(ctx, session) result = toJWT(ctx, session)
template checkAuth() = template checkAuth(requiresAdmin = false) =
## Check this request for authentication and authorization information. ## Check this request for authentication and authorization information.
## Injects the session into the running context. If the request is not ## Injects the session into the running context. If the request is not
## authorized, this template returns an appropriate 401 response. ## authorized, this template returns an appropriate 401 response.
@ -165,6 +173,9 @@ template checkAuth() =
debug "Auth failed: " & getCurrentExceptionMsg() debug "Auth failed: " & getCurrentExceptionMsg()
jsonResp(Http401, "Unauthorized", @{"WWW-Authenticate": "Bearer"}) jsonResp(Http401, "Unauthorized", @{"WWW-Authenticate": "Bearer"})
if requiresAdmin and not session.user.isAdmin:
jsonResp(Http401, "Unauthorized", @{"WWW-Authenticate": "Bearer"})
proc start*(ctx: PMApiContext): void = proc start*(ctx: PMApiContext): void =
if ctx.cfg.debug: setLogFilter(lvlDebug) if ctx.cfg.debug: setLogFilter(lvlDebug)
@ -181,48 +192,128 @@ proc start*(ctx: PMApiContext): void =
resp($(%("personal_measure_api v" & PM_API_VERSION)), JSON) resp($(%("personal_measure_api v" & PM_API_VERSION)), JSON)
post "/auth-token": post "/auth-token":
var email, pwd: string
try:
let jsonBody = parseJson(request.body)
email = jsonBody["email"].getStr
pwd = jsonBody["password"].getStr
except: jsonResp(Http400)
try: try:
let jsonBody = parseJson(request.body)
let email = jsonBody.getOrFail("email").getStr
let pwd = jsonBody.getOrFail("password").getStr
let authToken = makeAuthToken(ctx, email, pwd) let authToken = makeAuthToken(ctx, email, pwd)
resp($(%authToken), JSON) resp($(%authToken), JSON)
except JsonParsingError: jsonResp(Http400, getCurrentExceptionMsg())
except: jsonResp(Http401, getCurrentExceptionMsg()) except: jsonResp(Http401, getCurrentExceptionMsg())
post "/change-pwd":
checkAuth()
try:
let jsonBody = parseJson(request.body)
if not validatePwd(session.user, jsonBody.getOrFail("oldPassword").getStr):
raiseEx AuthError, "old password is incorrect"
let newHash = hashWithSalt(jsonBody.getOrFail("newPassword").getStr, session.user.salt)
session.user.hashedPwd = newHash.hash
if ctx.db.updateUser(session.user): jsonResp(Http200)
else: jsonResp(Http500, "unable to change pwd")
except JsonParsingError: jsonResp(Http400, getCurrentExceptionMsg())
except BadRequestError: jsonResp(Http400, getCurrentExceptionMsg())
except AuthError: jsonResp(Http401, getCurrentExceptionMsg())
except:
error "internal error changing password: " & getCurrentExceptionMsg()
jsonResp(Http500)
post "/change-pwd/@userId":
checkAuth(true)
try:
let jsonBody = parseJson(request.body)
var user = ctx.db.getUser(parseUUID(@"userId"))
let newHash = hashWithSalt(jsonBody.getOrFail("newPassword").getStr, user.salt)
user.hashedPwd = newHash.hash
if ctx.db.updateUser(user): jsonResp(Http200)
else: jsonResp(Http500, "unable to change pwd")
except ValueError: jsonResp(Http400, "invalid UUID")
except JsonParsingError: jsonResp(Http400, getCurrentExceptionMsg())
except BadRequestError: jsonResp(Http400, getCurrentExceptionMsg())
except AuthError: jsonResp(Http401, getCurrentExceptionMsg())
except NotFoundError: jsonResp(Http404, "no such user")
except:
error "internal error changing password: " & getCurrentExceptionMsg()
jsonResp(Http500)
get "/user": get "/user":
checkAuth() checkAuth()
resp(Http200, $(%session.user), JSON) resp(Http200, $(%session.user), JSON)
post "/users":
checkAuth(true)
try:
let jsonBody = parseJson(request.body)
let pwdAndSalt = jsonBody.getOrFail("password").getStr.hashPwd(ctx.cfg.pwdCost)
let newUser = User(
displayName: jsonBody.getOrFail("displayName").getStr,
email: jsonBody.getOrFail("email").getStr,
hashedPwd: pwdAndSalt.pwd,
salt: pwdAndSalt.salt,
isAdmin: false)
resp($(%ctx.db.createUser(newUser)), JSON)
except JsonParsingError: jsonResp(Http400, getCurrentExceptionMsg())
except BadRequestError: jsonResp(Http400, getCurrentExceptionMsg())
except:
error "Could not create new user:\n\t" & getCurrentExceptionMsg()
jsonResp(Http500)
delete "/users/@userId":
checkAuth(true)
var user: User
try:
let userId = parseUUID(@"userId")
user = ctx.db.getUser(userId)
except: jsonResp(Http404)
try:
if not ctx.db.deleteUser(user): raiseEx "unable to delete user"
except: jsonResp(Http500, getCurrentExceptionMsg())
get "/api-tokens": get "/api-tokens":
checkAuth() checkAuth()
resp(Http200, $(%ctx.db.getApiTokensByUserId($session.user.id))) resp(Http200, $(%ctx.db.findApiTokensByUserId($session.user.id)))
post "/api-tokens": post "/api-tokens":
checkAuth() checkAuth()
var newToken: ApiToken
try: try:
let jsonBody = parseJson(request.body) let jsonBody = parseJson(request.body)
newToken = ApiToken( var newToken = ApiToken(
userId: session.user.id, userId: session.user.id,
name: jsonBody["name"].getStr, name: jsonBody.getOrFail("name").getStr,
expires: none[DateTime](), expires: none[DateTime](),
hashedToken: "") hashedToken: "")
except: jsonResp(Http400)
try:
let tokenValue = randomString(ctx.cfg.pwdCost) let tokenValue = randomString(ctx.cfg.pwdCost)
newToken.hashedToken = hashPwd(tokenValue, session.user.salt) let hashed = hashWithSalt(tokenValue, session.user.salt)
newToken.hashedToken = hashed.hash
newToken = ctx.db.createApiToken(newToken) newToken = ctx.db.createApiToken(newToken)
let respToken = %newToken let respToken = %newToken
respToken["value"] = %tokenValue respToken["value"] = %tokenValue
resp($respToken, JSON) resp($respToken, JSON)
except JsonParsingError: jsonResp(Http400, getCurrentExceptionMsg())
except BadRequestError: jsonResp(Http400, getCurrentExceptionMsg())
except AuthError: jsonResp(Http401, getCurrentExceptionMsg())
except: except:
debug getCurrentExceptionMsg() debug getCurrentExceptionMsg()
jsonResp(Http500) jsonResp(Http500)
@ -237,6 +328,148 @@ proc start*(ctx: PMApiContext): void =
else: jsonResp(Http500) else: jsonResp(Http500)
except: jsonResp(Http404) except: jsonResp(Http404)
get "/measures":
checkAuth()
try: resp($(%ctx.db.findMeasuresByUserId($session.user.id)), JSON)
except:
error "unable to retrieve measures for user:\n\t" & getCurrentExceptionMsg()
jsonResp(Http500)
post "/measures":
checkAuth()
try:
let jsonBody = parseJson(request.body)
if not (jsonBody.hasKey("slug") or jsonBody.hasKey("name")):
raiseEx BadRequestError, "body must contain either the 'slug' field (short name), or the 'name' field, or both"
let slug =
if jsonBody.hasKey("slug"): jsonBody["slug"].getStr.nameToSlug
else: jsonBody["slug"].getStr.nameToSlug
let name =
if jsonBody.hasKey("name"): jsonBody["name"].getStr
else: jsonBody["slug"].getStr.capitalize
var newMeasure = Measure(
userId: session.user.id,
slug: slug,
name: name,
description: jsonBody.getIfExists("description").getStr(""),
domainSource:
if jsonBody.hasKey("domainSource"): some(jsonBody["domainSource"].getStr)
else: none[string](),
domainUnits: jsonBody.getIfExists("domainUnits").getStr(""),
rangeSource:
if jsonBody.hasKey("rangeSource"): some(jsonBody["rangeSource"].getStr)
else: none[string](),
rangeUnits: jsonBody.getIfExists("rangeUnits").getStr(""),
analysis: @[])
if jsonBody.hasKey("analysis"):
for a in jsonBody["analysis"].getElems:
newMeasure.analysis.add(a.getStr)
resp($(%ctx.db.createMeasure(newMeasure)), JSON)
except JsonParsingError: jsonResp(Http400, getCurrentExceptionMsg())
except BadRequestError: jsonResp(Http400, getCurrentExceptionMsg())
except:
error "unable to create new measure:\n\t" & getCurrentExceptionMsg()
jsonResp(Http500)
get "/measures/@slug":
checkAuth()
try: resp($(%ctx.getMeasureForSlug(session.user.id, @"slug")), JSON)
except NotFoundError: jsonResp(Http404, getCurrentExceptionMsg())
except:
error "unable to look up a measure by id:\n\t" & getCurrentExceptionMsg()
jsonResp(Http500)
delete "/measures/@slug":
checkAuth()
try:
let measure = ctx.getMeasureForSlug(session.user.id, @"slug")
if ctx.db.deleteMeasure(measure): jsonResp(Http200)
else: raiseEx ""
except NotFoundError: jsonResp(Http404, getCurrentExceptionMsg())
except:
error "unable to delete a measure:\n\t" & getCurrentExceptionMsg()
jsonResp(Http500)
get "/measure/@slug":
checkAuth()
try:
let measure = ctx.getMeasureForSlug(session.user.id, @"slug")
resp($(%ctx.db.findMeasurementsByMeasureId($measure.id)), JSON)
except NotFoundError: jsonResp(Http404, getCurrentExceptionMsg())
except:
error "unable to list measurements:\n\t" & getCurrentExceptionMsg()
jsonResp(Http500)
post "/measure/@slug":
checkAuth()
try:
let measure = ctx.getMeasureForSlug(session.user.id, @"slug")
let jsonBody = parseJson(request.body)
let newMeasurement = Measurement(
measureId: measure.id,
value: jsonBody.getOrFail("value").getInt,
timestamp:
if jsonBody.hasKey("timestamp"): jsonBody["timestamp"].getStr.parseIso8601.utc
else: getTime().utc,
extData:
if jsonBody.hasKey("extData"): jsonBody["extData"]
else: newJObject())
resp($(%ctx.db.createMeasurement(newMeasurement)), JSON)
except JsonParsingError: jsonResp(Http400, getCurrentExceptionMsg())
except BadRequestError: jsonResp(Http400, getCurrentExceptionMsg())
except NotFoundError: jsonResp(Http404, getCurrentExceptionMsg())
except:
error "unable to add measurement:\n\t" & getCurrentExceptionMsg()
jsonResp(Http500)
get "/measure/@slug/@id":
checkAuth()
try:
let measure = ctx.getMeasureForSlug(session.user.id, @"slug")
resp($(%ctx.getMeasurementForMeasure(measure.id, parseUUID(@"id"))), JSON)
except ValueError: jsonResp(Http400, getCurrentExceptionMsg())
except JsonParsingError: jsonResp(Http400, getCurrentExceptionMsg())
except BadRequestError: jsonResp(Http400, getCurrentExceptionMsg())
except NotFoundError: jsonResp(Http404, getCurrentExceptionMsg())
except:
error "unable to retrieve measurement:\n\t" & getCurrentExceptionMsg()
jsonResp(Http500)
delete "/measure/@slug/@id":
checkAuth()
try:
let measure = ctx.getMeasureForSlug(session.user.id, @"slug")
let measurement = ctx.getMeasurementForMeasure(measure.id, parseUUID(@"id"))
if ctx.db.deleteMeasurement(measurement): jsonResp(Http200)
else: raiseEx ""
except ValueError: jsonResp(Http400, getCurrentExceptionMsg())
except JsonParsingError: jsonResp(Http400, getCurrentExceptionMsg())
except BadRequestError: jsonResp(Http400, getCurrentExceptionMsg())
except NotFoundError: jsonResp(Http404, getCurrentExceptionMsg())
except:
error "unable to delete measurement:\n\t" & getCurrentExceptionMsg()
jsonResp(Http500)
post "/service/debug/stop": post "/service/debug/stop":
if not ctx.cfg.debug: jsonResp(Http404) if not ctx.cfg.debug: jsonResp(Http404)
else: else:

View File

@ -14,6 +14,9 @@ type
cfg*: PMApiConfig cfg*: PMApiConfig
db*: PMApiDb db*: PMApiDb
BadRequestError* = object of CatchableError
AuthError* = object of CatchableError
proc `%`*(cfg: PMApiConfig): JsonNode = proc `%`*(cfg: PMApiConfig): JsonNode =
result = %* { result = %* {
"authSecret": cfg.authSecret, "authSecret": cfg.authSecret,
@ -22,6 +25,10 @@ proc `%`*(cfg: PMApiConfig): JsonNode =
"port": cfg.port, "port": cfg.port,
"pwdCost": cfg.pwdCost } "pwdCost": cfg.pwdCost }
template raiseEx*(errorType: type, reason: string): void =
raise newException(errorType, reason)
proc raiseEx*(reason: string): void = proc raiseEx*(reason: string): void =
raise newException(Exception, reason) raise newException(Exception, reason)

View File

@ -7,6 +7,7 @@ type
email*: string email*: string
hashedPwd*: string hashedPwd*: string
salt*: string salt*: string
isAdmin*: bool
ApiToken* = object ApiToken* = object
id*: UUID id*: UUID
@ -32,7 +33,7 @@ type
measureId*: UUID measureId*: UUID
value*: int value*: int
timestamp*: DateTime timestamp*: DateTime
extData*: string extData*: JsonNode
proc `$`*(u: User): string = proc `$`*(u: User): string =
return "User " & ($u.id)[0..6] & " - " & u.displayName & " <" & u.email & ">" return "User " & ($u.id)[0..6] & " - " & u.displayName & " <" & u.email & ">"
@ -52,7 +53,8 @@ proc `%`*(u: User): JsonNode =
result = %*{ result = %*{
"id": $u.id, "id": $u.id,
"email": u.email, "email": u.email,
"displayName": u.displayName "displayName": u.displayName,
"isAdmin": u.isAdmin
} }
proc `%`*(tok: ApiToken): JsonNode = proc `%`*(tok: ApiToken): JsonNode =
@ -85,6 +87,6 @@ proc `%`*(v: Measurement): JsonNode =
"id": $v.id, "id": $v.id,
"measureId": $v.measureId, "measureId": $v.measureId,
"value": v.value, "value": v.value,
"timestampe": v.timestamp.formatIso8601, "timestamp": v.timestamp.formatIso8601,
"extData": v.extData "extData": v.extData
} }

View File

@ -1,4 +1,4 @@
import bcrypt import bcrypt, nre, strutils, uuids
import ./configuration import ./configuration
import ./db import ./db
@ -6,14 +6,27 @@ import ./models
proc randomString*(cost: int8): string = genSalt(cost) proc randomString*(cost: int8): string = genSalt(cost)
proc hashPwd*(pwd: string, salt: string): string = proc hashWithSalt*(pwd: string, salt: string): tuple[hash, salt: string] =
result = hash(pwd, salt) result = (hash: hash(pwd, salt), salt: salt)
proc hashPwd*(pwd: string, cost: int8): string = proc hashPwd*(pwd: string, cost: int8): tuple[pwd, salt:string] =
let salt = genSalt(cost) let hashed = hashWithSalt(pwd, genSalt(cost))
result = hash(pwd, salt) result = (pwd: hashed.hash, salt: hashed.salt)
proc validatePwd*(u: User, givenPwd: string): bool = proc validatePwd*(u: User, givenPwd: string): bool =
let salt = u.salt let salt = u.salt
result = compare(u.hashedPwd, hash(givenPwd, salt)) result = compare(u.hashedPwd, hash(givenPwd, salt))
proc nameToSlug*(name: string): string =
result = name.replace(re"\W+", "-").toLower
proc getMeasureForSlug*(ctx: PMApiContext, userId: UUID, slug: string): Measure =
let measures = ctx.db.findMeasuresByUserIdAndSlug($userId, slug)
if measures.len < 1: raiseEx NotFoundError, "no measure named '" & slug & "'"
result = measures[0]
proc getMeasurementForMeasure*(ctx: PMApiContext, measureId, measurementId: UUID): Measurement =
let measurements = ctx.db.findMeasurementsByMeasureIdAndId($measureId, $measurementId)
if measurements.len < 1: raiseEx NotFoundError, "no measurement for is '" & $measurementId & "'"
result = measurements[0]

View File

@ -1,5 +1,5 @@
-- DOWN script for initial-schema (20190214122514) -- DOWN script for initial-schema (20190214122514)
drop table if exists "values"; drop table if exists "measurements";
drop table if exists "measures"; drop table if exists "measures";
drop table if exists "api_tokens"; drop table if exists "api_tokens";
drop table if exists "users"; drop table if exists "users";

View File

@ -6,7 +6,8 @@ create table "users" (
display_name varchar not null, display_name varchar not null,
email varchar not null unique, email varchar not null unique,
hashed_pwd varchar not null, hashed_pwd varchar not null,
salt varchar not null salt varchar not null,
is_admin boolean not null default false
); );
create table "api_tokens" ( create table "api_tokens" (
@ -27,13 +28,14 @@ create table "measures" (
domain_units varchar not null default '', domain_units varchar not null default '',
range_source varchar default null, range_source varchar default null,
range_units varchar not null default '', range_units varchar not null default '',
analysis varchar[] not null default '{}' analysis varchar[] not null default '{}',
unique(user_id, slug)
); );
create table "values" ( create table "measurements" (
id uuid default uuid_generate_v4() primary key, id uuid default uuid_generate_v4() primary key,
measure_id uuid not null references measures (id) on delete cascade on update cascade, measure_id uuid not null references measures (id) on delete cascade on update cascade,
value integer not null, value integer not null,
"timestamp" timestamp not null default current_timestamp, "timestamp" timestamp with time zone not null default current_timestamp,
ext_data jsonb not null default '{}'::json ext_data jsonb not null default '{}'::json
); );