layout | title | permalink |
---|---|---|
page |
Tutorial |
/tutorial/ |
The Postgres database is rich with features well beyond that of any other database. However, most developers do not know the extent to which they can leverage the features in Postgres to completely express their application business logic in the database.
Often developers may find themselves re-implimenting authentication and authorization in their apps, when Postgres comes with application level security features out of the box. Or perhaps developers may rewrite basic insert functions with some extra app logic where that too may be handled in the database.
This reimplementation of features that come with Postgres is not just an inefficient way to spend developer resources, but may also result in an interface that is slower than if the logic was implemented in Postgres itself. PostGraphQL aims to make developers more efficient and their APIs faster by packaging the repeatable work in one open source project that encourages community contributions.
In this tutorial we will walk through the Postgres schema design for a forum application with users who can login and write forum posts. While we will discuss how you can use the schema we create with PostGraphQL, this article should be useful for anyone designing a Postgres schema.
First, you are going to need to make sure Postgres is installed. You can skip this section if you already have Postgres installed 👍
If you are running on MacOS, it is highly recommended that you install and use Postgres.app. If you are on another platform, go to the Postgres download page to pick up a copy of Postgres. We recommend using a version of Postgres higher than 9.5.0
as Postgres 9.5
introduces Row Level Security, an important feature when building your business logic into the database.
After that, make sure your copy of Postgres is running locally on postgres://localhost:5432
. This is the default location for local Postgres databases and is used by many Postgres tools.
In a terminal window, run psql
. This is your most basic tool for querying your Postgres databse. By default psql
will connect to postgres://localhost:5432
. If you want to connect to another database, just pass that database as the first argument.
$ psql # Connects to the default database at `postgres://localhost:5432`
$ psql postgres://localhost:5432/testdb # Connects to the `testdb` database at `postgres://localhost:5432`
$ psql postgres://somehost:2345/somedb # connects to the `somedb` database at `postgres://somehost:2345`
Read the documentation on Postgres connection strings to learn more about alternative formats (including using a password).
After running psql
with your database URL, you should be in a SQL prompt:
psql (9.5.*)
Type "help" for help.
=#
Run the following query to make sure things are working smoothly:
=# select 1 + 1 as two;
two
-----
2
(1 row)
=#
It’s way easier to install PostGraphQL. If you have npm, you practically have PostGraphQL as well.
$ npm install -g postgraphql
To run PostGraphQL, you’ll use the same URL that you used for psql
:
$ postgraphql # Connects to the default database at `postgres://localhost:5432`
$ postgraphql -c postgres://localhost:5432/testdb # Connects to the `testdb` database at `postgres://localhost:5432`
$ postgraphql -c postgres://somehost:2345/somedb # connects to the `somedb` database at `postgres://somehost:2345`
You can also run PostGraphQL with the watch flag:
$ postgraphql --watch
With the --watch
flag, whenever the Postgres schemas you are introspecting change PostGraphQL will automatically update your GraphQL API.
Let’s go on to setting up our database schemas.
All of our database objects will go into one or two custom Postgres schemas. A schema is essentially a namespace, it allows you to create tables with the same name like a.person
and b.person
.
You can name your schema anything, we recommend naming your schema after your app. This way if you are working on multiple apps in the same database (this might only realistically happen in development), you can easily query the databases of the different apps. We are going to create two schemas: forum_example
, and forum_example_private
. To create these schemas we use the CREATE SCHEMA
command.
create schema forum_example;
create schema forum_example_private;
You could create more or less schemas, it is all up to you and how you want to structure your database. We decided to create two schemas. One of which, forum_example
, is meant to hold data users can see, whereas forum_example_private
will never be directly accessible to users.
Theoretically we want a user to be able to log in directly to our Postgres database, and only be able to create, read, update, and delete data for their user all within SQL. This is a mindshift from how we traditionally use a SQL database. Normally, we assume whoever is querying the database has full visibility into the system as the only one with database access is our application. In this tutorial, we want to restrict access at the database level. Don’t worry though! Postgres is very secure about this, users will have no more permissions then that which you explicitly grant.
Note: When starting PostGraphQL, you will want to use the name of the schema you created with the
--schema
option, like so:postgraphql --schema forum_example
. Also, don’t forget to add the--watch
flag, with watch mode enabled PostGraphQL will update your API as we add tables and types throughout this tutorial.
Now we are going to create the tables in our database which will correspond to our users. We will do this by running the Postgres CREATE TABLE
command. Here is the definition for our person table:
create table forum_example.person (
id serial primary key,
first_name text not null check (char_length(first_name) < 80),
last_name text check (char_length(last_name) < 80),
about text,
created_at timestamp default now()
);
Now we have created a table with id
, first_name
, last_name
, about
, and created_at
columns (we will add an updated_at
column later). Let’s break down exactly what each line in this command does, we will only do this once. If you already understand, you can skip ahead.
create table forum_example.person
: This tells Postgres that we are creating a table in theforum_example
schema namedperson
. This table will represent all of our forum’s users.id serial primary key
: This line establishes an auto-incrementing id field which is always guaranteed to be unique. The first person we create will have an id of 1, the second user will have an id of 2, and so on. Theprimary key
bit is also very important. PostGraphQL will use theprimary key
of a table in many places to uniquely identify an object, including the globally unique id field.first_name text not null check (char_length(first_name) < 80)
: We want all of our users to enter their first name and last name seperately, so this column definition will create a column namedfirst_name
, of typetext
, that is required (not null
), and that must be less than 80 characters long (check (char_length(first_name) < 80)
). Check constraints are a very powerful feature in Postgres for data validation.last_name text check (char_length(last_name) < 80)
: This is very similar to our column definition forfirst_name
, except it is missingnot null
. This means that unlike thefirst_name
column,last_name
is not required.about text
: We want users to be able to express themselves! So they get to write a mini forum post which will go on their profile page.created_at timestamp default now()
: This final column definition will provide us with some extra meta-information about their user. If not specified explicitly, thecreated_at
timestamp will default to the time the row was inserted.
And that’s our person table! Pretty simple, right?
The syntax and features of the Postgres CREATE TABLE
command are fairly easy to learn and understand. Creating tables is the easiest, but also the most fundamental part of your schema design.
Note: We prefer singular identifers like
forum_example.person
overforum_example.people
because when you create a table, it is like you are creating a class in a statically typed language. Classes have singular names like “Person” while collections will often have plural names like “People.” Table as a class is a better analogy than table as a collection because Postgres itself will internally call tables “classes.”
Note: In case you don’t like serial id of our table above, an alternative to the
serial
primary key is UUIDs. To use UUIDs you would just need to add the popular UUID extension,uuid-ossp
, in your database setup, and specify a default in your table creation. Like so:create extension if not exists "uuid-ossp"; create table forum_example.person ( id uuid primary key default uuid_generate_v1mc(), ... );If you are going to use UUIDs as the primary key, it is recommended you use
uuid_generate_v1mc
to generate the ids. This is becauseuuid_generate_v1mc
is time based which means the ids will be mostly sequential which is good for your primary key index.There are pros and cons to both approaches, choose what works best for your application!
Now that we have created our table, we want to document it within the Postgres database. By adding comments to our table and its columns using the Postgres COMMENT
command, we will allow tools like PostGraphQL to display rich domain specific documentation.
To add comments, just see the SQL below:
comment on table forum_example.person is 'A user of the forum.';
comment on column forum_example.person.id is 'The primary unique identifier for the person.';
comment on column forum_example.person.first_name is 'The person’s first name.';
comment on column forum_example.person.last_name is 'The person’s last name.';
comment on column forum_example.person.about is 'A short description about the user, written by the user.';
comment on column forum_example.person.created_at is 'The time this person was created.';
Incredibly simple, yet also incredibly powerful.
Note: Feel free to write your comments in Markdown! Most tools, including GraphiQL which PostGraphQL uses, will render your comments with the appropriate styles.
With this we have completed our person table, now let’s create a table for our forum posts.
The users of our forum will want to be able to create posts. That’s the entire reason we have a forum after all. To create the post table we go through a very similar process as creating our forum_example.person
table, but first we want to create a type we will use in one of the columns. See the SQL below:
create type forum_example.post_topic as enum (
'discussion',
'inspiration',
'help',
'showcase'
);
The Postgres CREATE TYPE
command will let you create a custom type in your database which will allow you to do some really cool things. You can create a composite type which is basically a typed object in GraphQL terms, you can create a range type which represents exactly what you might think, or you can create an enum type which is what we did here.
Enum types are a static set of values, you must use one of the string values that make up the enum in any column of the enum’s type. Having this type is useful for us, because we want our forum posts to have one, or none, topics so user’s may easily see what a post is about.
Note: PostGraphQL implements custom handling for user-defined types. An enum type like that defined above will be turned into a GraphQL enum that looks like:
enum PostTopic { DISCUSSION INSPIRATION HELP SHOWCASE }You can also create custom composite types which will turn into GraphQL object types with PostGraphQL.
create type my_schema.my_type as ( foo integer, bar integer );Would become the following GraphQL type:
type MyType { foo: Int bar: Int }
Now it is time to actually create our post table:
create table forum_example.post (
id serial primary key,
author_id integer not null references forum_example.person(id),
headline text not null check (char_length(headline) < 280),
body text,
topic forum_example.post_topic,
created_at timestamp default now()
);
comment on table forum_example.post is 'A forum post written by a user.';
comment on column forum_example.post.id is 'The primary key for the post.';
comment on column forum_example.post.headline is 'The title written by the user.';
comment on column forum_example.post.author_id is 'The id of the author user.';
comment on column forum_example.post.topic is 'The topic this has been posted in.';
comment on column forum_example.post.body is 'The main body text of our post.';
comment on column forum_example.post.created_at is 'The time this post was created.';
Pretty basic. Our headline
is twice as long as a tweet, and to use our forum_example.post_topic
type we wrote it as the column type just as we may write integer
as the column type. We also made sure to include comments.
Now that we have gone over the basics, let’s explore Postgres functions and see how we can use them to extend the functionality of our database.
The Postgres CREATE FUNCTION
command is truly amazing. It allows us to write functions for our database in SQL, and other languages including JavaScript and Ruby!
The following is a basic Postgres function:
create function add(a int, b int) returns int as $$
select a + b
$$ language sql stable;
Note the form. The double dollar signs ($$
) open and close the function, and at the very end we have language sql stable
. language sql
means that the function is written in SQL, pretty obvious. If you wrote your function in Ruby it may be language plruby
. The next word, stable
, means that this function does not mutate the database. By default Postgres assumes all functions will mutate the database, you must mark your function with stable
for Postgres, and PostGraphQL, to know your function is a query and not a mutation.
Note: If you are interested in running JavaScript or Ruby in Postgres, check out PL/V8 and PL/ruby respectively. It is recommended that you use SQL and PL/pgSQL (which comes native with Postgres) whenever you can (even if they are a pain). There is plenty of documentation and StackOverflow answers on both SQL and PL/pgSQL. However, there are alternatives if you so choose.
That function above isn’t so useful for us in our schema, so let’s write some functions which will be useful. We will define three.
First, a function which will concatenate the users first and last name to return their full name:
create function forum_example.person_full_name(person forum_example.person) returns text as $$
select person.first_name || ' ' || person.last_name
$$ language sql stable;
comment on function forum_example.person_full_name(forum_example.person) is 'A person’s full name which is a concatenation of their first and last name.';
Second, a function which will get a summary of a forum post:
create function forum_example.post_summary(
post forum_example.post,
length int default 50,
omission text default '…'
) returns text as $$
select case
when post.body is null then null
else substr(post.body, 0, length) || omission
end
$$ language sql stable;
comment on function forum_example.post_summary(forum_example.post, int, text) is 'A truncated version of the body for summaries.';
Third, a function that will get a person’s most recent forum post.
create function forum_example.person_latest_post(person forum_example.person) returns forum_example.post as $$
select post.*
from forum_example.post as post
where post.author_id = person.id
order by created_at desc
limit 1
$$ language sql stable;
comment on function forum_example.person_latest_post(forum_example.person) is 'Get’s the latest post written by the person.';
Don’t get too stuck on the function implementations. It is fairly easy to discover how to express what you want in SQL through a quick search of the Postgres documentation (which is excellent!). These functions are here to give you some examples of what functions in Postgres look like. Also note how we added comments to our functions with the COMMENT
command, just like we add comments to our tables.
Note: Any function which meets the following conditions will be treated as a computed field by PostGraphQL:
- The function has a table row as the first argument.
- The function is in the same schema as the table of the first argument.
- The function’s name is prefixed by the table’s name.
- The function is marked as
stable
orimmutable
which makes it a query and not a mutation.All three of the above functions meet these conditions and as such will be computed fields. In GraphQL this ends up looking like:
type Person { id: Int! firstName: String! lastName: String ... fullName: String latestPost: Post }
Sometimes it is useful to not just return single values from your function, but perhaps entire tables. What returning a table from a function could mean is you could define a custom ordering, hide rows that were archived, or return a user’s activity feed perhaps. In our case, this Postgres feature makes it easy for us to implement search:
create function forum_example.search_posts(search text) returns setof forum_example.post as $$
select post.*
from forum_example.post as post
where post.headline ilike ('%' || search || '%') or post.body ilike ('%' || search || '%')
$$ language sql stable;
comment on function forum_example.search_posts(text) is 'Returns posts containing a given search term.';
The difference with this function and the ones before is the return signature reads returns setof forum_example.post
. This function will therefore return all of the posts that match our search condition and not just one.
Note: PostGraphQL will treat set returning functions as connections. This is what makes them so powerful for PostGraphQL users. The function above would be queryable like so:
{ searchPosts(search: "Hello, world!", first: 5) { edges { cursor node { headline body } } } }
Note: Postgres has awesome text searching capabilities, the function above uses a basic
ILIKE
pattern matching operator. If you want high quality full text searching you don’t need to look outside Postgres. Instead look into the Postgres Full Text Search functionality. It is a great feature, but a bit much for our simple example.
Note: Returning an array (
returns post[]
), and returning a set (returns setof post
) are two very different things. When you return an array, every single value in the array will always be returned. However, when you return a set it is like returning a table. Users can paginate through a set usinglimit
andoffset
, but not an array.
You can also use Postgres functions to define triggers. Triggers in Postgres allow you to hook into events that are happening on your tables such as inserts, updates, or deletes. You define your triggers with the CREATE TRIGGER
command, and all trigger functions must return the special type trigger
.
To demonstrate how triggers work, we will define a trigger that sets an updated_at
column on our forum_example.person
and forum_example.post
tables whenever a row is updated. Before we can write the trigger, we need to make sure forum_example.person
and forum_example.post
have an updated_at
column! To do this we will use the ALTER TABLE
command.
alter table forum_example.person add column updated_at timestamp default now();
alter table forum_example.post add column updated_at timestamp default now();
Our updated_at
column has now been added to our tables and looks exactly like our created_at
column. It’s a timestamp which defaults to the time the row was created. Next, let us define our triggers:
create function forum_example_private.set_updated_at() returns trigger as $$
begin
new.updated_at := current_timestamp;
return new;
end;
$$ language plpgsql;
create trigger person_updated_at before update
on forum_example.person
for each row
execute procedure forum_example_private.set_updated_at();
create trigger post_updated_at before update
on forum_example.post
for each row
execute procedure forum_example_private.set_updated_at();
To define our trigger we ran three commands. First we created a function named set_updated_at
in our forum_example_private
schema because we want no one to directly call this function as it is simply a utility. forum_example_private.set_updated_at
also returns a trigger
and is implemented in PL/pgSQL.
After we define our forum_example_private.set_updated_at
function, we can use it in the triggers we create with the CREATE TRIGGER
command. The triggers will run before a row is updated by the UPDATE
command and will execute the function on every row being updated.
Note: If you want to do some CPU intensive work in triggers, perhaps consider using Postgres’s pub/sub functionality by running the
NOTIFY
command in triggers and then use theLISTEN
command in a worker service. If Node.js is your platform of choice, you could use thepg-pubsub
package to make listening easier.
That’s about it as far as Postgres functions go! They are a fun, interesting, and useful topic to understand when it comes to good Postgres schema design. Always remember, the Postgres documentation is your best friend as you try to write your own functions. Some important documentation articles we mentioned for your reference are as follows:
Next up, we are going to learn about auth in Postgres and PostGraphQL!
Authentication and authorization is incredibly important whenever you build an application. You want your users to be able to login and out of your service, and only edit the content your platform has given them permission to edit. Postgres already has great support for authentication and authorization using a secure role based system, so PostGraphQL just bridges the gap between the Postgres role mechanisms and HTTP based authorization.
However, before we can dive into implementing authentication, we are missing some pretty important data in our schema. How are users supposed to even login? Not by guessing their first and last name one would hope, so we will define another table which will store user emails and passwords.
To store user emails and passwords we will create another table in the forum_example_private
schema.
create table forum_example_private.person_account (
person_id integer primary key references forum_example.person(id) on delete cascade,
email text not null unique check (email ~* '^.+@.+\..+$'),
password_hash text not null
);
comment on table forum_example_private.person_account is 'Private information about a person’s account.';
comment on column forum_example_private.person_account.person_id is 'The id of the person associated with this account.';
comment on column forum_example_private.person_account.email is 'The email address of the person.';
comment on column forum_example_private.person_account.password_hash is 'An opaque hash of the person’s password.';
Warning: Never store passwords in plaintext! The
password_hash
column will contain the user’s password after it has gone through a secure hashing algorithm like Bcrypt. Later in this tutorial we will show you how to securely hash a password in Postgres.
Why would we choose to create a new table in the forum_example_private
schema instead of just adding columns to forum_example.person
? There are a couple of answers to this question. The first and most fundamental is seperation of concerns. By moving email
and password_hash
to a second table we make it much harder to accidently select those values when reading forum_example.person
. Also, users will not have the permission to directly query data from forum_example_private
(as we will see) making this approach more secure. This approach is also good for PostGraphQL as the forum_example_private
schema is never exposed in PostGraphQL, so you will never accidently expose password hashes in GraphQL.
Besides those arguments, moving the person’s account to a seperate table is also good database design in general. Say you have multiple types of users. Perhaps normal person users, and then ’brand‘ or ‘organization’ users. This pattern could easily allow you to go in that direction.
Note: The
forum_example_private.person_account
shares its primary key withforum_example.person
. This way there can only be oneforum_example_private.person_account
for everyforum_example.person
, a one-to-one relationship.
Note: For an example of a much richer user profile/account/login schema, use Membership.db as a reference.
Before a user can log in, they need to have an account in our database. To register a user we are going to implement a Postgres function in PL/pgSQL which will create two rows. The first row will be the user’s profile inserted into forum_example.person
, and the second will be an account inserted into forum_example_private.person_account
.
Before we define the function, we know that we will want to hash the passwords coming into the function before inserting them into forum_example_private.person_account
. To hash passwords we will need the Postgres pgcrypto
extension. To add the extension, just do the following:
create extension if not exists "pgcrypto";
The pgcrypto
extension should come with your Postgres distribution and gives us access to hashing functions like crypt
and gen_salt
which were specifically designed for hashing passwords.
Now that we have added pgcrypto
to our database, let us define our function:
create function forum_example.register_person(
first_name text,
last_name text,
email text,
password text
) returns forum_example.person as $$
declare
person forum_example.person;
begin
insert into forum_example.person (first_name, last_name) values
(first_name, last_name)
returning * into person;
insert into forum_example_private.person_account (person_id, email, password_hash) values
(person.id, email, crypt(password, gen_salt('bf')));
return person;
end;
$$ language plpgsql strict security definer;
comment on function forum_example.register_person(text, text, text, text) is 'Registers a single user and creates an account in our forum.';
If you do not understand what is going on here, do not worry, writing PL/pgSQL requires some trial and error along with some StackOverflow searching. What’s new here compared to our other functions is that we have a new block, declare
, above our function implementation which starts with begin
. In that block we declare our intention to use a variable called person
of type forum_example.person
. Then, in our first insert statement, the row we insert will be saved into that person
variable.
After we insert a profile into forum_example.person
, we use the pgcrypto
extension in the expression crypt(password, gen_salt('bf'))
to hash the user’s password before inserting into forum_example_private.person_account
. This way we aren’t storing the password in plaintext. Read the documentation for pgcrypto
on Password Hashing Functions to learn more about these functions and their characteristics.
Warning: Be very careful with logging, while we encrypt our passwords here it may be possible that in a query or server log the password will be recorded in plain text! Be careful to configure your Postgres logs so this isn’t the case. PostGraphQL will never log the value of any variables the client gives it. Being careful with your logs and passwords is true in any system, but especially this one.
For an overview of passwords in Postgres past the
pgcrypto
documentation, see the answer to the StackOverflow question “How can I hash passwords in Postgres?”
At the end of the implementation you will see language plpgsql strict security definer
. language plpgsql
we already understand, but the other words are new. The word strict
means that if the function gets null input, then the output will be automatically null as well and Postgres won’t call the function. That is password
cannot be null or first_name
cannot be null otherwise the result will also be null and nothing will be executed. The words security definer
mean that this function is executed with the privileges of the Postgres user who created it. Remember how we said users would never be able to insert into forum_example_private.person_account
? Well this function can insert into forum_example_private.person_account
because it uses the privileges of the definer.
Warning: Make sure that when you create a function with
security definer
there are no ‘holes’ a user could use to see or mutate more data than they are not allowed to. Since the above is a simple function, we are fine. If you don’t needsecurity definer
, try not to use it.
This function will create a user and their account, but how will we log the user in? Before we define a function which allows users to login, sign-in, authenticate, whatever you want to call it let us go over how auth works at a high level in PostGraphQL. While this article is trying to be somewhat PostGraphQL agnostic, the next two sections will be specific to PostGraphQL, but useful to anyone wanting to learn just a little bit more about Postgres and JSON Web Tokens (JWTs).
When a user logs in, we want them to make their queries using a specific PostGraphQL role. Using that role we can define rules that restrict what data the user may access. So what roles do we need to define for our forum example? Remember when we were connecting to Postgres and we used a URL like postgres://localhost:5432/mydb
? Well, when you use a connection string like that, you are logging into Postgres using your computer account’s username and no password. Say your computer account username is buddy
, then connecting with the URL postgres://localhost:5432/mydb
, would be the same as connecting with the URL postgres://buddy@localhost:5432/mydb
. If you wanted to connect to your Postgres database with a password it would look like postgres://buddy:password@localhost:5432/mydb
. When you run Postgres locally, this account will probably be the superuser. So when you run postgraphql -c postgres://localhost:5432/mydb
, you are running PostGraphQL with superuser privileges. To change that let’s create a role that PostGraphQL can use to connect to our database:
create role forum_example_postgraphql login password 'xyz';
We create this forum_example_postgraphql
role with the CREATE ROLE
command. We want to make sure our PostGraphQL role can login so we specify that with the login
option and we give the user a password of ‘xyz’ with the password
option. Now we will start PostGraphQL as such:
postgraphql -c postgres://forum_example_postgraphql:xyz@localhost:5432/mydb
When a user who does not have a JWT token makes a request to Postgres, we do not want that user to have the privileges we will give to the forum_example_postgraphql
role, so instead we will create another role.
create role forum_example_anonymous;
grant forum_example_anonymous to forum_example_postgraphql;
Here we use CREATE ROLE
again. This role cannot login so it does not have the login
option, or a password. We also use the GRANT
command to grant access to the forum_example_anonymous
role to the forum_example_postgraphql
role. Now, the forum_example_postgraphql
role can control and become the forum_example_anonymous
role. If we did not use that grant, we could not change into the forum_example_anonymous
role in PostGraphQL. Now we will start our server like so:
postgraphql \
--connection postgres://forum_example_postgraphql:xyz@localhost:5432/mydb \
--default-role forum_example_anonymous
There is one more role we want to create. When a user logs in we don’t want them to use the forum_example_postgraphql
role, or the basic forum_example_anonymous
role. So instead we will create a role that all of our logged in users will authorize with. We will call it forum_example_person
and similarly grant it to the forum_example_postgraphql
role.
create role forum_example_person;
grant forum_example_person to forum_example_postgraphql;
Warning: The
forum_example_postgraphql
role will have all of the permissions of the roles granted to it. So it can do everythingforum_example_anonymous
can do and everythingforum_example_person
can do. This is why having a default role is important. We would not want an anonymous user to have admin access level because we have granted an admin role toforum_example_postgraphql
.
Ok, so now we have three roles. forum_example_postgraphql
, forum_example_anonymous
, and forum_example_person
. We know how forum_example_postgraphql
and forum_example_anonymous
get used, but how do we know when a user is logged in and should be using forum_example_person
? The answer is JSON Web Tokens.
PostGraphQL uses JSON Web Tokens (JWTs) for authorization. A JWT is just a JSON object that has been hashed and cryptographically signed to confirm the identity of its contents. So an object like:
{
"a": 1,
"b": 2,
"c": 3
}
Would turn into a token that looks like:
eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJhIjoxLCJiIjoyLCJjIjozfQ.hxhGCCCmGV9nT1slief1WgEsOsfdnlVizNrODxfh1M8
Warning: The information in a JWT can be read by anyone, so do not put private information in a JWT. What makes JWTs secure is that unless they were signed by our secret, we can not accept the information inside the JWT as truth.
This allows PostGraphQL to securely make claims about who a user is. Attackers would not be able to fake a claim unless they had access to the private ‘secret’ you define when you start PostGraphQL with the --secret
option.
When PostGraphQL gets a JWT from an HTTP request’s Authorization
header, like so:
Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJhIjoxLCJiIjoyLCJjIjozfQ.hxhGCCCmGV9nT1slief1WgEsOsfdnlVizNrODxfh1M8
It will verify the token using the secret, and then will serialize the claims in that token to the database. So for our token above PostGraphQL would effectively run:
set local jwt.claims.a to 1;
set local jwt.claims.b to 2;
set local jwt.claims.c to 3;
This way your JWT is accessible in your database rules. To get these values back out in SQL, just run the following function:
select current_setting('jwt.claims.a');
All of the ‘claims’ or properties on the JWT are serialized to the database in this way, with one exception. If you have a role
property in your JWT, PostGraphQL will also set the Postgres role of the local transaction. So say you had a role
of forum_example_person
. PostGraphQL would run:
set local role to 'forum_example_person'
set local jwt.claims.role to 'forum_example_person'
Now, the user would have the permissions of the forum_example_person
role as they execute their query.
Warning: Unless explicitly set, JWTs never expire. Once they have been issued they may never be invalidated. This is both good and bad, good in that JWTs are fast in not requiring a database lookup. Bad in that if an attacker gets their hands on a JWT you can’t stop them from using it until the token expires.
A solution to this is to use very short expiration times on your tokens and/or to use refresh tokens. A refresh token you would use whenever your JWT expires to get a new JWT without prompting the user for their password again. Refresh tokens would be stored in the database so you could easily invalidate refresh tokens.
We now know how PostGraphQL uses JWTs to authorize the user, but how does PostGraphQL create a JWT? Stay tuned.
You can pass an option to PostGraphQL, called --token <identifier>
in the CLI, which takes a composite type identifier. PostGraphQL will turn this type into a JWT wherever you see it in the GraphQL output. So let’s define the type we will use for our JWTs:
create type forum_example.jwt_token as (
role text,
person_id integer
);
That’s it. We are using the CREATE TYPE
command again as we did before to create an enum type. This time we are creating a composite type. The definition for a composite type looks very much like the definition of a table type, except a composite type cannot store rows. i.e. you can’t INSERT
, SELECT
, UPDATE
, or DELETE
from a composite type. While you can’t store rows in a composite type, PostGraphQL can turn a composite type into a JWT. Now that we’ve defined this type we will want to start PostGraphQL with the --token
flag:
postgraphql --token forum_example.jwt_token
Next we need to create the function which will actually return the token:
create function forum_example.authenticate(
email text,
password text
) returns forum_example.jwt_token as $$
declare
account forum_example_private.person_account;
begin
select a.* into account
from forum_example_private.person_account as a
where a.email = $1;
if account.password_hash = crypt(password, account.password_hash) then
return ('forum_example_person', account.person_id)::forum_example.jwt_token;
else
return null;
end if;
end;
$$ language plpgsql strict security definer;
comment on function forum_example.authenticate(text, text) is 'Creates a JWT token that will securely identify a person and give them certain permissions.';
This function will return null if the user failed to authenticate, and a JWT token if the user succeeds. Returning null could mean that the password was incorrect, a user with their email doesn’t exist, or the client forgot to pass email
and/or password
arguments. It is then up to the client to raise an error when encountering null
. If a user with the provided email does exist, and the provided password checks out with password_hash
in forum_example_private.person_account
then we return an instance of forum_example.jwt_token
which will then be converted into an actual JWT by PostGraphQL.
There are two main parts to our function body. The first is:
select a.* into account
from forum_example_private.person_account as a
where a.email = $1;
This code will select a single account from forum_example_private.person_account
using the provided email value. The $1
here is just another way to write the email
argument. If we had wrote email = email
or even a.email = email
, Postgres would not have known which email we were referring to, so instead we just used a substitute for the email
argument which depends on its placement in the identifer $1
. If we succesfully find a person with that email, we store it in the account
variable. If we do not find anything, account
will be null. The second part of our function is:
if account.password_hash = crypt(password, account.password_hash) then
return ('forum_example_person', account.person_id)::forum_example.jwt_token;
else
return null;
end if;
This is an if/else statement that checks to see if the plaintext password
argument we were provided matches the password hash that was stored in our forum_example_private.person_account
’s password_hash
table. If there is a match, then we return a JWT token. Otherwise we return null. The password match check is done in the code account.password_hash = crypt(password, account.password_hash)
. To better understand how this works, read the documentation for pgcrypto
on password hashing functions.
In order to construct a forum_example.jwt_token
we use the Postgres composite value input syntax which looks like: ('forum_example_person', account.person_id)
. Then we cast that composite value with ::forum_example.jwt_token
. The order in which the values go is the order in which they were originally defined. Since we defined role
first and person_id
second, this JWT will have a role
of forum_example_person
and a person_id
of account.person_id
.
Warning: Be careful about logging around this function too.
Now that we know how to get JWTs for our users, let’s use the JWTs.
Before we define permissions for our user, let’s utilize the fact that they are logged in by defining a quick Postgres function.
create function forum_example.current_person() returns forum_example.person as $$
select *
from forum_example.person
where id = current_setting('jwt.claims.person_id')::integer
$$ language sql stable;
comment on function forum_example.current_person() is 'Gets the person who was identified by our JWT.';
This is a simple function that we can use in PostGraphQL or our database to get the person who is currently executing the query — by means of the token in the request header. The one new concept here is current_setting('jwt.claims.person_id')::integer
. As we discussed before, PostGraphQL will serialize your JWT to the database in the form of transaction local settings. Using the current_setting
function is how we access those settings. Also note that we cast the value to an integer with ::integer
. This is because the Postgres current_setting
function will always return a string, if you need another data type, you will likely need to cast to that data type.
Now, let’s use the JWT to define permissions.
The highest level of permission that can be given to roles using the Postgres are access privileges assigned using the GRANT
command. The access privileges defined by GRANT
work on no smaller level than the table level. As you can allow a role to select an value from a table, or delete any value in a table. We will look at how to restrict access on a row level next.
-- after schema creation and before function creation
alter default privileges revoke execute on functions from public;
grant usage on schema forum_example to forum_example_anonymous, forum_example_person;
grant select on table forum_example.person to forum_example_anonymous, forum_example_person;
grant update, delete on table forum_example.person to forum_example_person;
grant select on table forum_example.post to forum_example_anonymous, forum_example_person;
grant insert, update, delete on table forum_example.post to forum_example_person;
grant usage on sequence forum_example.post_id_seq to forum_example_person;
grant execute on function forum_example.person_full_name(forum_example.person) to forum_example_anonymous, forum_example_person;
grant execute on function forum_example.post_summary(forum_example.post, integer, text) to forum_example_anonymous, forum_example_person;
grant execute on function forum_example.person_latest_post(forum_example.person) to forum_example_anonymous, forum_example_person;
grant execute on function forum_example.search_posts(text) to forum_example_anonymous, forum_example_person;
grant execute on function forum_example.authenticate(text, text) to forum_example_anonymous, forum_example_person;
grant execute on function forum_example.current_person() to forum_example_anonymous, forum_example_person;
grant execute on function forum_example.register_person(text, text, text, text) to forum_example_anonymous;
See how we had to grant permissions on every single Postgres object we have defined so far? Postgres permissions work as a whitelist and not a blacklist (except for functions), so therefore no one has more access than you explicitly give them. Let’s walk through the grants:
alter default privileges ...
: By default, functions can be executable by public. Since we're applying our fine-grained control over function permissions here, we remove the default grant. Note that this line needs to be placed before any function definition.grant usage on schema forum_example to forum_example_anonymous, forum_example_person
: We say that anonymous users (forum_example_anonymous
) and logged in users (forum_example_person
) may use the objects in theforum_example
schema. This does not mean that those roles can use anything they want in the schema, it just allows the roles to know the schema exists. Also note that we did not grant usage for theforum_example_private
schema.grant select on table forum_example.person to forum_example_anonymous, forum_example_person
: We give anonymous users and logged in users the ability to read all of the rows in theforum_example.person
table.grant update, delete on table forum_example.person to forum_example_person
: Here we give only logged in users the ability to update and delete rows from theforum_example.person
table. This means that anonymous users can never update or delete a person. However, it does mean that users can update and delete any rows in the table. We will fix this later.grant select ...
andgrant insert, update, delete ...
: We do the same thing with these two grants as we did with the grants above. The only difference here is that we also give signed in users the ability toinsert
intoforum_example.post
. We do not allow anyone to insert directly intoforum_example.person
, instead users should use theforum_example.register_person
function.grant usage on sequence forum_example.post_id_seq to forum_example_person
: When a user creates a newforum_example.post
they will also need to get the next value in theforum_example.post_id_seq
because we use theserial
data type for theid
column. A sequence also exists for our person table (forum_example.person_id_seq
), but since we are only creating people throughforum_example.register_person
and that function specifiessecurity definer
, we don’t need to grant access to the person id sequence.grant execute ...
: We have to give the anonymous user and logged in users access to all of the Postgres functions we define. All of the functions are executable by both types of users, exceptforum_example.register_person
which we only let anonymous users execute. There’s no need for logged in users to register a new user!
This provides basic permissions for all of our Postgres objects, but as we mentioned before users can update and delete all and any persons or posts. For obvious reasons we don’t want this, so let’s define row level security next.
In Postgres 9.5 (released January 2016) Row Level Security (RLS) was introduced. RLS allows us to specify access to the data in our Postgres databases on a row level instead of a table level. In order to enable row level security on our tables we first need to run the following:
alter table forum_example.person enable row level security;
alter table forum_example.post enable row level security;
Before running these commands, the forum_example_person
and forum_example_anonymous
roles could see every row in the table with a select * from forum_example.person
query. After running these two commands those same roles can’t. By enabling row level security, our roles don’t have any access to read or write to a table that you don’t explicitly give, so to re-enable access to all the rows we will define RLS policies with the CREATE POLICY
command.
create policy select_person on forum_example.person for select
using (true);
create policy select_post on forum_example.post for select
using (true);
Now both anonymous users and logged in users can see all of our forum_example.person
and forum_example.post
rows again. We also want signed in users to be able to only update and delete their own row in forum_example.person
.
create policy update_person on forum_example.person for update to forum_example_person
using (id = current_setting('jwt.claims.person_id')::integer);
create policy delete_person on forum_example.person for delete to forum_example_person
using (id = current_setting('jwt.claims.person_id')::integer);
We use the current person_id
from our JWT and only allow updates and deletes on rows with the same id. Also note how we added to forum_example_person
. This is because we only want these policies to apply for the forum_example_person
role.
That’s all we need to define for our person table. Now let’s define three policies for our posts table. One for INSERT
, UPDATE
, and DELETE
.
create policy insert_post on forum_example.post for insert to forum_example_person
with check (author_id = current_setting('jwt.claims.person_id')::integer);
create policy update_post on forum_example.post for update to forum_example_person
using (author_id = current_setting('jwt.claims.person_id')::integer);
create policy delete_post on forum_example.post for delete to forum_example_person
using (author_id = current_setting('jwt.claims.person_id')::integer);
These policies are very similar to the ones before, except that the insert_post
policy uses with check
instead of using
like our other policies. The difference between with check
and using
is roughly that using
is applied before any operation occurs to the table’s rows. So in the case of updating a post, one could not update a row that does not have the appropriate author_id
in the first place. with check
is run after an operation is applied. If the with check
fails the operation will be rejected. So in the case of an insert, Postgres sets all of the columns as specified and then compares against with check
on the new row. You must use with check
with INSERT
commands because there are no rows to compare against before insertion, and you must use using
with DELETE
commands because a delete changes no rows only removes current ones.
That’s it! We have succesfully creating a Postgres schema embedded with our business logic. When we use this schema with PostGraphQL we will get a well designed GraphQL API that we can be used in our frontend application.
The final argument list for starting our PostGraphQL server using the CLI would be as follows:
postgraphql \
--connection postgres://forum_example_postgraphql:xyz@localhost:5432 \
--schema forum_example \
--default-role forum_example_anonymous \
--secret keyboard_kitten \
--token forum_example.jwt_token
You should now be equipped with the knowledge to go out and design your own Postgres schema. If you have any questions, encounter a bug, or just want to say thank you, don’t hesitate to open an issue, we’d love to hear from you. The PostGraphQL community wants to invest in making you a productive developer so that you can invest back into PostGraphQL.