postgresql_passchanger_func.../passchanger.sql

153 lines
5.3 KiB
MySQL
Raw Permalink Normal View History

2022-01-04 17:46:37 +00:00
-- Schema creation
create schema dba ;
-- role creation
create role dba with NOLOGIN NOINHERIT ;
-- grants for dba
grant select on pg_catalog.pg_authid to dba ;
grant update (rolvaliduntil) on pg_catalog.pg_authid to dba ;
grant pg_read_all_stats to dba ;
2022-01-04 17:46:37 +00:00
-- password history table
CREATE TABLE IF NOT EXISTS dba.pwdhistory
(
usename character varying COLLATE pg_catalog."default",
usename_addres character varying COLLATE pg_catalog."default",
application_name character varying COLLATE pg_catalog."default",
2022-01-04 17:46:37 +00:00
password character varying COLLATE pg_catalog."default",
changed_on timestamp without time zone
)
TABLESPACE pg_default;
2022-01-21 16:47:10 +00:00
-- alter if you come from a previous version of the table:
-- alter table dba.pwdhistory add column usename_addres character varying ;
-- alter table dba.pwdhistory add column application_name character varying ;
2022-01-04 17:46:37 +00:00
ALTER TABLE IF EXISTS dba.pwdhistory
OWNER to dba;
-- ######################################
-- ######################################
-- real functions
-- ######################################
-- ######################################
2022-05-10 09:08:27 +00:00
drop function if exists dba.change_valid_until ;
CREATE OR REPLACE FUNCTION dba.change_valid_until(_usename text)
RETURNS integer
SECURITY DEFINER
LANGUAGE 'plpgsql'
COST 100
VOLATILE PARALLEL UNSAFE
AS $BODY$
declare
2022-05-10 09:04:24 +00:00
_invokingfunction text := '';
_matches text;
_password_lifetime integer := 120 ; -- specify password lifetime in days
_retval INTEGER;
_expiration_date numeric ;
begin
2022-05-10 09:04:24 +00:00
select extract(epoch from localtimestamp) into _expiration_date;
select _expiration_date+(_password_lifetime*24*60*60) into _expiration_date;
select query into _invokingfunction from pg_stat_activity where pid = pg_backend_pid() ;
2022-05-09 15:56:08 +00:00
-- first, checking the invoking function
2022-05-06 15:52:04 +00:00
_matches := regexp_matches(_invokingfunction, E'select dba\.change_my_password\\(.*\\)[[:space:]]{0,};' , 'i');
if _matches IS NOT NULL then
2022-05-10 09:04:24 +00:00
-- then checking the regex for the password
_matches := regexp_matches(_invokingfunction, E'select dba\.change_my_password\\([[:space:]]{0,}''([[:alnum:]]|@|\\$|#|%|\\^|&|\\*|\\(|\\)|\\_|\\+|\\{|\\}|\\||<|>|\\?|=|!){11,100}''[[:space:]]{0,}\\)[[:space:]]{0,};' , 'i');
2022-05-06 15:52:04 +00:00
if _matches IS NOT NULL then
2022-05-10 09:04:24 +00:00
EXECUTE format('update pg_catalog.pg_authid set rolvaliduntil=to_timestamp(%L) where rolname=%L ', _expiration_date, _usename);
2022-05-09 15:56:08 +00:00
-- INTO _retval;
RETURN 0;
2022-05-06 15:52:04 +00:00
else
raise exception 'Regular expresion for password check failed'
using errcode = '22023' -- 22023 = "invalid_parameter_value'
, detail = 'Check your generated password an try again'
, hint = 'Read the official documentation' ;
2022-05-10 09:04:24 +00:00
RETURN 1;
2022-05-06 15:52:04 +00:00
end if;
2022-05-09 15:56:08 +00:00
else
-- also catches NULL
-- raise custom error
raise exception 'You''re not allowed to run this function directly'
using errcode = '22023' -- 22023 = "invalid_parameter_value'
, detail = 'Please call dba.change_my_password function.'
, hint = 'Invoked function: ' || _invokingfunction ;
2022-05-10 09:04:24 +00:00
RETURN 1;
end if;
end
$BODY$;
2022-05-09 15:56:08 +00:00
ALTER FUNCTION dba.change_valid_until(text) OWNER TO dba;
REVOKE EXECUTE ON FUNCTION dba.change_valid_until(text) From PUBLIC;
2022-01-04 17:46:37 +00:00
CREATE OR REPLACE FUNCTION dba.change_my_password(_password text)
2022-01-04 17:46:37 +00:00
RETURNS integer
SECURITY INVOKER
2022-01-04 17:46:37 +00:00
LANGUAGE 'plpgsql'
COST 100
VOLATILE PARALLEL UNSAFE
AS $BODY$
declare
2022-05-10 09:04:24 +00:00
_min_password_length int := 12; -- specify min length here
_usename text := '';
_useraddress text := '';
_userapp text := '';
_retval integer ;
2022-01-04 17:46:37 +00:00
begin
select user into _usename;
2022-05-06 15:52:04 +00:00
if user = 'postgres' then
raise exception 'This function should not be run by user postgres'
using errcode = '22024' -- 22023 = "invalid_parameter_value'
, detail = 'Use a named user only.' ;
2022-05-10 09:04:24 +00:00
return 1;
2022-05-06 15:52:04 +00:00
end if;
if length(_password) < _min_password_length then
-- also catches NULL
2022-01-04 17:46:37 +00:00
-- raise custom error
raise exception 'Password too short!'
using errcode = '22023' -- 22023 = "invalid_parameter_value'
, detail = 'Please check your password.'
, hint = 'Password must be at least ' || _min_password_length || ' characters.';
2022-05-10 09:04:24 +00:00
return 1;
2022-01-04 17:46:37 +00:00
end if;
2022-05-06 15:52:04 +00:00
select client_addr into _useraddress from pg_stat_activity where pid = pg_backend_pid() ;
select application_name into _userapp from pg_stat_activity where pid = pg_backend_pid() ;
2022-05-10 09:04:24 +00:00
--PERFORM dba.change_valid_until(_usename) ;
SELECT dba.change_valid_until(_usename)
INTO _retval;
2022-05-06 15:52:04 +00:00
-- this will be executed by the username invoking this function
2022-05-10 09:04:24 +00:00
if _retval = 0 then
EXECUTE format('ALTER USER %I WITH PASSWORD %L', _usename, _password);
insert into dba.pwdhistory
(usename, usename_addres, application_name, password, changed_on)
values (_usename, _useraddress, _userapp, md5(_password),now());
raise notice 'Password changed' ;
else
raise exception 'Could not change expiration date, please check'
using errcode = '22023' -- 22023 = "invalid_parameter_value'
, detail = 'contact the dba' ;
return 1;
end if;
2022-05-06 15:52:04 +00:00
return 0;
2022-01-04 17:46:37 +00:00
end
$BODY$;
2022-05-09 15:56:08 +00:00
ALTER FUNCTION dba.change_my_password(text) OWNER TO dba;
REVOKE EXECUTE ON FUNCTION dba.change_my_password(text) From PUBLIC;