mirror of
https://gitlab.com/crafty-controller/crafty-4.git
synced 2024-08-30 18:23:09 +00:00
Replacing server_id=0 to server_id=None for AuditLog
This commit is contained in:
parent
a87daa6ef3
commit
3edfd4320d
@ -1403,7 +1403,7 @@ class PanelHandler(BaseHandler):
|
|||||||
self.controller.management.add_to_audit_log(
|
self.controller.management.add_to_audit_log(
|
||||||
exec_user["user_id"],
|
exec_user["user_id"],
|
||||||
f"Removed user {target_user['username']} (UID:{user_id})",
|
f"Removed user {target_user['username']} (UID:{user_id})",
|
||||||
server_id=0,
|
server_id=None,
|
||||||
source_ip=self.get_remote_ip(),
|
source_ip=self.get_remote_ip(),
|
||||||
)
|
)
|
||||||
self.redirect("/panel/panel_config")
|
self.redirect("/panel/panel_config")
|
||||||
|
@ -228,7 +228,7 @@ class PublicHandler(BaseHandler):
|
|||||||
)
|
)
|
||||||
# log this login
|
# log this login
|
||||||
self.controller.management.add_to_audit_log(
|
self.controller.management.add_to_audit_log(
|
||||||
user_data.user_id, "Logged in", 0, self.get_remote_ip()
|
user_data.user_id, "Logged in", None, self.get_remote_ip()
|
||||||
)
|
)
|
||||||
|
|
||||||
return self.finish_json(
|
return self.finish_json(
|
||||||
@ -254,7 +254,7 @@ class PublicHandler(BaseHandler):
|
|||||||
)
|
)
|
||||||
# log this failed login attempt
|
# log this failed login attempt
|
||||||
self.controller.management.add_to_audit_log(
|
self.controller.management.add_to_audit_log(
|
||||||
user_data.user_id, "Tried to log in", 0, self.get_remote_ip()
|
user_data.user_id, "Tried to log in", None, self.get_remote_ip()
|
||||||
)
|
)
|
||||||
return self.finish_json(
|
return self.finish_json(
|
||||||
403,
|
403,
|
||||||
|
@ -101,7 +101,7 @@ class ApiAuthLoginHandler(BaseApiHandler):
|
|||||||
|
|
||||||
# log this login
|
# log this login
|
||||||
self.controller.management.add_to_audit_log(
|
self.controller.management.add_to_audit_log(
|
||||||
user_data.user_id, "logged in via the API", 0, self.get_remote_ip()
|
user_data.user_id, "logged in via the API", None, self.get_remote_ip()
|
||||||
)
|
)
|
||||||
|
|
||||||
self.finish_json(
|
self.finish_json(
|
||||||
@ -119,7 +119,7 @@ class ApiAuthLoginHandler(BaseApiHandler):
|
|||||||
else:
|
else:
|
||||||
# log this failed login attempt
|
# log this failed login attempt
|
||||||
self.controller.management.add_to_audit_log(
|
self.controller.management.add_to_audit_log(
|
||||||
user_data.user_id, "Tried to log in", 0, self.get_remote_ip()
|
user_data.user_id, "Tried to log in", None, self.get_remote_ip()
|
||||||
)
|
)
|
||||||
self.finish_json(
|
self.finish_json(
|
||||||
401,
|
401,
|
||||||
|
@ -129,7 +129,7 @@ class ApiCraftyConfigIndexHandler(BaseApiHandler):
|
|||||||
self.controller.management.add_to_audit_log(
|
self.controller.management.add_to_audit_log(
|
||||||
user["user_id"],
|
user["user_id"],
|
||||||
"edited config.json",
|
"edited config.json",
|
||||||
server_id=0,
|
server_id=None,
|
||||||
source_ip=self.get_remote_ip(),
|
source_ip=self.get_remote_ip(),
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -226,7 +226,7 @@ class ApiCraftyCustomizeIndexHandler(BaseApiHandler):
|
|||||||
self.controller.management.add_to_audit_log(
|
self.controller.management.add_to_audit_log(
|
||||||
user["user_id"],
|
user["user_id"],
|
||||||
f"customized login photo: {data['photo']}/{data['opacity']}",
|
f"customized login photo: {data['photo']}/{data['opacity']}",
|
||||||
server_id=0,
|
server_id=None,
|
||||||
source_ip=self.get_remote_ip(),
|
source_ip=self.get_remote_ip(),
|
||||||
)
|
)
|
||||||
self.controller.management.set_login_opacity(int(data["opacity"]))
|
self.controller.management.set_login_opacity(int(data["opacity"]))
|
||||||
|
@ -109,7 +109,7 @@ class ApiCraftyConfigServerDirHandler(BaseApiHandler):
|
|||||||
self.controller.management.add_to_audit_log(
|
self.controller.management.add_to_audit_log(
|
||||||
auth_data[4]["user_id"],
|
auth_data[4]["user_id"],
|
||||||
f"updated master servers dir to {new_dir}/servers",
|
f"updated master servers dir to {new_dir}/servers",
|
||||||
server_id=0,
|
server_id=None,
|
||||||
source_ip=self.get_remote_ip(),
|
source_ip=self.get_remote_ip(),
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -161,7 +161,7 @@ class ApiRolesIndexHandler(BaseApiHandler):
|
|||||||
self.controller.management.add_to_audit_log(
|
self.controller.management.add_to_audit_log(
|
||||||
user["user_id"],
|
user["user_id"],
|
||||||
f"created role {role_name} (RID:{role_id})",
|
f"created role {role_name} (RID:{role_id})",
|
||||||
server_id=0,
|
server_id=None,
|
||||||
source_ip=self.get_remote_ip(),
|
source_ip=self.get_remote_ip(),
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -112,7 +112,7 @@ class ApiRolesRoleIndexHandler(BaseApiHandler):
|
|||||||
self.controller.management.add_to_audit_log(
|
self.controller.management.add_to_audit_log(
|
||||||
user["user_id"],
|
user["user_id"],
|
||||||
f"deleted role with ID {role_id}",
|
f"deleted role with ID {role_id}",
|
||||||
server_id=0,
|
server_id=None,
|
||||||
source_ip=self.get_remote_ip(),
|
source_ip=self.get_remote_ip(),
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -172,7 +172,7 @@ class ApiRolesRoleIndexHandler(BaseApiHandler):
|
|||||||
self.controller.management.add_to_audit_log(
|
self.controller.management.add_to_audit_log(
|
||||||
user["user_id"],
|
user["user_id"],
|
||||||
f"modified role with ID {role_id}",
|
f"modified role with ID {role_id}",
|
||||||
server_id=0,
|
server_id=None,
|
||||||
source_ip=self.get_remote_ip(),
|
source_ip=self.get_remote_ip(),
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -177,7 +177,7 @@ class ApiUsersIndexHandler(BaseApiHandler):
|
|||||||
self.controller.management.add_to_audit_log(
|
self.controller.management.add_to_audit_log(
|
||||||
user["user_id"],
|
user["user_id"],
|
||||||
f"added user {username} (UID:{user_id}) with roles {roles}",
|
f"added user {username} (UID:{user_id}) with roles {roles}",
|
||||||
server_id=0,
|
server_id=None,
|
||||||
source_ip=self.get_remote_ip(),
|
source_ip=self.get_remote_ip(),
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -43,7 +43,7 @@ class ApiUsersUserKeyHandler(BaseApiHandler):
|
|||||||
auth_data[4]["user_id"],
|
auth_data[4]["user_id"],
|
||||||
f"Generated a new API token for the key {key.name} "
|
f"Generated a new API token for the key {key.name} "
|
||||||
f"from user with UID: {key.user_id}",
|
f"from user with UID: {key.user_id}",
|
||||||
server_id=0,
|
server_id=None,
|
||||||
source_ip=self.get_remote_ip(),
|
source_ip=self.get_remote_ip(),
|
||||||
)
|
)
|
||||||
data_key = self.controller.authentication.generate(
|
data_key = self.controller.authentication.generate(
|
||||||
@ -173,7 +173,7 @@ class ApiUsersUserKeyHandler(BaseApiHandler):
|
|||||||
f"Added API key {data['name']} with crafty permissions "
|
f"Added API key {data['name']} with crafty permissions "
|
||||||
f"{data['crafty_permissions_mask']}"
|
f"{data['crafty_permissions_mask']}"
|
||||||
f" and {data['server_permissions_mask']} for user with UID: {user_id}",
|
f" and {data['server_permissions_mask']} for user with UID: {user_id}",
|
||||||
server_id=0,
|
server_id=None,
|
||||||
source_ip=self.get_remote_ip(),
|
source_ip=self.get_remote_ip(),
|
||||||
)
|
)
|
||||||
self.finish_json(200, {"status": "ok", "data": {"id": key_id}})
|
self.finish_json(200, {"status": "ok", "data": {"id": key_id}})
|
||||||
@ -233,7 +233,7 @@ class ApiUsersUserKeyHandler(BaseApiHandler):
|
|||||||
auth_data[4]["user_id"],
|
auth_data[4]["user_id"],
|
||||||
f"Removed API key {target_key} "
|
f"Removed API key {target_key} "
|
||||||
f"(ID: {key_id}) from user {auth_data[4]['user_id']}",
|
f"(ID: {key_id}) from user {auth_data[4]['user_id']}",
|
||||||
server_id=0,
|
server_id=None,
|
||||||
source_ip=self.get_remote_ip(),
|
source_ip=self.get_remote_ip(),
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -94,7 +94,7 @@ class ApiUsersUserIndexHandler(BaseApiHandler):
|
|||||||
self.controller.management.add_to_audit_log(
|
self.controller.management.add_to_audit_log(
|
||||||
user["user_id"],
|
user["user_id"],
|
||||||
f"deleted the user {user_id}",
|
f"deleted the user {user_id}",
|
||||||
server_id=0,
|
server_id=None,
|
||||||
source_ip=self.get_remote_ip(),
|
source_ip=self.get_remote_ip(),
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -283,7 +283,7 @@ class ApiUsersUserIndexHandler(BaseApiHandler):
|
|||||||
f"edited user {user_obj.username} (UID: {user_id})"
|
f"edited user {user_obj.username} (UID: {user_id})"
|
||||||
f"with roles {user_obj.roles}"
|
f"with roles {user_obj.roles}"
|
||||||
),
|
),
|
||||||
server_id=0,
|
server_id=None,
|
||||||
source_ip=self.get_remote_ip(),
|
source_ip=self.get_remote_ip(),
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -55,7 +55,7 @@ class WebSocketHandler(tornado.websocket.WebSocketHandler):
|
|||||||
self.controller.management.add_to_audit_log_raw(
|
self.controller.management.add_to_audit_log_raw(
|
||||||
"unknown",
|
"unknown",
|
||||||
0,
|
0,
|
||||||
0,
|
None,
|
||||||
"Someone tried to connect via WebSocket without proper authentication",
|
"Someone tried to connect via WebSocket without proper authentication",
|
||||||
self.get_remote_ip(),
|
self.get_remote_ip(),
|
||||||
)
|
)
|
||||||
|
Loading…
Reference in New Issue
Block a user