Replacing server_id=0 to server_id=None for AuditLog

This commit is contained in:
Silversthorn 2024-03-24 20:39:10 +01:00
parent a87daa6ef3
commit 3edfd4320d
11 changed files with 18 additions and 18 deletions

View File

@ -1403,7 +1403,7 @@ class PanelHandler(BaseHandler):
self.controller.management.add_to_audit_log( self.controller.management.add_to_audit_log(
exec_user["user_id"], exec_user["user_id"],
f"Removed user {target_user['username']} (UID:{user_id})", f"Removed user {target_user['username']} (UID:{user_id})",
server_id=0, server_id=None,
source_ip=self.get_remote_ip(), source_ip=self.get_remote_ip(),
) )
self.redirect("/panel/panel_config") self.redirect("/panel/panel_config")

View File

@ -228,7 +228,7 @@ class PublicHandler(BaseHandler):
) )
# log this login # log this login
self.controller.management.add_to_audit_log( self.controller.management.add_to_audit_log(
user_data.user_id, "Logged in", 0, self.get_remote_ip() user_data.user_id, "Logged in", None, self.get_remote_ip()
) )
return self.finish_json( return self.finish_json(
@ -254,7 +254,7 @@ class PublicHandler(BaseHandler):
) )
# log this failed login attempt # log this failed login attempt
self.controller.management.add_to_audit_log( self.controller.management.add_to_audit_log(
user_data.user_id, "Tried to log in", 0, self.get_remote_ip() user_data.user_id, "Tried to log in", None, self.get_remote_ip()
) )
return self.finish_json( return self.finish_json(
403, 403,

View File

@ -101,7 +101,7 @@ class ApiAuthLoginHandler(BaseApiHandler):
# log this login # log this login
self.controller.management.add_to_audit_log( self.controller.management.add_to_audit_log(
user_data.user_id, "logged in via the API", 0, self.get_remote_ip() user_data.user_id, "logged in via the API", None, self.get_remote_ip()
) )
self.finish_json( self.finish_json(
@ -119,7 +119,7 @@ class ApiAuthLoginHandler(BaseApiHandler):
else: else:
# log this failed login attempt # log this failed login attempt
self.controller.management.add_to_audit_log( self.controller.management.add_to_audit_log(
user_data.user_id, "Tried to log in", 0, self.get_remote_ip() user_data.user_id, "Tried to log in", None, self.get_remote_ip()
) )
self.finish_json( self.finish_json(
401, 401,

View File

@ -129,7 +129,7 @@ class ApiCraftyConfigIndexHandler(BaseApiHandler):
self.controller.management.add_to_audit_log( self.controller.management.add_to_audit_log(
user["user_id"], user["user_id"],
"edited config.json", "edited config.json",
server_id=0, server_id=None,
source_ip=self.get_remote_ip(), source_ip=self.get_remote_ip(),
) )
@ -226,7 +226,7 @@ class ApiCraftyCustomizeIndexHandler(BaseApiHandler):
self.controller.management.add_to_audit_log( self.controller.management.add_to_audit_log(
user["user_id"], user["user_id"],
f"customized login photo: {data['photo']}/{data['opacity']}", f"customized login photo: {data['photo']}/{data['opacity']}",
server_id=0, server_id=None,
source_ip=self.get_remote_ip(), source_ip=self.get_remote_ip(),
) )
self.controller.management.set_login_opacity(int(data["opacity"])) self.controller.management.set_login_opacity(int(data["opacity"]))

View File

@ -109,7 +109,7 @@ class ApiCraftyConfigServerDirHandler(BaseApiHandler):
self.controller.management.add_to_audit_log( self.controller.management.add_to_audit_log(
auth_data[4]["user_id"], auth_data[4]["user_id"],
f"updated master servers dir to {new_dir}/servers", f"updated master servers dir to {new_dir}/servers",
server_id=0, server_id=None,
source_ip=self.get_remote_ip(), source_ip=self.get_remote_ip(),
) )

View File

@ -161,7 +161,7 @@ class ApiRolesIndexHandler(BaseApiHandler):
self.controller.management.add_to_audit_log( self.controller.management.add_to_audit_log(
user["user_id"], user["user_id"],
f"created role {role_name} (RID:{role_id})", f"created role {role_name} (RID:{role_id})",
server_id=0, server_id=None,
source_ip=self.get_remote_ip(), source_ip=self.get_remote_ip(),
) )

View File

@ -112,7 +112,7 @@ class ApiRolesRoleIndexHandler(BaseApiHandler):
self.controller.management.add_to_audit_log( self.controller.management.add_to_audit_log(
user["user_id"], user["user_id"],
f"deleted role with ID {role_id}", f"deleted role with ID {role_id}",
server_id=0, server_id=None,
source_ip=self.get_remote_ip(), source_ip=self.get_remote_ip(),
) )
@ -172,7 +172,7 @@ class ApiRolesRoleIndexHandler(BaseApiHandler):
self.controller.management.add_to_audit_log( self.controller.management.add_to_audit_log(
user["user_id"], user["user_id"],
f"modified role with ID {role_id}", f"modified role with ID {role_id}",
server_id=0, server_id=None,
source_ip=self.get_remote_ip(), source_ip=self.get_remote_ip(),
) )

View File

@ -177,7 +177,7 @@ class ApiUsersIndexHandler(BaseApiHandler):
self.controller.management.add_to_audit_log( self.controller.management.add_to_audit_log(
user["user_id"], user["user_id"],
f"added user {username} (UID:{user_id}) with roles {roles}", f"added user {username} (UID:{user_id}) with roles {roles}",
server_id=0, server_id=None,
source_ip=self.get_remote_ip(), source_ip=self.get_remote_ip(),
) )

View File

@ -43,7 +43,7 @@ class ApiUsersUserKeyHandler(BaseApiHandler):
auth_data[4]["user_id"], auth_data[4]["user_id"],
f"Generated a new API token for the key {key.name} " f"Generated a new API token for the key {key.name} "
f"from user with UID: {key.user_id}", f"from user with UID: {key.user_id}",
server_id=0, server_id=None,
source_ip=self.get_remote_ip(), source_ip=self.get_remote_ip(),
) )
data_key = self.controller.authentication.generate( data_key = self.controller.authentication.generate(
@ -173,7 +173,7 @@ class ApiUsersUserKeyHandler(BaseApiHandler):
f"Added API key {data['name']} with crafty permissions " f"Added API key {data['name']} with crafty permissions "
f"{data['crafty_permissions_mask']}" f"{data['crafty_permissions_mask']}"
f" and {data['server_permissions_mask']} for user with UID: {user_id}", f" and {data['server_permissions_mask']} for user with UID: {user_id}",
server_id=0, server_id=None,
source_ip=self.get_remote_ip(), source_ip=self.get_remote_ip(),
) )
self.finish_json(200, {"status": "ok", "data": {"id": key_id}}) self.finish_json(200, {"status": "ok", "data": {"id": key_id}})
@ -233,7 +233,7 @@ class ApiUsersUserKeyHandler(BaseApiHandler):
auth_data[4]["user_id"], auth_data[4]["user_id"],
f"Removed API key {target_key} " f"Removed API key {target_key} "
f"(ID: {key_id}) from user {auth_data[4]['user_id']}", f"(ID: {key_id}) from user {auth_data[4]['user_id']}",
server_id=0, server_id=None,
source_ip=self.get_remote_ip(), source_ip=self.get_remote_ip(),
) )

View File

@ -94,7 +94,7 @@ class ApiUsersUserIndexHandler(BaseApiHandler):
self.controller.management.add_to_audit_log( self.controller.management.add_to_audit_log(
user["user_id"], user["user_id"],
f"deleted the user {user_id}", f"deleted the user {user_id}",
server_id=0, server_id=None,
source_ip=self.get_remote_ip(), source_ip=self.get_remote_ip(),
) )
@ -283,7 +283,7 @@ class ApiUsersUserIndexHandler(BaseApiHandler):
f"edited user {user_obj.username} (UID: {user_id})" f"edited user {user_obj.username} (UID: {user_id})"
f"with roles {user_obj.roles}" f"with roles {user_obj.roles}"
), ),
server_id=0, server_id=None,
source_ip=self.get_remote_ip(), source_ip=self.get_remote_ip(),
) )

View File

@ -55,7 +55,7 @@ class WebSocketHandler(tornado.websocket.WebSocketHandler):
self.controller.management.add_to_audit_log_raw( self.controller.management.add_to_audit_log_raw(
"unknown", "unknown",
0, 0,
0, None,
"Someone tried to connect via WebSocket without proper authentication", "Someone tried to connect via WebSocket without proper authentication",
self.get_remote_ip(), self.get_remote_ip(),
) )