view mod_audit_user_accounts/mod_audit_user_accounts.lua @ 5787:e79f9dec35c0

mod_c2s_conn_throttle: Reduce log level from error->info Our general policy is that "error" should never be triggerable by remote entities, and that it is always about something that requires admin intervention. This satisfies neither condition. The "warn" level can be used for unexpected events/behaviour triggered by remote entities, and this could qualify. However I don't think failed auth attempts are unexpected enough. I selected "info" because it is what is also used for other notable session lifecycle events.
author Matthew Wild <mwild1@gmail.com>
date Thu, 07 Dec 2023 15:46:50 +0000
parents 628952e4ff47
children
line wrap: on
line source

module:depends("audit");
-- luacheck: read globals module.audit

local dt = require "util.datetime";
local jid = require "util.jid";
local st = require "util.stanza";

local function audit_basic_event(name, custom_handler)
	module:hook(name, function (event)
		local custom;
		if custom_handler then
			custom = custom_handler(event);
		end
		module:audit(jid.join(event.username, module.host), name, {
			session = event.session;
			custom = custom;
		});
	end);
end

audit_basic_event("user-registered", function (event)
	local invite = event.validated_invite or (event.session and event.session.validated_invite);
	if not invite then return; end
	return {
		st.stanza(
			"invite-used",
			{
				xmlns = "xmpp:prosody.im/audit",
				token = invite.token,
			}
		);
	};
end);

audit_basic_event("user-deregistered-pending");
audit_basic_event("user-deregistered");

audit_basic_event("user-enabled");
audit_basic_event("user-disabled", function (event)
	local meta = event.meta;
	if not meta then return end

	local meta_st = st.stanza("disabled", {
		xmlns = "xmpp:prosody.im/audit";
		reason = meta.reason;
		when = meta.when and dt.datetime(meta.when) or nil;
	});
	if meta.comment then
		meta_st:text_tag("comment", meta.comment);
	end

	return { meta_st };
end);