authentik/passbook/audit/signals.py

42 lines
1.6 KiB
Python
Raw Normal View History

"""passbook audit signal listener"""
from django.contrib.auth.signals import (user_logged_in, user_logged_out,
user_login_failed)
from django.dispatch import receiver
from passbook.audit.models import AuditEntry
2018-12-10 13:21:42 +00:00
from passbook.core.signals import (invitation_created, invitation_used,
user_signed_up)
@receiver(user_logged_in)
def on_user_logged_in(sender, request, user, **kwargs):
"""Log successful login"""
AuditEntry.create(AuditEntry.ACTION_LOGIN, request)
@receiver(user_logged_out)
def on_user_logged_out(sender, request, user, **kwargs):
"""Log successfully logout"""
AuditEntry.create(AuditEntry.ACTION_LOGOUT, request)
@receiver(user_signed_up)
def on_user_signed_up(sender, request, user, **kwargs):
"""Log successfully signed up"""
AuditEntry.create(AuditEntry.ACTION_SIGN_UP, request)
2018-12-10 13:21:42 +00:00
@receiver(invitation_created)
def on_invitation_created(sender, request, invitation, **kwargs):
"""Log Invite creation"""
2018-12-10 13:21:42 +00:00
AuditEntry.create(AuditEntry.ACTION_INVITE_CREATED, request, invitation_uuid=invitation.uuid)
2018-12-10 13:21:42 +00:00
@receiver(invitation_used)
def on_invitation_used(sender, request, invitation, **kwargs):
"""Log Invite usage"""
2018-12-10 13:21:42 +00:00
AuditEntry.create(AuditEntry.ACTION_INVITE_USED, request, invitation_uuid=invitation.uuid)
@receiver(user_login_failed)
def on_user_login_failed(sender, request, user, **kwargs):
"""Log failed login attempt"""
# TODO: Implement sumarizing of signals here for brute-force attempts
# AuditEntry.create(AuditEntry.ACTION_LOGOUT, request)
pass