Browse Source
Update email.rs
Add ip_src on logs when email 2fa token is invalid or not available
Changes for fail2ban purposes
pull/5719/head
setsecurity
3 weeks ago
committed by
GitHub
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with
2 additions and
2 deletions
-
src/api/core/two_factor/email.rs
|
|
@ -204,7 +204,7 @@ pub async fn validate_email_code_str(user_id: &UserId, token: &str, data: &str, |
|
|
|
.map_res("Two factor not found")?; |
|
|
|
let Some(issued_token) = &email_data.last_token else { |
|
|
|
err!( |
|
|
|
"No token available", |
|
|
|
format!("No token available! Server time: {} IP: {}", current_time.format("%F %T UTC"), ip.ip), |
|
|
|
ErrorEvent { |
|
|
|
event: EventType::UserFailedLogIn2fa |
|
|
|
} |
|
|
@ -220,7 +220,7 @@ pub async fn validate_email_code_str(user_id: &UserId, token: &str, data: &str, |
|
|
|
twofactor.save(conn).await?; |
|
|
|
|
|
|
|
err!( |
|
|
|
"Token is invalid", |
|
|
|
format!("Token is invalid! Server time: {} IP: {}", current_time.format("%F %T UTC"), ip.ip), |
|
|
|
ErrorEvent { |
|
|
|
event: EventType::UserFailedLogIn2fa |
|
|
|
} |
|
|
|