Browse Source

Update email.rs

Add ip_src on logs when email 2fa token is invalid or not available
Changes for fail2ban purposes
pull/5719/head
setsecurity 3 weeks ago
committed by GitHub
parent
commit
44c556f2ff
No known key found for this signature in database GPG Key ID: B5690EEEBB952194
  1. 4
      src/api/core/two_factor/email.rs

4
src/api/core/two_factor/email.rs

@ -204,7 +204,7 @@ pub async fn validate_email_code_str(user_id: &UserId, token: &str, data: &str,
.map_res("Two factor not found")?; .map_res("Two factor not found")?;
let Some(issued_token) = &email_data.last_token else { let Some(issued_token) = &email_data.last_token else {
err!( err!(
"No token available", format!("No token available! Server time: {} IP: {}", current_time.format("%F %T UTC"), ip.ip),
ErrorEvent { ErrorEvent {
event: EventType::UserFailedLogIn2fa event: EventType::UserFailedLogIn2fa
} }
@ -220,7 +220,7 @@ pub async fn validate_email_code_str(user_id: &UserId, token: &str, data: &str,
twofactor.save(conn).await?; twofactor.save(conn).await?;
err!( err!(
"Token is invalid", format!("Token is invalid! Server time: {} IP: {}", current_time.format("%F %T UTC"), ip.ip),
ErrorEvent { ErrorEvent {
event: EventType::UserFailedLogIn2fa event: EventType::UserFailedLogIn2fa
} }

Loading…
Cancel
Save