more audit records
All checks were successful
continuous-integration/drone/push Build is passing

This commit is contained in:
2024-01-15 11:25:45 +11:00
parent e71c9e6df8
commit f6a2544839
2 changed files with 36 additions and 0 deletions

View File

@@ -41,12 +41,20 @@ type AddRoleInput struct {
func DeleteUser(c *gin.Context) { func DeleteUser(c *gin.Context) {
var input DeleteInput var input DeleteInput
var RequestingUserId int
if err := c.ShouldBindJSON(&input); err != nil { if err := c.ShouldBindJSON(&input); err != nil {
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()}) c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
return return
} }
if val, ok := c.Get("user-id"); !ok {
c.JSON(http.StatusBadRequest, gin.H{"error": "error determining user"})
return
} else {
RequestingUserId = val.(int)
}
u := models.User{} u := models.User{}
u.UserName = input.UserName u.UserName = input.UserName
@@ -69,6 +77,13 @@ func DeleteUser(c *gin.Context) {
return return
} }
// Create audit record
a := models.Audit{
UserId: RequestingUserId,
EventText: fmt.Sprintf("Deleted User Id %d", testUser.UserId),
}
a.AuditAdd()
c.JSON(http.StatusOK, gin.H{"message": "user deletion success"}) c.JSON(http.StatusOK, gin.H{"message": "user deletion success"})
} }
} }

View File

@@ -143,6 +143,13 @@ func StoreSecret(c *gin.Context) {
return return
} }
// Create audit record
a := models.Audit{
UserId: UserId,
EventText: fmt.Sprintf("Created Secret Id %d", s.SecretId),
}
a.AuditAdd()
c.JSON(http.StatusOK, gin.H{"message": "secret stored successfully", "data": models.SecretRestricted(s)}) c.JSON(http.StatusOK, gin.H{"message": "secret stored successfully", "data": models.SecretRestricted(s)})
} }
@@ -357,6 +364,13 @@ func UpdateSecret(c *gin.Context) {
return return
} }
// Create audit record
a := models.Audit{
UserId: UserId,
EventText: fmt.Sprintf("Updated Secret Id %d", s.SecretId),
}
a.AuditAdd()
c.JSON(http.StatusOK, gin.H{"message": "secret updated successfully", "data": models.SecretRestricted(s)}) c.JSON(http.StatusOK, gin.H{"message": "secret updated successfully", "data": models.SecretRestricted(s)})
} else { } else {
c.JSON(http.StatusBadRequest, gin.H{"error": "multiple secrets matched search parameters, be more specific"}) c.JSON(http.StatusBadRequest, gin.H{"error": "multiple secrets matched search parameters, be more specific"})
@@ -436,6 +450,13 @@ func DeleteSecret(c *gin.Context) {
return return
} }
// Create audit record
a := models.Audit{
UserId: UserId,
EventText: fmt.Sprintf("Deleted Secret Id %d", s.SecretId),
}
a.AuditAdd()
c.JSON(http.StatusOK, gin.H{"message": "secret deleted successfully"}) c.JSON(http.StatusOK, gin.H{"message": "secret deleted successfully"})
} else { } else {
errString := "multiple secrets matched search parameters, be more specific" errString := "multiple secrets matched search parameters, be more specific"