2018-07-05 06:18:17 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2015-07-03 07:54:50 -04:00
|
|
|
class AuditEventService
|
2020-02-19 04:08:59 -05:00
|
|
|
# Instantiates a new service
|
|
|
|
#
|
2020-02-25 04:09:10 -05:00
|
|
|
# @param [User] author the user who authors the change
|
|
|
|
# @param [User, Project, Group] entity the scope which audit event belongs to
|
|
|
|
# This param is also used to determine the visibility of the audit event.
|
|
|
|
# - Project: events are visible at Project and Instance level
|
|
|
|
# - Group: events are visible at Group and Instance level
|
2020-02-19 04:08:59 -05:00
|
|
|
# - User: events are visible at Instance level
|
2020-02-25 04:09:10 -05:00
|
|
|
# @param [Hash] details extra data of audit event
|
2020-02-19 04:08:59 -05:00
|
|
|
#
|
|
|
|
# @return [AuditEventService]
|
2015-07-03 07:54:50 -04:00
|
|
|
def initialize(author, entity, details = {})
|
2020-04-03 08:09:52 -04:00
|
|
|
@author = build_author(author)
|
2020-02-19 04:08:59 -05:00
|
|
|
@entity = entity
|
|
|
|
@details = details
|
2015-07-03 07:54:50 -04:00
|
|
|
end
|
|
|
|
|
2020-02-19 04:08:59 -05:00
|
|
|
# Builds the @details attribute for authentication
|
|
|
|
#
|
2020-02-25 04:09:10 -05:00
|
|
|
# This uses the @author as the target object being audited
|
2020-02-19 04:08:59 -05:00
|
|
|
#
|
|
|
|
# @return [AuditEventService]
|
2015-07-03 07:54:50 -04:00
|
|
|
def for_authentication
|
|
|
|
@details = {
|
|
|
|
with: @details[:with],
|
|
|
|
target_id: @author.id,
|
2016-07-06 09:26:59 -04:00
|
|
|
target_type: 'User',
|
2017-05-03 07:22:03 -04:00
|
|
|
target_details: @author.name
|
2015-07-03 07:54:50 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
self
|
|
|
|
end
|
|
|
|
|
2020-02-19 04:08:59 -05:00
|
|
|
# Writes event to a file and creates an event record in DB
|
|
|
|
#
|
|
|
|
# @return [SecurityEvent] persited if saves and non-persisted if fails
|
2015-07-03 07:54:50 -04:00
|
|
|
def security_event
|
Add support for JSON logging for audit events
This will add audit_json.log that writes one line per audit event. For
example:
{
"severity":"INFO",
"time":"2018-10-17T17:38:22.523Z",
"author_id":3,
"entity_id":2,
"entity_type":"Project",
"change":"visibility",
"from":"Private",
"to":"Public",
"author_name":"John Doe4",
"target_id":2,
"target_type":"Project",
"target_details":"namespace2/project2"
}
2018-10-18 15:50:21 -04:00
|
|
|
log_security_event_to_file
|
|
|
|
log_security_event_to_database
|
|
|
|
end
|
|
|
|
|
2020-02-19 04:08:59 -05:00
|
|
|
# Writes event to a file
|
2019-08-27 17:50:17 -04:00
|
|
|
def log_security_event_to_file
|
|
|
|
file_logger.info(base_payload.merge(formatted_details))
|
|
|
|
end
|
|
|
|
|
Add support for JSON logging for audit events
This will add audit_json.log that writes one line per audit event. For
example:
{
"severity":"INFO",
"time":"2018-10-17T17:38:22.523Z",
"author_id":3,
"entity_id":2,
"entity_type":"Project",
"change":"visibility",
"from":"Private",
"to":"Public",
"author_name":"John Doe4",
"target_id":2,
"target_type":"Project",
"target_details":"namespace2/project2"
}
2018-10-18 15:50:21 -04:00
|
|
|
private
|
|
|
|
|
2020-04-03 08:09:52 -04:00
|
|
|
def build_author(author)
|
2020-05-15 11:08:04 -04:00
|
|
|
case author
|
|
|
|
when User
|
|
|
|
author.impersonated? ? Gitlab::Audit::ImpersonatedAuthor.new(author) : author
|
2020-04-03 08:09:52 -04:00
|
|
|
else
|
|
|
|
Gitlab::Audit::UnauthenticatedAuthor.new(name: author)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
Add support for JSON logging for audit events
This will add audit_json.log that writes one line per audit event. For
example:
{
"severity":"INFO",
"time":"2018-10-17T17:38:22.523Z",
"author_id":3,
"entity_id":2,
"entity_type":"Project",
"change":"visibility",
"from":"Private",
"to":"Public",
"author_name":"John Doe4",
"target_id":2,
"target_type":"Project",
"target_details":"namespace2/project2"
}
2018-10-18 15:50:21 -04:00
|
|
|
def base_payload
|
|
|
|
{
|
2015-07-03 07:54:50 -04:00
|
|
|
author_id: @author.id,
|
2020-07-07 08:09:16 -04:00
|
|
|
author_name: @author.name,
|
2015-07-03 07:54:50 -04:00
|
|
|
entity_id: @entity.id,
|
Add support for JSON logging for audit events
This will add audit_json.log that writes one line per audit event. For
example:
{
"severity":"INFO",
"time":"2018-10-17T17:38:22.523Z",
"author_id":3,
"entity_id":2,
"entity_type":"Project",
"change":"visibility",
"from":"Private",
"to":"Public",
"author_name":"John Doe4",
"target_id":2,
"target_type":"Project",
"target_details":"namespace2/project2"
}
2018-10-18 15:50:21 -04:00
|
|
|
entity_type: @entity.class.name
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
|
|
|
def file_logger
|
|
|
|
@file_logger ||= Gitlab::AuditJsonLogger.build
|
|
|
|
end
|
|
|
|
|
2019-07-03 18:58:05 -04:00
|
|
|
def formatted_details
|
|
|
|
@details.merge(@details.slice(:from, :to).transform_values(&:to_s))
|
|
|
|
end
|
|
|
|
|
Add support for JSON logging for audit events
This will add audit_json.log that writes one line per audit event. For
example:
{
"severity":"INFO",
"time":"2018-10-17T17:38:22.523Z",
"author_id":3,
"entity_id":2,
"entity_type":"Project",
"change":"visibility",
"from":"Private",
"to":"Public",
"author_name":"John Doe4",
"target_id":2,
"target_type":"Project",
"target_details":"namespace2/project2"
}
2018-10-18 15:50:21 -04:00
|
|
|
def log_security_event_to_database
|
2020-02-05 22:08:47 -05:00
|
|
|
return if Gitlab::Database.read_only?
|
|
|
|
|
Add support for JSON logging for audit events
This will add audit_json.log that writes one line per audit event. For
example:
{
"severity":"INFO",
"time":"2018-10-17T17:38:22.523Z",
"author_id":3,
"entity_id":2,
"entity_type":"Project",
"change":"visibility",
"from":"Private",
"to":"Public",
"author_name":"John Doe4",
"target_id":2,
"target_type":"Project",
"target_details":"namespace2/project2"
}
2018-10-18 15:50:21 -04:00
|
|
|
SecurityEvent.create(base_payload.merge(details: @details))
|
2015-07-03 07:54:50 -04:00
|
|
|
end
|
|
|
|
end
|
2019-09-13 09:26:31 -04:00
|
|
|
|
|
|
|
AuditEventService.prepend_if_ee('EE::AuditEventService')
|