Phase 1: Add role, mfa_enforce_pending, must_change_password to users table. Create system_config (singleton) and audit_log tables. Migration 026. Phase 2: Add user_id FK to all 8 data tables (todos, reminders, projects, calendars, people, locations, event_templates, ntfy_sent) with 4-step nullable→backfill→FK→NOT NULL pattern. Migrations 027-034. Phase 3: Harden auth schemas (extra="forbid" on RegisterRequest), add MFA enforcement token serializer with distinct salt, rewrite auth router with require_role() factory and registration endpoint. Phase 4: Scope all 12 routers by user_id, fix dependency type bugs, bound weather cache (SEC-15), multi-user ntfy dispatch. Phase 5: Create admin router (14 endpoints), admin schemas, audit service, rate limiting in nginx. SEC-08 CSRF via X-Requested-With. Phase 6: Update frontend types, useAuth hook (role/isAdmin/register), App.tsx (AdminRoute guard), Sidebar (admin link), api.ts (XHR header). Security findings addressed: SEC-01, SEC-02, SEC-03, SEC-04, SEC-05, SEC-06, SEC-07, SEC-08, SEC-12, SEC-13, SEC-15. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
23 lines
634 B
Python
23 lines
634 B
Python
import json
|
|
from sqlalchemy.ext.asyncio import AsyncSession
|
|
from app.models.audit_log import AuditLog
|
|
|
|
|
|
async def log_audit_event(
|
|
db: AsyncSession,
|
|
action: str,
|
|
actor_id: int | None = None,
|
|
target_id: int | None = None,
|
|
detail: dict | None = None,
|
|
ip: str | None = None,
|
|
) -> None:
|
|
"""Record an action in the audit log. Does NOT commit — caller handles transaction."""
|
|
entry = AuditLog(
|
|
actor_user_id=actor_id,
|
|
target_user_id=target_id,
|
|
action=action,
|
|
detail=json.dumps(detail) if detail else None,
|
|
ip_address=ip[:45] if ip else None,
|
|
)
|
|
db.add(entry)
|