users: track logins, signups, and other user events.
Add tracking of certain important user actions. These events include: * Logins * Logouts * Failed login attempts * Account creations * Account deletions * Password reset requests * Password changes * Email address changes This is similar to the mod actions log, except for account activity related to a single user. The information tracked includes the user, the event type (login, logout, etc), the timestamp, the user's IP address, IP geolocation information, the user's browser user agent, and the user's session ID from their session cookie. This information is visible to mods only. This is done with three models. The UserEvent model tracks the event type (login, logout, password change, etc) and the user. The UserEvent is tied to a UserSession, which contains the user's IP address and browser metadata. Finally, the IpGeolocation model contains the geolocation information for IPs, including the city, country, ISP, and whether the IP is a proxy. This tracking will be used for a few purposes: * Letting users view their account history, to detect things like logins from unrecognized IPs, failed logins attempts, password changes, etc. * Rate limiting failed login attempts. * Detecting sockpuppet accounts using their login history. * Detecting unauthorized account sharing.
This commit is contained in:
@@ -260,6 +260,7 @@ class UsersControllerTest < ActionDispatch::IntegrationTest
|
||||
assert_equal(User.last, User.last.authenticate_password("xxxxx1"))
|
||||
assert_nil(User.last.email_address)
|
||||
assert_no_enqueued_emails
|
||||
assert_equal(true, User.last.user_events.user_creation.exists?)
|
||||
end
|
||||
|
||||
should "create a user with a valid email" do
|
||||
@@ -270,6 +271,7 @@ class UsersControllerTest < ActionDispatch::IntegrationTest
|
||||
assert_equal(User.last, User.last.authenticate_password("xxxxx1"))
|
||||
assert_equal("webmaster@danbooru.donmai.us", User.last.email_address.address)
|
||||
assert_enqueued_email_with UserMailer, :welcome_user, args: [User.last], queue: "default"
|
||||
assert_equal(true, User.last.user_events.user_creation.exists?)
|
||||
end
|
||||
|
||||
should "not create a user with an invalid email" do
|
||||
@@ -307,6 +309,7 @@ class UsersControllerTest < ActionDispatch::IntegrationTest
|
||||
assert_equal(true, User.last.is_member?)
|
||||
assert_equal(false, User.last.is_restricted?)
|
||||
assert_equal(false, User.last.requires_verification)
|
||||
assert_equal(true, User.last.user_events.user_creation.exists?)
|
||||
end
|
||||
|
||||
should "mark accounts created by already logged in users as restricted" do
|
||||
@@ -318,6 +321,7 @@ class UsersControllerTest < ActionDispatch::IntegrationTest
|
||||
assert_equal(false, User.last.is_member?)
|
||||
assert_equal(true, User.last.is_restricted?)
|
||||
assert_equal(true, User.last.requires_verification)
|
||||
assert_equal(true, User.last.user_events.user_creation.exists?)
|
||||
end
|
||||
|
||||
should "mark users signing up from proxies as restricted" do
|
||||
@@ -330,6 +334,7 @@ class UsersControllerTest < ActionDispatch::IntegrationTest
|
||||
assert_equal(false, User.last.is_member?)
|
||||
assert_equal(true, User.last.is_restricted?)
|
||||
assert_equal(true, User.last.requires_verification)
|
||||
assert_equal(true, User.last.user_events.user_creation.exists?)
|
||||
end
|
||||
|
||||
should "mark users signing up from a partial banned IP as restricted" do
|
||||
@@ -344,6 +349,7 @@ class UsersControllerTest < ActionDispatch::IntegrationTest
|
||||
assert_equal(true, User.last.requires_verification)
|
||||
assert_equal(1, @ip_ban.reload.hit_count)
|
||||
assert(@ip_ban.last_hit_at > 1.minute.ago)
|
||||
assert_equal(true, User.last.user_events.user_creation.exists?)
|
||||
end
|
||||
|
||||
should "not mark users signing up from non-proxies as restricted" do
|
||||
@@ -356,6 +362,7 @@ class UsersControllerTest < ActionDispatch::IntegrationTest
|
||||
assert_equal(true, User.last.is_member?)
|
||||
assert_equal(false, User.last.is_restricted?)
|
||||
assert_equal(false, User.last.requires_verification)
|
||||
assert_equal(true, User.last.user_events.user_creation.exists?)
|
||||
end
|
||||
|
||||
should "mark accounts registered from an IPv4 address recently used for another account as restricted" do
|
||||
@@ -368,6 +375,7 @@ class UsersControllerTest < ActionDispatch::IntegrationTest
|
||||
assert_equal(false, User.last.is_member?)
|
||||
assert_equal(true, User.last.is_restricted?)
|
||||
assert_equal(true, User.last.requires_verification)
|
||||
assert_equal(true, User.last.user_events.user_creation.exists?)
|
||||
end
|
||||
|
||||
should "not mark users signing up from localhost as restricted" do
|
||||
@@ -379,6 +387,7 @@ class UsersControllerTest < ActionDispatch::IntegrationTest
|
||||
assert_equal(true, User.last.is_member?)
|
||||
assert_equal(false, User.last.is_restricted?)
|
||||
assert_equal(false, User.last.requires_verification)
|
||||
assert_equal(true, User.last.user_events.user_creation.exists?)
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
Reference in New Issue
Block a user