pub struct AuditLogV3 { /* private fields */ }Implementations§
Source§impl AuditLogV3
impl AuditLogV3
Sourcepub fn product_version(&self) -> &str
pub fn product_version(&self) -> &str
The version of the product that produced this log.
Sourcepub fn deployment(&self) -> Option<&str>
pub fn deployment(&self) -> Option<&str>
The deployment that produced this log.
Sourcepub fn environment(&self) -> Option<&str>
pub fn environment(&self) -> Option<&str>
The environment that produced this log.
Sourcepub fn producer_type(&self) -> &AuditProducer
pub fn producer_type(&self) -> &AuditProducer
How this audit log was produced, eg. from a backend Server, frontend Client etc.
Sourcepub fn organizations(&self) -> &[Organization]
pub fn organizations(&self) -> &[Organization]
A list of organizations that have been attributed to this log. Attribution is typically based on the user that originated this log, and the resources that they targeted. Not exposed to downstream consumers.
Sourcepub fn event_id(&self) -> Uuid
pub fn event_id(&self) -> Uuid
Unique identifier for this audit log event. If there are multiple log entries associated with this particular audit event, they will share the same eventId but will have different logEntryId and different sequenceId.
Sourcepub fn log_entry_id(&self) -> Option<Uuid>
pub fn log_entry_id(&self) -> Option<Uuid>
Unique identifier for this audit log.
Sourcepub fn sequence_id(&self) -> Option<i32>
pub fn sequence_id(&self) -> Option<i32>
Orders the log entries when there are multiple entries for the same event.
Sourcepub fn user_agent(&self) -> Option<&str>
pub fn user_agent(&self) -> Option<&str>
The user agent of the user that originated this log.
Sourcepub fn categories(&self) -> &[String]
pub fn categories(&self) -> &[String]
All audit categories produced by this audit event. Each audit categories produces a set of keys that will be distributed between the request and response params.
Sourcepub fn entities(&self) -> &[Any]
pub fn entities(&self) -> &[Any]
All contextualized entities present in the request and response params of this log. Note: Some resources cannot be contextualized, and will not be included in this list as a result.
Sourcepub fn users(&self) -> &[ContextualizedUser]
pub fn users(&self) -> &[ContextualizedUser]
All contextualized users present in the request and response params of this log, including the top level UUID of this log.
Sourcepub fn origins(&self) -> &[String]
pub fn origins(&self) -> &[String]
All addresses attached to the request. Contains information from unreliable sources such as the X-Forwarded-For header.
This value can be spoofed.
Sourcepub fn source_origin(&self) -> Option<&str>
pub fn source_origin(&self) -> Option<&str>
Origin of the network request. If a request goes through a proxy, this will contain the proxy’’s address.
This value is verified through the TCP stack.
Sourcepub fn request_params(&self) -> &BTreeMap<String, SensitivityTaggedValue>
👎Deprecated: Use requestFields instead.Should be translated to requestFields during emitting if requestFields is missing, by dropping the level
from the SensitivityTaggedValue and directly using the payload as the value for the map.
pub fn request_params(&self) -> &BTreeMap<String, SensitivityTaggedValue>
The parameters known at method invocation time.
Note that all keys must be known to the audit library. Typically, entries in the request and response
params will be dependent on the categories field defined above.
Sourcepub fn request_fields(&self) -> &BTreeMap<String, Any>
pub fn request_fields(&self) -> &BTreeMap<String, Any>
The fields known at method invocation time.
Note that all keys must be known to the audit library. Typically, entries in the request and result
fields will be dependent on the categories field defined above.
This replaces requestParams and will take priority if present.
Sourcepub fn result_params(&self) -> &BTreeMap<String, SensitivityTaggedValue>
👎Deprecated: Use resultFields instead.Should be translated to resultFields during emitting if resultFields is missing, by dropping the level
from the SensitivityTaggedValue and directly using the payload as the value for the map.
pub fn result_params(&self) -> &BTreeMap<String, SensitivityTaggedValue>
Information derived within a method, commonly parts of the return value.
Note that all keys must be known to the audit library. Typically, entries in the request and response
params will be dependent on the categories field defined above.
Sourcepub fn result_fields(&self) -> &BTreeMap<String, Any>
pub fn result_fields(&self) -> &BTreeMap<String, Any>
Information derived within a method, commonly parts of the return value.
Note that all keys must be known to the audit library. Typically, entries in the request and result
fields will be dependent on the categories field defined above.
This replaces resultParams and will take priority if present.
pub fn time(&self) -> DateTime<Utc>
Sourcepub fn uid(&self) -> Option<&UserId>
pub fn uid(&self) -> Option<&UserId>
User id (if available). This is the most downstream caller.
Sourcepub fn org_id(&self) -> Option<&OrganizationId>
pub fn org_id(&self) -> Option<&OrganizationId>
Organization id (if available)
Sourcepub fn origin(&self) -> Option<&str>
pub fn origin(&self) -> Option<&str>
Best-effort identifier of the originating machine, e.g. an IP address, a Kubernetes node identifier, or similar.
This value can be spoofed.
Sourcepub fn result(&self) -> &AuditResult
pub fn result(&self) -> &AuditResult
Indicates whether the request was successful or the type of failure, e.g. ERROR or UNAUTHORIZED
Trait Implementations§
Source§impl Clone for AuditLogV3
impl Clone for AuditLogV3
Source§fn clone(&self) -> AuditLogV3
fn clone(&self) -> AuditLogV3
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source. Read more