2024-08-12 11:00:25 +02:00
|
|
|
package job
|
|
|
|
|
|
|
|
|
|
import (
|
2025-04-06 06:04:08 -07:00
|
|
|
"context"
|
2025-04-28 18:13:50 +09:00
|
|
|
"errors"
|
2025-02-05 18:08:01 +01:00
|
|
|
"time"
|
|
|
|
|
|
2025-04-06 06:04:08 -07:00
|
|
|
"gorm.io/gorm"
|
|
|
|
|
|
2025-02-05 18:08:01 +01:00
|
|
|
"github.com/pocket-id/pocket-id/backend/internal/model"
|
|
|
|
|
datatype "github.com/pocket-id/pocket-id/backend/internal/model/types"
|
2024-08-12 11:00:25 +02:00
|
|
|
)
|
|
|
|
|
|
2025-04-28 18:13:50 +09:00
|
|
|
func (s *Scheduler) RegisterDbCleanupJobs(ctx context.Context, db *gorm.DB) error {
|
2025-04-03 08:06:56 -05:00
|
|
|
jobs := &DbCleanupJobs{db: db}
|
2024-08-17 21:57:14 +02:00
|
|
|
|
2025-04-28 18:13:50 +09:00
|
|
|
return errors.Join(
|
|
|
|
|
s.registerJob(ctx, "ClearWebauthnSessions", "0 3 * * *", jobs.clearWebauthnSessions),
|
|
|
|
|
s.registerJob(ctx, "ClearOneTimeAccessTokens", "0 3 * * *", jobs.clearOneTimeAccessTokens),
|
|
|
|
|
s.registerJob(ctx, "ClearOidcAuthorizationCodes", "0 3 * * *", jobs.clearOidcAuthorizationCodes),
|
|
|
|
|
s.registerJob(ctx, "ClearOidcRefreshTokens", "0 3 * * *", jobs.clearOidcRefreshTokens),
|
|
|
|
|
s.registerJob(ctx, "ClearAuditLogs", "0 3 * * *", jobs.clearAuditLogs),
|
|
|
|
|
)
|
2024-08-12 11:00:25 +02:00
|
|
|
}
|
|
|
|
|
|
2025-04-03 08:06:56 -05:00
|
|
|
type DbCleanupJobs struct {
|
2024-08-17 21:57:14 +02:00
|
|
|
db *gorm.DB
|
|
|
|
|
}
|
|
|
|
|
|
2024-09-09 10:29:41 +02:00
|
|
|
// ClearWebauthnSessions deletes WebAuthn sessions that have expired
|
2025-04-06 06:04:08 -07:00
|
|
|
func (j *DbCleanupJobs) clearWebauthnSessions(ctx context.Context) error {
|
|
|
|
|
return j.db.
|
|
|
|
|
WithContext(ctx).
|
|
|
|
|
Delete(&model.WebauthnSession{}, "expires_at < ?", datatype.DateTime(time.Now())).
|
|
|
|
|
Error
|
2024-08-17 21:57:14 +02:00
|
|
|
}
|
|
|
|
|
|
2024-09-09 10:29:41 +02:00
|
|
|
// ClearOneTimeAccessTokens deletes one-time access tokens that have expired
|
2025-04-06 06:04:08 -07:00
|
|
|
func (j *DbCleanupJobs) clearOneTimeAccessTokens(ctx context.Context) error {
|
|
|
|
|
return j.db.
|
|
|
|
|
WithContext(ctx).
|
|
|
|
|
Delete(&model.OneTimeAccessToken{}, "expires_at < ?", datatype.DateTime(time.Now())).
|
|
|
|
|
Error
|
2024-08-17 21:57:14 +02:00
|
|
|
}
|
|
|
|
|
|
2024-09-09 10:29:41 +02:00
|
|
|
// ClearOidcAuthorizationCodes deletes OIDC authorization codes that have expired
|
2025-04-06 06:04:08 -07:00
|
|
|
func (j *DbCleanupJobs) clearOidcAuthorizationCodes(ctx context.Context) error {
|
|
|
|
|
return j.db.
|
|
|
|
|
WithContext(ctx).
|
|
|
|
|
Delete(&model.OidcAuthorizationCode{}, "expires_at < ?", datatype.DateTime(time.Now())).
|
|
|
|
|
Error
|
2024-09-09 10:29:41 +02:00
|
|
|
}
|
2024-08-17 21:57:14 +02:00
|
|
|
|
2025-03-23 15:14:26 -05:00
|
|
|
// ClearOidcAuthorizationCodes deletes OIDC authorization codes that have expired
|
2025-04-06 06:04:08 -07:00
|
|
|
func (j *DbCleanupJobs) clearOidcRefreshTokens(ctx context.Context) error {
|
|
|
|
|
return j.db.
|
|
|
|
|
WithContext(ctx).
|
|
|
|
|
Delete(&model.OidcRefreshToken{}, "expires_at < ?", datatype.DateTime(time.Now())).
|
|
|
|
|
Error
|
2025-03-23 15:14:26 -05:00
|
|
|
}
|
|
|
|
|
|
2024-09-09 10:29:41 +02:00
|
|
|
// ClearAuditLogs deletes audit logs older than 90 days
|
2025-04-06 06:04:08 -07:00
|
|
|
func (j *DbCleanupJobs) clearAuditLogs(ctx context.Context) error {
|
|
|
|
|
return j.db.
|
|
|
|
|
WithContext(ctx).
|
|
|
|
|
Delete(&model.AuditLog{}, "created_at < ?", datatype.DateTime(time.Now().AddDate(0, 0, -90))).
|
|
|
|
|
Error
|
2024-08-17 21:57:14 +02:00
|
|
|
}
|