2024-08-12 11:00:25 +02:00
|
|
|
package job
|
|
|
|
|
|
|
|
|
|
import (
|
2025-02-05 18:08:01 +01:00
|
|
|
"log"
|
|
|
|
|
"time"
|
|
|
|
|
|
2024-08-12 11:00:25 +02:00
|
|
|
"github.com/go-co-op/gocron/v2"
|
2025-02-05 18:08:01 +01:00
|
|
|
"github.com/pocket-id/pocket-id/backend/internal/model"
|
|
|
|
|
datatype "github.com/pocket-id/pocket-id/backend/internal/model/types"
|
2024-08-17 21:57:14 +02:00
|
|
|
"gorm.io/gorm"
|
2024-08-12 11:00:25 +02:00
|
|
|
)
|
|
|
|
|
|
2025-01-19 15:30:31 +01:00
|
|
|
func RegisterDbCleanupJobs(db *gorm.DB) {
|
2024-08-12 11:00:25 +02:00
|
|
|
scheduler, err := gocron.NewScheduler()
|
|
|
|
|
if err != nil {
|
|
|
|
|
log.Fatalf("Failed to create a new scheduler: %s", err)
|
|
|
|
|
}
|
|
|
|
|
|
2025-04-03 08:06:56 -05:00
|
|
|
jobs := &DbCleanupJobs{db: db}
|
2024-08-17 21:57:14 +02:00
|
|
|
|
|
|
|
|
registerJob(scheduler, "ClearWebauthnSessions", "0 3 * * *", jobs.clearWebauthnSessions)
|
|
|
|
|
registerJob(scheduler, "ClearOneTimeAccessTokens", "0 3 * * *", jobs.clearOneTimeAccessTokens)
|
|
|
|
|
registerJob(scheduler, "ClearOidcAuthorizationCodes", "0 3 * * *", jobs.clearOidcAuthorizationCodes)
|
2025-03-23 15:14:26 -05:00
|
|
|
registerJob(scheduler, "ClearOidcRefreshTokens", "0 3 * * *", jobs.clearOidcRefreshTokens)
|
2025-03-27 17:46:10 +01:00
|
|
|
registerJob(scheduler, "ClearAuditLogs", "0 3 * * *", jobs.clearAuditLogs)
|
2024-08-12 11:00:25 +02:00
|
|
|
scheduler.Start()
|
|
|
|
|
}
|
|
|
|
|
|
2025-04-03 08:06:56 -05:00
|
|
|
type DbCleanupJobs struct {
|
2024-08-17 21:57:14 +02:00
|
|
|
db *gorm.DB
|
|
|
|
|
}
|
|
|
|
|
|
2024-09-09 10:29:41 +02:00
|
|
|
// ClearWebauthnSessions deletes WebAuthn sessions that have expired
|
2025-04-03 08:06:56 -05:00
|
|
|
func (j *DbCleanupJobs) clearWebauthnSessions() error {
|
2024-12-13 08:43:46 +01:00
|
|
|
return j.db.Delete(&model.WebauthnSession{}, "expires_at < ?", datatype.DateTime(time.Now())).Error
|
2024-08-17 21:57:14 +02:00
|
|
|
}
|
|
|
|
|
|
2024-09-09 10:29:41 +02:00
|
|
|
// ClearOneTimeAccessTokens deletes one-time access tokens that have expired
|
2025-04-03 08:06:56 -05:00
|
|
|
func (j *DbCleanupJobs) clearOneTimeAccessTokens() error {
|
2024-12-13 08:43:46 +01:00
|
|
|
return j.db.Debug().Delete(&model.OneTimeAccessToken{}, "expires_at < ?", datatype.DateTime(time.Now())).Error
|
2024-08-17 21:57:14 +02:00
|
|
|
}
|
|
|
|
|
|
2024-09-09 10:29:41 +02:00
|
|
|
// ClearOidcAuthorizationCodes deletes OIDC authorization codes that have expired
|
2025-04-03 08:06:56 -05:00
|
|
|
func (j *DbCleanupJobs) clearOidcAuthorizationCodes() error {
|
2024-12-13 08:43:46 +01:00
|
|
|
return j.db.Delete(&model.OidcAuthorizationCode{}, "expires_at < ?", datatype.DateTime(time.Now())).Error
|
2024-09-09 10:29:41 +02:00
|
|
|
}
|
2024-08-17 21:57:14 +02:00
|
|
|
|
2025-03-23 15:14:26 -05:00
|
|
|
// ClearOidcAuthorizationCodes deletes OIDC authorization codes that have expired
|
2025-04-03 08:06:56 -05:00
|
|
|
func (j *DbCleanupJobs) clearOidcRefreshTokens() error {
|
2025-03-23 15:14:26 -05:00
|
|
|
return j.db.Delete(&model.OidcRefreshToken{}, "expires_at < ?", datatype.DateTime(time.Now())).Error
|
|
|
|
|
}
|
|
|
|
|
|
2024-09-09 10:29:41 +02:00
|
|
|
// ClearAuditLogs deletes audit logs older than 90 days
|
2025-04-03 08:06:56 -05:00
|
|
|
func (j *DbCleanupJobs) clearAuditLogs() error {
|
2024-12-13 08:43:46 +01:00
|
|
|
return j.db.Delete(&model.AuditLog{}, "created_at < ?", datatype.DateTime(time.Now().AddDate(0, 0, -90))).Error
|
2024-08-17 21:57:14 +02:00
|
|
|
}
|