summaryrefslogtreecommitdiff
path: root/app/workers/personal_access_tokens/expiring_worker.rb
blob: f4afa9f8994c2862674216a2bd78f300f94d44f6 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
# frozen_string_literal: true

module PersonalAccessTokens
  class ExpiringWorker # rubocop:disable Scalability/IdempotentWorker
    include ApplicationWorker

    data_consistency :always

    include CronjobQueue

    feature_category :authentication_and_authorization

    MAX_TOKENS = 100

    def perform(*args)
      notification_service = NotificationService.new
      limit_date = PersonalAccessToken::DAYS_TO_EXPIRE.days.from_now.to_date

      User.with_expiring_and_not_notified_personal_access_tokens(limit_date).find_each do |user|
        with_context(user: user) do
          expiring_user_tokens = user.personal_access_tokens.without_impersonation.expiring_and_not_notified(limit_date)

          # rubocop: disable CodeReuse/ActiveRecord
          # We never materialise the token instances. We need the names to mention them in the
          # email. Later we trigger an update query on the entire relation, not on individual instances.
          token_names = expiring_user_tokens.limit(MAX_TOKENS).pluck(:name)
          # We're limiting to 100 tokens so we avoid loading too many tokens into memory.
          # At the time of writing this would only affect 69 users on GitLab.com

          # rubocop: enable CodeReuse/ActiveRecord

          notification_service.access_token_about_to_expire(user, token_names)

          Gitlab::AppLogger.info "#{self.class}: Notifying User #{user.id} about expiring tokens"

          expiring_user_tokens.each_batch do |expiring_tokens|
            expiring_tokens.update_all(expire_notification_delivered: true)
          end
        end
      end
    end
  end
end