mirror of
https://github.com/SamyRai/tercul-backend.git
synced 2025-12-27 04:01:34 +00:00
Some checks failed
- Updated database models and repositories to replace uint IDs with UUIDs. - Modified test fixtures to generate and use UUIDs for authors, translations, users, and works. - Adjusted mock implementations to align with the new UUID structure. - Ensured all relevant functions and methods are updated to handle UUIDs correctly. - Added necessary imports for UUID handling in various files.
75 lines
2.3 KiB
Go
75 lines
2.3 KiB
Go
package sql
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"tercul/internal/domain"
|
|
"tercul/internal/platform/config"
|
|
"time"
|
|
|
|
"github.com/google/uuid"
|
|
"go.opentelemetry.io/otel"
|
|
"go.opentelemetry.io/otel/trace"
|
|
"gorm.io/gorm"
|
|
)
|
|
|
|
type passwordResetRepository struct {
|
|
*BaseRepositoryImpl[domain.PasswordReset]
|
|
db *gorm.DB
|
|
tracer trace.Tracer
|
|
}
|
|
|
|
// NewPasswordResetRepository creates a new PasswordResetRepository.
|
|
func NewPasswordResetRepository(db *gorm.DB, cfg *config.Config) domain.PasswordResetRepository {
|
|
return &passwordResetRepository{
|
|
BaseRepositoryImpl: NewBaseRepositoryImpl[domain.PasswordReset](db, cfg),
|
|
db: db,
|
|
tracer: otel.Tracer("password_reset.repository"),
|
|
}
|
|
}
|
|
|
|
// GetByToken finds a reset by token (only unused and non-expired)
|
|
func (r *passwordResetRepository) GetByToken(ctx context.Context, token string) (*domain.PasswordReset, error) {
|
|
ctx, span := r.tracer.Start(ctx, "GetByToken")
|
|
defer span.End()
|
|
var reset domain.PasswordReset
|
|
if err := r.db.WithContext(ctx).Where("token = ? AND used = ? AND expires_at > ?", token, false, time.Now()).First(&reset).Error; err != nil {
|
|
if errors.Is(err, gorm.ErrRecordNotFound) {
|
|
return nil, domain.ErrEntityNotFound
|
|
}
|
|
return nil, err
|
|
}
|
|
return &reset, nil
|
|
}
|
|
|
|
// GetByUserID finds resets by user ID
|
|
func (r *passwordResetRepository) GetByUserID(ctx context.Context, userID uuid.UUID) ([]domain.PasswordReset, error) {
|
|
ctx, span := r.tracer.Start(ctx, "GetByUserID")
|
|
defer span.End()
|
|
var resets []domain.PasswordReset
|
|
if err := r.db.WithContext(ctx).Where("user_id = ?", userID).Find(&resets).Error; err != nil {
|
|
return nil, err
|
|
}
|
|
return resets, nil
|
|
}
|
|
|
|
// DeleteExpired deletes expired resets
|
|
func (r *passwordResetRepository) DeleteExpired(ctx context.Context) error {
|
|
ctx, span := r.tracer.Start(ctx, "DeleteExpired")
|
|
defer span.End()
|
|
if err := r.db.WithContext(ctx).Where("expires_at < ?", time.Now()).Delete(&domain.PasswordReset{}).Error; err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// MarkAsUsed marks a reset as used
|
|
func (r *passwordResetRepository) MarkAsUsed(ctx context.Context, id uuid.UUID) error {
|
|
ctx, span := r.tracer.Start(ctx, "MarkAsUsed")
|
|
defer span.End()
|
|
if err := r.db.WithContext(ctx).Model(&domain.PasswordReset{}).Where("id = ?", id).Update("used", true).Error; err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|