mirror of
https://github.com/SamyRai/tercul-backend.git
synced 2025-12-27 05:11:34 +00:00
- Core Go application with GraphQL API using gqlgen - Comprehensive data models for literary works, authors, translations - Repository pattern with caching layer - Authentication and authorization system - Linguistics analysis capabilities with multiple adapters - Vector search integration with Weaviate - Docker containerization support - Python data migration and analysis scripts - Clean architecture with proper separation of concerns - Production-ready configuration and middleware - Proper .gitignore excluding vendor/, database files, and build artifacts
69 lines
2.2 KiB
Go
69 lines
2.2 KiB
Go
package repositories
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"gorm.io/gorm"
|
|
"tercul/models"
|
|
"time"
|
|
)
|
|
|
|
// PasswordResetRepository defines CRUD methods specific to PasswordReset.
|
|
type PasswordResetRepository interface {
|
|
BaseRepository[models.PasswordReset]
|
|
GetByToken(ctx context.Context, token string) (*models.PasswordReset, error)
|
|
GetByUserID(ctx context.Context, userID uint) ([]models.PasswordReset, error)
|
|
DeleteExpired(ctx context.Context) error
|
|
MarkAsUsed(ctx context.Context, id uint) error
|
|
}
|
|
|
|
type passwordResetRepository struct {
|
|
BaseRepository[models.PasswordReset]
|
|
db *gorm.DB
|
|
}
|
|
|
|
// NewPasswordResetRepository creates a new PasswordResetRepository.
|
|
func NewPasswordResetRepository(db *gorm.DB) PasswordResetRepository {
|
|
return &passwordResetRepository{
|
|
BaseRepository: NewBaseRepositoryImpl[models.PasswordReset](db),
|
|
db: db,
|
|
}
|
|
}
|
|
|
|
// GetByToken finds a reset by token (only unused and non-expired)
|
|
func (r *passwordResetRepository) GetByToken(ctx context.Context, token string) (*models.PasswordReset, error) {
|
|
var reset models.PasswordReset
|
|
if err := r.db.WithContext(ctx).Where("token = ? AND used = ? AND expires_at > ?", token, false, time.Now()).First(&reset).Error; err != nil {
|
|
if errors.Is(err, gorm.ErrRecordNotFound) {
|
|
return nil, ErrEntityNotFound
|
|
}
|
|
return nil, err
|
|
}
|
|
return &reset, nil
|
|
}
|
|
|
|
// GetByUserID finds resets by user ID
|
|
func (r *passwordResetRepository) GetByUserID(ctx context.Context, userID uint) ([]models.PasswordReset, error) {
|
|
var resets []models.PasswordReset
|
|
if err := r.db.WithContext(ctx).Where("user_id = ?", userID).Find(&resets).Error; err != nil {
|
|
return nil, err
|
|
}
|
|
return resets, nil
|
|
}
|
|
|
|
// DeleteExpired deletes expired resets
|
|
func (r *passwordResetRepository) DeleteExpired(ctx context.Context) error {
|
|
if err := r.db.WithContext(ctx).Where("expires_at < ?", time.Now()).Delete(&models.PasswordReset{}).Error; err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// MarkAsUsed marks a reset as used
|
|
func (r *passwordResetRepository) MarkAsUsed(ctx context.Context, id uint) error {
|
|
if err := r.db.WithContext(ctx).Model(&models.PasswordReset{}).Where("id = ?", id).Update("used", true).Error; err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|