mirror of
https://github.com/SamyRai/tercul-backend.git
synced 2025-12-27 05:11:34 +00:00
The main changes are: - Refactored the `Copyright` and `Monetization` relationships to use explicit join tables for each owning model, as per the "Option A" strategy. This fixes the GORM migration issues related to polymorphic many-to-many relationships. - Created new join table structs (e.g., `WorkCopyright`, `AuthorCopyright`, `WorkMonetization`, etc.). - Updated the domain models to use standard `gorm:"many2many"` tags with the new join tables. - Refactored the `CopyrightRepository` and `MonetizationRepository` to use the new association-based logic. - Updated the application services (`CopyrightCommands`, `CopyrightQueries`, `MonetizationCommands`, `MonetizationQueries`) to use the new repository methods. - Consolidated all repository interfaces into a single `internal/domain/interfaces.go` file for better code organization. - Added extensive integration tests for the new repository and application layer logic for `Copyrights` and `Monetizations`. - Fixed the deletion logic for `WorkRepository` to correctly handle cascading deletes with SQLite. - Updated the `TODO.md` file to mark the "Stabilize non-linguistics tests and interfaces" task as complete.
61 lines
1.8 KiB
Go
61 lines
1.8 KiB
Go
package sql
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"tercul/internal/domain"
|
|
"time"
|
|
|
|
"gorm.io/gorm"
|
|
)
|
|
|
|
type passwordResetRepository struct {
|
|
domain.BaseRepository[domain.PasswordReset]
|
|
db *gorm.DB
|
|
}
|
|
|
|
// NewPasswordResetRepository creates a new PasswordResetRepository.
|
|
func NewPasswordResetRepository(db *gorm.DB) domain.PasswordResetRepository {
|
|
return &passwordResetRepository{
|
|
BaseRepository: NewBaseRepositoryImpl[domain.PasswordReset](db),
|
|
db: db,
|
|
}
|
|
}
|
|
|
|
// GetByToken finds a reset by token (only unused and non-expired)
|
|
func (r *passwordResetRepository) GetByToken(ctx context.Context, token string) (*domain.PasswordReset, error) {
|
|
var reset domain.PasswordReset
|
|
if err := r.db.WithContext(ctx).Where("token = ? AND used = ? AND expires_at > ?", token, false, time.Now()).First(&reset).Error; err != nil {
|
|
if errors.Is(err, gorm.ErrRecordNotFound) {
|
|
return nil, ErrEntityNotFound
|
|
}
|
|
return nil, err
|
|
}
|
|
return &reset, nil
|
|
}
|
|
|
|
// GetByUserID finds resets by user ID
|
|
func (r *passwordResetRepository) GetByUserID(ctx context.Context, userID uint) ([]domain.PasswordReset, error) {
|
|
var resets []domain.PasswordReset
|
|
if err := r.db.WithContext(ctx).Where("user_id = ?", userID).Find(&resets).Error; err != nil {
|
|
return nil, err
|
|
}
|
|
return resets, nil
|
|
}
|
|
|
|
// DeleteExpired deletes expired resets
|
|
func (r *passwordResetRepository) DeleteExpired(ctx context.Context) error {
|
|
if err := r.db.WithContext(ctx).Where("expires_at < ?", time.Now()).Delete(&domain.PasswordReset{}).Error; err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// MarkAsUsed marks a reset as used
|
|
func (r *passwordResetRepository) MarkAsUsed(ctx context.Context, id uint) error {
|
|
if err := r.db.WithContext(ctx).Model(&domain.PasswordReset{}).Where("id = ?", id).Update("used", true).Error; err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|