// Code generated by sqlc. DO NOT EDIT. // versions: // sqlc v1.30.0 // source: user_provider_oauth.sql package sqlc import ( "context" "github.com/jackc/pgx/v5/pgtype" ) const deleteUserProviderOAuthToken = `-- name: DeleteUserProviderOAuthToken :exec DELETE FROM user_provider_oauth_tokens WHERE provider_id = $1 AND user_id = $2 ` type DeleteUserProviderOAuthTokenParams struct { ProviderID pgtype.UUID `json:"provider_id"` UserID pgtype.UUID `json:"user_id"` } func (q *Queries) DeleteUserProviderOAuthToken(ctx context.Context, arg DeleteUserProviderOAuthTokenParams) error { _, err := q.db.Exec(ctx, deleteUserProviderOAuthToken, arg.ProviderID, arg.UserID) return err } const getUserProviderOAuthToken = `-- name: GetUserProviderOAuthToken :one SELECT id, provider_id, user_id, access_token, refresh_token, expires_at, scope, token_type, state, pkce_code_verifier, metadata, created_at, updated_at FROM user_provider_oauth_tokens WHERE provider_id = $1 AND user_id = $2 ` type GetUserProviderOAuthTokenParams struct { ProviderID pgtype.UUID `json:"provider_id"` UserID pgtype.UUID `json:"user_id"` } func (q *Queries) GetUserProviderOAuthToken(ctx context.Context, arg GetUserProviderOAuthTokenParams) (UserProviderOauthToken, error) { row := q.db.QueryRow(ctx, getUserProviderOAuthToken, arg.ProviderID, arg.UserID) var i UserProviderOauthToken err := row.Scan( &i.ID, &i.ProviderID, &i.UserID, &i.AccessToken, &i.RefreshToken, &i.ExpiresAt, &i.Scope, &i.TokenType, &i.State, &i.PkceCodeVerifier, &i.Metadata, &i.CreatedAt, &i.UpdatedAt, ) return i, err } const getUserProviderOAuthTokenByState = `-- name: GetUserProviderOAuthTokenByState :one SELECT id, provider_id, user_id, access_token, refresh_token, expires_at, scope, token_type, state, pkce_code_verifier, metadata, created_at, updated_at FROM user_provider_oauth_tokens WHERE state = $1 AND state != '' ` func (q *Queries) GetUserProviderOAuthTokenByState(ctx context.Context, state string) (UserProviderOauthToken, error) { row := q.db.QueryRow(ctx, getUserProviderOAuthTokenByState, state) var i UserProviderOauthToken err := row.Scan( &i.ID, &i.ProviderID, &i.UserID, &i.AccessToken, &i.RefreshToken, &i.ExpiresAt, &i.Scope, &i.TokenType, &i.State, &i.PkceCodeVerifier, &i.Metadata, &i.CreatedAt, &i.UpdatedAt, ) return i, err } const updateUserProviderOAuthState = `-- name: UpdateUserProviderOAuthState :exec INSERT INTO user_provider_oauth_tokens (provider_id, user_id, state, pkce_code_verifier, metadata) VALUES ( $1, $2, $3, $4, $5 ) ON CONFLICT (provider_id, user_id) DO UPDATE SET state = EXCLUDED.state, pkce_code_verifier = EXCLUDED.pkce_code_verifier, metadata = EXCLUDED.metadata, updated_at = now() ` type UpdateUserProviderOAuthStateParams struct { ProviderID pgtype.UUID `json:"provider_id"` UserID pgtype.UUID `json:"user_id"` State string `json:"state"` PkceCodeVerifier string `json:"pkce_code_verifier"` Metadata []byte `json:"metadata"` } func (q *Queries) UpdateUserProviderOAuthState(ctx context.Context, arg UpdateUserProviderOAuthStateParams) error { _, err := q.db.Exec(ctx, updateUserProviderOAuthState, arg.ProviderID, arg.UserID, arg.State, arg.PkceCodeVerifier, arg.Metadata, ) return err } const upsertUserProviderOAuthToken = `-- name: UpsertUserProviderOAuthToken :one INSERT INTO user_provider_oauth_tokens ( provider_id, user_id, access_token, refresh_token, expires_at, scope, token_type, state, pkce_code_verifier, metadata ) VALUES ( $1, $2, $3, $4, $5, $6, $7, $8, $9, $10 ) ON CONFLICT (provider_id, user_id) DO UPDATE SET access_token = EXCLUDED.access_token, refresh_token = EXCLUDED.refresh_token, expires_at = EXCLUDED.expires_at, scope = EXCLUDED.scope, token_type = EXCLUDED.token_type, state = EXCLUDED.state, pkce_code_verifier = EXCLUDED.pkce_code_verifier, metadata = EXCLUDED.metadata, updated_at = now() RETURNING id, provider_id, user_id, access_token, refresh_token, expires_at, scope, token_type, state, pkce_code_verifier, metadata, created_at, updated_at ` type UpsertUserProviderOAuthTokenParams struct { ProviderID pgtype.UUID `json:"provider_id"` UserID pgtype.UUID `json:"user_id"` AccessToken string `json:"access_token"` RefreshToken string `json:"refresh_token"` ExpiresAt pgtype.Timestamptz `json:"expires_at"` Scope string `json:"scope"` TokenType string `json:"token_type"` State string `json:"state"` PkceCodeVerifier string `json:"pkce_code_verifier"` Metadata []byte `json:"metadata"` } func (q *Queries) UpsertUserProviderOAuthToken(ctx context.Context, arg UpsertUserProviderOAuthTokenParams) (UserProviderOauthToken, error) { row := q.db.QueryRow(ctx, upsertUserProviderOAuthToken, arg.ProviderID, arg.UserID, arg.AccessToken, arg.RefreshToken, arg.ExpiresAt, arg.Scope, arg.TokenType, arg.State, arg.PkceCodeVerifier, arg.Metadata, ) var i UserProviderOauthToken err := row.Scan( &i.ID, &i.ProviderID, &i.UserID, &i.AccessToken, &i.RefreshToken, &i.ExpiresAt, &i.Scope, &i.TokenType, &i.State, &i.PkceCodeVerifier, &i.Metadata, &i.CreatedAt, &i.UpdatedAt, ) return i, err }