mirror of
https://github.com/memohai/Memoh.git
synced 2026-04-27 07:16:19 +09:00
64609c2101
* feat: MCP OAuth * fix: redirect url and oauth
271 lines
7.8 KiB
Go
271 lines
7.8 KiB
Go
// Code generated by sqlc. DO NOT EDIT.
|
|
// versions:
|
|
// sqlc v1.30.0
|
|
// source: mcp_oauth.sql
|
|
|
|
package sqlc
|
|
|
|
import (
|
|
"context"
|
|
|
|
"github.com/jackc/pgx/v5/pgtype"
|
|
)
|
|
|
|
const clearMCPOAuthTokens = `-- name: ClearMCPOAuthTokens :exec
|
|
UPDATE mcp_oauth_tokens
|
|
SET access_token = '',
|
|
refresh_token = '',
|
|
expires_at = NULL,
|
|
scope = '',
|
|
pkce_code_verifier = '',
|
|
state_param = '',
|
|
redirect_uri = '',
|
|
updated_at = now()
|
|
WHERE connection_id = $1
|
|
`
|
|
|
|
func (q *Queries) ClearMCPOAuthTokens(ctx context.Context, connectionID pgtype.UUID) error {
|
|
_, err := q.db.Exec(ctx, clearMCPOAuthTokens, connectionID)
|
|
return err
|
|
}
|
|
|
|
const deleteMCPOAuthToken = `-- name: DeleteMCPOAuthToken :exec
|
|
DELETE FROM mcp_oauth_tokens
|
|
WHERE connection_id = $1
|
|
`
|
|
|
|
func (q *Queries) DeleteMCPOAuthToken(ctx context.Context, connectionID pgtype.UUID) error {
|
|
_, err := q.db.Exec(ctx, deleteMCPOAuthToken, connectionID)
|
|
return err
|
|
}
|
|
|
|
const getMCPOAuthToken = `-- name: GetMCPOAuthToken :one
|
|
SELECT id, connection_id, resource_metadata_url, authorization_server_url,
|
|
authorization_endpoint, token_endpoint, registration_endpoint,
|
|
scopes_supported, client_id, client_secret, access_token, refresh_token,
|
|
token_type, expires_at, scope, pkce_code_verifier, state_param,
|
|
resource_uri, redirect_uri, created_at, updated_at
|
|
FROM mcp_oauth_tokens
|
|
WHERE connection_id = $1
|
|
LIMIT 1
|
|
`
|
|
|
|
func (q *Queries) GetMCPOAuthToken(ctx context.Context, connectionID pgtype.UUID) (McpOauthToken, error) {
|
|
row := q.db.QueryRow(ctx, getMCPOAuthToken, connectionID)
|
|
var i McpOauthToken
|
|
err := row.Scan(
|
|
&i.ID,
|
|
&i.ConnectionID,
|
|
&i.ResourceMetadataUrl,
|
|
&i.AuthorizationServerUrl,
|
|
&i.AuthorizationEndpoint,
|
|
&i.TokenEndpoint,
|
|
&i.RegistrationEndpoint,
|
|
&i.ScopesSupported,
|
|
&i.ClientID,
|
|
&i.ClientSecret,
|
|
&i.AccessToken,
|
|
&i.RefreshToken,
|
|
&i.TokenType,
|
|
&i.ExpiresAt,
|
|
&i.Scope,
|
|
&i.PkceCodeVerifier,
|
|
&i.StateParam,
|
|
&i.ResourceUri,
|
|
&i.RedirectUri,
|
|
&i.CreatedAt,
|
|
&i.UpdatedAt,
|
|
)
|
|
return i, err
|
|
}
|
|
|
|
const getMCPOAuthTokenByState = `-- name: GetMCPOAuthTokenByState :one
|
|
SELECT id, connection_id, resource_metadata_url, authorization_server_url,
|
|
authorization_endpoint, token_endpoint, registration_endpoint,
|
|
scopes_supported, client_id, client_secret, access_token, refresh_token,
|
|
token_type, expires_at, scope, pkce_code_verifier, state_param,
|
|
resource_uri, redirect_uri, created_at, updated_at
|
|
FROM mcp_oauth_tokens
|
|
WHERE state_param = $1
|
|
LIMIT 1
|
|
`
|
|
|
|
func (q *Queries) GetMCPOAuthTokenByState(ctx context.Context, stateParam string) (McpOauthToken, error) {
|
|
row := q.db.QueryRow(ctx, getMCPOAuthTokenByState, stateParam)
|
|
var i McpOauthToken
|
|
err := row.Scan(
|
|
&i.ID,
|
|
&i.ConnectionID,
|
|
&i.ResourceMetadataUrl,
|
|
&i.AuthorizationServerUrl,
|
|
&i.AuthorizationEndpoint,
|
|
&i.TokenEndpoint,
|
|
&i.RegistrationEndpoint,
|
|
&i.ScopesSupported,
|
|
&i.ClientID,
|
|
&i.ClientSecret,
|
|
&i.AccessToken,
|
|
&i.RefreshToken,
|
|
&i.TokenType,
|
|
&i.ExpiresAt,
|
|
&i.Scope,
|
|
&i.PkceCodeVerifier,
|
|
&i.StateParam,
|
|
&i.ResourceUri,
|
|
&i.RedirectUri,
|
|
&i.CreatedAt,
|
|
&i.UpdatedAt,
|
|
)
|
|
return i, err
|
|
}
|
|
|
|
const updateMCPOAuthClientSecret = `-- name: UpdateMCPOAuthClientSecret :exec
|
|
UPDATE mcp_oauth_tokens
|
|
SET client_secret = $2,
|
|
updated_at = now()
|
|
WHERE connection_id = $1
|
|
`
|
|
|
|
type UpdateMCPOAuthClientSecretParams struct {
|
|
ConnectionID pgtype.UUID `json:"connection_id"`
|
|
ClientSecret string `json:"client_secret"`
|
|
}
|
|
|
|
func (q *Queries) UpdateMCPOAuthClientSecret(ctx context.Context, arg UpdateMCPOAuthClientSecretParams) error {
|
|
_, err := q.db.Exec(ctx, updateMCPOAuthClientSecret, arg.ConnectionID, arg.ClientSecret)
|
|
return err
|
|
}
|
|
|
|
const updateMCPOAuthPKCEState = `-- name: UpdateMCPOAuthPKCEState :exec
|
|
UPDATE mcp_oauth_tokens
|
|
SET pkce_code_verifier = $2,
|
|
state_param = $3,
|
|
client_id = $4,
|
|
redirect_uri = $5,
|
|
updated_at = now()
|
|
WHERE connection_id = $1
|
|
`
|
|
|
|
type UpdateMCPOAuthPKCEStateParams struct {
|
|
ConnectionID pgtype.UUID `json:"connection_id"`
|
|
PkceCodeVerifier string `json:"pkce_code_verifier"`
|
|
StateParam string `json:"state_param"`
|
|
ClientID string `json:"client_id"`
|
|
RedirectUri string `json:"redirect_uri"`
|
|
}
|
|
|
|
func (q *Queries) UpdateMCPOAuthPKCEState(ctx context.Context, arg UpdateMCPOAuthPKCEStateParams) error {
|
|
_, err := q.db.Exec(ctx, updateMCPOAuthPKCEState,
|
|
arg.ConnectionID,
|
|
arg.PkceCodeVerifier,
|
|
arg.StateParam,
|
|
arg.ClientID,
|
|
arg.RedirectUri,
|
|
)
|
|
return err
|
|
}
|
|
|
|
const updateMCPOAuthTokens = `-- name: UpdateMCPOAuthTokens :exec
|
|
UPDATE mcp_oauth_tokens
|
|
SET access_token = $2,
|
|
refresh_token = $3,
|
|
token_type = $4,
|
|
expires_at = $5,
|
|
scope = $6,
|
|
pkce_code_verifier = '',
|
|
state_param = '',
|
|
updated_at = now()
|
|
WHERE connection_id = $1
|
|
`
|
|
|
|
type UpdateMCPOAuthTokensParams struct {
|
|
ConnectionID pgtype.UUID `json:"connection_id"`
|
|
AccessToken string `json:"access_token"`
|
|
RefreshToken string `json:"refresh_token"`
|
|
TokenType string `json:"token_type"`
|
|
ExpiresAt pgtype.Timestamptz `json:"expires_at"`
|
|
Scope string `json:"scope"`
|
|
}
|
|
|
|
func (q *Queries) UpdateMCPOAuthTokens(ctx context.Context, arg UpdateMCPOAuthTokensParams) error {
|
|
_, err := q.db.Exec(ctx, updateMCPOAuthTokens,
|
|
arg.ConnectionID,
|
|
arg.AccessToken,
|
|
arg.RefreshToken,
|
|
arg.TokenType,
|
|
arg.ExpiresAt,
|
|
arg.Scope,
|
|
)
|
|
return err
|
|
}
|
|
|
|
const upsertMCPOAuthDiscovery = `-- name: UpsertMCPOAuthDiscovery :one
|
|
INSERT INTO mcp_oauth_tokens (connection_id, resource_metadata_url, authorization_server_url,
|
|
authorization_endpoint, token_endpoint, registration_endpoint, scopes_supported,
|
|
resource_uri)
|
|
VALUES ($1, $2, $3, $4, $5, $6, $7, $8)
|
|
ON CONFLICT (connection_id)
|
|
DO UPDATE SET resource_metadata_url = EXCLUDED.resource_metadata_url,
|
|
authorization_server_url = EXCLUDED.authorization_server_url,
|
|
authorization_endpoint = EXCLUDED.authorization_endpoint,
|
|
token_endpoint = EXCLUDED.token_endpoint,
|
|
registration_endpoint = EXCLUDED.registration_endpoint,
|
|
scopes_supported = EXCLUDED.scopes_supported,
|
|
resource_uri = EXCLUDED.resource_uri,
|
|
updated_at = now()
|
|
RETURNING id, connection_id, resource_metadata_url, authorization_server_url,
|
|
authorization_endpoint, token_endpoint, registration_endpoint,
|
|
scopes_supported, client_id, client_secret, access_token, refresh_token,
|
|
token_type, expires_at, scope, pkce_code_verifier, state_param,
|
|
resource_uri, redirect_uri, created_at, updated_at
|
|
`
|
|
|
|
type UpsertMCPOAuthDiscoveryParams struct {
|
|
ConnectionID pgtype.UUID `json:"connection_id"`
|
|
ResourceMetadataUrl string `json:"resource_metadata_url"`
|
|
AuthorizationServerUrl string `json:"authorization_server_url"`
|
|
AuthorizationEndpoint string `json:"authorization_endpoint"`
|
|
TokenEndpoint string `json:"token_endpoint"`
|
|
RegistrationEndpoint string `json:"registration_endpoint"`
|
|
ScopesSupported []string `json:"scopes_supported"`
|
|
ResourceUri string `json:"resource_uri"`
|
|
}
|
|
|
|
func (q *Queries) UpsertMCPOAuthDiscovery(ctx context.Context, arg UpsertMCPOAuthDiscoveryParams) (McpOauthToken, error) {
|
|
row := q.db.QueryRow(ctx, upsertMCPOAuthDiscovery,
|
|
arg.ConnectionID,
|
|
arg.ResourceMetadataUrl,
|
|
arg.AuthorizationServerUrl,
|
|
arg.AuthorizationEndpoint,
|
|
arg.TokenEndpoint,
|
|
arg.RegistrationEndpoint,
|
|
arg.ScopesSupported,
|
|
arg.ResourceUri,
|
|
)
|
|
var i McpOauthToken
|
|
err := row.Scan(
|
|
&i.ID,
|
|
&i.ConnectionID,
|
|
&i.ResourceMetadataUrl,
|
|
&i.AuthorizationServerUrl,
|
|
&i.AuthorizationEndpoint,
|
|
&i.TokenEndpoint,
|
|
&i.RegistrationEndpoint,
|
|
&i.ScopesSupported,
|
|
&i.ClientID,
|
|
&i.ClientSecret,
|
|
&i.AccessToken,
|
|
&i.RefreshToken,
|
|
&i.TokenType,
|
|
&i.ExpiresAt,
|
|
&i.Scope,
|
|
&i.PkceCodeVerifier,
|
|
&i.StateParam,
|
|
&i.ResourceUri,
|
|
&i.RedirectUri,
|
|
&i.CreatedAt,
|
|
&i.UpdatedAt,
|
|
)
|
|
return i, err
|
|
}
|