mirror of
https://github.com/memohai/Memoh.git
synced 2026-04-25 07:00:48 +09:00
206 lines
5.4 KiB
Go
206 lines
5.4 KiB
Go
// Code generated by sqlc. DO NOT EDIT.
|
|
// versions:
|
|
// sqlc v1.30.0
|
|
// source: user_provider_oauth.sql
|
|
|
|
package sqlc
|
|
|
|
import (
|
|
"context"
|
|
|
|
"github.com/jackc/pgx/v5/pgtype"
|
|
)
|
|
|
|
const deleteUserProviderOAuthToken = `-- name: DeleteUserProviderOAuthToken :exec
|
|
DELETE FROM user_provider_oauth_tokens
|
|
WHERE provider_id = $1
|
|
AND user_id = $2
|
|
`
|
|
|
|
type DeleteUserProviderOAuthTokenParams struct {
|
|
ProviderID pgtype.UUID `json:"provider_id"`
|
|
UserID pgtype.UUID `json:"user_id"`
|
|
}
|
|
|
|
func (q *Queries) DeleteUserProviderOAuthToken(ctx context.Context, arg DeleteUserProviderOAuthTokenParams) error {
|
|
_, err := q.db.Exec(ctx, deleteUserProviderOAuthToken, arg.ProviderID, arg.UserID)
|
|
return err
|
|
}
|
|
|
|
const getUserProviderOAuthToken = `-- name: GetUserProviderOAuthToken :one
|
|
SELECT id, provider_id, user_id, access_token, refresh_token, expires_at, scope, token_type, state, pkce_code_verifier, metadata, created_at, updated_at FROM user_provider_oauth_tokens
|
|
WHERE provider_id = $1
|
|
AND user_id = $2
|
|
`
|
|
|
|
type GetUserProviderOAuthTokenParams struct {
|
|
ProviderID pgtype.UUID `json:"provider_id"`
|
|
UserID pgtype.UUID `json:"user_id"`
|
|
}
|
|
|
|
func (q *Queries) GetUserProviderOAuthToken(ctx context.Context, arg GetUserProviderOAuthTokenParams) (UserProviderOauthToken, error) {
|
|
row := q.db.QueryRow(ctx, getUserProviderOAuthToken, arg.ProviderID, arg.UserID)
|
|
var i UserProviderOauthToken
|
|
err := row.Scan(
|
|
&i.ID,
|
|
&i.ProviderID,
|
|
&i.UserID,
|
|
&i.AccessToken,
|
|
&i.RefreshToken,
|
|
&i.ExpiresAt,
|
|
&i.Scope,
|
|
&i.TokenType,
|
|
&i.State,
|
|
&i.PkceCodeVerifier,
|
|
&i.Metadata,
|
|
&i.CreatedAt,
|
|
&i.UpdatedAt,
|
|
)
|
|
return i, err
|
|
}
|
|
|
|
const getUserProviderOAuthTokenByState = `-- name: GetUserProviderOAuthTokenByState :one
|
|
SELECT id, provider_id, user_id, access_token, refresh_token, expires_at, scope, token_type, state, pkce_code_verifier, metadata, created_at, updated_at FROM user_provider_oauth_tokens
|
|
WHERE state = $1
|
|
AND state != ''
|
|
`
|
|
|
|
func (q *Queries) GetUserProviderOAuthTokenByState(ctx context.Context, state string) (UserProviderOauthToken, error) {
|
|
row := q.db.QueryRow(ctx, getUserProviderOAuthTokenByState, state)
|
|
var i UserProviderOauthToken
|
|
err := row.Scan(
|
|
&i.ID,
|
|
&i.ProviderID,
|
|
&i.UserID,
|
|
&i.AccessToken,
|
|
&i.RefreshToken,
|
|
&i.ExpiresAt,
|
|
&i.Scope,
|
|
&i.TokenType,
|
|
&i.State,
|
|
&i.PkceCodeVerifier,
|
|
&i.Metadata,
|
|
&i.CreatedAt,
|
|
&i.UpdatedAt,
|
|
)
|
|
return i, err
|
|
}
|
|
|
|
const updateUserProviderOAuthState = `-- name: UpdateUserProviderOAuthState :exec
|
|
INSERT INTO user_provider_oauth_tokens (provider_id, user_id, state, pkce_code_verifier, metadata)
|
|
VALUES (
|
|
$1,
|
|
$2,
|
|
$3,
|
|
$4,
|
|
$5
|
|
)
|
|
ON CONFLICT (provider_id, user_id) DO UPDATE SET
|
|
state = EXCLUDED.state,
|
|
pkce_code_verifier = EXCLUDED.pkce_code_verifier,
|
|
metadata = EXCLUDED.metadata,
|
|
updated_at = now()
|
|
`
|
|
|
|
type UpdateUserProviderOAuthStateParams struct {
|
|
ProviderID pgtype.UUID `json:"provider_id"`
|
|
UserID pgtype.UUID `json:"user_id"`
|
|
State string `json:"state"`
|
|
PkceCodeVerifier string `json:"pkce_code_verifier"`
|
|
Metadata []byte `json:"metadata"`
|
|
}
|
|
|
|
func (q *Queries) UpdateUserProviderOAuthState(ctx context.Context, arg UpdateUserProviderOAuthStateParams) error {
|
|
_, err := q.db.Exec(ctx, updateUserProviderOAuthState,
|
|
arg.ProviderID,
|
|
arg.UserID,
|
|
arg.State,
|
|
arg.PkceCodeVerifier,
|
|
arg.Metadata,
|
|
)
|
|
return err
|
|
}
|
|
|
|
const upsertUserProviderOAuthToken = `-- name: UpsertUserProviderOAuthToken :one
|
|
INSERT INTO user_provider_oauth_tokens (
|
|
provider_id,
|
|
user_id,
|
|
access_token,
|
|
refresh_token,
|
|
expires_at,
|
|
scope,
|
|
token_type,
|
|
state,
|
|
pkce_code_verifier,
|
|
metadata
|
|
)
|
|
VALUES (
|
|
$1,
|
|
$2,
|
|
$3,
|
|
$4,
|
|
$5,
|
|
$6,
|
|
$7,
|
|
$8,
|
|
$9,
|
|
$10
|
|
)
|
|
ON CONFLICT (provider_id, user_id) DO UPDATE SET
|
|
access_token = EXCLUDED.access_token,
|
|
refresh_token = EXCLUDED.refresh_token,
|
|
expires_at = EXCLUDED.expires_at,
|
|
scope = EXCLUDED.scope,
|
|
token_type = EXCLUDED.token_type,
|
|
state = EXCLUDED.state,
|
|
pkce_code_verifier = EXCLUDED.pkce_code_verifier,
|
|
metadata = EXCLUDED.metadata,
|
|
updated_at = now()
|
|
RETURNING id, provider_id, user_id, access_token, refresh_token, expires_at, scope, token_type, state, pkce_code_verifier, metadata, created_at, updated_at
|
|
`
|
|
|
|
type UpsertUserProviderOAuthTokenParams struct {
|
|
ProviderID pgtype.UUID `json:"provider_id"`
|
|
UserID pgtype.UUID `json:"user_id"`
|
|
AccessToken string `json:"access_token"`
|
|
RefreshToken string `json:"refresh_token"`
|
|
ExpiresAt pgtype.Timestamptz `json:"expires_at"`
|
|
Scope string `json:"scope"`
|
|
TokenType string `json:"token_type"`
|
|
State string `json:"state"`
|
|
PkceCodeVerifier string `json:"pkce_code_verifier"`
|
|
Metadata []byte `json:"metadata"`
|
|
}
|
|
|
|
func (q *Queries) UpsertUserProviderOAuthToken(ctx context.Context, arg UpsertUserProviderOAuthTokenParams) (UserProviderOauthToken, error) {
|
|
row := q.db.QueryRow(ctx, upsertUserProviderOAuthToken,
|
|
arg.ProviderID,
|
|
arg.UserID,
|
|
arg.AccessToken,
|
|
arg.RefreshToken,
|
|
arg.ExpiresAt,
|
|
arg.Scope,
|
|
arg.TokenType,
|
|
arg.State,
|
|
arg.PkceCodeVerifier,
|
|
arg.Metadata,
|
|
)
|
|
var i UserProviderOauthToken
|
|
err := row.Scan(
|
|
&i.ID,
|
|
&i.ProviderID,
|
|
&i.UserID,
|
|
&i.AccessToken,
|
|
&i.RefreshToken,
|
|
&i.ExpiresAt,
|
|
&i.Scope,
|
|
&i.TokenType,
|
|
&i.State,
|
|
&i.PkceCodeVerifier,
|
|
&i.Metadata,
|
|
&i.CreatedAt,
|
|
&i.UpdatedAt,
|
|
)
|
|
return i, err
|
|
}
|