Files
Memoh/internal/db/sqlc/user_provider_oauth.sql.go
T

206 lines
5.4 KiB
Go

// Code generated by sqlc. DO NOT EDIT.
// versions:
// sqlc v1.30.0
// source: user_provider_oauth.sql
package sqlc
import (
"context"
"github.com/jackc/pgx/v5/pgtype"
)
const deleteUserProviderOAuthToken = `-- name: DeleteUserProviderOAuthToken :exec
DELETE FROM user_provider_oauth_tokens
WHERE provider_id = $1
AND user_id = $2
`
type DeleteUserProviderOAuthTokenParams struct {
ProviderID pgtype.UUID `json:"provider_id"`
UserID pgtype.UUID `json:"user_id"`
}
func (q *Queries) DeleteUserProviderOAuthToken(ctx context.Context, arg DeleteUserProviderOAuthTokenParams) error {
_, err := q.db.Exec(ctx, deleteUserProviderOAuthToken, arg.ProviderID, arg.UserID)
return err
}
const getUserProviderOAuthToken = `-- name: GetUserProviderOAuthToken :one
SELECT id, provider_id, user_id, access_token, refresh_token, expires_at, scope, token_type, state, pkce_code_verifier, metadata, created_at, updated_at FROM user_provider_oauth_tokens
WHERE provider_id = $1
AND user_id = $2
`
type GetUserProviderOAuthTokenParams struct {
ProviderID pgtype.UUID `json:"provider_id"`
UserID pgtype.UUID `json:"user_id"`
}
func (q *Queries) GetUserProviderOAuthToken(ctx context.Context, arg GetUserProviderOAuthTokenParams) (UserProviderOauthToken, error) {
row := q.db.QueryRow(ctx, getUserProviderOAuthToken, arg.ProviderID, arg.UserID)
var i UserProviderOauthToken
err := row.Scan(
&i.ID,
&i.ProviderID,
&i.UserID,
&i.AccessToken,
&i.RefreshToken,
&i.ExpiresAt,
&i.Scope,
&i.TokenType,
&i.State,
&i.PkceCodeVerifier,
&i.Metadata,
&i.CreatedAt,
&i.UpdatedAt,
)
return i, err
}
const getUserProviderOAuthTokenByState = `-- name: GetUserProviderOAuthTokenByState :one
SELECT id, provider_id, user_id, access_token, refresh_token, expires_at, scope, token_type, state, pkce_code_verifier, metadata, created_at, updated_at FROM user_provider_oauth_tokens
WHERE state = $1
AND state != ''
`
func (q *Queries) GetUserProviderOAuthTokenByState(ctx context.Context, state string) (UserProviderOauthToken, error) {
row := q.db.QueryRow(ctx, getUserProviderOAuthTokenByState, state)
var i UserProviderOauthToken
err := row.Scan(
&i.ID,
&i.ProviderID,
&i.UserID,
&i.AccessToken,
&i.RefreshToken,
&i.ExpiresAt,
&i.Scope,
&i.TokenType,
&i.State,
&i.PkceCodeVerifier,
&i.Metadata,
&i.CreatedAt,
&i.UpdatedAt,
)
return i, err
}
const updateUserProviderOAuthState = `-- name: UpdateUserProviderOAuthState :exec
INSERT INTO user_provider_oauth_tokens (provider_id, user_id, state, pkce_code_verifier, metadata)
VALUES (
$1,
$2,
$3,
$4,
$5
)
ON CONFLICT (provider_id, user_id) DO UPDATE SET
state = EXCLUDED.state,
pkce_code_verifier = EXCLUDED.pkce_code_verifier,
metadata = EXCLUDED.metadata,
updated_at = now()
`
type UpdateUserProviderOAuthStateParams struct {
ProviderID pgtype.UUID `json:"provider_id"`
UserID pgtype.UUID `json:"user_id"`
State string `json:"state"`
PkceCodeVerifier string `json:"pkce_code_verifier"`
Metadata []byte `json:"metadata"`
}
func (q *Queries) UpdateUserProviderOAuthState(ctx context.Context, arg UpdateUserProviderOAuthStateParams) error {
_, err := q.db.Exec(ctx, updateUserProviderOAuthState,
arg.ProviderID,
arg.UserID,
arg.State,
arg.PkceCodeVerifier,
arg.Metadata,
)
return err
}
const upsertUserProviderOAuthToken = `-- name: UpsertUserProviderOAuthToken :one
INSERT INTO user_provider_oauth_tokens (
provider_id,
user_id,
access_token,
refresh_token,
expires_at,
scope,
token_type,
state,
pkce_code_verifier,
metadata
)
VALUES (
$1,
$2,
$3,
$4,
$5,
$6,
$7,
$8,
$9,
$10
)
ON CONFLICT (provider_id, user_id) DO UPDATE SET
access_token = EXCLUDED.access_token,
refresh_token = EXCLUDED.refresh_token,
expires_at = EXCLUDED.expires_at,
scope = EXCLUDED.scope,
token_type = EXCLUDED.token_type,
state = EXCLUDED.state,
pkce_code_verifier = EXCLUDED.pkce_code_verifier,
metadata = EXCLUDED.metadata,
updated_at = now()
RETURNING id, provider_id, user_id, access_token, refresh_token, expires_at, scope, token_type, state, pkce_code_verifier, metadata, created_at, updated_at
`
type UpsertUserProviderOAuthTokenParams struct {
ProviderID pgtype.UUID `json:"provider_id"`
UserID pgtype.UUID `json:"user_id"`
AccessToken string `json:"access_token"`
RefreshToken string `json:"refresh_token"`
ExpiresAt pgtype.Timestamptz `json:"expires_at"`
Scope string `json:"scope"`
TokenType string `json:"token_type"`
State string `json:"state"`
PkceCodeVerifier string `json:"pkce_code_verifier"`
Metadata []byte `json:"metadata"`
}
func (q *Queries) UpsertUserProviderOAuthToken(ctx context.Context, arg UpsertUserProviderOAuthTokenParams) (UserProviderOauthToken, error) {
row := q.db.QueryRow(ctx, upsertUserProviderOAuthToken,
arg.ProviderID,
arg.UserID,
arg.AccessToken,
arg.RefreshToken,
arg.ExpiresAt,
arg.Scope,
arg.TokenType,
arg.State,
arg.PkceCodeVerifier,
arg.Metadata,
)
var i UserProviderOauthToken
err := row.Scan(
&i.ID,
&i.ProviderID,
&i.UserID,
&i.AccessToken,
&i.RefreshToken,
&i.ExpiresAt,
&i.Scope,
&i.TokenType,
&i.State,
&i.PkceCodeVerifier,
&i.Metadata,
&i.CreatedAt,
&i.UpdatedAt,
)
return i, err
}