Save oauth tokens to the database for use later.

This commit is contained in:
Eli Ribble 2025-11-06 00:23:58 +00:00
parent 8cd11b350d
commit 858bc031a0
No known key found for this signature in database
18 changed files with 1957 additions and 10 deletions

122
arcgis.go Normal file
View file

@ -0,0 +1,122 @@
package main
import (
"context"
"crypto/rand"
"crypto/sha256"
"encoding/base64"
"encoding/json"
"fmt"
"io"
"log"
"net/http"
"net/url"
"strconv"
"strings"
"time"
"github.com/aarondl/opt/omit"
"github.com/Gleipnir-Technology/nidus-sync/models"
)
var CodeVerifier string = "random_secure_string_min_43_chars_long_should_be_stored_in_session"
type OAuthTokenResponse struct {
AccessToken string `json:"access_token"`
ExpiresIn int `json:"expires_in"`
RefreshToken string `json:"refresh_token"`
Username string `json:"username"`
}
// Build the ArcGIS authorization URL with PKCE
func buildArcGISAuthURL(clientID string, redirectURI string, expiration int) string {
baseURL := "https://www.arcgis.com/sharing/rest/oauth2/authorize/"
params := url.Values{}
params.Add("client_id", clientID)
params.Add("redirect_uri", redirectURI)
params.Add("response_type", "code")
//params.Add("code_challenge", generateCodeChallenge(codeVerifier))
//params.Add("code_challenge_method", "S256")
params.Add("expiration", strconv.Itoa(expiration))
return baseURL + "?" + params.Encode()
}
func futureUTCTimestamp(secondsFromNow int) time.Time {
return time.Now().UTC().Add(time.Duration(secondsFromNow) * time.Second)
}
// Helper function to generate code challenge from code verifier
func generateCodeChallenge(codeVerifier string) string {
hash := sha256.Sum256([]byte(codeVerifier))
return base64.RawURLEncoding.EncodeToString(hash[:])
}
// Generate a random code verifier for PKCE
func generateCodeVerifier() string {
bytes := make([]byte, 64) // 64 bytes = 512 bits
rand.Read(bytes)
return base64.RawURLEncoding.EncodeToString(bytes)
}
func handleOauthAccessCode(ctx context.Context, user *models.User, code string) error {
baseURL := "https://www.arcgis.com/sharing/rest/oauth2/token/"
//params.Add("code_verifier", "S256")
form := url.Values{
"grant_type": []string{"authorization_code"},
"code": []string{code},
"client_id": []string{ClientID},
"redirect_uri": []string{redirectURL()},
}
req, err := http.NewRequest("POST", baseURL, strings.NewReader(form.Encode()))
if err != nil {
return fmt.Errorf("Failed to create request: %v", err)
}
req.Header.Add("Content-Type", "application/x-www-form-urlencoded")
client := http.Client{}
log.Printf("POST %s", baseURL)
resp, err := client.Do(req)
if err != nil {
return fmt.Errorf("Failed to do request: %v", err)
}
defer resp.Body.Close()
bodyBytes, err := io.ReadAll(resp.Body)
log.Printf("Response %d", resp.StatusCode)
if resp.StatusCode >= http.StatusBadRequest {
if err != nil {
return fmt.Errorf("Got status code %d and failed to read response body: %v", resp.StatusCode, err)
}
bodyString := string(bodyBytes)
var errorResp map[string]interface{}
if err := json.Unmarshal(bodyBytes, &errorResp); err == nil {
return fmt.Errorf("API response JSON error: %d: %v", resp.StatusCode, errorResp)
}
return fmt.Errorf("API returned error status %d: %s", resp.StatusCode, bodyString)
}
var tokenResponse OAuthTokenResponse
err = json.Unmarshal(bodyBytes, &tokenResponse)
if err != nil {
return fmt.Errorf("Failed to unmarshal JSON: %v", err)
}
log.Printf("Refresh token '%s'", tokenResponse.RefreshToken)
setter := models.OauthTokenSetter{
AccessToken: omit.From(tokenResponse.AccessToken),
Expires: omit.From(futureUTCTimestamp(tokenResponse.ExpiresIn)),
RefreshToken: omit.From(tokenResponse.RefreshToken),
Username: omit.From(tokenResponse.Username),
}
err = user.InsertUserOauthTokens(ctx, PGInstance.BobDB, &setter)
if err != nil {
return fmt.Errorf("Failed to save token to database: %v", err)
}
return nil
}
func redirectURL() string {
return BaseURL + "/arcgis/oauth/callback"
}

View file

@ -0,0 +1,17 @@
// Code generated by BobGen psql v0.41.1. DO NOT EDIT.
// This file is meant to be re-generated in place and/or deleted at any time.
package dberrors
var OauthTokenErrors = &oauthTokenErrors{
ErrUniqueOauthTokenPkey: &UniqueConstraintError{
schema: "",
table: "oauth_token",
columns: []string{"id"},
s: "oauth_token_pkey",
},
}
type oauthTokenErrors struct {
ErrUniqueOauthTokenPkey *UniqueConstraintError
}

157
dbinfo/oauth_token.bob.go Normal file
View file

@ -0,0 +1,157 @@
// Code generated by BobGen psql v0.41.1. DO NOT EDIT.
// This file is meant to be re-generated in place and/or deleted at any time.
package dbinfo
import "github.com/aarondl/opt/null"
var OauthTokens = Table[
oauthTokenColumns,
oauthTokenIndexes,
oauthTokenForeignKeys,
oauthTokenUniques,
oauthTokenChecks,
]{
Schema: "",
Name: "oauth_token",
Columns: oauthTokenColumns{
ID: column{
Name: "id",
DBType: "integer",
Default: "nextval('oauth_token_id_seq'::regclass)",
Comment: "",
Nullable: false,
Generated: false,
AutoIncr: false,
},
AccessToken: column{
Name: "access_token",
DBType: "text",
Default: "",
Comment: "",
Nullable: false,
Generated: false,
AutoIncr: false,
},
Expires: column{
Name: "expires",
DBType: "timestamp without time zone",
Default: "",
Comment: "",
Nullable: false,
Generated: false,
AutoIncr: false,
},
RefreshToken: column{
Name: "refresh_token",
DBType: "text",
Default: "",
Comment: "",
Nullable: false,
Generated: false,
AutoIncr: false,
},
Username: column{
Name: "username",
DBType: "text",
Default: "",
Comment: "",
Nullable: false,
Generated: false,
AutoIncr: false,
},
UserID: column{
Name: "user_id",
DBType: "integer",
Default: "",
Comment: "",
Nullable: false,
Generated: false,
AutoIncr: false,
},
},
Indexes: oauthTokenIndexes{
OauthTokenPkey: index{
Type: "btree",
Name: "oauth_token_pkey",
Columns: []indexColumn{
{
Name: "id",
Desc: null.FromCond(false, true),
IsExpression: false,
},
},
Unique: true,
Comment: "",
NullsFirst: []bool{false},
NullsDistinct: false,
Where: "",
Include: []string{},
},
},
PrimaryKey: &constraint{
Name: "oauth_token_pkey",
Columns: []string{"id"},
Comment: "",
},
ForeignKeys: oauthTokenForeignKeys{
OauthTokenOauthTokenUserIDFkey: foreignKey{
constraint: constraint{
Name: "oauth_token.oauth_token_user_id_fkey",
Columns: []string{"user_id"},
Comment: "",
},
ForeignTable: "user_",
ForeignColumns: []string{"id"},
},
},
Comment: "",
}
type oauthTokenColumns struct {
ID column
AccessToken column
Expires column
RefreshToken column
Username column
UserID column
}
func (c oauthTokenColumns) AsSlice() []column {
return []column{
c.ID, c.AccessToken, c.Expires, c.RefreshToken, c.Username, c.UserID,
}
}
type oauthTokenIndexes struct {
OauthTokenPkey index
}
func (i oauthTokenIndexes) AsSlice() []index {
return []index{
i.OauthTokenPkey,
}
}
type oauthTokenForeignKeys struct {
OauthTokenOauthTokenUserIDFkey foreignKey
}
func (f oauthTokenForeignKeys) AsSlice() []foreignKey {
return []foreignKey{
f.OauthTokenOauthTokenUserIDFkey,
}
}
type oauthTokenUniques struct{}
func (u oauthTokenUniques) AsSlice() []constraint {
return []constraint{}
}
type oauthTokenChecks struct{}
func (c oauthTokenChecks) AsSlice() []check {
return []check{}
}

View file

@ -10,6 +10,32 @@ import (
"github.com/go-chi/chi/v5"
"github.com/skip2/go-qrcode"
)
func getArcgisOauthBegin(w http.ResponseWriter, r *http.Request) {
expiration := 60
authURL := buildArcGISAuthURL(ClientID, redirectURL(), expiration)
http.Redirect(w, r, authURL, http.StatusFound)
}
func getArcgisOauthCallback(w http.ResponseWriter, r *http.Request) {
code := r.URL.Query().Get("code")
slog.Info("Handling oauth callback", slog.String("code", code))
if code == "" {
respondError(w, "Access code is empty", nil, http.StatusBadRequest)
return
}
user, err := getAuthenticatedUser(r)
if err != nil {
respondError(w, "You're not currently authenticated, which really shouldn't happen.", err, http.StatusUnauthorized)
return
}
err = handleOauthAccessCode(r.Context(), user, code)
if err != nil {
respondError(w, "Failed to handle access code", err, http.StatusInternalServerError)
return
}
http.Redirect(w, r, BaseURL+"/", http.StatusFound)
}
func getFavicon(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-type", "image/x-icon")

View file

@ -11,6 +11,10 @@ var (
// Relationship Contexts for goose_db_version
gooseDBVersionWithParentsCascadingCtx = newContextual[bool]("gooseDBVersionWithParentsCascading")
// Relationship Contexts for oauth_token
oauthTokenWithParentsCascadingCtx = newContextual[bool]("oauthTokenWithParentsCascading")
oauthTokenRelUserUserCtx = newContextual[bool]("oauth_token.user_.oauth_token.oauth_token_user_id_fkey")
// Relationship Contexts for organization
organizationWithParentsCascadingCtx = newContextual[bool]("organizationWithParentsCascading")
organizationRelUserCtx = newContextual[bool]("organization.user_.user_.user__organization_id_fkey")
@ -20,6 +24,7 @@ var (
// Relationship Contexts for user_
userWithParentsCascadingCtx = newContextual[bool]("userWithParentsCascading")
userRelUserOauthTokensCtx = newContextual[bool]("oauth_token.user_.oauth_token.oauth_token_user_id_fkey")
userRelOrganizationCtx = newContextual[bool]("organization.user_.user_.user__organization_id_fkey")
)

View file

@ -14,6 +14,7 @@ import (
type Factory struct {
baseGooseDBVersionMods GooseDBVersionModSlice
baseOauthTokenMods OauthTokenModSlice
baseOrganizationMods OrganizationModSlice
baseSessionMods SessionModSlice
baseUserMods UserModSlice
@ -50,6 +51,40 @@ func (f *Factory) FromExistingGooseDBVersion(m *models.GooseDBVersion) *GooseDBV
return o
}
func (f *Factory) NewOauthToken(mods ...OauthTokenMod) *OauthTokenTemplate {
return f.NewOauthTokenWithContext(context.Background(), mods...)
}
func (f *Factory) NewOauthTokenWithContext(ctx context.Context, mods ...OauthTokenMod) *OauthTokenTemplate {
o := &OauthTokenTemplate{f: f}
if f != nil {
f.baseOauthTokenMods.Apply(ctx, o)
}
OauthTokenModSlice(mods).Apply(ctx, o)
return o
}
func (f *Factory) FromExistingOauthToken(m *models.OauthToken) *OauthTokenTemplate {
o := &OauthTokenTemplate{f: f, alreadyPersisted: true}
o.ID = func() int32 { return m.ID }
o.AccessToken = func() string { return m.AccessToken }
o.Expires = func() time.Time { return m.Expires }
o.RefreshToken = func() string { return m.RefreshToken }
o.Username = func() string { return m.Username }
o.UserID = func() int32 { return m.UserID }
ctx := context.Background()
if m.R.UserUser != nil {
OauthTokenMods.WithExistingUserUser(m.R.UserUser).Apply(ctx, o)
}
return o
}
func (f *Factory) NewOrganization(mods ...OrganizationMod) *OrganizationTemplate {
return f.NewOrganizationWithContext(context.Background(), mods...)
}
@ -139,6 +174,9 @@ func (f *Factory) FromExistingUser(m *models.User) *UserTemplate {
o.PasswordHash = func() string { return m.PasswordHash }
ctx := context.Background()
if len(m.R.UserOauthTokens) > 0 {
UserMods.AddExistingUserOauthTokens(m.R.UserOauthTokens...).Apply(ctx, o)
}
if m.R.Organization != nil {
UserMods.WithExistingOrganization(m.R.Organization).Apply(ctx, o)
}
@ -154,6 +192,14 @@ func (f *Factory) AddBaseGooseDBVersionMod(mods ...GooseDBVersionMod) {
f.baseGooseDBVersionMods = append(f.baseGooseDBVersionMods, mods...)
}
func (f *Factory) ClearBaseOauthTokenMods() {
f.baseOauthTokenMods = nil
}
func (f *Factory) AddBaseOauthTokenMod(mods ...OauthTokenMod) {
f.baseOauthTokenMods = append(f.baseOauthTokenMods, mods...)
}
func (f *Factory) ClearBaseOrganizationMods() {
f.baseOrganizationMods = nil
}

View file

@ -32,6 +32,30 @@ func TestCreateGooseDBVersion(t *testing.T) {
}
}
func TestCreateOauthToken(t *testing.T) {
if testDB == nil {
t.Skip("skipping test, no DSN provided")
}
ctx, cancel := context.WithCancel(t.Context())
t.Cleanup(cancel)
tx, err := testDB.Begin(ctx)
if err != nil {
t.Fatalf("Error starting transaction: %v", err)
}
defer func() {
if err := tx.Rollback(ctx); err != nil {
t.Fatalf("Error rolling back transaction: %v", err)
}
}()
if _, err := New().NewOauthTokenWithContext(ctx).Create(ctx, tx); err != nil {
t.Fatalf("Error creating OauthToken: %v", err)
}
}
func TestCreateOrganization(t *testing.T) {
if testDB == nil {
t.Skip("skipping test, no DSN provided")

542
factory/oauth_token.bob.go Normal file
View file

@ -0,0 +1,542 @@
// Code generated by BobGen psql v0.41.1. DO NOT EDIT.
// This file is meant to be re-generated in place and/or deleted at any time.
package factory
import (
"context"
"testing"
"time"
models "github.com/Gleipnir-Technology/nidus-sync/models"
"github.com/aarondl/opt/omit"
"github.com/jaswdr/faker/v2"
"github.com/stephenafamo/bob"
)
type OauthTokenMod interface {
Apply(context.Context, *OauthTokenTemplate)
}
type OauthTokenModFunc func(context.Context, *OauthTokenTemplate)
func (f OauthTokenModFunc) Apply(ctx context.Context, n *OauthTokenTemplate) {
f(ctx, n)
}
type OauthTokenModSlice []OauthTokenMod
func (mods OauthTokenModSlice) Apply(ctx context.Context, n *OauthTokenTemplate) {
for _, f := range mods {
f.Apply(ctx, n)
}
}
// OauthTokenTemplate is an object representing the database table.
// all columns are optional and should be set by mods
type OauthTokenTemplate struct {
ID func() int32
AccessToken func() string
Expires func() time.Time
RefreshToken func() string
Username func() string
UserID func() int32
r oauthTokenR
f *Factory
alreadyPersisted bool
}
type oauthTokenR struct {
UserUser *oauthTokenRUserUserR
}
type oauthTokenRUserUserR struct {
o *UserTemplate
}
// Apply mods to the OauthTokenTemplate
func (o *OauthTokenTemplate) Apply(ctx context.Context, mods ...OauthTokenMod) {
for _, mod := range mods {
mod.Apply(ctx, o)
}
}
// setModelRels creates and sets the relationships on *models.OauthToken
// according to the relationships in the template. Nothing is inserted into the db
func (t OauthTokenTemplate) setModelRels(o *models.OauthToken) {
if t.r.UserUser != nil {
rel := t.r.UserUser.o.Build()
rel.R.UserOauthTokens = append(rel.R.UserOauthTokens, o)
o.UserID = rel.ID // h2
o.R.UserUser = rel
}
}
// BuildSetter returns an *models.OauthTokenSetter
// this does nothing with the relationship templates
func (o OauthTokenTemplate) BuildSetter() *models.OauthTokenSetter {
m := &models.OauthTokenSetter{}
if o.ID != nil {
val := o.ID()
m.ID = omit.From(val)
}
if o.AccessToken != nil {
val := o.AccessToken()
m.AccessToken = omit.From(val)
}
if o.Expires != nil {
val := o.Expires()
m.Expires = omit.From(val)
}
if o.RefreshToken != nil {
val := o.RefreshToken()
m.RefreshToken = omit.From(val)
}
if o.Username != nil {
val := o.Username()
m.Username = omit.From(val)
}
if o.UserID != nil {
val := o.UserID()
m.UserID = omit.From(val)
}
return m
}
// BuildManySetter returns an []*models.OauthTokenSetter
// this does nothing with the relationship templates
func (o OauthTokenTemplate) BuildManySetter(number int) []*models.OauthTokenSetter {
m := make([]*models.OauthTokenSetter, number)
for i := range m {
m[i] = o.BuildSetter()
}
return m
}
// Build returns an *models.OauthToken
// Related objects are also created and placed in the .R field
// NOTE: Objects are not inserted into the database. Use OauthTokenTemplate.Create
func (o OauthTokenTemplate) Build() *models.OauthToken {
m := &models.OauthToken{}
if o.ID != nil {
m.ID = o.ID()
}
if o.AccessToken != nil {
m.AccessToken = o.AccessToken()
}
if o.Expires != nil {
m.Expires = o.Expires()
}
if o.RefreshToken != nil {
m.RefreshToken = o.RefreshToken()
}
if o.Username != nil {
m.Username = o.Username()
}
if o.UserID != nil {
m.UserID = o.UserID()
}
o.setModelRels(m)
return m
}
// BuildMany returns an models.OauthTokenSlice
// Related objects are also created and placed in the .R field
// NOTE: Objects are not inserted into the database. Use OauthTokenTemplate.CreateMany
func (o OauthTokenTemplate) BuildMany(number int) models.OauthTokenSlice {
m := make(models.OauthTokenSlice, number)
for i := range m {
m[i] = o.Build()
}
return m
}
func ensureCreatableOauthToken(m *models.OauthTokenSetter) {
if !(m.AccessToken.IsValue()) {
val := random_string(nil)
m.AccessToken = omit.From(val)
}
if !(m.Expires.IsValue()) {
val := random_time_Time(nil)
m.Expires = omit.From(val)
}
if !(m.RefreshToken.IsValue()) {
val := random_string(nil)
m.RefreshToken = omit.From(val)
}
if !(m.Username.IsValue()) {
val := random_string(nil)
m.Username = omit.From(val)
}
if !(m.UserID.IsValue()) {
val := random_int32(nil)
m.UserID = omit.From(val)
}
}
// insertOptRels creates and inserts any optional the relationships on *models.OauthToken
// according to the relationships in the template.
// any required relationship should have already exist on the model
func (o *OauthTokenTemplate) insertOptRels(ctx context.Context, exec bob.Executor, m *models.OauthToken) error {
var err error
return err
}
// Create builds a oauthToken and inserts it into the database
// Relations objects are also inserted and placed in the .R field
func (o *OauthTokenTemplate) Create(ctx context.Context, exec bob.Executor) (*models.OauthToken, error) {
var err error
opt := o.BuildSetter()
ensureCreatableOauthToken(opt)
if o.r.UserUser == nil {
OauthTokenMods.WithNewUserUser().Apply(ctx, o)
}
var rel0 *models.User
if o.r.UserUser.o.alreadyPersisted {
rel0 = o.r.UserUser.o.Build()
} else {
rel0, err = o.r.UserUser.o.Create(ctx, exec)
if err != nil {
return nil, err
}
}
opt.UserID = omit.From(rel0.ID)
m, err := models.OauthTokens.Insert(opt).One(ctx, exec)
if err != nil {
return nil, err
}
m.R.UserUser = rel0
if err := o.insertOptRels(ctx, exec, m); err != nil {
return nil, err
}
return m, err
}
// MustCreate builds a oauthToken and inserts it into the database
// Relations objects are also inserted and placed in the .R field
// panics if an error occurs
func (o *OauthTokenTemplate) MustCreate(ctx context.Context, exec bob.Executor) *models.OauthToken {
m, err := o.Create(ctx, exec)
if err != nil {
panic(err)
}
return m
}
// CreateOrFail builds a oauthToken and inserts it into the database
// Relations objects are also inserted and placed in the .R field
// It calls `tb.Fatal(err)` on the test/benchmark if an error occurs
func (o *OauthTokenTemplate) CreateOrFail(ctx context.Context, tb testing.TB, exec bob.Executor) *models.OauthToken {
tb.Helper()
m, err := o.Create(ctx, exec)
if err != nil {
tb.Fatal(err)
return nil
}
return m
}
// CreateMany builds multiple oauthTokens and inserts them into the database
// Relations objects are also inserted and placed in the .R field
func (o OauthTokenTemplate) CreateMany(ctx context.Context, exec bob.Executor, number int) (models.OauthTokenSlice, error) {
var err error
m := make(models.OauthTokenSlice, number)
for i := range m {
m[i], err = o.Create(ctx, exec)
if err != nil {
return nil, err
}
}
return m, nil
}
// MustCreateMany builds multiple oauthTokens and inserts them into the database
// Relations objects are also inserted and placed in the .R field
// panics if an error occurs
func (o OauthTokenTemplate) MustCreateMany(ctx context.Context, exec bob.Executor, number int) models.OauthTokenSlice {
m, err := o.CreateMany(ctx, exec, number)
if err != nil {
panic(err)
}
return m
}
// CreateManyOrFail builds multiple oauthTokens and inserts them into the database
// Relations objects are also inserted and placed in the .R field
// It calls `tb.Fatal(err)` on the test/benchmark if an error occurs
func (o OauthTokenTemplate) CreateManyOrFail(ctx context.Context, tb testing.TB, exec bob.Executor, number int) models.OauthTokenSlice {
tb.Helper()
m, err := o.CreateMany(ctx, exec, number)
if err != nil {
tb.Fatal(err)
return nil
}
return m
}
// OauthToken has methods that act as mods for the OauthTokenTemplate
var OauthTokenMods oauthTokenMods
type oauthTokenMods struct{}
func (m oauthTokenMods) RandomizeAllColumns(f *faker.Faker) OauthTokenMod {
return OauthTokenModSlice{
OauthTokenMods.RandomID(f),
OauthTokenMods.RandomAccessToken(f),
OauthTokenMods.RandomExpires(f),
OauthTokenMods.RandomRefreshToken(f),
OauthTokenMods.RandomUsername(f),
OauthTokenMods.RandomUserID(f),
}
}
// Set the model columns to this value
func (m oauthTokenMods) ID(val int32) OauthTokenMod {
return OauthTokenModFunc(func(_ context.Context, o *OauthTokenTemplate) {
o.ID = func() int32 { return val }
})
}
// Set the Column from the function
func (m oauthTokenMods) IDFunc(f func() int32) OauthTokenMod {
return OauthTokenModFunc(func(_ context.Context, o *OauthTokenTemplate) {
o.ID = f
})
}
// Clear any values for the column
func (m oauthTokenMods) UnsetID() OauthTokenMod {
return OauthTokenModFunc(func(_ context.Context, o *OauthTokenTemplate) {
o.ID = nil
})
}
// Generates a random value for the column using the given faker
// if faker is nil, a default faker is used
func (m oauthTokenMods) RandomID(f *faker.Faker) OauthTokenMod {
return OauthTokenModFunc(func(_ context.Context, o *OauthTokenTemplate) {
o.ID = func() int32 {
return random_int32(f)
}
})
}
// Set the model columns to this value
func (m oauthTokenMods) AccessToken(val string) OauthTokenMod {
return OauthTokenModFunc(func(_ context.Context, o *OauthTokenTemplate) {
o.AccessToken = func() string { return val }
})
}
// Set the Column from the function
func (m oauthTokenMods) AccessTokenFunc(f func() string) OauthTokenMod {
return OauthTokenModFunc(func(_ context.Context, o *OauthTokenTemplate) {
o.AccessToken = f
})
}
// Clear any values for the column
func (m oauthTokenMods) UnsetAccessToken() OauthTokenMod {
return OauthTokenModFunc(func(_ context.Context, o *OauthTokenTemplate) {
o.AccessToken = nil
})
}
// Generates a random value for the column using the given faker
// if faker is nil, a default faker is used
func (m oauthTokenMods) RandomAccessToken(f *faker.Faker) OauthTokenMod {
return OauthTokenModFunc(func(_ context.Context, o *OauthTokenTemplate) {
o.AccessToken = func() string {
return random_string(f)
}
})
}
// Set the model columns to this value
func (m oauthTokenMods) Expires(val time.Time) OauthTokenMod {
return OauthTokenModFunc(func(_ context.Context, o *OauthTokenTemplate) {
o.Expires = func() time.Time { return val }
})
}
// Set the Column from the function
func (m oauthTokenMods) ExpiresFunc(f func() time.Time) OauthTokenMod {
return OauthTokenModFunc(func(_ context.Context, o *OauthTokenTemplate) {
o.Expires = f
})
}
// Clear any values for the column
func (m oauthTokenMods) UnsetExpires() OauthTokenMod {
return OauthTokenModFunc(func(_ context.Context, o *OauthTokenTemplate) {
o.Expires = nil
})
}
// Generates a random value for the column using the given faker
// if faker is nil, a default faker is used
func (m oauthTokenMods) RandomExpires(f *faker.Faker) OauthTokenMod {
return OauthTokenModFunc(func(_ context.Context, o *OauthTokenTemplate) {
o.Expires = func() time.Time {
return random_time_Time(f)
}
})
}
// Set the model columns to this value
func (m oauthTokenMods) RefreshToken(val string) OauthTokenMod {
return OauthTokenModFunc(func(_ context.Context, o *OauthTokenTemplate) {
o.RefreshToken = func() string { return val }
})
}
// Set the Column from the function
func (m oauthTokenMods) RefreshTokenFunc(f func() string) OauthTokenMod {
return OauthTokenModFunc(func(_ context.Context, o *OauthTokenTemplate) {
o.RefreshToken = f
})
}
// Clear any values for the column
func (m oauthTokenMods) UnsetRefreshToken() OauthTokenMod {
return OauthTokenModFunc(func(_ context.Context, o *OauthTokenTemplate) {
o.RefreshToken = nil
})
}
// Generates a random value for the column using the given faker
// if faker is nil, a default faker is used
func (m oauthTokenMods) RandomRefreshToken(f *faker.Faker) OauthTokenMod {
return OauthTokenModFunc(func(_ context.Context, o *OauthTokenTemplate) {
o.RefreshToken = func() string {
return random_string(f)
}
})
}
// Set the model columns to this value
func (m oauthTokenMods) Username(val string) OauthTokenMod {
return OauthTokenModFunc(func(_ context.Context, o *OauthTokenTemplate) {
o.Username = func() string { return val }
})
}
// Set the Column from the function
func (m oauthTokenMods) UsernameFunc(f func() string) OauthTokenMod {
return OauthTokenModFunc(func(_ context.Context, o *OauthTokenTemplate) {
o.Username = f
})
}
// Clear any values for the column
func (m oauthTokenMods) UnsetUsername() OauthTokenMod {
return OauthTokenModFunc(func(_ context.Context, o *OauthTokenTemplate) {
o.Username = nil
})
}
// Generates a random value for the column using the given faker
// if faker is nil, a default faker is used
func (m oauthTokenMods) RandomUsername(f *faker.Faker) OauthTokenMod {
return OauthTokenModFunc(func(_ context.Context, o *OauthTokenTemplate) {
o.Username = func() string {
return random_string(f)
}
})
}
// Set the model columns to this value
func (m oauthTokenMods) UserID(val int32) OauthTokenMod {
return OauthTokenModFunc(func(_ context.Context, o *OauthTokenTemplate) {
o.UserID = func() int32 { return val }
})
}
// Set the Column from the function
func (m oauthTokenMods) UserIDFunc(f func() int32) OauthTokenMod {
return OauthTokenModFunc(func(_ context.Context, o *OauthTokenTemplate) {
o.UserID = f
})
}
// Clear any values for the column
func (m oauthTokenMods) UnsetUserID() OauthTokenMod {
return OauthTokenModFunc(func(_ context.Context, o *OauthTokenTemplate) {
o.UserID = nil
})
}
// Generates a random value for the column using the given faker
// if faker is nil, a default faker is used
func (m oauthTokenMods) RandomUserID(f *faker.Faker) OauthTokenMod {
return OauthTokenModFunc(func(_ context.Context, o *OauthTokenTemplate) {
o.UserID = func() int32 {
return random_int32(f)
}
})
}
func (m oauthTokenMods) WithParentsCascading() OauthTokenMod {
return OauthTokenModFunc(func(ctx context.Context, o *OauthTokenTemplate) {
if isDone, _ := oauthTokenWithParentsCascadingCtx.Value(ctx); isDone {
return
}
ctx = oauthTokenWithParentsCascadingCtx.WithValue(ctx, true)
{
related := o.f.NewUserWithContext(ctx, UserMods.WithParentsCascading())
m.WithUserUser(related).Apply(ctx, o)
}
})
}
func (m oauthTokenMods) WithUserUser(rel *UserTemplate) OauthTokenMod {
return OauthTokenModFunc(func(ctx context.Context, o *OauthTokenTemplate) {
o.r.UserUser = &oauthTokenRUserUserR{
o: rel,
}
})
}
func (m oauthTokenMods) WithNewUserUser(mods ...UserMod) OauthTokenMod {
return OauthTokenModFunc(func(ctx context.Context, o *OauthTokenTemplate) {
related := o.f.NewUserWithContext(ctx, mods...)
m.WithUserUser(related).Apply(ctx, o)
})
}
func (m oauthTokenMods) WithExistingUserUser(em *models.User) OauthTokenMod {
return OauthTokenModFunc(func(ctx context.Context, o *OauthTokenTemplate) {
o.r.UserUser = &oauthTokenRUserUserR{
o: o.f.FromExistingUser(em),
}
})
}
func (m oauthTokenMods) WithoutUserUser() OauthTokenMod {
return OauthTokenModFunc(func(ctx context.Context, o *OauthTokenTemplate) {
o.r.UserUser = nil
})
}

View file

@ -58,9 +58,14 @@ type UserTemplate struct {
}
type userR struct {
Organization *userROrganizationR
UserOauthTokens []*userRUserOauthTokensR
Organization *userROrganizationR
}
type userRUserOauthTokensR struct {
number int
o *OauthTokenTemplate
}
type userROrganizationR struct {
o *OrganizationTemplate
}
@ -75,6 +80,19 @@ func (o *UserTemplate) Apply(ctx context.Context, mods ...UserMod) {
// setModelRels creates and sets the relationships on *models.User
// according to the relationships in the template. Nothing is inserted into the db
func (t UserTemplate) setModelRels(o *models.User) {
if t.r.UserOauthTokens != nil {
rel := models.OauthTokenSlice{}
for _, r := range t.r.UserOauthTokens {
related := r.o.BuildMany(r.number)
for _, rel := range related {
rel.UserID = o.ID // h2
rel.R.UserUser = o
}
rel = append(rel, related...)
}
o.R.UserOauthTokens = rel
}
if t.r.Organization != nil {
rel := t.r.Organization.o.Build()
rel.R.User = append(rel.R.User, o)
@ -238,18 +256,38 @@ func ensureCreatableUser(m *models.UserSetter) {
func (o *UserTemplate) insertOptRels(ctx context.Context, exec bob.Executor, m *models.User) error {
var err error
isUserOauthTokensDone, _ := userRelUserOauthTokensCtx.Value(ctx)
if !isUserOauthTokensDone && o.r.UserOauthTokens != nil {
ctx = userRelUserOauthTokensCtx.WithValue(ctx, true)
for _, r := range o.r.UserOauthTokens {
if r.o.alreadyPersisted {
m.R.UserOauthTokens = append(m.R.UserOauthTokens, r.o.Build())
} else {
rel0, err := r.o.CreateMany(ctx, exec, r.number)
if err != nil {
return err
}
err = m.AttachUserOauthTokens(ctx, exec, rel0...)
if err != nil {
return err
}
}
}
}
isOrganizationDone, _ := userRelOrganizationCtx.Value(ctx)
if !isOrganizationDone && o.r.Organization != nil {
ctx = userRelOrganizationCtx.WithValue(ctx, true)
if o.r.Organization.o.alreadyPersisted {
m.R.Organization = o.r.Organization.o.Build()
} else {
var rel0 *models.Organization
rel0, err = o.r.Organization.o.Create(ctx, exec)
var rel1 *models.Organization
rel1, err = o.r.Organization.o.Create(ctx, exec)
if err != nil {
return err
}
err = m.AttachOrganization(ctx, exec, rel0)
err = m.AttachOrganization(ctx, exec, rel1)
if err != nil {
return err
}
@ -933,3 +971,51 @@ func (m userMods) WithoutOrganization() UserMod {
o.r.Organization = nil
})
}
func (m userMods) WithUserOauthTokens(number int, related *OauthTokenTemplate) UserMod {
return UserModFunc(func(ctx context.Context, o *UserTemplate) {
o.r.UserOauthTokens = []*userRUserOauthTokensR{{
number: number,
o: related,
}}
})
}
func (m userMods) WithNewUserOauthTokens(number int, mods ...OauthTokenMod) UserMod {
return UserModFunc(func(ctx context.Context, o *UserTemplate) {
related := o.f.NewOauthTokenWithContext(ctx, mods...)
m.WithUserOauthTokens(number, related).Apply(ctx, o)
})
}
func (m userMods) AddUserOauthTokens(number int, related *OauthTokenTemplate) UserMod {
return UserModFunc(func(ctx context.Context, o *UserTemplate) {
o.r.UserOauthTokens = append(o.r.UserOauthTokens, &userRUserOauthTokensR{
number: number,
o: related,
})
})
}
func (m userMods) AddNewUserOauthTokens(number int, mods ...OauthTokenMod) UserMod {
return UserModFunc(func(ctx context.Context, o *UserTemplate) {
related := o.f.NewOauthTokenWithContext(ctx, mods...)
m.AddUserOauthTokens(number, related).Apply(ctx, o)
})
}
func (m userMods) AddExistingUserOauthTokens(existingModels ...*models.OauthToken) UserMod {
return UserModFunc(func(ctx context.Context, o *UserTemplate) {
for _, em := range existingModels {
o.r.UserOauthTokens = append(o.r.UserOauthTokens, &userRUserOauthTokensR{
o: o.f.FromExistingOauthToken(em),
})
}
})
}
func (m userMods) WithoutUserOauthTokens() UserMod {
return UserModFunc(func(ctx context.Context, o *UserTemplate) {
o.r.UserOauthTokens = nil
})
}

View file

@ -58,6 +58,8 @@ func main() {
r.Use(sessionManager.LoadAndSave)
r.Get("/", getRoot)
r.Get("/arcgis/oauth/begin", getArcgisOauthBegin)
r.Get("/arcgis/oauth/callback", getArcgisOauthCallback)
r.Get("/qr-code/report/{code}", getQRCodeReport)
r.Get("/report", getReport)
r.Get("/report/{code}", getReportDetail)

View file

@ -0,0 +1,12 @@
-- +goose Up
CREATE TABLE oauth_token (
id SERIAL PRIMARY KEY,
access_token TEXT NOT NULL,
expires TIMESTAMP NOT NULL,
refresh_token TEXT NOT NULL,
username TEXT NOT NULL,
user_id INTEGER REFERENCES user_ (id) NOT NULL
);
-- +goose Down
DROP TABLE oauth_token;

View file

@ -32,6 +32,7 @@ func (j joinSet[Q]) AliasedAs(alias string) joinSet[Q] {
}
type joins[Q dialect.Joinable] struct {
OauthTokens joinSet[oauthTokenJoins[Q]]
Organizations joinSet[organizationJoins[Q]]
Users joinSet[userJoins[Q]]
}
@ -46,6 +47,7 @@ func buildJoinSet[Q interface{ aliasedAs(string) Q }, C any, F func(C, string) Q
func getJoins[Q dialect.Joinable]() joins[Q] {
return joins[Q]{
OauthTokens: buildJoinSet[oauthTokenJoins[Q]](OauthTokens.Columns, buildOauthTokenJoins),
Organizations: buildJoinSet[organizationJoins[Q]](Organizations.Columns, buildOrganizationJoins),
Users: buildJoinSet[userJoins[Q]](Users.Columns, buildUserJoins),
}

View file

@ -17,12 +17,14 @@ import (
var Preload = getPreloaders()
type preloaders struct {
OauthToken oauthTokenPreloader
Organization organizationPreloader
User userPreloader
}
func getPreloaders() preloaders {
return preloaders{
OauthToken: buildOauthTokenPreloader(),
Organization: buildOrganizationPreloader(),
User: buildUserPreloader(),
}
@ -35,12 +37,14 @@ var (
)
type thenLoaders[Q orm.Loadable] struct {
OauthToken oauthTokenThenLoader[Q]
Organization organizationThenLoader[Q]
User userThenLoader[Q]
}
func getThenLoaders[Q orm.Loadable]() thenLoaders[Q] {
return thenLoaders[Q]{
OauthToken: buildOauthTokenThenLoader[Q](),
Organization: buildOrganizationThenLoader[Q](),
User: buildUserThenLoader[Q](),
}

View file

@ -17,6 +17,9 @@ var testDB bob.Transactor[bob.Tx]
// Make sure the type GooseDBVersion runs hooks after queries
var _ bob.HookableType = &GooseDBVersion{}
// Make sure the type OauthToken runs hooks after queries
var _ bob.HookableType = &OauthToken{}
// Make sure the type Organization runs hooks after queries
var _ bob.HookableType = &Organization{}

View file

@ -18,17 +18,20 @@ var (
func Where[Q psql.Filterable]() struct {
GooseDBVersions gooseDBVersionWhere[Q]
OauthTokens oauthTokenWhere[Q]
Organizations organizationWhere[Q]
Sessions sessionWhere[Q]
Users userWhere[Q]
} {
return struct {
GooseDBVersions gooseDBVersionWhere[Q]
OauthTokens oauthTokenWhere[Q]
Organizations organizationWhere[Q]
Sessions sessionWhere[Q]
Users userWhere[Q]
}{
GooseDBVersions: buildGooseDBVersionWhere[Q](GooseDBVersions.Columns),
OauthTokens: buildOauthTokenWhere[Q](OauthTokens.Columns),
Organizations: buildOrganizationWhere[Q](Organizations.Columns),
Sessions: buildSessionWhere[Q](Sessions.Columns),
Users: buildUserWhere[Q](Users.Columns),

703
models/oauth_token.bob.go Normal file
View file

@ -0,0 +1,703 @@
// Code generated by BobGen psql v0.41.1. DO NOT EDIT.
// This file is meant to be re-generated in place and/or deleted at any time.
package models
import (
"context"
"fmt"
"io"
"time"
"github.com/aarondl/opt/omit"
"github.com/stephenafamo/bob"
"github.com/stephenafamo/bob/dialect/psql"
"github.com/stephenafamo/bob/dialect/psql/dialect"
"github.com/stephenafamo/bob/dialect/psql/dm"
"github.com/stephenafamo/bob/dialect/psql/sm"
"github.com/stephenafamo/bob/dialect/psql/um"
"github.com/stephenafamo/bob/expr"
"github.com/stephenafamo/bob/mods"
"github.com/stephenafamo/bob/orm"
"github.com/stephenafamo/bob/types/pgtypes"
)
// OauthToken is an object representing the database table.
type OauthToken struct {
ID int32 `db:"id,pk" `
AccessToken string `db:"access_token" `
Expires time.Time `db:"expires" `
RefreshToken string `db:"refresh_token" `
Username string `db:"username" `
UserID int32 `db:"user_id" `
R oauthTokenR `db:"-" `
}
// OauthTokenSlice is an alias for a slice of pointers to OauthToken.
// This should almost always be used instead of []*OauthToken.
type OauthTokenSlice []*OauthToken
// OauthTokens contains methods to work with the oauth_token table
var OauthTokens = psql.NewTablex[*OauthToken, OauthTokenSlice, *OauthTokenSetter]("", "oauth_token", buildOauthTokenColumns("oauth_token"))
// OauthTokensQuery is a query on the oauth_token table
type OauthTokensQuery = *psql.ViewQuery[*OauthToken, OauthTokenSlice]
// oauthTokenR is where relationships are stored.
type oauthTokenR struct {
UserUser *User // oauth_token.oauth_token_user_id_fkey
}
func buildOauthTokenColumns(alias string) oauthTokenColumns {
return oauthTokenColumns{
ColumnsExpr: expr.NewColumnsExpr(
"id", "access_token", "expires", "refresh_token", "username", "user_id",
).WithParent("oauth_token"),
tableAlias: alias,
ID: psql.Quote(alias, "id"),
AccessToken: psql.Quote(alias, "access_token"),
Expires: psql.Quote(alias, "expires"),
RefreshToken: psql.Quote(alias, "refresh_token"),
Username: psql.Quote(alias, "username"),
UserID: psql.Quote(alias, "user_id"),
}
}
type oauthTokenColumns struct {
expr.ColumnsExpr
tableAlias string
ID psql.Expression
AccessToken psql.Expression
Expires psql.Expression
RefreshToken psql.Expression
Username psql.Expression
UserID psql.Expression
}
func (c oauthTokenColumns) Alias() string {
return c.tableAlias
}
func (oauthTokenColumns) AliasedAs(alias string) oauthTokenColumns {
return buildOauthTokenColumns(alias)
}
// OauthTokenSetter is used for insert/upsert/update operations
// All values are optional, and do not have to be set
// Generated columns are not included
type OauthTokenSetter struct {
ID omit.Val[int32] `db:"id,pk" `
AccessToken omit.Val[string] `db:"access_token" `
Expires omit.Val[time.Time] `db:"expires" `
RefreshToken omit.Val[string] `db:"refresh_token" `
Username omit.Val[string] `db:"username" `
UserID omit.Val[int32] `db:"user_id" `
}
func (s OauthTokenSetter) SetColumns() []string {
vals := make([]string, 0, 6)
if s.ID.IsValue() {
vals = append(vals, "id")
}
if s.AccessToken.IsValue() {
vals = append(vals, "access_token")
}
if s.Expires.IsValue() {
vals = append(vals, "expires")
}
if s.RefreshToken.IsValue() {
vals = append(vals, "refresh_token")
}
if s.Username.IsValue() {
vals = append(vals, "username")
}
if s.UserID.IsValue() {
vals = append(vals, "user_id")
}
return vals
}
func (s OauthTokenSetter) Overwrite(t *OauthToken) {
if s.ID.IsValue() {
t.ID = s.ID.MustGet()
}
if s.AccessToken.IsValue() {
t.AccessToken = s.AccessToken.MustGet()
}
if s.Expires.IsValue() {
t.Expires = s.Expires.MustGet()
}
if s.RefreshToken.IsValue() {
t.RefreshToken = s.RefreshToken.MustGet()
}
if s.Username.IsValue() {
t.Username = s.Username.MustGet()
}
if s.UserID.IsValue() {
t.UserID = s.UserID.MustGet()
}
}
func (s *OauthTokenSetter) Apply(q *dialect.InsertQuery) {
q.AppendHooks(func(ctx context.Context, exec bob.Executor) (context.Context, error) {
return OauthTokens.BeforeInsertHooks.RunHooks(ctx, exec, s)
})
q.AppendValues(bob.ExpressionFunc(func(ctx context.Context, w io.Writer, d bob.Dialect, start int) ([]any, error) {
vals := make([]bob.Expression, 6)
if s.ID.IsValue() {
vals[0] = psql.Arg(s.ID.MustGet())
} else {
vals[0] = psql.Raw("DEFAULT")
}
if s.AccessToken.IsValue() {
vals[1] = psql.Arg(s.AccessToken.MustGet())
} else {
vals[1] = psql.Raw("DEFAULT")
}
if s.Expires.IsValue() {
vals[2] = psql.Arg(s.Expires.MustGet())
} else {
vals[2] = psql.Raw("DEFAULT")
}
if s.RefreshToken.IsValue() {
vals[3] = psql.Arg(s.RefreshToken.MustGet())
} else {
vals[3] = psql.Raw("DEFAULT")
}
if s.Username.IsValue() {
vals[4] = psql.Arg(s.Username.MustGet())
} else {
vals[4] = psql.Raw("DEFAULT")
}
if s.UserID.IsValue() {
vals[5] = psql.Arg(s.UserID.MustGet())
} else {
vals[5] = psql.Raw("DEFAULT")
}
return bob.ExpressSlice(ctx, w, d, start, vals, "", ", ", "")
}))
}
func (s OauthTokenSetter) UpdateMod() bob.Mod[*dialect.UpdateQuery] {
return um.Set(s.Expressions()...)
}
func (s OauthTokenSetter) Expressions(prefix ...string) []bob.Expression {
exprs := make([]bob.Expression, 0, 6)
if s.ID.IsValue() {
exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{
psql.Quote(append(prefix, "id")...),
psql.Arg(s.ID),
}})
}
if s.AccessToken.IsValue() {
exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{
psql.Quote(append(prefix, "access_token")...),
psql.Arg(s.AccessToken),
}})
}
if s.Expires.IsValue() {
exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{
psql.Quote(append(prefix, "expires")...),
psql.Arg(s.Expires),
}})
}
if s.RefreshToken.IsValue() {
exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{
psql.Quote(append(prefix, "refresh_token")...),
psql.Arg(s.RefreshToken),
}})
}
if s.Username.IsValue() {
exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{
psql.Quote(append(prefix, "username")...),
psql.Arg(s.Username),
}})
}
if s.UserID.IsValue() {
exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{
psql.Quote(append(prefix, "user_id")...),
psql.Arg(s.UserID),
}})
}
return exprs
}
// FindOauthToken retrieves a single record by primary key
// If cols is empty Find will return all columns.
func FindOauthToken(ctx context.Context, exec bob.Executor, IDPK int32, cols ...string) (*OauthToken, error) {
if len(cols) == 0 {
return OauthTokens.Query(
sm.Where(OauthTokens.Columns.ID.EQ(psql.Arg(IDPK))),
).One(ctx, exec)
}
return OauthTokens.Query(
sm.Where(OauthTokens.Columns.ID.EQ(psql.Arg(IDPK))),
sm.Columns(OauthTokens.Columns.Only(cols...)),
).One(ctx, exec)
}
// OauthTokenExists checks the presence of a single record by primary key
func OauthTokenExists(ctx context.Context, exec bob.Executor, IDPK int32) (bool, error) {
return OauthTokens.Query(
sm.Where(OauthTokens.Columns.ID.EQ(psql.Arg(IDPK))),
).Exists(ctx, exec)
}
// AfterQueryHook is called after OauthToken is retrieved from the database
func (o *OauthToken) AfterQueryHook(ctx context.Context, exec bob.Executor, queryType bob.QueryType) error {
var err error
switch queryType {
case bob.QueryTypeSelect:
ctx, err = OauthTokens.AfterSelectHooks.RunHooks(ctx, exec, OauthTokenSlice{o})
case bob.QueryTypeInsert:
ctx, err = OauthTokens.AfterInsertHooks.RunHooks(ctx, exec, OauthTokenSlice{o})
case bob.QueryTypeUpdate:
ctx, err = OauthTokens.AfterUpdateHooks.RunHooks(ctx, exec, OauthTokenSlice{o})
case bob.QueryTypeDelete:
ctx, err = OauthTokens.AfterDeleteHooks.RunHooks(ctx, exec, OauthTokenSlice{o})
}
return err
}
// primaryKeyVals returns the primary key values of the OauthToken
func (o *OauthToken) primaryKeyVals() bob.Expression {
return psql.Arg(o.ID)
}
func (o *OauthToken) pkEQ() dialect.Expression {
return psql.Quote("oauth_token", "id").EQ(bob.ExpressionFunc(func(ctx context.Context, w io.Writer, d bob.Dialect, start int) ([]any, error) {
return o.primaryKeyVals().WriteSQL(ctx, w, d, start)
}))
}
// Update uses an executor to update the OauthToken
func (o *OauthToken) Update(ctx context.Context, exec bob.Executor, s *OauthTokenSetter) error {
v, err := OauthTokens.Update(s.UpdateMod(), um.Where(o.pkEQ())).One(ctx, exec)
if err != nil {
return err
}
o.R = v.R
*o = *v
return nil
}
// Delete deletes a single OauthToken record with an executor
func (o *OauthToken) Delete(ctx context.Context, exec bob.Executor) error {
_, err := OauthTokens.Delete(dm.Where(o.pkEQ())).Exec(ctx, exec)
return err
}
// Reload refreshes the OauthToken using the executor
func (o *OauthToken) Reload(ctx context.Context, exec bob.Executor) error {
o2, err := OauthTokens.Query(
sm.Where(OauthTokens.Columns.ID.EQ(psql.Arg(o.ID))),
).One(ctx, exec)
if err != nil {
return err
}
o2.R = o.R
*o = *o2
return nil
}
// AfterQueryHook is called after OauthTokenSlice is retrieved from the database
func (o OauthTokenSlice) AfterQueryHook(ctx context.Context, exec bob.Executor, queryType bob.QueryType) error {
var err error
switch queryType {
case bob.QueryTypeSelect:
ctx, err = OauthTokens.AfterSelectHooks.RunHooks(ctx, exec, o)
case bob.QueryTypeInsert:
ctx, err = OauthTokens.AfterInsertHooks.RunHooks(ctx, exec, o)
case bob.QueryTypeUpdate:
ctx, err = OauthTokens.AfterUpdateHooks.RunHooks(ctx, exec, o)
case bob.QueryTypeDelete:
ctx, err = OauthTokens.AfterDeleteHooks.RunHooks(ctx, exec, o)
}
return err
}
func (o OauthTokenSlice) pkIN() dialect.Expression {
if len(o) == 0 {
return psql.Raw("NULL")
}
return psql.Quote("oauth_token", "id").In(bob.ExpressionFunc(func(ctx context.Context, w io.Writer, d bob.Dialect, start int) ([]any, error) {
pkPairs := make([]bob.Expression, len(o))
for i, row := range o {
pkPairs[i] = row.primaryKeyVals()
}
return bob.ExpressSlice(ctx, w, d, start, pkPairs, "", ", ", "")
}))
}
// copyMatchingRows finds models in the given slice that have the same primary key
// then it first copies the existing relationships from the old model to the new model
// and then replaces the old model in the slice with the new model
func (o OauthTokenSlice) copyMatchingRows(from ...*OauthToken) {
for i, old := range o {
for _, new := range from {
if new.ID != old.ID {
continue
}
new.R = old.R
o[i] = new
break
}
}
}
// UpdateMod modifies an update query with "WHERE primary_key IN (o...)"
func (o OauthTokenSlice) UpdateMod() bob.Mod[*dialect.UpdateQuery] {
return bob.ModFunc[*dialect.UpdateQuery](func(q *dialect.UpdateQuery) {
q.AppendHooks(func(ctx context.Context, exec bob.Executor) (context.Context, error) {
return OauthTokens.BeforeUpdateHooks.RunHooks(ctx, exec, o)
})
q.AppendLoader(bob.LoaderFunc(func(ctx context.Context, exec bob.Executor, retrieved any) error {
var err error
switch retrieved := retrieved.(type) {
case *OauthToken:
o.copyMatchingRows(retrieved)
case []*OauthToken:
o.copyMatchingRows(retrieved...)
case OauthTokenSlice:
o.copyMatchingRows(retrieved...)
default:
// If the retrieved value is not a OauthToken or a slice of OauthToken
// then run the AfterUpdateHooks on the slice
_, err = OauthTokens.AfterUpdateHooks.RunHooks(ctx, exec, o)
}
return err
}))
q.AppendWhere(o.pkIN())
})
}
// DeleteMod modifies an delete query with "WHERE primary_key IN (o...)"
func (o OauthTokenSlice) DeleteMod() bob.Mod[*dialect.DeleteQuery] {
return bob.ModFunc[*dialect.DeleteQuery](func(q *dialect.DeleteQuery) {
q.AppendHooks(func(ctx context.Context, exec bob.Executor) (context.Context, error) {
return OauthTokens.BeforeDeleteHooks.RunHooks(ctx, exec, o)
})
q.AppendLoader(bob.LoaderFunc(func(ctx context.Context, exec bob.Executor, retrieved any) error {
var err error
switch retrieved := retrieved.(type) {
case *OauthToken:
o.copyMatchingRows(retrieved)
case []*OauthToken:
o.copyMatchingRows(retrieved...)
case OauthTokenSlice:
o.copyMatchingRows(retrieved...)
default:
// If the retrieved value is not a OauthToken or a slice of OauthToken
// then run the AfterDeleteHooks on the slice
_, err = OauthTokens.AfterDeleteHooks.RunHooks(ctx, exec, o)
}
return err
}))
q.AppendWhere(o.pkIN())
})
}
func (o OauthTokenSlice) UpdateAll(ctx context.Context, exec bob.Executor, vals OauthTokenSetter) error {
if len(o) == 0 {
return nil
}
_, err := OauthTokens.Update(vals.UpdateMod(), o.UpdateMod()).All(ctx, exec)
return err
}
func (o OauthTokenSlice) DeleteAll(ctx context.Context, exec bob.Executor) error {
if len(o) == 0 {
return nil
}
_, err := OauthTokens.Delete(o.DeleteMod()).Exec(ctx, exec)
return err
}
func (o OauthTokenSlice) ReloadAll(ctx context.Context, exec bob.Executor) error {
if len(o) == 0 {
return nil
}
o2, err := OauthTokens.Query(sm.Where(o.pkIN())).All(ctx, exec)
if err != nil {
return err
}
o.copyMatchingRows(o2...)
return nil
}
// UserUser starts a query for related objects on user_
func (o *OauthToken) UserUser(mods ...bob.Mod[*dialect.SelectQuery]) UsersQuery {
return Users.Query(append(mods,
sm.Where(Users.Columns.ID.EQ(psql.Arg(o.UserID))),
)...)
}
func (os OauthTokenSlice) UserUser(mods ...bob.Mod[*dialect.SelectQuery]) UsersQuery {
pkUserID := make(pgtypes.Array[int32], 0, len(os))
for _, o := range os {
if o == nil {
continue
}
pkUserID = append(pkUserID, o.UserID)
}
PKArgExpr := psql.Select(sm.Columns(
psql.F("unnest", psql.Cast(psql.Arg(pkUserID), "integer[]")),
))
return Users.Query(append(mods,
sm.Where(psql.Group(Users.Columns.ID).OP("IN", PKArgExpr)),
)...)
}
func attachOauthTokenUserUser0(ctx context.Context, exec bob.Executor, count int, oauthToken0 *OauthToken, user1 *User) (*OauthToken, error) {
setter := &OauthTokenSetter{
UserID: omit.From(user1.ID),
}
err := oauthToken0.Update(ctx, exec, setter)
if err != nil {
return nil, fmt.Errorf("attachOauthTokenUserUser0: %w", err)
}
return oauthToken0, nil
}
func (oauthToken0 *OauthToken) InsertUserUser(ctx context.Context, exec bob.Executor, related *UserSetter) error {
var err error
user1, err := Users.Insert(related).One(ctx, exec)
if err != nil {
return fmt.Errorf("inserting related objects: %w", err)
}
_, err = attachOauthTokenUserUser0(ctx, exec, 1, oauthToken0, user1)
if err != nil {
return err
}
oauthToken0.R.UserUser = user1
user1.R.UserOauthTokens = append(user1.R.UserOauthTokens, oauthToken0)
return nil
}
func (oauthToken0 *OauthToken) AttachUserUser(ctx context.Context, exec bob.Executor, user1 *User) error {
var err error
_, err = attachOauthTokenUserUser0(ctx, exec, 1, oauthToken0, user1)
if err != nil {
return err
}
oauthToken0.R.UserUser = user1
user1.R.UserOauthTokens = append(user1.R.UserOauthTokens, oauthToken0)
return nil
}
type oauthTokenWhere[Q psql.Filterable] struct {
ID psql.WhereMod[Q, int32]
AccessToken psql.WhereMod[Q, string]
Expires psql.WhereMod[Q, time.Time]
RefreshToken psql.WhereMod[Q, string]
Username psql.WhereMod[Q, string]
UserID psql.WhereMod[Q, int32]
}
func (oauthTokenWhere[Q]) AliasedAs(alias string) oauthTokenWhere[Q] {
return buildOauthTokenWhere[Q](buildOauthTokenColumns(alias))
}
func buildOauthTokenWhere[Q psql.Filterable](cols oauthTokenColumns) oauthTokenWhere[Q] {
return oauthTokenWhere[Q]{
ID: psql.Where[Q, int32](cols.ID),
AccessToken: psql.Where[Q, string](cols.AccessToken),
Expires: psql.Where[Q, time.Time](cols.Expires),
RefreshToken: psql.Where[Q, string](cols.RefreshToken),
Username: psql.Where[Q, string](cols.Username),
UserID: psql.Where[Q, int32](cols.UserID),
}
}
func (o *OauthToken) Preload(name string, retrieved any) error {
if o == nil {
return nil
}
switch name {
case "UserUser":
rel, ok := retrieved.(*User)
if !ok {
return fmt.Errorf("oauthToken cannot load %T as %q", retrieved, name)
}
o.R.UserUser = rel
if rel != nil {
rel.R.UserOauthTokens = OauthTokenSlice{o}
}
return nil
default:
return fmt.Errorf("oauthToken has no relationship %q", name)
}
}
type oauthTokenPreloader struct {
UserUser func(...psql.PreloadOption) psql.Preloader
}
func buildOauthTokenPreloader() oauthTokenPreloader {
return oauthTokenPreloader{
UserUser: func(opts ...psql.PreloadOption) psql.Preloader {
return psql.Preload[*User, UserSlice](psql.PreloadRel{
Name: "UserUser",
Sides: []psql.PreloadSide{
{
From: OauthTokens,
To: Users,
FromColumns: []string{"user_id"},
ToColumns: []string{"id"},
},
},
}, Users.Columns.Names(), opts...)
},
}
}
type oauthTokenThenLoader[Q orm.Loadable] struct {
UserUser func(...bob.Mod[*dialect.SelectQuery]) orm.Loader[Q]
}
func buildOauthTokenThenLoader[Q orm.Loadable]() oauthTokenThenLoader[Q] {
type UserUserLoadInterface interface {
LoadUserUser(context.Context, bob.Executor, ...bob.Mod[*dialect.SelectQuery]) error
}
return oauthTokenThenLoader[Q]{
UserUser: thenLoadBuilder[Q](
"UserUser",
func(ctx context.Context, exec bob.Executor, retrieved UserUserLoadInterface, mods ...bob.Mod[*dialect.SelectQuery]) error {
return retrieved.LoadUserUser(ctx, exec, mods...)
},
),
}
}
// LoadUserUser loads the oauthToken's UserUser into the .R struct
func (o *OauthToken) LoadUserUser(ctx context.Context, exec bob.Executor, mods ...bob.Mod[*dialect.SelectQuery]) error {
if o == nil {
return nil
}
// Reset the relationship
o.R.UserUser = nil
related, err := o.UserUser(mods...).One(ctx, exec)
if err != nil {
return err
}
related.R.UserOauthTokens = OauthTokenSlice{o}
o.R.UserUser = related
return nil
}
// LoadUserUser loads the oauthToken's UserUser into the .R struct
func (os OauthTokenSlice) LoadUserUser(ctx context.Context, exec bob.Executor, mods ...bob.Mod[*dialect.SelectQuery]) error {
if len(os) == 0 {
return nil
}
users, err := os.UserUser(mods...).All(ctx, exec)
if err != nil {
return err
}
for _, o := range os {
if o == nil {
continue
}
for _, rel := range users {
if !(o.UserID == rel.ID) {
continue
}
rel.R.UserOauthTokens = append(rel.R.UserOauthTokens, o)
o.R.UserUser = rel
break
}
}
return nil
}
type oauthTokenJoins[Q dialect.Joinable] struct {
typ string
UserUser modAs[Q, userColumns]
}
func (j oauthTokenJoins[Q]) aliasedAs(alias string) oauthTokenJoins[Q] {
return buildOauthTokenJoins[Q](buildOauthTokenColumns(alias), j.typ)
}
func buildOauthTokenJoins[Q dialect.Joinable](cols oauthTokenColumns, typ string) oauthTokenJoins[Q] {
return oauthTokenJoins[Q]{
typ: typ,
UserUser: modAs[Q, userColumns]{
c: Users.Columns,
f: func(to userColumns) bob.Mod[Q] {
mods := make(mods.QueryMods[Q], 0, 1)
{
mods = append(mods, dialect.Join[Q](typ, Users.Name().As(to.Alias())).On(
to.ID.EQ(cols.UserID),
))
}
return mods
},
},
}
}

View file

@ -55,7 +55,8 @@ type UsersQuery = *psql.ViewQuery[*User, UserSlice]
// userR is where relationships are stored.
type userR struct {
Organization *Organization // user_.user__organization_id_fkey
UserOauthTokens OauthTokenSlice // oauth_token.oauth_token_user_id_fkey
Organization *Organization // user_.user__organization_id_fkey
}
func buildUserColumns(alias string) userColumns {
@ -602,6 +603,30 @@ func (o UserSlice) ReloadAll(ctx context.Context, exec bob.Executor) error {
return nil
}
// UserOauthTokens starts a query for related objects on oauth_token
func (o *User) UserOauthTokens(mods ...bob.Mod[*dialect.SelectQuery]) OauthTokensQuery {
return OauthTokens.Query(append(mods,
sm.Where(OauthTokens.Columns.UserID.EQ(psql.Arg(o.ID))),
)...)
}
func (os UserSlice) UserOauthTokens(mods ...bob.Mod[*dialect.SelectQuery]) OauthTokensQuery {
pkID := make(pgtypes.Array[int32], 0, len(os))
for _, o := range os {
if o == nil {
continue
}
pkID = append(pkID, o.ID)
}
PKArgExpr := psql.Select(sm.Columns(
psql.F("unnest", psql.Cast(psql.Arg(pkID), "integer[]")),
))
return OauthTokens.Query(append(mods,
sm.Where(psql.Group(OauthTokens.Columns.UserID).OP("IN", PKArgExpr)),
)...)
}
// Organization starts a query for related objects on organization
func (o *User) Organization(mods ...bob.Mod[*dialect.SelectQuery]) OrganizationsQuery {
return Organizations.Query(append(mods,
@ -626,6 +651,74 @@ func (os UserSlice) Organization(mods ...bob.Mod[*dialect.SelectQuery]) Organiza
)...)
}
func insertUserUserOauthTokens0(ctx context.Context, exec bob.Executor, oauthTokens1 []*OauthTokenSetter, user0 *User) (OauthTokenSlice, error) {
for i := range oauthTokens1 {
oauthTokens1[i].UserID = omit.From(user0.ID)
}
ret, err := OauthTokens.Insert(bob.ToMods(oauthTokens1...)).All(ctx, exec)
if err != nil {
return ret, fmt.Errorf("insertUserUserOauthTokens0: %w", err)
}
return ret, nil
}
func attachUserUserOauthTokens0(ctx context.Context, exec bob.Executor, count int, oauthTokens1 OauthTokenSlice, user0 *User) (OauthTokenSlice, error) {
setter := &OauthTokenSetter{
UserID: omit.From(user0.ID),
}
err := oauthTokens1.UpdateAll(ctx, exec, *setter)
if err != nil {
return nil, fmt.Errorf("attachUserUserOauthTokens0: %w", err)
}
return oauthTokens1, nil
}
func (user0 *User) InsertUserOauthTokens(ctx context.Context, exec bob.Executor, related ...*OauthTokenSetter) error {
if len(related) == 0 {
return nil
}
var err error
oauthTokens1, err := insertUserUserOauthTokens0(ctx, exec, related, user0)
if err != nil {
return err
}
user0.R.UserOauthTokens = append(user0.R.UserOauthTokens, oauthTokens1...)
for _, rel := range oauthTokens1 {
rel.R.UserUser = user0
}
return nil
}
func (user0 *User) AttachUserOauthTokens(ctx context.Context, exec bob.Executor, related ...*OauthToken) error {
if len(related) == 0 {
return nil
}
var err error
oauthTokens1 := OauthTokenSlice(related)
_, err = attachUserUserOauthTokens0(ctx, exec, len(related), oauthTokens1, user0)
if err != nil {
return err
}
user0.R.UserOauthTokens = append(user0.R.UserOauthTokens, oauthTokens1...)
for _, rel := range related {
rel.R.UserUser = user0
}
return nil
}
func attachUserOrganization0(ctx context.Context, exec bob.Executor, count int, user0 *User, organization1 *Organization) (*User, error) {
setter := &UserSetter{
OrganizationID: omitnull.From(organization1.ID),
@ -716,6 +809,20 @@ func (o *User) Preload(name string, retrieved any) error {
}
switch name {
case "UserOauthTokens":
rels, ok := retrieved.(OauthTokenSlice)
if !ok {
return fmt.Errorf("user cannot load %T as %q", retrieved, name)
}
o.R.UserOauthTokens = rels
for _, rel := range rels {
if rel != nil {
rel.R.UserUser = o
}
}
return nil
case "Organization":
rel, ok := retrieved.(*Organization)
if !ok {
@ -756,15 +863,25 @@ func buildUserPreloader() userPreloader {
}
type userThenLoader[Q orm.Loadable] struct {
Organization func(...bob.Mod[*dialect.SelectQuery]) orm.Loader[Q]
UserOauthTokens func(...bob.Mod[*dialect.SelectQuery]) orm.Loader[Q]
Organization func(...bob.Mod[*dialect.SelectQuery]) orm.Loader[Q]
}
func buildUserThenLoader[Q orm.Loadable]() userThenLoader[Q] {
type UserOauthTokensLoadInterface interface {
LoadUserOauthTokens(context.Context, bob.Executor, ...bob.Mod[*dialect.SelectQuery]) error
}
type OrganizationLoadInterface interface {
LoadOrganization(context.Context, bob.Executor, ...bob.Mod[*dialect.SelectQuery]) error
}
return userThenLoader[Q]{
UserOauthTokens: thenLoadBuilder[Q](
"UserOauthTokens",
func(ctx context.Context, exec bob.Executor, retrieved UserOauthTokensLoadInterface, mods ...bob.Mod[*dialect.SelectQuery]) error {
return retrieved.LoadUserOauthTokens(ctx, exec, mods...)
},
),
Organization: thenLoadBuilder[Q](
"Organization",
func(ctx context.Context, exec bob.Executor, retrieved OrganizationLoadInterface, mods ...bob.Mod[*dialect.SelectQuery]) error {
@ -774,6 +891,67 @@ func buildUserThenLoader[Q orm.Loadable]() userThenLoader[Q] {
}
}
// LoadUserOauthTokens loads the user's UserOauthTokens into the .R struct
func (o *User) LoadUserOauthTokens(ctx context.Context, exec bob.Executor, mods ...bob.Mod[*dialect.SelectQuery]) error {
if o == nil {
return nil
}
// Reset the relationship
o.R.UserOauthTokens = nil
related, err := o.UserOauthTokens(mods...).All(ctx, exec)
if err != nil {
return err
}
for _, rel := range related {
rel.R.UserUser = o
}
o.R.UserOauthTokens = related
return nil
}
// LoadUserOauthTokens loads the user's UserOauthTokens into the .R struct
func (os UserSlice) LoadUserOauthTokens(ctx context.Context, exec bob.Executor, mods ...bob.Mod[*dialect.SelectQuery]) error {
if len(os) == 0 {
return nil
}
oauthTokens, err := os.UserOauthTokens(mods...).All(ctx, exec)
if err != nil {
return err
}
for _, o := range os {
if o == nil {
continue
}
o.R.UserOauthTokens = nil
}
for _, o := range os {
if o == nil {
continue
}
for _, rel := range oauthTokens {
if !(o.ID == rel.UserID) {
continue
}
rel.R.UserUser = o
o.R.UserOauthTokens = append(o.R.UserOauthTokens, rel)
}
}
return nil
}
// LoadOrganization loads the user's Organization into the .R struct
func (o *User) LoadOrganization(ctx context.Context, exec bob.Executor, mods ...bob.Mod[*dialect.SelectQuery]) error {
if o == nil {
@ -830,8 +1008,9 @@ func (os UserSlice) LoadOrganization(ctx context.Context, exec bob.Executor, mod
}
type userJoins[Q dialect.Joinable] struct {
typ string
Organization modAs[Q, organizationColumns]
typ string
UserOauthTokens modAs[Q, oauthTokenColumns]
Organization modAs[Q, organizationColumns]
}
func (j userJoins[Q]) aliasedAs(alias string) userJoins[Q] {
@ -841,6 +1020,20 @@ func (j userJoins[Q]) aliasedAs(alias string) userJoins[Q] {
func buildUserJoins[Q dialect.Joinable](cols userColumns, typ string) userJoins[Q] {
return userJoins[Q]{
typ: typ,
UserOauthTokens: modAs[Q, oauthTokenColumns]{
c: OauthTokens.Columns,
f: func(to oauthTokenColumns) bob.Mod[Q] {
mods := make(mods.QueryMods[Q], 0, 1)
{
mods = append(mods, dialect.Join[Q](typ, OauthTokens.Name().As(to.Alias())).On(
to.UserID.EQ(cols.ID),
))
}
return mods
},
},
Organization: modAs[Q, organizationColumns]{
c: Organizations.Columns,
f: func(to organizationColumns) bob.Mod[Q] {

View file

@ -94,9 +94,9 @@
</ul>
<div class="text-center connect-btn">
<button type="button" class="btn btn-primary btn-lg">
<a href="/arcgis/oauth/begin" class="btn btn-primary btn-lg">
Connect to ArcGIS
</button>
</a>
<p class="mt-2 text-muted"><small>You can disconnect your account at any time in settings</small></p>
</div>
</div>