Save oauth tokens to the database for use later.

This commit is contained in:
Eli Ribble 2025-11-06 00:23:58 +00:00
parent 8cd11b350d
commit 858bc031a0
No known key found for this signature in database
18 changed files with 1957 additions and 10 deletions

View file

@ -32,6 +32,7 @@ func (j joinSet[Q]) AliasedAs(alias string) joinSet[Q] {
}
type joins[Q dialect.Joinable] struct {
OauthTokens joinSet[oauthTokenJoins[Q]]
Organizations joinSet[organizationJoins[Q]]
Users joinSet[userJoins[Q]]
}
@ -46,6 +47,7 @@ func buildJoinSet[Q interface{ aliasedAs(string) Q }, C any, F func(C, string) Q
func getJoins[Q dialect.Joinable]() joins[Q] {
return joins[Q]{
OauthTokens: buildJoinSet[oauthTokenJoins[Q]](OauthTokens.Columns, buildOauthTokenJoins),
Organizations: buildJoinSet[organizationJoins[Q]](Organizations.Columns, buildOrganizationJoins),
Users: buildJoinSet[userJoins[Q]](Users.Columns, buildUserJoins),
}

View file

@ -17,12 +17,14 @@ import (
var Preload = getPreloaders()
type preloaders struct {
OauthToken oauthTokenPreloader
Organization organizationPreloader
User userPreloader
}
func getPreloaders() preloaders {
return preloaders{
OauthToken: buildOauthTokenPreloader(),
Organization: buildOrganizationPreloader(),
User: buildUserPreloader(),
}
@ -35,12 +37,14 @@ var (
)
type thenLoaders[Q orm.Loadable] struct {
OauthToken oauthTokenThenLoader[Q]
Organization organizationThenLoader[Q]
User userThenLoader[Q]
}
func getThenLoaders[Q orm.Loadable]() thenLoaders[Q] {
return thenLoaders[Q]{
OauthToken: buildOauthTokenThenLoader[Q](),
Organization: buildOrganizationThenLoader[Q](),
User: buildUserThenLoader[Q](),
}

View file

@ -17,6 +17,9 @@ var testDB bob.Transactor[bob.Tx]
// Make sure the type GooseDBVersion runs hooks after queries
var _ bob.HookableType = &GooseDBVersion{}
// Make sure the type OauthToken runs hooks after queries
var _ bob.HookableType = &OauthToken{}
// Make sure the type Organization runs hooks after queries
var _ bob.HookableType = &Organization{}

View file

@ -18,17 +18,20 @@ var (
func Where[Q psql.Filterable]() struct {
GooseDBVersions gooseDBVersionWhere[Q]
OauthTokens oauthTokenWhere[Q]
Organizations organizationWhere[Q]
Sessions sessionWhere[Q]
Users userWhere[Q]
} {
return struct {
GooseDBVersions gooseDBVersionWhere[Q]
OauthTokens oauthTokenWhere[Q]
Organizations organizationWhere[Q]
Sessions sessionWhere[Q]
Users userWhere[Q]
}{
GooseDBVersions: buildGooseDBVersionWhere[Q](GooseDBVersions.Columns),
OauthTokens: buildOauthTokenWhere[Q](OauthTokens.Columns),
Organizations: buildOrganizationWhere[Q](Organizations.Columns),
Sessions: buildSessionWhere[Q](Sessions.Columns),
Users: buildUserWhere[Q](Users.Columns),

703
models/oauth_token.bob.go Normal file
View file

@ -0,0 +1,703 @@
// Code generated by BobGen psql v0.41.1. DO NOT EDIT.
// This file is meant to be re-generated in place and/or deleted at any time.
package models
import (
"context"
"fmt"
"io"
"time"
"github.com/aarondl/opt/omit"
"github.com/stephenafamo/bob"
"github.com/stephenafamo/bob/dialect/psql"
"github.com/stephenafamo/bob/dialect/psql/dialect"
"github.com/stephenafamo/bob/dialect/psql/dm"
"github.com/stephenafamo/bob/dialect/psql/sm"
"github.com/stephenafamo/bob/dialect/psql/um"
"github.com/stephenafamo/bob/expr"
"github.com/stephenafamo/bob/mods"
"github.com/stephenafamo/bob/orm"
"github.com/stephenafamo/bob/types/pgtypes"
)
// OauthToken is an object representing the database table.
type OauthToken struct {
ID int32 `db:"id,pk" `
AccessToken string `db:"access_token" `
Expires time.Time `db:"expires" `
RefreshToken string `db:"refresh_token" `
Username string `db:"username" `
UserID int32 `db:"user_id" `
R oauthTokenR `db:"-" `
}
// OauthTokenSlice is an alias for a slice of pointers to OauthToken.
// This should almost always be used instead of []*OauthToken.
type OauthTokenSlice []*OauthToken
// OauthTokens contains methods to work with the oauth_token table
var OauthTokens = psql.NewTablex[*OauthToken, OauthTokenSlice, *OauthTokenSetter]("", "oauth_token", buildOauthTokenColumns("oauth_token"))
// OauthTokensQuery is a query on the oauth_token table
type OauthTokensQuery = *psql.ViewQuery[*OauthToken, OauthTokenSlice]
// oauthTokenR is where relationships are stored.
type oauthTokenR struct {
UserUser *User // oauth_token.oauth_token_user_id_fkey
}
func buildOauthTokenColumns(alias string) oauthTokenColumns {
return oauthTokenColumns{
ColumnsExpr: expr.NewColumnsExpr(
"id", "access_token", "expires", "refresh_token", "username", "user_id",
).WithParent("oauth_token"),
tableAlias: alias,
ID: psql.Quote(alias, "id"),
AccessToken: psql.Quote(alias, "access_token"),
Expires: psql.Quote(alias, "expires"),
RefreshToken: psql.Quote(alias, "refresh_token"),
Username: psql.Quote(alias, "username"),
UserID: psql.Quote(alias, "user_id"),
}
}
type oauthTokenColumns struct {
expr.ColumnsExpr
tableAlias string
ID psql.Expression
AccessToken psql.Expression
Expires psql.Expression
RefreshToken psql.Expression
Username psql.Expression
UserID psql.Expression
}
func (c oauthTokenColumns) Alias() string {
return c.tableAlias
}
func (oauthTokenColumns) AliasedAs(alias string) oauthTokenColumns {
return buildOauthTokenColumns(alias)
}
// OauthTokenSetter is used for insert/upsert/update operations
// All values are optional, and do not have to be set
// Generated columns are not included
type OauthTokenSetter struct {
ID omit.Val[int32] `db:"id,pk" `
AccessToken omit.Val[string] `db:"access_token" `
Expires omit.Val[time.Time] `db:"expires" `
RefreshToken omit.Val[string] `db:"refresh_token" `
Username omit.Val[string] `db:"username" `
UserID omit.Val[int32] `db:"user_id" `
}
func (s OauthTokenSetter) SetColumns() []string {
vals := make([]string, 0, 6)
if s.ID.IsValue() {
vals = append(vals, "id")
}
if s.AccessToken.IsValue() {
vals = append(vals, "access_token")
}
if s.Expires.IsValue() {
vals = append(vals, "expires")
}
if s.RefreshToken.IsValue() {
vals = append(vals, "refresh_token")
}
if s.Username.IsValue() {
vals = append(vals, "username")
}
if s.UserID.IsValue() {
vals = append(vals, "user_id")
}
return vals
}
func (s OauthTokenSetter) Overwrite(t *OauthToken) {
if s.ID.IsValue() {
t.ID = s.ID.MustGet()
}
if s.AccessToken.IsValue() {
t.AccessToken = s.AccessToken.MustGet()
}
if s.Expires.IsValue() {
t.Expires = s.Expires.MustGet()
}
if s.RefreshToken.IsValue() {
t.RefreshToken = s.RefreshToken.MustGet()
}
if s.Username.IsValue() {
t.Username = s.Username.MustGet()
}
if s.UserID.IsValue() {
t.UserID = s.UserID.MustGet()
}
}
func (s *OauthTokenSetter) Apply(q *dialect.InsertQuery) {
q.AppendHooks(func(ctx context.Context, exec bob.Executor) (context.Context, error) {
return OauthTokens.BeforeInsertHooks.RunHooks(ctx, exec, s)
})
q.AppendValues(bob.ExpressionFunc(func(ctx context.Context, w io.Writer, d bob.Dialect, start int) ([]any, error) {
vals := make([]bob.Expression, 6)
if s.ID.IsValue() {
vals[0] = psql.Arg(s.ID.MustGet())
} else {
vals[0] = psql.Raw("DEFAULT")
}
if s.AccessToken.IsValue() {
vals[1] = psql.Arg(s.AccessToken.MustGet())
} else {
vals[1] = psql.Raw("DEFAULT")
}
if s.Expires.IsValue() {
vals[2] = psql.Arg(s.Expires.MustGet())
} else {
vals[2] = psql.Raw("DEFAULT")
}
if s.RefreshToken.IsValue() {
vals[3] = psql.Arg(s.RefreshToken.MustGet())
} else {
vals[3] = psql.Raw("DEFAULT")
}
if s.Username.IsValue() {
vals[4] = psql.Arg(s.Username.MustGet())
} else {
vals[4] = psql.Raw("DEFAULT")
}
if s.UserID.IsValue() {
vals[5] = psql.Arg(s.UserID.MustGet())
} else {
vals[5] = psql.Raw("DEFAULT")
}
return bob.ExpressSlice(ctx, w, d, start, vals, "", ", ", "")
}))
}
func (s OauthTokenSetter) UpdateMod() bob.Mod[*dialect.UpdateQuery] {
return um.Set(s.Expressions()...)
}
func (s OauthTokenSetter) Expressions(prefix ...string) []bob.Expression {
exprs := make([]bob.Expression, 0, 6)
if s.ID.IsValue() {
exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{
psql.Quote(append(prefix, "id")...),
psql.Arg(s.ID),
}})
}
if s.AccessToken.IsValue() {
exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{
psql.Quote(append(prefix, "access_token")...),
psql.Arg(s.AccessToken),
}})
}
if s.Expires.IsValue() {
exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{
psql.Quote(append(prefix, "expires")...),
psql.Arg(s.Expires),
}})
}
if s.RefreshToken.IsValue() {
exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{
psql.Quote(append(prefix, "refresh_token")...),
psql.Arg(s.RefreshToken),
}})
}
if s.Username.IsValue() {
exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{
psql.Quote(append(prefix, "username")...),
psql.Arg(s.Username),
}})
}
if s.UserID.IsValue() {
exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{
psql.Quote(append(prefix, "user_id")...),
psql.Arg(s.UserID),
}})
}
return exprs
}
// FindOauthToken retrieves a single record by primary key
// If cols is empty Find will return all columns.
func FindOauthToken(ctx context.Context, exec bob.Executor, IDPK int32, cols ...string) (*OauthToken, error) {
if len(cols) == 0 {
return OauthTokens.Query(
sm.Where(OauthTokens.Columns.ID.EQ(psql.Arg(IDPK))),
).One(ctx, exec)
}
return OauthTokens.Query(
sm.Where(OauthTokens.Columns.ID.EQ(psql.Arg(IDPK))),
sm.Columns(OauthTokens.Columns.Only(cols...)),
).One(ctx, exec)
}
// OauthTokenExists checks the presence of a single record by primary key
func OauthTokenExists(ctx context.Context, exec bob.Executor, IDPK int32) (bool, error) {
return OauthTokens.Query(
sm.Where(OauthTokens.Columns.ID.EQ(psql.Arg(IDPK))),
).Exists(ctx, exec)
}
// AfterQueryHook is called after OauthToken is retrieved from the database
func (o *OauthToken) AfterQueryHook(ctx context.Context, exec bob.Executor, queryType bob.QueryType) error {
var err error
switch queryType {
case bob.QueryTypeSelect:
ctx, err = OauthTokens.AfterSelectHooks.RunHooks(ctx, exec, OauthTokenSlice{o})
case bob.QueryTypeInsert:
ctx, err = OauthTokens.AfterInsertHooks.RunHooks(ctx, exec, OauthTokenSlice{o})
case bob.QueryTypeUpdate:
ctx, err = OauthTokens.AfterUpdateHooks.RunHooks(ctx, exec, OauthTokenSlice{o})
case bob.QueryTypeDelete:
ctx, err = OauthTokens.AfterDeleteHooks.RunHooks(ctx, exec, OauthTokenSlice{o})
}
return err
}
// primaryKeyVals returns the primary key values of the OauthToken
func (o *OauthToken) primaryKeyVals() bob.Expression {
return psql.Arg(o.ID)
}
func (o *OauthToken) pkEQ() dialect.Expression {
return psql.Quote("oauth_token", "id").EQ(bob.ExpressionFunc(func(ctx context.Context, w io.Writer, d bob.Dialect, start int) ([]any, error) {
return o.primaryKeyVals().WriteSQL(ctx, w, d, start)
}))
}
// Update uses an executor to update the OauthToken
func (o *OauthToken) Update(ctx context.Context, exec bob.Executor, s *OauthTokenSetter) error {
v, err := OauthTokens.Update(s.UpdateMod(), um.Where(o.pkEQ())).One(ctx, exec)
if err != nil {
return err
}
o.R = v.R
*o = *v
return nil
}
// Delete deletes a single OauthToken record with an executor
func (o *OauthToken) Delete(ctx context.Context, exec bob.Executor) error {
_, err := OauthTokens.Delete(dm.Where(o.pkEQ())).Exec(ctx, exec)
return err
}
// Reload refreshes the OauthToken using the executor
func (o *OauthToken) Reload(ctx context.Context, exec bob.Executor) error {
o2, err := OauthTokens.Query(
sm.Where(OauthTokens.Columns.ID.EQ(psql.Arg(o.ID))),
).One(ctx, exec)
if err != nil {
return err
}
o2.R = o.R
*o = *o2
return nil
}
// AfterQueryHook is called after OauthTokenSlice is retrieved from the database
func (o OauthTokenSlice) AfterQueryHook(ctx context.Context, exec bob.Executor, queryType bob.QueryType) error {
var err error
switch queryType {
case bob.QueryTypeSelect:
ctx, err = OauthTokens.AfterSelectHooks.RunHooks(ctx, exec, o)
case bob.QueryTypeInsert:
ctx, err = OauthTokens.AfterInsertHooks.RunHooks(ctx, exec, o)
case bob.QueryTypeUpdate:
ctx, err = OauthTokens.AfterUpdateHooks.RunHooks(ctx, exec, o)
case bob.QueryTypeDelete:
ctx, err = OauthTokens.AfterDeleteHooks.RunHooks(ctx, exec, o)
}
return err
}
func (o OauthTokenSlice) pkIN() dialect.Expression {
if len(o) == 0 {
return psql.Raw("NULL")
}
return psql.Quote("oauth_token", "id").In(bob.ExpressionFunc(func(ctx context.Context, w io.Writer, d bob.Dialect, start int) ([]any, error) {
pkPairs := make([]bob.Expression, len(o))
for i, row := range o {
pkPairs[i] = row.primaryKeyVals()
}
return bob.ExpressSlice(ctx, w, d, start, pkPairs, "", ", ", "")
}))
}
// copyMatchingRows finds models in the given slice that have the same primary key
// then it first copies the existing relationships from the old model to the new model
// and then replaces the old model in the slice with the new model
func (o OauthTokenSlice) copyMatchingRows(from ...*OauthToken) {
for i, old := range o {
for _, new := range from {
if new.ID != old.ID {
continue
}
new.R = old.R
o[i] = new
break
}
}
}
// UpdateMod modifies an update query with "WHERE primary_key IN (o...)"
func (o OauthTokenSlice) UpdateMod() bob.Mod[*dialect.UpdateQuery] {
return bob.ModFunc[*dialect.UpdateQuery](func(q *dialect.UpdateQuery) {
q.AppendHooks(func(ctx context.Context, exec bob.Executor) (context.Context, error) {
return OauthTokens.BeforeUpdateHooks.RunHooks(ctx, exec, o)
})
q.AppendLoader(bob.LoaderFunc(func(ctx context.Context, exec bob.Executor, retrieved any) error {
var err error
switch retrieved := retrieved.(type) {
case *OauthToken:
o.copyMatchingRows(retrieved)
case []*OauthToken:
o.copyMatchingRows(retrieved...)
case OauthTokenSlice:
o.copyMatchingRows(retrieved...)
default:
// If the retrieved value is not a OauthToken or a slice of OauthToken
// then run the AfterUpdateHooks on the slice
_, err = OauthTokens.AfterUpdateHooks.RunHooks(ctx, exec, o)
}
return err
}))
q.AppendWhere(o.pkIN())
})
}
// DeleteMod modifies an delete query with "WHERE primary_key IN (o...)"
func (o OauthTokenSlice) DeleteMod() bob.Mod[*dialect.DeleteQuery] {
return bob.ModFunc[*dialect.DeleteQuery](func(q *dialect.DeleteQuery) {
q.AppendHooks(func(ctx context.Context, exec bob.Executor) (context.Context, error) {
return OauthTokens.BeforeDeleteHooks.RunHooks(ctx, exec, o)
})
q.AppendLoader(bob.LoaderFunc(func(ctx context.Context, exec bob.Executor, retrieved any) error {
var err error
switch retrieved := retrieved.(type) {
case *OauthToken:
o.copyMatchingRows(retrieved)
case []*OauthToken:
o.copyMatchingRows(retrieved...)
case OauthTokenSlice:
o.copyMatchingRows(retrieved...)
default:
// If the retrieved value is not a OauthToken or a slice of OauthToken
// then run the AfterDeleteHooks on the slice
_, err = OauthTokens.AfterDeleteHooks.RunHooks(ctx, exec, o)
}
return err
}))
q.AppendWhere(o.pkIN())
})
}
func (o OauthTokenSlice) UpdateAll(ctx context.Context, exec bob.Executor, vals OauthTokenSetter) error {
if len(o) == 0 {
return nil
}
_, err := OauthTokens.Update(vals.UpdateMod(), o.UpdateMod()).All(ctx, exec)
return err
}
func (o OauthTokenSlice) DeleteAll(ctx context.Context, exec bob.Executor) error {
if len(o) == 0 {
return nil
}
_, err := OauthTokens.Delete(o.DeleteMod()).Exec(ctx, exec)
return err
}
func (o OauthTokenSlice) ReloadAll(ctx context.Context, exec bob.Executor) error {
if len(o) == 0 {
return nil
}
o2, err := OauthTokens.Query(sm.Where(o.pkIN())).All(ctx, exec)
if err != nil {
return err
}
o.copyMatchingRows(o2...)
return nil
}
// UserUser starts a query for related objects on user_
func (o *OauthToken) UserUser(mods ...bob.Mod[*dialect.SelectQuery]) UsersQuery {
return Users.Query(append(mods,
sm.Where(Users.Columns.ID.EQ(psql.Arg(o.UserID))),
)...)
}
func (os OauthTokenSlice) UserUser(mods ...bob.Mod[*dialect.SelectQuery]) UsersQuery {
pkUserID := make(pgtypes.Array[int32], 0, len(os))
for _, o := range os {
if o == nil {
continue
}
pkUserID = append(pkUserID, o.UserID)
}
PKArgExpr := psql.Select(sm.Columns(
psql.F("unnest", psql.Cast(psql.Arg(pkUserID), "integer[]")),
))
return Users.Query(append(mods,
sm.Where(psql.Group(Users.Columns.ID).OP("IN", PKArgExpr)),
)...)
}
func attachOauthTokenUserUser0(ctx context.Context, exec bob.Executor, count int, oauthToken0 *OauthToken, user1 *User) (*OauthToken, error) {
setter := &OauthTokenSetter{
UserID: omit.From(user1.ID),
}
err := oauthToken0.Update(ctx, exec, setter)
if err != nil {
return nil, fmt.Errorf("attachOauthTokenUserUser0: %w", err)
}
return oauthToken0, nil
}
func (oauthToken0 *OauthToken) InsertUserUser(ctx context.Context, exec bob.Executor, related *UserSetter) error {
var err error
user1, err := Users.Insert(related).One(ctx, exec)
if err != nil {
return fmt.Errorf("inserting related objects: %w", err)
}
_, err = attachOauthTokenUserUser0(ctx, exec, 1, oauthToken0, user1)
if err != nil {
return err
}
oauthToken0.R.UserUser = user1
user1.R.UserOauthTokens = append(user1.R.UserOauthTokens, oauthToken0)
return nil
}
func (oauthToken0 *OauthToken) AttachUserUser(ctx context.Context, exec bob.Executor, user1 *User) error {
var err error
_, err = attachOauthTokenUserUser0(ctx, exec, 1, oauthToken0, user1)
if err != nil {
return err
}
oauthToken0.R.UserUser = user1
user1.R.UserOauthTokens = append(user1.R.UserOauthTokens, oauthToken0)
return nil
}
type oauthTokenWhere[Q psql.Filterable] struct {
ID psql.WhereMod[Q, int32]
AccessToken psql.WhereMod[Q, string]
Expires psql.WhereMod[Q, time.Time]
RefreshToken psql.WhereMod[Q, string]
Username psql.WhereMod[Q, string]
UserID psql.WhereMod[Q, int32]
}
func (oauthTokenWhere[Q]) AliasedAs(alias string) oauthTokenWhere[Q] {
return buildOauthTokenWhere[Q](buildOauthTokenColumns(alias))
}
func buildOauthTokenWhere[Q psql.Filterable](cols oauthTokenColumns) oauthTokenWhere[Q] {
return oauthTokenWhere[Q]{
ID: psql.Where[Q, int32](cols.ID),
AccessToken: psql.Where[Q, string](cols.AccessToken),
Expires: psql.Where[Q, time.Time](cols.Expires),
RefreshToken: psql.Where[Q, string](cols.RefreshToken),
Username: psql.Where[Q, string](cols.Username),
UserID: psql.Where[Q, int32](cols.UserID),
}
}
func (o *OauthToken) Preload(name string, retrieved any) error {
if o == nil {
return nil
}
switch name {
case "UserUser":
rel, ok := retrieved.(*User)
if !ok {
return fmt.Errorf("oauthToken cannot load %T as %q", retrieved, name)
}
o.R.UserUser = rel
if rel != nil {
rel.R.UserOauthTokens = OauthTokenSlice{o}
}
return nil
default:
return fmt.Errorf("oauthToken has no relationship %q", name)
}
}
type oauthTokenPreloader struct {
UserUser func(...psql.PreloadOption) psql.Preloader
}
func buildOauthTokenPreloader() oauthTokenPreloader {
return oauthTokenPreloader{
UserUser: func(opts ...psql.PreloadOption) psql.Preloader {
return psql.Preload[*User, UserSlice](psql.PreloadRel{
Name: "UserUser",
Sides: []psql.PreloadSide{
{
From: OauthTokens,
To: Users,
FromColumns: []string{"user_id"},
ToColumns: []string{"id"},
},
},
}, Users.Columns.Names(), opts...)
},
}
}
type oauthTokenThenLoader[Q orm.Loadable] struct {
UserUser func(...bob.Mod[*dialect.SelectQuery]) orm.Loader[Q]
}
func buildOauthTokenThenLoader[Q orm.Loadable]() oauthTokenThenLoader[Q] {
type UserUserLoadInterface interface {
LoadUserUser(context.Context, bob.Executor, ...bob.Mod[*dialect.SelectQuery]) error
}
return oauthTokenThenLoader[Q]{
UserUser: thenLoadBuilder[Q](
"UserUser",
func(ctx context.Context, exec bob.Executor, retrieved UserUserLoadInterface, mods ...bob.Mod[*dialect.SelectQuery]) error {
return retrieved.LoadUserUser(ctx, exec, mods...)
},
),
}
}
// LoadUserUser loads the oauthToken's UserUser into the .R struct
func (o *OauthToken) LoadUserUser(ctx context.Context, exec bob.Executor, mods ...bob.Mod[*dialect.SelectQuery]) error {
if o == nil {
return nil
}
// Reset the relationship
o.R.UserUser = nil
related, err := o.UserUser(mods...).One(ctx, exec)
if err != nil {
return err
}
related.R.UserOauthTokens = OauthTokenSlice{o}
o.R.UserUser = related
return nil
}
// LoadUserUser loads the oauthToken's UserUser into the .R struct
func (os OauthTokenSlice) LoadUserUser(ctx context.Context, exec bob.Executor, mods ...bob.Mod[*dialect.SelectQuery]) error {
if len(os) == 0 {
return nil
}
users, err := os.UserUser(mods...).All(ctx, exec)
if err != nil {
return err
}
for _, o := range os {
if o == nil {
continue
}
for _, rel := range users {
if !(o.UserID == rel.ID) {
continue
}
rel.R.UserOauthTokens = append(rel.R.UserOauthTokens, o)
o.R.UserUser = rel
break
}
}
return nil
}
type oauthTokenJoins[Q dialect.Joinable] struct {
typ string
UserUser modAs[Q, userColumns]
}
func (j oauthTokenJoins[Q]) aliasedAs(alias string) oauthTokenJoins[Q] {
return buildOauthTokenJoins[Q](buildOauthTokenColumns(alias), j.typ)
}
func buildOauthTokenJoins[Q dialect.Joinable](cols oauthTokenColumns, typ string) oauthTokenJoins[Q] {
return oauthTokenJoins[Q]{
typ: typ,
UserUser: modAs[Q, userColumns]{
c: Users.Columns,
f: func(to userColumns) bob.Mod[Q] {
mods := make(mods.QueryMods[Q], 0, 1)
{
mods = append(mods, dialect.Join[Q](typ, Users.Name().As(to.Alias())).On(
to.ID.EQ(cols.UserID),
))
}
return mods
},
},
}
}

View file

@ -55,7 +55,8 @@ type UsersQuery = *psql.ViewQuery[*User, UserSlice]
// userR is where relationships are stored.
type userR struct {
Organization *Organization // user_.user__organization_id_fkey
UserOauthTokens OauthTokenSlice // oauth_token.oauth_token_user_id_fkey
Organization *Organization // user_.user__organization_id_fkey
}
func buildUserColumns(alias string) userColumns {
@ -602,6 +603,30 @@ func (o UserSlice) ReloadAll(ctx context.Context, exec bob.Executor) error {
return nil
}
// UserOauthTokens starts a query for related objects on oauth_token
func (o *User) UserOauthTokens(mods ...bob.Mod[*dialect.SelectQuery]) OauthTokensQuery {
return OauthTokens.Query(append(mods,
sm.Where(OauthTokens.Columns.UserID.EQ(psql.Arg(o.ID))),
)...)
}
func (os UserSlice) UserOauthTokens(mods ...bob.Mod[*dialect.SelectQuery]) OauthTokensQuery {
pkID := make(pgtypes.Array[int32], 0, len(os))
for _, o := range os {
if o == nil {
continue
}
pkID = append(pkID, o.ID)
}
PKArgExpr := psql.Select(sm.Columns(
psql.F("unnest", psql.Cast(psql.Arg(pkID), "integer[]")),
))
return OauthTokens.Query(append(mods,
sm.Where(psql.Group(OauthTokens.Columns.UserID).OP("IN", PKArgExpr)),
)...)
}
// Organization starts a query for related objects on organization
func (o *User) Organization(mods ...bob.Mod[*dialect.SelectQuery]) OrganizationsQuery {
return Organizations.Query(append(mods,
@ -626,6 +651,74 @@ func (os UserSlice) Organization(mods ...bob.Mod[*dialect.SelectQuery]) Organiza
)...)
}
func insertUserUserOauthTokens0(ctx context.Context, exec bob.Executor, oauthTokens1 []*OauthTokenSetter, user0 *User) (OauthTokenSlice, error) {
for i := range oauthTokens1 {
oauthTokens1[i].UserID = omit.From(user0.ID)
}
ret, err := OauthTokens.Insert(bob.ToMods(oauthTokens1...)).All(ctx, exec)
if err != nil {
return ret, fmt.Errorf("insertUserUserOauthTokens0: %w", err)
}
return ret, nil
}
func attachUserUserOauthTokens0(ctx context.Context, exec bob.Executor, count int, oauthTokens1 OauthTokenSlice, user0 *User) (OauthTokenSlice, error) {
setter := &OauthTokenSetter{
UserID: omit.From(user0.ID),
}
err := oauthTokens1.UpdateAll(ctx, exec, *setter)
if err != nil {
return nil, fmt.Errorf("attachUserUserOauthTokens0: %w", err)
}
return oauthTokens1, nil
}
func (user0 *User) InsertUserOauthTokens(ctx context.Context, exec bob.Executor, related ...*OauthTokenSetter) error {
if len(related) == 0 {
return nil
}
var err error
oauthTokens1, err := insertUserUserOauthTokens0(ctx, exec, related, user0)
if err != nil {
return err
}
user0.R.UserOauthTokens = append(user0.R.UserOauthTokens, oauthTokens1...)
for _, rel := range oauthTokens1 {
rel.R.UserUser = user0
}
return nil
}
func (user0 *User) AttachUserOauthTokens(ctx context.Context, exec bob.Executor, related ...*OauthToken) error {
if len(related) == 0 {
return nil
}
var err error
oauthTokens1 := OauthTokenSlice(related)
_, err = attachUserUserOauthTokens0(ctx, exec, len(related), oauthTokens1, user0)
if err != nil {
return err
}
user0.R.UserOauthTokens = append(user0.R.UserOauthTokens, oauthTokens1...)
for _, rel := range related {
rel.R.UserUser = user0
}
return nil
}
func attachUserOrganization0(ctx context.Context, exec bob.Executor, count int, user0 *User, organization1 *Organization) (*User, error) {
setter := &UserSetter{
OrganizationID: omitnull.From(organization1.ID),
@ -716,6 +809,20 @@ func (o *User) Preload(name string, retrieved any) error {
}
switch name {
case "UserOauthTokens":
rels, ok := retrieved.(OauthTokenSlice)
if !ok {
return fmt.Errorf("user cannot load %T as %q", retrieved, name)
}
o.R.UserOauthTokens = rels
for _, rel := range rels {
if rel != nil {
rel.R.UserUser = o
}
}
return nil
case "Organization":
rel, ok := retrieved.(*Organization)
if !ok {
@ -756,15 +863,25 @@ func buildUserPreloader() userPreloader {
}
type userThenLoader[Q orm.Loadable] struct {
Organization func(...bob.Mod[*dialect.SelectQuery]) orm.Loader[Q]
UserOauthTokens func(...bob.Mod[*dialect.SelectQuery]) orm.Loader[Q]
Organization func(...bob.Mod[*dialect.SelectQuery]) orm.Loader[Q]
}
func buildUserThenLoader[Q orm.Loadable]() userThenLoader[Q] {
type UserOauthTokensLoadInterface interface {
LoadUserOauthTokens(context.Context, bob.Executor, ...bob.Mod[*dialect.SelectQuery]) error
}
type OrganizationLoadInterface interface {
LoadOrganization(context.Context, bob.Executor, ...bob.Mod[*dialect.SelectQuery]) error
}
return userThenLoader[Q]{
UserOauthTokens: thenLoadBuilder[Q](
"UserOauthTokens",
func(ctx context.Context, exec bob.Executor, retrieved UserOauthTokensLoadInterface, mods ...bob.Mod[*dialect.SelectQuery]) error {
return retrieved.LoadUserOauthTokens(ctx, exec, mods...)
},
),
Organization: thenLoadBuilder[Q](
"Organization",
func(ctx context.Context, exec bob.Executor, retrieved OrganizationLoadInterface, mods ...bob.Mod[*dialect.SelectQuery]) error {
@ -774,6 +891,67 @@ func buildUserThenLoader[Q orm.Loadable]() userThenLoader[Q] {
}
}
// LoadUserOauthTokens loads the user's UserOauthTokens into the .R struct
func (o *User) LoadUserOauthTokens(ctx context.Context, exec bob.Executor, mods ...bob.Mod[*dialect.SelectQuery]) error {
if o == nil {
return nil
}
// Reset the relationship
o.R.UserOauthTokens = nil
related, err := o.UserOauthTokens(mods...).All(ctx, exec)
if err != nil {
return err
}
for _, rel := range related {
rel.R.UserUser = o
}
o.R.UserOauthTokens = related
return nil
}
// LoadUserOauthTokens loads the user's UserOauthTokens into the .R struct
func (os UserSlice) LoadUserOauthTokens(ctx context.Context, exec bob.Executor, mods ...bob.Mod[*dialect.SelectQuery]) error {
if len(os) == 0 {
return nil
}
oauthTokens, err := os.UserOauthTokens(mods...).All(ctx, exec)
if err != nil {
return err
}
for _, o := range os {
if o == nil {
continue
}
o.R.UserOauthTokens = nil
}
for _, o := range os {
if o == nil {
continue
}
for _, rel := range oauthTokens {
if !(o.ID == rel.UserID) {
continue
}
rel.R.UserUser = o
o.R.UserOauthTokens = append(o.R.UserOauthTokens, rel)
}
}
return nil
}
// LoadOrganization loads the user's Organization into the .R struct
func (o *User) LoadOrganization(ctx context.Context, exec bob.Executor, mods ...bob.Mod[*dialect.SelectQuery]) error {
if o == nil {
@ -830,8 +1008,9 @@ func (os UserSlice) LoadOrganization(ctx context.Context, exec bob.Executor, mod
}
type userJoins[Q dialect.Joinable] struct {
typ string
Organization modAs[Q, organizationColumns]
typ string
UserOauthTokens modAs[Q, oauthTokenColumns]
Organization modAs[Q, organizationColumns]
}
func (j userJoins[Q]) aliasedAs(alias string) userJoins[Q] {
@ -841,6 +1020,20 @@ func (j userJoins[Q]) aliasedAs(alias string) userJoins[Q] {
func buildUserJoins[Q dialect.Joinable](cols userColumns, typ string) userJoins[Q] {
return userJoins[Q]{
typ: typ,
UserOauthTokens: modAs[Q, oauthTokenColumns]{
c: OauthTokens.Columns,
f: func(to oauthTokenColumns) bob.Mod[Q] {
mods := make(mods.QueryMods[Q], 0, 1)
{
mods = append(mods, dialect.Join[Q](typ, OauthTokens.Name().As(to.Alias())).On(
to.UserID.EQ(cols.ID),
))
}
return mods
},
},
Organization: modAs[Q, organizationColumns]{
c: Organizations.Columns,
f: func(to organizationColumns) bob.Mod[Q] {