Save oauth tokens to the database for use later.
This commit is contained in:
parent
8cd11b350d
commit
858bc031a0
18 changed files with 1957 additions and 10 deletions
|
|
@ -32,6 +32,7 @@ func (j joinSet[Q]) AliasedAs(alias string) joinSet[Q] {
|
|||
}
|
||||
|
||||
type joins[Q dialect.Joinable] struct {
|
||||
OauthTokens joinSet[oauthTokenJoins[Q]]
|
||||
Organizations joinSet[organizationJoins[Q]]
|
||||
Users joinSet[userJoins[Q]]
|
||||
}
|
||||
|
|
@ -46,6 +47,7 @@ func buildJoinSet[Q interface{ aliasedAs(string) Q }, C any, F func(C, string) Q
|
|||
|
||||
func getJoins[Q dialect.Joinable]() joins[Q] {
|
||||
return joins[Q]{
|
||||
OauthTokens: buildJoinSet[oauthTokenJoins[Q]](OauthTokens.Columns, buildOauthTokenJoins),
|
||||
Organizations: buildJoinSet[organizationJoins[Q]](Organizations.Columns, buildOrganizationJoins),
|
||||
Users: buildJoinSet[userJoins[Q]](Users.Columns, buildUserJoins),
|
||||
}
|
||||
|
|
|
|||
|
|
@ -17,12 +17,14 @@ import (
|
|||
var Preload = getPreloaders()
|
||||
|
||||
type preloaders struct {
|
||||
OauthToken oauthTokenPreloader
|
||||
Organization organizationPreloader
|
||||
User userPreloader
|
||||
}
|
||||
|
||||
func getPreloaders() preloaders {
|
||||
return preloaders{
|
||||
OauthToken: buildOauthTokenPreloader(),
|
||||
Organization: buildOrganizationPreloader(),
|
||||
User: buildUserPreloader(),
|
||||
}
|
||||
|
|
@ -35,12 +37,14 @@ var (
|
|||
)
|
||||
|
||||
type thenLoaders[Q orm.Loadable] struct {
|
||||
OauthToken oauthTokenThenLoader[Q]
|
||||
Organization organizationThenLoader[Q]
|
||||
User userThenLoader[Q]
|
||||
}
|
||||
|
||||
func getThenLoaders[Q orm.Loadable]() thenLoaders[Q] {
|
||||
return thenLoaders[Q]{
|
||||
OauthToken: buildOauthTokenThenLoader[Q](),
|
||||
Organization: buildOrganizationThenLoader[Q](),
|
||||
User: buildUserThenLoader[Q](),
|
||||
}
|
||||
|
|
|
|||
|
|
@ -17,6 +17,9 @@ var testDB bob.Transactor[bob.Tx]
|
|||
// Make sure the type GooseDBVersion runs hooks after queries
|
||||
var _ bob.HookableType = &GooseDBVersion{}
|
||||
|
||||
// Make sure the type OauthToken runs hooks after queries
|
||||
var _ bob.HookableType = &OauthToken{}
|
||||
|
||||
// Make sure the type Organization runs hooks after queries
|
||||
var _ bob.HookableType = &Organization{}
|
||||
|
||||
|
|
|
|||
|
|
@ -18,17 +18,20 @@ var (
|
|||
|
||||
func Where[Q psql.Filterable]() struct {
|
||||
GooseDBVersions gooseDBVersionWhere[Q]
|
||||
OauthTokens oauthTokenWhere[Q]
|
||||
Organizations organizationWhere[Q]
|
||||
Sessions sessionWhere[Q]
|
||||
Users userWhere[Q]
|
||||
} {
|
||||
return struct {
|
||||
GooseDBVersions gooseDBVersionWhere[Q]
|
||||
OauthTokens oauthTokenWhere[Q]
|
||||
Organizations organizationWhere[Q]
|
||||
Sessions sessionWhere[Q]
|
||||
Users userWhere[Q]
|
||||
}{
|
||||
GooseDBVersions: buildGooseDBVersionWhere[Q](GooseDBVersions.Columns),
|
||||
OauthTokens: buildOauthTokenWhere[Q](OauthTokens.Columns),
|
||||
Organizations: buildOrganizationWhere[Q](Organizations.Columns),
|
||||
Sessions: buildSessionWhere[Q](Sessions.Columns),
|
||||
Users: buildUserWhere[Q](Users.Columns),
|
||||
|
|
|
|||
703
models/oauth_token.bob.go
Normal file
703
models/oauth_token.bob.go
Normal file
|
|
@ -0,0 +1,703 @@
|
|||
// Code generated by BobGen psql v0.41.1. DO NOT EDIT.
|
||||
// This file is meant to be re-generated in place and/or deleted at any time.
|
||||
|
||||
package models
|
||||
|
||||
import (
|
||||
"context"
|
||||
"fmt"
|
||||
"io"
|
||||
"time"
|
||||
|
||||
"github.com/aarondl/opt/omit"
|
||||
"github.com/stephenafamo/bob"
|
||||
"github.com/stephenafamo/bob/dialect/psql"
|
||||
"github.com/stephenafamo/bob/dialect/psql/dialect"
|
||||
"github.com/stephenafamo/bob/dialect/psql/dm"
|
||||
"github.com/stephenafamo/bob/dialect/psql/sm"
|
||||
"github.com/stephenafamo/bob/dialect/psql/um"
|
||||
"github.com/stephenafamo/bob/expr"
|
||||
"github.com/stephenafamo/bob/mods"
|
||||
"github.com/stephenafamo/bob/orm"
|
||||
"github.com/stephenafamo/bob/types/pgtypes"
|
||||
)
|
||||
|
||||
// OauthToken is an object representing the database table.
|
||||
type OauthToken struct {
|
||||
ID int32 `db:"id,pk" `
|
||||
AccessToken string `db:"access_token" `
|
||||
Expires time.Time `db:"expires" `
|
||||
RefreshToken string `db:"refresh_token" `
|
||||
Username string `db:"username" `
|
||||
UserID int32 `db:"user_id" `
|
||||
|
||||
R oauthTokenR `db:"-" `
|
||||
}
|
||||
|
||||
// OauthTokenSlice is an alias for a slice of pointers to OauthToken.
|
||||
// This should almost always be used instead of []*OauthToken.
|
||||
type OauthTokenSlice []*OauthToken
|
||||
|
||||
// OauthTokens contains methods to work with the oauth_token table
|
||||
var OauthTokens = psql.NewTablex[*OauthToken, OauthTokenSlice, *OauthTokenSetter]("", "oauth_token", buildOauthTokenColumns("oauth_token"))
|
||||
|
||||
// OauthTokensQuery is a query on the oauth_token table
|
||||
type OauthTokensQuery = *psql.ViewQuery[*OauthToken, OauthTokenSlice]
|
||||
|
||||
// oauthTokenR is where relationships are stored.
|
||||
type oauthTokenR struct {
|
||||
UserUser *User // oauth_token.oauth_token_user_id_fkey
|
||||
}
|
||||
|
||||
func buildOauthTokenColumns(alias string) oauthTokenColumns {
|
||||
return oauthTokenColumns{
|
||||
ColumnsExpr: expr.NewColumnsExpr(
|
||||
"id", "access_token", "expires", "refresh_token", "username", "user_id",
|
||||
).WithParent("oauth_token"),
|
||||
tableAlias: alias,
|
||||
ID: psql.Quote(alias, "id"),
|
||||
AccessToken: psql.Quote(alias, "access_token"),
|
||||
Expires: psql.Quote(alias, "expires"),
|
||||
RefreshToken: psql.Quote(alias, "refresh_token"),
|
||||
Username: psql.Quote(alias, "username"),
|
||||
UserID: psql.Quote(alias, "user_id"),
|
||||
}
|
||||
}
|
||||
|
||||
type oauthTokenColumns struct {
|
||||
expr.ColumnsExpr
|
||||
tableAlias string
|
||||
ID psql.Expression
|
||||
AccessToken psql.Expression
|
||||
Expires psql.Expression
|
||||
RefreshToken psql.Expression
|
||||
Username psql.Expression
|
||||
UserID psql.Expression
|
||||
}
|
||||
|
||||
func (c oauthTokenColumns) Alias() string {
|
||||
return c.tableAlias
|
||||
}
|
||||
|
||||
func (oauthTokenColumns) AliasedAs(alias string) oauthTokenColumns {
|
||||
return buildOauthTokenColumns(alias)
|
||||
}
|
||||
|
||||
// OauthTokenSetter is used for insert/upsert/update operations
|
||||
// All values are optional, and do not have to be set
|
||||
// Generated columns are not included
|
||||
type OauthTokenSetter struct {
|
||||
ID omit.Val[int32] `db:"id,pk" `
|
||||
AccessToken omit.Val[string] `db:"access_token" `
|
||||
Expires omit.Val[time.Time] `db:"expires" `
|
||||
RefreshToken omit.Val[string] `db:"refresh_token" `
|
||||
Username omit.Val[string] `db:"username" `
|
||||
UserID omit.Val[int32] `db:"user_id" `
|
||||
}
|
||||
|
||||
func (s OauthTokenSetter) SetColumns() []string {
|
||||
vals := make([]string, 0, 6)
|
||||
if s.ID.IsValue() {
|
||||
vals = append(vals, "id")
|
||||
}
|
||||
if s.AccessToken.IsValue() {
|
||||
vals = append(vals, "access_token")
|
||||
}
|
||||
if s.Expires.IsValue() {
|
||||
vals = append(vals, "expires")
|
||||
}
|
||||
if s.RefreshToken.IsValue() {
|
||||
vals = append(vals, "refresh_token")
|
||||
}
|
||||
if s.Username.IsValue() {
|
||||
vals = append(vals, "username")
|
||||
}
|
||||
if s.UserID.IsValue() {
|
||||
vals = append(vals, "user_id")
|
||||
}
|
||||
return vals
|
||||
}
|
||||
|
||||
func (s OauthTokenSetter) Overwrite(t *OauthToken) {
|
||||
if s.ID.IsValue() {
|
||||
t.ID = s.ID.MustGet()
|
||||
}
|
||||
if s.AccessToken.IsValue() {
|
||||
t.AccessToken = s.AccessToken.MustGet()
|
||||
}
|
||||
if s.Expires.IsValue() {
|
||||
t.Expires = s.Expires.MustGet()
|
||||
}
|
||||
if s.RefreshToken.IsValue() {
|
||||
t.RefreshToken = s.RefreshToken.MustGet()
|
||||
}
|
||||
if s.Username.IsValue() {
|
||||
t.Username = s.Username.MustGet()
|
||||
}
|
||||
if s.UserID.IsValue() {
|
||||
t.UserID = s.UserID.MustGet()
|
||||
}
|
||||
}
|
||||
|
||||
func (s *OauthTokenSetter) Apply(q *dialect.InsertQuery) {
|
||||
q.AppendHooks(func(ctx context.Context, exec bob.Executor) (context.Context, error) {
|
||||
return OauthTokens.BeforeInsertHooks.RunHooks(ctx, exec, s)
|
||||
})
|
||||
|
||||
q.AppendValues(bob.ExpressionFunc(func(ctx context.Context, w io.Writer, d bob.Dialect, start int) ([]any, error) {
|
||||
vals := make([]bob.Expression, 6)
|
||||
if s.ID.IsValue() {
|
||||
vals[0] = psql.Arg(s.ID.MustGet())
|
||||
} else {
|
||||
vals[0] = psql.Raw("DEFAULT")
|
||||
}
|
||||
|
||||
if s.AccessToken.IsValue() {
|
||||
vals[1] = psql.Arg(s.AccessToken.MustGet())
|
||||
} else {
|
||||
vals[1] = psql.Raw("DEFAULT")
|
||||
}
|
||||
|
||||
if s.Expires.IsValue() {
|
||||
vals[2] = psql.Arg(s.Expires.MustGet())
|
||||
} else {
|
||||
vals[2] = psql.Raw("DEFAULT")
|
||||
}
|
||||
|
||||
if s.RefreshToken.IsValue() {
|
||||
vals[3] = psql.Arg(s.RefreshToken.MustGet())
|
||||
} else {
|
||||
vals[3] = psql.Raw("DEFAULT")
|
||||
}
|
||||
|
||||
if s.Username.IsValue() {
|
||||
vals[4] = psql.Arg(s.Username.MustGet())
|
||||
} else {
|
||||
vals[4] = psql.Raw("DEFAULT")
|
||||
}
|
||||
|
||||
if s.UserID.IsValue() {
|
||||
vals[5] = psql.Arg(s.UserID.MustGet())
|
||||
} else {
|
||||
vals[5] = psql.Raw("DEFAULT")
|
||||
}
|
||||
|
||||
return bob.ExpressSlice(ctx, w, d, start, vals, "", ", ", "")
|
||||
}))
|
||||
}
|
||||
|
||||
func (s OauthTokenSetter) UpdateMod() bob.Mod[*dialect.UpdateQuery] {
|
||||
return um.Set(s.Expressions()...)
|
||||
}
|
||||
|
||||
func (s OauthTokenSetter) Expressions(prefix ...string) []bob.Expression {
|
||||
exprs := make([]bob.Expression, 0, 6)
|
||||
|
||||
if s.ID.IsValue() {
|
||||
exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{
|
||||
psql.Quote(append(prefix, "id")...),
|
||||
psql.Arg(s.ID),
|
||||
}})
|
||||
}
|
||||
|
||||
if s.AccessToken.IsValue() {
|
||||
exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{
|
||||
psql.Quote(append(prefix, "access_token")...),
|
||||
psql.Arg(s.AccessToken),
|
||||
}})
|
||||
}
|
||||
|
||||
if s.Expires.IsValue() {
|
||||
exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{
|
||||
psql.Quote(append(prefix, "expires")...),
|
||||
psql.Arg(s.Expires),
|
||||
}})
|
||||
}
|
||||
|
||||
if s.RefreshToken.IsValue() {
|
||||
exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{
|
||||
psql.Quote(append(prefix, "refresh_token")...),
|
||||
psql.Arg(s.RefreshToken),
|
||||
}})
|
||||
}
|
||||
|
||||
if s.Username.IsValue() {
|
||||
exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{
|
||||
psql.Quote(append(prefix, "username")...),
|
||||
psql.Arg(s.Username),
|
||||
}})
|
||||
}
|
||||
|
||||
if s.UserID.IsValue() {
|
||||
exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{
|
||||
psql.Quote(append(prefix, "user_id")...),
|
||||
psql.Arg(s.UserID),
|
||||
}})
|
||||
}
|
||||
|
||||
return exprs
|
||||
}
|
||||
|
||||
// FindOauthToken retrieves a single record by primary key
|
||||
// If cols is empty Find will return all columns.
|
||||
func FindOauthToken(ctx context.Context, exec bob.Executor, IDPK int32, cols ...string) (*OauthToken, error) {
|
||||
if len(cols) == 0 {
|
||||
return OauthTokens.Query(
|
||||
sm.Where(OauthTokens.Columns.ID.EQ(psql.Arg(IDPK))),
|
||||
).One(ctx, exec)
|
||||
}
|
||||
|
||||
return OauthTokens.Query(
|
||||
sm.Where(OauthTokens.Columns.ID.EQ(psql.Arg(IDPK))),
|
||||
sm.Columns(OauthTokens.Columns.Only(cols...)),
|
||||
).One(ctx, exec)
|
||||
}
|
||||
|
||||
// OauthTokenExists checks the presence of a single record by primary key
|
||||
func OauthTokenExists(ctx context.Context, exec bob.Executor, IDPK int32) (bool, error) {
|
||||
return OauthTokens.Query(
|
||||
sm.Where(OauthTokens.Columns.ID.EQ(psql.Arg(IDPK))),
|
||||
).Exists(ctx, exec)
|
||||
}
|
||||
|
||||
// AfterQueryHook is called after OauthToken is retrieved from the database
|
||||
func (o *OauthToken) AfterQueryHook(ctx context.Context, exec bob.Executor, queryType bob.QueryType) error {
|
||||
var err error
|
||||
|
||||
switch queryType {
|
||||
case bob.QueryTypeSelect:
|
||||
ctx, err = OauthTokens.AfterSelectHooks.RunHooks(ctx, exec, OauthTokenSlice{o})
|
||||
case bob.QueryTypeInsert:
|
||||
ctx, err = OauthTokens.AfterInsertHooks.RunHooks(ctx, exec, OauthTokenSlice{o})
|
||||
case bob.QueryTypeUpdate:
|
||||
ctx, err = OauthTokens.AfterUpdateHooks.RunHooks(ctx, exec, OauthTokenSlice{o})
|
||||
case bob.QueryTypeDelete:
|
||||
ctx, err = OauthTokens.AfterDeleteHooks.RunHooks(ctx, exec, OauthTokenSlice{o})
|
||||
}
|
||||
|
||||
return err
|
||||
}
|
||||
|
||||
// primaryKeyVals returns the primary key values of the OauthToken
|
||||
func (o *OauthToken) primaryKeyVals() bob.Expression {
|
||||
return psql.Arg(o.ID)
|
||||
}
|
||||
|
||||
func (o *OauthToken) pkEQ() dialect.Expression {
|
||||
return psql.Quote("oauth_token", "id").EQ(bob.ExpressionFunc(func(ctx context.Context, w io.Writer, d bob.Dialect, start int) ([]any, error) {
|
||||
return o.primaryKeyVals().WriteSQL(ctx, w, d, start)
|
||||
}))
|
||||
}
|
||||
|
||||
// Update uses an executor to update the OauthToken
|
||||
func (o *OauthToken) Update(ctx context.Context, exec bob.Executor, s *OauthTokenSetter) error {
|
||||
v, err := OauthTokens.Update(s.UpdateMod(), um.Where(o.pkEQ())).One(ctx, exec)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
o.R = v.R
|
||||
*o = *v
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
// Delete deletes a single OauthToken record with an executor
|
||||
func (o *OauthToken) Delete(ctx context.Context, exec bob.Executor) error {
|
||||
_, err := OauthTokens.Delete(dm.Where(o.pkEQ())).Exec(ctx, exec)
|
||||
return err
|
||||
}
|
||||
|
||||
// Reload refreshes the OauthToken using the executor
|
||||
func (o *OauthToken) Reload(ctx context.Context, exec bob.Executor) error {
|
||||
o2, err := OauthTokens.Query(
|
||||
sm.Where(OauthTokens.Columns.ID.EQ(psql.Arg(o.ID))),
|
||||
).One(ctx, exec)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
o2.R = o.R
|
||||
*o = *o2
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
// AfterQueryHook is called after OauthTokenSlice is retrieved from the database
|
||||
func (o OauthTokenSlice) AfterQueryHook(ctx context.Context, exec bob.Executor, queryType bob.QueryType) error {
|
||||
var err error
|
||||
|
||||
switch queryType {
|
||||
case bob.QueryTypeSelect:
|
||||
ctx, err = OauthTokens.AfterSelectHooks.RunHooks(ctx, exec, o)
|
||||
case bob.QueryTypeInsert:
|
||||
ctx, err = OauthTokens.AfterInsertHooks.RunHooks(ctx, exec, o)
|
||||
case bob.QueryTypeUpdate:
|
||||
ctx, err = OauthTokens.AfterUpdateHooks.RunHooks(ctx, exec, o)
|
||||
case bob.QueryTypeDelete:
|
||||
ctx, err = OauthTokens.AfterDeleteHooks.RunHooks(ctx, exec, o)
|
||||
}
|
||||
|
||||
return err
|
||||
}
|
||||
|
||||
func (o OauthTokenSlice) pkIN() dialect.Expression {
|
||||
if len(o) == 0 {
|
||||
return psql.Raw("NULL")
|
||||
}
|
||||
|
||||
return psql.Quote("oauth_token", "id").In(bob.ExpressionFunc(func(ctx context.Context, w io.Writer, d bob.Dialect, start int) ([]any, error) {
|
||||
pkPairs := make([]bob.Expression, len(o))
|
||||
for i, row := range o {
|
||||
pkPairs[i] = row.primaryKeyVals()
|
||||
}
|
||||
return bob.ExpressSlice(ctx, w, d, start, pkPairs, "", ", ", "")
|
||||
}))
|
||||
}
|
||||
|
||||
// copyMatchingRows finds models in the given slice that have the same primary key
|
||||
// then it first copies the existing relationships from the old model to the new model
|
||||
// and then replaces the old model in the slice with the new model
|
||||
func (o OauthTokenSlice) copyMatchingRows(from ...*OauthToken) {
|
||||
for i, old := range o {
|
||||
for _, new := range from {
|
||||
if new.ID != old.ID {
|
||||
continue
|
||||
}
|
||||
new.R = old.R
|
||||
o[i] = new
|
||||
break
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// UpdateMod modifies an update query with "WHERE primary_key IN (o...)"
|
||||
func (o OauthTokenSlice) UpdateMod() bob.Mod[*dialect.UpdateQuery] {
|
||||
return bob.ModFunc[*dialect.UpdateQuery](func(q *dialect.UpdateQuery) {
|
||||
q.AppendHooks(func(ctx context.Context, exec bob.Executor) (context.Context, error) {
|
||||
return OauthTokens.BeforeUpdateHooks.RunHooks(ctx, exec, o)
|
||||
})
|
||||
|
||||
q.AppendLoader(bob.LoaderFunc(func(ctx context.Context, exec bob.Executor, retrieved any) error {
|
||||
var err error
|
||||
switch retrieved := retrieved.(type) {
|
||||
case *OauthToken:
|
||||
o.copyMatchingRows(retrieved)
|
||||
case []*OauthToken:
|
||||
o.copyMatchingRows(retrieved...)
|
||||
case OauthTokenSlice:
|
||||
o.copyMatchingRows(retrieved...)
|
||||
default:
|
||||
// If the retrieved value is not a OauthToken or a slice of OauthToken
|
||||
// then run the AfterUpdateHooks on the slice
|
||||
_, err = OauthTokens.AfterUpdateHooks.RunHooks(ctx, exec, o)
|
||||
}
|
||||
|
||||
return err
|
||||
}))
|
||||
|
||||
q.AppendWhere(o.pkIN())
|
||||
})
|
||||
}
|
||||
|
||||
// DeleteMod modifies an delete query with "WHERE primary_key IN (o...)"
|
||||
func (o OauthTokenSlice) DeleteMod() bob.Mod[*dialect.DeleteQuery] {
|
||||
return bob.ModFunc[*dialect.DeleteQuery](func(q *dialect.DeleteQuery) {
|
||||
q.AppendHooks(func(ctx context.Context, exec bob.Executor) (context.Context, error) {
|
||||
return OauthTokens.BeforeDeleteHooks.RunHooks(ctx, exec, o)
|
||||
})
|
||||
|
||||
q.AppendLoader(bob.LoaderFunc(func(ctx context.Context, exec bob.Executor, retrieved any) error {
|
||||
var err error
|
||||
switch retrieved := retrieved.(type) {
|
||||
case *OauthToken:
|
||||
o.copyMatchingRows(retrieved)
|
||||
case []*OauthToken:
|
||||
o.copyMatchingRows(retrieved...)
|
||||
case OauthTokenSlice:
|
||||
o.copyMatchingRows(retrieved...)
|
||||
default:
|
||||
// If the retrieved value is not a OauthToken or a slice of OauthToken
|
||||
// then run the AfterDeleteHooks on the slice
|
||||
_, err = OauthTokens.AfterDeleteHooks.RunHooks(ctx, exec, o)
|
||||
}
|
||||
|
||||
return err
|
||||
}))
|
||||
|
||||
q.AppendWhere(o.pkIN())
|
||||
})
|
||||
}
|
||||
|
||||
func (o OauthTokenSlice) UpdateAll(ctx context.Context, exec bob.Executor, vals OauthTokenSetter) error {
|
||||
if len(o) == 0 {
|
||||
return nil
|
||||
}
|
||||
|
||||
_, err := OauthTokens.Update(vals.UpdateMod(), o.UpdateMod()).All(ctx, exec)
|
||||
return err
|
||||
}
|
||||
|
||||
func (o OauthTokenSlice) DeleteAll(ctx context.Context, exec bob.Executor) error {
|
||||
if len(o) == 0 {
|
||||
return nil
|
||||
}
|
||||
|
||||
_, err := OauthTokens.Delete(o.DeleteMod()).Exec(ctx, exec)
|
||||
return err
|
||||
}
|
||||
|
||||
func (o OauthTokenSlice) ReloadAll(ctx context.Context, exec bob.Executor) error {
|
||||
if len(o) == 0 {
|
||||
return nil
|
||||
}
|
||||
|
||||
o2, err := OauthTokens.Query(sm.Where(o.pkIN())).All(ctx, exec)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
o.copyMatchingRows(o2...)
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
// UserUser starts a query for related objects on user_
|
||||
func (o *OauthToken) UserUser(mods ...bob.Mod[*dialect.SelectQuery]) UsersQuery {
|
||||
return Users.Query(append(mods,
|
||||
sm.Where(Users.Columns.ID.EQ(psql.Arg(o.UserID))),
|
||||
)...)
|
||||
}
|
||||
|
||||
func (os OauthTokenSlice) UserUser(mods ...bob.Mod[*dialect.SelectQuery]) UsersQuery {
|
||||
pkUserID := make(pgtypes.Array[int32], 0, len(os))
|
||||
for _, o := range os {
|
||||
if o == nil {
|
||||
continue
|
||||
}
|
||||
pkUserID = append(pkUserID, o.UserID)
|
||||
}
|
||||
PKArgExpr := psql.Select(sm.Columns(
|
||||
psql.F("unnest", psql.Cast(psql.Arg(pkUserID), "integer[]")),
|
||||
))
|
||||
|
||||
return Users.Query(append(mods,
|
||||
sm.Where(psql.Group(Users.Columns.ID).OP("IN", PKArgExpr)),
|
||||
)...)
|
||||
}
|
||||
|
||||
func attachOauthTokenUserUser0(ctx context.Context, exec bob.Executor, count int, oauthToken0 *OauthToken, user1 *User) (*OauthToken, error) {
|
||||
setter := &OauthTokenSetter{
|
||||
UserID: omit.From(user1.ID),
|
||||
}
|
||||
|
||||
err := oauthToken0.Update(ctx, exec, setter)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("attachOauthTokenUserUser0: %w", err)
|
||||
}
|
||||
|
||||
return oauthToken0, nil
|
||||
}
|
||||
|
||||
func (oauthToken0 *OauthToken) InsertUserUser(ctx context.Context, exec bob.Executor, related *UserSetter) error {
|
||||
var err error
|
||||
|
||||
user1, err := Users.Insert(related).One(ctx, exec)
|
||||
if err != nil {
|
||||
return fmt.Errorf("inserting related objects: %w", err)
|
||||
}
|
||||
|
||||
_, err = attachOauthTokenUserUser0(ctx, exec, 1, oauthToken0, user1)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
oauthToken0.R.UserUser = user1
|
||||
|
||||
user1.R.UserOauthTokens = append(user1.R.UserOauthTokens, oauthToken0)
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
func (oauthToken0 *OauthToken) AttachUserUser(ctx context.Context, exec bob.Executor, user1 *User) error {
|
||||
var err error
|
||||
|
||||
_, err = attachOauthTokenUserUser0(ctx, exec, 1, oauthToken0, user1)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
oauthToken0.R.UserUser = user1
|
||||
|
||||
user1.R.UserOauthTokens = append(user1.R.UserOauthTokens, oauthToken0)
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
type oauthTokenWhere[Q psql.Filterable] struct {
|
||||
ID psql.WhereMod[Q, int32]
|
||||
AccessToken psql.WhereMod[Q, string]
|
||||
Expires psql.WhereMod[Q, time.Time]
|
||||
RefreshToken psql.WhereMod[Q, string]
|
||||
Username psql.WhereMod[Q, string]
|
||||
UserID psql.WhereMod[Q, int32]
|
||||
}
|
||||
|
||||
func (oauthTokenWhere[Q]) AliasedAs(alias string) oauthTokenWhere[Q] {
|
||||
return buildOauthTokenWhere[Q](buildOauthTokenColumns(alias))
|
||||
}
|
||||
|
||||
func buildOauthTokenWhere[Q psql.Filterable](cols oauthTokenColumns) oauthTokenWhere[Q] {
|
||||
return oauthTokenWhere[Q]{
|
||||
ID: psql.Where[Q, int32](cols.ID),
|
||||
AccessToken: psql.Where[Q, string](cols.AccessToken),
|
||||
Expires: psql.Where[Q, time.Time](cols.Expires),
|
||||
RefreshToken: psql.Where[Q, string](cols.RefreshToken),
|
||||
Username: psql.Where[Q, string](cols.Username),
|
||||
UserID: psql.Where[Q, int32](cols.UserID),
|
||||
}
|
||||
}
|
||||
|
||||
func (o *OauthToken) Preload(name string, retrieved any) error {
|
||||
if o == nil {
|
||||
return nil
|
||||
}
|
||||
|
||||
switch name {
|
||||
case "UserUser":
|
||||
rel, ok := retrieved.(*User)
|
||||
if !ok {
|
||||
return fmt.Errorf("oauthToken cannot load %T as %q", retrieved, name)
|
||||
}
|
||||
|
||||
o.R.UserUser = rel
|
||||
|
||||
if rel != nil {
|
||||
rel.R.UserOauthTokens = OauthTokenSlice{o}
|
||||
}
|
||||
return nil
|
||||
default:
|
||||
return fmt.Errorf("oauthToken has no relationship %q", name)
|
||||
}
|
||||
}
|
||||
|
||||
type oauthTokenPreloader struct {
|
||||
UserUser func(...psql.PreloadOption) psql.Preloader
|
||||
}
|
||||
|
||||
func buildOauthTokenPreloader() oauthTokenPreloader {
|
||||
return oauthTokenPreloader{
|
||||
UserUser: func(opts ...psql.PreloadOption) psql.Preloader {
|
||||
return psql.Preload[*User, UserSlice](psql.PreloadRel{
|
||||
Name: "UserUser",
|
||||
Sides: []psql.PreloadSide{
|
||||
{
|
||||
From: OauthTokens,
|
||||
To: Users,
|
||||
FromColumns: []string{"user_id"},
|
||||
ToColumns: []string{"id"},
|
||||
},
|
||||
},
|
||||
}, Users.Columns.Names(), opts...)
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
type oauthTokenThenLoader[Q orm.Loadable] struct {
|
||||
UserUser func(...bob.Mod[*dialect.SelectQuery]) orm.Loader[Q]
|
||||
}
|
||||
|
||||
func buildOauthTokenThenLoader[Q orm.Loadable]() oauthTokenThenLoader[Q] {
|
||||
type UserUserLoadInterface interface {
|
||||
LoadUserUser(context.Context, bob.Executor, ...bob.Mod[*dialect.SelectQuery]) error
|
||||
}
|
||||
|
||||
return oauthTokenThenLoader[Q]{
|
||||
UserUser: thenLoadBuilder[Q](
|
||||
"UserUser",
|
||||
func(ctx context.Context, exec bob.Executor, retrieved UserUserLoadInterface, mods ...bob.Mod[*dialect.SelectQuery]) error {
|
||||
return retrieved.LoadUserUser(ctx, exec, mods...)
|
||||
},
|
||||
),
|
||||
}
|
||||
}
|
||||
|
||||
// LoadUserUser loads the oauthToken's UserUser into the .R struct
|
||||
func (o *OauthToken) LoadUserUser(ctx context.Context, exec bob.Executor, mods ...bob.Mod[*dialect.SelectQuery]) error {
|
||||
if o == nil {
|
||||
return nil
|
||||
}
|
||||
|
||||
// Reset the relationship
|
||||
o.R.UserUser = nil
|
||||
|
||||
related, err := o.UserUser(mods...).One(ctx, exec)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
related.R.UserOauthTokens = OauthTokenSlice{o}
|
||||
|
||||
o.R.UserUser = related
|
||||
return nil
|
||||
}
|
||||
|
||||
// LoadUserUser loads the oauthToken's UserUser into the .R struct
|
||||
func (os OauthTokenSlice) LoadUserUser(ctx context.Context, exec bob.Executor, mods ...bob.Mod[*dialect.SelectQuery]) error {
|
||||
if len(os) == 0 {
|
||||
return nil
|
||||
}
|
||||
|
||||
users, err := os.UserUser(mods...).All(ctx, exec)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
for _, o := range os {
|
||||
if o == nil {
|
||||
continue
|
||||
}
|
||||
|
||||
for _, rel := range users {
|
||||
|
||||
if !(o.UserID == rel.ID) {
|
||||
continue
|
||||
}
|
||||
|
||||
rel.R.UserOauthTokens = append(rel.R.UserOauthTokens, o)
|
||||
|
||||
o.R.UserUser = rel
|
||||
break
|
||||
}
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
type oauthTokenJoins[Q dialect.Joinable] struct {
|
||||
typ string
|
||||
UserUser modAs[Q, userColumns]
|
||||
}
|
||||
|
||||
func (j oauthTokenJoins[Q]) aliasedAs(alias string) oauthTokenJoins[Q] {
|
||||
return buildOauthTokenJoins[Q](buildOauthTokenColumns(alias), j.typ)
|
||||
}
|
||||
|
||||
func buildOauthTokenJoins[Q dialect.Joinable](cols oauthTokenColumns, typ string) oauthTokenJoins[Q] {
|
||||
return oauthTokenJoins[Q]{
|
||||
typ: typ,
|
||||
UserUser: modAs[Q, userColumns]{
|
||||
c: Users.Columns,
|
||||
f: func(to userColumns) bob.Mod[Q] {
|
||||
mods := make(mods.QueryMods[Q], 0, 1)
|
||||
|
||||
{
|
||||
mods = append(mods, dialect.Join[Q](typ, Users.Name().As(to.Alias())).On(
|
||||
to.ID.EQ(cols.UserID),
|
||||
))
|
||||
}
|
||||
|
||||
return mods
|
||||
},
|
||||
},
|
||||
}
|
||||
}
|
||||
|
|
@ -55,7 +55,8 @@ type UsersQuery = *psql.ViewQuery[*User, UserSlice]
|
|||
|
||||
// userR is where relationships are stored.
|
||||
type userR struct {
|
||||
Organization *Organization // user_.user__organization_id_fkey
|
||||
UserOauthTokens OauthTokenSlice // oauth_token.oauth_token_user_id_fkey
|
||||
Organization *Organization // user_.user__organization_id_fkey
|
||||
}
|
||||
|
||||
func buildUserColumns(alias string) userColumns {
|
||||
|
|
@ -602,6 +603,30 @@ func (o UserSlice) ReloadAll(ctx context.Context, exec bob.Executor) error {
|
|||
return nil
|
||||
}
|
||||
|
||||
// UserOauthTokens starts a query for related objects on oauth_token
|
||||
func (o *User) UserOauthTokens(mods ...bob.Mod[*dialect.SelectQuery]) OauthTokensQuery {
|
||||
return OauthTokens.Query(append(mods,
|
||||
sm.Where(OauthTokens.Columns.UserID.EQ(psql.Arg(o.ID))),
|
||||
)...)
|
||||
}
|
||||
|
||||
func (os UserSlice) UserOauthTokens(mods ...bob.Mod[*dialect.SelectQuery]) OauthTokensQuery {
|
||||
pkID := make(pgtypes.Array[int32], 0, len(os))
|
||||
for _, o := range os {
|
||||
if o == nil {
|
||||
continue
|
||||
}
|
||||
pkID = append(pkID, o.ID)
|
||||
}
|
||||
PKArgExpr := psql.Select(sm.Columns(
|
||||
psql.F("unnest", psql.Cast(psql.Arg(pkID), "integer[]")),
|
||||
))
|
||||
|
||||
return OauthTokens.Query(append(mods,
|
||||
sm.Where(psql.Group(OauthTokens.Columns.UserID).OP("IN", PKArgExpr)),
|
||||
)...)
|
||||
}
|
||||
|
||||
// Organization starts a query for related objects on organization
|
||||
func (o *User) Organization(mods ...bob.Mod[*dialect.SelectQuery]) OrganizationsQuery {
|
||||
return Organizations.Query(append(mods,
|
||||
|
|
@ -626,6 +651,74 @@ func (os UserSlice) Organization(mods ...bob.Mod[*dialect.SelectQuery]) Organiza
|
|||
)...)
|
||||
}
|
||||
|
||||
func insertUserUserOauthTokens0(ctx context.Context, exec bob.Executor, oauthTokens1 []*OauthTokenSetter, user0 *User) (OauthTokenSlice, error) {
|
||||
for i := range oauthTokens1 {
|
||||
oauthTokens1[i].UserID = omit.From(user0.ID)
|
||||
}
|
||||
|
||||
ret, err := OauthTokens.Insert(bob.ToMods(oauthTokens1...)).All(ctx, exec)
|
||||
if err != nil {
|
||||
return ret, fmt.Errorf("insertUserUserOauthTokens0: %w", err)
|
||||
}
|
||||
|
||||
return ret, nil
|
||||
}
|
||||
|
||||
func attachUserUserOauthTokens0(ctx context.Context, exec bob.Executor, count int, oauthTokens1 OauthTokenSlice, user0 *User) (OauthTokenSlice, error) {
|
||||
setter := &OauthTokenSetter{
|
||||
UserID: omit.From(user0.ID),
|
||||
}
|
||||
|
||||
err := oauthTokens1.UpdateAll(ctx, exec, *setter)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("attachUserUserOauthTokens0: %w", err)
|
||||
}
|
||||
|
||||
return oauthTokens1, nil
|
||||
}
|
||||
|
||||
func (user0 *User) InsertUserOauthTokens(ctx context.Context, exec bob.Executor, related ...*OauthTokenSetter) error {
|
||||
if len(related) == 0 {
|
||||
return nil
|
||||
}
|
||||
|
||||
var err error
|
||||
|
||||
oauthTokens1, err := insertUserUserOauthTokens0(ctx, exec, related, user0)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
user0.R.UserOauthTokens = append(user0.R.UserOauthTokens, oauthTokens1...)
|
||||
|
||||
for _, rel := range oauthTokens1 {
|
||||
rel.R.UserUser = user0
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func (user0 *User) AttachUserOauthTokens(ctx context.Context, exec bob.Executor, related ...*OauthToken) error {
|
||||
if len(related) == 0 {
|
||||
return nil
|
||||
}
|
||||
|
||||
var err error
|
||||
oauthTokens1 := OauthTokenSlice(related)
|
||||
|
||||
_, err = attachUserUserOauthTokens0(ctx, exec, len(related), oauthTokens1, user0)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
user0.R.UserOauthTokens = append(user0.R.UserOauthTokens, oauthTokens1...)
|
||||
|
||||
for _, rel := range related {
|
||||
rel.R.UserUser = user0
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
func attachUserOrganization0(ctx context.Context, exec bob.Executor, count int, user0 *User, organization1 *Organization) (*User, error) {
|
||||
setter := &UserSetter{
|
||||
OrganizationID: omitnull.From(organization1.ID),
|
||||
|
|
@ -716,6 +809,20 @@ func (o *User) Preload(name string, retrieved any) error {
|
|||
}
|
||||
|
||||
switch name {
|
||||
case "UserOauthTokens":
|
||||
rels, ok := retrieved.(OauthTokenSlice)
|
||||
if !ok {
|
||||
return fmt.Errorf("user cannot load %T as %q", retrieved, name)
|
||||
}
|
||||
|
||||
o.R.UserOauthTokens = rels
|
||||
|
||||
for _, rel := range rels {
|
||||
if rel != nil {
|
||||
rel.R.UserUser = o
|
||||
}
|
||||
}
|
||||
return nil
|
||||
case "Organization":
|
||||
rel, ok := retrieved.(*Organization)
|
||||
if !ok {
|
||||
|
|
@ -756,15 +863,25 @@ func buildUserPreloader() userPreloader {
|
|||
}
|
||||
|
||||
type userThenLoader[Q orm.Loadable] struct {
|
||||
Organization func(...bob.Mod[*dialect.SelectQuery]) orm.Loader[Q]
|
||||
UserOauthTokens func(...bob.Mod[*dialect.SelectQuery]) orm.Loader[Q]
|
||||
Organization func(...bob.Mod[*dialect.SelectQuery]) orm.Loader[Q]
|
||||
}
|
||||
|
||||
func buildUserThenLoader[Q orm.Loadable]() userThenLoader[Q] {
|
||||
type UserOauthTokensLoadInterface interface {
|
||||
LoadUserOauthTokens(context.Context, bob.Executor, ...bob.Mod[*dialect.SelectQuery]) error
|
||||
}
|
||||
type OrganizationLoadInterface interface {
|
||||
LoadOrganization(context.Context, bob.Executor, ...bob.Mod[*dialect.SelectQuery]) error
|
||||
}
|
||||
|
||||
return userThenLoader[Q]{
|
||||
UserOauthTokens: thenLoadBuilder[Q](
|
||||
"UserOauthTokens",
|
||||
func(ctx context.Context, exec bob.Executor, retrieved UserOauthTokensLoadInterface, mods ...bob.Mod[*dialect.SelectQuery]) error {
|
||||
return retrieved.LoadUserOauthTokens(ctx, exec, mods...)
|
||||
},
|
||||
),
|
||||
Organization: thenLoadBuilder[Q](
|
||||
"Organization",
|
||||
func(ctx context.Context, exec bob.Executor, retrieved OrganizationLoadInterface, mods ...bob.Mod[*dialect.SelectQuery]) error {
|
||||
|
|
@ -774,6 +891,67 @@ func buildUserThenLoader[Q orm.Loadable]() userThenLoader[Q] {
|
|||
}
|
||||
}
|
||||
|
||||
// LoadUserOauthTokens loads the user's UserOauthTokens into the .R struct
|
||||
func (o *User) LoadUserOauthTokens(ctx context.Context, exec bob.Executor, mods ...bob.Mod[*dialect.SelectQuery]) error {
|
||||
if o == nil {
|
||||
return nil
|
||||
}
|
||||
|
||||
// Reset the relationship
|
||||
o.R.UserOauthTokens = nil
|
||||
|
||||
related, err := o.UserOauthTokens(mods...).All(ctx, exec)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
for _, rel := range related {
|
||||
rel.R.UserUser = o
|
||||
}
|
||||
|
||||
o.R.UserOauthTokens = related
|
||||
return nil
|
||||
}
|
||||
|
||||
// LoadUserOauthTokens loads the user's UserOauthTokens into the .R struct
|
||||
func (os UserSlice) LoadUserOauthTokens(ctx context.Context, exec bob.Executor, mods ...bob.Mod[*dialect.SelectQuery]) error {
|
||||
if len(os) == 0 {
|
||||
return nil
|
||||
}
|
||||
|
||||
oauthTokens, err := os.UserOauthTokens(mods...).All(ctx, exec)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
for _, o := range os {
|
||||
if o == nil {
|
||||
continue
|
||||
}
|
||||
|
||||
o.R.UserOauthTokens = nil
|
||||
}
|
||||
|
||||
for _, o := range os {
|
||||
if o == nil {
|
||||
continue
|
||||
}
|
||||
|
||||
for _, rel := range oauthTokens {
|
||||
|
||||
if !(o.ID == rel.UserID) {
|
||||
continue
|
||||
}
|
||||
|
||||
rel.R.UserUser = o
|
||||
|
||||
o.R.UserOauthTokens = append(o.R.UserOauthTokens, rel)
|
||||
}
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
// LoadOrganization loads the user's Organization into the .R struct
|
||||
func (o *User) LoadOrganization(ctx context.Context, exec bob.Executor, mods ...bob.Mod[*dialect.SelectQuery]) error {
|
||||
if o == nil {
|
||||
|
|
@ -830,8 +1008,9 @@ func (os UserSlice) LoadOrganization(ctx context.Context, exec bob.Executor, mod
|
|||
}
|
||||
|
||||
type userJoins[Q dialect.Joinable] struct {
|
||||
typ string
|
||||
Organization modAs[Q, organizationColumns]
|
||||
typ string
|
||||
UserOauthTokens modAs[Q, oauthTokenColumns]
|
||||
Organization modAs[Q, organizationColumns]
|
||||
}
|
||||
|
||||
func (j userJoins[Q]) aliasedAs(alias string) userJoins[Q] {
|
||||
|
|
@ -841,6 +1020,20 @@ func (j userJoins[Q]) aliasedAs(alias string) userJoins[Q] {
|
|||
func buildUserJoins[Q dialect.Joinable](cols userColumns, typ string) userJoins[Q] {
|
||||
return userJoins[Q]{
|
||||
typ: typ,
|
||||
UserOauthTokens: modAs[Q, oauthTokenColumns]{
|
||||
c: OauthTokens.Columns,
|
||||
f: func(to oauthTokenColumns) bob.Mod[Q] {
|
||||
mods := make(mods.QueryMods[Q], 0, 1)
|
||||
|
||||
{
|
||||
mods = append(mods, dialect.Join[Q](typ, OauthTokens.Name().As(to.Alias())).On(
|
||||
to.UserID.EQ(cols.ID),
|
||||
))
|
||||
}
|
||||
|
||||
return mods
|
||||
},
|
||||
},
|
||||
Organization: modAs[Q, organizationColumns]{
|
||||
c: Organizations.Columns,
|
||||
f: func(to organizationColumns) bob.Mod[Q] {
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue