@@ -105,7 +105,7 @@ func (d *Store) StoreClient(client *types.ClientInfo) error {
105105
106106// StoreGrant stores a new grant
107107func (d * Store ) StoreGrant (grant * types.Grant ) error {
108- // Convert []string to StringSlice and map[string]interface{} to JSON for GORM
108+ // Convert []string to StringSlice and map[string]any to JSON for GORM
109109 gormGrant := & types.Grant {
110110 ID : grant .ID ,
111111 ClientID : grant .ClientID ,
@@ -157,8 +157,8 @@ func (d *Store) GetGrant(grantID, userID string) (*types.Grant, error) {
157157 ClientID : grant .ClientID ,
158158 UserID : grant .UserID ,
159159 Scope : []string (grant .Scope ),
160- Metadata : map [string ]interface {} (grant .Metadata ),
161- Props : map [string ]interface {} (grant .Props ),
160+ Metadata : map [string ]any (grant .Metadata ),
161+ Props : map [string ]any (grant .Props ),
162162 CreatedAt : grant .CreatedAt ,
163163 ExpiresAt : grant .ExpiresAt ,
164164 CodeChallenge : grant .CodeChallenge ,
@@ -275,7 +275,7 @@ func (d *Store) RevokeToken(token string) error {
275275 now := time .Now ()
276276
277277 // First try to revoke as access token
278- result := d .db .Model (& types.TokenData {}).Where ("access_token = ?" , hashedToken ).Updates (map [string ]interface {} {
278+ result := d .db .Model (& types.TokenData {}).Where ("access_token = ?" , hashedToken ).Updates (map [string ]any {
279279 "revoked" : true ,
280280 "revoked_at" : & now ,
281281 })
@@ -288,7 +288,7 @@ func (d *Store) RevokeToken(token string) error {
288288 }
289289
290290 // If not found as access token, try as refresh token
291- result = d .db .Model (& types.TokenData {}).Where ("refresh_token = ?" , hashedToken ).Updates (map [string ]interface {} {
291+ result = d .db .Model (& types.TokenData {}).Where ("refresh_token = ?" , hashedToken ).Updates (map [string ]any {
292292 "revoked" : true ,
293293 "revoked_at" : & now ,
294294 })
@@ -344,7 +344,7 @@ func (d *Store) CleanupExpiredTokens() error {
344344}
345345
346346// StoreAuthRequest stores an authorization request with a 15-minute TTL
347- func (d * Store ) StoreAuthRequest (key string , data map [string ]interface {} ) error {
347+ func (d * Store ) StoreAuthRequest (key string , data map [string ]any ) error {
348348 authRequest := & types.StoredAuthRequest {
349349 Key : key ,
350350 Data : types .JSON (data ),
@@ -354,15 +354,15 @@ func (d *Store) StoreAuthRequest(key string, data map[string]interface{}) error
354354}
355355
356356// GetAuthRequest retrieves an authorization request by key and checks TTL
357- func (d * Store ) GetAuthRequest (key string ) (map [string ]interface {} , error ) {
357+ func (d * Store ) GetAuthRequest (key string ) (map [string ]any , error ) {
358358 var authRequest types.StoredAuthRequest
359359 err := d .db .First (& authRequest , "key = ? AND expires_at > ?" , key , time .Now ()).Error
360360 if err != nil {
361361 return nil , err
362362 }
363363
364364 // Convert JSON back to map
365- return map [string ]interface {} (authRequest .Data ), nil
365+ return map [string ]any (authRequest .Data ), nil
366366}
367367
368368// DeleteAuthRequest deletes an authorization request by key
0 commit comments