// Code generated by BobGen mysql v0.42.0. DO NOT EDIT. // This file is meant to be re-generated in place and/or deleted at any time. package models import ( "context" "fmt" "io" "time" "github.com/aarondl/opt/null" "github.com/aarondl/opt/omit" "github.com/aarondl/opt/omitnull" "github.com/stephenafamo/bob" "github.com/stephenafamo/bob/dialect/mysql" "github.com/stephenafamo/bob/dialect/mysql/dialect" "github.com/stephenafamo/bob/dialect/mysql/dm" "github.com/stephenafamo/bob/dialect/mysql/sm" "github.com/stephenafamo/bob/dialect/mysql/um" "github.com/stephenafamo/bob/expr" "github.com/stephenafamo/bob/mods" "github.com/stephenafamo/bob/orm" ) // AuthUser is an object representing the database table. type AuthUser struct { ID int32 `db:"id,pk,autoincr" ` Password string `db:"password" ` LastLogin null.Val[time.Time] `db:"last_login" ` IsSuperuser bool `db:"is_superuser" ` Username string `db:"username" ` FirstName string `db:"first_name" ` LastName string `db:"last_name" ` Email string `db:"email" ` IsStaff bool `db:"is_staff" ` IsActive bool `db:"is_active" ` DateJoined time.Time `db:"date_joined" ` R authUserR `db:"-" ` } // AuthUserSlice is an alias for a slice of pointers to AuthUser. // This should almost always be used instead of []*AuthUser. type AuthUserSlice []*AuthUser // AuthUsers contains methods to work with the auth_user table var AuthUsers = mysql.NewTablex[*AuthUser, AuthUserSlice, *AuthUserSetter]("auth_user", buildAuthUserColumns("auth_user"), []string{"id"}, []string{"username"}) // AuthUsersQuery is a query on the auth_user table type AuthUsersQuery = *mysql.ViewQuery[*AuthUser, AuthUserSlice] // authUserR is where relationships are stored. type authUserR struct { UserAuthUserGroups AuthUserGroupSlice // auth_user_groups_user_id_6a12ed8b_fk_auth_user_id UserAuthUserUserPermissions AuthUserUserPermissionSlice // auth_user_user_permissions_user_id_a95ead1b_fk_auth_user_id UserDjangoAdminLogs DjangoAdminLogSlice // django_admin_log_user_id_c564eba6_fk_auth_user_id AdminIDLocationsEvents LocationsEventSlice // locations_event_admin_id_id_4a50d36a_fk_auth_user_id UserTastypieApikey *TastypieApikey // tastypie_apikey_user_id_8c8fa920_fk_auth_user_id } func buildAuthUserColumns(alias string) authUserColumns { return authUserColumns{ ColumnsExpr: expr.NewColumnsExpr( "id", "password", "last_login", "is_superuser", "username", "first_name", "last_name", "email", "is_staff", "is_active", "date_joined", ).WithParent("auth_user"), tableAlias: alias, ID: mysql.Quote(alias, "id"), Password: mysql.Quote(alias, "password"), LastLogin: mysql.Quote(alias, "last_login"), IsSuperuser: mysql.Quote(alias, "is_superuser"), Username: mysql.Quote(alias, "username"), FirstName: mysql.Quote(alias, "first_name"), LastName: mysql.Quote(alias, "last_name"), Email: mysql.Quote(alias, "email"), IsStaff: mysql.Quote(alias, "is_staff"), IsActive: mysql.Quote(alias, "is_active"), DateJoined: mysql.Quote(alias, "date_joined"), } } type authUserColumns struct { expr.ColumnsExpr tableAlias string ID mysql.Expression Password mysql.Expression LastLogin mysql.Expression IsSuperuser mysql.Expression Username mysql.Expression FirstName mysql.Expression LastName mysql.Expression Email mysql.Expression IsStaff mysql.Expression IsActive mysql.Expression DateJoined mysql.Expression } func (c authUserColumns) Alias() string { return c.tableAlias } func (authUserColumns) AliasedAs(alias string) authUserColumns { return buildAuthUserColumns(alias) } // AuthUserSetter is used for insert/upsert/update operations // All values are optional, and do not have to be set // Generated columns are not included type AuthUserSetter struct { ID omit.Val[int32] `db:"id,pk,autoincr" ` Password omit.Val[string] `db:"password" ` LastLogin omitnull.Val[time.Time] `db:"last_login" ` IsSuperuser omit.Val[bool] `db:"is_superuser" ` Username omit.Val[string] `db:"username" ` FirstName omit.Val[string] `db:"first_name" ` LastName omit.Val[string] `db:"last_name" ` Email omit.Val[string] `db:"email" ` IsStaff omit.Val[bool] `db:"is_staff" ` IsActive omit.Val[bool] `db:"is_active" ` DateJoined omit.Val[time.Time] `db:"date_joined" ` } func (s AuthUserSetter) SetColumns() []string { vals := make([]string, 0, 11) if s.ID.IsValue() { vals = append(vals, "id") } if s.Password.IsValue() { vals = append(vals, "password") } if !s.LastLogin.IsUnset() { vals = append(vals, "last_login") } if s.IsSuperuser.IsValue() { vals = append(vals, "is_superuser") } if s.Username.IsValue() { vals = append(vals, "username") } if s.FirstName.IsValue() { vals = append(vals, "first_name") } if s.LastName.IsValue() { vals = append(vals, "last_name") } if s.Email.IsValue() { vals = append(vals, "email") } if s.IsStaff.IsValue() { vals = append(vals, "is_staff") } if s.IsActive.IsValue() { vals = append(vals, "is_active") } if s.DateJoined.IsValue() { vals = append(vals, "date_joined") } return vals } func (s AuthUserSetter) Overwrite(t *AuthUser) { if s.ID.IsValue() { t.ID = s.ID.MustGet() } if s.Password.IsValue() { t.Password = s.Password.MustGet() } if !s.LastLogin.IsUnset() { t.LastLogin = s.LastLogin.MustGetNull() } if s.IsSuperuser.IsValue() { t.IsSuperuser = s.IsSuperuser.MustGet() } if s.Username.IsValue() { t.Username = s.Username.MustGet() } if s.FirstName.IsValue() { t.FirstName = s.FirstName.MustGet() } if s.LastName.IsValue() { t.LastName = s.LastName.MustGet() } if s.Email.IsValue() { t.Email = s.Email.MustGet() } if s.IsStaff.IsValue() { t.IsStaff = s.IsStaff.MustGet() } if s.IsActive.IsValue() { t.IsActive = s.IsActive.MustGet() } if s.DateJoined.IsValue() { t.DateJoined = s.DateJoined.MustGet() } } func (s *AuthUserSetter) Apply(q *dialect.InsertQuery) { q.AppendHooks(func(ctx context.Context, exec bob.Executor) (context.Context, error) { return AuthUsers.BeforeInsertHooks.RunHooks(ctx, exec, s) }) q.AppendValues( bob.ExpressionFunc(func(ctx context.Context, w io.StringWriter, d bob.Dialect, start int) ([]any, error) { if !(s.ID.IsValue()) { return mysql.Raw("DEFAULT").WriteSQL(ctx, w, d, start) } return mysql.Arg(s.ID.MustGet()).WriteSQL(ctx, w, d, start) }), bob.ExpressionFunc(func(ctx context.Context, w io.StringWriter, d bob.Dialect, start int) ([]any, error) { if !(s.Password.IsValue()) { return mysql.Raw("DEFAULT").WriteSQL(ctx, w, d, start) } return mysql.Arg(s.Password.MustGet()).WriteSQL(ctx, w, d, start) }), bob.ExpressionFunc(func(ctx context.Context, w io.StringWriter, d bob.Dialect, start int) ([]any, error) { if !(!s.LastLogin.IsUnset()) { return mysql.Raw("DEFAULT").WriteSQL(ctx, w, d, start) } return mysql.Arg(s.LastLogin.MustGetNull()).WriteSQL(ctx, w, d, start) }), bob.ExpressionFunc(func(ctx context.Context, w io.StringWriter, d bob.Dialect, start int) ([]any, error) { if !(s.IsSuperuser.IsValue()) { return mysql.Raw("DEFAULT").WriteSQL(ctx, w, d, start) } return mysql.Arg(s.IsSuperuser.MustGet()).WriteSQL(ctx, w, d, start) }), bob.ExpressionFunc(func(ctx context.Context, w io.StringWriter, d bob.Dialect, start int) ([]any, error) { if !(s.Username.IsValue()) { return mysql.Raw("DEFAULT").WriteSQL(ctx, w, d, start) } return mysql.Arg(s.Username.MustGet()).WriteSQL(ctx, w, d, start) }), bob.ExpressionFunc(func(ctx context.Context, w io.StringWriter, d bob.Dialect, start int) ([]any, error) { if !(s.FirstName.IsValue()) { return mysql.Raw("DEFAULT").WriteSQL(ctx, w, d, start) } return mysql.Arg(s.FirstName.MustGet()).WriteSQL(ctx, w, d, start) }), bob.ExpressionFunc(func(ctx context.Context, w io.StringWriter, d bob.Dialect, start int) ([]any, error) { if !(s.LastName.IsValue()) { return mysql.Raw("DEFAULT").WriteSQL(ctx, w, d, start) } return mysql.Arg(s.LastName.MustGet()).WriteSQL(ctx, w, d, start) }), bob.ExpressionFunc(func(ctx context.Context, w io.StringWriter, d bob.Dialect, start int) ([]any, error) { if !(s.Email.IsValue()) { return mysql.Raw("DEFAULT").WriteSQL(ctx, w, d, start) } return mysql.Arg(s.Email.MustGet()).WriteSQL(ctx, w, d, start) }), bob.ExpressionFunc(func(ctx context.Context, w io.StringWriter, d bob.Dialect, start int) ([]any, error) { if !(s.IsStaff.IsValue()) { return mysql.Raw("DEFAULT").WriteSQL(ctx, w, d, start) } return mysql.Arg(s.IsStaff.MustGet()).WriteSQL(ctx, w, d, start) }), bob.ExpressionFunc(func(ctx context.Context, w io.StringWriter, d bob.Dialect, start int) ([]any, error) { if !(s.IsActive.IsValue()) { return mysql.Raw("DEFAULT").WriteSQL(ctx, w, d, start) } return mysql.Arg(s.IsActive.MustGet()).WriteSQL(ctx, w, d, start) }), bob.ExpressionFunc(func(ctx context.Context, w io.StringWriter, d bob.Dialect, start int) ([]any, error) { if !(s.DateJoined.IsValue()) { return mysql.Raw("DEFAULT").WriteSQL(ctx, w, d, start) } return mysql.Arg(s.DateJoined.MustGet()).WriteSQL(ctx, w, d, start) })) } func (s AuthUserSetter) UpdateMod() bob.Mod[*dialect.UpdateQuery] { return um.Set(s.Expressions("auth_user")...) } func (s AuthUserSetter) Expressions(prefix ...string) []bob.Expression { exprs := make([]bob.Expression, 0, 11) if s.ID.IsValue() { exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{ mysql.Quote(append(prefix, "id")...), mysql.Arg(s.ID), }}) } if s.Password.IsValue() { exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{ mysql.Quote(append(prefix, "password")...), mysql.Arg(s.Password), }}) } if !s.LastLogin.IsUnset() { exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{ mysql.Quote(append(prefix, "last_login")...), mysql.Arg(s.LastLogin), }}) } if s.IsSuperuser.IsValue() { exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{ mysql.Quote(append(prefix, "is_superuser")...), mysql.Arg(s.IsSuperuser), }}) } if s.Username.IsValue() { exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{ mysql.Quote(append(prefix, "username")...), mysql.Arg(s.Username), }}) } if s.FirstName.IsValue() { exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{ mysql.Quote(append(prefix, "first_name")...), mysql.Arg(s.FirstName), }}) } if s.LastName.IsValue() { exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{ mysql.Quote(append(prefix, "last_name")...), mysql.Arg(s.LastName), }}) } if s.Email.IsValue() { exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{ mysql.Quote(append(prefix, "email")...), mysql.Arg(s.Email), }}) } if s.IsStaff.IsValue() { exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{ mysql.Quote(append(prefix, "is_staff")...), mysql.Arg(s.IsStaff), }}) } if s.IsActive.IsValue() { exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{ mysql.Quote(append(prefix, "is_active")...), mysql.Arg(s.IsActive), }}) } if s.DateJoined.IsValue() { exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{ mysql.Quote(append(prefix, "date_joined")...), mysql.Arg(s.DateJoined), }}) } return exprs } // FindAuthUser retrieves a single record by primary key // If cols is empty Find will return all columns. func FindAuthUser(ctx context.Context, exec bob.Executor, IDPK int32, cols ...string) (*AuthUser, error) { if len(cols) == 0 { return AuthUsers.Query( sm.Where(AuthUsers.Columns.ID.EQ(mysql.Arg(IDPK))), ).One(ctx, exec) } return AuthUsers.Query( sm.Where(AuthUsers.Columns.ID.EQ(mysql.Arg(IDPK))), sm.Columns(AuthUsers.Columns.Only(cols...)), ).One(ctx, exec) } // AuthUserExists checks the presence of a single record by primary key func AuthUserExists(ctx context.Context, exec bob.Executor, IDPK int32) (bool, error) { return AuthUsers.Query( sm.Where(AuthUsers.Columns.ID.EQ(mysql.Arg(IDPK))), ).Exists(ctx, exec) } // AfterQueryHook is called after AuthUser is retrieved from the database func (o *AuthUser) AfterQueryHook(ctx context.Context, exec bob.Executor, queryType bob.QueryType) error { var err error switch queryType { case bob.QueryTypeSelect: ctx, err = AuthUsers.AfterSelectHooks.RunHooks(ctx, exec, AuthUserSlice{o}) case bob.QueryTypeInsert: ctx, err = AuthUsers.AfterInsertHooks.RunHooks(ctx, exec, AuthUserSlice{o}) case bob.QueryTypeUpdate: ctx, err = AuthUsers.AfterUpdateHooks.RunHooks(ctx, exec, AuthUserSlice{o}) case bob.QueryTypeDelete: ctx, err = AuthUsers.AfterDeleteHooks.RunHooks(ctx, exec, AuthUserSlice{o}) } return err } // primaryKeyVals returns the primary key values of the AuthUser func (o *AuthUser) primaryKeyVals() bob.Expression { return mysql.Arg(o.ID) } func (o *AuthUser) pkEQ() dialect.Expression { return mysql.Quote("auth_user", "id").EQ(bob.ExpressionFunc(func(ctx context.Context, w io.StringWriter, d bob.Dialect, start int) ([]any, error) { return o.primaryKeyVals().WriteSQL(ctx, w, d, start) })) } // Update uses an executor to update the AuthUser func (o *AuthUser) Update(ctx context.Context, exec bob.Executor, s *AuthUserSetter) error { _, err := AuthUsers.Update(s.UpdateMod(), um.Where(o.pkEQ())).Exec(ctx, exec) if err != nil { return err } s.Overwrite(o) return nil } // Delete deletes a single AuthUser record with an executor func (o *AuthUser) Delete(ctx context.Context, exec bob.Executor) error { _, err := AuthUsers.Delete(dm.Where(o.pkEQ())).Exec(ctx, exec) return err } // Reload refreshes the AuthUser using the executor func (o *AuthUser) Reload(ctx context.Context, exec bob.Executor) error { o2, err := AuthUsers.Query( sm.Where(AuthUsers.Columns.ID.EQ(mysql.Arg(o.ID))), ).One(ctx, exec) if err != nil { return err } o2.R = o.R *o = *o2 return nil } // AfterQueryHook is called after AuthUserSlice is retrieved from the database func (o AuthUserSlice) AfterQueryHook(ctx context.Context, exec bob.Executor, queryType bob.QueryType) error { var err error switch queryType { case bob.QueryTypeSelect: ctx, err = AuthUsers.AfterSelectHooks.RunHooks(ctx, exec, o) case bob.QueryTypeInsert: ctx, err = AuthUsers.AfterInsertHooks.RunHooks(ctx, exec, o) case bob.QueryTypeUpdate: ctx, err = AuthUsers.AfterUpdateHooks.RunHooks(ctx, exec, o) case bob.QueryTypeDelete: ctx, err = AuthUsers.AfterDeleteHooks.RunHooks(ctx, exec, o) } return err } func (o AuthUserSlice) pkIN() dialect.Expression { if len(o) == 0 { return mysql.Raw("NULL") } return mysql.Quote("auth_user", "id").In(bob.ExpressionFunc(func(ctx context.Context, w io.StringWriter, d bob.Dialect, start int) ([]any, error) { pkPairs := make([]bob.Expression, len(o)) for i, row := range o { pkPairs[i] = row.primaryKeyVals() } return bob.ExpressSlice(ctx, w, d, start, pkPairs, "", ", ", "") })) } // copyMatchingRows finds models in the given slice that have the same primary key // then it first copies the existing relationships from the old model to the new model // and then replaces the old model in the slice with the new model func (o AuthUserSlice) copyMatchingRows(from ...*AuthUser) { for i, old := range o { for _, new := range from { if new.ID != old.ID { continue } new.R = old.R o[i] = new break } } } // UpdateMod modifies an update query with "WHERE primary_key IN (o...)" func (o AuthUserSlice) UpdateMod() bob.Mod[*dialect.UpdateQuery] { return bob.ModFunc[*dialect.UpdateQuery](func(q *dialect.UpdateQuery) { q.AppendHooks(func(ctx context.Context, exec bob.Executor) (context.Context, error) { return AuthUsers.BeforeUpdateHooks.RunHooks(ctx, exec, o) }) q.AppendLoader(bob.LoaderFunc(func(ctx context.Context, exec bob.Executor, retrieved any) error { var err error switch retrieved := retrieved.(type) { case *AuthUser: o.copyMatchingRows(retrieved) case []*AuthUser: o.copyMatchingRows(retrieved...) case AuthUserSlice: o.copyMatchingRows(retrieved...) default: // If the retrieved value is not a AuthUser or a slice of AuthUser // then run the AfterUpdateHooks on the slice _, err = AuthUsers.AfterUpdateHooks.RunHooks(ctx, exec, o) } return err })) q.AppendWhere(o.pkIN()) }) } // DeleteMod modifies an delete query with "WHERE primary_key IN (o...)" func (o AuthUserSlice) DeleteMod() bob.Mod[*dialect.DeleteQuery] { return bob.ModFunc[*dialect.DeleteQuery](func(q *dialect.DeleteQuery) { q.AppendHooks(func(ctx context.Context, exec bob.Executor) (context.Context, error) { return AuthUsers.BeforeDeleteHooks.RunHooks(ctx, exec, o) }) q.AppendLoader(bob.LoaderFunc(func(ctx context.Context, exec bob.Executor, retrieved any) error { var err error switch retrieved := retrieved.(type) { case *AuthUser: o.copyMatchingRows(retrieved) case []*AuthUser: o.copyMatchingRows(retrieved...) case AuthUserSlice: o.copyMatchingRows(retrieved...) default: // If the retrieved value is not a AuthUser or a slice of AuthUser // then run the AfterDeleteHooks on the slice _, err = AuthUsers.AfterDeleteHooks.RunHooks(ctx, exec, o) } return err })) q.AppendWhere(o.pkIN()) }) } func (o AuthUserSlice) UpdateAll(ctx context.Context, exec bob.Executor, vals AuthUserSetter) error { _, err := AuthUsers.Update(vals.UpdateMod(), o.UpdateMod()).Exec(ctx, exec) for i := range o { vals.Overwrite(o[i]) } return err } func (o AuthUserSlice) DeleteAll(ctx context.Context, exec bob.Executor) error { if len(o) == 0 { return nil } _, err := AuthUsers.Delete(o.DeleteMod()).Exec(ctx, exec) return err } func (o AuthUserSlice) ReloadAll(ctx context.Context, exec bob.Executor) error { if len(o) == 0 { return nil } o2, err := AuthUsers.Query(sm.Where(o.pkIN())).All(ctx, exec) if err != nil { return err } o.copyMatchingRows(o2...) return nil } // UserAuthUserGroups starts a query for related objects on auth_user_groups func (o *AuthUser) UserAuthUserGroups(mods ...bob.Mod[*dialect.SelectQuery]) AuthUserGroupsQuery { return AuthUserGroups.Query(append(mods, sm.Where(AuthUserGroups.Columns.UserID.EQ(mysql.Arg(o.ID))), )...) } func (os AuthUserSlice) UserAuthUserGroups(mods ...bob.Mod[*dialect.SelectQuery]) AuthUserGroupsQuery { PKArgSlice := make([]bob.Expression, len(os)) for i, o := range os { PKArgSlice[i] = mysql.ArgGroup(o.ID) } PKArgExpr := mysql.Group(PKArgSlice...) return AuthUserGroups.Query(append(mods, sm.Where(mysql.Group(AuthUserGroups.Columns.UserID).OP("IN", PKArgExpr)), )...) } // UserAuthUserUserPermissions starts a query for related objects on auth_user_user_permissions func (o *AuthUser) UserAuthUserUserPermissions(mods ...bob.Mod[*dialect.SelectQuery]) AuthUserUserPermissionsQuery { return AuthUserUserPermissions.Query(append(mods, sm.Where(AuthUserUserPermissions.Columns.UserID.EQ(mysql.Arg(o.ID))), )...) } func (os AuthUserSlice) UserAuthUserUserPermissions(mods ...bob.Mod[*dialect.SelectQuery]) AuthUserUserPermissionsQuery { PKArgSlice := make([]bob.Expression, len(os)) for i, o := range os { PKArgSlice[i] = mysql.ArgGroup(o.ID) } PKArgExpr := mysql.Group(PKArgSlice...) return AuthUserUserPermissions.Query(append(mods, sm.Where(mysql.Group(AuthUserUserPermissions.Columns.UserID).OP("IN", PKArgExpr)), )...) } // UserDjangoAdminLogs starts a query for related objects on django_admin_log func (o *AuthUser) UserDjangoAdminLogs(mods ...bob.Mod[*dialect.SelectQuery]) DjangoAdminLogsQuery { return DjangoAdminLogs.Query(append(mods, sm.Where(DjangoAdminLogs.Columns.UserID.EQ(mysql.Arg(o.ID))), )...) } func (os AuthUserSlice) UserDjangoAdminLogs(mods ...bob.Mod[*dialect.SelectQuery]) DjangoAdminLogsQuery { PKArgSlice := make([]bob.Expression, len(os)) for i, o := range os { PKArgSlice[i] = mysql.ArgGroup(o.ID) } PKArgExpr := mysql.Group(PKArgSlice...) return DjangoAdminLogs.Query(append(mods, sm.Where(mysql.Group(DjangoAdminLogs.Columns.UserID).OP("IN", PKArgExpr)), )...) } // AdminIDLocationsEvents starts a query for related objects on locations_event func (o *AuthUser) AdminIDLocationsEvents(mods ...bob.Mod[*dialect.SelectQuery]) LocationsEventsQuery { return LocationsEvents.Query(append(mods, sm.Where(LocationsEvents.Columns.AdminIDID.EQ(mysql.Arg(o.ID))), )...) } func (os AuthUserSlice) AdminIDLocationsEvents(mods ...bob.Mod[*dialect.SelectQuery]) LocationsEventsQuery { PKArgSlice := make([]bob.Expression, len(os)) for i, o := range os { PKArgSlice[i] = mysql.ArgGroup(o.ID) } PKArgExpr := mysql.Group(PKArgSlice...) return LocationsEvents.Query(append(mods, sm.Where(mysql.Group(LocationsEvents.Columns.AdminIDID).OP("IN", PKArgExpr)), )...) } // UserTastypieApikey starts a query for related objects on tastypie_apikey func (o *AuthUser) UserTastypieApikey(mods ...bob.Mod[*dialect.SelectQuery]) TastypieApikeysQuery { return TastypieApikeys.Query(append(mods, sm.Where(TastypieApikeys.Columns.UserID.EQ(mysql.Arg(o.ID))), )...) } func (os AuthUserSlice) UserTastypieApikey(mods ...bob.Mod[*dialect.SelectQuery]) TastypieApikeysQuery { PKArgSlice := make([]bob.Expression, len(os)) for i, o := range os { PKArgSlice[i] = mysql.ArgGroup(o.ID) } PKArgExpr := mysql.Group(PKArgSlice...) return TastypieApikeys.Query(append(mods, sm.Where(mysql.Group(TastypieApikeys.Columns.UserID).OP("IN", PKArgExpr)), )...) } func insertAuthUserUserAuthUserGroups0(ctx context.Context, exec bob.Executor, authUserGroups1 []*AuthUserGroupSetter, authUser0 *AuthUser) (AuthUserGroupSlice, error) { for i := range authUserGroups1 { authUserGroups1[i].UserID = omit.From(authUser0.ID) } ret, err := AuthUserGroups.Insert(bob.ToMods(authUserGroups1...)).All(ctx, exec) if err != nil { return ret, fmt.Errorf("insertAuthUserUserAuthUserGroups0: %w", err) } return ret, nil } func attachAuthUserUserAuthUserGroups0(ctx context.Context, exec bob.Executor, count int, authUserGroups1 AuthUserGroupSlice, authUser0 *AuthUser) (AuthUserGroupSlice, error) { setter := &AuthUserGroupSetter{ UserID: omit.From(authUser0.ID), } err := authUserGroups1.UpdateAll(ctx, exec, *setter) if err != nil { return nil, fmt.Errorf("attachAuthUserUserAuthUserGroups0: %w", err) } return authUserGroups1, nil } func (authUser0 *AuthUser) InsertUserAuthUserGroups(ctx context.Context, exec bob.Executor, related ...*AuthUserGroupSetter) error { if len(related) == 0 { return nil } var err error authUserGroups1, err := insertAuthUserUserAuthUserGroups0(ctx, exec, related, authUser0) if err != nil { return err } authUser0.R.UserAuthUserGroups = append(authUser0.R.UserAuthUserGroups, authUserGroups1...) for _, rel := range authUserGroups1 { rel.R.UserAuthUser = authUser0 } return nil } func (authUser0 *AuthUser) AttachUserAuthUserGroups(ctx context.Context, exec bob.Executor, related ...*AuthUserGroup) error { if len(related) == 0 { return nil } var err error authUserGroups1 := AuthUserGroupSlice(related) _, err = attachAuthUserUserAuthUserGroups0(ctx, exec, len(related), authUserGroups1, authUser0) if err != nil { return err } authUser0.R.UserAuthUserGroups = append(authUser0.R.UserAuthUserGroups, authUserGroups1...) for _, rel := range related { rel.R.UserAuthUser = authUser0 } return nil } func insertAuthUserUserAuthUserUserPermissions0(ctx context.Context, exec bob.Executor, authUserUserPermissions1 []*AuthUserUserPermissionSetter, authUser0 *AuthUser) (AuthUserUserPermissionSlice, error) { for i := range authUserUserPermissions1 { authUserUserPermissions1[i].UserID = omit.From(authUser0.ID) } ret, err := AuthUserUserPermissions.Insert(bob.ToMods(authUserUserPermissions1...)).All(ctx, exec) if err != nil { return ret, fmt.Errorf("insertAuthUserUserAuthUserUserPermissions0: %w", err) } return ret, nil } func attachAuthUserUserAuthUserUserPermissions0(ctx context.Context, exec bob.Executor, count int, authUserUserPermissions1 AuthUserUserPermissionSlice, authUser0 *AuthUser) (AuthUserUserPermissionSlice, error) { setter := &AuthUserUserPermissionSetter{ UserID: omit.From(authUser0.ID), } err := authUserUserPermissions1.UpdateAll(ctx, exec, *setter) if err != nil { return nil, fmt.Errorf("attachAuthUserUserAuthUserUserPermissions0: %w", err) } return authUserUserPermissions1, nil } func (authUser0 *AuthUser) InsertUserAuthUserUserPermissions(ctx context.Context, exec bob.Executor, related ...*AuthUserUserPermissionSetter) error { if len(related) == 0 { return nil } var err error authUserUserPermissions1, err := insertAuthUserUserAuthUserUserPermissions0(ctx, exec, related, authUser0) if err != nil { return err } authUser0.R.UserAuthUserUserPermissions = append(authUser0.R.UserAuthUserUserPermissions, authUserUserPermissions1...) for _, rel := range authUserUserPermissions1 { rel.R.UserAuthUser = authUser0 } return nil } func (authUser0 *AuthUser) AttachUserAuthUserUserPermissions(ctx context.Context, exec bob.Executor, related ...*AuthUserUserPermission) error { if len(related) == 0 { return nil } var err error authUserUserPermissions1 := AuthUserUserPermissionSlice(related) _, err = attachAuthUserUserAuthUserUserPermissions0(ctx, exec, len(related), authUserUserPermissions1, authUser0) if err != nil { return err } authUser0.R.UserAuthUserUserPermissions = append(authUser0.R.UserAuthUserUserPermissions, authUserUserPermissions1...) for _, rel := range related { rel.R.UserAuthUser = authUser0 } return nil } func insertAuthUserUserDjangoAdminLogs0(ctx context.Context, exec bob.Executor, djangoAdminLogs1 []*DjangoAdminLogSetter, authUser0 *AuthUser) (DjangoAdminLogSlice, error) { for i := range djangoAdminLogs1 { djangoAdminLogs1[i].UserID = omit.From(authUser0.ID) } ret, err := DjangoAdminLogs.Insert(bob.ToMods(djangoAdminLogs1...)).All(ctx, exec) if err != nil { return ret, fmt.Errorf("insertAuthUserUserDjangoAdminLogs0: %w", err) } return ret, nil } func attachAuthUserUserDjangoAdminLogs0(ctx context.Context, exec bob.Executor, count int, djangoAdminLogs1 DjangoAdminLogSlice, authUser0 *AuthUser) (DjangoAdminLogSlice, error) { setter := &DjangoAdminLogSetter{ UserID: omit.From(authUser0.ID), } err := djangoAdminLogs1.UpdateAll(ctx, exec, *setter) if err != nil { return nil, fmt.Errorf("attachAuthUserUserDjangoAdminLogs0: %w", err) } return djangoAdminLogs1, nil } func (authUser0 *AuthUser) InsertUserDjangoAdminLogs(ctx context.Context, exec bob.Executor, related ...*DjangoAdminLogSetter) error { if len(related) == 0 { return nil } var err error djangoAdminLogs1, err := insertAuthUserUserDjangoAdminLogs0(ctx, exec, related, authUser0) if err != nil { return err } authUser0.R.UserDjangoAdminLogs = append(authUser0.R.UserDjangoAdminLogs, djangoAdminLogs1...) for _, rel := range djangoAdminLogs1 { rel.R.UserAuthUser = authUser0 } return nil } func (authUser0 *AuthUser) AttachUserDjangoAdminLogs(ctx context.Context, exec bob.Executor, related ...*DjangoAdminLog) error { if len(related) == 0 { return nil } var err error djangoAdminLogs1 := DjangoAdminLogSlice(related) _, err = attachAuthUserUserDjangoAdminLogs0(ctx, exec, len(related), djangoAdminLogs1, authUser0) if err != nil { return err } authUser0.R.UserDjangoAdminLogs = append(authUser0.R.UserDjangoAdminLogs, djangoAdminLogs1...) for _, rel := range related { rel.R.UserAuthUser = authUser0 } return nil } func insertAuthUserAdminIDLocationsEvents0(ctx context.Context, exec bob.Executor, locationsEvents1 []*LocationsEventSetter, authUser0 *AuthUser) (LocationsEventSlice, error) { for i := range locationsEvents1 { locationsEvents1[i].AdminIDID = omitnull.From(authUser0.ID) } ret, err := LocationsEvents.Insert(bob.ToMods(locationsEvents1...)).All(ctx, exec) if err != nil { return ret, fmt.Errorf("insertAuthUserAdminIDLocationsEvents0: %w", err) } return ret, nil } func attachAuthUserAdminIDLocationsEvents0(ctx context.Context, exec bob.Executor, count int, locationsEvents1 LocationsEventSlice, authUser0 *AuthUser) (LocationsEventSlice, error) { setter := &LocationsEventSetter{ AdminIDID: omitnull.From(authUser0.ID), } err := locationsEvents1.UpdateAll(ctx, exec, *setter) if err != nil { return nil, fmt.Errorf("attachAuthUserAdminIDLocationsEvents0: %w", err) } return locationsEvents1, nil } func (authUser0 *AuthUser) InsertAdminIDLocationsEvents(ctx context.Context, exec bob.Executor, related ...*LocationsEventSetter) error { if len(related) == 0 { return nil } var err error locationsEvents1, err := insertAuthUserAdminIDLocationsEvents0(ctx, exec, related, authUser0) if err != nil { return err } authUser0.R.AdminIDLocationsEvents = append(authUser0.R.AdminIDLocationsEvents, locationsEvents1...) for _, rel := range locationsEvents1 { rel.R.AdminIDAuthUser = authUser0 } return nil } func (authUser0 *AuthUser) AttachAdminIDLocationsEvents(ctx context.Context, exec bob.Executor, related ...*LocationsEvent) error { if len(related) == 0 { return nil } var err error locationsEvents1 := LocationsEventSlice(related) _, err = attachAuthUserAdminIDLocationsEvents0(ctx, exec, len(related), locationsEvents1, authUser0) if err != nil { return err } authUser0.R.AdminIDLocationsEvents = append(authUser0.R.AdminIDLocationsEvents, locationsEvents1...) for _, rel := range related { rel.R.AdminIDAuthUser = authUser0 } return nil } func insertAuthUserUserTastypieApikey0(ctx context.Context, exec bob.Executor, tastypieApikey1 *TastypieApikeySetter, authUser0 *AuthUser) (*TastypieApikey, error) { tastypieApikey1.UserID = omit.From(authUser0.ID) ret, err := TastypieApikeys.Insert(tastypieApikey1).One(ctx, exec) if err != nil { return ret, fmt.Errorf("insertAuthUserUserTastypieApikey0: %w", err) } return ret, nil } func attachAuthUserUserTastypieApikey0(ctx context.Context, exec bob.Executor, count int, tastypieApikey1 *TastypieApikey, authUser0 *AuthUser) (*TastypieApikey, error) { setter := &TastypieApikeySetter{ UserID: omit.From(authUser0.ID), } err := tastypieApikey1.Update(ctx, exec, setter) if err != nil { return nil, fmt.Errorf("attachAuthUserUserTastypieApikey0: %w", err) } return tastypieApikey1, nil } func (authUser0 *AuthUser) InsertUserTastypieApikey(ctx context.Context, exec bob.Executor, related *TastypieApikeySetter) error { var err error tastypieApikey1, err := insertAuthUserUserTastypieApikey0(ctx, exec, related, authUser0) if err != nil { return err } authUser0.R.UserTastypieApikey = tastypieApikey1 tastypieApikey1.R.UserAuthUser = authUser0 return nil } func (authUser0 *AuthUser) AttachUserTastypieApikey(ctx context.Context, exec bob.Executor, tastypieApikey1 *TastypieApikey) error { var err error _, err = attachAuthUserUserTastypieApikey0(ctx, exec, 1, tastypieApikey1, authUser0) if err != nil { return err } authUser0.R.UserTastypieApikey = tastypieApikey1 tastypieApikey1.R.UserAuthUser = authUser0 return nil } type authUserWhere[Q mysql.Filterable] struct { ID mysql.WhereMod[Q, int32] Password mysql.WhereMod[Q, string] LastLogin mysql.WhereNullMod[Q, time.Time] IsSuperuser mysql.WhereMod[Q, bool] Username mysql.WhereMod[Q, string] FirstName mysql.WhereMod[Q, string] LastName mysql.WhereMod[Q, string] Email mysql.WhereMod[Q, string] IsStaff mysql.WhereMod[Q, bool] IsActive mysql.WhereMod[Q, bool] DateJoined mysql.WhereMod[Q, time.Time] } func (authUserWhere[Q]) AliasedAs(alias string) authUserWhere[Q] { return buildAuthUserWhere[Q](buildAuthUserColumns(alias)) } func buildAuthUserWhere[Q mysql.Filterable](cols authUserColumns) authUserWhere[Q] { return authUserWhere[Q]{ ID: mysql.Where[Q, int32](cols.ID), Password: mysql.Where[Q, string](cols.Password), LastLogin: mysql.WhereNull[Q, time.Time](cols.LastLogin), IsSuperuser: mysql.Where[Q, bool](cols.IsSuperuser), Username: mysql.Where[Q, string](cols.Username), FirstName: mysql.Where[Q, string](cols.FirstName), LastName: mysql.Where[Q, string](cols.LastName), Email: mysql.Where[Q, string](cols.Email), IsStaff: mysql.Where[Q, bool](cols.IsStaff), IsActive: mysql.Where[Q, bool](cols.IsActive), DateJoined: mysql.Where[Q, time.Time](cols.DateJoined), } } func (o *AuthUser) Preload(name string, retrieved any) error { if o == nil { return nil } switch name { case "UserAuthUserGroups": rels, ok := retrieved.(AuthUserGroupSlice) if !ok { return fmt.Errorf("authUser cannot load %T as %q", retrieved, name) } o.R.UserAuthUserGroups = rels for _, rel := range rels { if rel != nil { rel.R.UserAuthUser = o } } return nil case "UserAuthUserUserPermissions": rels, ok := retrieved.(AuthUserUserPermissionSlice) if !ok { return fmt.Errorf("authUser cannot load %T as %q", retrieved, name) } o.R.UserAuthUserUserPermissions = rels for _, rel := range rels { if rel != nil { rel.R.UserAuthUser = o } } return nil case "UserDjangoAdminLogs": rels, ok := retrieved.(DjangoAdminLogSlice) if !ok { return fmt.Errorf("authUser cannot load %T as %q", retrieved, name) } o.R.UserDjangoAdminLogs = rels for _, rel := range rels { if rel != nil { rel.R.UserAuthUser = o } } return nil case "AdminIDLocationsEvents": rels, ok := retrieved.(LocationsEventSlice) if !ok { return fmt.Errorf("authUser cannot load %T as %q", retrieved, name) } o.R.AdminIDLocationsEvents = rels for _, rel := range rels { if rel != nil { rel.R.AdminIDAuthUser = o } } return nil case "UserTastypieApikey": rel, ok := retrieved.(*TastypieApikey) if !ok { return fmt.Errorf("authUser cannot load %T as %q", retrieved, name) } o.R.UserTastypieApikey = rel if rel != nil { rel.R.UserAuthUser = o } return nil default: return fmt.Errorf("authUser has no relationship %q", name) } } type authUserPreloader struct { UserTastypieApikey func(...mysql.PreloadOption) mysql.Preloader } func buildAuthUserPreloader() authUserPreloader { return authUserPreloader{ UserTastypieApikey: func(opts ...mysql.PreloadOption) mysql.Preloader { return mysql.Preload[*TastypieApikey, TastypieApikeySlice](mysql.PreloadRel{ Name: "UserTastypieApikey", Sides: []mysql.PreloadSide{ { From: AuthUsers, To: TastypieApikeys, FromColumns: []string{"id"}, ToColumns: []string{"user_id"}, }, }, }, TastypieApikeys.Columns.Names(), opts...) }, } } type authUserThenLoader[Q orm.Loadable] struct { UserAuthUserGroups func(...bob.Mod[*dialect.SelectQuery]) orm.Loader[Q] UserAuthUserUserPermissions func(...bob.Mod[*dialect.SelectQuery]) orm.Loader[Q] UserDjangoAdminLogs func(...bob.Mod[*dialect.SelectQuery]) orm.Loader[Q] AdminIDLocationsEvents func(...bob.Mod[*dialect.SelectQuery]) orm.Loader[Q] UserTastypieApikey func(...bob.Mod[*dialect.SelectQuery]) orm.Loader[Q] } func buildAuthUserThenLoader[Q orm.Loadable]() authUserThenLoader[Q] { type UserAuthUserGroupsLoadInterface interface { LoadUserAuthUserGroups(context.Context, bob.Executor, ...bob.Mod[*dialect.SelectQuery]) error } type UserAuthUserUserPermissionsLoadInterface interface { LoadUserAuthUserUserPermissions(context.Context, bob.Executor, ...bob.Mod[*dialect.SelectQuery]) error } type UserDjangoAdminLogsLoadInterface interface { LoadUserDjangoAdminLogs(context.Context, bob.Executor, ...bob.Mod[*dialect.SelectQuery]) error } type AdminIDLocationsEventsLoadInterface interface { LoadAdminIDLocationsEvents(context.Context, bob.Executor, ...bob.Mod[*dialect.SelectQuery]) error } type UserTastypieApikeyLoadInterface interface { LoadUserTastypieApikey(context.Context, bob.Executor, ...bob.Mod[*dialect.SelectQuery]) error } return authUserThenLoader[Q]{ UserAuthUserGroups: thenLoadBuilder[Q]( "UserAuthUserGroups", func(ctx context.Context, exec bob.Executor, retrieved UserAuthUserGroupsLoadInterface, mods ...bob.Mod[*dialect.SelectQuery]) error { return retrieved.LoadUserAuthUserGroups(ctx, exec, mods...) }, ), UserAuthUserUserPermissions: thenLoadBuilder[Q]( "UserAuthUserUserPermissions", func(ctx context.Context, exec bob.Executor, retrieved UserAuthUserUserPermissionsLoadInterface, mods ...bob.Mod[*dialect.SelectQuery]) error { return retrieved.LoadUserAuthUserUserPermissions(ctx, exec, mods...) }, ), UserDjangoAdminLogs: thenLoadBuilder[Q]( "UserDjangoAdminLogs", func(ctx context.Context, exec bob.Executor, retrieved UserDjangoAdminLogsLoadInterface, mods ...bob.Mod[*dialect.SelectQuery]) error { return retrieved.LoadUserDjangoAdminLogs(ctx, exec, mods...) }, ), AdminIDLocationsEvents: thenLoadBuilder[Q]( "AdminIDLocationsEvents", func(ctx context.Context, exec bob.Executor, retrieved AdminIDLocationsEventsLoadInterface, mods ...bob.Mod[*dialect.SelectQuery]) error { return retrieved.LoadAdminIDLocationsEvents(ctx, exec, mods...) }, ), UserTastypieApikey: thenLoadBuilder[Q]( "UserTastypieApikey", func(ctx context.Context, exec bob.Executor, retrieved UserTastypieApikeyLoadInterface, mods ...bob.Mod[*dialect.SelectQuery]) error { return retrieved.LoadUserTastypieApikey(ctx, exec, mods...) }, ), } } // LoadUserAuthUserGroups loads the authUser's UserAuthUserGroups into the .R struct func (o *AuthUser) LoadUserAuthUserGroups(ctx context.Context, exec bob.Executor, mods ...bob.Mod[*dialect.SelectQuery]) error { if o == nil { return nil } // Reset the relationship o.R.UserAuthUserGroups = nil related, err := o.UserAuthUserGroups(mods...).All(ctx, exec) if err != nil { return err } for _, rel := range related { rel.R.UserAuthUser = o } o.R.UserAuthUserGroups = related return nil } // LoadUserAuthUserGroups loads the authUser's UserAuthUserGroups into the .R struct func (os AuthUserSlice) LoadUserAuthUserGroups(ctx context.Context, exec bob.Executor, mods ...bob.Mod[*dialect.SelectQuery]) error { if len(os) == 0 { return nil } authUserGroups, err := os.UserAuthUserGroups(mods...).All(ctx, exec) if err != nil { return err } for _, o := range os { if o == nil { continue } o.R.UserAuthUserGroups = nil } for _, o := range os { if o == nil { continue } for _, rel := range authUserGroups { if !(o.ID == rel.UserID) { continue } rel.R.UserAuthUser = o o.R.UserAuthUserGroups = append(o.R.UserAuthUserGroups, rel) } } return nil } // LoadUserAuthUserUserPermissions loads the authUser's UserAuthUserUserPermissions into the .R struct func (o *AuthUser) LoadUserAuthUserUserPermissions(ctx context.Context, exec bob.Executor, mods ...bob.Mod[*dialect.SelectQuery]) error { if o == nil { return nil } // Reset the relationship o.R.UserAuthUserUserPermissions = nil related, err := o.UserAuthUserUserPermissions(mods...).All(ctx, exec) if err != nil { return err } for _, rel := range related { rel.R.UserAuthUser = o } o.R.UserAuthUserUserPermissions = related return nil } // LoadUserAuthUserUserPermissions loads the authUser's UserAuthUserUserPermissions into the .R struct func (os AuthUserSlice) LoadUserAuthUserUserPermissions(ctx context.Context, exec bob.Executor, mods ...bob.Mod[*dialect.SelectQuery]) error { if len(os) == 0 { return nil } authUserUserPermissions, err := os.UserAuthUserUserPermissions(mods...).All(ctx, exec) if err != nil { return err } for _, o := range os { if o == nil { continue } o.R.UserAuthUserUserPermissions = nil } for _, o := range os { if o == nil { continue } for _, rel := range authUserUserPermissions { if !(o.ID == rel.UserID) { continue } rel.R.UserAuthUser = o o.R.UserAuthUserUserPermissions = append(o.R.UserAuthUserUserPermissions, rel) } } return nil } // LoadUserDjangoAdminLogs loads the authUser's UserDjangoAdminLogs into the .R struct func (o *AuthUser) LoadUserDjangoAdminLogs(ctx context.Context, exec bob.Executor, mods ...bob.Mod[*dialect.SelectQuery]) error { if o == nil { return nil } // Reset the relationship o.R.UserDjangoAdminLogs = nil related, err := o.UserDjangoAdminLogs(mods...).All(ctx, exec) if err != nil { return err } for _, rel := range related { rel.R.UserAuthUser = o } o.R.UserDjangoAdminLogs = related return nil } // LoadUserDjangoAdminLogs loads the authUser's UserDjangoAdminLogs into the .R struct func (os AuthUserSlice) LoadUserDjangoAdminLogs(ctx context.Context, exec bob.Executor, mods ...bob.Mod[*dialect.SelectQuery]) error { if len(os) == 0 { return nil } djangoAdminLogs, err := os.UserDjangoAdminLogs(mods...).All(ctx, exec) if err != nil { return err } for _, o := range os { if o == nil { continue } o.R.UserDjangoAdminLogs = nil } for _, o := range os { if o == nil { continue } for _, rel := range djangoAdminLogs { if !(o.ID == rel.UserID) { continue } rel.R.UserAuthUser = o o.R.UserDjangoAdminLogs = append(o.R.UserDjangoAdminLogs, rel) } } return nil } // LoadAdminIDLocationsEvents loads the authUser's AdminIDLocationsEvents into the .R struct func (o *AuthUser) LoadAdminIDLocationsEvents(ctx context.Context, exec bob.Executor, mods ...bob.Mod[*dialect.SelectQuery]) error { if o == nil { return nil } // Reset the relationship o.R.AdminIDLocationsEvents = nil related, err := o.AdminIDLocationsEvents(mods...).All(ctx, exec) if err != nil { return err } for _, rel := range related { rel.R.AdminIDAuthUser = o } o.R.AdminIDLocationsEvents = related return nil } // LoadAdminIDLocationsEvents loads the authUser's AdminIDLocationsEvents into the .R struct func (os AuthUserSlice) LoadAdminIDLocationsEvents(ctx context.Context, exec bob.Executor, mods ...bob.Mod[*dialect.SelectQuery]) error { if len(os) == 0 { return nil } locationsEvents, err := os.AdminIDLocationsEvents(mods...).All(ctx, exec) if err != nil { return err } for _, o := range os { if o == nil { continue } o.R.AdminIDLocationsEvents = nil } for _, o := range os { if o == nil { continue } for _, rel := range locationsEvents { if !rel.AdminIDID.IsValue() { continue } if !(rel.AdminIDID.IsValue() && o.ID == rel.AdminIDID.MustGet()) { continue } rel.R.AdminIDAuthUser = o o.R.AdminIDLocationsEvents = append(o.R.AdminIDLocationsEvents, rel) } } return nil } // LoadUserTastypieApikey loads the authUser's UserTastypieApikey into the .R struct func (o *AuthUser) LoadUserTastypieApikey(ctx context.Context, exec bob.Executor, mods ...bob.Mod[*dialect.SelectQuery]) error { if o == nil { return nil } // Reset the relationship o.R.UserTastypieApikey = nil related, err := o.UserTastypieApikey(mods...).One(ctx, exec) if err != nil { return err } related.R.UserAuthUser = o o.R.UserTastypieApikey = related return nil } // LoadUserTastypieApikey loads the authUser's UserTastypieApikey into the .R struct func (os AuthUserSlice) LoadUserTastypieApikey(ctx context.Context, exec bob.Executor, mods ...bob.Mod[*dialect.SelectQuery]) error { if len(os) == 0 { return nil } tastypieApikeys, err := os.UserTastypieApikey(mods...).All(ctx, exec) if err != nil { return err } for _, o := range os { if o == nil { continue } for _, rel := range tastypieApikeys { if !(o.ID == rel.UserID) { continue } rel.R.UserAuthUser = o o.R.UserTastypieApikey = rel break } } return nil } type authUserJoins[Q dialect.Joinable] struct { typ string UserAuthUserGroups modAs[Q, authUserGroupColumns] UserAuthUserUserPermissions modAs[Q, authUserUserPermissionColumns] UserDjangoAdminLogs modAs[Q, djangoAdminLogColumns] AdminIDLocationsEvents modAs[Q, locationsEventColumns] UserTastypieApikey modAs[Q, tastypieApikeyColumns] } func (j authUserJoins[Q]) aliasedAs(alias string) authUserJoins[Q] { return buildAuthUserJoins[Q](buildAuthUserColumns(alias), j.typ) } func buildAuthUserJoins[Q dialect.Joinable](cols authUserColumns, typ string) authUserJoins[Q] { return authUserJoins[Q]{ typ: typ, UserAuthUserGroups: modAs[Q, authUserGroupColumns]{ c: AuthUserGroups.Columns, f: func(to authUserGroupColumns) bob.Mod[Q] { mods := make(mods.QueryMods[Q], 0, 1) { mods = append(mods, dialect.Join[Q](typ, AuthUserGroups.Name().As(to.Alias())).On( to.UserID.EQ(cols.ID), )) } return mods }, }, UserAuthUserUserPermissions: modAs[Q, authUserUserPermissionColumns]{ c: AuthUserUserPermissions.Columns, f: func(to authUserUserPermissionColumns) bob.Mod[Q] { mods := make(mods.QueryMods[Q], 0, 1) { mods = append(mods, dialect.Join[Q](typ, AuthUserUserPermissions.Name().As(to.Alias())).On( to.UserID.EQ(cols.ID), )) } return mods }, }, UserDjangoAdminLogs: modAs[Q, djangoAdminLogColumns]{ c: DjangoAdminLogs.Columns, f: func(to djangoAdminLogColumns) bob.Mod[Q] { mods := make(mods.QueryMods[Q], 0, 1) { mods = append(mods, dialect.Join[Q](typ, DjangoAdminLogs.Name().As(to.Alias())).On( to.UserID.EQ(cols.ID), )) } return mods }, }, AdminIDLocationsEvents: modAs[Q, locationsEventColumns]{ c: LocationsEvents.Columns, f: func(to locationsEventColumns) bob.Mod[Q] { mods := make(mods.QueryMods[Q], 0, 1) { mods = append(mods, dialect.Join[Q](typ, LocationsEvents.Name().As(to.Alias())).On( to.AdminIDID.EQ(cols.ID), )) } return mods }, }, UserTastypieApikey: modAs[Q, tastypieApikeyColumns]{ c: TastypieApikeys.Columns, f: func(to tastypieApikeyColumns) bob.Mod[Q] { mods := make(mods.QueryMods[Q], 0, 1) { mods = append(mods, dialect.Join[Q](typ, TastypieApikeys.Name().As(to.Alias())).On( to.UserID.EQ(cols.ID), )) } return mods }, }, } }