Files
am-scripts/database/storage_service/models/auth_permission.bob.go
2026-03-19 14:46:45 -04:00

1017 lines
32 KiB
Go

// Code generated by BobGen mysql v0.42.0. DO NOT EDIT.
// This file is meant to be re-generated in place and/or deleted at any time.
package models
import (
"context"
"fmt"
"io"
"github.com/aarondl/opt/omit"
"github.com/stephenafamo/bob"
"github.com/stephenafamo/bob/dialect/mysql"
"github.com/stephenafamo/bob/dialect/mysql/dialect"
"github.com/stephenafamo/bob/dialect/mysql/dm"
"github.com/stephenafamo/bob/dialect/mysql/sm"
"github.com/stephenafamo/bob/dialect/mysql/um"
"github.com/stephenafamo/bob/expr"
"github.com/stephenafamo/bob/mods"
"github.com/stephenafamo/bob/orm"
)
// AuthPermission is an object representing the database table.
type AuthPermission struct {
ID int32 `db:"id,pk,autoincr" `
Name string `db:"name" `
ContentTypeID int32 `db:"content_type_id" `
Codename string `db:"codename" `
R authPermissionR `db:"-" `
}
// AuthPermissionSlice is an alias for a slice of pointers to AuthPermission.
// This should almost always be used instead of []*AuthPermission.
type AuthPermissionSlice []*AuthPermission
// AuthPermissions contains methods to work with the auth_permission table
var AuthPermissions = mysql.NewTablex[*AuthPermission, AuthPermissionSlice, *AuthPermissionSetter]("auth_permission", buildAuthPermissionColumns("auth_permission"), []string{"id"}, []string{"content_type_id", "codename"})
// AuthPermissionsQuery is a query on the auth_permission table
type AuthPermissionsQuery = *mysql.ViewQuery[*AuthPermission, AuthPermissionSlice]
// authPermissionR is where relationships are stored.
type authPermissionR struct {
PermissionAuthGroupPermissions AuthGroupPermissionSlice // auth_group_permissio_permission_id_84c5c92e_fk_auth_perm
ContentTypeDjangoContentType *DjangoContentType // auth_permission_content_type_id_2f476e4b_fk_django_co
PermissionAuthUserUserPermissions AuthUserUserPermissionSlice // auth_user_user_permi_permission_id_1fbb5f2c_fk_auth_perm
}
func buildAuthPermissionColumns(alias string) authPermissionColumns {
return authPermissionColumns{
ColumnsExpr: expr.NewColumnsExpr(
"id", "name", "content_type_id", "codename",
).WithParent("auth_permission"),
tableAlias: alias,
ID: mysql.Quote(alias, "id"),
Name: mysql.Quote(alias, "name"),
ContentTypeID: mysql.Quote(alias, "content_type_id"),
Codename: mysql.Quote(alias, "codename"),
}
}
type authPermissionColumns struct {
expr.ColumnsExpr
tableAlias string
ID mysql.Expression
Name mysql.Expression
ContentTypeID mysql.Expression
Codename mysql.Expression
}
func (c authPermissionColumns) Alias() string {
return c.tableAlias
}
func (authPermissionColumns) AliasedAs(alias string) authPermissionColumns {
return buildAuthPermissionColumns(alias)
}
// AuthPermissionSetter is used for insert/upsert/update operations
// All values are optional, and do not have to be set
// Generated columns are not included
type AuthPermissionSetter struct {
ID omit.Val[int32] `db:"id,pk,autoincr" `
Name omit.Val[string] `db:"name" `
ContentTypeID omit.Val[int32] `db:"content_type_id" `
Codename omit.Val[string] `db:"codename" `
}
func (s AuthPermissionSetter) SetColumns() []string {
vals := make([]string, 0, 4)
if s.ID.IsValue() {
vals = append(vals, "id")
}
if s.Name.IsValue() {
vals = append(vals, "name")
}
if s.ContentTypeID.IsValue() {
vals = append(vals, "content_type_id")
}
if s.Codename.IsValue() {
vals = append(vals, "codename")
}
return vals
}
func (s AuthPermissionSetter) Overwrite(t *AuthPermission) {
if s.ID.IsValue() {
t.ID = s.ID.MustGet()
}
if s.Name.IsValue() {
t.Name = s.Name.MustGet()
}
if s.ContentTypeID.IsValue() {
t.ContentTypeID = s.ContentTypeID.MustGet()
}
if s.Codename.IsValue() {
t.Codename = s.Codename.MustGet()
}
}
func (s *AuthPermissionSetter) Apply(q *dialect.InsertQuery) {
q.AppendHooks(func(ctx context.Context, exec bob.Executor) (context.Context, error) {
return AuthPermissions.BeforeInsertHooks.RunHooks(ctx, exec, s)
})
q.AppendValues(
bob.ExpressionFunc(func(ctx context.Context, w io.StringWriter, d bob.Dialect, start int) ([]any, error) {
if !(s.ID.IsValue()) {
return mysql.Raw("DEFAULT").WriteSQL(ctx, w, d, start)
}
return mysql.Arg(s.ID.MustGet()).WriteSQL(ctx, w, d, start)
}), bob.ExpressionFunc(func(ctx context.Context, w io.StringWriter, d bob.Dialect, start int) ([]any, error) {
if !(s.Name.IsValue()) {
return mysql.Raw("DEFAULT").WriteSQL(ctx, w, d, start)
}
return mysql.Arg(s.Name.MustGet()).WriteSQL(ctx, w, d, start)
}), bob.ExpressionFunc(func(ctx context.Context, w io.StringWriter, d bob.Dialect, start int) ([]any, error) {
if !(s.ContentTypeID.IsValue()) {
return mysql.Raw("DEFAULT").WriteSQL(ctx, w, d, start)
}
return mysql.Arg(s.ContentTypeID.MustGet()).WriteSQL(ctx, w, d, start)
}), bob.ExpressionFunc(func(ctx context.Context, w io.StringWriter, d bob.Dialect, start int) ([]any, error) {
if !(s.Codename.IsValue()) {
return mysql.Raw("DEFAULT").WriteSQL(ctx, w, d, start)
}
return mysql.Arg(s.Codename.MustGet()).WriteSQL(ctx, w, d, start)
}))
}
func (s AuthPermissionSetter) UpdateMod() bob.Mod[*dialect.UpdateQuery] {
return um.Set(s.Expressions("auth_permission")...)
}
func (s AuthPermissionSetter) Expressions(prefix ...string) []bob.Expression {
exprs := make([]bob.Expression, 0, 4)
if s.ID.IsValue() {
exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{
mysql.Quote(append(prefix, "id")...),
mysql.Arg(s.ID),
}})
}
if s.Name.IsValue() {
exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{
mysql.Quote(append(prefix, "name")...),
mysql.Arg(s.Name),
}})
}
if s.ContentTypeID.IsValue() {
exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{
mysql.Quote(append(prefix, "content_type_id")...),
mysql.Arg(s.ContentTypeID),
}})
}
if s.Codename.IsValue() {
exprs = append(exprs, expr.Join{Sep: " = ", Exprs: []bob.Expression{
mysql.Quote(append(prefix, "codename")...),
mysql.Arg(s.Codename),
}})
}
return exprs
}
// FindAuthPermission retrieves a single record by primary key
// If cols is empty Find will return all columns.
func FindAuthPermission(ctx context.Context, exec bob.Executor, IDPK int32, cols ...string) (*AuthPermission, error) {
if len(cols) == 0 {
return AuthPermissions.Query(
sm.Where(AuthPermissions.Columns.ID.EQ(mysql.Arg(IDPK))),
).One(ctx, exec)
}
return AuthPermissions.Query(
sm.Where(AuthPermissions.Columns.ID.EQ(mysql.Arg(IDPK))),
sm.Columns(AuthPermissions.Columns.Only(cols...)),
).One(ctx, exec)
}
// AuthPermissionExists checks the presence of a single record by primary key
func AuthPermissionExists(ctx context.Context, exec bob.Executor, IDPK int32) (bool, error) {
return AuthPermissions.Query(
sm.Where(AuthPermissions.Columns.ID.EQ(mysql.Arg(IDPK))),
).Exists(ctx, exec)
}
// AfterQueryHook is called after AuthPermission is retrieved from the database
func (o *AuthPermission) AfterQueryHook(ctx context.Context, exec bob.Executor, queryType bob.QueryType) error {
var err error
switch queryType {
case bob.QueryTypeSelect:
ctx, err = AuthPermissions.AfterSelectHooks.RunHooks(ctx, exec, AuthPermissionSlice{o})
case bob.QueryTypeInsert:
ctx, err = AuthPermissions.AfterInsertHooks.RunHooks(ctx, exec, AuthPermissionSlice{o})
case bob.QueryTypeUpdate:
ctx, err = AuthPermissions.AfterUpdateHooks.RunHooks(ctx, exec, AuthPermissionSlice{o})
case bob.QueryTypeDelete:
ctx, err = AuthPermissions.AfterDeleteHooks.RunHooks(ctx, exec, AuthPermissionSlice{o})
}
return err
}
// primaryKeyVals returns the primary key values of the AuthPermission
func (o *AuthPermission) primaryKeyVals() bob.Expression {
return mysql.Arg(o.ID)
}
func (o *AuthPermission) pkEQ() dialect.Expression {
return mysql.Quote("auth_permission", "id").EQ(bob.ExpressionFunc(func(ctx context.Context, w io.StringWriter, d bob.Dialect, start int) ([]any, error) {
return o.primaryKeyVals().WriteSQL(ctx, w, d, start)
}))
}
// Update uses an executor to update the AuthPermission
func (o *AuthPermission) Update(ctx context.Context, exec bob.Executor, s *AuthPermissionSetter) error {
_, err := AuthPermissions.Update(s.UpdateMod(), um.Where(o.pkEQ())).Exec(ctx, exec)
if err != nil {
return err
}
s.Overwrite(o)
return nil
}
// Delete deletes a single AuthPermission record with an executor
func (o *AuthPermission) Delete(ctx context.Context, exec bob.Executor) error {
_, err := AuthPermissions.Delete(dm.Where(o.pkEQ())).Exec(ctx, exec)
return err
}
// Reload refreshes the AuthPermission using the executor
func (o *AuthPermission) Reload(ctx context.Context, exec bob.Executor) error {
o2, err := AuthPermissions.Query(
sm.Where(AuthPermissions.Columns.ID.EQ(mysql.Arg(o.ID))),
).One(ctx, exec)
if err != nil {
return err
}
o2.R = o.R
*o = *o2
return nil
}
// AfterQueryHook is called after AuthPermissionSlice is retrieved from the database
func (o AuthPermissionSlice) AfterQueryHook(ctx context.Context, exec bob.Executor, queryType bob.QueryType) error {
var err error
switch queryType {
case bob.QueryTypeSelect:
ctx, err = AuthPermissions.AfterSelectHooks.RunHooks(ctx, exec, o)
case bob.QueryTypeInsert:
ctx, err = AuthPermissions.AfterInsertHooks.RunHooks(ctx, exec, o)
case bob.QueryTypeUpdate:
ctx, err = AuthPermissions.AfterUpdateHooks.RunHooks(ctx, exec, o)
case bob.QueryTypeDelete:
ctx, err = AuthPermissions.AfterDeleteHooks.RunHooks(ctx, exec, o)
}
return err
}
func (o AuthPermissionSlice) pkIN() dialect.Expression {
if len(o) == 0 {
return mysql.Raw("NULL")
}
return mysql.Quote("auth_permission", "id").In(bob.ExpressionFunc(func(ctx context.Context, w io.StringWriter, d bob.Dialect, start int) ([]any, error) {
pkPairs := make([]bob.Expression, len(o))
for i, row := range o {
pkPairs[i] = row.primaryKeyVals()
}
return bob.ExpressSlice(ctx, w, d, start, pkPairs, "", ", ", "")
}))
}
// copyMatchingRows finds models in the given slice that have the same primary key
// then it first copies the existing relationships from the old model to the new model
// and then replaces the old model in the slice with the new model
func (o AuthPermissionSlice) copyMatchingRows(from ...*AuthPermission) {
for i, old := range o {
for _, new := range from {
if new.ID != old.ID {
continue
}
new.R = old.R
o[i] = new
break
}
}
}
// UpdateMod modifies an update query with "WHERE primary_key IN (o...)"
func (o AuthPermissionSlice) UpdateMod() bob.Mod[*dialect.UpdateQuery] {
return bob.ModFunc[*dialect.UpdateQuery](func(q *dialect.UpdateQuery) {
q.AppendHooks(func(ctx context.Context, exec bob.Executor) (context.Context, error) {
return AuthPermissions.BeforeUpdateHooks.RunHooks(ctx, exec, o)
})
q.AppendLoader(bob.LoaderFunc(func(ctx context.Context, exec bob.Executor, retrieved any) error {
var err error
switch retrieved := retrieved.(type) {
case *AuthPermission:
o.copyMatchingRows(retrieved)
case []*AuthPermission:
o.copyMatchingRows(retrieved...)
case AuthPermissionSlice:
o.copyMatchingRows(retrieved...)
default:
// If the retrieved value is not a AuthPermission or a slice of AuthPermission
// then run the AfterUpdateHooks on the slice
_, err = AuthPermissions.AfterUpdateHooks.RunHooks(ctx, exec, o)
}
return err
}))
q.AppendWhere(o.pkIN())
})
}
// DeleteMod modifies an delete query with "WHERE primary_key IN (o...)"
func (o AuthPermissionSlice) DeleteMod() bob.Mod[*dialect.DeleteQuery] {
return bob.ModFunc[*dialect.DeleteQuery](func(q *dialect.DeleteQuery) {
q.AppendHooks(func(ctx context.Context, exec bob.Executor) (context.Context, error) {
return AuthPermissions.BeforeDeleteHooks.RunHooks(ctx, exec, o)
})
q.AppendLoader(bob.LoaderFunc(func(ctx context.Context, exec bob.Executor, retrieved any) error {
var err error
switch retrieved := retrieved.(type) {
case *AuthPermission:
o.copyMatchingRows(retrieved)
case []*AuthPermission:
o.copyMatchingRows(retrieved...)
case AuthPermissionSlice:
o.copyMatchingRows(retrieved...)
default:
// If the retrieved value is not a AuthPermission or a slice of AuthPermission
// then run the AfterDeleteHooks on the slice
_, err = AuthPermissions.AfterDeleteHooks.RunHooks(ctx, exec, o)
}
return err
}))
q.AppendWhere(o.pkIN())
})
}
func (o AuthPermissionSlice) UpdateAll(ctx context.Context, exec bob.Executor, vals AuthPermissionSetter) error {
_, err := AuthPermissions.Update(vals.UpdateMod(), o.UpdateMod()).Exec(ctx, exec)
for i := range o {
vals.Overwrite(o[i])
}
return err
}
func (o AuthPermissionSlice) DeleteAll(ctx context.Context, exec bob.Executor) error {
if len(o) == 0 {
return nil
}
_, err := AuthPermissions.Delete(o.DeleteMod()).Exec(ctx, exec)
return err
}
func (o AuthPermissionSlice) ReloadAll(ctx context.Context, exec bob.Executor) error {
if len(o) == 0 {
return nil
}
o2, err := AuthPermissions.Query(sm.Where(o.pkIN())).All(ctx, exec)
if err != nil {
return err
}
o.copyMatchingRows(o2...)
return nil
}
// PermissionAuthGroupPermissions starts a query for related objects on auth_group_permissions
func (o *AuthPermission) PermissionAuthGroupPermissions(mods ...bob.Mod[*dialect.SelectQuery]) AuthGroupPermissionsQuery {
return AuthGroupPermissions.Query(append(mods,
sm.Where(AuthGroupPermissions.Columns.PermissionID.EQ(mysql.Arg(o.ID))),
)...)
}
func (os AuthPermissionSlice) PermissionAuthGroupPermissions(mods ...bob.Mod[*dialect.SelectQuery]) AuthGroupPermissionsQuery {
PKArgSlice := make([]bob.Expression, len(os))
for i, o := range os {
PKArgSlice[i] = mysql.ArgGroup(o.ID)
}
PKArgExpr := mysql.Group(PKArgSlice...)
return AuthGroupPermissions.Query(append(mods,
sm.Where(mysql.Group(AuthGroupPermissions.Columns.PermissionID).OP("IN", PKArgExpr)),
)...)
}
// ContentTypeDjangoContentType starts a query for related objects on django_content_type
func (o *AuthPermission) ContentTypeDjangoContentType(mods ...bob.Mod[*dialect.SelectQuery]) DjangoContentTypesQuery {
return DjangoContentTypes.Query(append(mods,
sm.Where(DjangoContentTypes.Columns.ID.EQ(mysql.Arg(o.ContentTypeID))),
)...)
}
func (os AuthPermissionSlice) ContentTypeDjangoContentType(mods ...bob.Mod[*dialect.SelectQuery]) DjangoContentTypesQuery {
PKArgSlice := make([]bob.Expression, len(os))
for i, o := range os {
PKArgSlice[i] = mysql.ArgGroup(o.ContentTypeID)
}
PKArgExpr := mysql.Group(PKArgSlice...)
return DjangoContentTypes.Query(append(mods,
sm.Where(mysql.Group(DjangoContentTypes.Columns.ID).OP("IN", PKArgExpr)),
)...)
}
// PermissionAuthUserUserPermissions starts a query for related objects on auth_user_user_permissions
func (o *AuthPermission) PermissionAuthUserUserPermissions(mods ...bob.Mod[*dialect.SelectQuery]) AuthUserUserPermissionsQuery {
return AuthUserUserPermissions.Query(append(mods,
sm.Where(AuthUserUserPermissions.Columns.PermissionID.EQ(mysql.Arg(o.ID))),
)...)
}
func (os AuthPermissionSlice) PermissionAuthUserUserPermissions(mods ...bob.Mod[*dialect.SelectQuery]) AuthUserUserPermissionsQuery {
PKArgSlice := make([]bob.Expression, len(os))
for i, o := range os {
PKArgSlice[i] = mysql.ArgGroup(o.ID)
}
PKArgExpr := mysql.Group(PKArgSlice...)
return AuthUserUserPermissions.Query(append(mods,
sm.Where(mysql.Group(AuthUserUserPermissions.Columns.PermissionID).OP("IN", PKArgExpr)),
)...)
}
func insertAuthPermissionPermissionAuthGroupPermissions0(ctx context.Context, exec bob.Executor, authGroupPermissions1 []*AuthGroupPermissionSetter, authPermission0 *AuthPermission) (AuthGroupPermissionSlice, error) {
for i := range authGroupPermissions1 {
authGroupPermissions1[i].PermissionID = omit.From(authPermission0.ID)
}
ret, err := AuthGroupPermissions.Insert(bob.ToMods(authGroupPermissions1...)).All(ctx, exec)
if err != nil {
return ret, fmt.Errorf("insertAuthPermissionPermissionAuthGroupPermissions0: %w", err)
}
return ret, nil
}
func attachAuthPermissionPermissionAuthGroupPermissions0(ctx context.Context, exec bob.Executor, count int, authGroupPermissions1 AuthGroupPermissionSlice, authPermission0 *AuthPermission) (AuthGroupPermissionSlice, error) {
setter := &AuthGroupPermissionSetter{
PermissionID: omit.From(authPermission0.ID),
}
err := authGroupPermissions1.UpdateAll(ctx, exec, *setter)
if err != nil {
return nil, fmt.Errorf("attachAuthPermissionPermissionAuthGroupPermissions0: %w", err)
}
return authGroupPermissions1, nil
}
func (authPermission0 *AuthPermission) InsertPermissionAuthGroupPermissions(ctx context.Context, exec bob.Executor, related ...*AuthGroupPermissionSetter) error {
if len(related) == 0 {
return nil
}
var err error
authGroupPermissions1, err := insertAuthPermissionPermissionAuthGroupPermissions0(ctx, exec, related, authPermission0)
if err != nil {
return err
}
authPermission0.R.PermissionAuthGroupPermissions = append(authPermission0.R.PermissionAuthGroupPermissions, authGroupPermissions1...)
for _, rel := range authGroupPermissions1 {
rel.R.PermissionAuthPermission = authPermission0
}
return nil
}
func (authPermission0 *AuthPermission) AttachPermissionAuthGroupPermissions(ctx context.Context, exec bob.Executor, related ...*AuthGroupPermission) error {
if len(related) == 0 {
return nil
}
var err error
authGroupPermissions1 := AuthGroupPermissionSlice(related)
_, err = attachAuthPermissionPermissionAuthGroupPermissions0(ctx, exec, len(related), authGroupPermissions1, authPermission0)
if err != nil {
return err
}
authPermission0.R.PermissionAuthGroupPermissions = append(authPermission0.R.PermissionAuthGroupPermissions, authGroupPermissions1...)
for _, rel := range related {
rel.R.PermissionAuthPermission = authPermission0
}
return nil
}
func attachAuthPermissionContentTypeDjangoContentType0(ctx context.Context, exec bob.Executor, count int, authPermission0 *AuthPermission, djangoContentType1 *DjangoContentType) (*AuthPermission, error) {
setter := &AuthPermissionSetter{
ContentTypeID: omit.From(djangoContentType1.ID),
}
err := authPermission0.Update(ctx, exec, setter)
if err != nil {
return nil, fmt.Errorf("attachAuthPermissionContentTypeDjangoContentType0: %w", err)
}
return authPermission0, nil
}
func (authPermission0 *AuthPermission) InsertContentTypeDjangoContentType(ctx context.Context, exec bob.Executor, related *DjangoContentTypeSetter) error {
var err error
djangoContentType1, err := DjangoContentTypes.Insert(related).One(ctx, exec)
if err != nil {
return fmt.Errorf("inserting related objects: %w", err)
}
_, err = attachAuthPermissionContentTypeDjangoContentType0(ctx, exec, 1, authPermission0, djangoContentType1)
if err != nil {
return err
}
authPermission0.R.ContentTypeDjangoContentType = djangoContentType1
djangoContentType1.R.ContentTypeAuthPermissions = append(djangoContentType1.R.ContentTypeAuthPermissions, authPermission0)
return nil
}
func (authPermission0 *AuthPermission) AttachContentTypeDjangoContentType(ctx context.Context, exec bob.Executor, djangoContentType1 *DjangoContentType) error {
var err error
_, err = attachAuthPermissionContentTypeDjangoContentType0(ctx, exec, 1, authPermission0, djangoContentType1)
if err != nil {
return err
}
authPermission0.R.ContentTypeDjangoContentType = djangoContentType1
djangoContentType1.R.ContentTypeAuthPermissions = append(djangoContentType1.R.ContentTypeAuthPermissions, authPermission0)
return nil
}
func insertAuthPermissionPermissionAuthUserUserPermissions0(ctx context.Context, exec bob.Executor, authUserUserPermissions1 []*AuthUserUserPermissionSetter, authPermission0 *AuthPermission) (AuthUserUserPermissionSlice, error) {
for i := range authUserUserPermissions1 {
authUserUserPermissions1[i].PermissionID = omit.From(authPermission0.ID)
}
ret, err := AuthUserUserPermissions.Insert(bob.ToMods(authUserUserPermissions1...)).All(ctx, exec)
if err != nil {
return ret, fmt.Errorf("insertAuthPermissionPermissionAuthUserUserPermissions0: %w", err)
}
return ret, nil
}
func attachAuthPermissionPermissionAuthUserUserPermissions0(ctx context.Context, exec bob.Executor, count int, authUserUserPermissions1 AuthUserUserPermissionSlice, authPermission0 *AuthPermission) (AuthUserUserPermissionSlice, error) {
setter := &AuthUserUserPermissionSetter{
PermissionID: omit.From(authPermission0.ID),
}
err := authUserUserPermissions1.UpdateAll(ctx, exec, *setter)
if err != nil {
return nil, fmt.Errorf("attachAuthPermissionPermissionAuthUserUserPermissions0: %w", err)
}
return authUserUserPermissions1, nil
}
func (authPermission0 *AuthPermission) InsertPermissionAuthUserUserPermissions(ctx context.Context, exec bob.Executor, related ...*AuthUserUserPermissionSetter) error {
if len(related) == 0 {
return nil
}
var err error
authUserUserPermissions1, err := insertAuthPermissionPermissionAuthUserUserPermissions0(ctx, exec, related, authPermission0)
if err != nil {
return err
}
authPermission0.R.PermissionAuthUserUserPermissions = append(authPermission0.R.PermissionAuthUserUserPermissions, authUserUserPermissions1...)
for _, rel := range authUserUserPermissions1 {
rel.R.PermissionAuthPermission = authPermission0
}
return nil
}
func (authPermission0 *AuthPermission) AttachPermissionAuthUserUserPermissions(ctx context.Context, exec bob.Executor, related ...*AuthUserUserPermission) error {
if len(related) == 0 {
return nil
}
var err error
authUserUserPermissions1 := AuthUserUserPermissionSlice(related)
_, err = attachAuthPermissionPermissionAuthUserUserPermissions0(ctx, exec, len(related), authUserUserPermissions1, authPermission0)
if err != nil {
return err
}
authPermission0.R.PermissionAuthUserUserPermissions = append(authPermission0.R.PermissionAuthUserUserPermissions, authUserUserPermissions1...)
for _, rel := range related {
rel.R.PermissionAuthPermission = authPermission0
}
return nil
}
type authPermissionWhere[Q mysql.Filterable] struct {
ID mysql.WhereMod[Q, int32]
Name mysql.WhereMod[Q, string]
ContentTypeID mysql.WhereMod[Q, int32]
Codename mysql.WhereMod[Q, string]
}
func (authPermissionWhere[Q]) AliasedAs(alias string) authPermissionWhere[Q] {
return buildAuthPermissionWhere[Q](buildAuthPermissionColumns(alias))
}
func buildAuthPermissionWhere[Q mysql.Filterable](cols authPermissionColumns) authPermissionWhere[Q] {
return authPermissionWhere[Q]{
ID: mysql.Where[Q, int32](cols.ID),
Name: mysql.Where[Q, string](cols.Name),
ContentTypeID: mysql.Where[Q, int32](cols.ContentTypeID),
Codename: mysql.Where[Q, string](cols.Codename),
}
}
func (o *AuthPermission) Preload(name string, retrieved any) error {
if o == nil {
return nil
}
switch name {
case "PermissionAuthGroupPermissions":
rels, ok := retrieved.(AuthGroupPermissionSlice)
if !ok {
return fmt.Errorf("authPermission cannot load %T as %q", retrieved, name)
}
o.R.PermissionAuthGroupPermissions = rels
for _, rel := range rels {
if rel != nil {
rel.R.PermissionAuthPermission = o
}
}
return nil
case "ContentTypeDjangoContentType":
rel, ok := retrieved.(*DjangoContentType)
if !ok {
return fmt.Errorf("authPermission cannot load %T as %q", retrieved, name)
}
o.R.ContentTypeDjangoContentType = rel
if rel != nil {
rel.R.ContentTypeAuthPermissions = AuthPermissionSlice{o}
}
return nil
case "PermissionAuthUserUserPermissions":
rels, ok := retrieved.(AuthUserUserPermissionSlice)
if !ok {
return fmt.Errorf("authPermission cannot load %T as %q", retrieved, name)
}
o.R.PermissionAuthUserUserPermissions = rels
for _, rel := range rels {
if rel != nil {
rel.R.PermissionAuthPermission = o
}
}
return nil
default:
return fmt.Errorf("authPermission has no relationship %q", name)
}
}
type authPermissionPreloader struct {
ContentTypeDjangoContentType func(...mysql.PreloadOption) mysql.Preloader
}
func buildAuthPermissionPreloader() authPermissionPreloader {
return authPermissionPreloader{
ContentTypeDjangoContentType: func(opts ...mysql.PreloadOption) mysql.Preloader {
return mysql.Preload[*DjangoContentType, DjangoContentTypeSlice](mysql.PreloadRel{
Name: "ContentTypeDjangoContentType",
Sides: []mysql.PreloadSide{
{
From: AuthPermissions,
To: DjangoContentTypes,
FromColumns: []string{"content_type_id"},
ToColumns: []string{"id"},
},
},
}, DjangoContentTypes.Columns.Names(), opts...)
},
}
}
type authPermissionThenLoader[Q orm.Loadable] struct {
PermissionAuthGroupPermissions func(...bob.Mod[*dialect.SelectQuery]) orm.Loader[Q]
ContentTypeDjangoContentType func(...bob.Mod[*dialect.SelectQuery]) orm.Loader[Q]
PermissionAuthUserUserPermissions func(...bob.Mod[*dialect.SelectQuery]) orm.Loader[Q]
}
func buildAuthPermissionThenLoader[Q orm.Loadable]() authPermissionThenLoader[Q] {
type PermissionAuthGroupPermissionsLoadInterface interface {
LoadPermissionAuthGroupPermissions(context.Context, bob.Executor, ...bob.Mod[*dialect.SelectQuery]) error
}
type ContentTypeDjangoContentTypeLoadInterface interface {
LoadContentTypeDjangoContentType(context.Context, bob.Executor, ...bob.Mod[*dialect.SelectQuery]) error
}
type PermissionAuthUserUserPermissionsLoadInterface interface {
LoadPermissionAuthUserUserPermissions(context.Context, bob.Executor, ...bob.Mod[*dialect.SelectQuery]) error
}
return authPermissionThenLoader[Q]{
PermissionAuthGroupPermissions: thenLoadBuilder[Q](
"PermissionAuthGroupPermissions",
func(ctx context.Context, exec bob.Executor, retrieved PermissionAuthGroupPermissionsLoadInterface, mods ...bob.Mod[*dialect.SelectQuery]) error {
return retrieved.LoadPermissionAuthGroupPermissions(ctx, exec, mods...)
},
),
ContentTypeDjangoContentType: thenLoadBuilder[Q](
"ContentTypeDjangoContentType",
func(ctx context.Context, exec bob.Executor, retrieved ContentTypeDjangoContentTypeLoadInterface, mods ...bob.Mod[*dialect.SelectQuery]) error {
return retrieved.LoadContentTypeDjangoContentType(ctx, exec, mods...)
},
),
PermissionAuthUserUserPermissions: thenLoadBuilder[Q](
"PermissionAuthUserUserPermissions",
func(ctx context.Context, exec bob.Executor, retrieved PermissionAuthUserUserPermissionsLoadInterface, mods ...bob.Mod[*dialect.SelectQuery]) error {
return retrieved.LoadPermissionAuthUserUserPermissions(ctx, exec, mods...)
},
),
}
}
// LoadPermissionAuthGroupPermissions loads the authPermission's PermissionAuthGroupPermissions into the .R struct
func (o *AuthPermission) LoadPermissionAuthGroupPermissions(ctx context.Context, exec bob.Executor, mods ...bob.Mod[*dialect.SelectQuery]) error {
if o == nil {
return nil
}
// Reset the relationship
o.R.PermissionAuthGroupPermissions = nil
related, err := o.PermissionAuthGroupPermissions(mods...).All(ctx, exec)
if err != nil {
return err
}
for _, rel := range related {
rel.R.PermissionAuthPermission = o
}
o.R.PermissionAuthGroupPermissions = related
return nil
}
// LoadPermissionAuthGroupPermissions loads the authPermission's PermissionAuthGroupPermissions into the .R struct
func (os AuthPermissionSlice) LoadPermissionAuthGroupPermissions(ctx context.Context, exec bob.Executor, mods ...bob.Mod[*dialect.SelectQuery]) error {
if len(os) == 0 {
return nil
}
authGroupPermissions, err := os.PermissionAuthGroupPermissions(mods...).All(ctx, exec)
if err != nil {
return err
}
for _, o := range os {
if o == nil {
continue
}
o.R.PermissionAuthGroupPermissions = nil
}
for _, o := range os {
if o == nil {
continue
}
for _, rel := range authGroupPermissions {
if !(o.ID == rel.PermissionID) {
continue
}
rel.R.PermissionAuthPermission = o
o.R.PermissionAuthGroupPermissions = append(o.R.PermissionAuthGroupPermissions, rel)
}
}
return nil
}
// LoadContentTypeDjangoContentType loads the authPermission's ContentTypeDjangoContentType into the .R struct
func (o *AuthPermission) LoadContentTypeDjangoContentType(ctx context.Context, exec bob.Executor, mods ...bob.Mod[*dialect.SelectQuery]) error {
if o == nil {
return nil
}
// Reset the relationship
o.R.ContentTypeDjangoContentType = nil
related, err := o.ContentTypeDjangoContentType(mods...).One(ctx, exec)
if err != nil {
return err
}
related.R.ContentTypeAuthPermissions = AuthPermissionSlice{o}
o.R.ContentTypeDjangoContentType = related
return nil
}
// LoadContentTypeDjangoContentType loads the authPermission's ContentTypeDjangoContentType into the .R struct
func (os AuthPermissionSlice) LoadContentTypeDjangoContentType(ctx context.Context, exec bob.Executor, mods ...bob.Mod[*dialect.SelectQuery]) error {
if len(os) == 0 {
return nil
}
djangoContentTypes, err := os.ContentTypeDjangoContentType(mods...).All(ctx, exec)
if err != nil {
return err
}
for _, o := range os {
if o == nil {
continue
}
for _, rel := range djangoContentTypes {
if !(o.ContentTypeID == rel.ID) {
continue
}
rel.R.ContentTypeAuthPermissions = append(rel.R.ContentTypeAuthPermissions, o)
o.R.ContentTypeDjangoContentType = rel
break
}
}
return nil
}
// LoadPermissionAuthUserUserPermissions loads the authPermission's PermissionAuthUserUserPermissions into the .R struct
func (o *AuthPermission) LoadPermissionAuthUserUserPermissions(ctx context.Context, exec bob.Executor, mods ...bob.Mod[*dialect.SelectQuery]) error {
if o == nil {
return nil
}
// Reset the relationship
o.R.PermissionAuthUserUserPermissions = nil
related, err := o.PermissionAuthUserUserPermissions(mods...).All(ctx, exec)
if err != nil {
return err
}
for _, rel := range related {
rel.R.PermissionAuthPermission = o
}
o.R.PermissionAuthUserUserPermissions = related
return nil
}
// LoadPermissionAuthUserUserPermissions loads the authPermission's PermissionAuthUserUserPermissions into the .R struct
func (os AuthPermissionSlice) LoadPermissionAuthUserUserPermissions(ctx context.Context, exec bob.Executor, mods ...bob.Mod[*dialect.SelectQuery]) error {
if len(os) == 0 {
return nil
}
authUserUserPermissions, err := os.PermissionAuthUserUserPermissions(mods...).All(ctx, exec)
if err != nil {
return err
}
for _, o := range os {
if o == nil {
continue
}
o.R.PermissionAuthUserUserPermissions = nil
}
for _, o := range os {
if o == nil {
continue
}
for _, rel := range authUserUserPermissions {
if !(o.ID == rel.PermissionID) {
continue
}
rel.R.PermissionAuthPermission = o
o.R.PermissionAuthUserUserPermissions = append(o.R.PermissionAuthUserUserPermissions, rel)
}
}
return nil
}
type authPermissionJoins[Q dialect.Joinable] struct {
typ string
PermissionAuthGroupPermissions modAs[Q, authGroupPermissionColumns]
ContentTypeDjangoContentType modAs[Q, djangoContentTypeColumns]
PermissionAuthUserUserPermissions modAs[Q, authUserUserPermissionColumns]
}
func (j authPermissionJoins[Q]) aliasedAs(alias string) authPermissionJoins[Q] {
return buildAuthPermissionJoins[Q](buildAuthPermissionColumns(alias), j.typ)
}
func buildAuthPermissionJoins[Q dialect.Joinable](cols authPermissionColumns, typ string) authPermissionJoins[Q] {
return authPermissionJoins[Q]{
typ: typ,
PermissionAuthGroupPermissions: modAs[Q, authGroupPermissionColumns]{
c: AuthGroupPermissions.Columns,
f: func(to authGroupPermissionColumns) bob.Mod[Q] {
mods := make(mods.QueryMods[Q], 0, 1)
{
mods = append(mods, dialect.Join[Q](typ, AuthGroupPermissions.Name().As(to.Alias())).On(
to.PermissionID.EQ(cols.ID),
))
}
return mods
},
},
ContentTypeDjangoContentType: modAs[Q, djangoContentTypeColumns]{
c: DjangoContentTypes.Columns,
f: func(to djangoContentTypeColumns) bob.Mod[Q] {
mods := make(mods.QueryMods[Q], 0, 1)
{
mods = append(mods, dialect.Join[Q](typ, DjangoContentTypes.Name().As(to.Alias())).On(
to.ID.EQ(cols.ContentTypeID),
))
}
return mods
},
},
PermissionAuthUserUserPermissions: modAs[Q, authUserUserPermissionColumns]{
c: AuthUserUserPermissions.Columns,
f: func(to authUserUserPermissionColumns) bob.Mod[Q] {
mods := make(mods.QueryMods[Q], 0, 1)
{
mods = append(mods, dialect.Join[Q](typ, AuthUserUserPermissions.Name().As(to.Alias())).On(
to.PermissionID.EQ(cols.ID),
))
}
return mods
},
},
}
}