mirror of
https://github.com/hay-kot/homebox.git
synced 2024-11-23 09:05:42 +00:00
a042496c71
* bump all deps * run code-gen
686 lines
20 KiB
Go
686 lines
20 KiB
Go
// Code generated by ent, DO NOT EDIT.
|
|
|
|
package ent
|
|
|
|
import (
|
|
"context"
|
|
"database/sql/driver"
|
|
"fmt"
|
|
"math"
|
|
|
|
"entgo.io/ent/dialect/sql"
|
|
"entgo.io/ent/dialect/sql/sqlgraph"
|
|
"entgo.io/ent/schema/field"
|
|
"github.com/google/uuid"
|
|
"github.com/hay-kot/homebox/backend/internal/data/ent/authroles"
|
|
"github.com/hay-kot/homebox/backend/internal/data/ent/authtokens"
|
|
"github.com/hay-kot/homebox/backend/internal/data/ent/predicate"
|
|
"github.com/hay-kot/homebox/backend/internal/data/ent/user"
|
|
)
|
|
|
|
// AuthTokensQuery is the builder for querying AuthTokens entities.
|
|
type AuthTokensQuery struct {
|
|
config
|
|
ctx *QueryContext
|
|
order []authtokens.OrderOption
|
|
inters []Interceptor
|
|
predicates []predicate.AuthTokens
|
|
withUser *UserQuery
|
|
withRoles *AuthRolesQuery
|
|
withFKs bool
|
|
// intermediate query (i.e. traversal path).
|
|
sql *sql.Selector
|
|
path func(context.Context) (*sql.Selector, error)
|
|
}
|
|
|
|
// Where adds a new predicate for the AuthTokensQuery builder.
|
|
func (atq *AuthTokensQuery) Where(ps ...predicate.AuthTokens) *AuthTokensQuery {
|
|
atq.predicates = append(atq.predicates, ps...)
|
|
return atq
|
|
}
|
|
|
|
// Limit the number of records to be returned by this query.
|
|
func (atq *AuthTokensQuery) Limit(limit int) *AuthTokensQuery {
|
|
atq.ctx.Limit = &limit
|
|
return atq
|
|
}
|
|
|
|
// Offset to start from.
|
|
func (atq *AuthTokensQuery) Offset(offset int) *AuthTokensQuery {
|
|
atq.ctx.Offset = &offset
|
|
return atq
|
|
}
|
|
|
|
// Unique configures the query builder to filter duplicate records on query.
|
|
// By default, unique is set to true, and can be disabled using this method.
|
|
func (atq *AuthTokensQuery) Unique(unique bool) *AuthTokensQuery {
|
|
atq.ctx.Unique = &unique
|
|
return atq
|
|
}
|
|
|
|
// Order specifies how the records should be ordered.
|
|
func (atq *AuthTokensQuery) Order(o ...authtokens.OrderOption) *AuthTokensQuery {
|
|
atq.order = append(atq.order, o...)
|
|
return atq
|
|
}
|
|
|
|
// QueryUser chains the current query on the "user" edge.
|
|
func (atq *AuthTokensQuery) QueryUser() *UserQuery {
|
|
query := (&UserClient{config: atq.config}).Query()
|
|
query.path = func(ctx context.Context) (fromU *sql.Selector, err error) {
|
|
if err := atq.prepareQuery(ctx); err != nil {
|
|
return nil, err
|
|
}
|
|
selector := atq.sqlQuery(ctx)
|
|
if err := selector.Err(); err != nil {
|
|
return nil, err
|
|
}
|
|
step := sqlgraph.NewStep(
|
|
sqlgraph.From(authtokens.Table, authtokens.FieldID, selector),
|
|
sqlgraph.To(user.Table, user.FieldID),
|
|
sqlgraph.Edge(sqlgraph.M2O, true, authtokens.UserTable, authtokens.UserColumn),
|
|
)
|
|
fromU = sqlgraph.SetNeighbors(atq.driver.Dialect(), step)
|
|
return fromU, nil
|
|
}
|
|
return query
|
|
}
|
|
|
|
// QueryRoles chains the current query on the "roles" edge.
|
|
func (atq *AuthTokensQuery) QueryRoles() *AuthRolesQuery {
|
|
query := (&AuthRolesClient{config: atq.config}).Query()
|
|
query.path = func(ctx context.Context) (fromU *sql.Selector, err error) {
|
|
if err := atq.prepareQuery(ctx); err != nil {
|
|
return nil, err
|
|
}
|
|
selector := atq.sqlQuery(ctx)
|
|
if err := selector.Err(); err != nil {
|
|
return nil, err
|
|
}
|
|
step := sqlgraph.NewStep(
|
|
sqlgraph.From(authtokens.Table, authtokens.FieldID, selector),
|
|
sqlgraph.To(authroles.Table, authroles.FieldID),
|
|
sqlgraph.Edge(sqlgraph.O2O, false, authtokens.RolesTable, authtokens.RolesColumn),
|
|
)
|
|
fromU = sqlgraph.SetNeighbors(atq.driver.Dialect(), step)
|
|
return fromU, nil
|
|
}
|
|
return query
|
|
}
|
|
|
|
// First returns the first AuthTokens entity from the query.
|
|
// Returns a *NotFoundError when no AuthTokens was found.
|
|
func (atq *AuthTokensQuery) First(ctx context.Context) (*AuthTokens, error) {
|
|
nodes, err := atq.Limit(1).All(setContextOp(ctx, atq.ctx, "First"))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if len(nodes) == 0 {
|
|
return nil, &NotFoundError{authtokens.Label}
|
|
}
|
|
return nodes[0], nil
|
|
}
|
|
|
|
// FirstX is like First, but panics if an error occurs.
|
|
func (atq *AuthTokensQuery) FirstX(ctx context.Context) *AuthTokens {
|
|
node, err := atq.First(ctx)
|
|
if err != nil && !IsNotFound(err) {
|
|
panic(err)
|
|
}
|
|
return node
|
|
}
|
|
|
|
// FirstID returns the first AuthTokens ID from the query.
|
|
// Returns a *NotFoundError when no AuthTokens ID was found.
|
|
func (atq *AuthTokensQuery) FirstID(ctx context.Context) (id uuid.UUID, err error) {
|
|
var ids []uuid.UUID
|
|
if ids, err = atq.Limit(1).IDs(setContextOp(ctx, atq.ctx, "FirstID")); err != nil {
|
|
return
|
|
}
|
|
if len(ids) == 0 {
|
|
err = &NotFoundError{authtokens.Label}
|
|
return
|
|
}
|
|
return ids[0], nil
|
|
}
|
|
|
|
// FirstIDX is like FirstID, but panics if an error occurs.
|
|
func (atq *AuthTokensQuery) FirstIDX(ctx context.Context) uuid.UUID {
|
|
id, err := atq.FirstID(ctx)
|
|
if err != nil && !IsNotFound(err) {
|
|
panic(err)
|
|
}
|
|
return id
|
|
}
|
|
|
|
// Only returns a single AuthTokens entity found by the query, ensuring it only returns one.
|
|
// Returns a *NotSingularError when more than one AuthTokens entity is found.
|
|
// Returns a *NotFoundError when no AuthTokens entities are found.
|
|
func (atq *AuthTokensQuery) Only(ctx context.Context) (*AuthTokens, error) {
|
|
nodes, err := atq.Limit(2).All(setContextOp(ctx, atq.ctx, "Only"))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
switch len(nodes) {
|
|
case 1:
|
|
return nodes[0], nil
|
|
case 0:
|
|
return nil, &NotFoundError{authtokens.Label}
|
|
default:
|
|
return nil, &NotSingularError{authtokens.Label}
|
|
}
|
|
}
|
|
|
|
// OnlyX is like Only, but panics if an error occurs.
|
|
func (atq *AuthTokensQuery) OnlyX(ctx context.Context) *AuthTokens {
|
|
node, err := atq.Only(ctx)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
return node
|
|
}
|
|
|
|
// OnlyID is like Only, but returns the only AuthTokens ID in the query.
|
|
// Returns a *NotSingularError when more than one AuthTokens ID is found.
|
|
// Returns a *NotFoundError when no entities are found.
|
|
func (atq *AuthTokensQuery) OnlyID(ctx context.Context) (id uuid.UUID, err error) {
|
|
var ids []uuid.UUID
|
|
if ids, err = atq.Limit(2).IDs(setContextOp(ctx, atq.ctx, "OnlyID")); err != nil {
|
|
return
|
|
}
|
|
switch len(ids) {
|
|
case 1:
|
|
id = ids[0]
|
|
case 0:
|
|
err = &NotFoundError{authtokens.Label}
|
|
default:
|
|
err = &NotSingularError{authtokens.Label}
|
|
}
|
|
return
|
|
}
|
|
|
|
// OnlyIDX is like OnlyID, but panics if an error occurs.
|
|
func (atq *AuthTokensQuery) OnlyIDX(ctx context.Context) uuid.UUID {
|
|
id, err := atq.OnlyID(ctx)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
return id
|
|
}
|
|
|
|
// All executes the query and returns a list of AuthTokensSlice.
|
|
func (atq *AuthTokensQuery) All(ctx context.Context) ([]*AuthTokens, error) {
|
|
ctx = setContextOp(ctx, atq.ctx, "All")
|
|
if err := atq.prepareQuery(ctx); err != nil {
|
|
return nil, err
|
|
}
|
|
qr := querierAll[[]*AuthTokens, *AuthTokensQuery]()
|
|
return withInterceptors[[]*AuthTokens](ctx, atq, qr, atq.inters)
|
|
}
|
|
|
|
// AllX is like All, but panics if an error occurs.
|
|
func (atq *AuthTokensQuery) AllX(ctx context.Context) []*AuthTokens {
|
|
nodes, err := atq.All(ctx)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
return nodes
|
|
}
|
|
|
|
// IDs executes the query and returns a list of AuthTokens IDs.
|
|
func (atq *AuthTokensQuery) IDs(ctx context.Context) (ids []uuid.UUID, err error) {
|
|
if atq.ctx.Unique == nil && atq.path != nil {
|
|
atq.Unique(true)
|
|
}
|
|
ctx = setContextOp(ctx, atq.ctx, "IDs")
|
|
if err = atq.Select(authtokens.FieldID).Scan(ctx, &ids); err != nil {
|
|
return nil, err
|
|
}
|
|
return ids, nil
|
|
}
|
|
|
|
// IDsX is like IDs, but panics if an error occurs.
|
|
func (atq *AuthTokensQuery) IDsX(ctx context.Context) []uuid.UUID {
|
|
ids, err := atq.IDs(ctx)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
return ids
|
|
}
|
|
|
|
// Count returns the count of the given query.
|
|
func (atq *AuthTokensQuery) Count(ctx context.Context) (int, error) {
|
|
ctx = setContextOp(ctx, atq.ctx, "Count")
|
|
if err := atq.prepareQuery(ctx); err != nil {
|
|
return 0, err
|
|
}
|
|
return withInterceptors[int](ctx, atq, querierCount[*AuthTokensQuery](), atq.inters)
|
|
}
|
|
|
|
// CountX is like Count, but panics if an error occurs.
|
|
func (atq *AuthTokensQuery) CountX(ctx context.Context) int {
|
|
count, err := atq.Count(ctx)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
return count
|
|
}
|
|
|
|
// Exist returns true if the query has elements in the graph.
|
|
func (atq *AuthTokensQuery) Exist(ctx context.Context) (bool, error) {
|
|
ctx = setContextOp(ctx, atq.ctx, "Exist")
|
|
switch _, err := atq.FirstID(ctx); {
|
|
case IsNotFound(err):
|
|
return false, nil
|
|
case err != nil:
|
|
return false, fmt.Errorf("ent: check existence: %w", err)
|
|
default:
|
|
return true, nil
|
|
}
|
|
}
|
|
|
|
// ExistX is like Exist, but panics if an error occurs.
|
|
func (atq *AuthTokensQuery) ExistX(ctx context.Context) bool {
|
|
exist, err := atq.Exist(ctx)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
return exist
|
|
}
|
|
|
|
// Clone returns a duplicate of the AuthTokensQuery builder, including all associated steps. It can be
|
|
// used to prepare common query builders and use them differently after the clone is made.
|
|
func (atq *AuthTokensQuery) Clone() *AuthTokensQuery {
|
|
if atq == nil {
|
|
return nil
|
|
}
|
|
return &AuthTokensQuery{
|
|
config: atq.config,
|
|
ctx: atq.ctx.Clone(),
|
|
order: append([]authtokens.OrderOption{}, atq.order...),
|
|
inters: append([]Interceptor{}, atq.inters...),
|
|
predicates: append([]predicate.AuthTokens{}, atq.predicates...),
|
|
withUser: atq.withUser.Clone(),
|
|
withRoles: atq.withRoles.Clone(),
|
|
// clone intermediate query.
|
|
sql: atq.sql.Clone(),
|
|
path: atq.path,
|
|
}
|
|
}
|
|
|
|
// WithUser tells the query-builder to eager-load the nodes that are connected to
|
|
// the "user" edge. The optional arguments are used to configure the query builder of the edge.
|
|
func (atq *AuthTokensQuery) WithUser(opts ...func(*UserQuery)) *AuthTokensQuery {
|
|
query := (&UserClient{config: atq.config}).Query()
|
|
for _, opt := range opts {
|
|
opt(query)
|
|
}
|
|
atq.withUser = query
|
|
return atq
|
|
}
|
|
|
|
// WithRoles tells the query-builder to eager-load the nodes that are connected to
|
|
// the "roles" edge. The optional arguments are used to configure the query builder of the edge.
|
|
func (atq *AuthTokensQuery) WithRoles(opts ...func(*AuthRolesQuery)) *AuthTokensQuery {
|
|
query := (&AuthRolesClient{config: atq.config}).Query()
|
|
for _, opt := range opts {
|
|
opt(query)
|
|
}
|
|
atq.withRoles = query
|
|
return atq
|
|
}
|
|
|
|
// GroupBy is used to group vertices by one or more fields/columns.
|
|
// It is often used with aggregate functions, like: count, max, mean, min, sum.
|
|
//
|
|
// Example:
|
|
//
|
|
// var v []struct {
|
|
// CreatedAt time.Time `json:"created_at,omitempty"`
|
|
// Count int `json:"count,omitempty"`
|
|
// }
|
|
//
|
|
// client.AuthTokens.Query().
|
|
// GroupBy(authtokens.FieldCreatedAt).
|
|
// Aggregate(ent.Count()).
|
|
// Scan(ctx, &v)
|
|
func (atq *AuthTokensQuery) GroupBy(field string, fields ...string) *AuthTokensGroupBy {
|
|
atq.ctx.Fields = append([]string{field}, fields...)
|
|
grbuild := &AuthTokensGroupBy{build: atq}
|
|
grbuild.flds = &atq.ctx.Fields
|
|
grbuild.label = authtokens.Label
|
|
grbuild.scan = grbuild.Scan
|
|
return grbuild
|
|
}
|
|
|
|
// Select allows the selection one or more fields/columns for the given query,
|
|
// instead of selecting all fields in the entity.
|
|
//
|
|
// Example:
|
|
//
|
|
// var v []struct {
|
|
// CreatedAt time.Time `json:"created_at,omitempty"`
|
|
// }
|
|
//
|
|
// client.AuthTokens.Query().
|
|
// Select(authtokens.FieldCreatedAt).
|
|
// Scan(ctx, &v)
|
|
func (atq *AuthTokensQuery) Select(fields ...string) *AuthTokensSelect {
|
|
atq.ctx.Fields = append(atq.ctx.Fields, fields...)
|
|
sbuild := &AuthTokensSelect{AuthTokensQuery: atq}
|
|
sbuild.label = authtokens.Label
|
|
sbuild.flds, sbuild.scan = &atq.ctx.Fields, sbuild.Scan
|
|
return sbuild
|
|
}
|
|
|
|
// Aggregate returns a AuthTokensSelect configured with the given aggregations.
|
|
func (atq *AuthTokensQuery) Aggregate(fns ...AggregateFunc) *AuthTokensSelect {
|
|
return atq.Select().Aggregate(fns...)
|
|
}
|
|
|
|
func (atq *AuthTokensQuery) prepareQuery(ctx context.Context) error {
|
|
for _, inter := range atq.inters {
|
|
if inter == nil {
|
|
return fmt.Errorf("ent: uninitialized interceptor (forgotten import ent/runtime?)")
|
|
}
|
|
if trv, ok := inter.(Traverser); ok {
|
|
if err := trv.Traverse(ctx, atq); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
for _, f := range atq.ctx.Fields {
|
|
if !authtokens.ValidColumn(f) {
|
|
return &ValidationError{Name: f, err: fmt.Errorf("ent: invalid field %q for query", f)}
|
|
}
|
|
}
|
|
if atq.path != nil {
|
|
prev, err := atq.path(ctx)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
atq.sql = prev
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (atq *AuthTokensQuery) sqlAll(ctx context.Context, hooks ...queryHook) ([]*AuthTokens, error) {
|
|
var (
|
|
nodes = []*AuthTokens{}
|
|
withFKs = atq.withFKs
|
|
_spec = atq.querySpec()
|
|
loadedTypes = [2]bool{
|
|
atq.withUser != nil,
|
|
atq.withRoles != nil,
|
|
}
|
|
)
|
|
if atq.withUser != nil {
|
|
withFKs = true
|
|
}
|
|
if withFKs {
|
|
_spec.Node.Columns = append(_spec.Node.Columns, authtokens.ForeignKeys...)
|
|
}
|
|
_spec.ScanValues = func(columns []string) ([]any, error) {
|
|
return (*AuthTokens).scanValues(nil, columns)
|
|
}
|
|
_spec.Assign = func(columns []string, values []any) error {
|
|
node := &AuthTokens{config: atq.config}
|
|
nodes = append(nodes, node)
|
|
node.Edges.loadedTypes = loadedTypes
|
|
return node.assignValues(columns, values)
|
|
}
|
|
for i := range hooks {
|
|
hooks[i](ctx, _spec)
|
|
}
|
|
if err := sqlgraph.QueryNodes(ctx, atq.driver, _spec); err != nil {
|
|
return nil, err
|
|
}
|
|
if len(nodes) == 0 {
|
|
return nodes, nil
|
|
}
|
|
if query := atq.withUser; query != nil {
|
|
if err := atq.loadUser(ctx, query, nodes, nil,
|
|
func(n *AuthTokens, e *User) { n.Edges.User = e }); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
if query := atq.withRoles; query != nil {
|
|
if err := atq.loadRoles(ctx, query, nodes, nil,
|
|
func(n *AuthTokens, e *AuthRoles) { n.Edges.Roles = e }); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
return nodes, nil
|
|
}
|
|
|
|
func (atq *AuthTokensQuery) loadUser(ctx context.Context, query *UserQuery, nodes []*AuthTokens, init func(*AuthTokens), assign func(*AuthTokens, *User)) error {
|
|
ids := make([]uuid.UUID, 0, len(nodes))
|
|
nodeids := make(map[uuid.UUID][]*AuthTokens)
|
|
for i := range nodes {
|
|
if nodes[i].user_auth_tokens == nil {
|
|
continue
|
|
}
|
|
fk := *nodes[i].user_auth_tokens
|
|
if _, ok := nodeids[fk]; !ok {
|
|
ids = append(ids, fk)
|
|
}
|
|
nodeids[fk] = append(nodeids[fk], nodes[i])
|
|
}
|
|
if len(ids) == 0 {
|
|
return nil
|
|
}
|
|
query.Where(user.IDIn(ids...))
|
|
neighbors, err := query.All(ctx)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
for _, n := range neighbors {
|
|
nodes, ok := nodeids[n.ID]
|
|
if !ok {
|
|
return fmt.Errorf(`unexpected foreign-key "user_auth_tokens" returned %v`, n.ID)
|
|
}
|
|
for i := range nodes {
|
|
assign(nodes[i], n)
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
func (atq *AuthTokensQuery) loadRoles(ctx context.Context, query *AuthRolesQuery, nodes []*AuthTokens, init func(*AuthTokens), assign func(*AuthTokens, *AuthRoles)) error {
|
|
fks := make([]driver.Value, 0, len(nodes))
|
|
nodeids := make(map[uuid.UUID]*AuthTokens)
|
|
for i := range nodes {
|
|
fks = append(fks, nodes[i].ID)
|
|
nodeids[nodes[i].ID] = nodes[i]
|
|
}
|
|
query.withFKs = true
|
|
query.Where(predicate.AuthRoles(func(s *sql.Selector) {
|
|
s.Where(sql.InValues(s.C(authtokens.RolesColumn), fks...))
|
|
}))
|
|
neighbors, err := query.All(ctx)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
for _, n := range neighbors {
|
|
fk := n.auth_tokens_roles
|
|
if fk == nil {
|
|
return fmt.Errorf(`foreign-key "auth_tokens_roles" is nil for node %v`, n.ID)
|
|
}
|
|
node, ok := nodeids[*fk]
|
|
if !ok {
|
|
return fmt.Errorf(`unexpected referenced foreign-key "auth_tokens_roles" returned %v for node %v`, *fk, n.ID)
|
|
}
|
|
assign(node, n)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (atq *AuthTokensQuery) sqlCount(ctx context.Context) (int, error) {
|
|
_spec := atq.querySpec()
|
|
_spec.Node.Columns = atq.ctx.Fields
|
|
if len(atq.ctx.Fields) > 0 {
|
|
_spec.Unique = atq.ctx.Unique != nil && *atq.ctx.Unique
|
|
}
|
|
return sqlgraph.CountNodes(ctx, atq.driver, _spec)
|
|
}
|
|
|
|
func (atq *AuthTokensQuery) querySpec() *sqlgraph.QuerySpec {
|
|
_spec := sqlgraph.NewQuerySpec(authtokens.Table, authtokens.Columns, sqlgraph.NewFieldSpec(authtokens.FieldID, field.TypeUUID))
|
|
_spec.From = atq.sql
|
|
if unique := atq.ctx.Unique; unique != nil {
|
|
_spec.Unique = *unique
|
|
} else if atq.path != nil {
|
|
_spec.Unique = true
|
|
}
|
|
if fields := atq.ctx.Fields; len(fields) > 0 {
|
|
_spec.Node.Columns = make([]string, 0, len(fields))
|
|
_spec.Node.Columns = append(_spec.Node.Columns, authtokens.FieldID)
|
|
for i := range fields {
|
|
if fields[i] != authtokens.FieldID {
|
|
_spec.Node.Columns = append(_spec.Node.Columns, fields[i])
|
|
}
|
|
}
|
|
}
|
|
if ps := atq.predicates; len(ps) > 0 {
|
|
_spec.Predicate = func(selector *sql.Selector) {
|
|
for i := range ps {
|
|
ps[i](selector)
|
|
}
|
|
}
|
|
}
|
|
if limit := atq.ctx.Limit; limit != nil {
|
|
_spec.Limit = *limit
|
|
}
|
|
if offset := atq.ctx.Offset; offset != nil {
|
|
_spec.Offset = *offset
|
|
}
|
|
if ps := atq.order; len(ps) > 0 {
|
|
_spec.Order = func(selector *sql.Selector) {
|
|
for i := range ps {
|
|
ps[i](selector)
|
|
}
|
|
}
|
|
}
|
|
return _spec
|
|
}
|
|
|
|
func (atq *AuthTokensQuery) sqlQuery(ctx context.Context) *sql.Selector {
|
|
builder := sql.Dialect(atq.driver.Dialect())
|
|
t1 := builder.Table(authtokens.Table)
|
|
columns := atq.ctx.Fields
|
|
if len(columns) == 0 {
|
|
columns = authtokens.Columns
|
|
}
|
|
selector := builder.Select(t1.Columns(columns...)...).From(t1)
|
|
if atq.sql != nil {
|
|
selector = atq.sql
|
|
selector.Select(selector.Columns(columns...)...)
|
|
}
|
|
if atq.ctx.Unique != nil && *atq.ctx.Unique {
|
|
selector.Distinct()
|
|
}
|
|
for _, p := range atq.predicates {
|
|
p(selector)
|
|
}
|
|
for _, p := range atq.order {
|
|
p(selector)
|
|
}
|
|
if offset := atq.ctx.Offset; offset != nil {
|
|
// limit is mandatory for offset clause. We start
|
|
// with default value, and override it below if needed.
|
|
selector.Offset(*offset).Limit(math.MaxInt32)
|
|
}
|
|
if limit := atq.ctx.Limit; limit != nil {
|
|
selector.Limit(*limit)
|
|
}
|
|
return selector
|
|
}
|
|
|
|
// AuthTokensGroupBy is the group-by builder for AuthTokens entities.
|
|
type AuthTokensGroupBy struct {
|
|
selector
|
|
build *AuthTokensQuery
|
|
}
|
|
|
|
// Aggregate adds the given aggregation functions to the group-by query.
|
|
func (atgb *AuthTokensGroupBy) Aggregate(fns ...AggregateFunc) *AuthTokensGroupBy {
|
|
atgb.fns = append(atgb.fns, fns...)
|
|
return atgb
|
|
}
|
|
|
|
// Scan applies the selector query and scans the result into the given value.
|
|
func (atgb *AuthTokensGroupBy) Scan(ctx context.Context, v any) error {
|
|
ctx = setContextOp(ctx, atgb.build.ctx, "GroupBy")
|
|
if err := atgb.build.prepareQuery(ctx); err != nil {
|
|
return err
|
|
}
|
|
return scanWithInterceptors[*AuthTokensQuery, *AuthTokensGroupBy](ctx, atgb.build, atgb, atgb.build.inters, v)
|
|
}
|
|
|
|
func (atgb *AuthTokensGroupBy) sqlScan(ctx context.Context, root *AuthTokensQuery, v any) error {
|
|
selector := root.sqlQuery(ctx).Select()
|
|
aggregation := make([]string, 0, len(atgb.fns))
|
|
for _, fn := range atgb.fns {
|
|
aggregation = append(aggregation, fn(selector))
|
|
}
|
|
if len(selector.SelectedColumns()) == 0 {
|
|
columns := make([]string, 0, len(*atgb.flds)+len(atgb.fns))
|
|
for _, f := range *atgb.flds {
|
|
columns = append(columns, selector.C(f))
|
|
}
|
|
columns = append(columns, aggregation...)
|
|
selector.Select(columns...)
|
|
}
|
|
selector.GroupBy(selector.Columns(*atgb.flds...)...)
|
|
if err := selector.Err(); err != nil {
|
|
return err
|
|
}
|
|
rows := &sql.Rows{}
|
|
query, args := selector.Query()
|
|
if err := atgb.build.driver.Query(ctx, query, args, rows); err != nil {
|
|
return err
|
|
}
|
|
defer rows.Close()
|
|
return sql.ScanSlice(rows, v)
|
|
}
|
|
|
|
// AuthTokensSelect is the builder for selecting fields of AuthTokens entities.
|
|
type AuthTokensSelect struct {
|
|
*AuthTokensQuery
|
|
selector
|
|
}
|
|
|
|
// Aggregate adds the given aggregation functions to the selector query.
|
|
func (ats *AuthTokensSelect) Aggregate(fns ...AggregateFunc) *AuthTokensSelect {
|
|
ats.fns = append(ats.fns, fns...)
|
|
return ats
|
|
}
|
|
|
|
// Scan applies the selector query and scans the result into the given value.
|
|
func (ats *AuthTokensSelect) Scan(ctx context.Context, v any) error {
|
|
ctx = setContextOp(ctx, ats.ctx, "Select")
|
|
if err := ats.prepareQuery(ctx); err != nil {
|
|
return err
|
|
}
|
|
return scanWithInterceptors[*AuthTokensQuery, *AuthTokensSelect](ctx, ats.AuthTokensQuery, ats, ats.inters, v)
|
|
}
|
|
|
|
func (ats *AuthTokensSelect) sqlScan(ctx context.Context, root *AuthTokensQuery, v any) error {
|
|
selector := root.sqlQuery(ctx)
|
|
aggregation := make([]string, 0, len(ats.fns))
|
|
for _, fn := range ats.fns {
|
|
aggregation = append(aggregation, fn(selector))
|
|
}
|
|
switch n := len(*ats.selector.flds); {
|
|
case n == 0 && len(aggregation) > 0:
|
|
selector.Select(aggregation...)
|
|
case n != 0 && len(aggregation) > 0:
|
|
selector.AppendSelect(aggregation...)
|
|
}
|
|
rows := &sql.Rows{}
|
|
query, args := selector.Query()
|
|
if err := ats.driver.Query(ctx, query, args, rows); err != nil {
|
|
return err
|
|
}
|
|
defer rows.Close()
|
|
return sql.ScanSlice(rows, v)
|
|
}
|