fixes 45 - cant generate
This commit is contained in:
parent
ed327dc066
commit
ff82ba532a
29 changed files with 1605 additions and 2481 deletions
|
|
@ -1,10 +1,9 @@
|
|||
// Code generated by entc, DO NOT EDIT.
|
||||
// Code generated by ent, DO NOT EDIT.
|
||||
|
||||
package ent
|
||||
|
||||
import (
|
||||
"context"
|
||||
"errors"
|
||||
"fmt"
|
||||
"math"
|
||||
|
||||
|
|
@ -19,15 +18,12 @@ import (
|
|||
// PasswordTokenQuery is the builder for querying PasswordToken entities.
|
||||
type PasswordTokenQuery struct {
|
||||
config
|
||||
limit *int
|
||||
offset *int
|
||||
unique *bool
|
||||
order []OrderFunc
|
||||
fields []string
|
||||
ctx *QueryContext
|
||||
order []passwordtoken.OrderOption
|
||||
inters []Interceptor
|
||||
predicates []predicate.PasswordToken
|
||||
// eager-loading edges.
|
||||
withUser *UserQuery
|
||||
withFKs bool
|
||||
withUser *UserQuery
|
||||
withFKs bool
|
||||
// intermediate query (i.e. traversal path).
|
||||
sql *sql.Selector
|
||||
path func(context.Context) (*sql.Selector, error)
|
||||
|
|
@ -39,34 +35,34 @@ func (ptq *PasswordTokenQuery) Where(ps ...predicate.PasswordToken) *PasswordTok
|
|||
return ptq
|
||||
}
|
||||
|
||||
// Limit adds a limit step to the query.
|
||||
// Limit the number of records to be returned by this query.
|
||||
func (ptq *PasswordTokenQuery) Limit(limit int) *PasswordTokenQuery {
|
||||
ptq.limit = &limit
|
||||
ptq.ctx.Limit = &limit
|
||||
return ptq
|
||||
}
|
||||
|
||||
// Offset adds an offset step to the query.
|
||||
// Offset to start from.
|
||||
func (ptq *PasswordTokenQuery) Offset(offset int) *PasswordTokenQuery {
|
||||
ptq.offset = &offset
|
||||
ptq.ctx.Offset = &offset
|
||||
return ptq
|
||||
}
|
||||
|
||||
// Unique configures the query builder to filter duplicate records on query.
|
||||
// By default, unique is set to true, and can be disabled using this method.
|
||||
func (ptq *PasswordTokenQuery) Unique(unique bool) *PasswordTokenQuery {
|
||||
ptq.unique = &unique
|
||||
ptq.ctx.Unique = &unique
|
||||
return ptq
|
||||
}
|
||||
|
||||
// Order adds an order step to the query.
|
||||
func (ptq *PasswordTokenQuery) Order(o ...OrderFunc) *PasswordTokenQuery {
|
||||
// Order specifies how the records should be ordered.
|
||||
func (ptq *PasswordTokenQuery) Order(o ...passwordtoken.OrderOption) *PasswordTokenQuery {
|
||||
ptq.order = append(ptq.order, o...)
|
||||
return ptq
|
||||
}
|
||||
|
||||
// QueryUser chains the current query on the "user" edge.
|
||||
func (ptq *PasswordTokenQuery) QueryUser() *UserQuery {
|
||||
query := &UserQuery{config: ptq.config}
|
||||
query := (&UserClient{config: ptq.config}).Query()
|
||||
query.path = func(ctx context.Context) (fromU *sql.Selector, err error) {
|
||||
if err := ptq.prepareQuery(ctx); err != nil {
|
||||
return nil, err
|
||||
|
|
@ -89,7 +85,7 @@ func (ptq *PasswordTokenQuery) QueryUser() *UserQuery {
|
|||
// First returns the first PasswordToken entity from the query.
|
||||
// Returns a *NotFoundError when no PasswordToken was found.
|
||||
func (ptq *PasswordTokenQuery) First(ctx context.Context) (*PasswordToken, error) {
|
||||
nodes, err := ptq.Limit(1).All(ctx)
|
||||
nodes, err := ptq.Limit(1).All(setContextOp(ctx, ptq.ctx, "First"))
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
|
@ -112,7 +108,7 @@ func (ptq *PasswordTokenQuery) FirstX(ctx context.Context) *PasswordToken {
|
|||
// Returns a *NotFoundError when no PasswordToken ID was found.
|
||||
func (ptq *PasswordTokenQuery) FirstID(ctx context.Context) (id int, err error) {
|
||||
var ids []int
|
||||
if ids, err = ptq.Limit(1).IDs(ctx); err != nil {
|
||||
if ids, err = ptq.Limit(1).IDs(setContextOp(ctx, ptq.ctx, "FirstID")); err != nil {
|
||||
return
|
||||
}
|
||||
if len(ids) == 0 {
|
||||
|
|
@ -132,10 +128,10 @@ func (ptq *PasswordTokenQuery) FirstIDX(ctx context.Context) int {
|
|||
}
|
||||
|
||||
// Only returns a single PasswordToken entity found by the query, ensuring it only returns one.
|
||||
// Returns a *NotSingularError when exactly one PasswordToken entity is not found.
|
||||
// Returns a *NotSingularError when more than one PasswordToken entity is found.
|
||||
// Returns a *NotFoundError when no PasswordToken entities are found.
|
||||
func (ptq *PasswordTokenQuery) Only(ctx context.Context) (*PasswordToken, error) {
|
||||
nodes, err := ptq.Limit(2).All(ctx)
|
||||
nodes, err := ptq.Limit(2).All(setContextOp(ctx, ptq.ctx, "Only"))
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
|
@ -159,11 +155,11 @@ func (ptq *PasswordTokenQuery) OnlyX(ctx context.Context) *PasswordToken {
|
|||
}
|
||||
|
||||
// OnlyID is like Only, but returns the only PasswordToken ID in the query.
|
||||
// Returns a *NotSingularError when exactly one PasswordToken ID is not found.
|
||||
// Returns a *NotSingularError when more than one PasswordToken ID is found.
|
||||
// Returns a *NotFoundError when no entities are found.
|
||||
func (ptq *PasswordTokenQuery) OnlyID(ctx context.Context) (id int, err error) {
|
||||
var ids []int
|
||||
if ids, err = ptq.Limit(2).IDs(ctx); err != nil {
|
||||
if ids, err = ptq.Limit(2).IDs(setContextOp(ctx, ptq.ctx, "OnlyID")); err != nil {
|
||||
return
|
||||
}
|
||||
switch len(ids) {
|
||||
|
|
@ -188,10 +184,12 @@ func (ptq *PasswordTokenQuery) OnlyIDX(ctx context.Context) int {
|
|||
|
||||
// All executes the query and returns a list of PasswordTokens.
|
||||
func (ptq *PasswordTokenQuery) All(ctx context.Context) ([]*PasswordToken, error) {
|
||||
ctx = setContextOp(ctx, ptq.ctx, "All")
|
||||
if err := ptq.prepareQuery(ctx); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return ptq.sqlAll(ctx)
|
||||
qr := querierAll[[]*PasswordToken, *PasswordTokenQuery]()
|
||||
return withInterceptors[[]*PasswordToken](ctx, ptq, qr, ptq.inters)
|
||||
}
|
||||
|
||||
// AllX is like All, but panics if an error occurs.
|
||||
|
|
@ -204,9 +202,12 @@ func (ptq *PasswordTokenQuery) AllX(ctx context.Context) []*PasswordToken {
|
|||
}
|
||||
|
||||
// IDs executes the query and returns a list of PasswordToken IDs.
|
||||
func (ptq *PasswordTokenQuery) IDs(ctx context.Context) ([]int, error) {
|
||||
var ids []int
|
||||
if err := ptq.Select(passwordtoken.FieldID).Scan(ctx, &ids); err != nil {
|
||||
func (ptq *PasswordTokenQuery) IDs(ctx context.Context) (ids []int, err error) {
|
||||
if ptq.ctx.Unique == nil && ptq.path != nil {
|
||||
ptq.Unique(true)
|
||||
}
|
||||
ctx = setContextOp(ctx, ptq.ctx, "IDs")
|
||||
if err = ptq.Select(passwordtoken.FieldID).Scan(ctx, &ids); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return ids, nil
|
||||
|
|
@ -223,10 +224,11 @@ func (ptq *PasswordTokenQuery) IDsX(ctx context.Context) []int {
|
|||
|
||||
// Count returns the count of the given query.
|
||||
func (ptq *PasswordTokenQuery) Count(ctx context.Context) (int, error) {
|
||||
ctx = setContextOp(ctx, ptq.ctx, "Count")
|
||||
if err := ptq.prepareQuery(ctx); err != nil {
|
||||
return 0, err
|
||||
}
|
||||
return ptq.sqlCount(ctx)
|
||||
return withInterceptors[int](ctx, ptq, querierCount[*PasswordTokenQuery](), ptq.inters)
|
||||
}
|
||||
|
||||
// CountX is like Count, but panics if an error occurs.
|
||||
|
|
@ -240,10 +242,15 @@ func (ptq *PasswordTokenQuery) CountX(ctx context.Context) int {
|
|||
|
||||
// Exist returns true if the query has elements in the graph.
|
||||
func (ptq *PasswordTokenQuery) Exist(ctx context.Context) (bool, error) {
|
||||
if err := ptq.prepareQuery(ctx); err != nil {
|
||||
return false, err
|
||||
ctx = setContextOp(ctx, ptq.ctx, "Exist")
|
||||
switch _, err := ptq.FirstID(ctx); {
|
||||
case IsNotFound(err):
|
||||
return false, nil
|
||||
case err != nil:
|
||||
return false, fmt.Errorf("ent: check existence: %w", err)
|
||||
default:
|
||||
return true, nil
|
||||
}
|
||||
return ptq.sqlExist(ctx)
|
||||
}
|
||||
|
||||
// ExistX is like Exist, but panics if an error occurs.
|
||||
|
|
@ -263,9 +270,9 @@ func (ptq *PasswordTokenQuery) Clone() *PasswordTokenQuery {
|
|||
}
|
||||
return &PasswordTokenQuery{
|
||||
config: ptq.config,
|
||||
limit: ptq.limit,
|
||||
offset: ptq.offset,
|
||||
order: append([]OrderFunc{}, ptq.order...),
|
||||
ctx: ptq.ctx.Clone(),
|
||||
order: append([]passwordtoken.OrderOption{}, ptq.order...),
|
||||
inters: append([]Interceptor{}, ptq.inters...),
|
||||
predicates: append([]predicate.PasswordToken{}, ptq.predicates...),
|
||||
withUser: ptq.withUser.Clone(),
|
||||
// clone intermediate query.
|
||||
|
|
@ -277,7 +284,7 @@ func (ptq *PasswordTokenQuery) Clone() *PasswordTokenQuery {
|
|||
// WithUser tells the query-builder to eager-load the nodes that are connected to
|
||||
// the "user" edge. The optional arguments are used to configure the query builder of the edge.
|
||||
func (ptq *PasswordTokenQuery) WithUser(opts ...func(*UserQuery)) *PasswordTokenQuery {
|
||||
query := &UserQuery{config: ptq.config}
|
||||
query := (&UserClient{config: ptq.config}).Query()
|
||||
for _, opt := range opts {
|
||||
opt(query)
|
||||
}
|
||||
|
|
@ -299,17 +306,13 @@ func (ptq *PasswordTokenQuery) WithUser(opts ...func(*UserQuery)) *PasswordToken
|
|||
// GroupBy(passwordtoken.FieldHash).
|
||||
// Aggregate(ent.Count()).
|
||||
// Scan(ctx, &v)
|
||||
//
|
||||
func (ptq *PasswordTokenQuery) GroupBy(field string, fields ...string) *PasswordTokenGroupBy {
|
||||
group := &PasswordTokenGroupBy{config: ptq.config}
|
||||
group.fields = append([]string{field}, fields...)
|
||||
group.path = func(ctx context.Context) (prev *sql.Selector, err error) {
|
||||
if err := ptq.prepareQuery(ctx); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return ptq.sqlQuery(ctx), nil
|
||||
}
|
||||
return group
|
||||
ptq.ctx.Fields = append([]string{field}, fields...)
|
||||
grbuild := &PasswordTokenGroupBy{build: ptq}
|
||||
grbuild.flds = &ptq.ctx.Fields
|
||||
grbuild.label = passwordtoken.Label
|
||||
grbuild.scan = grbuild.Scan
|
||||
return grbuild
|
||||
}
|
||||
|
||||
// Select allows the selection one or more fields/columns for the given query,
|
||||
|
|
@ -324,14 +327,31 @@ func (ptq *PasswordTokenQuery) GroupBy(field string, fields ...string) *Password
|
|||
// client.PasswordToken.Query().
|
||||
// Select(passwordtoken.FieldHash).
|
||||
// Scan(ctx, &v)
|
||||
//
|
||||
func (ptq *PasswordTokenQuery) Select(fields ...string) *PasswordTokenSelect {
|
||||
ptq.fields = append(ptq.fields, fields...)
|
||||
return &PasswordTokenSelect{PasswordTokenQuery: ptq}
|
||||
ptq.ctx.Fields = append(ptq.ctx.Fields, fields...)
|
||||
sbuild := &PasswordTokenSelect{PasswordTokenQuery: ptq}
|
||||
sbuild.label = passwordtoken.Label
|
||||
sbuild.flds, sbuild.scan = &ptq.ctx.Fields, sbuild.Scan
|
||||
return sbuild
|
||||
}
|
||||
|
||||
// Aggregate returns a PasswordTokenSelect configured with the given aggregations.
|
||||
func (ptq *PasswordTokenQuery) Aggregate(fns ...AggregateFunc) *PasswordTokenSelect {
|
||||
return ptq.Select().Aggregate(fns...)
|
||||
}
|
||||
|
||||
func (ptq *PasswordTokenQuery) prepareQuery(ctx context.Context) error {
|
||||
for _, f := range ptq.fields {
|
||||
for _, inter := range ptq.inters {
|
||||
if inter == nil {
|
||||
return fmt.Errorf("ent: uninitialized interceptor (forgotten import ent/runtime?)")
|
||||
}
|
||||
if trv, ok := inter.(Traverser); ok {
|
||||
if err := trv.Traverse(ctx, ptq); err != nil {
|
||||
return err
|
||||
}
|
||||
}
|
||||
}
|
||||
for _, f := range ptq.ctx.Fields {
|
||||
if !passwordtoken.ValidColumn(f) {
|
||||
return &ValidationError{Name: f, err: fmt.Errorf("ent: invalid field %q for query", f)}
|
||||
}
|
||||
|
|
@ -346,7 +366,7 @@ func (ptq *PasswordTokenQuery) prepareQuery(ctx context.Context) error {
|
|||
return nil
|
||||
}
|
||||
|
||||
func (ptq *PasswordTokenQuery) sqlAll(ctx context.Context) ([]*PasswordToken, error) {
|
||||
func (ptq *PasswordTokenQuery) sqlAll(ctx context.Context, hooks ...queryHook) ([]*PasswordToken, error) {
|
||||
var (
|
||||
nodes = []*PasswordToken{}
|
||||
withFKs = ptq.withFKs
|
||||
|
|
@ -361,92 +381,84 @@ func (ptq *PasswordTokenQuery) sqlAll(ctx context.Context) ([]*PasswordToken, er
|
|||
if withFKs {
|
||||
_spec.Node.Columns = append(_spec.Node.Columns, passwordtoken.ForeignKeys...)
|
||||
}
|
||||
_spec.ScanValues = func(columns []string) ([]interface{}, error) {
|
||||
_spec.ScanValues = func(columns []string) ([]any, error) {
|
||||
return (*PasswordToken).scanValues(nil, columns)
|
||||
}
|
||||
_spec.Assign = func(columns []string, values []any) error {
|
||||
node := &PasswordToken{config: ptq.config}
|
||||
nodes = append(nodes, node)
|
||||
return node.scanValues(columns)
|
||||
}
|
||||
_spec.Assign = func(columns []string, values []interface{}) error {
|
||||
if len(nodes) == 0 {
|
||||
return fmt.Errorf("ent: Assign called without calling ScanValues")
|
||||
}
|
||||
node := nodes[len(nodes)-1]
|
||||
node.Edges.loadedTypes = loadedTypes
|
||||
return node.assignValues(columns, values)
|
||||
}
|
||||
for i := range hooks {
|
||||
hooks[i](ctx, _spec)
|
||||
}
|
||||
if err := sqlgraph.QueryNodes(ctx, ptq.driver, _spec); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
if len(nodes) == 0 {
|
||||
return nodes, nil
|
||||
}
|
||||
|
||||
if query := ptq.withUser; query != nil {
|
||||
ids := make([]int, 0, len(nodes))
|
||||
nodeids := make(map[int][]*PasswordToken)
|
||||
for i := range nodes {
|
||||
if nodes[i].password_token_user == nil {
|
||||
continue
|
||||
}
|
||||
fk := *nodes[i].password_token_user
|
||||
if _, ok := nodeids[fk]; !ok {
|
||||
ids = append(ids, fk)
|
||||
}
|
||||
nodeids[fk] = append(nodeids[fk], nodes[i])
|
||||
}
|
||||
query.Where(user.IDIn(ids...))
|
||||
neighbors, err := query.All(ctx)
|
||||
if err != nil {
|
||||
if err := ptq.loadUser(ctx, query, nodes, nil,
|
||||
func(n *PasswordToken, e *User) { n.Edges.User = e }); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
for _, n := range neighbors {
|
||||
nodes, ok := nodeids[n.ID]
|
||||
if !ok {
|
||||
return nil, fmt.Errorf(`unexpected foreign-key "password_token_user" returned %v`, n.ID)
|
||||
}
|
||||
for i := range nodes {
|
||||
nodes[i].Edges.User = n
|
||||
}
|
||||
}
|
||||
return nodes, nil
|
||||
}
|
||||
|
||||
func (ptq *PasswordTokenQuery) loadUser(ctx context.Context, query *UserQuery, nodes []*PasswordToken, init func(*PasswordToken), assign func(*PasswordToken, *User)) error {
|
||||
ids := make([]int, 0, len(nodes))
|
||||
nodeids := make(map[int][]*PasswordToken)
|
||||
for i := range nodes {
|
||||
if nodes[i].password_token_user == nil {
|
||||
continue
|
||||
}
|
||||
fk := *nodes[i].password_token_user
|
||||
if _, ok := nodeids[fk]; !ok {
|
||||
ids = append(ids, fk)
|
||||
}
|
||||
nodeids[fk] = append(nodeids[fk], nodes[i])
|
||||
}
|
||||
if len(ids) == 0 {
|
||||
return nil
|
||||
}
|
||||
query.Where(user.IDIn(ids...))
|
||||
neighbors, err := query.All(ctx)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
for _, n := range neighbors {
|
||||
nodes, ok := nodeids[n.ID]
|
||||
if !ok {
|
||||
return fmt.Errorf(`unexpected foreign-key "password_token_user" returned %v`, n.ID)
|
||||
}
|
||||
for i := range nodes {
|
||||
assign(nodes[i], n)
|
||||
}
|
||||
}
|
||||
|
||||
return nodes, nil
|
||||
return nil
|
||||
}
|
||||
|
||||
func (ptq *PasswordTokenQuery) sqlCount(ctx context.Context) (int, error) {
|
||||
_spec := ptq.querySpec()
|
||||
_spec.Node.Columns = ptq.fields
|
||||
if len(ptq.fields) > 0 {
|
||||
_spec.Unique = ptq.unique != nil && *ptq.unique
|
||||
_spec.Node.Columns = ptq.ctx.Fields
|
||||
if len(ptq.ctx.Fields) > 0 {
|
||||
_spec.Unique = ptq.ctx.Unique != nil && *ptq.ctx.Unique
|
||||
}
|
||||
return sqlgraph.CountNodes(ctx, ptq.driver, _spec)
|
||||
}
|
||||
|
||||
func (ptq *PasswordTokenQuery) sqlExist(ctx context.Context) (bool, error) {
|
||||
n, err := ptq.sqlCount(ctx)
|
||||
if err != nil {
|
||||
return false, fmt.Errorf("ent: check existence: %w", err)
|
||||
}
|
||||
return n > 0, nil
|
||||
}
|
||||
|
||||
func (ptq *PasswordTokenQuery) querySpec() *sqlgraph.QuerySpec {
|
||||
_spec := &sqlgraph.QuerySpec{
|
||||
Node: &sqlgraph.NodeSpec{
|
||||
Table: passwordtoken.Table,
|
||||
Columns: passwordtoken.Columns,
|
||||
ID: &sqlgraph.FieldSpec{
|
||||
Type: field.TypeInt,
|
||||
Column: passwordtoken.FieldID,
|
||||
},
|
||||
},
|
||||
From: ptq.sql,
|
||||
Unique: true,
|
||||
}
|
||||
if unique := ptq.unique; unique != nil {
|
||||
_spec := sqlgraph.NewQuerySpec(passwordtoken.Table, passwordtoken.Columns, sqlgraph.NewFieldSpec(passwordtoken.FieldID, field.TypeInt))
|
||||
_spec.From = ptq.sql
|
||||
if unique := ptq.ctx.Unique; unique != nil {
|
||||
_spec.Unique = *unique
|
||||
} else if ptq.path != nil {
|
||||
_spec.Unique = true
|
||||
}
|
||||
if fields := ptq.fields; len(fields) > 0 {
|
||||
if fields := ptq.ctx.Fields; len(fields) > 0 {
|
||||
_spec.Node.Columns = make([]string, 0, len(fields))
|
||||
_spec.Node.Columns = append(_spec.Node.Columns, passwordtoken.FieldID)
|
||||
for i := range fields {
|
||||
|
|
@ -462,10 +474,10 @@ func (ptq *PasswordTokenQuery) querySpec() *sqlgraph.QuerySpec {
|
|||
}
|
||||
}
|
||||
}
|
||||
if limit := ptq.limit; limit != nil {
|
||||
if limit := ptq.ctx.Limit; limit != nil {
|
||||
_spec.Limit = *limit
|
||||
}
|
||||
if offset := ptq.offset; offset != nil {
|
||||
if offset := ptq.ctx.Offset; offset != nil {
|
||||
_spec.Offset = *offset
|
||||
}
|
||||
if ps := ptq.order; len(ps) > 0 {
|
||||
|
|
@ -481,7 +493,7 @@ func (ptq *PasswordTokenQuery) querySpec() *sqlgraph.QuerySpec {
|
|||
func (ptq *PasswordTokenQuery) sqlQuery(ctx context.Context) *sql.Selector {
|
||||
builder := sql.Dialect(ptq.driver.Dialect())
|
||||
t1 := builder.Table(passwordtoken.Table)
|
||||
columns := ptq.fields
|
||||
columns := ptq.ctx.Fields
|
||||
if len(columns) == 0 {
|
||||
columns = passwordtoken.Columns
|
||||
}
|
||||
|
|
@ -490,7 +502,7 @@ func (ptq *PasswordTokenQuery) sqlQuery(ctx context.Context) *sql.Selector {
|
|||
selector = ptq.sql
|
||||
selector.Select(selector.Columns(columns...)...)
|
||||
}
|
||||
if ptq.unique != nil && *ptq.unique {
|
||||
if ptq.ctx.Unique != nil && *ptq.ctx.Unique {
|
||||
selector.Distinct()
|
||||
}
|
||||
for _, p := range ptq.predicates {
|
||||
|
|
@ -499,12 +511,12 @@ func (ptq *PasswordTokenQuery) sqlQuery(ctx context.Context) *sql.Selector {
|
|||
for _, p := range ptq.order {
|
||||
p(selector)
|
||||
}
|
||||
if offset := ptq.offset; offset != nil {
|
||||
if offset := ptq.ctx.Offset; offset != nil {
|
||||
// limit is mandatory for offset clause. We start
|
||||
// with default value, and override it below if needed.
|
||||
selector.Offset(*offset).Limit(math.MaxInt32)
|
||||
}
|
||||
if limit := ptq.limit; limit != nil {
|
||||
if limit := ptq.ctx.Limit; limit != nil {
|
||||
selector.Limit(*limit)
|
||||
}
|
||||
return selector
|
||||
|
|
@ -512,12 +524,8 @@ func (ptq *PasswordTokenQuery) sqlQuery(ctx context.Context) *sql.Selector {
|
|||
|
||||
// PasswordTokenGroupBy is the group-by builder for PasswordToken entities.
|
||||
type PasswordTokenGroupBy struct {
|
||||
config
|
||||
fields []string
|
||||
fns []AggregateFunc
|
||||
// intermediate query (i.e. traversal path).
|
||||
sql *sql.Selector
|
||||
path func(context.Context) (*sql.Selector, error)
|
||||
selector
|
||||
build *PasswordTokenQuery
|
||||
}
|
||||
|
||||
// Aggregate adds the given aggregation functions to the group-by query.
|
||||
|
|
@ -526,471 +534,77 @@ func (ptgb *PasswordTokenGroupBy) Aggregate(fns ...AggregateFunc) *PasswordToken
|
|||
return ptgb
|
||||
}
|
||||
|
||||
// Scan applies the group-by query and scans the result into the given value.
|
||||
func (ptgb *PasswordTokenGroupBy) Scan(ctx context.Context, v interface{}) error {
|
||||
query, err := ptgb.path(ctx)
|
||||
if err != nil {
|
||||
// Scan applies the selector query and scans the result into the given value.
|
||||
func (ptgb *PasswordTokenGroupBy) Scan(ctx context.Context, v any) error {
|
||||
ctx = setContextOp(ctx, ptgb.build.ctx, "GroupBy")
|
||||
if err := ptgb.build.prepareQuery(ctx); err != nil {
|
||||
return err
|
||||
}
|
||||
ptgb.sql = query
|
||||
return ptgb.sqlScan(ctx, v)
|
||||
return scanWithInterceptors[*PasswordTokenQuery, *PasswordTokenGroupBy](ctx, ptgb.build, ptgb, ptgb.build.inters, v)
|
||||
}
|
||||
|
||||
// ScanX is like Scan, but panics if an error occurs.
|
||||
func (ptgb *PasswordTokenGroupBy) ScanX(ctx context.Context, v interface{}) {
|
||||
if err := ptgb.Scan(ctx, v); err != nil {
|
||||
panic(err)
|
||||
func (ptgb *PasswordTokenGroupBy) sqlScan(ctx context.Context, root *PasswordTokenQuery, v any) error {
|
||||
selector := root.sqlQuery(ctx).Select()
|
||||
aggregation := make([]string, 0, len(ptgb.fns))
|
||||
for _, fn := range ptgb.fns {
|
||||
aggregation = append(aggregation, fn(selector))
|
||||
}
|
||||
}
|
||||
|
||||
// Strings returns list of strings from group-by.
|
||||
// It is only allowed when executing a group-by query with one field.
|
||||
func (ptgb *PasswordTokenGroupBy) Strings(ctx context.Context) ([]string, error) {
|
||||
if len(ptgb.fields) > 1 {
|
||||
return nil, errors.New("ent: PasswordTokenGroupBy.Strings is not achievable when grouping more than 1 field")
|
||||
}
|
||||
var v []string
|
||||
if err := ptgb.Scan(ctx, &v); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return v, nil
|
||||
}
|
||||
|
||||
// StringsX is like Strings, but panics if an error occurs.
|
||||
func (ptgb *PasswordTokenGroupBy) StringsX(ctx context.Context) []string {
|
||||
v, err := ptgb.Strings(ctx)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
return v
|
||||
}
|
||||
|
||||
// String returns a single string from a group-by query.
|
||||
// It is only allowed when executing a group-by query with one field.
|
||||
func (ptgb *PasswordTokenGroupBy) String(ctx context.Context) (_ string, err error) {
|
||||
var v []string
|
||||
if v, err = ptgb.Strings(ctx); err != nil {
|
||||
return
|
||||
}
|
||||
switch len(v) {
|
||||
case 1:
|
||||
return v[0], nil
|
||||
case 0:
|
||||
err = &NotFoundError{passwordtoken.Label}
|
||||
default:
|
||||
err = fmt.Errorf("ent: PasswordTokenGroupBy.Strings returned %d results when one was expected", len(v))
|
||||
}
|
||||
return
|
||||
}
|
||||
|
||||
// StringX is like String, but panics if an error occurs.
|
||||
func (ptgb *PasswordTokenGroupBy) StringX(ctx context.Context) string {
|
||||
v, err := ptgb.String(ctx)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
return v
|
||||
}
|
||||
|
||||
// Ints returns list of ints from group-by.
|
||||
// It is only allowed when executing a group-by query with one field.
|
||||
func (ptgb *PasswordTokenGroupBy) Ints(ctx context.Context) ([]int, error) {
|
||||
if len(ptgb.fields) > 1 {
|
||||
return nil, errors.New("ent: PasswordTokenGroupBy.Ints is not achievable when grouping more than 1 field")
|
||||
}
|
||||
var v []int
|
||||
if err := ptgb.Scan(ctx, &v); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return v, nil
|
||||
}
|
||||
|
||||
// IntsX is like Ints, but panics if an error occurs.
|
||||
func (ptgb *PasswordTokenGroupBy) IntsX(ctx context.Context) []int {
|
||||
v, err := ptgb.Ints(ctx)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
return v
|
||||
}
|
||||
|
||||
// Int returns a single int from a group-by query.
|
||||
// It is only allowed when executing a group-by query with one field.
|
||||
func (ptgb *PasswordTokenGroupBy) Int(ctx context.Context) (_ int, err error) {
|
||||
var v []int
|
||||
if v, err = ptgb.Ints(ctx); err != nil {
|
||||
return
|
||||
}
|
||||
switch len(v) {
|
||||
case 1:
|
||||
return v[0], nil
|
||||
case 0:
|
||||
err = &NotFoundError{passwordtoken.Label}
|
||||
default:
|
||||
err = fmt.Errorf("ent: PasswordTokenGroupBy.Ints returned %d results when one was expected", len(v))
|
||||
}
|
||||
return
|
||||
}
|
||||
|
||||
// IntX is like Int, but panics if an error occurs.
|
||||
func (ptgb *PasswordTokenGroupBy) IntX(ctx context.Context) int {
|
||||
v, err := ptgb.Int(ctx)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
return v
|
||||
}
|
||||
|
||||
// Float64s returns list of float64s from group-by.
|
||||
// It is only allowed when executing a group-by query with one field.
|
||||
func (ptgb *PasswordTokenGroupBy) Float64s(ctx context.Context) ([]float64, error) {
|
||||
if len(ptgb.fields) > 1 {
|
||||
return nil, errors.New("ent: PasswordTokenGroupBy.Float64s is not achievable when grouping more than 1 field")
|
||||
}
|
||||
var v []float64
|
||||
if err := ptgb.Scan(ctx, &v); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return v, nil
|
||||
}
|
||||
|
||||
// Float64sX is like Float64s, but panics if an error occurs.
|
||||
func (ptgb *PasswordTokenGroupBy) Float64sX(ctx context.Context) []float64 {
|
||||
v, err := ptgb.Float64s(ctx)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
return v
|
||||
}
|
||||
|
||||
// Float64 returns a single float64 from a group-by query.
|
||||
// It is only allowed when executing a group-by query with one field.
|
||||
func (ptgb *PasswordTokenGroupBy) Float64(ctx context.Context) (_ float64, err error) {
|
||||
var v []float64
|
||||
if v, err = ptgb.Float64s(ctx); err != nil {
|
||||
return
|
||||
}
|
||||
switch len(v) {
|
||||
case 1:
|
||||
return v[0], nil
|
||||
case 0:
|
||||
err = &NotFoundError{passwordtoken.Label}
|
||||
default:
|
||||
err = fmt.Errorf("ent: PasswordTokenGroupBy.Float64s returned %d results when one was expected", len(v))
|
||||
}
|
||||
return
|
||||
}
|
||||
|
||||
// Float64X is like Float64, but panics if an error occurs.
|
||||
func (ptgb *PasswordTokenGroupBy) Float64X(ctx context.Context) float64 {
|
||||
v, err := ptgb.Float64(ctx)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
return v
|
||||
}
|
||||
|
||||
// Bools returns list of bools from group-by.
|
||||
// It is only allowed when executing a group-by query with one field.
|
||||
func (ptgb *PasswordTokenGroupBy) Bools(ctx context.Context) ([]bool, error) {
|
||||
if len(ptgb.fields) > 1 {
|
||||
return nil, errors.New("ent: PasswordTokenGroupBy.Bools is not achievable when grouping more than 1 field")
|
||||
}
|
||||
var v []bool
|
||||
if err := ptgb.Scan(ctx, &v); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return v, nil
|
||||
}
|
||||
|
||||
// BoolsX is like Bools, but panics if an error occurs.
|
||||
func (ptgb *PasswordTokenGroupBy) BoolsX(ctx context.Context) []bool {
|
||||
v, err := ptgb.Bools(ctx)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
return v
|
||||
}
|
||||
|
||||
// Bool returns a single bool from a group-by query.
|
||||
// It is only allowed when executing a group-by query with one field.
|
||||
func (ptgb *PasswordTokenGroupBy) Bool(ctx context.Context) (_ bool, err error) {
|
||||
var v []bool
|
||||
if v, err = ptgb.Bools(ctx); err != nil {
|
||||
return
|
||||
}
|
||||
switch len(v) {
|
||||
case 1:
|
||||
return v[0], nil
|
||||
case 0:
|
||||
err = &NotFoundError{passwordtoken.Label}
|
||||
default:
|
||||
err = fmt.Errorf("ent: PasswordTokenGroupBy.Bools returned %d results when one was expected", len(v))
|
||||
}
|
||||
return
|
||||
}
|
||||
|
||||
// BoolX is like Bool, but panics if an error occurs.
|
||||
func (ptgb *PasswordTokenGroupBy) BoolX(ctx context.Context) bool {
|
||||
v, err := ptgb.Bool(ctx)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
return v
|
||||
}
|
||||
|
||||
func (ptgb *PasswordTokenGroupBy) sqlScan(ctx context.Context, v interface{}) error {
|
||||
for _, f := range ptgb.fields {
|
||||
if !passwordtoken.ValidColumn(f) {
|
||||
return &ValidationError{Name: f, err: fmt.Errorf("invalid field %q for group-by", f)}
|
||||
if len(selector.SelectedColumns()) == 0 {
|
||||
columns := make([]string, 0, len(*ptgb.flds)+len(ptgb.fns))
|
||||
for _, f := range *ptgb.flds {
|
||||
columns = append(columns, selector.C(f))
|
||||
}
|
||||
columns = append(columns, aggregation...)
|
||||
selector.Select(columns...)
|
||||
}
|
||||
selector := ptgb.sqlQuery()
|
||||
selector.GroupBy(selector.Columns(*ptgb.flds...)...)
|
||||
if err := selector.Err(); err != nil {
|
||||
return err
|
||||
}
|
||||
rows := &sql.Rows{}
|
||||
query, args := selector.Query()
|
||||
if err := ptgb.driver.Query(ctx, query, args, rows); err != nil {
|
||||
if err := ptgb.build.driver.Query(ctx, query, args, rows); err != nil {
|
||||
return err
|
||||
}
|
||||
defer rows.Close()
|
||||
return sql.ScanSlice(rows, v)
|
||||
}
|
||||
|
||||
func (ptgb *PasswordTokenGroupBy) sqlQuery() *sql.Selector {
|
||||
selector := ptgb.sql.Select()
|
||||
aggregation := make([]string, 0, len(ptgb.fns))
|
||||
for _, fn := range ptgb.fns {
|
||||
aggregation = append(aggregation, fn(selector))
|
||||
}
|
||||
// If no columns were selected in a custom aggregation function, the default
|
||||
// selection is the fields used for "group-by", and the aggregation functions.
|
||||
if len(selector.SelectedColumns()) == 0 {
|
||||
columns := make([]string, 0, len(ptgb.fields)+len(ptgb.fns))
|
||||
for _, f := range ptgb.fields {
|
||||
columns = append(columns, selector.C(f))
|
||||
}
|
||||
columns = append(columns, aggregation...)
|
||||
selector.Select(columns...)
|
||||
}
|
||||
return selector.GroupBy(selector.Columns(ptgb.fields...)...)
|
||||
}
|
||||
|
||||
// PasswordTokenSelect is the builder for selecting fields of PasswordToken entities.
|
||||
type PasswordTokenSelect struct {
|
||||
*PasswordTokenQuery
|
||||
// intermediate query (i.e. traversal path).
|
||||
sql *sql.Selector
|
||||
selector
|
||||
}
|
||||
|
||||
// Aggregate adds the given aggregation functions to the selector query.
|
||||
func (pts *PasswordTokenSelect) Aggregate(fns ...AggregateFunc) *PasswordTokenSelect {
|
||||
pts.fns = append(pts.fns, fns...)
|
||||
return pts
|
||||
}
|
||||
|
||||
// Scan applies the selector query and scans the result into the given value.
|
||||
func (pts *PasswordTokenSelect) Scan(ctx context.Context, v interface{}) error {
|
||||
func (pts *PasswordTokenSelect) Scan(ctx context.Context, v any) error {
|
||||
ctx = setContextOp(ctx, pts.ctx, "Select")
|
||||
if err := pts.prepareQuery(ctx); err != nil {
|
||||
return err
|
||||
}
|
||||
pts.sql = pts.PasswordTokenQuery.sqlQuery(ctx)
|
||||
return pts.sqlScan(ctx, v)
|
||||
return scanWithInterceptors[*PasswordTokenQuery, *PasswordTokenSelect](ctx, pts.PasswordTokenQuery, pts, pts.inters, v)
|
||||
}
|
||||
|
||||
// ScanX is like Scan, but panics if an error occurs.
|
||||
func (pts *PasswordTokenSelect) ScanX(ctx context.Context, v interface{}) {
|
||||
if err := pts.Scan(ctx, v); err != nil {
|
||||
panic(err)
|
||||
func (pts *PasswordTokenSelect) sqlScan(ctx context.Context, root *PasswordTokenQuery, v any) error {
|
||||
selector := root.sqlQuery(ctx)
|
||||
aggregation := make([]string, 0, len(pts.fns))
|
||||
for _, fn := range pts.fns {
|
||||
aggregation = append(aggregation, fn(selector))
|
||||
}
|
||||
}
|
||||
|
||||
// Strings returns list of strings from a selector. It is only allowed when selecting one field.
|
||||
func (pts *PasswordTokenSelect) Strings(ctx context.Context) ([]string, error) {
|
||||
if len(pts.fields) > 1 {
|
||||
return nil, errors.New("ent: PasswordTokenSelect.Strings is not achievable when selecting more than 1 field")
|
||||
switch n := len(*pts.selector.flds); {
|
||||
case n == 0 && len(aggregation) > 0:
|
||||
selector.Select(aggregation...)
|
||||
case n != 0 && len(aggregation) > 0:
|
||||
selector.AppendSelect(aggregation...)
|
||||
}
|
||||
var v []string
|
||||
if err := pts.Scan(ctx, &v); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return v, nil
|
||||
}
|
||||
|
||||
// StringsX is like Strings, but panics if an error occurs.
|
||||
func (pts *PasswordTokenSelect) StringsX(ctx context.Context) []string {
|
||||
v, err := pts.Strings(ctx)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
return v
|
||||
}
|
||||
|
||||
// String returns a single string from a selector. It is only allowed when selecting one field.
|
||||
func (pts *PasswordTokenSelect) String(ctx context.Context) (_ string, err error) {
|
||||
var v []string
|
||||
if v, err = pts.Strings(ctx); err != nil {
|
||||
return
|
||||
}
|
||||
switch len(v) {
|
||||
case 1:
|
||||
return v[0], nil
|
||||
case 0:
|
||||
err = &NotFoundError{passwordtoken.Label}
|
||||
default:
|
||||
err = fmt.Errorf("ent: PasswordTokenSelect.Strings returned %d results when one was expected", len(v))
|
||||
}
|
||||
return
|
||||
}
|
||||
|
||||
// StringX is like String, but panics if an error occurs.
|
||||
func (pts *PasswordTokenSelect) StringX(ctx context.Context) string {
|
||||
v, err := pts.String(ctx)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
return v
|
||||
}
|
||||
|
||||
// Ints returns list of ints from a selector. It is only allowed when selecting one field.
|
||||
func (pts *PasswordTokenSelect) Ints(ctx context.Context) ([]int, error) {
|
||||
if len(pts.fields) > 1 {
|
||||
return nil, errors.New("ent: PasswordTokenSelect.Ints is not achievable when selecting more than 1 field")
|
||||
}
|
||||
var v []int
|
||||
if err := pts.Scan(ctx, &v); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return v, nil
|
||||
}
|
||||
|
||||
// IntsX is like Ints, but panics if an error occurs.
|
||||
func (pts *PasswordTokenSelect) IntsX(ctx context.Context) []int {
|
||||
v, err := pts.Ints(ctx)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
return v
|
||||
}
|
||||
|
||||
// Int returns a single int from a selector. It is only allowed when selecting one field.
|
||||
func (pts *PasswordTokenSelect) Int(ctx context.Context) (_ int, err error) {
|
||||
var v []int
|
||||
if v, err = pts.Ints(ctx); err != nil {
|
||||
return
|
||||
}
|
||||
switch len(v) {
|
||||
case 1:
|
||||
return v[0], nil
|
||||
case 0:
|
||||
err = &NotFoundError{passwordtoken.Label}
|
||||
default:
|
||||
err = fmt.Errorf("ent: PasswordTokenSelect.Ints returned %d results when one was expected", len(v))
|
||||
}
|
||||
return
|
||||
}
|
||||
|
||||
// IntX is like Int, but panics if an error occurs.
|
||||
func (pts *PasswordTokenSelect) IntX(ctx context.Context) int {
|
||||
v, err := pts.Int(ctx)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
return v
|
||||
}
|
||||
|
||||
// Float64s returns list of float64s from a selector. It is only allowed when selecting one field.
|
||||
func (pts *PasswordTokenSelect) Float64s(ctx context.Context) ([]float64, error) {
|
||||
if len(pts.fields) > 1 {
|
||||
return nil, errors.New("ent: PasswordTokenSelect.Float64s is not achievable when selecting more than 1 field")
|
||||
}
|
||||
var v []float64
|
||||
if err := pts.Scan(ctx, &v); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return v, nil
|
||||
}
|
||||
|
||||
// Float64sX is like Float64s, but panics if an error occurs.
|
||||
func (pts *PasswordTokenSelect) Float64sX(ctx context.Context) []float64 {
|
||||
v, err := pts.Float64s(ctx)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
return v
|
||||
}
|
||||
|
||||
// Float64 returns a single float64 from a selector. It is only allowed when selecting one field.
|
||||
func (pts *PasswordTokenSelect) Float64(ctx context.Context) (_ float64, err error) {
|
||||
var v []float64
|
||||
if v, err = pts.Float64s(ctx); err != nil {
|
||||
return
|
||||
}
|
||||
switch len(v) {
|
||||
case 1:
|
||||
return v[0], nil
|
||||
case 0:
|
||||
err = &NotFoundError{passwordtoken.Label}
|
||||
default:
|
||||
err = fmt.Errorf("ent: PasswordTokenSelect.Float64s returned %d results when one was expected", len(v))
|
||||
}
|
||||
return
|
||||
}
|
||||
|
||||
// Float64X is like Float64, but panics if an error occurs.
|
||||
func (pts *PasswordTokenSelect) Float64X(ctx context.Context) float64 {
|
||||
v, err := pts.Float64(ctx)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
return v
|
||||
}
|
||||
|
||||
// Bools returns list of bools from a selector. It is only allowed when selecting one field.
|
||||
func (pts *PasswordTokenSelect) Bools(ctx context.Context) ([]bool, error) {
|
||||
if len(pts.fields) > 1 {
|
||||
return nil, errors.New("ent: PasswordTokenSelect.Bools is not achievable when selecting more than 1 field")
|
||||
}
|
||||
var v []bool
|
||||
if err := pts.Scan(ctx, &v); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return v, nil
|
||||
}
|
||||
|
||||
// BoolsX is like Bools, but panics if an error occurs.
|
||||
func (pts *PasswordTokenSelect) BoolsX(ctx context.Context) []bool {
|
||||
v, err := pts.Bools(ctx)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
return v
|
||||
}
|
||||
|
||||
// Bool returns a single bool from a selector. It is only allowed when selecting one field.
|
||||
func (pts *PasswordTokenSelect) Bool(ctx context.Context) (_ bool, err error) {
|
||||
var v []bool
|
||||
if v, err = pts.Bools(ctx); err != nil {
|
||||
return
|
||||
}
|
||||
switch len(v) {
|
||||
case 1:
|
||||
return v[0], nil
|
||||
case 0:
|
||||
err = &NotFoundError{passwordtoken.Label}
|
||||
default:
|
||||
err = fmt.Errorf("ent: PasswordTokenSelect.Bools returned %d results when one was expected", len(v))
|
||||
}
|
||||
return
|
||||
}
|
||||
|
||||
// BoolX is like Bool, but panics if an error occurs.
|
||||
func (pts *PasswordTokenSelect) BoolX(ctx context.Context) bool {
|
||||
v, err := pts.Bool(ctx)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
return v
|
||||
}
|
||||
|
||||
func (pts *PasswordTokenSelect) sqlScan(ctx context.Context, v interface{}) error {
|
||||
rows := &sql.Rows{}
|
||||
query, args := pts.sql.Query()
|
||||
query, args := selector.Query()
|
||||
if err := pts.driver.Query(ctx, query, args, rows); err != nil {
|
||||
return err
|
||||
}
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue