forked from xo/xo
/
authuseruserpermission.xo.go
233 lines (187 loc) · 5.76 KB
/
authuseruserpermission.xo.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
// Package mysql contains the types for schema 'django'.
package mysql
// GENERATED BY XO. DO NOT EDIT.
import (
"errors"
)
// AuthUserUserPermission represents a row from 'django.auth_user_user_permissions'.
type AuthUserUserPermission struct {
ID int `json:"id"` // id
UserID int `json:"user_id"` // user_id
PermissionID int `json:"permission_id"` // permission_id
// xo fields
_exists, _deleted bool
}
// Exists determines if the AuthUserUserPermission exists in the database.
func (auup *AuthUserUserPermission) Exists() bool {
return auup._exists
}
// Deleted provides information if the AuthUserUserPermission has been deleted from the database.
func (auup *AuthUserUserPermission) Deleted() bool {
return auup._deleted
}
// Insert inserts the AuthUserUserPermission to the database.
func (auup *AuthUserUserPermission) Insert(db XODB) error {
var err error
// if already exist, bail
if auup._exists {
return errors.New("insert failed: already exists")
}
// sql insert query, primary key provided by autoincrement
const sqlstr = `INSERT INTO django.auth_user_user_permissions (` +
`user_id, permission_id` +
`) VALUES (` +
`?, ?` +
`)`
// run query
XOLog(sqlstr, auup.UserID, auup.PermissionID)
res, err := db.Exec(sqlstr, auup.UserID, auup.PermissionID)
if err != nil {
return err
}
// retrieve id
id, err := res.LastInsertId()
if err != nil {
return err
}
// set primary key and existence
auup.ID = int(id)
auup._exists = true
return nil
}
// Update updates the AuthUserUserPermission in the database.
func (auup *AuthUserUserPermission) Update(db XODB) error {
var err error
// if doesn't exist, bail
if !auup._exists {
return errors.New("update failed: does not exist")
}
// if deleted, bail
if auup._deleted {
return errors.New("update failed: marked for deletion")
}
// sql query
const sqlstr = `UPDATE django.auth_user_user_permissions SET ` +
`user_id = ?, permission_id = ?` +
` WHERE id = ?`
// run query
XOLog(sqlstr, auup.UserID, auup.PermissionID, auup.ID)
_, err = db.Exec(sqlstr, auup.UserID, auup.PermissionID, auup.ID)
return err
}
// Save saves the AuthUserUserPermission to the database.
func (auup *AuthUserUserPermission) Save(db XODB) error {
if auup.Exists() {
return auup.Update(db)
}
return auup.Insert(db)
}
// Delete deletes the AuthUserUserPermission from the database.
func (auup *AuthUserUserPermission) Delete(db XODB) error {
var err error
// if doesn't exist, bail
if !auup._exists {
return nil
}
// if deleted, bail
if auup._deleted {
return nil
}
// sql query
const sqlstr = `DELETE FROM django.auth_user_user_permissions WHERE id = ?`
// run query
XOLog(sqlstr, auup.ID)
_, err = db.Exec(sqlstr, auup.ID)
if err != nil {
return err
}
// set deleted
auup._deleted = true
return nil
}
// AuthPermission returns the AuthPermission associated with the AuthUserUserPermission's PermissionID (permission_id).
//
// Generated from foreign key 'auth_user_user_perm_permission_id_1fbb5f2c_fk_auth_permission_id'.
func (auup *AuthUserUserPermission) AuthPermission(db XODB) (*AuthPermission, error) {
return AuthPermissionByID(db, auup.PermissionID)
}
// AuthUser returns the AuthUser associated with the AuthUserUserPermission's UserID (user_id).
//
// Generated from foreign key 'auth_user_user_permissions_user_id_a95ead1b_fk_auth_user_id'.
func (auup *AuthUserUserPermission) AuthUser(db XODB) (*AuthUser, error) {
return AuthUserByID(db, auup.UserID)
}
// AuthUserUserPermissionsByPermissionID retrieves a row from 'django.auth_user_user_permissions' as a AuthUserUserPermission.
//
// Generated from index 'auth_user_user_perm_permission_id_1fbb5f2c_fk_auth_permission_id'.
func AuthUserUserPermissionsByPermissionID(db XODB, permissionID int) ([]*AuthUserUserPermission, error) {
var err error
// sql query
const sqlstr = `SELECT ` +
`id, user_id, permission_id ` +
`FROM django.auth_user_user_permissions ` +
`WHERE permission_id = ?`
// run query
XOLog(sqlstr, permissionID)
q, err := db.Query(sqlstr, permissionID)
if err != nil {
return nil, err
}
defer q.Close()
// load results
res := []*AuthUserUserPermission{}
for q.Next() {
auup := AuthUserUserPermission{
_exists: true,
}
// scan
err = q.Scan(&auup.ID, &auup.UserID, &auup.PermissionID)
if err != nil {
return nil, err
}
res = append(res, &auup)
}
return res, nil
}
// AuthUserUserPermissionByID retrieves a row from 'django.auth_user_user_permissions' as a AuthUserUserPermission.
//
// Generated from index 'auth_user_user_permissions_id_pkey'.
func AuthUserUserPermissionByID(db XODB, id int) (*AuthUserUserPermission, error) {
var err error
// sql query
const sqlstr = `SELECT ` +
`id, user_id, permission_id ` +
`FROM django.auth_user_user_permissions ` +
`WHERE id = ?`
// run query
XOLog(sqlstr, id)
auup := AuthUserUserPermission{
_exists: true,
}
err = db.QueryRow(sqlstr, id).Scan(&auup.ID, &auup.UserID, &auup.PermissionID)
if err != nil {
return nil, err
}
return &auup, nil
}
// AuthUserUserPermissionByUserIDPermissionID retrieves a row from 'django.auth_user_user_permissions' as a AuthUserUserPermission.
//
// Generated from index 'auth_user_user_permissions_user_id_14a6b632_uniq'.
func AuthUserUserPermissionByUserIDPermissionID(db XODB, userID int, permissionID int) (*AuthUserUserPermission, error) {
var err error
// sql query
const sqlstr = `SELECT ` +
`id, user_id, permission_id ` +
`FROM django.auth_user_user_permissions ` +
`WHERE user_id = ? AND permission_id = ?`
// run query
XOLog(sqlstr, userID, permissionID)
auup := AuthUserUserPermission{
_exists: true,
}
err = db.QueryRow(sqlstr, userID, permissionID).Scan(&auup.ID, &auup.UserID, &auup.PermissionID)
if err != nil {
return nil, err
}
return &auup, nil
}