// Code generated by ent, DO NOT EDIT. package ent import ( "context" "errors" "fmt" "entgo.io/ent/dialect/sql" "entgo.io/ent/dialect/sql/sqlgraph" "entgo.io/ent/schema/field" "git.dcentral.systems/toolz/goplt/internal/ent/permission" "git.dcentral.systems/toolz/goplt/internal/ent/predicate" "git.dcentral.systems/toolz/goplt/internal/ent/rolepermission" ) // PermissionUpdate is the builder for updating Permission entities. type PermissionUpdate struct { config hooks []Hook mutation *PermissionMutation } // Where appends a list predicates to the PermissionUpdate builder. func (_u *PermissionUpdate) Where(ps ...predicate.Permission) *PermissionUpdate { _u.mutation.Where(ps...) return _u } // SetName sets the "name" field. func (_u *PermissionUpdate) SetName(v string) *PermissionUpdate { _u.mutation.SetName(v) return _u } // SetNillableName sets the "name" field if the given value is not nil. func (_u *PermissionUpdate) SetNillableName(v *string) *PermissionUpdate { if v != nil { _u.SetName(*v) } return _u } // AddRolePermissionIDs adds the "role_permissions" edge to the RolePermission entity by IDs. func (_u *PermissionUpdate) AddRolePermissionIDs(ids ...int) *PermissionUpdate { _u.mutation.AddRolePermissionIDs(ids...) return _u } // AddRolePermissions adds the "role_permissions" edges to the RolePermission entity. func (_u *PermissionUpdate) AddRolePermissions(v ...*RolePermission) *PermissionUpdate { ids := make([]int, len(v)) for i := range v { ids[i] = v[i].ID } return _u.AddRolePermissionIDs(ids...) } // Mutation returns the PermissionMutation object of the builder. func (_u *PermissionUpdate) Mutation() *PermissionMutation { return _u.mutation } // ClearRolePermissions clears all "role_permissions" edges to the RolePermission entity. func (_u *PermissionUpdate) ClearRolePermissions() *PermissionUpdate { _u.mutation.ClearRolePermissions() return _u } // RemoveRolePermissionIDs removes the "role_permissions" edge to RolePermission entities by IDs. func (_u *PermissionUpdate) RemoveRolePermissionIDs(ids ...int) *PermissionUpdate { _u.mutation.RemoveRolePermissionIDs(ids...) return _u } // RemoveRolePermissions removes "role_permissions" edges to RolePermission entities. func (_u *PermissionUpdate) RemoveRolePermissions(v ...*RolePermission) *PermissionUpdate { ids := make([]int, len(v)) for i := range v { ids[i] = v[i].ID } return _u.RemoveRolePermissionIDs(ids...) } // Save executes the query and returns the number of nodes affected by the update operation. func (_u *PermissionUpdate) Save(ctx context.Context) (int, error) { return withHooks(ctx, _u.sqlSave, _u.mutation, _u.hooks) } // SaveX is like Save, but panics if an error occurs. func (_u *PermissionUpdate) SaveX(ctx context.Context) int { affected, err := _u.Save(ctx) if err != nil { panic(err) } return affected } // Exec executes the query. func (_u *PermissionUpdate) Exec(ctx context.Context) error { _, err := _u.Save(ctx) return err } // ExecX is like Exec, but panics if an error occurs. func (_u *PermissionUpdate) ExecX(ctx context.Context) { if err := _u.Exec(ctx); err != nil { panic(err) } } // check runs all checks and user-defined validators on the builder. func (_u *PermissionUpdate) check() error { if v, ok := _u.mutation.Name(); ok { if err := permission.NameValidator(v); err != nil { return &ValidationError{Name: "name", err: fmt.Errorf(`ent: validator failed for field "Permission.name": %w`, err)} } } return nil } func (_u *PermissionUpdate) sqlSave(ctx context.Context) (_node int, err error) { if err := _u.check(); err != nil { return _node, err } _spec := sqlgraph.NewUpdateSpec(permission.Table, permission.Columns, sqlgraph.NewFieldSpec(permission.FieldID, field.TypeString)) if ps := _u.mutation.predicates; len(ps) > 0 { _spec.Predicate = func(selector *sql.Selector) { for i := range ps { ps[i](selector) } } } if value, ok := _u.mutation.Name(); ok { _spec.SetField(permission.FieldName, field.TypeString, value) } if _u.mutation.RolePermissionsCleared() { edge := &sqlgraph.EdgeSpec{ Rel: sqlgraph.O2M, Inverse: false, Table: permission.RolePermissionsTable, Columns: []string{permission.RolePermissionsColumn}, Bidi: false, Target: &sqlgraph.EdgeTarget{ IDSpec: sqlgraph.NewFieldSpec(rolepermission.FieldID, field.TypeInt), }, } _spec.Edges.Clear = append(_spec.Edges.Clear, edge) } if nodes := _u.mutation.RemovedRolePermissionsIDs(); len(nodes) > 0 && !_u.mutation.RolePermissionsCleared() { edge := &sqlgraph.EdgeSpec{ Rel: sqlgraph.O2M, Inverse: false, Table: permission.RolePermissionsTable, Columns: []string{permission.RolePermissionsColumn}, Bidi: false, Target: &sqlgraph.EdgeTarget{ IDSpec: sqlgraph.NewFieldSpec(rolepermission.FieldID, field.TypeInt), }, } for _, k := range nodes { edge.Target.Nodes = append(edge.Target.Nodes, k) } _spec.Edges.Clear = append(_spec.Edges.Clear, edge) } if nodes := _u.mutation.RolePermissionsIDs(); len(nodes) > 0 { edge := &sqlgraph.EdgeSpec{ Rel: sqlgraph.O2M, Inverse: false, Table: permission.RolePermissionsTable, Columns: []string{permission.RolePermissionsColumn}, Bidi: false, Target: &sqlgraph.EdgeTarget{ IDSpec: sqlgraph.NewFieldSpec(rolepermission.FieldID, field.TypeInt), }, } for _, k := range nodes { edge.Target.Nodes = append(edge.Target.Nodes, k) } _spec.Edges.Add = append(_spec.Edges.Add, edge) } if _node, err = sqlgraph.UpdateNodes(ctx, _u.driver, _spec); err != nil { if _, ok := err.(*sqlgraph.NotFoundError); ok { err = &NotFoundError{permission.Label} } else if sqlgraph.IsConstraintError(err) { err = &ConstraintError{msg: err.Error(), wrap: err} } return 0, err } _u.mutation.done = true return _node, nil } // PermissionUpdateOne is the builder for updating a single Permission entity. type PermissionUpdateOne struct { config fields []string hooks []Hook mutation *PermissionMutation } // SetName sets the "name" field. func (_u *PermissionUpdateOne) SetName(v string) *PermissionUpdateOne { _u.mutation.SetName(v) return _u } // SetNillableName sets the "name" field if the given value is not nil. func (_u *PermissionUpdateOne) SetNillableName(v *string) *PermissionUpdateOne { if v != nil { _u.SetName(*v) } return _u } // AddRolePermissionIDs adds the "role_permissions" edge to the RolePermission entity by IDs. func (_u *PermissionUpdateOne) AddRolePermissionIDs(ids ...int) *PermissionUpdateOne { _u.mutation.AddRolePermissionIDs(ids...) return _u } // AddRolePermissions adds the "role_permissions" edges to the RolePermission entity. func (_u *PermissionUpdateOne) AddRolePermissions(v ...*RolePermission) *PermissionUpdateOne { ids := make([]int, len(v)) for i := range v { ids[i] = v[i].ID } return _u.AddRolePermissionIDs(ids...) } // Mutation returns the PermissionMutation object of the builder. func (_u *PermissionUpdateOne) Mutation() *PermissionMutation { return _u.mutation } // ClearRolePermissions clears all "role_permissions" edges to the RolePermission entity. func (_u *PermissionUpdateOne) ClearRolePermissions() *PermissionUpdateOne { _u.mutation.ClearRolePermissions() return _u } // RemoveRolePermissionIDs removes the "role_permissions" edge to RolePermission entities by IDs. func (_u *PermissionUpdateOne) RemoveRolePermissionIDs(ids ...int) *PermissionUpdateOne { _u.mutation.RemoveRolePermissionIDs(ids...) return _u } // RemoveRolePermissions removes "role_permissions" edges to RolePermission entities. func (_u *PermissionUpdateOne) RemoveRolePermissions(v ...*RolePermission) *PermissionUpdateOne { ids := make([]int, len(v)) for i := range v { ids[i] = v[i].ID } return _u.RemoveRolePermissionIDs(ids...) } // Where appends a list predicates to the PermissionUpdate builder. func (_u *PermissionUpdateOne) Where(ps ...predicate.Permission) *PermissionUpdateOne { _u.mutation.Where(ps...) return _u } // Select allows selecting one or more fields (columns) of the returned entity. // The default is selecting all fields defined in the entity schema. func (_u *PermissionUpdateOne) Select(field string, fields ...string) *PermissionUpdateOne { _u.fields = append([]string{field}, fields...) return _u } // Save executes the query and returns the updated Permission entity. func (_u *PermissionUpdateOne) Save(ctx context.Context) (*Permission, error) { return withHooks(ctx, _u.sqlSave, _u.mutation, _u.hooks) } // SaveX is like Save, but panics if an error occurs. func (_u *PermissionUpdateOne) SaveX(ctx context.Context) *Permission { node, err := _u.Save(ctx) if err != nil { panic(err) } return node } // Exec executes the query on the entity. func (_u *PermissionUpdateOne) Exec(ctx context.Context) error { _, err := _u.Save(ctx) return err } // ExecX is like Exec, but panics if an error occurs. func (_u *PermissionUpdateOne) ExecX(ctx context.Context) { if err := _u.Exec(ctx); err != nil { panic(err) } } // check runs all checks and user-defined validators on the builder. func (_u *PermissionUpdateOne) check() error { if v, ok := _u.mutation.Name(); ok { if err := permission.NameValidator(v); err != nil { return &ValidationError{Name: "name", err: fmt.Errorf(`ent: validator failed for field "Permission.name": %w`, err)} } } return nil } func (_u *PermissionUpdateOne) sqlSave(ctx context.Context) (_node *Permission, err error) { if err := _u.check(); err != nil { return _node, err } _spec := sqlgraph.NewUpdateSpec(permission.Table, permission.Columns, sqlgraph.NewFieldSpec(permission.FieldID, field.TypeString)) id, ok := _u.mutation.ID() if !ok { return nil, &ValidationError{Name: "id", err: errors.New(`ent: missing "Permission.id" for update`)} } _spec.Node.ID.Value = id if fields := _u.fields; len(fields) > 0 { _spec.Node.Columns = make([]string, 0, len(fields)) _spec.Node.Columns = append(_spec.Node.Columns, permission.FieldID) for _, f := range fields { if !permission.ValidColumn(f) { return nil, &ValidationError{Name: f, err: fmt.Errorf("ent: invalid field %q for query", f)} } if f != permission.FieldID { _spec.Node.Columns = append(_spec.Node.Columns, f) } } } if ps := _u.mutation.predicates; len(ps) > 0 { _spec.Predicate = func(selector *sql.Selector) { for i := range ps { ps[i](selector) } } } if value, ok := _u.mutation.Name(); ok { _spec.SetField(permission.FieldName, field.TypeString, value) } if _u.mutation.RolePermissionsCleared() { edge := &sqlgraph.EdgeSpec{ Rel: sqlgraph.O2M, Inverse: false, Table: permission.RolePermissionsTable, Columns: []string{permission.RolePermissionsColumn}, Bidi: false, Target: &sqlgraph.EdgeTarget{ IDSpec: sqlgraph.NewFieldSpec(rolepermission.FieldID, field.TypeInt), }, } _spec.Edges.Clear = append(_spec.Edges.Clear, edge) } if nodes := _u.mutation.RemovedRolePermissionsIDs(); len(nodes) > 0 && !_u.mutation.RolePermissionsCleared() { edge := &sqlgraph.EdgeSpec{ Rel: sqlgraph.O2M, Inverse: false, Table: permission.RolePermissionsTable, Columns: []string{permission.RolePermissionsColumn}, Bidi: false, Target: &sqlgraph.EdgeTarget{ IDSpec: sqlgraph.NewFieldSpec(rolepermission.FieldID, field.TypeInt), }, } for _, k := range nodes { edge.Target.Nodes = append(edge.Target.Nodes, k) } _spec.Edges.Clear = append(_spec.Edges.Clear, edge) } if nodes := _u.mutation.RolePermissionsIDs(); len(nodes) > 0 { edge := &sqlgraph.EdgeSpec{ Rel: sqlgraph.O2M, Inverse: false, Table: permission.RolePermissionsTable, Columns: []string{permission.RolePermissionsColumn}, Bidi: false, Target: &sqlgraph.EdgeTarget{ IDSpec: sqlgraph.NewFieldSpec(rolepermission.FieldID, field.TypeInt), }, } for _, k := range nodes { edge.Target.Nodes = append(edge.Target.Nodes, k) } _spec.Edges.Add = append(_spec.Edges.Add, edge) } _node = &Permission{config: _u.config} _spec.Assign = _node.assignValues _spec.ScanValues = _node.scanValues if err = sqlgraph.UpdateNode(ctx, _u.driver, _spec); err != nil { if _, ok := err.(*sqlgraph.NotFoundError); ok { err = &NotFoundError{permission.Label} } else if sqlgraph.IsConstraintError(err) { err = &ConstraintError{msg: err.Error(), wrap: err} } return nil, err } _u.mutation.done = true return _node, nil }