🎉 init
This commit is contained in:
127
common/ent/scaauthrole/scaauthrole.go
Normal file
127
common/ent/scaauthrole/scaauthrole.go
Normal file
@@ -0,0 +1,127 @@
|
||||
// Code generated by ent, DO NOT EDIT.
|
||||
|
||||
package scaauthrole
|
||||
|
||||
import (
|
||||
"time"
|
||||
|
||||
"entgo.io/ent/dialect/sql"
|
||||
"entgo.io/ent/dialect/sql/sqlgraph"
|
||||
)
|
||||
|
||||
const (
|
||||
// Label holds the string label denoting the scaauthrole type in the database.
|
||||
Label = "sca_auth_role"
|
||||
// FieldID holds the string denoting the id field in the database.
|
||||
FieldID = "id"
|
||||
// FieldRoleName holds the string denoting the role_name field in the database.
|
||||
FieldRoleName = "role_name"
|
||||
// FieldRoleKey holds the string denoting the role_key field in the database.
|
||||
FieldRoleKey = "role_key"
|
||||
// FieldCreatedAt holds the string denoting the created_at field in the database.
|
||||
FieldCreatedAt = "created_at"
|
||||
// FieldUpdateAt holds the string denoting the update_at field in the database.
|
||||
FieldUpdateAt = "update_at"
|
||||
// FieldDeleted holds the string denoting the deleted field in the database.
|
||||
FieldDeleted = "deleted"
|
||||
// EdgeScaAuthPermissionRule holds the string denoting the sca_auth_permission_rule edge name in mutations.
|
||||
EdgeScaAuthPermissionRule = "sca_auth_permission_rule"
|
||||
// Table holds the table name of the scaauthrole in the database.
|
||||
Table = "sca_auth_roles"
|
||||
// ScaAuthPermissionRuleTable is the table that holds the sca_auth_permission_rule relation/edge.
|
||||
ScaAuthPermissionRuleTable = "sca_auth_permission_rules"
|
||||
// ScaAuthPermissionRuleInverseTable is the table name for the ScaAuthPermissionRule entity.
|
||||
// It exists in this package in order to avoid circular dependency with the "scaauthpermissionrule" package.
|
||||
ScaAuthPermissionRuleInverseTable = "sca_auth_permission_rules"
|
||||
// ScaAuthPermissionRuleColumn is the table column denoting the sca_auth_permission_rule relation/edge.
|
||||
ScaAuthPermissionRuleColumn = "sca_auth_role_sca_auth_permission_rule"
|
||||
)
|
||||
|
||||
// Columns holds all SQL columns for scaauthrole fields.
|
||||
var Columns = []string{
|
||||
FieldID,
|
||||
FieldRoleName,
|
||||
FieldRoleKey,
|
||||
FieldCreatedAt,
|
||||
FieldUpdateAt,
|
||||
FieldDeleted,
|
||||
}
|
||||
|
||||
// ValidColumn reports if the column name is valid (part of the table columns).
|
||||
func ValidColumn(column string) bool {
|
||||
for i := range Columns {
|
||||
if column == Columns[i] {
|
||||
return true
|
||||
}
|
||||
}
|
||||
return false
|
||||
}
|
||||
|
||||
var (
|
||||
// RoleNameValidator is a validator for the "role_name" field. It is called by the builders before save.
|
||||
RoleNameValidator func(string) error
|
||||
// RoleKeyValidator is a validator for the "role_key" field. It is called by the builders before save.
|
||||
RoleKeyValidator func(string) error
|
||||
// DefaultCreatedAt holds the default value on creation for the "created_at" field.
|
||||
DefaultCreatedAt func() time.Time
|
||||
// DefaultUpdateAt holds the default value on creation for the "update_at" field.
|
||||
DefaultUpdateAt func() time.Time
|
||||
// UpdateDefaultUpdateAt holds the default value on update for the "update_at" field.
|
||||
UpdateDefaultUpdateAt func() time.Time
|
||||
// DefaultDeleted holds the default value on creation for the "deleted" field.
|
||||
DefaultDeleted int
|
||||
)
|
||||
|
||||
// OrderOption defines the ordering options for the ScaAuthRole queries.
|
||||
type OrderOption func(*sql.Selector)
|
||||
|
||||
// ByID orders the results by the id field.
|
||||
func ByID(opts ...sql.OrderTermOption) OrderOption {
|
||||
return sql.OrderByField(FieldID, opts...).ToFunc()
|
||||
}
|
||||
|
||||
// ByRoleName orders the results by the role_name field.
|
||||
func ByRoleName(opts ...sql.OrderTermOption) OrderOption {
|
||||
return sql.OrderByField(FieldRoleName, opts...).ToFunc()
|
||||
}
|
||||
|
||||
// ByRoleKey orders the results by the role_key field.
|
||||
func ByRoleKey(opts ...sql.OrderTermOption) OrderOption {
|
||||
return sql.OrderByField(FieldRoleKey, opts...).ToFunc()
|
||||
}
|
||||
|
||||
// ByCreatedAt orders the results by the created_at field.
|
||||
func ByCreatedAt(opts ...sql.OrderTermOption) OrderOption {
|
||||
return sql.OrderByField(FieldCreatedAt, opts...).ToFunc()
|
||||
}
|
||||
|
||||
// ByUpdateAt orders the results by the update_at field.
|
||||
func ByUpdateAt(opts ...sql.OrderTermOption) OrderOption {
|
||||
return sql.OrderByField(FieldUpdateAt, opts...).ToFunc()
|
||||
}
|
||||
|
||||
// ByDeleted orders the results by the deleted field.
|
||||
func ByDeleted(opts ...sql.OrderTermOption) OrderOption {
|
||||
return sql.OrderByField(FieldDeleted, opts...).ToFunc()
|
||||
}
|
||||
|
||||
// ByScaAuthPermissionRuleCount orders the results by sca_auth_permission_rule count.
|
||||
func ByScaAuthPermissionRuleCount(opts ...sql.OrderTermOption) OrderOption {
|
||||
return func(s *sql.Selector) {
|
||||
sqlgraph.OrderByNeighborsCount(s, newScaAuthPermissionRuleStep(), opts...)
|
||||
}
|
||||
}
|
||||
|
||||
// ByScaAuthPermissionRule orders the results by sca_auth_permission_rule terms.
|
||||
func ByScaAuthPermissionRule(term sql.OrderTerm, terms ...sql.OrderTerm) OrderOption {
|
||||
return func(s *sql.Selector) {
|
||||
sqlgraph.OrderByNeighborTerms(s, newScaAuthPermissionRuleStep(), append([]sql.OrderTerm{term}, terms...)...)
|
||||
}
|
||||
}
|
||||
func newScaAuthPermissionRuleStep() *sqlgraph.Step {
|
||||
return sqlgraph.NewStep(
|
||||
sqlgraph.From(Table, FieldID),
|
||||
sqlgraph.To(ScaAuthPermissionRuleInverseTable, FieldID),
|
||||
sqlgraph.Edge(sqlgraph.O2M, false, ScaAuthPermissionRuleTable, ScaAuthPermissionRuleColumn),
|
||||
)
|
||||
}
|
369
common/ent/scaauthrole/where.go
Normal file
369
common/ent/scaauthrole/where.go
Normal file
@@ -0,0 +1,369 @@
|
||||
// Code generated by ent, DO NOT EDIT.
|
||||
|
||||
package scaauthrole
|
||||
|
||||
import (
|
||||
"schisandra-album-cloud-microservices/common/ent/predicate"
|
||||
"time"
|
||||
|
||||
"entgo.io/ent/dialect/sql"
|
||||
"entgo.io/ent/dialect/sql/sqlgraph"
|
||||
)
|
||||
|
||||
// ID filters vertices based on their ID field.
|
||||
func ID(id int64) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldEQ(FieldID, id))
|
||||
}
|
||||
|
||||
// IDEQ applies the EQ predicate on the ID field.
|
||||
func IDEQ(id int64) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldEQ(FieldID, id))
|
||||
}
|
||||
|
||||
// IDNEQ applies the NEQ predicate on the ID field.
|
||||
func IDNEQ(id int64) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldNEQ(FieldID, id))
|
||||
}
|
||||
|
||||
// IDIn applies the In predicate on the ID field.
|
||||
func IDIn(ids ...int64) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldIn(FieldID, ids...))
|
||||
}
|
||||
|
||||
// IDNotIn applies the NotIn predicate on the ID field.
|
||||
func IDNotIn(ids ...int64) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldNotIn(FieldID, ids...))
|
||||
}
|
||||
|
||||
// IDGT applies the GT predicate on the ID field.
|
||||
func IDGT(id int64) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldGT(FieldID, id))
|
||||
}
|
||||
|
||||
// IDGTE applies the GTE predicate on the ID field.
|
||||
func IDGTE(id int64) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldGTE(FieldID, id))
|
||||
}
|
||||
|
||||
// IDLT applies the LT predicate on the ID field.
|
||||
func IDLT(id int64) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldLT(FieldID, id))
|
||||
}
|
||||
|
||||
// IDLTE applies the LTE predicate on the ID field.
|
||||
func IDLTE(id int64) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldLTE(FieldID, id))
|
||||
}
|
||||
|
||||
// RoleName applies equality check predicate on the "role_name" field. It's identical to RoleNameEQ.
|
||||
func RoleName(v string) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldEQ(FieldRoleName, v))
|
||||
}
|
||||
|
||||
// RoleKey applies equality check predicate on the "role_key" field. It's identical to RoleKeyEQ.
|
||||
func RoleKey(v string) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldEQ(FieldRoleKey, v))
|
||||
}
|
||||
|
||||
// CreatedAt applies equality check predicate on the "created_at" field. It's identical to CreatedAtEQ.
|
||||
func CreatedAt(v time.Time) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldEQ(FieldCreatedAt, v))
|
||||
}
|
||||
|
||||
// UpdateAt applies equality check predicate on the "update_at" field. It's identical to UpdateAtEQ.
|
||||
func UpdateAt(v time.Time) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldEQ(FieldUpdateAt, v))
|
||||
}
|
||||
|
||||
// Deleted applies equality check predicate on the "deleted" field. It's identical to DeletedEQ.
|
||||
func Deleted(v int) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldEQ(FieldDeleted, v))
|
||||
}
|
||||
|
||||
// RoleNameEQ applies the EQ predicate on the "role_name" field.
|
||||
func RoleNameEQ(v string) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldEQ(FieldRoleName, v))
|
||||
}
|
||||
|
||||
// RoleNameNEQ applies the NEQ predicate on the "role_name" field.
|
||||
func RoleNameNEQ(v string) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldNEQ(FieldRoleName, v))
|
||||
}
|
||||
|
||||
// RoleNameIn applies the In predicate on the "role_name" field.
|
||||
func RoleNameIn(vs ...string) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldIn(FieldRoleName, vs...))
|
||||
}
|
||||
|
||||
// RoleNameNotIn applies the NotIn predicate on the "role_name" field.
|
||||
func RoleNameNotIn(vs ...string) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldNotIn(FieldRoleName, vs...))
|
||||
}
|
||||
|
||||
// RoleNameGT applies the GT predicate on the "role_name" field.
|
||||
func RoleNameGT(v string) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldGT(FieldRoleName, v))
|
||||
}
|
||||
|
||||
// RoleNameGTE applies the GTE predicate on the "role_name" field.
|
||||
func RoleNameGTE(v string) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldGTE(FieldRoleName, v))
|
||||
}
|
||||
|
||||
// RoleNameLT applies the LT predicate on the "role_name" field.
|
||||
func RoleNameLT(v string) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldLT(FieldRoleName, v))
|
||||
}
|
||||
|
||||
// RoleNameLTE applies the LTE predicate on the "role_name" field.
|
||||
func RoleNameLTE(v string) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldLTE(FieldRoleName, v))
|
||||
}
|
||||
|
||||
// RoleNameContains applies the Contains predicate on the "role_name" field.
|
||||
func RoleNameContains(v string) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldContains(FieldRoleName, v))
|
||||
}
|
||||
|
||||
// RoleNameHasPrefix applies the HasPrefix predicate on the "role_name" field.
|
||||
func RoleNameHasPrefix(v string) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldHasPrefix(FieldRoleName, v))
|
||||
}
|
||||
|
||||
// RoleNameHasSuffix applies the HasSuffix predicate on the "role_name" field.
|
||||
func RoleNameHasSuffix(v string) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldHasSuffix(FieldRoleName, v))
|
||||
}
|
||||
|
||||
// RoleNameEqualFold applies the EqualFold predicate on the "role_name" field.
|
||||
func RoleNameEqualFold(v string) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldEqualFold(FieldRoleName, v))
|
||||
}
|
||||
|
||||
// RoleNameContainsFold applies the ContainsFold predicate on the "role_name" field.
|
||||
func RoleNameContainsFold(v string) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldContainsFold(FieldRoleName, v))
|
||||
}
|
||||
|
||||
// RoleKeyEQ applies the EQ predicate on the "role_key" field.
|
||||
func RoleKeyEQ(v string) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldEQ(FieldRoleKey, v))
|
||||
}
|
||||
|
||||
// RoleKeyNEQ applies the NEQ predicate on the "role_key" field.
|
||||
func RoleKeyNEQ(v string) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldNEQ(FieldRoleKey, v))
|
||||
}
|
||||
|
||||
// RoleKeyIn applies the In predicate on the "role_key" field.
|
||||
func RoleKeyIn(vs ...string) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldIn(FieldRoleKey, vs...))
|
||||
}
|
||||
|
||||
// RoleKeyNotIn applies the NotIn predicate on the "role_key" field.
|
||||
func RoleKeyNotIn(vs ...string) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldNotIn(FieldRoleKey, vs...))
|
||||
}
|
||||
|
||||
// RoleKeyGT applies the GT predicate on the "role_key" field.
|
||||
func RoleKeyGT(v string) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldGT(FieldRoleKey, v))
|
||||
}
|
||||
|
||||
// RoleKeyGTE applies the GTE predicate on the "role_key" field.
|
||||
func RoleKeyGTE(v string) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldGTE(FieldRoleKey, v))
|
||||
}
|
||||
|
||||
// RoleKeyLT applies the LT predicate on the "role_key" field.
|
||||
func RoleKeyLT(v string) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldLT(FieldRoleKey, v))
|
||||
}
|
||||
|
||||
// RoleKeyLTE applies the LTE predicate on the "role_key" field.
|
||||
func RoleKeyLTE(v string) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldLTE(FieldRoleKey, v))
|
||||
}
|
||||
|
||||
// RoleKeyContains applies the Contains predicate on the "role_key" field.
|
||||
func RoleKeyContains(v string) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldContains(FieldRoleKey, v))
|
||||
}
|
||||
|
||||
// RoleKeyHasPrefix applies the HasPrefix predicate on the "role_key" field.
|
||||
func RoleKeyHasPrefix(v string) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldHasPrefix(FieldRoleKey, v))
|
||||
}
|
||||
|
||||
// RoleKeyHasSuffix applies the HasSuffix predicate on the "role_key" field.
|
||||
func RoleKeyHasSuffix(v string) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldHasSuffix(FieldRoleKey, v))
|
||||
}
|
||||
|
||||
// RoleKeyEqualFold applies the EqualFold predicate on the "role_key" field.
|
||||
func RoleKeyEqualFold(v string) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldEqualFold(FieldRoleKey, v))
|
||||
}
|
||||
|
||||
// RoleKeyContainsFold applies the ContainsFold predicate on the "role_key" field.
|
||||
func RoleKeyContainsFold(v string) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldContainsFold(FieldRoleKey, v))
|
||||
}
|
||||
|
||||
// CreatedAtEQ applies the EQ predicate on the "created_at" field.
|
||||
func CreatedAtEQ(v time.Time) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldEQ(FieldCreatedAt, v))
|
||||
}
|
||||
|
||||
// CreatedAtNEQ applies the NEQ predicate on the "created_at" field.
|
||||
func CreatedAtNEQ(v time.Time) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldNEQ(FieldCreatedAt, v))
|
||||
}
|
||||
|
||||
// CreatedAtIn applies the In predicate on the "created_at" field.
|
||||
func CreatedAtIn(vs ...time.Time) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldIn(FieldCreatedAt, vs...))
|
||||
}
|
||||
|
||||
// CreatedAtNotIn applies the NotIn predicate on the "created_at" field.
|
||||
func CreatedAtNotIn(vs ...time.Time) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldNotIn(FieldCreatedAt, vs...))
|
||||
}
|
||||
|
||||
// CreatedAtGT applies the GT predicate on the "created_at" field.
|
||||
func CreatedAtGT(v time.Time) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldGT(FieldCreatedAt, v))
|
||||
}
|
||||
|
||||
// CreatedAtGTE applies the GTE predicate on the "created_at" field.
|
||||
func CreatedAtGTE(v time.Time) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldGTE(FieldCreatedAt, v))
|
||||
}
|
||||
|
||||
// CreatedAtLT applies the LT predicate on the "created_at" field.
|
||||
func CreatedAtLT(v time.Time) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldLT(FieldCreatedAt, v))
|
||||
}
|
||||
|
||||
// CreatedAtLTE applies the LTE predicate on the "created_at" field.
|
||||
func CreatedAtLTE(v time.Time) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldLTE(FieldCreatedAt, v))
|
||||
}
|
||||
|
||||
// UpdateAtEQ applies the EQ predicate on the "update_at" field.
|
||||
func UpdateAtEQ(v time.Time) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldEQ(FieldUpdateAt, v))
|
||||
}
|
||||
|
||||
// UpdateAtNEQ applies the NEQ predicate on the "update_at" field.
|
||||
func UpdateAtNEQ(v time.Time) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldNEQ(FieldUpdateAt, v))
|
||||
}
|
||||
|
||||
// UpdateAtIn applies the In predicate on the "update_at" field.
|
||||
func UpdateAtIn(vs ...time.Time) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldIn(FieldUpdateAt, vs...))
|
||||
}
|
||||
|
||||
// UpdateAtNotIn applies the NotIn predicate on the "update_at" field.
|
||||
func UpdateAtNotIn(vs ...time.Time) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldNotIn(FieldUpdateAt, vs...))
|
||||
}
|
||||
|
||||
// UpdateAtGT applies the GT predicate on the "update_at" field.
|
||||
func UpdateAtGT(v time.Time) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldGT(FieldUpdateAt, v))
|
||||
}
|
||||
|
||||
// UpdateAtGTE applies the GTE predicate on the "update_at" field.
|
||||
func UpdateAtGTE(v time.Time) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldGTE(FieldUpdateAt, v))
|
||||
}
|
||||
|
||||
// UpdateAtLT applies the LT predicate on the "update_at" field.
|
||||
func UpdateAtLT(v time.Time) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldLT(FieldUpdateAt, v))
|
||||
}
|
||||
|
||||
// UpdateAtLTE applies the LTE predicate on the "update_at" field.
|
||||
func UpdateAtLTE(v time.Time) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldLTE(FieldUpdateAt, v))
|
||||
}
|
||||
|
||||
// DeletedEQ applies the EQ predicate on the "deleted" field.
|
||||
func DeletedEQ(v int) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldEQ(FieldDeleted, v))
|
||||
}
|
||||
|
||||
// DeletedNEQ applies the NEQ predicate on the "deleted" field.
|
||||
func DeletedNEQ(v int) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldNEQ(FieldDeleted, v))
|
||||
}
|
||||
|
||||
// DeletedIn applies the In predicate on the "deleted" field.
|
||||
func DeletedIn(vs ...int) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldIn(FieldDeleted, vs...))
|
||||
}
|
||||
|
||||
// DeletedNotIn applies the NotIn predicate on the "deleted" field.
|
||||
func DeletedNotIn(vs ...int) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldNotIn(FieldDeleted, vs...))
|
||||
}
|
||||
|
||||
// DeletedGT applies the GT predicate on the "deleted" field.
|
||||
func DeletedGT(v int) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldGT(FieldDeleted, v))
|
||||
}
|
||||
|
||||
// DeletedGTE applies the GTE predicate on the "deleted" field.
|
||||
func DeletedGTE(v int) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldGTE(FieldDeleted, v))
|
||||
}
|
||||
|
||||
// DeletedLT applies the LT predicate on the "deleted" field.
|
||||
func DeletedLT(v int) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldLT(FieldDeleted, v))
|
||||
}
|
||||
|
||||
// DeletedLTE applies the LTE predicate on the "deleted" field.
|
||||
func DeletedLTE(v int) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.FieldLTE(FieldDeleted, v))
|
||||
}
|
||||
|
||||
// HasScaAuthPermissionRule applies the HasEdge predicate on the "sca_auth_permission_rule" edge.
|
||||
func HasScaAuthPermissionRule() predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(func(s *sql.Selector) {
|
||||
step := sqlgraph.NewStep(
|
||||
sqlgraph.From(Table, FieldID),
|
||||
sqlgraph.Edge(sqlgraph.O2M, false, ScaAuthPermissionRuleTable, ScaAuthPermissionRuleColumn),
|
||||
)
|
||||
sqlgraph.HasNeighbors(s, step)
|
||||
})
|
||||
}
|
||||
|
||||
// HasScaAuthPermissionRuleWith applies the HasEdge predicate on the "sca_auth_permission_rule" edge with a given conditions (other predicates).
|
||||
func HasScaAuthPermissionRuleWith(preds ...predicate.ScaAuthPermissionRule) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(func(s *sql.Selector) {
|
||||
step := newScaAuthPermissionRuleStep()
|
||||
sqlgraph.HasNeighborsWith(s, step, func(s *sql.Selector) {
|
||||
for _, p := range preds {
|
||||
p(s)
|
||||
}
|
||||
})
|
||||
})
|
||||
}
|
||||
|
||||
// And groups predicates with the AND operator between them.
|
||||
func And(predicates ...predicate.ScaAuthRole) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.AndPredicates(predicates...))
|
||||
}
|
||||
|
||||
// Or groups predicates with the OR operator between them.
|
||||
func Or(predicates ...predicate.ScaAuthRole) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.OrPredicates(predicates...))
|
||||
}
|
||||
|
||||
// Not applies the not operator on the given predicate.
|
||||
func Not(p predicate.ScaAuthRole) predicate.ScaAuthRole {
|
||||
return predicate.ScaAuthRole(sql.NotPredicates(p))
|
||||
}
|
Reference in New Issue
Block a user