@memberjunction/server 0.9.110 → 0.9.112
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/build.log.json +6 -0
- package/dist/generated/generated.js +705 -552
- package/dist/generated/generated.js.map +1 -1
- package/package.json +3 -3
- package/src/generated/generated.ts +807 -723
|
@@ -182,28 +182,33 @@ let CompanyResolver = class CompanyResolver extends server_1.ResolverBase {
|
|
|
182
182
|
}
|
|
183
183
|
async Company(ID, { dataSource, userPayload }, pubSub) {
|
|
184
184
|
this.CheckUserReadPermissions('Companies', userPayload);
|
|
185
|
-
const sSQL = `SELECT * FROM [admin].vwCompanies WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Companies', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
186
|
-
|
|
185
|
+
const sSQL = `SELECT * FROM [admin].[vwCompanies] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Companies', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
186
|
+
const result = this.MapFieldNamesToCodeNames('Companies', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
187
|
+
return result;
|
|
187
188
|
}
|
|
188
|
-
AllCompanies({ dataSource, userPayload }, pubSub) {
|
|
189
|
+
async AllCompanies({ dataSource, userPayload }, pubSub) {
|
|
189
190
|
this.CheckUserReadPermissions('Companies', userPayload);
|
|
190
|
-
const sSQL = 'SELECT * FROM [admin].vwCompanies' + this.getRowLevelSecurityWhereClause('Companies', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
191
|
-
|
|
191
|
+
const sSQL = 'SELECT * FROM [admin].[vwCompanies]' + this.getRowLevelSecurityWhereClause('Companies', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
192
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Companies', await dataSource.query(sSQL));
|
|
193
|
+
return result;
|
|
192
194
|
}
|
|
193
195
|
async EmployeesArray(company_, { dataSource, userPayload }, pubSub) {
|
|
194
196
|
this.CheckUserReadPermissions('Employees', userPayload);
|
|
195
|
-
const sSQL = `SELECT * FROM [admin].[vwEmployees] WHERE CompanyID=${company_.ID} ` + this.getRowLevelSecurityWhereClause('Employees', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
196
|
-
|
|
197
|
+
const sSQL = `SELECT * FROM [admin].[vwEmployees] WHERE [CompanyID]=${company_.ID} ` + this.getRowLevelSecurityWhereClause('Employees', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
198
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Employees', await dataSource.query(sSQL));
|
|
199
|
+
return result;
|
|
197
200
|
}
|
|
198
201
|
async CompanyIntegrationsArray(company_, { dataSource, userPayload }, pubSub) {
|
|
199
202
|
this.CheckUserReadPermissions('Company Integrations', userPayload);
|
|
200
|
-
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrations] WHERE CompanyName=${company_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
201
|
-
|
|
203
|
+
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrations] WHERE [CompanyName]=${company_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
204
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Company Integrations', await dataSource.query(sSQL));
|
|
205
|
+
return result;
|
|
202
206
|
}
|
|
203
207
|
async WorkflowsArray(company_, { dataSource, userPayload }, pubSub) {
|
|
204
208
|
this.CheckUserReadPermissions('Workflows', userPayload);
|
|
205
|
-
const sSQL = `SELECT * FROM [admin].[vwWorkflows] WHERE CompanyName=${company_.ID} ` + this.getRowLevelSecurityWhereClause('Workflows', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
206
|
-
|
|
209
|
+
const sSQL = `SELECT * FROM [admin].[vwWorkflows] WHERE [CompanyName]=${company_.ID} ` + this.getRowLevelSecurityWhereClause('Workflows', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
210
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Workflows', await dataSource.query(sSQL));
|
|
211
|
+
return result;
|
|
207
212
|
}
|
|
208
213
|
async CreateCompany(input, { dataSource, userPayload }, pubSub) {
|
|
209
214
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -221,11 +226,9 @@ let CompanyResolver = class CompanyResolver extends server_1.ResolverBase {
|
|
|
221
226
|
return null;
|
|
222
227
|
}
|
|
223
228
|
async BeforeCreate(dataSource, input) {
|
|
224
|
-
const i = input, d = dataSource;
|
|
225
229
|
return true;
|
|
226
230
|
}
|
|
227
231
|
async AfterCreate(dataSource, input) {
|
|
228
|
-
const i = input, d = dataSource;
|
|
229
232
|
}
|
|
230
233
|
async UpdateCompany(input, { dataSource, userPayload }, pubSub) {
|
|
231
234
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -253,9 +256,10 @@ let CompanyResolver = class CompanyResolver extends server_1.ResolverBase {
|
|
|
253
256
|
if (await this.BeforeDelete(dataSource, ID)) {
|
|
254
257
|
const entityObject = await new core_1.Metadata().GetEntityObject('Companies', this.GetUserFromPayload(userPayload));
|
|
255
258
|
await entityObject.Load(ID);
|
|
259
|
+
const returnValue = entityObject.GetAll();
|
|
256
260
|
if (await entityObject.Delete()) {
|
|
257
261
|
await this.AfterDelete(dataSource, ID);
|
|
258
|
-
return
|
|
262
|
+
return returnValue;
|
|
259
263
|
}
|
|
260
264
|
else
|
|
261
265
|
return null;
|
|
@@ -313,7 +317,7 @@ __decorate([
|
|
|
313
317
|
__param(1, (0, server_1.PubSub)()),
|
|
314
318
|
__metadata("design:type", Function),
|
|
315
319
|
__metadata("design:paramtypes", [Object, server_1.PubSubEngine]),
|
|
316
|
-
__metadata("design:returntype",
|
|
320
|
+
__metadata("design:returntype", Promise)
|
|
317
321
|
], CompanyResolver.prototype, "AllCompanies", null);
|
|
318
322
|
__decorate([
|
|
319
323
|
(0, server_1.FieldResolver)(() => [Employee_]),
|
|
@@ -361,7 +365,7 @@ __decorate([
|
|
|
361
365
|
__metadata("design:returntype", Promise)
|
|
362
366
|
], CompanyResolver.prototype, "UpdateCompany", null);
|
|
363
367
|
__decorate([
|
|
364
|
-
(0, server_1.Mutation)(() =>
|
|
368
|
+
(0, server_1.Mutation)(() => Company_),
|
|
365
369
|
__param(0, (0, server_1.Arg)('ID', () => server_1.Int)),
|
|
366
370
|
__param(1, (0, server_1.Ctx)()),
|
|
367
371
|
__param(2, (0, server_1.PubSub)()),
|
|
@@ -603,33 +607,39 @@ let EmployeeResolver = class EmployeeResolver extends server_1.ResolverBase {
|
|
|
603
607
|
}
|
|
604
608
|
async Employee(ID, { dataSource, userPayload }, pubSub) {
|
|
605
609
|
this.CheckUserReadPermissions('Employees', userPayload);
|
|
606
|
-
const sSQL = `SELECT * FROM [admin].vwEmployees WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Employees', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
607
|
-
|
|
610
|
+
const sSQL = `SELECT * FROM [admin].[vwEmployees] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Employees', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
611
|
+
const result = this.MapFieldNamesToCodeNames('Employees', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
612
|
+
return result;
|
|
608
613
|
}
|
|
609
|
-
AllEmployees({ dataSource, userPayload }, pubSub) {
|
|
614
|
+
async AllEmployees({ dataSource, userPayload }, pubSub) {
|
|
610
615
|
this.CheckUserReadPermissions('Employees', userPayload);
|
|
611
|
-
const sSQL = 'SELECT * FROM [admin].vwEmployees' + this.getRowLevelSecurityWhereClause('Employees', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
612
|
-
|
|
616
|
+
const sSQL = 'SELECT * FROM [admin].[vwEmployees]' + this.getRowLevelSecurityWhereClause('Employees', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
617
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Employees', await dataSource.query(sSQL));
|
|
618
|
+
return result;
|
|
613
619
|
}
|
|
614
620
|
async EmployeesArray(employee_, { dataSource, userPayload }, pubSub) {
|
|
615
621
|
this.CheckUserReadPermissions('Employees', userPayload);
|
|
616
|
-
const sSQL = `SELECT * FROM [admin].[vwEmployees] WHERE SupervisorID=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employees', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
617
|
-
|
|
622
|
+
const sSQL = `SELECT * FROM [admin].[vwEmployees] WHERE [SupervisorID]=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employees', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
623
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Employees', await dataSource.query(sSQL));
|
|
624
|
+
return result;
|
|
618
625
|
}
|
|
619
626
|
async EmployeeCompanyIntegrationsArray(employee_, { dataSource, userPayload }, pubSub) {
|
|
620
627
|
this.CheckUserReadPermissions('Employee Company Integrations', userPayload);
|
|
621
|
-
const sSQL = `SELECT * FROM [admin].[vwEmployeeCompanyIntegrations] WHERE EmployeeID=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
622
|
-
|
|
628
|
+
const sSQL = `SELECT * FROM [admin].[vwEmployeeCompanyIntegrations] WHERE [EmployeeID]=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
629
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Employee Company Integrations', await dataSource.query(sSQL));
|
|
630
|
+
return result;
|
|
623
631
|
}
|
|
624
632
|
async EmployeeRolesArray(employee_, { dataSource, userPayload }, pubSub) {
|
|
625
633
|
this.CheckUserReadPermissions('Employee Roles', userPayload);
|
|
626
|
-
const sSQL = `SELECT * FROM [admin].[vwEmployeeRoles] WHERE EmployeeID=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
627
|
-
|
|
634
|
+
const sSQL = `SELECT * FROM [admin].[vwEmployeeRoles] WHERE [EmployeeID]=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
635
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Employee Roles', await dataSource.query(sSQL));
|
|
636
|
+
return result;
|
|
628
637
|
}
|
|
629
638
|
async EmployeeSkillsArray(employee_, { dataSource, userPayload }, pubSub) {
|
|
630
639
|
this.CheckUserReadPermissions('Employee Skills', userPayload);
|
|
631
|
-
const sSQL = `SELECT * FROM [admin].[vwEmployeeSkills] WHERE EmployeeID=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
632
|
-
|
|
640
|
+
const sSQL = `SELECT * FROM [admin].[vwEmployeeSkills] WHERE [EmployeeID]=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
641
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Employee Skills', await dataSource.query(sSQL));
|
|
642
|
+
return result;
|
|
633
643
|
}
|
|
634
644
|
async CreateEmployee(input, { dataSource, userPayload }, pubSub) {
|
|
635
645
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -647,11 +657,9 @@ let EmployeeResolver = class EmployeeResolver extends server_1.ResolverBase {
|
|
|
647
657
|
return null;
|
|
648
658
|
}
|
|
649
659
|
async BeforeCreate(dataSource, input) {
|
|
650
|
-
const i = input, d = dataSource;
|
|
651
660
|
return true;
|
|
652
661
|
}
|
|
653
662
|
async AfterCreate(dataSource, input) {
|
|
654
|
-
const i = input, d = dataSource;
|
|
655
663
|
}
|
|
656
664
|
async UpdateEmployee(input, { dataSource, userPayload }, pubSub) {
|
|
657
665
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -679,9 +687,10 @@ let EmployeeResolver = class EmployeeResolver extends server_1.ResolverBase {
|
|
|
679
687
|
if (await this.BeforeDelete(dataSource, ID)) {
|
|
680
688
|
const entityObject = await new core_1.Metadata().GetEntityObject('Employees', this.GetUserFromPayload(userPayload));
|
|
681
689
|
await entityObject.Load(ID);
|
|
690
|
+
const returnValue = entityObject.GetAll();
|
|
682
691
|
if (await entityObject.Delete()) {
|
|
683
692
|
await this.AfterDelete(dataSource, ID);
|
|
684
|
-
return
|
|
693
|
+
return returnValue;
|
|
685
694
|
}
|
|
686
695
|
else
|
|
687
696
|
return null;
|
|
@@ -739,7 +748,7 @@ __decorate([
|
|
|
739
748
|
__param(1, (0, server_1.PubSub)()),
|
|
740
749
|
__metadata("design:type", Function),
|
|
741
750
|
__metadata("design:paramtypes", [Object, server_1.PubSubEngine]),
|
|
742
|
-
__metadata("design:returntype",
|
|
751
|
+
__metadata("design:returntype", Promise)
|
|
743
752
|
], EmployeeResolver.prototype, "AllEmployees", null);
|
|
744
753
|
__decorate([
|
|
745
754
|
(0, server_1.FieldResolver)(() => [Employee_]),
|
|
@@ -796,7 +805,7 @@ __decorate([
|
|
|
796
805
|
__metadata("design:returntype", Promise)
|
|
797
806
|
], EmployeeResolver.prototype, "UpdateEmployee", null);
|
|
798
807
|
__decorate([
|
|
799
|
-
(0, server_1.Mutation)(() =>
|
|
808
|
+
(0, server_1.Mutation)(() => Employee_),
|
|
800
809
|
__param(0, (0, server_1.Arg)('ID', () => server_1.Int)),
|
|
801
810
|
__param(1, (0, server_1.Ctx)()),
|
|
802
811
|
__param(2, (0, server_1.PubSub)()),
|
|
@@ -943,8 +952,9 @@ let UserFavoriteResolverBase = class UserFavoriteResolverBase extends server_1.R
|
|
|
943
952
|
}
|
|
944
953
|
async UserFavorite(ID, { dataSource, userPayload }, pubSub) {
|
|
945
954
|
this.CheckUserReadPermissions('User Favorites', userPayload);
|
|
946
|
-
const sSQL = `SELECT * FROM [admin].vwUserFavorites WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('User Favorites', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
947
|
-
|
|
955
|
+
const sSQL = `SELECT * FROM [admin].[vwUserFavorites] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Favorites', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
956
|
+
const result = this.MapFieldNamesToCodeNames('User Favorites', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
957
|
+
return result;
|
|
948
958
|
}
|
|
949
959
|
async CreateUserFavorite(input, { dataSource, userPayload }, pubSub) {
|
|
950
960
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -962,11 +972,9 @@ let UserFavoriteResolverBase = class UserFavoriteResolverBase extends server_1.R
|
|
|
962
972
|
return null;
|
|
963
973
|
}
|
|
964
974
|
async BeforeCreate(dataSource, input) {
|
|
965
|
-
const i = input, d = dataSource;
|
|
966
975
|
return true;
|
|
967
976
|
}
|
|
968
977
|
async AfterCreate(dataSource, input) {
|
|
969
|
-
const i = input, d = dataSource;
|
|
970
978
|
}
|
|
971
979
|
async UpdateUserFavorite(input, { dataSource, userPayload }, pubSub) {
|
|
972
980
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -993,9 +1001,10 @@ let UserFavoriteResolverBase = class UserFavoriteResolverBase extends server_1.R
|
|
|
993
1001
|
if (await this.BeforeDelete(dataSource, ID)) {
|
|
994
1002
|
const entityObject = await new core_1.Metadata().GetEntityObject('User Favorites', this.GetUserFromPayload(userPayload));
|
|
995
1003
|
await entityObject.Load(ID);
|
|
1004
|
+
const returnValue = entityObject.GetAll();
|
|
996
1005
|
if (await entityObject.Delete()) {
|
|
997
1006
|
await this.AfterDelete(dataSource, ID);
|
|
998
|
-
return
|
|
1007
|
+
return returnValue;
|
|
999
1008
|
}
|
|
1000
1009
|
else
|
|
1001
1010
|
return null;
|
|
@@ -1066,7 +1075,7 @@ __decorate([
|
|
|
1066
1075
|
__metadata("design:returntype", Promise)
|
|
1067
1076
|
], UserFavoriteResolverBase.prototype, "UpdateUserFavorite", null);
|
|
1068
1077
|
__decorate([
|
|
1069
|
-
(0, server_1.Mutation)(() =>
|
|
1078
|
+
(0, server_1.Mutation)(() => UserFavorite_),
|
|
1070
1079
|
__param(0, (0, server_1.Arg)('ID', () => server_1.Int)),
|
|
1071
1080
|
__param(1, (0, server_1.Ctx)()),
|
|
1072
1081
|
__param(2, (0, server_1.PubSub)()),
|
|
@@ -1188,8 +1197,9 @@ let EmployeeCompanyIntegrationResolver = class EmployeeCompanyIntegrationResolve
|
|
|
1188
1197
|
}
|
|
1189
1198
|
async EmployeeCompanyIntegration(ID, { dataSource, userPayload }, pubSub) {
|
|
1190
1199
|
this.CheckUserReadPermissions('Employee Company Integrations', userPayload);
|
|
1191
|
-
const sSQL = `SELECT * FROM [admin].vwEmployeeCompanyIntegrations WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Employee Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1192
|
-
|
|
1200
|
+
const sSQL = `SELECT * FROM [admin].[vwEmployeeCompanyIntegrations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Employee Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1201
|
+
const result = this.MapFieldNamesToCodeNames('Employee Company Integrations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
1202
|
+
return result;
|
|
1193
1203
|
}
|
|
1194
1204
|
async UpdateEmployeeCompanyIntegration(input, { dataSource, userPayload }, pubSub) {
|
|
1195
1205
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -1360,8 +1370,9 @@ let EmployeeRoleResolver = class EmployeeRoleResolver extends server_1.ResolverB
|
|
|
1360
1370
|
}
|
|
1361
1371
|
async EmployeeRole(ID, { dataSource, userPayload }, pubSub) {
|
|
1362
1372
|
this.CheckUserReadPermissions('Employee Roles', userPayload);
|
|
1363
|
-
const sSQL = `SELECT * FROM [admin].vwEmployeeRoles WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Employee Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1364
|
-
|
|
1373
|
+
const sSQL = `SELECT * FROM [admin].[vwEmployeeRoles] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Employee Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1374
|
+
const result = this.MapFieldNamesToCodeNames('Employee Roles', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
1375
|
+
return result;
|
|
1365
1376
|
}
|
|
1366
1377
|
async UpdateEmployeeRole(input, { dataSource, userPayload }, pubSub) {
|
|
1367
1378
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -1533,8 +1544,9 @@ let EmployeeSkillResolver = class EmployeeSkillResolver extends server_1.Resolve
|
|
|
1533
1544
|
}
|
|
1534
1545
|
async EmployeeSkill(ID, { dataSource, userPayload }, pubSub) {
|
|
1535
1546
|
this.CheckUserReadPermissions('Employee Skills', userPayload);
|
|
1536
|
-
const sSQL = `SELECT * FROM [admin].vwEmployeeSkills WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Employee Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1537
|
-
|
|
1547
|
+
const sSQL = `SELECT * FROM [admin].[vwEmployeeSkills] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Employee Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1548
|
+
const result = this.MapFieldNamesToCodeNames('Employee Skills', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
1549
|
+
return result;
|
|
1538
1550
|
}
|
|
1539
1551
|
async UpdateEmployeeSkill(input, { dataSource, userPayload }, pubSub) {
|
|
1540
1552
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -1737,33 +1749,39 @@ let RoleResolver = class RoleResolver extends server_1.ResolverBase {
|
|
|
1737
1749
|
}
|
|
1738
1750
|
async Role(ID, { dataSource, userPayload }, pubSub) {
|
|
1739
1751
|
this.CheckUserReadPermissions('Roles', userPayload);
|
|
1740
|
-
const sSQL = `SELECT * FROM [admin].vwRoles WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1741
|
-
|
|
1752
|
+
const sSQL = `SELECT * FROM [admin].[vwRoles] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1753
|
+
const result = this.MapFieldNamesToCodeNames('Roles', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
1754
|
+
return result;
|
|
1742
1755
|
}
|
|
1743
|
-
AllRoles({ dataSource, userPayload }, pubSub) {
|
|
1756
|
+
async AllRoles({ dataSource, userPayload }, pubSub) {
|
|
1744
1757
|
this.CheckUserReadPermissions('Roles', userPayload);
|
|
1745
|
-
const sSQL = 'SELECT * FROM [admin].vwRoles' + this.getRowLevelSecurityWhereClause('Roles', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
1746
|
-
|
|
1758
|
+
const sSQL = 'SELECT * FROM [admin].[vwRoles]' + this.getRowLevelSecurityWhereClause('Roles', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
1759
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Roles', await dataSource.query(sSQL));
|
|
1760
|
+
return result;
|
|
1747
1761
|
}
|
|
1748
1762
|
async EmployeeRolesArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1749
1763
|
this.CheckUserReadPermissions('Employee Roles', userPayload);
|
|
1750
|
-
const sSQL = `SELECT * FROM [admin].[vwEmployeeRoles] WHERE RoleID=${role_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1751
|
-
|
|
1764
|
+
const sSQL = `SELECT * FROM [admin].[vwEmployeeRoles] WHERE [RoleID]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1765
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Employee Roles', await dataSource.query(sSQL));
|
|
1766
|
+
return result;
|
|
1752
1767
|
}
|
|
1753
1768
|
async EntityPermissionsArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1754
1769
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
1755
|
-
const sSQL = `SELECT * FROM [admin].[vwEntityPermissions] WHERE RoleName=${role_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1756
|
-
|
|
1770
|
+
const sSQL = `SELECT * FROM [admin].[vwEntityPermissions] WHERE [RoleName]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1771
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL));
|
|
1772
|
+
return result;
|
|
1757
1773
|
}
|
|
1758
1774
|
async UserRolesArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1759
1775
|
this.CheckUserReadPermissions('User Roles', userPayload);
|
|
1760
|
-
const sSQL = `SELECT * FROM [admin].[vwUserRoles] WHERE RoleName=${role_.ID} ` + this.getRowLevelSecurityWhereClause('User Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1761
|
-
|
|
1776
|
+
const sSQL = `SELECT * FROM [admin].[vwUserRoles] WHERE [RoleName]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('User Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1777
|
+
const result = this.ArrayMapFieldNamesToCodeNames('User Roles', await dataSource.query(sSQL));
|
|
1778
|
+
return result;
|
|
1762
1779
|
}
|
|
1763
1780
|
async AuthorizationRolesArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1764
1781
|
this.CheckUserReadPermissions('Authorization Roles', userPayload);
|
|
1765
|
-
const sSQL = `SELECT * FROM [admin].[vwAuthorizationRoles] WHERE RoleName=${role_.ID} ` + this.getRowLevelSecurityWhereClause('Authorization Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1766
|
-
|
|
1782
|
+
const sSQL = `SELECT * FROM [admin].[vwAuthorizationRoles] WHERE [RoleName]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('Authorization Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1783
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Authorization Roles', await dataSource.query(sSQL));
|
|
1784
|
+
return result;
|
|
1767
1785
|
}
|
|
1768
1786
|
async UpdateRole(input, { dataSource, userPayload }, pubSub) {
|
|
1769
1787
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -1829,7 +1847,7 @@ __decorate([
|
|
|
1829
1847
|
__param(1, (0, server_1.PubSub)()),
|
|
1830
1848
|
__metadata("design:type", Function),
|
|
1831
1849
|
__metadata("design:paramtypes", [Object, server_1.PubSubEngine]),
|
|
1832
|
-
__metadata("design:returntype",
|
|
1850
|
+
__metadata("design:returntype", Promise)
|
|
1833
1851
|
], RoleResolver.prototype, "AllRoles", null);
|
|
1834
1852
|
__decorate([
|
|
1835
1853
|
(0, server_1.FieldResolver)(() => [EmployeeRole_]),
|
|
@@ -1969,23 +1987,27 @@ let SkillResolver = class SkillResolver extends server_1.ResolverBase {
|
|
|
1969
1987
|
}
|
|
1970
1988
|
async Skill(ID, { dataSource, userPayload }, pubSub) {
|
|
1971
1989
|
this.CheckUserReadPermissions('Skills', userPayload);
|
|
1972
|
-
const sSQL = `SELECT * FROM [admin].vwSkills WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1973
|
-
|
|
1990
|
+
const sSQL = `SELECT * FROM [admin].[vwSkills] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1991
|
+
const result = this.MapFieldNamesToCodeNames('Skills', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
1992
|
+
return result;
|
|
1974
1993
|
}
|
|
1975
|
-
AllSkills({ dataSource, userPayload }, pubSub) {
|
|
1994
|
+
async AllSkills({ dataSource, userPayload }, pubSub) {
|
|
1976
1995
|
this.CheckUserReadPermissions('Skills', userPayload);
|
|
1977
|
-
const sSQL = 'SELECT * FROM [admin].vwSkills' + this.getRowLevelSecurityWhereClause('Skills', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
1978
|
-
|
|
1996
|
+
const sSQL = 'SELECT * FROM [admin].[vwSkills]' + this.getRowLevelSecurityWhereClause('Skills', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
1997
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Skills', await dataSource.query(sSQL));
|
|
1998
|
+
return result;
|
|
1979
1999
|
}
|
|
1980
2000
|
async EmployeeSkillsArray(skill_, { dataSource, userPayload }, pubSub) {
|
|
1981
2001
|
this.CheckUserReadPermissions('Employee Skills', userPayload);
|
|
1982
|
-
const sSQL = `SELECT * FROM [admin].[vwEmployeeSkills] WHERE SkillID=${skill_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1983
|
-
|
|
2002
|
+
const sSQL = `SELECT * FROM [admin].[vwEmployeeSkills] WHERE [SkillID]=${skill_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2003
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Employee Skills', await dataSource.query(sSQL));
|
|
2004
|
+
return result;
|
|
1984
2005
|
}
|
|
1985
2006
|
async SkillsArray(skill_, { dataSource, userPayload }, pubSub) {
|
|
1986
2007
|
this.CheckUserReadPermissions('Skills', userPayload);
|
|
1987
|
-
const sSQL = `SELECT * FROM [admin].[vwSkills] WHERE ParentID=${skill_.ID} ` + this.getRowLevelSecurityWhereClause('Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1988
|
-
|
|
2008
|
+
const sSQL = `SELECT * FROM [admin].[vwSkills] WHERE [ParentID]=${skill_.ID} ` + this.getRowLevelSecurityWhereClause('Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2009
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Skills', await dataSource.query(sSQL));
|
|
2010
|
+
return result;
|
|
1989
2011
|
}
|
|
1990
2012
|
};
|
|
1991
2013
|
__decorate([
|
|
@@ -2030,7 +2052,7 @@ __decorate([
|
|
|
2030
2052
|
__param(1, (0, server_1.PubSub)()),
|
|
2031
2053
|
__metadata("design:type", Function),
|
|
2032
2054
|
__metadata("design:paramtypes", [Object, server_1.PubSubEngine]),
|
|
2033
|
-
__metadata("design:returntype",
|
|
2055
|
+
__metadata("design:returntype", Promise)
|
|
2034
2056
|
], SkillResolver.prototype, "AllSkills", null);
|
|
2035
2057
|
__decorate([
|
|
2036
2058
|
(0, server_1.FieldResolver)(() => [EmployeeSkill_]),
|
|
@@ -2166,13 +2188,15 @@ let IntegrationURLFormatResolver = class IntegrationURLFormatResolver extends se
|
|
|
2166
2188
|
}
|
|
2167
2189
|
async IntegrationURLFormat(ID, { dataSource, userPayload }, pubSub) {
|
|
2168
2190
|
this.CheckUserReadPermissions('Integration URL Formats', userPayload);
|
|
2169
|
-
const sSQL = `SELECT * FROM [admin].vwIntegrationURLFormats WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Integration URL Formats', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2170
|
-
|
|
2191
|
+
const sSQL = `SELECT * FROM [admin].[vwIntegrationURLFormats] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Integration URL Formats', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2192
|
+
const result = this.MapFieldNamesToCodeNames('Integration URL Formats', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
2193
|
+
return result;
|
|
2171
2194
|
}
|
|
2172
|
-
AllIntegrationURLFormats({ dataSource, userPayload }, pubSub) {
|
|
2195
|
+
async AllIntegrationURLFormats({ dataSource, userPayload }, pubSub) {
|
|
2173
2196
|
this.CheckUserReadPermissions('Integration URL Formats', userPayload);
|
|
2174
|
-
const sSQL = 'SELECT * FROM [admin].vwIntegrationURLFormats' + this.getRowLevelSecurityWhereClause('Integration URL Formats', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
2175
|
-
|
|
2197
|
+
const sSQL = 'SELECT * FROM [admin].[vwIntegrationURLFormats]' + this.getRowLevelSecurityWhereClause('Integration URL Formats', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
2198
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Integration URL Formats', await dataSource.query(sSQL));
|
|
2199
|
+
return result;
|
|
2176
2200
|
}
|
|
2177
2201
|
async UpdateIntegrationURLFormat(input, { dataSource, userPayload }, pubSub) {
|
|
2178
2202
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -2238,7 +2262,7 @@ __decorate([
|
|
|
2238
2262
|
__param(1, (0, server_1.PubSub)()),
|
|
2239
2263
|
__metadata("design:type", Function),
|
|
2240
2264
|
__metadata("design:paramtypes", [Object, server_1.PubSubEngine]),
|
|
2241
|
-
__metadata("design:returntype",
|
|
2265
|
+
__metadata("design:returntype", Promise)
|
|
2242
2266
|
], IntegrationURLFormatResolver.prototype, "AllIntegrationURLFormats", null);
|
|
2243
2267
|
__decorate([
|
|
2244
2268
|
(0, server_1.Mutation)(() => IntegrationURLFormat_),
|
|
@@ -2399,23 +2423,27 @@ let IntegrationResolver = class IntegrationResolver extends server_1.ResolverBas
|
|
|
2399
2423
|
}
|
|
2400
2424
|
async Integration(ID, { dataSource, userPayload }, pubSub) {
|
|
2401
2425
|
this.CheckUserReadPermissions('Integrations', userPayload);
|
|
2402
|
-
const sSQL = `SELECT * FROM [admin].vwIntegrations WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2403
|
-
|
|
2426
|
+
const sSQL = `SELECT * FROM [admin].[vwIntegrations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2427
|
+
const result = this.MapFieldNamesToCodeNames('Integrations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
2428
|
+
return result;
|
|
2404
2429
|
}
|
|
2405
|
-
AllIntegrations({ dataSource, userPayload }, pubSub) {
|
|
2430
|
+
async AllIntegrations({ dataSource, userPayload }, pubSub) {
|
|
2406
2431
|
this.CheckUserReadPermissions('Integrations', userPayload);
|
|
2407
|
-
const sSQL = 'SELECT * FROM [admin].vwIntegrations' + this.getRowLevelSecurityWhereClause('Integrations', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
2408
|
-
|
|
2432
|
+
const sSQL = 'SELECT * FROM [admin].[vwIntegrations]' + this.getRowLevelSecurityWhereClause('Integrations', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
2433
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Integrations', await dataSource.query(sSQL));
|
|
2434
|
+
return result;
|
|
2409
2435
|
}
|
|
2410
2436
|
async IntegrationURLFormatsArray(integration_, { dataSource, userPayload }, pubSub) {
|
|
2411
2437
|
this.CheckUserReadPermissions('Integration URL Formats', userPayload);
|
|
2412
|
-
const sSQL = `SELECT * FROM [admin].[vwIntegrationURLFormats] WHERE IntegrationID=${integration_.ID} ` + this.getRowLevelSecurityWhereClause('Integration URL Formats', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2413
|
-
|
|
2438
|
+
const sSQL = `SELECT * FROM [admin].[vwIntegrationURLFormats] WHERE [IntegrationID]=${integration_.ID} ` + this.getRowLevelSecurityWhereClause('Integration URL Formats', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2439
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Integration URL Formats', await dataSource.query(sSQL));
|
|
2440
|
+
return result;
|
|
2414
2441
|
}
|
|
2415
2442
|
async CompanyIntegrationsArray(integration_, { dataSource, userPayload }, pubSub) {
|
|
2416
2443
|
this.CheckUserReadPermissions('Company Integrations', userPayload);
|
|
2417
|
-
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrations] WHERE IntegrationName=${integration_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2418
|
-
|
|
2444
|
+
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrations] WHERE [IntegrationName]=${integration_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2445
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Company Integrations', await dataSource.query(sSQL));
|
|
2446
|
+
return result;
|
|
2419
2447
|
}
|
|
2420
2448
|
async UpdateIntegration(input, { dataSource, userPayload }, pubSub) {
|
|
2421
2449
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -2481,7 +2509,7 @@ __decorate([
|
|
|
2481
2509
|
__param(1, (0, server_1.PubSub)()),
|
|
2482
2510
|
__metadata("design:type", Function),
|
|
2483
2511
|
__metadata("design:paramtypes", [Object, server_1.PubSubEngine]),
|
|
2484
|
-
__metadata("design:returntype",
|
|
2512
|
+
__metadata("design:returntype", Promise)
|
|
2485
2513
|
], IntegrationResolver.prototype, "AllIntegrations", null);
|
|
2486
2514
|
__decorate([
|
|
2487
2515
|
(0, server_1.FieldResolver)(() => [IntegrationURLFormat_]),
|
|
@@ -2755,28 +2783,33 @@ let CompanyIntegrationResolver = class CompanyIntegrationResolver extends server
|
|
|
2755
2783
|
}
|
|
2756
2784
|
async CompanyIntegration(ID, { dataSource, userPayload }, pubSub) {
|
|
2757
2785
|
this.CheckUserReadPermissions('Company Integrations', userPayload);
|
|
2758
|
-
const sSQL = `SELECT * FROM [admin].vwCompanyIntegrations WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2759
|
-
|
|
2786
|
+
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2787
|
+
const result = this.MapFieldNamesToCodeNames('Company Integrations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
2788
|
+
return result;
|
|
2760
2789
|
}
|
|
2761
2790
|
async ListsArray(companyintegration_, { dataSource, userPayload }, pubSub) {
|
|
2762
2791
|
this.CheckUserReadPermissions('Lists', userPayload);
|
|
2763
|
-
const sSQL = `SELECT * FROM [admin].[vwLists] WHERE CompanyIntegrationID=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Lists', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2764
|
-
|
|
2792
|
+
const sSQL = `SELECT * FROM [admin].[vwLists] WHERE [CompanyIntegrationID]=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Lists', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2793
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Lists', await dataSource.query(sSQL));
|
|
2794
|
+
return result;
|
|
2765
2795
|
}
|
|
2766
2796
|
async EmployeeCompanyIntegrationsArray(companyintegration_, { dataSource, userPayload }, pubSub) {
|
|
2767
2797
|
this.CheckUserReadPermissions('Employee Company Integrations', userPayload);
|
|
2768
|
-
const sSQL = `SELECT * FROM [admin].[vwEmployeeCompanyIntegrations] WHERE CompanyIntegrationID=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2769
|
-
|
|
2798
|
+
const sSQL = `SELECT * FROM [admin].[vwEmployeeCompanyIntegrations] WHERE [CompanyIntegrationID]=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2799
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Employee Company Integrations', await dataSource.query(sSQL));
|
|
2800
|
+
return result;
|
|
2770
2801
|
}
|
|
2771
2802
|
async CompanyIntegrationRunsArray(companyintegration_, { dataSource, userPayload }, pubSub) {
|
|
2772
2803
|
this.CheckUserReadPermissions('Company Integration Runs', userPayload);
|
|
2773
|
-
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRuns] WHERE CompanyIntegrationID=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2774
|
-
|
|
2804
|
+
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRuns] WHERE [CompanyIntegrationID]=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2805
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Runs', await dataSource.query(sSQL));
|
|
2806
|
+
return result;
|
|
2775
2807
|
}
|
|
2776
2808
|
async CompanyIntegrationRecordMapsArray(companyintegration_, { dataSource, userPayload }, pubSub) {
|
|
2777
2809
|
this.CheckUserReadPermissions('Company Integration Record Maps', userPayload);
|
|
2778
|
-
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRecordMaps] WHERE CompanyIntegrationID=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Record Maps', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2779
|
-
|
|
2810
|
+
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRecordMaps] WHERE [CompanyIntegrationID]=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Record Maps', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2811
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Record Maps', await dataSource.query(sSQL));
|
|
2812
|
+
return result;
|
|
2780
2813
|
}
|
|
2781
2814
|
async UpdateCompanyIntegration(input, { dataSource, userPayload }, pubSub) {
|
|
2782
2815
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -3071,7 +3104,7 @@ __decorate([
|
|
|
3071
3104
|
], EntityField_.prototype, "EntityCodeName", void 0);
|
|
3072
3105
|
__decorate([
|
|
3073
3106
|
(0, server_1.Field)({ nullable: true }),
|
|
3074
|
-
(0, class_validator_1.MaxLength)(
|
|
3107
|
+
(0, class_validator_1.MaxLength)(8000),
|
|
3075
3108
|
__metadata("design:type", String)
|
|
3076
3109
|
], EntityField_.prototype, "EntityClassName", void 0);
|
|
3077
3110
|
__decorate([
|
|
@@ -3101,7 +3134,7 @@ __decorate([
|
|
|
3101
3134
|
], EntityField_.prototype, "RelatedEntityCodeName", void 0);
|
|
3102
3135
|
__decorate([
|
|
3103
3136
|
(0, server_1.Field)({ nullable: true }),
|
|
3104
|
-
(0, class_validator_1.MaxLength)(
|
|
3137
|
+
(0, class_validator_1.MaxLength)(8000),
|
|
3105
3138
|
__metadata("design:type", String)
|
|
3106
3139
|
], EntityField_.prototype, "RelatedEntityClassName", void 0);
|
|
3107
3140
|
__decorate([
|
|
@@ -3351,18 +3384,21 @@ let EntityFieldResolver = class EntityFieldResolver extends server_1.ResolverBas
|
|
|
3351
3384
|
}
|
|
3352
3385
|
async EntityField(ID, { dataSource, userPayload }, pubSub) {
|
|
3353
3386
|
this.CheckUserReadPermissions('Entity Fields', userPayload);
|
|
3354
|
-
const sSQL = `SELECT * FROM [admin].vwEntityFields WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Fields', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
3355
|
-
|
|
3387
|
+
const sSQL = `SELECT * FROM [admin].[vwEntityFields] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Fields', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
3388
|
+
const result = this.MapFieldNamesToCodeNames('Entity Fields', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
3389
|
+
return result;
|
|
3356
3390
|
}
|
|
3357
|
-
AllEntityFields({ dataSource, userPayload }, pubSub) {
|
|
3391
|
+
async AllEntityFields({ dataSource, userPayload }, pubSub) {
|
|
3358
3392
|
this.CheckUserReadPermissions('Entity Fields', userPayload);
|
|
3359
|
-
const sSQL = 'SELECT * FROM [admin].vwEntityFields' + this.getRowLevelSecurityWhereClause('Entity Fields', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
3360
|
-
|
|
3393
|
+
const sSQL = 'SELECT * FROM [admin].[vwEntityFields]' + this.getRowLevelSecurityWhereClause('Entity Fields', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
3394
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Entity Fields', await dataSource.query(sSQL));
|
|
3395
|
+
return result;
|
|
3361
3396
|
}
|
|
3362
3397
|
async EntityFieldValuesArray(entityfield_, { dataSource, userPayload }, pubSub) {
|
|
3363
3398
|
this.CheckUserReadPermissions('Entity Field Values', userPayload);
|
|
3364
|
-
const sSQL = `SELECT * FROM [admin].[vwEntityFieldValues] WHERE EntityFieldID=${entityfield_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Field Values', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
3365
|
-
|
|
3399
|
+
const sSQL = `SELECT * FROM [admin].[vwEntityFieldValues] WHERE [EntityFieldID]=${entityfield_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Field Values', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
3400
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Entity Field Values', await dataSource.query(sSQL));
|
|
3401
|
+
return result;
|
|
3366
3402
|
}
|
|
3367
3403
|
async CreateEntityField(input, { dataSource, userPayload }, pubSub) {
|
|
3368
3404
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -3380,11 +3416,9 @@ let EntityFieldResolver = class EntityFieldResolver extends server_1.ResolverBas
|
|
|
3380
3416
|
return null;
|
|
3381
3417
|
}
|
|
3382
3418
|
async BeforeCreate(dataSource, input) {
|
|
3383
|
-
const i = input, d = dataSource;
|
|
3384
3419
|
return true;
|
|
3385
3420
|
}
|
|
3386
3421
|
async AfterCreate(dataSource, input) {
|
|
3387
|
-
const i = input, d = dataSource;
|
|
3388
3422
|
}
|
|
3389
3423
|
async UpdateEntityField(input, { dataSource, userPayload }, pubSub) {
|
|
3390
3424
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -3411,9 +3445,10 @@ let EntityFieldResolver = class EntityFieldResolver extends server_1.ResolverBas
|
|
|
3411
3445
|
if (await this.BeforeDelete(dataSource, ID)) {
|
|
3412
3446
|
const entityObject = await new core_1.Metadata().GetEntityObject('Entity Fields', this.GetUserFromPayload(userPayload));
|
|
3413
3447
|
await entityObject.Load(ID);
|
|
3448
|
+
const returnValue = entityObject.GetAll();
|
|
3414
3449
|
if (await entityObject.Delete()) {
|
|
3415
3450
|
await this.AfterDelete(dataSource, ID);
|
|
3416
|
-
return
|
|
3451
|
+
return returnValue;
|
|
3417
3452
|
}
|
|
3418
3453
|
else
|
|
3419
3454
|
return null;
|
|
@@ -3471,7 +3506,7 @@ __decorate([
|
|
|
3471
3506
|
__param(1, (0, server_1.PubSub)()),
|
|
3472
3507
|
__metadata("design:type", Function),
|
|
3473
3508
|
__metadata("design:paramtypes", [Object, server_1.PubSubEngine]),
|
|
3474
|
-
__metadata("design:returntype",
|
|
3509
|
+
__metadata("design:returntype", Promise)
|
|
3475
3510
|
], EntityFieldResolver.prototype, "AllEntityFields", null);
|
|
3476
3511
|
__decorate([
|
|
3477
3512
|
(0, server_1.FieldResolver)(() => [EntityFieldValue_]),
|
|
@@ -3501,7 +3536,7 @@ __decorate([
|
|
|
3501
3536
|
__metadata("design:returntype", Promise)
|
|
3502
3537
|
], EntityFieldResolver.prototype, "UpdateEntityField", null);
|
|
3503
3538
|
__decorate([
|
|
3504
|
-
(0, server_1.Mutation)(() =>
|
|
3539
|
+
(0, server_1.Mutation)(() => EntityField_),
|
|
3505
3540
|
__param(0, (0, server_1.Arg)('ID', () => server_1.Int)),
|
|
3506
3541
|
__param(1, (0, server_1.Ctx)()),
|
|
3507
3542
|
__param(2, (0, server_1.PubSub)()),
|
|
@@ -3697,12 +3732,12 @@ __decorate([
|
|
|
3697
3732
|
], Entity_.prototype, "CodeName", void 0);
|
|
3698
3733
|
__decorate([
|
|
3699
3734
|
(0, server_1.Field)({ nullable: true }),
|
|
3700
|
-
(0, class_validator_1.MaxLength)(
|
|
3735
|
+
(0, class_validator_1.MaxLength)(8000),
|
|
3701
3736
|
__metadata("design:type", String)
|
|
3702
3737
|
], Entity_.prototype, "ClassName", void 0);
|
|
3703
3738
|
__decorate([
|
|
3704
3739
|
(0, server_1.Field)({ nullable: true }),
|
|
3705
|
-
(0, class_validator_1.MaxLength)(
|
|
3740
|
+
(0, class_validator_1.MaxLength)(8000),
|
|
3706
3741
|
__metadata("design:type", String)
|
|
3707
3742
|
], Entity_.prototype, "BaseTableCodeName", void 0);
|
|
3708
3743
|
__decorate([
|
|
@@ -3806,6 +3841,10 @@ Entity_ = Entity_1 = __decorate([
|
|
|
3806
3841
|
exports.Entity_ = Entity_;
|
|
3807
3842
|
let CreateEntityInput = class CreateEntityInput {
|
|
3808
3843
|
};
|
|
3844
|
+
__decorate([
|
|
3845
|
+
(0, server_1.Field)(() => server_1.Int),
|
|
3846
|
+
__metadata("design:type", Number)
|
|
3847
|
+
], CreateEntityInput.prototype, "ID", void 0);
|
|
3809
3848
|
__decorate([
|
|
3810
3849
|
(0, server_1.Field)(() => server_1.Int, { nullable: true }),
|
|
3811
3850
|
__metadata("design:type", Number)
|
|
@@ -4147,113 +4186,135 @@ let EntityResolverBase = class EntityResolverBase extends server_1.ResolverBase
|
|
|
4147
4186
|
}
|
|
4148
4187
|
async Entity(ID, { dataSource, userPayload }, pubSub) {
|
|
4149
4188
|
this.CheckUserReadPermissions('Entities', userPayload);
|
|
4150
|
-
const sSQL = `SELECT * FROM [admin].vwEntities WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4151
|
-
|
|
4189
|
+
const sSQL = `SELECT * FROM [admin].[vwEntities] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4190
|
+
const result = this.MapFieldNamesToCodeNames('Entities', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
4191
|
+
return result;
|
|
4152
4192
|
}
|
|
4153
|
-
AllEntities({ dataSource, userPayload }, pubSub) {
|
|
4193
|
+
async AllEntities({ dataSource, userPayload }, pubSub) {
|
|
4154
4194
|
this.CheckUserReadPermissions('Entities', userPayload);
|
|
4155
|
-
const sSQL = 'SELECT * FROM [admin].vwEntities' + this.getRowLevelSecurityWhereClause('Entities', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
4156
|
-
|
|
4195
|
+
const sSQL = 'SELECT * FROM [admin].[vwEntities]' + this.getRowLevelSecurityWhereClause('Entities', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
4196
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Entities', await dataSource.query(sSQL));
|
|
4197
|
+
return result;
|
|
4157
4198
|
}
|
|
4158
4199
|
async EntityFieldsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4159
4200
|
this.CheckUserReadPermissions('Entity Fields', userPayload);
|
|
4160
|
-
const sSQL = `SELECT * FROM [admin].[vwEntityFields] WHERE EntityID=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Fields', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4161
|
-
|
|
4201
|
+
const sSQL = `SELECT * FROM [admin].[vwEntityFields] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Fields', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4202
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Entity Fields', await dataSource.query(sSQL));
|
|
4203
|
+
return result;
|
|
4162
4204
|
}
|
|
4163
4205
|
async EntityPermissionsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4164
4206
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
4165
|
-
const sSQL = `SELECT * FROM [admin].[vwEntityPermissions] WHERE EntityID=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4166
|
-
|
|
4207
|
+
const sSQL = `SELECT * FROM [admin].[vwEntityPermissions] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4208
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL));
|
|
4209
|
+
return result;
|
|
4167
4210
|
}
|
|
4168
4211
|
async EntityRelationshipsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4169
4212
|
this.CheckUserReadPermissions('Entity Relationships', userPayload);
|
|
4170
|
-
const sSQL = `SELECT * FROM [admin].[vwEntityRelationships] WHERE EntityID=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Relationships', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4171
|
-
|
|
4213
|
+
const sSQL = `SELECT * FROM [admin].[vwEntityRelationships] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Relationships', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4214
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Entity Relationships', await dataSource.query(sSQL));
|
|
4215
|
+
return result;
|
|
4172
4216
|
}
|
|
4173
4217
|
async EntityAIActionsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4174
4218
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
4175
|
-
const sSQL = `SELECT * FROM [admin].[vwEntityAIActions] WHERE EntityID=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4176
|
-
|
|
4219
|
+
const sSQL = `SELECT * FROM [admin].[vwEntityAIActions] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4220
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL));
|
|
4221
|
+
return result;
|
|
4177
4222
|
}
|
|
4178
4223
|
async UserRecordLogsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4179
4224
|
this.CheckUserReadPermissions('User Record Logs', userPayload);
|
|
4180
|
-
const sSQL = `SELECT * FROM [admin].[vwUserRecordLogs] WHERE EntityID=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Record Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4181
|
-
|
|
4225
|
+
const sSQL = `SELECT * FROM [admin].[vwUserRecordLogs] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Record Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4226
|
+
const result = this.ArrayMapFieldNamesToCodeNames('User Record Logs', await dataSource.query(sSQL));
|
|
4227
|
+
return result;
|
|
4182
4228
|
}
|
|
4183
4229
|
async IntegrationURLFormatsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4184
4230
|
this.CheckUserReadPermissions('Integration URL Formats', userPayload);
|
|
4185
|
-
const sSQL = `SELECT * FROM [admin].[vwIntegrationURLFormats] WHERE EntityID=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Integration URL Formats', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4186
|
-
|
|
4231
|
+
const sSQL = `SELECT * FROM [admin].[vwIntegrationURLFormats] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Integration URL Formats', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4232
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Integration URL Formats', await dataSource.query(sSQL));
|
|
4233
|
+
return result;
|
|
4187
4234
|
}
|
|
4188
4235
|
async EntitiesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4189
4236
|
this.CheckUserReadPermissions('Entities', userPayload);
|
|
4190
|
-
const sSQL = `SELECT * FROM [admin].[vwEntities] WHERE ParentID=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4191
|
-
|
|
4237
|
+
const sSQL = `SELECT * FROM [admin].[vwEntities] WHERE [ParentID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4238
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Entities', await dataSource.query(sSQL));
|
|
4239
|
+
return result;
|
|
4192
4240
|
}
|
|
4193
4241
|
async UserFavoritesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4194
4242
|
this.CheckUserReadPermissions('User Favorites', userPayload);
|
|
4195
|
-
const sSQL = `SELECT * FROM [admin].[vwUserFavorites] WHERE EntityID=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Favorites', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4196
|
-
|
|
4243
|
+
const sSQL = `SELECT * FROM [admin].[vwUserFavorites] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Favorites', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4244
|
+
const result = this.ArrayMapFieldNamesToCodeNames('User Favorites', await dataSource.query(sSQL));
|
|
4245
|
+
return result;
|
|
4197
4246
|
}
|
|
4198
4247
|
async CompanyIntegrationRunDetailsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4199
4248
|
this.CheckUserReadPermissions('Company Integration Run Details', userPayload);
|
|
4200
|
-
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRunDetails] WHERE EntityID=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4201
|
-
|
|
4249
|
+
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRunDetails] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4250
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Run Details', await dataSource.query(sSQL));
|
|
4251
|
+
return result;
|
|
4202
4252
|
}
|
|
4203
4253
|
async ApplicationEntitiesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4204
4254
|
this.CheckUserReadPermissions('Application Entities', userPayload);
|
|
4205
|
-
const sSQL = `SELECT * FROM [admin].[vwApplicationEntities] WHERE EntityID=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4206
|
-
|
|
4255
|
+
const sSQL = `SELECT * FROM [admin].[vwApplicationEntities] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4256
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Application Entities', await dataSource.query(sSQL));
|
|
4257
|
+
return result;
|
|
4207
4258
|
}
|
|
4208
4259
|
async UserApplicationEntitiesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4209
4260
|
this.CheckUserReadPermissions('User Application Entities', userPayload);
|
|
4210
|
-
const sSQL = `SELECT * FROM [admin].[vwUserApplicationEntities] WHERE EntityID=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4211
|
-
|
|
4261
|
+
const sSQL = `SELECT * FROM [admin].[vwUserApplicationEntities] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4262
|
+
const result = this.ArrayMapFieldNamesToCodeNames('User Application Entities', await dataSource.query(sSQL));
|
|
4263
|
+
return result;
|
|
4212
4264
|
}
|
|
4213
4265
|
async ListsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4214
4266
|
this.CheckUserReadPermissions('Lists', userPayload);
|
|
4215
|
-
const sSQL = `SELECT * FROM [admin].[vwLists] WHERE EntityID=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Lists', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4216
|
-
|
|
4267
|
+
const sSQL = `SELECT * FROM [admin].[vwLists] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Lists', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4268
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Lists', await dataSource.query(sSQL));
|
|
4269
|
+
return result;
|
|
4217
4270
|
}
|
|
4218
4271
|
async UserViewsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4219
4272
|
this.CheckUserReadPermissions('User Views', userPayload);
|
|
4220
|
-
const sSQL = `SELECT * FROM [admin].[vwUserViews] WHERE EntityID=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4221
|
-
|
|
4273
|
+
const sSQL = `SELECT * FROM [admin].[vwUserViews] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4274
|
+
const result = this.ArrayMapFieldNamesToCodeNames('User Views', await dataSource.query(sSQL));
|
|
4275
|
+
return result;
|
|
4222
4276
|
}
|
|
4223
4277
|
async RecordChangesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4224
4278
|
this.CheckUserReadPermissions('Record Changes', userPayload);
|
|
4225
|
-
const sSQL = `SELECT * FROM [admin].[vwRecordChanges] WHERE EntityID=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Record Changes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4226
|
-
|
|
4279
|
+
const sSQL = `SELECT * FROM [admin].[vwRecordChanges] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Record Changes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4280
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Record Changes', await dataSource.query(sSQL));
|
|
4281
|
+
return result;
|
|
4227
4282
|
}
|
|
4228
4283
|
async AuditLogsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4229
4284
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
4230
|
-
const sSQL = `SELECT * FROM [admin].[vwAuditLogs] WHERE EntityID=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4231
|
-
|
|
4285
|
+
const sSQL = `SELECT * FROM [admin].[vwAuditLogs] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4286
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL));
|
|
4287
|
+
return result;
|
|
4232
4288
|
}
|
|
4233
4289
|
async ResourceTypesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4234
4290
|
this.CheckUserReadPermissions('Resource Types', userPayload);
|
|
4235
|
-
const sSQL = `SELECT * FROM [admin].[vwResourceTypes] WHERE EntityID=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Resource Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4236
|
-
|
|
4291
|
+
const sSQL = `SELECT * FROM [admin].[vwResourceTypes] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Resource Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4292
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Resource Types', await dataSource.query(sSQL));
|
|
4293
|
+
return result;
|
|
4237
4294
|
}
|
|
4238
4295
|
async TaggedItemsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4239
4296
|
this.CheckUserReadPermissions('Tagged Items', userPayload);
|
|
4240
|
-
const sSQL = `SELECT * FROM [admin].[vwTaggedItems] WHERE EntityID=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Tagged Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4241
|
-
|
|
4297
|
+
const sSQL = `SELECT * FROM [admin].[vwTaggedItems] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Tagged Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4298
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Tagged Items', await dataSource.query(sSQL));
|
|
4299
|
+
return result;
|
|
4242
4300
|
}
|
|
4243
4301
|
async DatasetItemsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4244
4302
|
this.CheckUserReadPermissions('Dataset Items', userPayload);
|
|
4245
|
-
const sSQL = `SELECT * FROM [admin].[vwDatasetItems] WHERE EntityID=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Dataset Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4246
|
-
|
|
4303
|
+
const sSQL = `SELECT * FROM [admin].[vwDatasetItems] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Dataset Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4304
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Dataset Items', await dataSource.query(sSQL));
|
|
4305
|
+
return result;
|
|
4247
4306
|
}
|
|
4248
4307
|
async CompanyIntegrationRecordMapsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4249
4308
|
this.CheckUserReadPermissions('Company Integration Record Maps', userPayload);
|
|
4250
|
-
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRecordMaps] WHERE EntityID=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Record Maps', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4251
|
-
|
|
4309
|
+
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRecordMaps] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Record Maps', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4310
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Record Maps', await dataSource.query(sSQL));
|
|
4311
|
+
return result;
|
|
4252
4312
|
}
|
|
4253
4313
|
async RecordMergeLogsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4254
4314
|
this.CheckUserReadPermissions('Record Merge Logs', userPayload);
|
|
4255
|
-
const sSQL = `SELECT * FROM [admin].[vwRecordMergeLogs] WHERE EntityID=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4256
|
-
|
|
4315
|
+
const sSQL = `SELECT * FROM [admin].[vwRecordMergeLogs] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4316
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Record Merge Logs', await dataSource.query(sSQL));
|
|
4317
|
+
return result;
|
|
4257
4318
|
}
|
|
4258
4319
|
async CreateEntity(input, { dataSource, userPayload }, pubSub) {
|
|
4259
4320
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -4271,11 +4332,9 @@ let EntityResolverBase = class EntityResolverBase extends server_1.ResolverBase
|
|
|
4271
4332
|
return null;
|
|
4272
4333
|
}
|
|
4273
4334
|
async BeforeCreate(dataSource, input) {
|
|
4274
|
-
const i = input, d = dataSource;
|
|
4275
4335
|
return true;
|
|
4276
4336
|
}
|
|
4277
4337
|
async AfterCreate(dataSource, input) {
|
|
4278
|
-
const i = input, d = dataSource;
|
|
4279
4338
|
}
|
|
4280
4339
|
async UpdateEntity(input, { dataSource, userPayload }, pubSub) {
|
|
4281
4340
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -4302,9 +4361,10 @@ let EntityResolverBase = class EntityResolverBase extends server_1.ResolverBase
|
|
|
4302
4361
|
if (await this.BeforeDelete(dataSource, ID)) {
|
|
4303
4362
|
const entityObject = await new core_1.Metadata().GetEntityObject('Entities', this.GetUserFromPayload(userPayload));
|
|
4304
4363
|
await entityObject.Load(ID);
|
|
4364
|
+
const returnValue = entityObject.GetAll();
|
|
4305
4365
|
if (await entityObject.Delete()) {
|
|
4306
4366
|
await this.AfterDelete(dataSource, ID);
|
|
4307
|
-
return
|
|
4367
|
+
return returnValue;
|
|
4308
4368
|
}
|
|
4309
4369
|
else
|
|
4310
4370
|
return null;
|
|
@@ -4362,7 +4422,7 @@ __decorate([
|
|
|
4362
4422
|
__param(1, (0, server_1.PubSub)()),
|
|
4363
4423
|
__metadata("design:type", Function),
|
|
4364
4424
|
__metadata("design:paramtypes", [Object, server_1.PubSubEngine]),
|
|
4365
|
-
__metadata("design:returntype",
|
|
4425
|
+
__metadata("design:returntype", Promise)
|
|
4366
4426
|
], EntityResolverBase.prototype, "AllEntities", null);
|
|
4367
4427
|
__decorate([
|
|
4368
4428
|
(0, server_1.FieldResolver)(() => [EntityField_]),
|
|
@@ -4563,7 +4623,7 @@ __decorate([
|
|
|
4563
4623
|
__metadata("design:returntype", Promise)
|
|
4564
4624
|
], EntityResolverBase.prototype, "UpdateEntity", null);
|
|
4565
4625
|
__decorate([
|
|
4566
|
-
(0, server_1.Mutation)(() =>
|
|
4626
|
+
(0, server_1.Mutation)(() => Entity_),
|
|
4567
4627
|
__param(0, (0, server_1.Arg)('ID', () => server_1.Int)),
|
|
4568
4628
|
__param(1, (0, server_1.Ctx)()),
|
|
4569
4629
|
__param(2, (0, server_1.PubSub)()),
|
|
@@ -4899,103 +4959,123 @@ let UserResolverBase = class UserResolverBase extends server_1.ResolverBase {
|
|
|
4899
4959
|
}
|
|
4900
4960
|
async User(ID, { dataSource, userPayload }, pubSub) {
|
|
4901
4961
|
this.CheckUserReadPermissions('Users', userPayload);
|
|
4902
|
-
const sSQL = `SELECT * FROM [admin].vwUsers WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Users', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4903
|
-
|
|
4962
|
+
const sSQL = `SELECT * FROM [admin].[vwUsers] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Users', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4963
|
+
const result = this.MapFieldNamesToCodeNames('Users', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
4964
|
+
return result;
|
|
4904
4965
|
}
|
|
4905
|
-
AllUsers({ dataSource, userPayload }, pubSub) {
|
|
4966
|
+
async AllUsers({ dataSource, userPayload }, pubSub) {
|
|
4906
4967
|
this.CheckUserReadPermissions('Users', userPayload);
|
|
4907
|
-
const sSQL = 'SELECT * FROM [admin].vwUsers' + this.getRowLevelSecurityWhereClause('Users', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
4908
|
-
|
|
4968
|
+
const sSQL = 'SELECT * FROM [admin].[vwUsers]' + this.getRowLevelSecurityWhereClause('Users', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
4969
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Users', await dataSource.query(sSQL));
|
|
4970
|
+
return result;
|
|
4909
4971
|
}
|
|
4910
4972
|
async UserApplicationsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
4911
4973
|
this.CheckUserReadPermissions('User Applications', userPayload);
|
|
4912
|
-
const sSQL = `SELECT * FROM [admin].[vwUserApplications] WHERE UserID=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Applications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4913
|
-
|
|
4974
|
+
const sSQL = `SELECT * FROM [admin].[vwUserApplications] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Applications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4975
|
+
const result = this.ArrayMapFieldNamesToCodeNames('User Applications', await dataSource.query(sSQL));
|
|
4976
|
+
return result;
|
|
4914
4977
|
}
|
|
4915
4978
|
async UserRolesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
4916
4979
|
this.CheckUserReadPermissions('User Roles', userPayload);
|
|
4917
|
-
const sSQL = `SELECT * FROM [admin].[vwUserRoles] WHERE UserID=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4918
|
-
|
|
4980
|
+
const sSQL = `SELECT * FROM [admin].[vwUserRoles] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4981
|
+
const result = this.ArrayMapFieldNamesToCodeNames('User Roles', await dataSource.query(sSQL));
|
|
4982
|
+
return result;
|
|
4919
4983
|
}
|
|
4920
4984
|
async WorkspacesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
4921
4985
|
this.CheckUserReadPermissions('Workspaces', userPayload);
|
|
4922
|
-
const sSQL = `SELECT * FROM [admin].[vwWorkspaces] WHERE UserID=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Workspaces', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4923
|
-
|
|
4986
|
+
const sSQL = `SELECT * FROM [admin].[vwWorkspaces] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Workspaces', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4987
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Workspaces', await dataSource.query(sSQL));
|
|
4988
|
+
return result;
|
|
4924
4989
|
}
|
|
4925
4990
|
async ReportsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
4926
4991
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
4927
|
-
const sSQL = `SELECT * FROM [admin].[vwReports] WHERE UserID=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4928
|
-
|
|
4992
|
+
const sSQL = `SELECT * FROM [admin].[vwReports] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4993
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
4994
|
+
return result;
|
|
4929
4995
|
}
|
|
4930
4996
|
async ReportSnapshotsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
4931
4997
|
this.CheckUserReadPermissions('Report Snapshots', userPayload);
|
|
4932
|
-
const sSQL = `SELECT * FROM [admin].[vwReportSnapshots] WHERE UserID=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Report Snapshots', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4933
|
-
|
|
4998
|
+
const sSQL = `SELECT * FROM [admin].[vwReportSnapshots] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Report Snapshots', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4999
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Report Snapshots', await dataSource.query(sSQL));
|
|
5000
|
+
return result;
|
|
4934
5001
|
}
|
|
4935
5002
|
async RecordChangesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
4936
5003
|
this.CheckUserReadPermissions('Record Changes', userPayload);
|
|
4937
|
-
const sSQL = `SELECT * FROM [admin].[vwRecordChanges] WHERE UserID=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Record Changes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4938
|
-
|
|
5004
|
+
const sSQL = `SELECT * FROM [admin].[vwRecordChanges] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Record Changes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5005
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Record Changes', await dataSource.query(sSQL));
|
|
5006
|
+
return result;
|
|
4939
5007
|
}
|
|
4940
5008
|
async DashboardsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
4941
5009
|
this.CheckUserReadPermissions('Dashboards', userPayload);
|
|
4942
|
-
const sSQL = `SELECT * FROM [admin].[vwDashboards] WHERE UserID=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Dashboards', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4943
|
-
|
|
5010
|
+
const sSQL = `SELECT * FROM [admin].[vwDashboards] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Dashboards', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5011
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Dashboards', await dataSource.query(sSQL));
|
|
5012
|
+
return result;
|
|
4944
5013
|
}
|
|
4945
5014
|
async UserViewRunsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
4946
5015
|
this.CheckUserReadPermissions('User View Runs', userPayload);
|
|
4947
|
-
const sSQL = `SELECT * FROM [admin].[vwUserViewRuns] WHERE RunByUserID=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User View Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4948
|
-
|
|
5016
|
+
const sSQL = `SELECT * FROM [admin].[vwUserViewRuns] WHERE [RunByUserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User View Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5017
|
+
const result = this.ArrayMapFieldNamesToCodeNames('User View Runs', await dataSource.query(sSQL));
|
|
5018
|
+
return result;
|
|
4949
5019
|
}
|
|
4950
5020
|
async AuditLogsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
4951
5021
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
4952
|
-
const sSQL = `SELECT * FROM [admin].[vwAuditLogs] WHERE UserID=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4953
|
-
|
|
5022
|
+
const sSQL = `SELECT * FROM [admin].[vwAuditLogs] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5023
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL));
|
|
5024
|
+
return result;
|
|
4954
5025
|
}
|
|
4955
5026
|
async ListsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
4956
5027
|
this.CheckUserReadPermissions('Lists', userPayload);
|
|
4957
|
-
const sSQL = `SELECT * FROM [admin].[vwLists] WHERE UserID=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Lists', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4958
|
-
|
|
5028
|
+
const sSQL = `SELECT * FROM [admin].[vwLists] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Lists', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5029
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Lists', await dataSource.query(sSQL));
|
|
5030
|
+
return result;
|
|
4959
5031
|
}
|
|
4960
5032
|
async UserFavoritesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
4961
5033
|
this.CheckUserReadPermissions('User Favorites', userPayload);
|
|
4962
|
-
const sSQL = `SELECT * FROM [admin].[vwUserFavorites] WHERE UserID=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Favorites', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4963
|
-
|
|
5034
|
+
const sSQL = `SELECT * FROM [admin].[vwUserFavorites] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Favorites', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5035
|
+
const result = this.ArrayMapFieldNamesToCodeNames('User Favorites', await dataSource.query(sSQL));
|
|
5036
|
+
return result;
|
|
4964
5037
|
}
|
|
4965
5038
|
async UserRecordLogsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
4966
5039
|
this.CheckUserReadPermissions('User Record Logs', userPayload);
|
|
4967
|
-
const sSQL = `SELECT * FROM [admin].[vwUserRecordLogs] WHERE UserID=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Record Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4968
|
-
|
|
5040
|
+
const sSQL = `SELECT * FROM [admin].[vwUserRecordLogs] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Record Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5041
|
+
const result = this.ArrayMapFieldNamesToCodeNames('User Record Logs', await dataSource.query(sSQL));
|
|
5042
|
+
return result;
|
|
4969
5043
|
}
|
|
4970
5044
|
async UserViewsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
4971
5045
|
this.CheckUserReadPermissions('User Views', userPayload);
|
|
4972
|
-
const sSQL = `SELECT * FROM [admin].[vwUserViews] WHERE UserID=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4973
|
-
|
|
5046
|
+
const sSQL = `SELECT * FROM [admin].[vwUserViews] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5047
|
+
const result = this.ArrayMapFieldNamesToCodeNames('User Views', await dataSource.query(sSQL));
|
|
5048
|
+
return result;
|
|
4974
5049
|
}
|
|
4975
5050
|
async CompanyIntegrationRunsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
4976
5051
|
this.CheckUserReadPermissions('Company Integration Runs', userPayload);
|
|
4977
|
-
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRuns] WHERE RunByUserID=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4978
|
-
|
|
5052
|
+
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRuns] WHERE [RunByUserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5053
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Runs', await dataSource.query(sSQL));
|
|
5054
|
+
return result;
|
|
4979
5055
|
}
|
|
4980
5056
|
async UserNotificationsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
4981
5057
|
this.CheckUserReadPermissions('User Notifications', userPayload);
|
|
4982
|
-
const sSQL = `SELECT * FROM [admin].[vwUserNotifications] WHERE UserID=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Notifications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4983
|
-
|
|
5058
|
+
const sSQL = `SELECT * FROM [admin].[vwUserNotifications] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Notifications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5059
|
+
const result = this.ArrayMapFieldNamesToCodeNames('User Notifications', await dataSource.query(sSQL));
|
|
5060
|
+
return result;
|
|
4984
5061
|
}
|
|
4985
5062
|
async ConversationsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
4986
5063
|
this.CheckUserReadPermissions('Conversations', userPayload);
|
|
4987
|
-
const sSQL = `SELECT * FROM [admin].[vwConversations] WHERE UserID=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Conversations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4988
|
-
|
|
5064
|
+
const sSQL = `SELECT * FROM [admin].[vwConversations] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Conversations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5065
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Conversations', await dataSource.query(sSQL));
|
|
5066
|
+
return result;
|
|
4989
5067
|
}
|
|
4990
5068
|
async ResourceFoldersArray(user_, { dataSource, userPayload }, pubSub) {
|
|
4991
5069
|
this.CheckUserReadPermissions('Resource Folders', userPayload);
|
|
4992
|
-
const sSQL = `SELECT * FROM [admin].[vwResourceFolders] WHERE UserID=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Resource Folders', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4993
|
-
|
|
5070
|
+
const sSQL = `SELECT * FROM [admin].[vwResourceFolders] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Resource Folders', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5071
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Resource Folders', await dataSource.query(sSQL));
|
|
5072
|
+
return result;
|
|
4994
5073
|
}
|
|
4995
5074
|
async RecordMergeLogsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
4996
5075
|
this.CheckUserReadPermissions('Record Merge Logs', userPayload);
|
|
4997
|
-
const sSQL = `SELECT * FROM [admin].[vwRecordMergeLogs] WHERE InitiatedByUserID=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4998
|
-
|
|
5076
|
+
const sSQL = `SELECT * FROM [admin].[vwRecordMergeLogs] WHERE [InitiatedByUserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5077
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Record Merge Logs', await dataSource.query(sSQL));
|
|
5078
|
+
return result;
|
|
4999
5079
|
}
|
|
5000
5080
|
async CreateUser(input, { dataSource, userPayload }, pubSub) {
|
|
5001
5081
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -5013,11 +5093,9 @@ let UserResolverBase = class UserResolverBase extends server_1.ResolverBase {
|
|
|
5013
5093
|
return null;
|
|
5014
5094
|
}
|
|
5015
5095
|
async BeforeCreate(dataSource, input) {
|
|
5016
|
-
const i = input, d = dataSource;
|
|
5017
5096
|
return true;
|
|
5018
5097
|
}
|
|
5019
5098
|
async AfterCreate(dataSource, input) {
|
|
5020
|
-
const i = input, d = dataSource;
|
|
5021
5099
|
}
|
|
5022
5100
|
async UpdateUser(input, { dataSource, userPayload }, pubSub) {
|
|
5023
5101
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -5084,7 +5162,7 @@ __decorate([
|
|
|
5084
5162
|
__param(1, (0, server_1.PubSub)()),
|
|
5085
5163
|
__metadata("design:type", Function),
|
|
5086
5164
|
__metadata("design:paramtypes", [Object, server_1.PubSubEngine]),
|
|
5087
|
-
__metadata("design:returntype",
|
|
5165
|
+
__metadata("design:returntype", Promise)
|
|
5088
5166
|
], UserResolverBase.prototype, "AllUsers", null);
|
|
5089
5167
|
__decorate([
|
|
5090
5168
|
(0, server_1.FieldResolver)(() => [UserApplication_]),
|
|
@@ -5378,7 +5456,7 @@ __decorate([
|
|
|
5378
5456
|
], EntityRelationship_.prototype, "RelatedEntityBaseView", void 0);
|
|
5379
5457
|
__decorate([
|
|
5380
5458
|
(0, server_1.Field)({ nullable: true }),
|
|
5381
|
-
(0, class_validator_1.MaxLength)(
|
|
5459
|
+
(0, class_validator_1.MaxLength)(8000),
|
|
5382
5460
|
__metadata("design:type", String)
|
|
5383
5461
|
], EntityRelationship_.prototype, "RelatedEntityClassName", void 0);
|
|
5384
5462
|
__decorate([
|
|
@@ -5388,7 +5466,7 @@ __decorate([
|
|
|
5388
5466
|
], EntityRelationship_.prototype, "RelatedEntityCodeName", void 0);
|
|
5389
5467
|
__decorate([
|
|
5390
5468
|
(0, server_1.Field)({ nullable: true }),
|
|
5391
|
-
(0, class_validator_1.MaxLength)(
|
|
5469
|
+
(0, class_validator_1.MaxLength)(8000),
|
|
5392
5470
|
__metadata("design:type", String)
|
|
5393
5471
|
], EntityRelationship_.prototype, "RelatedEntityBaseTableCodeName", void 0);
|
|
5394
5472
|
__decorate([
|
|
@@ -5563,13 +5641,15 @@ let EntityRelationshipResolver = class EntityRelationshipResolver extends server
|
|
|
5563
5641
|
}
|
|
5564
5642
|
async EntityRelationship(ID, { dataSource, userPayload }, pubSub) {
|
|
5565
5643
|
this.CheckUserReadPermissions('Entity Relationships', userPayload);
|
|
5566
|
-
const sSQL = `SELECT * FROM [admin].vwEntityRelationships WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Relationships', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5567
|
-
|
|
5644
|
+
const sSQL = `SELECT * FROM [admin].[vwEntityRelationships] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Relationships', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5645
|
+
const result = this.MapFieldNamesToCodeNames('Entity Relationships', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
5646
|
+
return result;
|
|
5568
5647
|
}
|
|
5569
|
-
AllEntityRelationships({ dataSource, userPayload }, pubSub) {
|
|
5648
|
+
async AllEntityRelationships({ dataSource, userPayload }, pubSub) {
|
|
5570
5649
|
this.CheckUserReadPermissions('Entity Relationships', userPayload);
|
|
5571
|
-
const sSQL = 'SELECT * FROM [admin].vwEntityRelationships' + this.getRowLevelSecurityWhereClause('Entity Relationships', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
5572
|
-
|
|
5650
|
+
const sSQL = 'SELECT * FROM [admin].[vwEntityRelationships]' + this.getRowLevelSecurityWhereClause('Entity Relationships', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
5651
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Entity Relationships', await dataSource.query(sSQL));
|
|
5652
|
+
return result;
|
|
5573
5653
|
}
|
|
5574
5654
|
async CreateEntityRelationship(input, { dataSource, userPayload }, pubSub) {
|
|
5575
5655
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -5587,11 +5667,9 @@ let EntityRelationshipResolver = class EntityRelationshipResolver extends server
|
|
|
5587
5667
|
return null;
|
|
5588
5668
|
}
|
|
5589
5669
|
async BeforeCreate(dataSource, input) {
|
|
5590
|
-
const i = input, d = dataSource;
|
|
5591
5670
|
return true;
|
|
5592
5671
|
}
|
|
5593
5672
|
async AfterCreate(dataSource, input) {
|
|
5594
|
-
const i = input, d = dataSource;
|
|
5595
5673
|
}
|
|
5596
5674
|
async UpdateEntityRelationship(input, { dataSource, userPayload }, pubSub) {
|
|
5597
5675
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -5618,9 +5696,10 @@ let EntityRelationshipResolver = class EntityRelationshipResolver extends server
|
|
|
5618
5696
|
if (await this.BeforeDelete(dataSource, ID)) {
|
|
5619
5697
|
const entityObject = await new core_1.Metadata().GetEntityObject('Entity Relationships', this.GetUserFromPayload(userPayload));
|
|
5620
5698
|
await entityObject.Load(ID);
|
|
5699
|
+
const returnValue = entityObject.GetAll();
|
|
5621
5700
|
if (await entityObject.Delete()) {
|
|
5622
5701
|
await this.AfterDelete(dataSource, ID);
|
|
5623
|
-
return
|
|
5702
|
+
return returnValue;
|
|
5624
5703
|
}
|
|
5625
5704
|
else
|
|
5626
5705
|
return null;
|
|
@@ -5678,7 +5757,7 @@ __decorate([
|
|
|
5678
5757
|
__param(1, (0, server_1.PubSub)()),
|
|
5679
5758
|
__metadata("design:type", Function),
|
|
5680
5759
|
__metadata("design:paramtypes", [Object, server_1.PubSubEngine]),
|
|
5681
|
-
__metadata("design:returntype",
|
|
5760
|
+
__metadata("design:returntype", Promise)
|
|
5682
5761
|
], EntityRelationshipResolver.prototype, "AllEntityRelationships", null);
|
|
5683
5762
|
__decorate([
|
|
5684
5763
|
(0, server_1.Mutation)(() => EntityRelationship_),
|
|
@@ -5699,7 +5778,7 @@ __decorate([
|
|
|
5699
5778
|
__metadata("design:returntype", Promise)
|
|
5700
5779
|
], EntityRelationshipResolver.prototype, "UpdateEntityRelationship", null);
|
|
5701
5780
|
__decorate([
|
|
5702
|
-
(0, server_1.Mutation)(() =>
|
|
5781
|
+
(0, server_1.Mutation)(() => EntityRelationship_),
|
|
5703
5782
|
__param(0, (0, server_1.Arg)('ID', () => server_1.Int)),
|
|
5704
5783
|
__param(1, (0, server_1.Ctx)()),
|
|
5705
5784
|
__param(2, (0, server_1.PubSub)()),
|
|
@@ -5859,8 +5938,9 @@ let UserRecordLogResolver = class UserRecordLogResolver extends server_1.Resolve
|
|
|
5859
5938
|
}
|
|
5860
5939
|
async UserRecordLog(ID, { dataSource, userPayload }, pubSub) {
|
|
5861
5940
|
this.CheckUserReadPermissions('User Record Logs', userPayload);
|
|
5862
|
-
const sSQL = `SELECT * FROM [admin].vwUserRecordLogs WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('User Record Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5863
|
-
|
|
5941
|
+
const sSQL = `SELECT * FROM [admin].[vwUserRecordLogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Record Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5942
|
+
const result = this.MapFieldNamesToCodeNames('User Record Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
5943
|
+
return result;
|
|
5864
5944
|
}
|
|
5865
5945
|
async UpdateUserRecordLog(input, { dataSource, userPayload }, pubSub) {
|
|
5866
5946
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -6252,23 +6332,27 @@ let UserViewResolverBase = class UserViewResolverBase extends server_1.ResolverB
|
|
|
6252
6332
|
}
|
|
6253
6333
|
async UserView(ID, { dataSource, userPayload }, pubSub) {
|
|
6254
6334
|
this.CheckUserReadPermissions('User Views', userPayload);
|
|
6255
|
-
const sSQL = `SELECT * FROM [admin].vwUserViews WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6256
|
-
|
|
6335
|
+
const sSQL = `SELECT * FROM [admin].[vwUserViews] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6336
|
+
const result = this.MapFieldNamesToCodeNames('User Views', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
6337
|
+
return result;
|
|
6257
6338
|
}
|
|
6258
|
-
AllUserViews({ dataSource, userPayload }, pubSub) {
|
|
6339
|
+
async AllUserViews({ dataSource, userPayload }, pubSub) {
|
|
6259
6340
|
this.CheckUserReadPermissions('User Views', userPayload);
|
|
6260
|
-
const sSQL = 'SELECT * FROM [admin].vwUserViews' + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
6261
|
-
|
|
6341
|
+
const sSQL = 'SELECT * FROM [admin].[vwUserViews]' + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
6342
|
+
const result = this.ArrayMapFieldNamesToCodeNames('User Views', await dataSource.query(sSQL));
|
|
6343
|
+
return result;
|
|
6262
6344
|
}
|
|
6263
6345
|
async EntityRelationshipsArray(userview_, { dataSource, userPayload }, pubSub) {
|
|
6264
6346
|
this.CheckUserReadPermissions('Entity Relationships', userPayload);
|
|
6265
|
-
const sSQL = `SELECT * FROM [admin].[vwEntityRelationships] WHERE DisplayUserViewGUID=${userview_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Relationships', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6266
|
-
|
|
6347
|
+
const sSQL = `SELECT * FROM [admin].[vwEntityRelationships] WHERE [DisplayUserViewGUID]=${userview_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Relationships', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6348
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Entity Relationships', await dataSource.query(sSQL));
|
|
6349
|
+
return result;
|
|
6267
6350
|
}
|
|
6268
6351
|
async UserViewRunsArray(userview_, { dataSource, userPayload }, pubSub) {
|
|
6269
6352
|
this.CheckUserReadPermissions('User View Runs', userPayload);
|
|
6270
|
-
const sSQL = `SELECT * FROM [admin].[vwUserViewRuns] WHERE UserViewID=${userview_.ID} ` + this.getRowLevelSecurityWhereClause('User View Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6271
|
-
|
|
6353
|
+
const sSQL = `SELECT * FROM [admin].[vwUserViewRuns] WHERE [UserViewID]=${userview_.ID} ` + this.getRowLevelSecurityWhereClause('User View Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6354
|
+
const result = this.ArrayMapFieldNamesToCodeNames('User View Runs', await dataSource.query(sSQL));
|
|
6355
|
+
return result;
|
|
6272
6356
|
}
|
|
6273
6357
|
async CreateUserView(input, { dataSource, userPayload }, pubSub) {
|
|
6274
6358
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -6286,11 +6370,9 @@ let UserViewResolverBase = class UserViewResolverBase extends server_1.ResolverB
|
|
|
6286
6370
|
return null;
|
|
6287
6371
|
}
|
|
6288
6372
|
async BeforeCreate(dataSource, input) {
|
|
6289
|
-
const i = input, d = dataSource;
|
|
6290
6373
|
return true;
|
|
6291
6374
|
}
|
|
6292
6375
|
async AfterCreate(dataSource, input) {
|
|
6293
|
-
const i = input, d = dataSource;
|
|
6294
6376
|
}
|
|
6295
6377
|
async UpdateUserView(input, { dataSource, userPayload }, pubSub) {
|
|
6296
6378
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -6318,9 +6400,10 @@ let UserViewResolverBase = class UserViewResolverBase extends server_1.ResolverB
|
|
|
6318
6400
|
if (await this.BeforeDelete(dataSource, ID)) {
|
|
6319
6401
|
const entityObject = await new core_1.Metadata().GetEntityObject('User Views', this.GetUserFromPayload(userPayload));
|
|
6320
6402
|
await entityObject.Load(ID);
|
|
6403
|
+
const returnValue = entityObject.GetAll();
|
|
6321
6404
|
if (await entityObject.Delete()) {
|
|
6322
6405
|
await this.AfterDelete(dataSource, ID);
|
|
6323
|
-
return
|
|
6406
|
+
return returnValue;
|
|
6324
6407
|
}
|
|
6325
6408
|
else
|
|
6326
6409
|
return null;
|
|
@@ -6378,7 +6461,7 @@ __decorate([
|
|
|
6378
6461
|
__param(1, (0, server_1.PubSub)()),
|
|
6379
6462
|
__metadata("design:type", Function),
|
|
6380
6463
|
__metadata("design:paramtypes", [Object, server_1.PubSubEngine]),
|
|
6381
|
-
__metadata("design:returntype",
|
|
6464
|
+
__metadata("design:returntype", Promise)
|
|
6382
6465
|
], UserViewResolverBase.prototype, "AllUserViews", null);
|
|
6383
6466
|
__decorate([
|
|
6384
6467
|
(0, server_1.FieldResolver)(() => [EntityRelationship_]),
|
|
@@ -6417,7 +6500,7 @@ __decorate([
|
|
|
6417
6500
|
__metadata("design:returntype", Promise)
|
|
6418
6501
|
], UserViewResolverBase.prototype, "UpdateUserView", null);
|
|
6419
6502
|
__decorate([
|
|
6420
|
-
(0, server_1.Mutation)(() =>
|
|
6503
|
+
(0, server_1.Mutation)(() => UserView_),
|
|
6421
6504
|
__param(0, (0, server_1.Arg)('ID', () => server_1.Int)),
|
|
6422
6505
|
__param(1, (0, server_1.Ctx)()),
|
|
6423
6506
|
__param(2, (0, server_1.PubSub)()),
|
|
@@ -6563,23 +6646,27 @@ let CompanyIntegrationRunResolver = class CompanyIntegrationRunResolver extends
|
|
|
6563
6646
|
}
|
|
6564
6647
|
async CompanyIntegrationRun(ID, { dataSource, userPayload }, pubSub) {
|
|
6565
6648
|
this.CheckUserReadPermissions('Company Integration Runs', userPayload);
|
|
6566
|
-
const sSQL = `SELECT * FROM [admin].vwCompanyIntegrationRuns WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6567
|
-
|
|
6649
|
+
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRuns] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6650
|
+
const result = this.MapFieldNamesToCodeNames('Company Integration Runs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
6651
|
+
return result;
|
|
6568
6652
|
}
|
|
6569
6653
|
async CompanyIntegrationRunAPILogsArray(companyintegrationrun_, { dataSource, userPayload }, pubSub) {
|
|
6570
6654
|
this.CheckUserReadPermissions('Company Integration Run API Logs', userPayload);
|
|
6571
|
-
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRunAPILogs] WHERE CompanyIntegrationRunID=${companyintegrationrun_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run API Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6572
|
-
|
|
6655
|
+
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRunAPILogs] WHERE [CompanyIntegrationRunID]=${companyintegrationrun_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run API Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6656
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Run API Logs', await dataSource.query(sSQL));
|
|
6657
|
+
return result;
|
|
6573
6658
|
}
|
|
6574
6659
|
async ErrorLogsArray(companyintegrationrun_, { dataSource, userPayload }, pubSub) {
|
|
6575
6660
|
this.CheckUserReadPermissions('Error Logs', userPayload);
|
|
6576
|
-
const sSQL = `SELECT * FROM [admin].[vwErrorLogs] WHERE CompanyIntegrationRunID=${companyintegrationrun_.ID} ` + this.getRowLevelSecurityWhereClause('Error Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6577
|
-
|
|
6661
|
+
const sSQL = `SELECT * FROM [admin].[vwErrorLogs] WHERE [CompanyIntegrationRunID]=${companyintegrationrun_.ID} ` + this.getRowLevelSecurityWhereClause('Error Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6662
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Error Logs', await dataSource.query(sSQL));
|
|
6663
|
+
return result;
|
|
6578
6664
|
}
|
|
6579
6665
|
async CompanyIntegrationRunDetailsArray(companyintegrationrun_, { dataSource, userPayload }, pubSub) {
|
|
6580
6666
|
this.CheckUserReadPermissions('Company Integration Run Details', userPayload);
|
|
6581
|
-
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRunDetails] WHERE CompanyIntegrationRunID=${companyintegrationrun_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6582
|
-
|
|
6667
|
+
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRunDetails] WHERE [CompanyIntegrationRunID]=${companyintegrationrun_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6668
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Run Details', await dataSource.query(sSQL));
|
|
6669
|
+
return result;
|
|
6583
6670
|
}
|
|
6584
6671
|
async UpdateCompanyIntegrationRun(input, { dataSource, userPayload }, pubSub) {
|
|
6585
6672
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -6816,13 +6903,15 @@ let CompanyIntegrationRunDetailResolver = class CompanyIntegrationRunDetailResol
|
|
|
6816
6903
|
}
|
|
6817
6904
|
async CompanyIntegrationRunDetail(ID, { dataSource, userPayload }, pubSub) {
|
|
6818
6905
|
this.CheckUserReadPermissions('Company Integration Run Details', userPayload);
|
|
6819
|
-
const sSQL = `SELECT * FROM [admin].vwCompanyIntegrationRunDetails WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6820
|
-
|
|
6906
|
+
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRunDetails] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6907
|
+
const result = this.MapFieldNamesToCodeNames('Company Integration Run Details', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
6908
|
+
return result;
|
|
6821
6909
|
}
|
|
6822
6910
|
async ErrorLogsArray(companyintegrationrundetail_, { dataSource, userPayload }, pubSub) {
|
|
6823
6911
|
this.CheckUserReadPermissions('Error Logs', userPayload);
|
|
6824
|
-
const sSQL = `SELECT * FROM [admin].[vwErrorLogs] WHERE CompanyIntegrationRunDetailID=${companyintegrationrundetail_.ID} ` + this.getRowLevelSecurityWhereClause('Error Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6825
|
-
|
|
6912
|
+
const sSQL = `SELECT * FROM [admin].[vwErrorLogs] WHERE [CompanyIntegrationRunDetailID]=${companyintegrationrundetail_.ID} ` + this.getRowLevelSecurityWhereClause('Error Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6913
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Error Logs', await dataSource.query(sSQL));
|
|
6914
|
+
return result;
|
|
6826
6915
|
}
|
|
6827
6916
|
async UpdateCompanyIntegrationRunDetail(input, { dataSource, userPayload }, pubSub) {
|
|
6828
6917
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -7044,8 +7133,9 @@ let ErrorLogResolver = class ErrorLogResolver extends server_1.ResolverBase {
|
|
|
7044
7133
|
}
|
|
7045
7134
|
async ErrorLog(ID, { dataSource, userPayload }, pubSub) {
|
|
7046
7135
|
this.CheckUserReadPermissions('Error Logs', userPayload);
|
|
7047
|
-
const sSQL = `SELECT * FROM [admin].vwErrorLogs WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Error Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7048
|
-
|
|
7136
|
+
const sSQL = `SELECT * FROM [admin].[vwErrorLogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Error Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7137
|
+
const result = this.MapFieldNamesToCodeNames('Error Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
7138
|
+
return result;
|
|
7049
7139
|
}
|
|
7050
7140
|
async UpdateErrorLog(input, { dataSource, userPayload }, pubSub) {
|
|
7051
7141
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -7221,23 +7311,27 @@ let ApplicationResolver = class ApplicationResolver extends server_1.ResolverBas
|
|
|
7221
7311
|
}
|
|
7222
7312
|
async Application(ID, { dataSource, userPayload }, pubSub) {
|
|
7223
7313
|
this.CheckUserReadPermissions('Applications', userPayload);
|
|
7224
|
-
const sSQL = `SELECT * FROM [admin].vwApplications WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Applications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7225
|
-
|
|
7314
|
+
const sSQL = `SELECT * FROM [admin].[vwApplications] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Applications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7315
|
+
const result = this.MapFieldNamesToCodeNames('Applications', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
7316
|
+
return result;
|
|
7226
7317
|
}
|
|
7227
|
-
AllApplications({ dataSource, userPayload }, pubSub) {
|
|
7318
|
+
async AllApplications({ dataSource, userPayload }, pubSub) {
|
|
7228
7319
|
this.CheckUserReadPermissions('Applications', userPayload);
|
|
7229
|
-
const sSQL = 'SELECT * FROM [admin].vwApplications' + this.getRowLevelSecurityWhereClause('Applications', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
7230
|
-
|
|
7320
|
+
const sSQL = 'SELECT * FROM [admin].[vwApplications]' + this.getRowLevelSecurityWhereClause('Applications', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
7321
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Applications', await dataSource.query(sSQL));
|
|
7322
|
+
return result;
|
|
7231
7323
|
}
|
|
7232
7324
|
async ApplicationEntitiesArray(application_, { dataSource, userPayload }, pubSub) {
|
|
7233
7325
|
this.CheckUserReadPermissions('Application Entities', userPayload);
|
|
7234
|
-
const sSQL = `SELECT * FROM [admin].[vwApplicationEntities] WHERE ApplicationID=${application_.ID} ` + this.getRowLevelSecurityWhereClause('Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7235
|
-
|
|
7326
|
+
const sSQL = `SELECT * FROM [admin].[vwApplicationEntities] WHERE [ApplicationID]=${application_.ID} ` + this.getRowLevelSecurityWhereClause('Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7327
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Application Entities', await dataSource.query(sSQL));
|
|
7328
|
+
return result;
|
|
7236
7329
|
}
|
|
7237
7330
|
async UserApplicationsArray(application_, { dataSource, userPayload }, pubSub) {
|
|
7238
7331
|
this.CheckUserReadPermissions('User Applications', userPayload);
|
|
7239
|
-
const sSQL = `SELECT * FROM [admin].[vwUserApplications] WHERE ApplicationID=${application_.ID} ` + this.getRowLevelSecurityWhereClause('User Applications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7240
|
-
|
|
7332
|
+
const sSQL = `SELECT * FROM [admin].[vwUserApplications] WHERE [ApplicationID]=${application_.ID} ` + this.getRowLevelSecurityWhereClause('User Applications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7333
|
+
const result = this.ArrayMapFieldNamesToCodeNames('User Applications', await dataSource.query(sSQL));
|
|
7334
|
+
return result;
|
|
7241
7335
|
}
|
|
7242
7336
|
async UpdateApplication(input, { dataSource, userPayload }, pubSub) {
|
|
7243
7337
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -7303,7 +7397,7 @@ __decorate([
|
|
|
7303
7397
|
__param(1, (0, server_1.PubSub)()),
|
|
7304
7398
|
__metadata("design:type", Function),
|
|
7305
7399
|
__metadata("design:paramtypes", [Object, server_1.PubSubEngine]),
|
|
7306
|
-
__metadata("design:returntype",
|
|
7400
|
+
__metadata("design:returntype", Promise)
|
|
7307
7401
|
], ApplicationResolver.prototype, "AllApplications", null);
|
|
7308
7402
|
__decorate([
|
|
7309
7403
|
(0, server_1.FieldResolver)(() => [ApplicationEntity_]),
|
|
@@ -7391,12 +7485,12 @@ __decorate([
|
|
|
7391
7485
|
], ApplicationEntity_.prototype, "EntityCodeName", void 0);
|
|
7392
7486
|
__decorate([
|
|
7393
7487
|
(0, server_1.Field)({ nullable: true }),
|
|
7394
|
-
(0, class_validator_1.MaxLength)(
|
|
7488
|
+
(0, class_validator_1.MaxLength)(8000),
|
|
7395
7489
|
__metadata("design:type", String)
|
|
7396
7490
|
], ApplicationEntity_.prototype, "EntityClassName", void 0);
|
|
7397
7491
|
__decorate([
|
|
7398
7492
|
(0, server_1.Field)({ nullable: true }),
|
|
7399
|
-
(0, class_validator_1.MaxLength)(
|
|
7493
|
+
(0, class_validator_1.MaxLength)(8000),
|
|
7400
7494
|
__metadata("design:type", String)
|
|
7401
7495
|
], ApplicationEntity_.prototype, "EntityBaseTableCodeName", void 0);
|
|
7402
7496
|
ApplicationEntity_ = __decorate([
|
|
@@ -7502,8 +7596,9 @@ let ApplicationEntityResolver = class ApplicationEntityResolver extends server_1
|
|
|
7502
7596
|
}
|
|
7503
7597
|
async ApplicationEntity(ID, { dataSource, userPayload }, pubSub) {
|
|
7504
7598
|
this.CheckUserReadPermissions('Application Entities', userPayload);
|
|
7505
|
-
const sSQL = `SELECT * FROM [admin].vwApplicationEntities WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7506
|
-
|
|
7599
|
+
const sSQL = `SELECT * FROM [admin].[vwApplicationEntities] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7600
|
+
const result = this.MapFieldNamesToCodeNames('Application Entities', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
7601
|
+
return result;
|
|
7507
7602
|
}
|
|
7508
7603
|
async CreateApplicationEntity(input, { dataSource, userPayload }, pubSub) {
|
|
7509
7604
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -7521,11 +7616,9 @@ let ApplicationEntityResolver = class ApplicationEntityResolver extends server_1
|
|
|
7521
7616
|
return null;
|
|
7522
7617
|
}
|
|
7523
7618
|
async BeforeCreate(dataSource, input) {
|
|
7524
|
-
const i = input, d = dataSource;
|
|
7525
7619
|
return true;
|
|
7526
7620
|
}
|
|
7527
7621
|
async AfterCreate(dataSource, input) {
|
|
7528
|
-
const i = input, d = dataSource;
|
|
7529
7622
|
}
|
|
7530
7623
|
async UpdateApplicationEntity(input, { dataSource, userPayload }, pubSub) {
|
|
7531
7624
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -7552,9 +7645,10 @@ let ApplicationEntityResolver = class ApplicationEntityResolver extends server_1
|
|
|
7552
7645
|
if (await this.BeforeDelete(dataSource, ID)) {
|
|
7553
7646
|
const entityObject = await new core_1.Metadata().GetEntityObject('Application Entities', this.GetUserFromPayload(userPayload));
|
|
7554
7647
|
await entityObject.Load(ID);
|
|
7648
|
+
const returnValue = entityObject.GetAll();
|
|
7555
7649
|
if (await entityObject.Delete()) {
|
|
7556
7650
|
await this.AfterDelete(dataSource, ID);
|
|
7557
|
-
return
|
|
7651
|
+
return returnValue;
|
|
7558
7652
|
}
|
|
7559
7653
|
else
|
|
7560
7654
|
return null;
|
|
@@ -7625,7 +7719,7 @@ __decorate([
|
|
|
7625
7719
|
__metadata("design:returntype", Promise)
|
|
7626
7720
|
], ApplicationEntityResolver.prototype, "UpdateApplicationEntity", null);
|
|
7627
7721
|
__decorate([
|
|
7628
|
-
(0, server_1.Mutation)(() =>
|
|
7722
|
+
(0, server_1.Mutation)(() => ApplicationEntity_),
|
|
7629
7723
|
__param(0, (0, server_1.Arg)('ID', () => server_1.Int)),
|
|
7630
7724
|
__param(1, (0, server_1.Ctx)()),
|
|
7631
7725
|
__param(2, (0, server_1.PubSub)()),
|
|
@@ -7875,13 +7969,15 @@ let EntityPermissionResolver = class EntityPermissionResolver extends server_1.R
|
|
|
7875
7969
|
}
|
|
7876
7970
|
async EntityPermission(ID, { dataSource, userPayload }, pubSub) {
|
|
7877
7971
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
7878
|
-
const sSQL = `SELECT * FROM [admin].vwEntityPermissions WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7879
|
-
|
|
7972
|
+
const sSQL = `SELECT * FROM [admin].[vwEntityPermissions] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7973
|
+
const result = this.MapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
7974
|
+
return result;
|
|
7880
7975
|
}
|
|
7881
|
-
AllEntityPermissions({ dataSource, userPayload }, pubSub) {
|
|
7976
|
+
async AllEntityPermissions({ dataSource, userPayload }, pubSub) {
|
|
7882
7977
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
7883
|
-
const sSQL = 'SELECT * FROM [admin].vwEntityPermissions' + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
7884
|
-
|
|
7978
|
+
const sSQL = 'SELECT * FROM [admin].[vwEntityPermissions]' + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
7979
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL));
|
|
7980
|
+
return result;
|
|
7885
7981
|
}
|
|
7886
7982
|
async CreateEntityPermission(input, { dataSource, userPayload }, pubSub) {
|
|
7887
7983
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -7899,11 +7995,9 @@ let EntityPermissionResolver = class EntityPermissionResolver extends server_1.R
|
|
|
7899
7995
|
return null;
|
|
7900
7996
|
}
|
|
7901
7997
|
async BeforeCreate(dataSource, input) {
|
|
7902
|
-
const i = input, d = dataSource;
|
|
7903
7998
|
return true;
|
|
7904
7999
|
}
|
|
7905
8000
|
async AfterCreate(dataSource, input) {
|
|
7906
|
-
const i = input, d = dataSource;
|
|
7907
8001
|
}
|
|
7908
8002
|
async UpdateEntityPermission(input, { dataSource, userPayload }, pubSub) {
|
|
7909
8003
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -7930,9 +8024,10 @@ let EntityPermissionResolver = class EntityPermissionResolver extends server_1.R
|
|
|
7930
8024
|
if (await this.BeforeDelete(dataSource, ID)) {
|
|
7931
8025
|
const entityObject = await new core_1.Metadata().GetEntityObject('Entity Permissions', this.GetUserFromPayload(userPayload));
|
|
7932
8026
|
await entityObject.Load(ID);
|
|
8027
|
+
const returnValue = entityObject.GetAll();
|
|
7933
8028
|
if (await entityObject.Delete()) {
|
|
7934
8029
|
await this.AfterDelete(dataSource, ID);
|
|
7935
|
-
return
|
|
8030
|
+
return returnValue;
|
|
7936
8031
|
}
|
|
7937
8032
|
else
|
|
7938
8033
|
return null;
|
|
@@ -7990,7 +8085,7 @@ __decorate([
|
|
|
7990
8085
|
__param(1, (0, server_1.PubSub)()),
|
|
7991
8086
|
__metadata("design:type", Function),
|
|
7992
8087
|
__metadata("design:paramtypes", [Object, server_1.PubSubEngine]),
|
|
7993
|
-
__metadata("design:returntype",
|
|
8088
|
+
__metadata("design:returntype", Promise)
|
|
7994
8089
|
], EntityPermissionResolver.prototype, "AllEntityPermissions", null);
|
|
7995
8090
|
__decorate([
|
|
7996
8091
|
(0, server_1.Mutation)(() => EntityPermission_),
|
|
@@ -8011,7 +8106,7 @@ __decorate([
|
|
|
8011
8106
|
__metadata("design:returntype", Promise)
|
|
8012
8107
|
], EntityPermissionResolver.prototype, "UpdateEntityPermission", null);
|
|
8013
8108
|
__decorate([
|
|
8014
|
-
(0, server_1.Mutation)(() =>
|
|
8109
|
+
(0, server_1.Mutation)(() => EntityPermission_),
|
|
8015
8110
|
__param(0, (0, server_1.Arg)('ID', () => server_1.Int)),
|
|
8016
8111
|
__param(1, (0, server_1.Ctx)()),
|
|
8017
8112
|
__param(2, (0, server_1.PubSub)()),
|
|
@@ -8151,8 +8246,9 @@ let UserApplicationEntityResolver = class UserApplicationEntityResolver extends
|
|
|
8151
8246
|
}
|
|
8152
8247
|
async UserApplicationEntity(ID, { dataSource, userPayload }, pubSub) {
|
|
8153
8248
|
this.CheckUserReadPermissions('User Application Entities', userPayload);
|
|
8154
|
-
const sSQL = `SELECT * FROM [admin].vwUserApplicationEntities WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('User Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8155
|
-
|
|
8249
|
+
const sSQL = `SELECT * FROM [admin].[vwUserApplicationEntities] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8250
|
+
const result = this.MapFieldNamesToCodeNames('User Application Entities', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
8251
|
+
return result;
|
|
8156
8252
|
}
|
|
8157
8253
|
async CreateUserApplicationEntity(input, { dataSource, userPayload }, pubSub) {
|
|
8158
8254
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -8170,11 +8266,9 @@ let UserApplicationEntityResolver = class UserApplicationEntityResolver extends
|
|
|
8170
8266
|
return null;
|
|
8171
8267
|
}
|
|
8172
8268
|
async BeforeCreate(dataSource, input) {
|
|
8173
|
-
const i = input, d = dataSource;
|
|
8174
8269
|
return true;
|
|
8175
8270
|
}
|
|
8176
8271
|
async AfterCreate(dataSource, input) {
|
|
8177
|
-
const i = input, d = dataSource;
|
|
8178
8272
|
}
|
|
8179
8273
|
async UpdateUserApplicationEntity(input, { dataSource, userPayload }, pubSub) {
|
|
8180
8274
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -8201,9 +8295,10 @@ let UserApplicationEntityResolver = class UserApplicationEntityResolver extends
|
|
|
8201
8295
|
if (await this.BeforeDelete(dataSource, ID)) {
|
|
8202
8296
|
const entityObject = await new core_1.Metadata().GetEntityObject('User Application Entities', this.GetUserFromPayload(userPayload));
|
|
8203
8297
|
await entityObject.Load(ID);
|
|
8298
|
+
const returnValue = entityObject.GetAll();
|
|
8204
8299
|
if (await entityObject.Delete()) {
|
|
8205
8300
|
await this.AfterDelete(dataSource, ID);
|
|
8206
|
-
return
|
|
8301
|
+
return returnValue;
|
|
8207
8302
|
}
|
|
8208
8303
|
else
|
|
8209
8304
|
return null;
|
|
@@ -8274,7 +8369,7 @@ __decorate([
|
|
|
8274
8369
|
__metadata("design:returntype", Promise)
|
|
8275
8370
|
], UserApplicationEntityResolver.prototype, "UpdateUserApplicationEntity", null);
|
|
8276
8371
|
__decorate([
|
|
8277
|
-
(0, server_1.Mutation)(() =>
|
|
8372
|
+
(0, server_1.Mutation)(() => UserApplicationEntity_),
|
|
8278
8373
|
__param(0, (0, server_1.Arg)('ID', () => server_1.Int)),
|
|
8279
8374
|
__param(1, (0, server_1.Ctx)()),
|
|
8280
8375
|
__param(2, (0, server_1.PubSub)()),
|
|
@@ -8399,13 +8494,15 @@ let UserApplicationResolver = class UserApplicationResolver extends server_1.Res
|
|
|
8399
8494
|
}
|
|
8400
8495
|
async UserApplication(ID, { dataSource, userPayload }, pubSub) {
|
|
8401
8496
|
this.CheckUserReadPermissions('User Applications', userPayload);
|
|
8402
|
-
const sSQL = `SELECT * FROM [admin].vwUserApplications WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('User Applications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8403
|
-
|
|
8497
|
+
const sSQL = `SELECT * FROM [admin].[vwUserApplications] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Applications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8498
|
+
const result = this.MapFieldNamesToCodeNames('User Applications', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
8499
|
+
return result;
|
|
8404
8500
|
}
|
|
8405
8501
|
async UserApplicationEntitiesArray(userapplication_, { dataSource, userPayload }, pubSub) {
|
|
8406
8502
|
this.CheckUserReadPermissions('User Application Entities', userPayload);
|
|
8407
|
-
const sSQL = `SELECT * FROM [admin].[vwUserApplicationEntities] WHERE UserApplicationID=${userapplication_.ID} ` + this.getRowLevelSecurityWhereClause('User Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8408
|
-
|
|
8503
|
+
const sSQL = `SELECT * FROM [admin].[vwUserApplicationEntities] WHERE [UserApplicationID]=${userapplication_.ID} ` + this.getRowLevelSecurityWhereClause('User Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8504
|
+
const result = this.ArrayMapFieldNamesToCodeNames('User Application Entities', await dataSource.query(sSQL));
|
|
8505
|
+
return result;
|
|
8409
8506
|
}
|
|
8410
8507
|
async UpdateUserApplication(input, { dataSource, userPayload }, pubSub) {
|
|
8411
8508
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -8604,8 +8701,9 @@ let CompanyIntegrationRunAPILogResolver = class CompanyIntegrationRunAPILogResol
|
|
|
8604
8701
|
}
|
|
8605
8702
|
async CompanyIntegrationRunAPILog(ID, { dataSource, userPayload }, pubSub) {
|
|
8606
8703
|
this.CheckUserReadPermissions('Company Integration Run API Logs', userPayload);
|
|
8607
|
-
const sSQL = `SELECT * FROM [admin].vwCompanyIntegrationRunAPILogs WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run API Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8608
|
-
|
|
8704
|
+
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRunAPILogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run API Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8705
|
+
const result = this.MapFieldNamesToCodeNames('Company Integration Run API Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
8706
|
+
return result;
|
|
8609
8707
|
}
|
|
8610
8708
|
async UpdateCompanyIntegrationRunAPILog(input, { dataSource, userPayload }, pubSub) {
|
|
8611
8709
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -8853,13 +8951,15 @@ let ListResolver = class ListResolver extends server_1.ResolverBase {
|
|
|
8853
8951
|
}
|
|
8854
8952
|
async List(ID, { dataSource, userPayload }, pubSub) {
|
|
8855
8953
|
this.CheckUserReadPermissions('Lists', userPayload);
|
|
8856
|
-
const sSQL = `SELECT * FROM [admin].vwLists WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Lists', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8857
|
-
|
|
8954
|
+
const sSQL = `SELECT * FROM [admin].[vwLists] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Lists', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8955
|
+
const result = this.MapFieldNamesToCodeNames('Lists', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
8956
|
+
return result;
|
|
8858
8957
|
}
|
|
8859
8958
|
async ListDetailsArray(list_, { dataSource, userPayload }, pubSub) {
|
|
8860
8959
|
this.CheckUserReadPermissions('List Details', userPayload);
|
|
8861
|
-
const sSQL = `SELECT * FROM [admin].[vwListDetails] WHERE ListID=${list_.ID} ` + this.getRowLevelSecurityWhereClause('List Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8862
|
-
|
|
8960
|
+
const sSQL = `SELECT * FROM [admin].[vwListDetails] WHERE [ListID]=${list_.ID} ` + this.getRowLevelSecurityWhereClause('List Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8961
|
+
const result = this.ArrayMapFieldNamesToCodeNames('List Details', await dataSource.query(sSQL));
|
|
8962
|
+
return result;
|
|
8863
8963
|
}
|
|
8864
8964
|
async CreateList(input, { dataSource, userPayload }, pubSub) {
|
|
8865
8965
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -8877,11 +8977,9 @@ let ListResolver = class ListResolver extends server_1.ResolverBase {
|
|
|
8877
8977
|
return null;
|
|
8878
8978
|
}
|
|
8879
8979
|
async BeforeCreate(dataSource, input) {
|
|
8880
|
-
const i = input, d = dataSource;
|
|
8881
8980
|
return true;
|
|
8882
8981
|
}
|
|
8883
8982
|
async AfterCreate(dataSource, input) {
|
|
8884
|
-
const i = input, d = dataSource;
|
|
8885
8983
|
}
|
|
8886
8984
|
async UpdateList(input, { dataSource, userPayload }, pubSub) {
|
|
8887
8985
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -8908,9 +9006,10 @@ let ListResolver = class ListResolver extends server_1.ResolverBase {
|
|
|
8908
9006
|
if (await this.BeforeDelete(dataSource, ID)) {
|
|
8909
9007
|
const entityObject = await new core_1.Metadata().GetEntityObject('Lists', this.GetUserFromPayload(userPayload));
|
|
8910
9008
|
await entityObject.Load(ID);
|
|
9009
|
+
const returnValue = entityObject.GetAll();
|
|
8911
9010
|
if (await entityObject.Delete()) {
|
|
8912
9011
|
await this.AfterDelete(dataSource, ID);
|
|
8913
|
-
return
|
|
9012
|
+
return returnValue;
|
|
8914
9013
|
}
|
|
8915
9014
|
else
|
|
8916
9015
|
return null;
|
|
@@ -8990,7 +9089,7 @@ __decorate([
|
|
|
8990
9089
|
__metadata("design:returntype", Promise)
|
|
8991
9090
|
], ListResolver.prototype, "UpdateList", null);
|
|
8992
9091
|
__decorate([
|
|
8993
|
-
(0, server_1.Mutation)(() =>
|
|
9092
|
+
(0, server_1.Mutation)(() => List_),
|
|
8994
9093
|
__param(0, (0, server_1.Arg)('ID', () => server_1.Int)),
|
|
8995
9094
|
__param(1, (0, server_1.Ctx)()),
|
|
8996
9095
|
__param(2, (0, server_1.PubSub)()),
|
|
@@ -9116,8 +9215,9 @@ let ListDetailResolver = class ListDetailResolver extends server_1.ResolverBase
|
|
|
9116
9215
|
}
|
|
9117
9216
|
async ListDetail(ID, { dataSource, userPayload }, pubSub) {
|
|
9118
9217
|
this.CheckUserReadPermissions('List Details', userPayload);
|
|
9119
|
-
const sSQL = `SELECT * FROM [admin].vwListDetails WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('List Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9120
|
-
|
|
9218
|
+
const sSQL = `SELECT * FROM [admin].[vwListDetails] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('List Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9219
|
+
const result = this.MapFieldNamesToCodeNames('List Details', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
9220
|
+
return result;
|
|
9121
9221
|
}
|
|
9122
9222
|
async CreateListDetail(input, { dataSource, userPayload }, pubSub) {
|
|
9123
9223
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -9135,11 +9235,9 @@ let ListDetailResolver = class ListDetailResolver extends server_1.ResolverBase
|
|
|
9135
9235
|
return null;
|
|
9136
9236
|
}
|
|
9137
9237
|
async BeforeCreate(dataSource, input) {
|
|
9138
|
-
const i = input, d = dataSource;
|
|
9139
9238
|
return true;
|
|
9140
9239
|
}
|
|
9141
9240
|
async AfterCreate(dataSource, input) {
|
|
9142
|
-
const i = input, d = dataSource;
|
|
9143
9241
|
}
|
|
9144
9242
|
async UpdateListDetail(input, { dataSource, userPayload }, pubSub) {
|
|
9145
9243
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -9166,9 +9264,10 @@ let ListDetailResolver = class ListDetailResolver extends server_1.ResolverBase
|
|
|
9166
9264
|
if (await this.BeforeDelete(dataSource, ID)) {
|
|
9167
9265
|
const entityObject = await new core_1.Metadata().GetEntityObject('List Details', this.GetUserFromPayload(userPayload));
|
|
9168
9266
|
await entityObject.Load(ID);
|
|
9267
|
+
const returnValue = entityObject.GetAll();
|
|
9169
9268
|
if (await entityObject.Delete()) {
|
|
9170
9269
|
await this.AfterDelete(dataSource, ID);
|
|
9171
|
-
return
|
|
9270
|
+
return returnValue;
|
|
9172
9271
|
}
|
|
9173
9272
|
else
|
|
9174
9273
|
return null;
|
|
@@ -9239,7 +9338,7 @@ __decorate([
|
|
|
9239
9338
|
__metadata("design:returntype", Promise)
|
|
9240
9339
|
], ListDetailResolver.prototype, "UpdateListDetail", null);
|
|
9241
9340
|
__decorate([
|
|
9242
|
-
(0, server_1.Mutation)(() =>
|
|
9341
|
+
(0, server_1.Mutation)(() => ListDetail_),
|
|
9243
9342
|
__param(0, (0, server_1.Arg)('ID', () => server_1.Int)),
|
|
9244
9343
|
__param(1, (0, server_1.Ctx)()),
|
|
9245
9344
|
__param(2, (0, server_1.PubSub)()),
|
|
@@ -9379,13 +9478,15 @@ let UserViewRunResolver = class UserViewRunResolver extends server_1.ResolverBas
|
|
|
9379
9478
|
}
|
|
9380
9479
|
async UserViewRun(ID, { dataSource, userPayload }, pubSub) {
|
|
9381
9480
|
this.CheckUserReadPermissions('User View Runs', userPayload);
|
|
9382
|
-
const sSQL = `SELECT * FROM [admin].vwUserViewRuns WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('User View Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9383
|
-
|
|
9481
|
+
const sSQL = `SELECT * FROM [admin].[vwUserViewRuns] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User View Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9482
|
+
const result = this.MapFieldNamesToCodeNames('User View Runs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
9483
|
+
return result;
|
|
9384
9484
|
}
|
|
9385
9485
|
async UserViewRunDetailsArray(userviewrun_, { dataSource, userPayload }, pubSub) {
|
|
9386
9486
|
this.CheckUserReadPermissions('User View Run Details', userPayload);
|
|
9387
|
-
const sSQL = `SELECT * FROM [admin].[vwUserViewRunDetails] WHERE UserViewRunID=${userviewrun_.ID} ` + this.getRowLevelSecurityWhereClause('User View Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9388
|
-
|
|
9487
|
+
const sSQL = `SELECT * FROM [admin].[vwUserViewRunDetails] WHERE [UserViewRunID]=${userviewrun_.ID} ` + this.getRowLevelSecurityWhereClause('User View Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9488
|
+
const result = this.ArrayMapFieldNamesToCodeNames('User View Run Details', await dataSource.query(sSQL));
|
|
9489
|
+
return result;
|
|
9389
9490
|
}
|
|
9390
9491
|
async CreateUserViewRun(input, { dataSource, userPayload }, pubSub) {
|
|
9391
9492
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -9403,11 +9504,9 @@ let UserViewRunResolver = class UserViewRunResolver extends server_1.ResolverBas
|
|
|
9403
9504
|
return null;
|
|
9404
9505
|
}
|
|
9405
9506
|
async BeforeCreate(dataSource, input) {
|
|
9406
|
-
const i = input, d = dataSource;
|
|
9407
9507
|
return true;
|
|
9408
9508
|
}
|
|
9409
9509
|
async AfterCreate(dataSource, input) {
|
|
9410
|
-
const i = input, d = dataSource;
|
|
9411
9510
|
}
|
|
9412
9511
|
async UpdateUserViewRun(input, { dataSource, userPayload }, pubSub) {
|
|
9413
9512
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -9608,8 +9707,9 @@ let UserViewRunDetailResolver = class UserViewRunDetailResolver extends server_1
|
|
|
9608
9707
|
}
|
|
9609
9708
|
async UserViewRunDetail(ID, { dataSource, userPayload }, pubSub) {
|
|
9610
9709
|
this.CheckUserReadPermissions('User View Run Details', userPayload);
|
|
9611
|
-
const sSQL = `SELECT * FROM [admin].vwUserViewRunDetails WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('User View Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9612
|
-
|
|
9710
|
+
const sSQL = `SELECT * FROM [admin].[vwUserViewRunDetails] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User View Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9711
|
+
const result = this.MapFieldNamesToCodeNames('User View Run Details', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
9712
|
+
return result;
|
|
9613
9713
|
}
|
|
9614
9714
|
async CreateUserViewRunDetail(input, { dataSource, userPayload }, pubSub) {
|
|
9615
9715
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -9627,11 +9727,9 @@ let UserViewRunDetailResolver = class UserViewRunDetailResolver extends server_1
|
|
|
9627
9727
|
return null;
|
|
9628
9728
|
}
|
|
9629
9729
|
async BeforeCreate(dataSource, input) {
|
|
9630
|
-
const i = input, d = dataSource;
|
|
9631
9730
|
return true;
|
|
9632
9731
|
}
|
|
9633
9732
|
async AfterCreate(dataSource, input) {
|
|
9634
|
-
const i = input, d = dataSource;
|
|
9635
9733
|
}
|
|
9636
9734
|
async UpdateUserViewRunDetail(input, { dataSource, userPayload }, pubSub) {
|
|
9637
9735
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -9843,8 +9941,9 @@ let WorkflowRunResolver = class WorkflowRunResolver extends server_1.ResolverBas
|
|
|
9843
9941
|
}
|
|
9844
9942
|
async WorkflowRun(ID, { dataSource, userPayload }, pubSub) {
|
|
9845
9943
|
this.CheckUserReadPermissions('Workflow Runs', userPayload);
|
|
9846
|
-
const sSQL = `SELECT * FROM [admin].vwWorkflowRuns WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Workflow Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9847
|
-
|
|
9944
|
+
const sSQL = `SELECT * FROM [admin].[vwWorkflowRuns] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Workflow Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9945
|
+
const result = this.MapFieldNamesToCodeNames('Workflow Runs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
9946
|
+
return result;
|
|
9848
9947
|
}
|
|
9849
9948
|
async UpdateWorkflowRun(input, { dataSource, userPayload }, pubSub) {
|
|
9850
9949
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -10046,18 +10145,21 @@ let WorkflowResolver = class WorkflowResolver extends server_1.ResolverBase {
|
|
|
10046
10145
|
}
|
|
10047
10146
|
async Workflow(ID, { dataSource, userPayload }, pubSub) {
|
|
10048
10147
|
this.CheckUserReadPermissions('Workflows', userPayload);
|
|
10049
|
-
const sSQL = `SELECT * FROM [admin].vwWorkflows WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Workflows', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10050
|
-
|
|
10148
|
+
const sSQL = `SELECT * FROM [admin].[vwWorkflows] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Workflows', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10149
|
+
const result = this.MapFieldNamesToCodeNames('Workflows', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
10150
|
+
return result;
|
|
10051
10151
|
}
|
|
10052
10152
|
async ReportsArray(workflow_, { dataSource, userPayload }, pubSub) {
|
|
10053
10153
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
10054
|
-
const sSQL = `SELECT * FROM [admin].[vwReports] WHERE OutputWorkflowID=${workflow_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10055
|
-
|
|
10154
|
+
const sSQL = `SELECT * FROM [admin].[vwReports] WHERE [OutputWorkflowID]=${workflow_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10155
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
10156
|
+
return result;
|
|
10056
10157
|
}
|
|
10057
10158
|
async WorkflowRunsArray(workflow_, { dataSource, userPayload }, pubSub) {
|
|
10058
10159
|
this.CheckUserReadPermissions('Workflow Runs', userPayload);
|
|
10059
|
-
const sSQL = `SELECT * FROM [admin].[vwWorkflowRuns] WHERE WorkflowName=${workflow_.ID} ` + this.getRowLevelSecurityWhereClause('Workflow Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10060
|
-
|
|
10160
|
+
const sSQL = `SELECT * FROM [admin].[vwWorkflowRuns] WHERE [WorkflowName]=${workflow_.ID} ` + this.getRowLevelSecurityWhereClause('Workflow Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10161
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Workflow Runs', await dataSource.query(sSQL));
|
|
10162
|
+
return result;
|
|
10061
10163
|
}
|
|
10062
10164
|
async UpdateWorkflow(input, { dataSource, userPayload }, pubSub) {
|
|
10063
10165
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -10264,13 +10366,15 @@ let WorkflowEngineResolver = class WorkflowEngineResolver extends server_1.Resol
|
|
|
10264
10366
|
}
|
|
10265
10367
|
async WorkflowEngine(ID, { dataSource, userPayload }, pubSub) {
|
|
10266
10368
|
this.CheckUserReadPermissions('Workflow Engines', userPayload);
|
|
10267
|
-
const sSQL = `SELECT * FROM [admin].vwWorkflowEngines WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Workflow Engines', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10268
|
-
|
|
10369
|
+
const sSQL = `SELECT * FROM [admin].[vwWorkflowEngines] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Workflow Engines', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10370
|
+
const result = this.MapFieldNamesToCodeNames('Workflow Engines', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
10371
|
+
return result;
|
|
10269
10372
|
}
|
|
10270
10373
|
async WorkflowsArray(workflowengine_, { dataSource, userPayload }, pubSub) {
|
|
10271
10374
|
this.CheckUserReadPermissions('Workflows', userPayload);
|
|
10272
|
-
const sSQL = `SELECT * FROM [admin].[vwWorkflows] WHERE WorkflowEngineName=${workflowengine_.ID} ` + this.getRowLevelSecurityWhereClause('Workflows', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10273
|
-
|
|
10375
|
+
const sSQL = `SELECT * FROM [admin].[vwWorkflows] WHERE [WorkflowEngineName]=${workflowengine_.ID} ` + this.getRowLevelSecurityWhereClause('Workflows', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10376
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Workflows', await dataSource.query(sSQL));
|
|
10377
|
+
return result;
|
|
10274
10378
|
}
|
|
10275
10379
|
async UpdateWorkflowEngine(input, { dataSource, userPayload }, pubSub) {
|
|
10276
10380
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -10500,8 +10604,9 @@ let RecordChangeResolver = class RecordChangeResolver extends server_1.ResolverB
|
|
|
10500
10604
|
}
|
|
10501
10605
|
async RecordChange(ID, { dataSource, userPayload }, pubSub) {
|
|
10502
10606
|
this.CheckUserReadPermissions('Record Changes', userPayload);
|
|
10503
|
-
const sSQL = `SELECT * FROM [admin].vwRecordChanges WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Record Changes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10504
|
-
|
|
10607
|
+
const sSQL = `SELECT * FROM [admin].[vwRecordChanges] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Record Changes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10608
|
+
const result = this.MapFieldNamesToCodeNames('Record Changes', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
10609
|
+
return result;
|
|
10505
10610
|
}
|
|
10506
10611
|
async CreateRecordChange(input, { dataSource, userPayload }, pubSub) {
|
|
10507
10612
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -10519,11 +10624,9 @@ let RecordChangeResolver = class RecordChangeResolver extends server_1.ResolverB
|
|
|
10519
10624
|
return null;
|
|
10520
10625
|
}
|
|
10521
10626
|
async BeforeCreate(dataSource, input) {
|
|
10522
|
-
const i = input, d = dataSource;
|
|
10523
10627
|
return true;
|
|
10524
10628
|
}
|
|
10525
10629
|
async AfterCreate(dataSource, input) {
|
|
10526
|
-
const i = input, d = dataSource;
|
|
10527
10630
|
}
|
|
10528
10631
|
};
|
|
10529
10632
|
__decorate([
|
|
@@ -10670,13 +10773,15 @@ let UserRoleResolver = class UserRoleResolver extends server_1.ResolverBase {
|
|
|
10670
10773
|
}
|
|
10671
10774
|
async UserRole(ID, { dataSource, userPayload }, pubSub) {
|
|
10672
10775
|
this.CheckUserReadPermissions('User Roles', userPayload);
|
|
10673
|
-
const sSQL = `SELECT * FROM [admin].vwUserRoles WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('User Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10674
|
-
|
|
10776
|
+
const sSQL = `SELECT * FROM [admin].[vwUserRoles] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10777
|
+
const result = this.MapFieldNamesToCodeNames('User Roles', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
10778
|
+
return result;
|
|
10675
10779
|
}
|
|
10676
|
-
AllUserRoles({ dataSource, userPayload }, pubSub) {
|
|
10780
|
+
async AllUserRoles({ dataSource, userPayload }, pubSub) {
|
|
10677
10781
|
this.CheckUserReadPermissions('User Roles', userPayload);
|
|
10678
|
-
const sSQL = 'SELECT * FROM [admin].vwUserRoles' + this.getRowLevelSecurityWhereClause('User Roles', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
10679
|
-
|
|
10782
|
+
const sSQL = 'SELECT * FROM [admin].[vwUserRoles]' + this.getRowLevelSecurityWhereClause('User Roles', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
10783
|
+
const result = this.ArrayMapFieldNamesToCodeNames('User Roles', await dataSource.query(sSQL));
|
|
10784
|
+
return result;
|
|
10680
10785
|
}
|
|
10681
10786
|
async CreateUserRole(input, { dataSource, userPayload }, pubSub) {
|
|
10682
10787
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -10694,11 +10799,9 @@ let UserRoleResolver = class UserRoleResolver extends server_1.ResolverBase {
|
|
|
10694
10799
|
return null;
|
|
10695
10800
|
}
|
|
10696
10801
|
async BeforeCreate(dataSource, input) {
|
|
10697
|
-
const i = input, d = dataSource;
|
|
10698
10802
|
return true;
|
|
10699
10803
|
}
|
|
10700
10804
|
async AfterCreate(dataSource, input) {
|
|
10701
|
-
const i = input, d = dataSource;
|
|
10702
10805
|
}
|
|
10703
10806
|
};
|
|
10704
10807
|
__decorate([
|
|
@@ -10743,7 +10846,7 @@ __decorate([
|
|
|
10743
10846
|
__param(1, (0, server_1.PubSub)()),
|
|
10744
10847
|
__metadata("design:type", Function),
|
|
10745
10848
|
__metadata("design:paramtypes", [Object, server_1.PubSubEngine]),
|
|
10746
|
-
__metadata("design:returntype",
|
|
10849
|
+
__metadata("design:returntype", Promise)
|
|
10747
10850
|
], UserRoleResolver.prototype, "AllUserRoles", null);
|
|
10748
10851
|
__decorate([
|
|
10749
10852
|
(0, server_1.Mutation)(() => UserRole_),
|
|
@@ -10842,18 +10945,21 @@ let RowLevelSecurityFilterResolver = class RowLevelSecurityFilterResolver extend
|
|
|
10842
10945
|
}
|
|
10843
10946
|
async RowLevelSecurityFilter(ID, { dataSource, userPayload }, pubSub) {
|
|
10844
10947
|
this.CheckUserReadPermissions('Row Level Security Filters', userPayload);
|
|
10845
|
-
const sSQL = `SELECT * FROM [admin].vwRowLevelSecurityFilters WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Row Level Security Filters', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10846
|
-
|
|
10948
|
+
const sSQL = `SELECT * FROM [admin].[vwRowLevelSecurityFilters] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Row Level Security Filters', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10949
|
+
const result = this.MapFieldNamesToCodeNames('Row Level Security Filters', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
10950
|
+
return result;
|
|
10847
10951
|
}
|
|
10848
|
-
AllRowLevelSecurityFilters({ dataSource, userPayload }, pubSub) {
|
|
10952
|
+
async AllRowLevelSecurityFilters({ dataSource, userPayload }, pubSub) {
|
|
10849
10953
|
this.CheckUserReadPermissions('Row Level Security Filters', userPayload);
|
|
10850
|
-
const sSQL = 'SELECT * FROM [admin].vwRowLevelSecurityFilters' + this.getRowLevelSecurityWhereClause('Row Level Security Filters', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
10851
|
-
|
|
10954
|
+
const sSQL = 'SELECT * FROM [admin].[vwRowLevelSecurityFilters]' + this.getRowLevelSecurityWhereClause('Row Level Security Filters', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
10955
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Row Level Security Filters', await dataSource.query(sSQL));
|
|
10956
|
+
return result;
|
|
10852
10957
|
}
|
|
10853
10958
|
async EntityPermissionsArray(rowlevelsecurityfilter_, { dataSource, userPayload }, pubSub) {
|
|
10854
10959
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
10855
|
-
const sSQL = `SELECT * FROM [admin].[vwEntityPermissions] WHERE ReadRLSFilterID=${rowlevelsecurityfilter_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10856
|
-
|
|
10960
|
+
const sSQL = `SELECT * FROM [admin].[vwEntityPermissions] WHERE [ReadRLSFilterID]=${rowlevelsecurityfilter_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10961
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL));
|
|
10962
|
+
return result;
|
|
10857
10963
|
}
|
|
10858
10964
|
};
|
|
10859
10965
|
__decorate([
|
|
@@ -10898,7 +11004,7 @@ __decorate([
|
|
|
10898
11004
|
__param(1, (0, server_1.PubSub)()),
|
|
10899
11005
|
__metadata("design:type", Function),
|
|
10900
11006
|
__metadata("design:paramtypes", [Object, server_1.PubSubEngine]),
|
|
10901
|
-
__metadata("design:returntype",
|
|
11007
|
+
__metadata("design:returntype", Promise)
|
|
10902
11008
|
], RowLevelSecurityFilterResolver.prototype, "AllRowLevelSecurityFilters", null);
|
|
10903
11009
|
__decorate([
|
|
10904
11010
|
(0, server_1.FieldResolver)(() => [EntityPermission_]),
|
|
@@ -11106,8 +11212,9 @@ let AuditLogResolver = class AuditLogResolver extends server_1.ResolverBase {
|
|
|
11106
11212
|
}
|
|
11107
11213
|
async AuditLog(ID, { dataSource, userPayload }, pubSub) {
|
|
11108
11214
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
11109
|
-
const sSQL = `SELECT * FROM [admin].vwAuditLogs WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11110
|
-
|
|
11215
|
+
const sSQL = `SELECT * FROM [admin].[vwAuditLogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11216
|
+
const result = this.MapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
11217
|
+
return result;
|
|
11111
11218
|
}
|
|
11112
11219
|
async CreateAuditLog(input, { dataSource, userPayload }, pubSub) {
|
|
11113
11220
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -11125,11 +11232,9 @@ let AuditLogResolver = class AuditLogResolver extends server_1.ResolverBase {
|
|
|
11125
11232
|
return null;
|
|
11126
11233
|
}
|
|
11127
11234
|
async BeforeCreate(dataSource, input) {
|
|
11128
|
-
const i = input, d = dataSource;
|
|
11129
11235
|
return true;
|
|
11130
11236
|
}
|
|
11131
11237
|
async AfterCreate(dataSource, input) {
|
|
11132
|
-
const i = input, d = dataSource;
|
|
11133
11238
|
}
|
|
11134
11239
|
async UpdateAuditLog(input, { dataSource, userPayload }, pubSub) {
|
|
11135
11240
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -11315,33 +11420,39 @@ let AuthorizationResolver = class AuthorizationResolver extends server_1.Resolve
|
|
|
11315
11420
|
}
|
|
11316
11421
|
async Authorization(ID, { dataSource, userPayload }, pubSub) {
|
|
11317
11422
|
this.CheckUserReadPermissions('Authorizations', userPayload);
|
|
11318
|
-
const sSQL = `SELECT * FROM [admin].vwAuthorizations WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Authorizations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11319
|
-
|
|
11423
|
+
const sSQL = `SELECT * FROM [admin].[vwAuthorizations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Authorizations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11424
|
+
const result = this.MapFieldNamesToCodeNames('Authorizations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
11425
|
+
return result;
|
|
11320
11426
|
}
|
|
11321
|
-
AllAuthorizations({ dataSource, userPayload }, pubSub) {
|
|
11427
|
+
async AllAuthorizations({ dataSource, userPayload }, pubSub) {
|
|
11322
11428
|
this.CheckUserReadPermissions('Authorizations', userPayload);
|
|
11323
|
-
const sSQL = 'SELECT * FROM [admin].vwAuthorizations' + this.getRowLevelSecurityWhereClause('Authorizations', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
11324
|
-
|
|
11429
|
+
const sSQL = 'SELECT * FROM [admin].[vwAuthorizations]' + this.getRowLevelSecurityWhereClause('Authorizations', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
11430
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Authorizations', await dataSource.query(sSQL));
|
|
11431
|
+
return result;
|
|
11325
11432
|
}
|
|
11326
11433
|
async AuthorizationRolesArray(authorization_, { dataSource, userPayload }, pubSub) {
|
|
11327
11434
|
this.CheckUserReadPermissions('Authorization Roles', userPayload);
|
|
11328
|
-
const sSQL = `SELECT * FROM [admin].[vwAuthorizationRoles] WHERE AuthorizationID=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Authorization Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11329
|
-
|
|
11435
|
+
const sSQL = `SELECT * FROM [admin].[vwAuthorizationRoles] WHERE [AuthorizationID]=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Authorization Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11436
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Authorization Roles', await dataSource.query(sSQL));
|
|
11437
|
+
return result;
|
|
11330
11438
|
}
|
|
11331
11439
|
async AuthorizationsArray(authorization_, { dataSource, userPayload }, pubSub) {
|
|
11332
11440
|
this.CheckUserReadPermissions('Authorizations', userPayload);
|
|
11333
|
-
const sSQL = `SELECT * FROM [admin].[vwAuthorizations] WHERE ParentID=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Authorizations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11334
|
-
|
|
11441
|
+
const sSQL = `SELECT * FROM [admin].[vwAuthorizations] WHERE [ParentID]=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Authorizations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11442
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Authorizations', await dataSource.query(sSQL));
|
|
11443
|
+
return result;
|
|
11335
11444
|
}
|
|
11336
11445
|
async AuditLogTypesArray(authorization_, { dataSource, userPayload }, pubSub) {
|
|
11337
11446
|
this.CheckUserReadPermissions('Audit Log Types', userPayload);
|
|
11338
|
-
const sSQL = `SELECT * FROM [admin].[vwAuditLogTypes] WHERE AuthorizationName=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Log Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11339
|
-
|
|
11447
|
+
const sSQL = `SELECT * FROM [admin].[vwAuditLogTypes] WHERE [AuthorizationName]=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Log Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11448
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Audit Log Types', await dataSource.query(sSQL));
|
|
11449
|
+
return result;
|
|
11340
11450
|
}
|
|
11341
11451
|
async AuditLogsArray(authorization_, { dataSource, userPayload }, pubSub) {
|
|
11342
11452
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
11343
|
-
const sSQL = `SELECT * FROM [admin].[vwAuditLogs] WHERE AuthorizationName=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11344
|
-
|
|
11453
|
+
const sSQL = `SELECT * FROM [admin].[vwAuditLogs] WHERE [AuthorizationName]=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11454
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL));
|
|
11455
|
+
return result;
|
|
11345
11456
|
}
|
|
11346
11457
|
};
|
|
11347
11458
|
__decorate([
|
|
@@ -11386,7 +11497,7 @@ __decorate([
|
|
|
11386
11497
|
__param(1, (0, server_1.PubSub)()),
|
|
11387
11498
|
__metadata("design:type", Function),
|
|
11388
11499
|
__metadata("design:paramtypes", [Object, server_1.PubSubEngine]),
|
|
11389
|
-
__metadata("design:returntype",
|
|
11500
|
+
__metadata("design:returntype", Promise)
|
|
11390
11501
|
], AuthorizationResolver.prototype, "AllAuthorizations", null);
|
|
11391
11502
|
__decorate([
|
|
11392
11503
|
(0, server_1.FieldResolver)(() => [AuthorizationRole_]),
|
|
@@ -11510,13 +11621,15 @@ let AuthorizationRoleResolver = class AuthorizationRoleResolver extends server_1
|
|
|
11510
11621
|
}
|
|
11511
11622
|
async AuthorizationRole(ID, { dataSource, userPayload }, pubSub) {
|
|
11512
11623
|
this.CheckUserReadPermissions('Authorization Roles', userPayload);
|
|
11513
|
-
const sSQL = `SELECT * FROM [admin].vwAuthorizationRoles WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Authorization Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11514
|
-
|
|
11624
|
+
const sSQL = `SELECT * FROM [admin].[vwAuthorizationRoles] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Authorization Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11625
|
+
const result = this.MapFieldNamesToCodeNames('Authorization Roles', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
11626
|
+
return result;
|
|
11515
11627
|
}
|
|
11516
|
-
AllAuthorizationRoles({ dataSource, userPayload }, pubSub) {
|
|
11628
|
+
async AllAuthorizationRoles({ dataSource, userPayload }, pubSub) {
|
|
11517
11629
|
this.CheckUserReadPermissions('Authorization Roles', userPayload);
|
|
11518
|
-
const sSQL = 'SELECT * FROM [admin].vwAuthorizationRoles' + this.getRowLevelSecurityWhereClause('Authorization Roles', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
11519
|
-
|
|
11630
|
+
const sSQL = 'SELECT * FROM [admin].[vwAuthorizationRoles]' + this.getRowLevelSecurityWhereClause('Authorization Roles', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
11631
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Authorization Roles', await dataSource.query(sSQL));
|
|
11632
|
+
return result;
|
|
11520
11633
|
}
|
|
11521
11634
|
};
|
|
11522
11635
|
__decorate([
|
|
@@ -11561,7 +11674,7 @@ __decorate([
|
|
|
11561
11674
|
__param(1, (0, server_1.PubSub)()),
|
|
11562
11675
|
__metadata("design:type", Function),
|
|
11563
11676
|
__metadata("design:paramtypes", [Object, server_1.PubSubEngine]),
|
|
11564
|
-
__metadata("design:returntype",
|
|
11677
|
+
__metadata("design:returntype", Promise)
|
|
11565
11678
|
], AuthorizationRoleResolver.prototype, "AllAuthorizationRoles", null);
|
|
11566
11679
|
AuthorizationRoleResolver = __decorate([
|
|
11567
11680
|
(0, server_1.Resolver)(AuthorizationRole_)
|
|
@@ -11665,23 +11778,27 @@ let AuditLogTypeResolver = class AuditLogTypeResolver extends server_1.ResolverB
|
|
|
11665
11778
|
}
|
|
11666
11779
|
async AuditLogType(ID, { dataSource, userPayload }, pubSub) {
|
|
11667
11780
|
this.CheckUserReadPermissions('Audit Log Types', userPayload);
|
|
11668
|
-
const sSQL = `SELECT * FROM [admin].vwAuditLogTypes WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Audit Log Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11669
|
-
|
|
11781
|
+
const sSQL = `SELECT * FROM [admin].[vwAuditLogTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Audit Log Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11782
|
+
const result = this.MapFieldNamesToCodeNames('Audit Log Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
11783
|
+
return result;
|
|
11670
11784
|
}
|
|
11671
|
-
AllAuditLogTypes({ dataSource, userPayload }, pubSub) {
|
|
11785
|
+
async AllAuditLogTypes({ dataSource, userPayload }, pubSub) {
|
|
11672
11786
|
this.CheckUserReadPermissions('Audit Log Types', userPayload);
|
|
11673
|
-
const sSQL = 'SELECT * FROM [admin].vwAuditLogTypes' + this.getRowLevelSecurityWhereClause('Audit Log Types', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
11674
|
-
|
|
11787
|
+
const sSQL = 'SELECT * FROM [admin].[vwAuditLogTypes]' + this.getRowLevelSecurityWhereClause('Audit Log Types', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
11788
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Audit Log Types', await dataSource.query(sSQL));
|
|
11789
|
+
return result;
|
|
11675
11790
|
}
|
|
11676
11791
|
async AuditLogsArray(auditlogtype_, { dataSource, userPayload }, pubSub) {
|
|
11677
11792
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
11678
|
-
const sSQL = `SELECT * FROM [admin].[vwAuditLogs] WHERE AuditLogTypeName=${auditlogtype_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11679
|
-
|
|
11793
|
+
const sSQL = `SELECT * FROM [admin].[vwAuditLogs] WHERE [AuditLogTypeName]=${auditlogtype_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11794
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL));
|
|
11795
|
+
return result;
|
|
11680
11796
|
}
|
|
11681
11797
|
async AuditLogTypesArray(auditlogtype_, { dataSource, userPayload }, pubSub) {
|
|
11682
11798
|
this.CheckUserReadPermissions('Audit Log Types', userPayload);
|
|
11683
|
-
const sSQL = `SELECT * FROM [admin].[vwAuditLogTypes] WHERE ParentID=${auditlogtype_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Log Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11684
|
-
|
|
11799
|
+
const sSQL = `SELECT * FROM [admin].[vwAuditLogTypes] WHERE [ParentID]=${auditlogtype_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Log Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11800
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Audit Log Types', await dataSource.query(sSQL));
|
|
11801
|
+
return result;
|
|
11685
11802
|
}
|
|
11686
11803
|
};
|
|
11687
11804
|
__decorate([
|
|
@@ -11726,7 +11843,7 @@ __decorate([
|
|
|
11726
11843
|
__param(1, (0, server_1.PubSub)()),
|
|
11727
11844
|
__metadata("design:type", Function),
|
|
11728
11845
|
__metadata("design:paramtypes", [Object, server_1.PubSubEngine]),
|
|
11729
|
-
__metadata("design:returntype",
|
|
11846
|
+
__metadata("design:returntype", Promise)
|
|
11730
11847
|
], AuditLogTypeResolver.prototype, "AllAuditLogTypes", null);
|
|
11731
11848
|
__decorate([
|
|
11732
11849
|
(0, server_1.FieldResolver)(() => [AuditLog_]),
|
|
@@ -11849,13 +11966,15 @@ let EntityFieldValueResolver = class EntityFieldValueResolver extends server_1.R
|
|
|
11849
11966
|
}
|
|
11850
11967
|
async EntityFieldValue(ID, { dataSource, userPayload }, pubSub) {
|
|
11851
11968
|
this.CheckUserReadPermissions('Entity Field Values', userPayload);
|
|
11852
|
-
const sSQL = `SELECT * FROM [admin].vwEntityFieldValues WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Field Values', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11853
|
-
|
|
11969
|
+
const sSQL = `SELECT * FROM [admin].[vwEntityFieldValues] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Field Values', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11970
|
+
const result = this.MapFieldNamesToCodeNames('Entity Field Values', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
11971
|
+
return result;
|
|
11854
11972
|
}
|
|
11855
|
-
AllEntityFieldValues({ dataSource, userPayload }, pubSub) {
|
|
11973
|
+
async AllEntityFieldValues({ dataSource, userPayload }, pubSub) {
|
|
11856
11974
|
this.CheckUserReadPermissions('Entity Field Values', userPayload);
|
|
11857
|
-
const sSQL = 'SELECT * FROM [admin].vwEntityFieldValues' + this.getRowLevelSecurityWhereClause('Entity Field Values', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
11858
|
-
|
|
11975
|
+
const sSQL = 'SELECT * FROM [admin].[vwEntityFieldValues]' + this.getRowLevelSecurityWhereClause('Entity Field Values', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
11976
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Entity Field Values', await dataSource.query(sSQL));
|
|
11977
|
+
return result;
|
|
11859
11978
|
}
|
|
11860
11979
|
};
|
|
11861
11980
|
__decorate([
|
|
@@ -11900,7 +12019,7 @@ __decorate([
|
|
|
11900
12019
|
__param(1, (0, server_1.PubSub)()),
|
|
11901
12020
|
__metadata("design:type", Function),
|
|
11902
12021
|
__metadata("design:paramtypes", [Object, server_1.PubSubEngine]),
|
|
11903
|
-
__metadata("design:returntype",
|
|
12022
|
+
__metadata("design:returntype", Promise)
|
|
11904
12023
|
], EntityFieldValueResolver.prototype, "AllEntityFieldValues", null);
|
|
11905
12024
|
EntityFieldValueResolver = __decorate([
|
|
11906
12025
|
(0, server_1.Resolver)(EntityFieldValue_)
|
|
@@ -12055,28 +12174,33 @@ let AIModelResolver = class AIModelResolver extends server_1.ResolverBase {
|
|
|
12055
12174
|
}
|
|
12056
12175
|
async AIModel(ID, { dataSource, userPayload }, pubSub) {
|
|
12057
12176
|
this.CheckUserReadPermissions('AI Models', userPayload);
|
|
12058
|
-
const sSQL = `SELECT * FROM [admin].vwAIModels WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('AI Models', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12059
|
-
|
|
12177
|
+
const sSQL = `SELECT * FROM [admin].[vwAIModels] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('AI Models', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12178
|
+
const result = this.MapFieldNamesToCodeNames('AI Models', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
12179
|
+
return result;
|
|
12060
12180
|
}
|
|
12061
|
-
AllAIModels({ dataSource, userPayload }, pubSub) {
|
|
12181
|
+
async AllAIModels({ dataSource, userPayload }, pubSub) {
|
|
12062
12182
|
this.CheckUserReadPermissions('AI Models', userPayload);
|
|
12063
|
-
const sSQL = 'SELECT * FROM [admin].vwAIModels' + this.getRowLevelSecurityWhereClause('AI Models', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12064
|
-
|
|
12183
|
+
const sSQL = 'SELECT * FROM [admin].[vwAIModels]' + this.getRowLevelSecurityWhereClause('AI Models', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12184
|
+
const result = this.ArrayMapFieldNamesToCodeNames('AI Models', await dataSource.query(sSQL));
|
|
12185
|
+
return result;
|
|
12065
12186
|
}
|
|
12066
12187
|
async AIActionsArray(aimodel_, { dataSource, userPayload }, pubSub) {
|
|
12067
12188
|
this.CheckUserReadPermissions('AI Actions', userPayload);
|
|
12068
|
-
const sSQL = `SELECT * FROM [admin].[vwAIActions] WHERE DefaultModelID=${aimodel_.ID} ` + this.getRowLevelSecurityWhereClause('AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12069
|
-
|
|
12189
|
+
const sSQL = `SELECT * FROM [admin].[vwAIActions] WHERE [DefaultModelID]=${aimodel_.ID} ` + this.getRowLevelSecurityWhereClause('AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12190
|
+
const result = this.ArrayMapFieldNamesToCodeNames('AI Actions', await dataSource.query(sSQL));
|
|
12191
|
+
return result;
|
|
12070
12192
|
}
|
|
12071
12193
|
async AIModelActionsArray(aimodel_, { dataSource, userPayload }, pubSub) {
|
|
12072
12194
|
this.CheckUserReadPermissions('AI Model Actions', userPayload);
|
|
12073
|
-
const sSQL = `SELECT * FROM [admin].[vwAIModelActions] WHERE AIModelID=${aimodel_.ID} ` + this.getRowLevelSecurityWhereClause('AI Model Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12074
|
-
|
|
12195
|
+
const sSQL = `SELECT * FROM [admin].[vwAIModelActions] WHERE [AIModelID]=${aimodel_.ID} ` + this.getRowLevelSecurityWhereClause('AI Model Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12196
|
+
const result = this.ArrayMapFieldNamesToCodeNames('AI Model Actions', await dataSource.query(sSQL));
|
|
12197
|
+
return result;
|
|
12075
12198
|
}
|
|
12076
12199
|
async EntityAIActionsArray(aimodel_, { dataSource, userPayload }, pubSub) {
|
|
12077
12200
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
12078
|
-
const sSQL = `SELECT * FROM [admin].[vwEntityAIActions] WHERE AIModelID=${aimodel_.ID} ` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12079
|
-
|
|
12201
|
+
const sSQL = `SELECT * FROM [admin].[vwEntityAIActions] WHERE [AIModelID]=${aimodel_.ID} ` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12202
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL));
|
|
12203
|
+
return result;
|
|
12080
12204
|
}
|
|
12081
12205
|
async UpdateAIModel(input, { dataSource, userPayload }, pubSub) {
|
|
12082
12206
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -12142,7 +12266,7 @@ __decorate([
|
|
|
12142
12266
|
__param(1, (0, server_1.PubSub)()),
|
|
12143
12267
|
__metadata("design:type", Function),
|
|
12144
12268
|
__metadata("design:paramtypes", [Object, server_1.PubSubEngine]),
|
|
12145
|
-
__metadata("design:returntype",
|
|
12269
|
+
__metadata("design:returntype", Promise)
|
|
12146
12270
|
], AIModelResolver.prototype, "AllAIModels", null);
|
|
12147
12271
|
__decorate([
|
|
12148
12272
|
(0, server_1.FieldResolver)(() => [AIAction_]),
|
|
@@ -12315,23 +12439,27 @@ let AIActionResolver = class AIActionResolver extends server_1.ResolverBase {
|
|
|
12315
12439
|
}
|
|
12316
12440
|
async AIAction(ID, { dataSource, userPayload }, pubSub) {
|
|
12317
12441
|
this.CheckUserReadPermissions('AI Actions', userPayload);
|
|
12318
|
-
const sSQL = `SELECT * FROM [admin].vwAIActions WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12319
|
-
|
|
12442
|
+
const sSQL = `SELECT * FROM [admin].[vwAIActions] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12443
|
+
const result = this.MapFieldNamesToCodeNames('AI Actions', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
12444
|
+
return result;
|
|
12320
12445
|
}
|
|
12321
|
-
AllAIActions({ dataSource, userPayload }, pubSub) {
|
|
12446
|
+
async AllAIActions({ dataSource, userPayload }, pubSub) {
|
|
12322
12447
|
this.CheckUserReadPermissions('AI Actions', userPayload);
|
|
12323
|
-
const sSQL = 'SELECT * FROM [admin].vwAIActions' + this.getRowLevelSecurityWhereClause('AI Actions', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12324
|
-
|
|
12448
|
+
const sSQL = 'SELECT * FROM [admin].[vwAIActions]' + this.getRowLevelSecurityWhereClause('AI Actions', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12449
|
+
const result = this.ArrayMapFieldNamesToCodeNames('AI Actions', await dataSource.query(sSQL));
|
|
12450
|
+
return result;
|
|
12325
12451
|
}
|
|
12326
12452
|
async AIModelActionsArray(aiaction_, { dataSource, userPayload }, pubSub) {
|
|
12327
12453
|
this.CheckUserReadPermissions('AI Model Actions', userPayload);
|
|
12328
|
-
const sSQL = `SELECT * FROM [admin].[vwAIModelActions] WHERE AIActionID=${aiaction_.ID} ` + this.getRowLevelSecurityWhereClause('AI Model Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12329
|
-
|
|
12454
|
+
const sSQL = `SELECT * FROM [admin].[vwAIModelActions] WHERE [AIActionID]=${aiaction_.ID} ` + this.getRowLevelSecurityWhereClause('AI Model Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12455
|
+
const result = this.ArrayMapFieldNamesToCodeNames('AI Model Actions', await dataSource.query(sSQL));
|
|
12456
|
+
return result;
|
|
12330
12457
|
}
|
|
12331
12458
|
async EntityAIActionsArray(aiaction_, { dataSource, userPayload }, pubSub) {
|
|
12332
12459
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
12333
|
-
const sSQL = `SELECT * FROM [admin].[vwEntityAIActions] WHERE AIActionID=${aiaction_.ID} ` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12334
|
-
|
|
12460
|
+
const sSQL = `SELECT * FROM [admin].[vwEntityAIActions] WHERE [AIActionID]=${aiaction_.ID} ` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12461
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL));
|
|
12462
|
+
return result;
|
|
12335
12463
|
}
|
|
12336
12464
|
async UpdateAIAction(input, { dataSource, userPayload }, pubSub) {
|
|
12337
12465
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -12397,7 +12525,7 @@ __decorate([
|
|
|
12397
12525
|
__param(1, (0, server_1.PubSub)()),
|
|
12398
12526
|
__metadata("design:type", Function),
|
|
12399
12527
|
__metadata("design:paramtypes", [Object, server_1.PubSubEngine]),
|
|
12400
|
-
__metadata("design:returntype",
|
|
12528
|
+
__metadata("design:returntype", Promise)
|
|
12401
12529
|
], AIActionResolver.prototype, "AllAIActions", null);
|
|
12402
12530
|
__decorate([
|
|
12403
12531
|
(0, server_1.FieldResolver)(() => [AIModelAction_]),
|
|
@@ -12541,13 +12669,15 @@ let AIModelActionResolver = class AIModelActionResolver extends server_1.Resolve
|
|
|
12541
12669
|
}
|
|
12542
12670
|
async AIModelAction(ID, { dataSource, userPayload }, pubSub) {
|
|
12543
12671
|
this.CheckUserReadPermissions('AI Model Actions', userPayload);
|
|
12544
|
-
const sSQL = `SELECT * FROM [admin].vwAIModelActions WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('AI Model Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12545
|
-
|
|
12672
|
+
const sSQL = `SELECT * FROM [admin].[vwAIModelActions] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('AI Model Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12673
|
+
const result = this.MapFieldNamesToCodeNames('AI Model Actions', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
12674
|
+
return result;
|
|
12546
12675
|
}
|
|
12547
|
-
AllAIModelActions({ dataSource, userPayload }, pubSub) {
|
|
12676
|
+
async AllAIModelActions({ dataSource, userPayload }, pubSub) {
|
|
12548
12677
|
this.CheckUserReadPermissions('AI Model Actions', userPayload);
|
|
12549
|
-
const sSQL = 'SELECT * FROM [admin].vwAIModelActions' + this.getRowLevelSecurityWhereClause('AI Model Actions', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12550
|
-
|
|
12678
|
+
const sSQL = 'SELECT * FROM [admin].[vwAIModelActions]' + this.getRowLevelSecurityWhereClause('AI Model Actions', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12679
|
+
const result = this.ArrayMapFieldNamesToCodeNames('AI Model Actions', await dataSource.query(sSQL));
|
|
12680
|
+
return result;
|
|
12551
12681
|
}
|
|
12552
12682
|
async UpdateAIModelAction(input, { dataSource, userPayload }, pubSub) {
|
|
12553
12683
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -12613,7 +12743,7 @@ __decorate([
|
|
|
12613
12743
|
__param(1, (0, server_1.PubSub)()),
|
|
12614
12744
|
__metadata("design:type", Function),
|
|
12615
12745
|
__metadata("design:paramtypes", [Object, server_1.PubSubEngine]),
|
|
12616
|
-
__metadata("design:returntype",
|
|
12746
|
+
__metadata("design:returntype", Promise)
|
|
12617
12747
|
], AIModelActionResolver.prototype, "AllAIModelActions", null);
|
|
12618
12748
|
__decorate([
|
|
12619
12749
|
(0, server_1.Mutation)(() => AIModelAction_),
|
|
@@ -12815,13 +12945,15 @@ let EntityAIActionResolver = class EntityAIActionResolver extends server_1.Resol
|
|
|
12815
12945
|
}
|
|
12816
12946
|
async EntityAIAction(ID, { dataSource, userPayload }, pubSub) {
|
|
12817
12947
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
12818
|
-
const sSQL = `SELECT * FROM [admin].vwEntityAIActions WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12819
|
-
|
|
12948
|
+
const sSQL = `SELECT * FROM [admin].[vwEntityAIActions] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12949
|
+
const result = this.MapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
12950
|
+
return result;
|
|
12820
12951
|
}
|
|
12821
|
-
AllEntityAIActions({ dataSource, userPayload }, pubSub) {
|
|
12952
|
+
async AllEntityAIActions({ dataSource, userPayload }, pubSub) {
|
|
12822
12953
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
12823
|
-
const sSQL = 'SELECT * FROM [admin].vwEntityAIActions' + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12824
|
-
|
|
12954
|
+
const sSQL = 'SELECT * FROM [admin].[vwEntityAIActions]' + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12955
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL));
|
|
12956
|
+
return result;
|
|
12825
12957
|
}
|
|
12826
12958
|
async UpdateEntityAIAction(input, { dataSource, userPayload }, pubSub) {
|
|
12827
12959
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -12887,7 +13019,7 @@ __decorate([
|
|
|
12887
13019
|
__param(1, (0, server_1.PubSub)()),
|
|
12888
13020
|
__metadata("design:type", Function),
|
|
12889
13021
|
__metadata("design:paramtypes", [Object, server_1.PubSubEngine]),
|
|
12890
|
-
__metadata("design:returntype",
|
|
13022
|
+
__metadata("design:returntype", Promise)
|
|
12891
13023
|
], EntityAIActionResolver.prototype, "AllEntityAIActions", null);
|
|
12892
13024
|
__decorate([
|
|
12893
13025
|
(0, server_1.Mutation)(() => EntityAIAction_),
|
|
@@ -12990,18 +13122,21 @@ let AIModelTypeResolver = class AIModelTypeResolver extends server_1.ResolverBas
|
|
|
12990
13122
|
}
|
|
12991
13123
|
async AIModelType(ID, { dataSource, userPayload }, pubSub) {
|
|
12992
13124
|
this.CheckUserReadPermissions('AI Model Types', userPayload);
|
|
12993
|
-
const sSQL = `SELECT * FROM [admin].vwAIModelTypes WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('AI Model Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12994
|
-
|
|
13125
|
+
const sSQL = `SELECT * FROM [admin].[vwAIModelTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('AI Model Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13126
|
+
const result = this.MapFieldNamesToCodeNames('AI Model Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
13127
|
+
return result;
|
|
12995
13128
|
}
|
|
12996
|
-
AllAIModelTypes({ dataSource, userPayload }, pubSub) {
|
|
13129
|
+
async AllAIModelTypes({ dataSource, userPayload }, pubSub) {
|
|
12997
13130
|
this.CheckUserReadPermissions('AI Model Types', userPayload);
|
|
12998
|
-
const sSQL = 'SELECT * FROM [admin].vwAIModelTypes' + this.getRowLevelSecurityWhereClause('AI Model Types', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12999
|
-
|
|
13131
|
+
const sSQL = 'SELECT * FROM [admin].[vwAIModelTypes]' + this.getRowLevelSecurityWhereClause('AI Model Types', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
13132
|
+
const result = this.ArrayMapFieldNamesToCodeNames('AI Model Types', await dataSource.query(sSQL));
|
|
13133
|
+
return result;
|
|
13000
13134
|
}
|
|
13001
13135
|
async AIModelsArray(aimodeltype_, { dataSource, userPayload }, pubSub) {
|
|
13002
13136
|
this.CheckUserReadPermissions('AI Models', userPayload);
|
|
13003
|
-
const sSQL = `SELECT * FROM [admin].[vwAIModels] WHERE AIModelTypeID=${aimodeltype_.ID} ` + this.getRowLevelSecurityWhereClause('AI Models', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13004
|
-
|
|
13137
|
+
const sSQL = `SELECT * FROM [admin].[vwAIModels] WHERE [AIModelTypeID]=${aimodeltype_.ID} ` + this.getRowLevelSecurityWhereClause('AI Models', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13138
|
+
const result = this.ArrayMapFieldNamesToCodeNames('AI Models', await dataSource.query(sSQL));
|
|
13139
|
+
return result;
|
|
13005
13140
|
}
|
|
13006
13141
|
async UpdateAIModelType(input, { dataSource, userPayload }, pubSub) {
|
|
13007
13142
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -13067,7 +13202,7 @@ __decorate([
|
|
|
13067
13202
|
__param(1, (0, server_1.PubSub)()),
|
|
13068
13203
|
__metadata("design:type", Function),
|
|
13069
13204
|
__metadata("design:paramtypes", [Object, server_1.PubSubEngine]),
|
|
13070
|
-
__metadata("design:returntype",
|
|
13205
|
+
__metadata("design:returntype", Promise)
|
|
13071
13206
|
], AIModelTypeResolver.prototype, "AllAIModelTypes", null);
|
|
13072
13207
|
__decorate([
|
|
13073
13208
|
(0, server_1.FieldResolver)(() => [AIModel_]),
|
|
@@ -13175,13 +13310,15 @@ let QueueTypeResolver = class QueueTypeResolver extends server_1.ResolverBase {
|
|
|
13175
13310
|
}
|
|
13176
13311
|
async QueueType(ID, { dataSource, userPayload }, pubSub) {
|
|
13177
13312
|
this.CheckUserReadPermissions('Queue Types', userPayload);
|
|
13178
|
-
const sSQL = `SELECT * FROM [admin].vwQueueTypes WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Queue Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13179
|
-
|
|
13313
|
+
const sSQL = `SELECT * FROM [admin].[vwQueueTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Queue Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13314
|
+
const result = this.MapFieldNamesToCodeNames('Queue Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
13315
|
+
return result;
|
|
13180
13316
|
}
|
|
13181
13317
|
async QueuesArray(queuetype_, { dataSource, userPayload }, pubSub) {
|
|
13182
13318
|
this.CheckUserReadPermissions('Queues', userPayload);
|
|
13183
|
-
const sSQL = `SELECT * FROM [admin].[vwQueues] WHERE QueueTypeID=${queuetype_.ID} ` + this.getRowLevelSecurityWhereClause('Queues', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13184
|
-
|
|
13319
|
+
const sSQL = `SELECT * FROM [admin].[vwQueues] WHERE [QueueTypeID]=${queuetype_.ID} ` + this.getRowLevelSecurityWhereClause('Queues', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13320
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Queues', await dataSource.query(sSQL));
|
|
13321
|
+
return result;
|
|
13185
13322
|
}
|
|
13186
13323
|
};
|
|
13187
13324
|
__decorate([
|
|
@@ -13529,13 +13666,15 @@ let QueueResolver = class QueueResolver extends server_1.ResolverBase {
|
|
|
13529
13666
|
}
|
|
13530
13667
|
async Queue(ID, { dataSource, userPayload }, pubSub) {
|
|
13531
13668
|
this.CheckUserReadPermissions('Queues', userPayload);
|
|
13532
|
-
const sSQL = `SELECT * FROM [admin].vwQueues WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Queues', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13533
|
-
|
|
13669
|
+
const sSQL = `SELECT * FROM [admin].[vwQueues] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Queues', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13670
|
+
const result = this.MapFieldNamesToCodeNames('Queues', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
13671
|
+
return result;
|
|
13534
13672
|
}
|
|
13535
13673
|
async QueueTasksArray(queue_, { dataSource, userPayload }, pubSub) {
|
|
13536
13674
|
this.CheckUserReadPermissions('Queue Tasks', userPayload);
|
|
13537
|
-
const sSQL = `SELECT * FROM [admin].[vwQueueTasks] WHERE QueueID=${queue_.ID} ` + this.getRowLevelSecurityWhereClause('Queue Tasks', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13538
|
-
|
|
13675
|
+
const sSQL = `SELECT * FROM [admin].[vwQueueTasks] WHERE [QueueID]=${queue_.ID} ` + this.getRowLevelSecurityWhereClause('Queue Tasks', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13676
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Queue Tasks', await dataSource.query(sSQL));
|
|
13677
|
+
return result;
|
|
13539
13678
|
}
|
|
13540
13679
|
async CreateQueue(input, { dataSource, userPayload }, pubSub) {
|
|
13541
13680
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -13553,11 +13692,9 @@ let QueueResolver = class QueueResolver extends server_1.ResolverBase {
|
|
|
13553
13692
|
return null;
|
|
13554
13693
|
}
|
|
13555
13694
|
async BeforeCreate(dataSource, input) {
|
|
13556
|
-
const i = input, d = dataSource;
|
|
13557
13695
|
return true;
|
|
13558
13696
|
}
|
|
13559
13697
|
async AfterCreate(dataSource, input) {
|
|
13560
|
-
const i = input, d = dataSource;
|
|
13561
13698
|
}
|
|
13562
13699
|
async UpdateQueue(input, { dataSource, userPayload }, pubSub) {
|
|
13563
13700
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -13832,8 +13969,9 @@ let QueueTaskResolver = class QueueTaskResolver extends server_1.ResolverBase {
|
|
|
13832
13969
|
}
|
|
13833
13970
|
async QueueTask(ID, { dataSource, userPayload }, pubSub) {
|
|
13834
13971
|
this.CheckUserReadPermissions('Queue Tasks', userPayload);
|
|
13835
|
-
const sSQL = `SELECT * FROM [admin].vwQueueTasks WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Queue Tasks', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13836
|
-
|
|
13972
|
+
const sSQL = `SELECT * FROM [admin].[vwQueueTasks] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Queue Tasks', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13973
|
+
const result = this.MapFieldNamesToCodeNames('Queue Tasks', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
13974
|
+
return result;
|
|
13837
13975
|
}
|
|
13838
13976
|
async CreateQueueTask(input, { dataSource, userPayload }, pubSub) {
|
|
13839
13977
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -13851,11 +13989,9 @@ let QueueTaskResolver = class QueueTaskResolver extends server_1.ResolverBase {
|
|
|
13851
13989
|
return null;
|
|
13852
13990
|
}
|
|
13853
13991
|
async BeforeCreate(dataSource, input) {
|
|
13854
|
-
const i = input, d = dataSource;
|
|
13855
13992
|
return true;
|
|
13856
13993
|
}
|
|
13857
13994
|
async AfterCreate(dataSource, input) {
|
|
13858
|
-
const i = input, d = dataSource;
|
|
13859
13995
|
}
|
|
13860
13996
|
async UpdateQueueTask(input, { dataSource, userPayload }, pubSub) {
|
|
13861
13997
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -14064,9 +14200,10 @@ let DashboardResolver = class DashboardResolver extends server_1.ResolverBase {
|
|
|
14064
14200
|
}
|
|
14065
14201
|
async Dashboard(ID, { dataSource, userPayload }, pubSub) {
|
|
14066
14202
|
this.CheckUserReadPermissions('Dashboards', userPayload);
|
|
14067
|
-
const sSQL = `SELECT * FROM [admin].vwDashboards WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Dashboards', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14203
|
+
const sSQL = `SELECT * FROM [admin].[vwDashboards] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Dashboards', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14068
14204
|
this.createRecordAccessAuditLogRecord(userPayload, 'Dashboards', ID);
|
|
14069
|
-
|
|
14205
|
+
const result = this.MapFieldNamesToCodeNames('Dashboards', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
14206
|
+
return result;
|
|
14070
14207
|
}
|
|
14071
14208
|
async CreateDashboard(input, { dataSource, userPayload }, pubSub) {
|
|
14072
14209
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -14084,11 +14221,9 @@ let DashboardResolver = class DashboardResolver extends server_1.ResolverBase {
|
|
|
14084
14221
|
return null;
|
|
14085
14222
|
}
|
|
14086
14223
|
async BeforeCreate(dataSource, input) {
|
|
14087
|
-
const i = input, d = dataSource;
|
|
14088
14224
|
return true;
|
|
14089
14225
|
}
|
|
14090
14226
|
async AfterCreate(dataSource, input) {
|
|
14091
|
-
const i = input, d = dataSource;
|
|
14092
14227
|
}
|
|
14093
14228
|
async UpdateDashboard(input, { dataSource, userPayload }, pubSub) {
|
|
14094
14229
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -14115,9 +14250,10 @@ let DashboardResolver = class DashboardResolver extends server_1.ResolverBase {
|
|
|
14115
14250
|
if (await this.BeforeDelete(dataSource, ID)) {
|
|
14116
14251
|
const entityObject = await new core_1.Metadata().GetEntityObject('Dashboards', this.GetUserFromPayload(userPayload));
|
|
14117
14252
|
await entityObject.Load(ID);
|
|
14253
|
+
const returnValue = entityObject.GetAll();
|
|
14118
14254
|
if (await entityObject.Delete()) {
|
|
14119
14255
|
await this.AfterDelete(dataSource, ID);
|
|
14120
|
-
return
|
|
14256
|
+
return returnValue;
|
|
14121
14257
|
}
|
|
14122
14258
|
else
|
|
14123
14259
|
return null;
|
|
@@ -14188,7 +14324,7 @@ __decorate([
|
|
|
14188
14324
|
__metadata("design:returntype", Promise)
|
|
14189
14325
|
], DashboardResolver.prototype, "UpdateDashboard", null);
|
|
14190
14326
|
__decorate([
|
|
14191
|
-
(0, server_1.Mutation)(() =>
|
|
14327
|
+
(0, server_1.Mutation)(() => Dashboard_),
|
|
14192
14328
|
__param(0, (0, server_1.Arg)('ID', () => server_1.Int)),
|
|
14193
14329
|
__param(1, (0, server_1.Ctx)()),
|
|
14194
14330
|
__param(2, (0, server_1.PubSub)()),
|
|
@@ -14270,14 +14406,16 @@ let OutputTriggerTypeResolver = class OutputTriggerTypeResolver extends server_1
|
|
|
14270
14406
|
}
|
|
14271
14407
|
async OutputTriggerType(ID, { dataSource, userPayload }, pubSub) {
|
|
14272
14408
|
this.CheckUserReadPermissions('Output Trigger Types', userPayload);
|
|
14273
|
-
const sSQL = `SELECT * FROM [admin].vwOutputTriggerTypes WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Output Trigger Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14409
|
+
const sSQL = `SELECT * FROM [admin].[vwOutputTriggerTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Output Trigger Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14274
14410
|
this.createRecordAccessAuditLogRecord(userPayload, 'Output Trigger Types', ID);
|
|
14275
|
-
|
|
14411
|
+
const result = this.MapFieldNamesToCodeNames('Output Trigger Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
14412
|
+
return result;
|
|
14276
14413
|
}
|
|
14277
14414
|
async ReportsArray(outputtriggertype_, { dataSource, userPayload }, pubSub) {
|
|
14278
14415
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
14279
|
-
const sSQL = `SELECT * FROM [admin].[vwReports] WHERE OutputTriggerTypeID=${outputtriggertype_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14280
|
-
|
|
14416
|
+
const sSQL = `SELECT * FROM [admin].[vwReports] WHERE [OutputTriggerTypeID]=${outputtriggertype_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14417
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
14418
|
+
return result;
|
|
14281
14419
|
}
|
|
14282
14420
|
};
|
|
14283
14421
|
__decorate([
|
|
@@ -14403,14 +14541,16 @@ let OutputFormatTypeResolver = class OutputFormatTypeResolver extends server_1.R
|
|
|
14403
14541
|
}
|
|
14404
14542
|
async OutputFormatType(ID, { dataSource, userPayload }, pubSub) {
|
|
14405
14543
|
this.CheckUserReadPermissions('Output Format Types', userPayload);
|
|
14406
|
-
const sSQL = `SELECT * FROM [admin].vwOutputFormatTypes WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Output Format Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14544
|
+
const sSQL = `SELECT * FROM [admin].[vwOutputFormatTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Output Format Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14407
14545
|
this.createRecordAccessAuditLogRecord(userPayload, 'Output Format Types', ID);
|
|
14408
|
-
|
|
14546
|
+
const result = this.MapFieldNamesToCodeNames('Output Format Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
14547
|
+
return result;
|
|
14409
14548
|
}
|
|
14410
14549
|
async ReportsArray(outputformattype_, { dataSource, userPayload }, pubSub) {
|
|
14411
14550
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
14412
|
-
const sSQL = `SELECT * FROM [admin].[vwReports] WHERE OutputFormatTypeID=${outputformattype_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14413
|
-
|
|
14551
|
+
const sSQL = `SELECT * FROM [admin].[vwReports] WHERE [OutputFormatTypeID]=${outputformattype_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14552
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
14553
|
+
return result;
|
|
14414
14554
|
}
|
|
14415
14555
|
};
|
|
14416
14556
|
__decorate([
|
|
@@ -14532,14 +14672,16 @@ let OutputDeliveryTypeResolver = class OutputDeliveryTypeResolver extends server
|
|
|
14532
14672
|
}
|
|
14533
14673
|
async OutputDeliveryType(ID, { dataSource, userPayload }, pubSub) {
|
|
14534
14674
|
this.CheckUserReadPermissions('Output Delivery Types', userPayload);
|
|
14535
|
-
const sSQL = `SELECT * FROM [admin].vwOutputDeliveryTypes WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Output Delivery Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14675
|
+
const sSQL = `SELECT * FROM [admin].[vwOutputDeliveryTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Output Delivery Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14536
14676
|
this.createRecordAccessAuditLogRecord(userPayload, 'Output Delivery Types', ID);
|
|
14537
|
-
|
|
14677
|
+
const result = this.MapFieldNamesToCodeNames('Output Delivery Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
14678
|
+
return result;
|
|
14538
14679
|
}
|
|
14539
14680
|
async ReportsArray(outputdeliverytype_, { dataSource, userPayload }, pubSub) {
|
|
14540
14681
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
14541
|
-
const sSQL = `SELECT * FROM [admin].[vwReports] WHERE OutputDeliveryTypeID=${outputdeliverytype_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14542
|
-
|
|
14682
|
+
const sSQL = `SELECT * FROM [admin].[vwReports] WHERE [OutputDeliveryTypeID]=${outputdeliverytype_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14683
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
14684
|
+
return result;
|
|
14543
14685
|
}
|
|
14544
14686
|
};
|
|
14545
14687
|
__decorate([
|
|
@@ -14892,13 +15034,15 @@ let ReportResolver = class ReportResolver extends server_1.ResolverBase {
|
|
|
14892
15034
|
}
|
|
14893
15035
|
async Report(ID, { dataSource, userPayload }, pubSub) {
|
|
14894
15036
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
14895
|
-
const sSQL = `SELECT * FROM [admin].vwReports WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14896
|
-
|
|
15037
|
+
const sSQL = `SELECT * FROM [admin].[vwReports] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15038
|
+
const result = this.MapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
15039
|
+
return result;
|
|
14897
15040
|
}
|
|
14898
15041
|
async ReportSnapshotsArray(report_, { dataSource, userPayload }, pubSub) {
|
|
14899
15042
|
this.CheckUserReadPermissions('Report Snapshots', userPayload);
|
|
14900
|
-
const sSQL = `SELECT * FROM [admin].[vwReportSnapshots] WHERE ReportID=${report_.ID} ` + this.getRowLevelSecurityWhereClause('Report Snapshots', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14901
|
-
|
|
15043
|
+
const sSQL = `SELECT * FROM [admin].[vwReportSnapshots] WHERE [ReportID]=${report_.ID} ` + this.getRowLevelSecurityWhereClause('Report Snapshots', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15044
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Report Snapshots', await dataSource.query(sSQL));
|
|
15045
|
+
return result;
|
|
14902
15046
|
}
|
|
14903
15047
|
async CreateReport(input, { dataSource, userPayload }, pubSub) {
|
|
14904
15048
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -14916,11 +15060,9 @@ let ReportResolver = class ReportResolver extends server_1.ResolverBase {
|
|
|
14916
15060
|
return null;
|
|
14917
15061
|
}
|
|
14918
15062
|
async BeforeCreate(dataSource, input) {
|
|
14919
|
-
const i = input, d = dataSource;
|
|
14920
15063
|
return true;
|
|
14921
15064
|
}
|
|
14922
15065
|
async AfterCreate(dataSource, input) {
|
|
14923
|
-
const i = input, d = dataSource;
|
|
14924
15066
|
}
|
|
14925
15067
|
async UpdateReport(input, { dataSource, userPayload }, pubSub) {
|
|
14926
15068
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -14947,9 +15089,10 @@ let ReportResolver = class ReportResolver extends server_1.ResolverBase {
|
|
|
14947
15089
|
if (await this.BeforeDelete(dataSource, ID)) {
|
|
14948
15090
|
const entityObject = await new core_1.Metadata().GetEntityObject('Reports', this.GetUserFromPayload(userPayload));
|
|
14949
15091
|
await entityObject.Load(ID);
|
|
15092
|
+
const returnValue = entityObject.GetAll();
|
|
14950
15093
|
if (await entityObject.Delete()) {
|
|
14951
15094
|
await this.AfterDelete(dataSource, ID);
|
|
14952
|
-
return
|
|
15095
|
+
return returnValue;
|
|
14953
15096
|
}
|
|
14954
15097
|
else
|
|
14955
15098
|
return null;
|
|
@@ -15029,7 +15172,7 @@ __decorate([
|
|
|
15029
15172
|
__metadata("design:returntype", Promise)
|
|
15030
15173
|
], ReportResolver.prototype, "UpdateReport", null);
|
|
15031
15174
|
__decorate([
|
|
15032
|
-
(0, server_1.Mutation)(() =>
|
|
15175
|
+
(0, server_1.Mutation)(() => Report_),
|
|
15033
15176
|
__param(0, (0, server_1.Arg)('ID', () => server_1.Int)),
|
|
15034
15177
|
__param(1, (0, server_1.Ctx)()),
|
|
15035
15178
|
__param(2, (0, server_1.PubSub)()),
|
|
@@ -15165,8 +15308,9 @@ let ReportSnapshotResolver = class ReportSnapshotResolver extends server_1.Resol
|
|
|
15165
15308
|
}
|
|
15166
15309
|
async ReportSnapshot(ID, { dataSource, userPayload }, pubSub) {
|
|
15167
15310
|
this.CheckUserReadPermissions('Report Snapshots', userPayload);
|
|
15168
|
-
const sSQL = `SELECT * FROM [admin].vwReportSnapshots WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Report Snapshots', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15169
|
-
|
|
15311
|
+
const sSQL = `SELECT * FROM [admin].[vwReportSnapshots] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Report Snapshots', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15312
|
+
const result = this.MapFieldNamesToCodeNames('Report Snapshots', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
15313
|
+
return result;
|
|
15170
15314
|
}
|
|
15171
15315
|
async CreateReportSnapshot(input, { dataSource, userPayload }, pubSub) {
|
|
15172
15316
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -15184,11 +15328,9 @@ let ReportSnapshotResolver = class ReportSnapshotResolver extends server_1.Resol
|
|
|
15184
15328
|
return null;
|
|
15185
15329
|
}
|
|
15186
15330
|
async BeforeCreate(dataSource, input) {
|
|
15187
|
-
const i = input, d = dataSource;
|
|
15188
15331
|
return true;
|
|
15189
15332
|
}
|
|
15190
15333
|
async AfterCreate(dataSource, input) {
|
|
15191
|
-
const i = input, d = dataSource;
|
|
15192
15334
|
}
|
|
15193
15335
|
async UpdateReportSnapshot(input, { dataSource, userPayload }, pubSub) {
|
|
15194
15336
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -15215,9 +15357,10 @@ let ReportSnapshotResolver = class ReportSnapshotResolver extends server_1.Resol
|
|
|
15215
15357
|
if (await this.BeforeDelete(dataSource, ID)) {
|
|
15216
15358
|
const entityObject = await new core_1.Metadata().GetEntityObject('Report Snapshots', this.GetUserFromPayload(userPayload));
|
|
15217
15359
|
await entityObject.Load(ID);
|
|
15360
|
+
const returnValue = entityObject.GetAll();
|
|
15218
15361
|
if (await entityObject.Delete()) {
|
|
15219
15362
|
await this.AfterDelete(dataSource, ID);
|
|
15220
|
-
return
|
|
15363
|
+
return returnValue;
|
|
15221
15364
|
}
|
|
15222
15365
|
else
|
|
15223
15366
|
return null;
|
|
@@ -15288,7 +15431,7 @@ __decorate([
|
|
|
15288
15431
|
__metadata("design:returntype", Promise)
|
|
15289
15432
|
], ReportSnapshotResolver.prototype, "UpdateReportSnapshot", null);
|
|
15290
15433
|
__decorate([
|
|
15291
|
-
(0, server_1.Mutation)(() =>
|
|
15434
|
+
(0, server_1.Mutation)(() => ReportSnapshot_),
|
|
15292
15435
|
__param(0, (0, server_1.Arg)('ID', () => server_1.Int)),
|
|
15293
15436
|
__param(1, (0, server_1.Ctx)()),
|
|
15294
15437
|
__param(2, (0, server_1.PubSub)()),
|
|
@@ -15403,19 +15546,22 @@ let ResourceTypeResolver = class ResourceTypeResolver extends server_1.ResolverB
|
|
|
15403
15546
|
}
|
|
15404
15547
|
async ResourceType(ID, { dataSource, userPayload }, pubSub) {
|
|
15405
15548
|
this.CheckUserReadPermissions('Resource Types', userPayload);
|
|
15406
|
-
const sSQL = `SELECT * FROM [admin].vwResourceTypes WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Resource Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15549
|
+
const sSQL = `SELECT * FROM [admin].[vwResourceTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Resource Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15407
15550
|
this.createRecordAccessAuditLogRecord(userPayload, 'Resource Types', ID);
|
|
15408
|
-
|
|
15551
|
+
const result = this.MapFieldNamesToCodeNames('Resource Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
15552
|
+
return result;
|
|
15409
15553
|
}
|
|
15410
15554
|
async WorkspaceItemsArray(resourcetype_, { dataSource, userPayload }, pubSub) {
|
|
15411
15555
|
this.CheckUserReadPermissions('Workspace Items', userPayload);
|
|
15412
|
-
const sSQL = `SELECT * FROM [admin].[vwWorkspaceItems] WHERE ResourceTypeID=${resourcetype_.ID} ` + this.getRowLevelSecurityWhereClause('Workspace Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15413
|
-
|
|
15556
|
+
const sSQL = `SELECT * FROM [admin].[vwWorkspaceItems] WHERE [ResourceTypeID]=${resourcetype_.ID} ` + this.getRowLevelSecurityWhereClause('Workspace Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15557
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Workspace Items', await dataSource.query(sSQL));
|
|
15558
|
+
return result;
|
|
15414
15559
|
}
|
|
15415
15560
|
async ResourceFoldersArray(resourcetype_, { dataSource, userPayload }, pubSub) {
|
|
15416
15561
|
this.CheckUserReadPermissions('Resource Folders', userPayload);
|
|
15417
|
-
const sSQL = `SELECT * FROM [admin].[vwResourceFolders] WHERE ResourceTypeName=${resourcetype_.ID} ` + this.getRowLevelSecurityWhereClause('Resource Folders', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15418
|
-
|
|
15562
|
+
const sSQL = `SELECT * FROM [admin].[vwResourceFolders] WHERE [ResourceTypeName]=${resourcetype_.ID} ` + this.getRowLevelSecurityWhereClause('Resource Folders', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15563
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Resource Folders', await dataSource.query(sSQL));
|
|
15564
|
+
return result;
|
|
15419
15565
|
}
|
|
15420
15566
|
};
|
|
15421
15567
|
__decorate([
|
|
@@ -15564,19 +15710,22 @@ let TagResolver = class TagResolver extends server_1.ResolverBase {
|
|
|
15564
15710
|
}
|
|
15565
15711
|
async Tag(ID, { dataSource, userPayload }, pubSub) {
|
|
15566
15712
|
this.CheckUserReadPermissions('Tags', userPayload);
|
|
15567
|
-
const sSQL = `SELECT * FROM [admin].vwTags WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Tags', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15713
|
+
const sSQL = `SELECT * FROM [admin].[vwTags] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Tags', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15568
15714
|
this.createRecordAccessAuditLogRecord(userPayload, 'Tags', ID);
|
|
15569
|
-
|
|
15715
|
+
const result = this.MapFieldNamesToCodeNames('Tags', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
15716
|
+
return result;
|
|
15570
15717
|
}
|
|
15571
15718
|
async TagsArray(tag_, { dataSource, userPayload }, pubSub) {
|
|
15572
15719
|
this.CheckUserReadPermissions('Tags', userPayload);
|
|
15573
|
-
const sSQL = `SELECT * FROM [admin].[vwTags] WHERE ParentID=${tag_.ID} ` + this.getRowLevelSecurityWhereClause('Tags', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15574
|
-
|
|
15720
|
+
const sSQL = `SELECT * FROM [admin].[vwTags] WHERE [ParentID]=${tag_.ID} ` + this.getRowLevelSecurityWhereClause('Tags', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15721
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Tags', await dataSource.query(sSQL));
|
|
15722
|
+
return result;
|
|
15575
15723
|
}
|
|
15576
15724
|
async TaggedItemsArray(tag_, { dataSource, userPayload }, pubSub) {
|
|
15577
15725
|
this.CheckUserReadPermissions('Tagged Items', userPayload);
|
|
15578
|
-
const sSQL = `SELECT * FROM [admin].[vwTaggedItems] WHERE TagID=${tag_.ID} ` + this.getRowLevelSecurityWhereClause('Tagged Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15579
|
-
|
|
15726
|
+
const sSQL = `SELECT * FROM [admin].[vwTaggedItems] WHERE [TagID]=${tag_.ID} ` + this.getRowLevelSecurityWhereClause('Tagged Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15727
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Tagged Items', await dataSource.query(sSQL));
|
|
15728
|
+
return result;
|
|
15580
15729
|
}
|
|
15581
15730
|
};
|
|
15582
15731
|
__decorate([
|
|
@@ -15717,9 +15866,10 @@ let TaggedItemResolver = class TaggedItemResolver extends server_1.ResolverBase
|
|
|
15717
15866
|
}
|
|
15718
15867
|
async TaggedItem(ID, { dataSource, userPayload }, pubSub) {
|
|
15719
15868
|
this.CheckUserReadPermissions('Tagged Items', userPayload);
|
|
15720
|
-
const sSQL = `SELECT * FROM [admin].vwTaggedItems WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Tagged Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15869
|
+
const sSQL = `SELECT * FROM [admin].[vwTaggedItems] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Tagged Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15721
15870
|
this.createRecordAccessAuditLogRecord(userPayload, 'Tagged Items', ID);
|
|
15722
|
-
|
|
15871
|
+
const result = this.MapFieldNamesToCodeNames('Tagged Items', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
15872
|
+
return result;
|
|
15723
15873
|
}
|
|
15724
15874
|
};
|
|
15725
15875
|
__decorate([
|
|
@@ -15881,14 +16031,16 @@ let WorkspaceResolver = class WorkspaceResolver extends server_1.ResolverBase {
|
|
|
15881
16031
|
}
|
|
15882
16032
|
async Workspace(ID, { dataSource, userPayload }, pubSub) {
|
|
15883
16033
|
this.CheckUserReadPermissions('Workspaces', userPayload);
|
|
15884
|
-
const sSQL = `SELECT * FROM [admin].vwWorkspaces WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Workspaces', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16034
|
+
const sSQL = `SELECT * FROM [admin].[vwWorkspaces] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Workspaces', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15885
16035
|
this.createRecordAccessAuditLogRecord(userPayload, 'Workspaces', ID);
|
|
15886
|
-
|
|
16036
|
+
const result = this.MapFieldNamesToCodeNames('Workspaces', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
16037
|
+
return result;
|
|
15887
16038
|
}
|
|
15888
16039
|
async WorkspaceItemsArray(workspace_, { dataSource, userPayload }, pubSub) {
|
|
15889
16040
|
this.CheckUserReadPermissions('Workspace Items', userPayload);
|
|
15890
|
-
const sSQL = `SELECT * FROM [admin].[vwWorkspaceItems] WHERE WorkSpaceID=${workspace_.ID} ` + this.getRowLevelSecurityWhereClause('Workspace Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15891
|
-
|
|
16041
|
+
const sSQL = `SELECT * FROM [admin].[vwWorkspaceItems] WHERE [WorkSpaceID]=${workspace_.ID} ` + this.getRowLevelSecurityWhereClause('Workspace Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16042
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Workspace Items', await dataSource.query(sSQL));
|
|
16043
|
+
return result;
|
|
15892
16044
|
}
|
|
15893
16045
|
async CreateWorkspace(input, { dataSource, userPayload }, pubSub) {
|
|
15894
16046
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -15906,11 +16058,9 @@ let WorkspaceResolver = class WorkspaceResolver extends server_1.ResolverBase {
|
|
|
15906
16058
|
return null;
|
|
15907
16059
|
}
|
|
15908
16060
|
async BeforeCreate(dataSource, input) {
|
|
15909
|
-
const i = input, d = dataSource;
|
|
15910
16061
|
return true;
|
|
15911
16062
|
}
|
|
15912
16063
|
async AfterCreate(dataSource, input) {
|
|
15913
|
-
const i = input, d = dataSource;
|
|
15914
16064
|
}
|
|
15915
16065
|
async UpdateWorkspace(input, { dataSource, userPayload }, pubSub) {
|
|
15916
16066
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -15937,9 +16087,10 @@ let WorkspaceResolver = class WorkspaceResolver extends server_1.ResolverBase {
|
|
|
15937
16087
|
if (await this.BeforeDelete(dataSource, ID)) {
|
|
15938
16088
|
const entityObject = await new core_1.Metadata().GetEntityObject('Workspaces', this.GetUserFromPayload(userPayload));
|
|
15939
16089
|
await entityObject.Load(ID);
|
|
16090
|
+
const returnValue = entityObject.GetAll();
|
|
15940
16091
|
if (await entityObject.Delete()) {
|
|
15941
16092
|
await this.AfterDelete(dataSource, ID);
|
|
15942
|
-
return
|
|
16093
|
+
return returnValue;
|
|
15943
16094
|
}
|
|
15944
16095
|
else
|
|
15945
16096
|
return null;
|
|
@@ -16019,7 +16170,7 @@ __decorate([
|
|
|
16019
16170
|
__metadata("design:returntype", Promise)
|
|
16020
16171
|
], WorkspaceResolver.prototype, "UpdateWorkspace", null);
|
|
16021
16172
|
__decorate([
|
|
16022
|
-
(0, server_1.Mutation)(() =>
|
|
16173
|
+
(0, server_1.Mutation)(() => Workspace_),
|
|
16023
16174
|
__param(0, (0, server_1.Arg)('ID', () => server_1.Int)),
|
|
16024
16175
|
__param(1, (0, server_1.Ctx)()),
|
|
16025
16176
|
__param(2, (0, server_1.PubSub)()),
|
|
@@ -16200,9 +16351,10 @@ let WorkspaceItemResolver = class WorkspaceItemResolver extends server_1.Resolve
|
|
|
16200
16351
|
}
|
|
16201
16352
|
async WorkspaceItem(ID, { dataSource, userPayload }, pubSub) {
|
|
16202
16353
|
this.CheckUserReadPermissions('Workspace Items', userPayload);
|
|
16203
|
-
const sSQL = `SELECT * FROM [admin].vwWorkspaceItems WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Workspace Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16354
|
+
const sSQL = `SELECT * FROM [admin].[vwWorkspaceItems] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Workspace Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16204
16355
|
this.createRecordAccessAuditLogRecord(userPayload, 'Workspace Items', ID);
|
|
16205
|
-
|
|
16356
|
+
const result = this.MapFieldNamesToCodeNames('Workspace Items', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
16357
|
+
return result;
|
|
16206
16358
|
}
|
|
16207
16359
|
async CreateWorkspaceItem(input, { dataSource, userPayload }, pubSub) {
|
|
16208
16360
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -16220,11 +16372,9 @@ let WorkspaceItemResolver = class WorkspaceItemResolver extends server_1.Resolve
|
|
|
16220
16372
|
return null;
|
|
16221
16373
|
}
|
|
16222
16374
|
async BeforeCreate(dataSource, input) {
|
|
16223
|
-
const i = input, d = dataSource;
|
|
16224
16375
|
return true;
|
|
16225
16376
|
}
|
|
16226
16377
|
async AfterCreate(dataSource, input) {
|
|
16227
|
-
const i = input, d = dataSource;
|
|
16228
16378
|
}
|
|
16229
16379
|
async UpdateWorkspaceItem(input, { dataSource, userPayload }, pubSub) {
|
|
16230
16380
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -16251,9 +16401,10 @@ let WorkspaceItemResolver = class WorkspaceItemResolver extends server_1.Resolve
|
|
|
16251
16401
|
if (await this.BeforeDelete(dataSource, ID)) {
|
|
16252
16402
|
const entityObject = await new core_1.Metadata().GetEntityObject('Workspace Items', this.GetUserFromPayload(userPayload));
|
|
16253
16403
|
await entityObject.Load(ID);
|
|
16404
|
+
const returnValue = entityObject.GetAll();
|
|
16254
16405
|
if (await entityObject.Delete()) {
|
|
16255
16406
|
await this.AfterDelete(dataSource, ID);
|
|
16256
|
-
return
|
|
16407
|
+
return returnValue;
|
|
16257
16408
|
}
|
|
16258
16409
|
else
|
|
16259
16410
|
return null;
|
|
@@ -16324,7 +16475,7 @@ __decorate([
|
|
|
16324
16475
|
__metadata("design:returntype", Promise)
|
|
16325
16476
|
], WorkspaceItemResolver.prototype, "UpdateWorkspaceItem", null);
|
|
16326
16477
|
__decorate([
|
|
16327
|
-
(0, server_1.Mutation)(() =>
|
|
16478
|
+
(0, server_1.Mutation)(() => WorkspaceItem_),
|
|
16328
16479
|
__param(0, (0, server_1.Arg)('ID', () => server_1.Int)),
|
|
16329
16480
|
__param(1, (0, server_1.Ctx)()),
|
|
16330
16481
|
__param(2, (0, server_1.PubSub)()),
|
|
@@ -16416,13 +16567,15 @@ let DatasetResolver = class DatasetResolver extends server_1.ResolverBase {
|
|
|
16416
16567
|
}
|
|
16417
16568
|
async Dataset(ID, { dataSource, userPayload }, pubSub) {
|
|
16418
16569
|
this.CheckUserReadPermissions('Datasets', userPayload);
|
|
16419
|
-
const sSQL = `SELECT * FROM [admin].vwDatasets WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Datasets', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16420
|
-
|
|
16570
|
+
const sSQL = `SELECT * FROM [admin].[vwDatasets] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Datasets', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16571
|
+
const result = this.MapFieldNamesToCodeNames('Datasets', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
16572
|
+
return result;
|
|
16421
16573
|
}
|
|
16422
16574
|
async DatasetItemsArray(dataset_, { dataSource, userPayload }, pubSub) {
|
|
16423
16575
|
this.CheckUserReadPermissions('Dataset Items', userPayload);
|
|
16424
|
-
const sSQL = `SELECT * FROM [admin].[vwDatasetItems] WHERE DatasetName=${dataset_.ID} ` + this.getRowLevelSecurityWhereClause('Dataset Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16425
|
-
|
|
16576
|
+
const sSQL = `SELECT * FROM [admin].[vwDatasetItems] WHERE [DatasetName]=${dataset_.ID} ` + this.getRowLevelSecurityWhereClause('Dataset Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16577
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Dataset Items', await dataSource.query(sSQL));
|
|
16578
|
+
return result;
|
|
16426
16579
|
}
|
|
16427
16580
|
};
|
|
16428
16581
|
__decorate([
|
|
@@ -16577,8 +16730,9 @@ let DatasetItemResolver = class DatasetItemResolver extends server_1.ResolverBas
|
|
|
16577
16730
|
}
|
|
16578
16731
|
async DatasetItem(ID, { dataSource, userPayload }, pubSub) {
|
|
16579
16732
|
this.CheckUserReadPermissions('Dataset Items', userPayload);
|
|
16580
|
-
const sSQL = `SELECT * FROM [admin].vwDatasetItems WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Dataset Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16581
|
-
|
|
16733
|
+
const sSQL = `SELECT * FROM [admin].[vwDatasetItems] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Dataset Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16734
|
+
const result = this.MapFieldNamesToCodeNames('Dataset Items', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
16735
|
+
return result;
|
|
16582
16736
|
}
|
|
16583
16737
|
};
|
|
16584
16738
|
__decorate([
|
|
@@ -16775,13 +16929,15 @@ let ConversationDetailResolver = class ConversationDetailResolver extends server
|
|
|
16775
16929
|
}
|
|
16776
16930
|
async ConversationDetail(ID, { dataSource, userPayload }, pubSub) {
|
|
16777
16931
|
this.CheckUserReadPermissions('Conversation Details', userPayload);
|
|
16778
|
-
const sSQL = `SELECT * FROM [admin].vwConversationDetails WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Conversation Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16779
|
-
|
|
16932
|
+
const sSQL = `SELECT * FROM [admin].[vwConversationDetails] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Conversation Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16933
|
+
const result = this.MapFieldNamesToCodeNames('Conversation Details', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
16934
|
+
return result;
|
|
16780
16935
|
}
|
|
16781
16936
|
async ReportsArray(conversationdetail_, { dataSource, userPayload }, pubSub) {
|
|
16782
16937
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
16783
|
-
const sSQL = `SELECT * FROM [admin].[vwReports] WHERE ConversationDetailID=${conversationdetail_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16784
|
-
|
|
16938
|
+
const sSQL = `SELECT * FROM [admin].[vwReports] WHERE [ConversationDetailID]=${conversationdetail_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16939
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
16940
|
+
return result;
|
|
16785
16941
|
}
|
|
16786
16942
|
async CreateConversationDetail(input, { dataSource, userPayload }, pubSub) {
|
|
16787
16943
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -16799,11 +16955,9 @@ let ConversationDetailResolver = class ConversationDetailResolver extends server
|
|
|
16799
16955
|
return null;
|
|
16800
16956
|
}
|
|
16801
16957
|
async BeforeCreate(dataSource, input) {
|
|
16802
|
-
const i = input, d = dataSource;
|
|
16803
16958
|
return true;
|
|
16804
16959
|
}
|
|
16805
16960
|
async AfterCreate(dataSource, input) {
|
|
16806
|
-
const i = input, d = dataSource;
|
|
16807
16961
|
}
|
|
16808
16962
|
async UpdateConversationDetail(input, { dataSource, userPayload }, pubSub) {
|
|
16809
16963
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -16830,9 +16984,10 @@ let ConversationDetailResolver = class ConversationDetailResolver extends server
|
|
|
16830
16984
|
if (await this.BeforeDelete(dataSource, ID)) {
|
|
16831
16985
|
const entityObject = await new core_1.Metadata().GetEntityObject('Conversation Details', this.GetUserFromPayload(userPayload));
|
|
16832
16986
|
await entityObject.Load(ID);
|
|
16987
|
+
const returnValue = entityObject.GetAll();
|
|
16833
16988
|
if (await entityObject.Delete()) {
|
|
16834
16989
|
await this.AfterDelete(dataSource, ID);
|
|
16835
|
-
return
|
|
16990
|
+
return returnValue;
|
|
16836
16991
|
}
|
|
16837
16992
|
else
|
|
16838
16993
|
return null;
|
|
@@ -16912,7 +17067,7 @@ __decorate([
|
|
|
16912
17067
|
__metadata("design:returntype", Promise)
|
|
16913
17068
|
], ConversationDetailResolver.prototype, "UpdateConversationDetail", null);
|
|
16914
17069
|
__decorate([
|
|
16915
|
-
(0, server_1.Mutation)(() =>
|
|
17070
|
+
(0, server_1.Mutation)(() => ConversationDetail_),
|
|
16916
17071
|
__param(0, (0, server_1.Arg)('ID', () => server_1.Int)),
|
|
16917
17072
|
__param(1, (0, server_1.Ctx)()),
|
|
16918
17073
|
__param(2, (0, server_1.PubSub)()),
|
|
@@ -17058,18 +17213,21 @@ let ConversationResolver = class ConversationResolver extends server_1.ResolverB
|
|
|
17058
17213
|
}
|
|
17059
17214
|
async Conversation(ID, { dataSource, userPayload }, pubSub) {
|
|
17060
17215
|
this.CheckUserReadPermissions('Conversations', userPayload);
|
|
17061
|
-
const sSQL = `SELECT * FROM [admin].vwConversations WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Conversations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17062
|
-
|
|
17216
|
+
const sSQL = `SELECT * FROM [admin].[vwConversations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Conversations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17217
|
+
const result = this.MapFieldNamesToCodeNames('Conversations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
17218
|
+
return result;
|
|
17063
17219
|
}
|
|
17064
17220
|
async ConversationDetailsArray(conversation_, { dataSource, userPayload }, pubSub) {
|
|
17065
17221
|
this.CheckUserReadPermissions('Conversation Details', userPayload);
|
|
17066
|
-
const sSQL = `SELECT * FROM [admin].[vwConversationDetails] WHERE ConversationID=${conversation_.ID} ` + this.getRowLevelSecurityWhereClause('Conversation Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17067
|
-
|
|
17222
|
+
const sSQL = `SELECT * FROM [admin].[vwConversationDetails] WHERE [ConversationID]=${conversation_.ID} ` + this.getRowLevelSecurityWhereClause('Conversation Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17223
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Conversation Details', await dataSource.query(sSQL));
|
|
17224
|
+
return result;
|
|
17068
17225
|
}
|
|
17069
17226
|
async ReportsArray(conversation_, { dataSource, userPayload }, pubSub) {
|
|
17070
17227
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
17071
|
-
const sSQL = `SELECT * FROM [admin].[vwReports] WHERE ConversationID=${conversation_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17072
|
-
|
|
17228
|
+
const sSQL = `SELECT * FROM [admin].[vwReports] WHERE [ConversationID]=${conversation_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17229
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
17230
|
+
return result;
|
|
17073
17231
|
}
|
|
17074
17232
|
async CreateConversation(input, { dataSource, userPayload }, pubSub) {
|
|
17075
17233
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -17087,11 +17245,9 @@ let ConversationResolver = class ConversationResolver extends server_1.ResolverB
|
|
|
17087
17245
|
return null;
|
|
17088
17246
|
}
|
|
17089
17247
|
async BeforeCreate(dataSource, input) {
|
|
17090
|
-
const i = input, d = dataSource;
|
|
17091
17248
|
return true;
|
|
17092
17249
|
}
|
|
17093
17250
|
async AfterCreate(dataSource, input) {
|
|
17094
|
-
const i = input, d = dataSource;
|
|
17095
17251
|
}
|
|
17096
17252
|
async UpdateConversation(input, { dataSource, userPayload }, pubSub) {
|
|
17097
17253
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -17118,9 +17274,10 @@ let ConversationResolver = class ConversationResolver extends server_1.ResolverB
|
|
|
17118
17274
|
if (await this.BeforeDelete(dataSource, ID)) {
|
|
17119
17275
|
const entityObject = await new core_1.Metadata().GetEntityObject('Conversations', this.GetUserFromPayload(userPayload));
|
|
17120
17276
|
await entityObject.Load(ID);
|
|
17277
|
+
const returnValue = entityObject.GetAll();
|
|
17121
17278
|
if (await entityObject.Delete()) {
|
|
17122
17279
|
await this.AfterDelete(dataSource, ID);
|
|
17123
|
-
return
|
|
17280
|
+
return returnValue;
|
|
17124
17281
|
}
|
|
17125
17282
|
else
|
|
17126
17283
|
return null;
|
|
@@ -17209,7 +17366,7 @@ __decorate([
|
|
|
17209
17366
|
__metadata("design:returntype", Promise)
|
|
17210
17367
|
], ConversationResolver.prototype, "UpdateConversation", null);
|
|
17211
17368
|
__decorate([
|
|
17212
|
-
(0, server_1.Mutation)(() =>
|
|
17369
|
+
(0, server_1.Mutation)(() => Conversation_),
|
|
17213
17370
|
__param(0, (0, server_1.Arg)('ID', () => server_1.Int)),
|
|
17214
17371
|
__param(1, (0, server_1.Ctx)()),
|
|
17215
17372
|
__param(2, (0, server_1.PubSub)()),
|
|
@@ -17407,8 +17564,9 @@ let UserNotificationResolver = class UserNotificationResolver extends server_1.R
|
|
|
17407
17564
|
}
|
|
17408
17565
|
async UserNotification(ID, { dataSource, userPayload }, pubSub) {
|
|
17409
17566
|
this.CheckUserReadPermissions('User Notifications', userPayload);
|
|
17410
|
-
const sSQL = `SELECT * FROM [admin].vwUserNotifications WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('User Notifications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17411
|
-
|
|
17567
|
+
const sSQL = `SELECT * FROM [admin].[vwUserNotifications] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Notifications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17568
|
+
const result = this.MapFieldNamesToCodeNames('User Notifications', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
17569
|
+
return result;
|
|
17412
17570
|
}
|
|
17413
17571
|
async CreateUserNotification(input, { dataSource, userPayload }, pubSub) {
|
|
17414
17572
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -17426,11 +17584,9 @@ let UserNotificationResolver = class UserNotificationResolver extends server_1.R
|
|
|
17426
17584
|
return null;
|
|
17427
17585
|
}
|
|
17428
17586
|
async BeforeCreate(dataSource, input) {
|
|
17429
|
-
const i = input, d = dataSource;
|
|
17430
17587
|
return true;
|
|
17431
17588
|
}
|
|
17432
17589
|
async AfterCreate(dataSource, input) {
|
|
17433
|
-
const i = input, d = dataSource;
|
|
17434
17590
|
}
|
|
17435
17591
|
async UpdateUserNotification(input, { dataSource, userPayload }, pubSub) {
|
|
17436
17592
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -17671,13 +17827,15 @@ let ResourceFolderResolver = class ResourceFolderResolver extends server_1.Resol
|
|
|
17671
17827
|
}
|
|
17672
17828
|
async ResourceFolder(ID, { dataSource, userPayload }, pubSub) {
|
|
17673
17829
|
this.CheckUserReadPermissions('Resource Folders', userPayload);
|
|
17674
|
-
const sSQL = `SELECT * FROM [admin].vwResourceFolders WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Resource Folders', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17675
|
-
|
|
17830
|
+
const sSQL = `SELECT * FROM [admin].[vwResourceFolders] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Resource Folders', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17831
|
+
const result = this.MapFieldNamesToCodeNames('Resource Folders', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
17832
|
+
return result;
|
|
17676
17833
|
}
|
|
17677
17834
|
async ResourceFoldersArray(resourcefolder_, { dataSource, userPayload }, pubSub) {
|
|
17678
17835
|
this.CheckUserReadPermissions('Resource Folders', userPayload);
|
|
17679
|
-
const sSQL = `SELECT * FROM [admin].[vwResourceFolders] WHERE ParentID=${resourcefolder_.ID} ` + this.getRowLevelSecurityWhereClause('Resource Folders', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17680
|
-
|
|
17836
|
+
const sSQL = `SELECT * FROM [admin].[vwResourceFolders] WHERE [ParentID]=${resourcefolder_.ID} ` + this.getRowLevelSecurityWhereClause('Resource Folders', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17837
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Resource Folders', await dataSource.query(sSQL));
|
|
17838
|
+
return result;
|
|
17681
17839
|
}
|
|
17682
17840
|
async CreateResourceFolder(input, { dataSource, userPayload }, pubSub) {
|
|
17683
17841
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -17695,11 +17853,9 @@ let ResourceFolderResolver = class ResourceFolderResolver extends server_1.Resol
|
|
|
17695
17853
|
return null;
|
|
17696
17854
|
}
|
|
17697
17855
|
async BeforeCreate(dataSource, input) {
|
|
17698
|
-
const i = input, d = dataSource;
|
|
17699
17856
|
return true;
|
|
17700
17857
|
}
|
|
17701
17858
|
async AfterCreate(dataSource, input) {
|
|
17702
|
-
const i = input, d = dataSource;
|
|
17703
17859
|
}
|
|
17704
17860
|
async UpdateResourceFolder(input, { dataSource, userPayload }, pubSub) {
|
|
17705
17861
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -17922,8 +18078,9 @@ let SchemaInfoResolver = class SchemaInfoResolver extends server_1.ResolverBase
|
|
|
17922
18078
|
}
|
|
17923
18079
|
async SchemaInfo(ID, { dataSource, userPayload }, pubSub) {
|
|
17924
18080
|
this.CheckUserReadPermissions('Schema Info', userPayload);
|
|
17925
|
-
const sSQL = `SELECT * FROM [admin].vwSchemaInfos WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Schema Info', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17926
|
-
|
|
18081
|
+
const sSQL = `SELECT * FROM [admin].[vwSchemaInfos] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Schema Info', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
18082
|
+
const result = this.MapFieldNamesToCodeNames('Schema Info', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
18083
|
+
return result;
|
|
17927
18084
|
}
|
|
17928
18085
|
async CreateSchemaInfo(input, { dataSource, userPayload }, pubSub) {
|
|
17929
18086
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -17941,11 +18098,9 @@ let SchemaInfoResolver = class SchemaInfoResolver extends server_1.ResolverBase
|
|
|
17941
18098
|
return null;
|
|
17942
18099
|
}
|
|
17943
18100
|
async BeforeCreate(dataSource, input) {
|
|
17944
|
-
const i = input, d = dataSource;
|
|
17945
18101
|
return true;
|
|
17946
18102
|
}
|
|
17947
18103
|
async AfterCreate(dataSource, input) {
|
|
17948
|
-
const i = input, d = dataSource;
|
|
17949
18104
|
}
|
|
17950
18105
|
async UpdateSchemaInfo(input, { dataSource, userPayload }, pubSub) {
|
|
17951
18106
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -18165,8 +18320,9 @@ let CompanyIntegrationRecordMapResolver = class CompanyIntegrationRecordMapResol
|
|
|
18165
18320
|
}
|
|
18166
18321
|
async CompanyIntegrationRecordMap(ID, { dataSource, userPayload }, pubSub) {
|
|
18167
18322
|
this.CheckUserReadPermissions('Company Integration Record Maps', userPayload);
|
|
18168
|
-
const sSQL = `SELECT * FROM [admin].vwCompanyIntegrationRecordMaps WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Record Maps', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
18169
|
-
|
|
18323
|
+
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRecordMaps] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Record Maps', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
18324
|
+
const result = this.MapFieldNamesToCodeNames('Company Integration Record Maps', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
18325
|
+
return result;
|
|
18170
18326
|
}
|
|
18171
18327
|
async CreateCompanyIntegrationRecordMap(input, { dataSource, userPayload }, pubSub) {
|
|
18172
18328
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -18184,11 +18340,9 @@ let CompanyIntegrationRecordMapResolver = class CompanyIntegrationRecordMapResol
|
|
|
18184
18340
|
return null;
|
|
18185
18341
|
}
|
|
18186
18342
|
async BeforeCreate(dataSource, input) {
|
|
18187
|
-
const i = input, d = dataSource;
|
|
18188
18343
|
return true;
|
|
18189
18344
|
}
|
|
18190
18345
|
async AfterCreate(dataSource, input) {
|
|
18191
|
-
const i = input, d = dataSource;
|
|
18192
18346
|
}
|
|
18193
18347
|
async UpdateCompanyIntegrationRecordMap(input, { dataSource, userPayload }, pubSub) {
|
|
18194
18348
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -18492,13 +18646,15 @@ let RecordMergeLogResolver = class RecordMergeLogResolver extends server_1.Resol
|
|
|
18492
18646
|
}
|
|
18493
18647
|
async RecordMergeLog(ID, { dataSource, userPayload }, pubSub) {
|
|
18494
18648
|
this.CheckUserReadPermissions('Record Merge Logs', userPayload);
|
|
18495
|
-
const sSQL = `SELECT * FROM [admin].vwRecordMergeLogs WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
18496
|
-
|
|
18649
|
+
const sSQL = `SELECT * FROM [admin].[vwRecordMergeLogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
18650
|
+
const result = this.MapFieldNamesToCodeNames('Record Merge Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
18651
|
+
return result;
|
|
18497
18652
|
}
|
|
18498
18653
|
async RecordMergeDeletionLogsArray(recordmergelog_, { dataSource, userPayload }, pubSub) {
|
|
18499
18654
|
this.CheckUserReadPermissions('Record Merge Deletion Logs', userPayload);
|
|
18500
|
-
const sSQL = `SELECT * FROM [admin].[vwRecordMergeDeletionLogs] WHERE RecordMergeLogID=${recordmergelog_.ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Deletion Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
18501
|
-
|
|
18655
|
+
const sSQL = `SELECT * FROM [admin].[vwRecordMergeDeletionLogs] WHERE [RecordMergeLogID]=${recordmergelog_.ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Deletion Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
18656
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Record Merge Deletion Logs', await dataSource.query(sSQL));
|
|
18657
|
+
return result;
|
|
18502
18658
|
}
|
|
18503
18659
|
async CreateRecordMergeLog(input, { dataSource, userPayload }, pubSub) {
|
|
18504
18660
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -18516,11 +18672,9 @@ let RecordMergeLogResolver = class RecordMergeLogResolver extends server_1.Resol
|
|
|
18516
18672
|
return null;
|
|
18517
18673
|
}
|
|
18518
18674
|
async BeforeCreate(dataSource, input) {
|
|
18519
|
-
const i = input, d = dataSource;
|
|
18520
18675
|
return true;
|
|
18521
18676
|
}
|
|
18522
18677
|
async AfterCreate(dataSource, input) {
|
|
18523
|
-
const i = input, d = dataSource;
|
|
18524
18678
|
}
|
|
18525
18679
|
async UpdateRecordMergeLog(input, { dataSource, userPayload }, pubSub) {
|
|
18526
18680
|
if (await this.BeforeUpdate(dataSource, input)) {
|
|
@@ -18744,8 +18898,9 @@ let RecordMergeDeletionLogResolver = class RecordMergeDeletionLogResolver extend
|
|
|
18744
18898
|
}
|
|
18745
18899
|
async RecordMergeDeletionLog(ID, { dataSource, userPayload }, pubSub) {
|
|
18746
18900
|
this.CheckUserReadPermissions('Record Merge Deletion Logs', userPayload);
|
|
18747
|
-
const sSQL = `SELECT * FROM [admin].vwRecordMergeDeletionLogs WHERE ID=${ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Deletion Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
18748
|
-
|
|
18901
|
+
const sSQL = `SELECT * FROM [admin].[vwRecordMergeDeletionLogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Deletion Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
18902
|
+
const result = this.MapFieldNamesToCodeNames('Record Merge Deletion Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
18903
|
+
return result;
|
|
18749
18904
|
}
|
|
18750
18905
|
async CreateRecordMergeDeletionLog(input, { dataSource, userPayload }, pubSub) {
|
|
18751
18906
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
@@ -18763,11 +18918,9 @@ let RecordMergeDeletionLogResolver = class RecordMergeDeletionLogResolver extend
|
|
|
18763
18918
|
return null;
|
|
18764
18919
|
}
|
|
18765
18920
|
async BeforeCreate(dataSource, input) {
|
|
18766
|
-
const i = input, d = dataSource;
|
|
18767
18921
|
return true;
|
|
18768
18922
|
}
|
|
18769
18923
|
async AfterCreate(dataSource, input) {
|
|
18770
|
-
const i = input, d = dataSource;
|
|
18771
18924
|
}
|
|
18772
18925
|
async UpdateRecordMergeDeletionLog(input, { dataSource, userPayload }, pubSub) {
|
|
18773
18926
|
if (await this.BeforeUpdate(dataSource, input)) {
|