@memberjunction/server 0.9.111 → 0.9.112
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/build.log.json +3 -0
- package/dist/generated/generated.js +102 -102
- package/dist/generated/generated.js.map +1 -1
- package/package.json +3 -3
- package/src/generated/generated.ts +103 -103
|
@@ -194,19 +194,19 @@ let CompanyResolver = class CompanyResolver extends server_1.ResolverBase {
|
|
|
194
194
|
}
|
|
195
195
|
async EmployeesArray(company_, { dataSource, userPayload }, pubSub) {
|
|
196
196
|
this.CheckUserReadPermissions('Employees', userPayload);
|
|
197
|
-
const sSQL = `SELECT * FROM [admin].[vwEmployees] WHERE [CompanyID]
|
|
197
|
+
const sSQL = `SELECT * FROM [admin].[vwEmployees] WHERE [CompanyID]=${company_.ID} ` + this.getRowLevelSecurityWhereClause('Employees', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
198
198
|
const result = this.ArrayMapFieldNamesToCodeNames('Employees', await dataSource.query(sSQL));
|
|
199
199
|
return result;
|
|
200
200
|
}
|
|
201
201
|
async CompanyIntegrationsArray(company_, { dataSource, userPayload }, pubSub) {
|
|
202
202
|
this.CheckUserReadPermissions('Company Integrations', userPayload);
|
|
203
|
-
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrations] WHERE [CompanyName]
|
|
203
|
+
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrations] WHERE [CompanyName]=${company_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
204
204
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integrations', await dataSource.query(sSQL));
|
|
205
205
|
return result;
|
|
206
206
|
}
|
|
207
207
|
async WorkflowsArray(company_, { dataSource, userPayload }, pubSub) {
|
|
208
208
|
this.CheckUserReadPermissions('Workflows', userPayload);
|
|
209
|
-
const sSQL = `SELECT * FROM [admin].[vwWorkflows] WHERE [CompanyName]
|
|
209
|
+
const sSQL = `SELECT * FROM [admin].[vwWorkflows] WHERE [CompanyName]=${company_.ID} ` + this.getRowLevelSecurityWhereClause('Workflows', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
210
210
|
const result = this.ArrayMapFieldNamesToCodeNames('Workflows', await dataSource.query(sSQL));
|
|
211
211
|
return result;
|
|
212
212
|
}
|
|
@@ -619,25 +619,25 @@ let EmployeeResolver = class EmployeeResolver extends server_1.ResolverBase {
|
|
|
619
619
|
}
|
|
620
620
|
async EmployeesArray(employee_, { dataSource, userPayload }, pubSub) {
|
|
621
621
|
this.CheckUserReadPermissions('Employees', userPayload);
|
|
622
|
-
const sSQL = `SELECT * FROM [admin].[vwEmployees] WHERE [SupervisorID]
|
|
622
|
+
const sSQL = `SELECT * FROM [admin].[vwEmployees] WHERE [SupervisorID]=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employees', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
623
623
|
const result = this.ArrayMapFieldNamesToCodeNames('Employees', await dataSource.query(sSQL));
|
|
624
624
|
return result;
|
|
625
625
|
}
|
|
626
626
|
async EmployeeCompanyIntegrationsArray(employee_, { dataSource, userPayload }, pubSub) {
|
|
627
627
|
this.CheckUserReadPermissions('Employee Company Integrations', userPayload);
|
|
628
|
-
const sSQL = `SELECT * FROM [admin].[vwEmployeeCompanyIntegrations] WHERE [EmployeeID]
|
|
628
|
+
const sSQL = `SELECT * FROM [admin].[vwEmployeeCompanyIntegrations] WHERE [EmployeeID]=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
629
629
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Company Integrations', await dataSource.query(sSQL));
|
|
630
630
|
return result;
|
|
631
631
|
}
|
|
632
632
|
async EmployeeRolesArray(employee_, { dataSource, userPayload }, pubSub) {
|
|
633
633
|
this.CheckUserReadPermissions('Employee Roles', userPayload);
|
|
634
|
-
const sSQL = `SELECT * FROM [admin].[vwEmployeeRoles] WHERE [EmployeeID]
|
|
634
|
+
const sSQL = `SELECT * FROM [admin].[vwEmployeeRoles] WHERE [EmployeeID]=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
635
635
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Roles', await dataSource.query(sSQL));
|
|
636
636
|
return result;
|
|
637
637
|
}
|
|
638
638
|
async EmployeeSkillsArray(employee_, { dataSource, userPayload }, pubSub) {
|
|
639
639
|
this.CheckUserReadPermissions('Employee Skills', userPayload);
|
|
640
|
-
const sSQL = `SELECT * FROM [admin].[vwEmployeeSkills] WHERE [EmployeeID]
|
|
640
|
+
const sSQL = `SELECT * FROM [admin].[vwEmployeeSkills] WHERE [EmployeeID]=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
641
641
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Skills', await dataSource.query(sSQL));
|
|
642
642
|
return result;
|
|
643
643
|
}
|
|
@@ -1761,25 +1761,25 @@ let RoleResolver = class RoleResolver extends server_1.ResolverBase {
|
|
|
1761
1761
|
}
|
|
1762
1762
|
async EmployeeRolesArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1763
1763
|
this.CheckUserReadPermissions('Employee Roles', userPayload);
|
|
1764
|
-
const sSQL = `SELECT * FROM [admin].[vwEmployeeRoles] WHERE [RoleID]
|
|
1764
|
+
const sSQL = `SELECT * FROM [admin].[vwEmployeeRoles] WHERE [RoleID]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1765
1765
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Roles', await dataSource.query(sSQL));
|
|
1766
1766
|
return result;
|
|
1767
1767
|
}
|
|
1768
1768
|
async EntityPermissionsArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1769
1769
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
1770
|
-
const sSQL = `SELECT * FROM [admin].[vwEntityPermissions] WHERE [RoleName]
|
|
1770
|
+
const sSQL = `SELECT * FROM [admin].[vwEntityPermissions] WHERE [RoleName]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1771
1771
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL));
|
|
1772
1772
|
return result;
|
|
1773
1773
|
}
|
|
1774
1774
|
async UserRolesArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1775
1775
|
this.CheckUserReadPermissions('User Roles', userPayload);
|
|
1776
|
-
const sSQL = `SELECT * FROM [admin].[vwUserRoles] WHERE [RoleName]
|
|
1776
|
+
const sSQL = `SELECT * FROM [admin].[vwUserRoles] WHERE [RoleName]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('User Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1777
1777
|
const result = this.ArrayMapFieldNamesToCodeNames('User Roles', await dataSource.query(sSQL));
|
|
1778
1778
|
return result;
|
|
1779
1779
|
}
|
|
1780
1780
|
async AuthorizationRolesArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1781
1781
|
this.CheckUserReadPermissions('Authorization Roles', userPayload);
|
|
1782
|
-
const sSQL = `SELECT * FROM [admin].[vwAuthorizationRoles] WHERE [RoleName]
|
|
1782
|
+
const sSQL = `SELECT * FROM [admin].[vwAuthorizationRoles] WHERE [RoleName]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('Authorization Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1783
1783
|
const result = this.ArrayMapFieldNamesToCodeNames('Authorization Roles', await dataSource.query(sSQL));
|
|
1784
1784
|
return result;
|
|
1785
1785
|
}
|
|
@@ -1999,13 +1999,13 @@ let SkillResolver = class SkillResolver extends server_1.ResolverBase {
|
|
|
1999
1999
|
}
|
|
2000
2000
|
async EmployeeSkillsArray(skill_, { dataSource, userPayload }, pubSub) {
|
|
2001
2001
|
this.CheckUserReadPermissions('Employee Skills', userPayload);
|
|
2002
|
-
const sSQL = `SELECT * FROM [admin].[vwEmployeeSkills] WHERE [SkillID]
|
|
2002
|
+
const sSQL = `SELECT * FROM [admin].[vwEmployeeSkills] WHERE [SkillID]=${skill_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2003
2003
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Skills', await dataSource.query(sSQL));
|
|
2004
2004
|
return result;
|
|
2005
2005
|
}
|
|
2006
2006
|
async SkillsArray(skill_, { dataSource, userPayload }, pubSub) {
|
|
2007
2007
|
this.CheckUserReadPermissions('Skills', userPayload);
|
|
2008
|
-
const sSQL = `SELECT * FROM [admin].[vwSkills] WHERE [ParentID]
|
|
2008
|
+
const sSQL = `SELECT * FROM [admin].[vwSkills] WHERE [ParentID]=${skill_.ID} ` + this.getRowLevelSecurityWhereClause('Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2009
2009
|
const result = this.ArrayMapFieldNamesToCodeNames('Skills', await dataSource.query(sSQL));
|
|
2010
2010
|
return result;
|
|
2011
2011
|
}
|
|
@@ -2435,13 +2435,13 @@ let IntegrationResolver = class IntegrationResolver extends server_1.ResolverBas
|
|
|
2435
2435
|
}
|
|
2436
2436
|
async IntegrationURLFormatsArray(integration_, { dataSource, userPayload }, pubSub) {
|
|
2437
2437
|
this.CheckUserReadPermissions('Integration URL Formats', userPayload);
|
|
2438
|
-
const sSQL = `SELECT * FROM [admin].[vwIntegrationURLFormats] WHERE [IntegrationID]
|
|
2438
|
+
const sSQL = `SELECT * FROM [admin].[vwIntegrationURLFormats] WHERE [IntegrationID]=${integration_.ID} ` + this.getRowLevelSecurityWhereClause('Integration URL Formats', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2439
2439
|
const result = this.ArrayMapFieldNamesToCodeNames('Integration URL Formats', await dataSource.query(sSQL));
|
|
2440
2440
|
return result;
|
|
2441
2441
|
}
|
|
2442
2442
|
async CompanyIntegrationsArray(integration_, { dataSource, userPayload }, pubSub) {
|
|
2443
2443
|
this.CheckUserReadPermissions('Company Integrations', userPayload);
|
|
2444
|
-
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrations] WHERE [IntegrationName]
|
|
2444
|
+
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrations] WHERE [IntegrationName]=${integration_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2445
2445
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integrations', await dataSource.query(sSQL));
|
|
2446
2446
|
return result;
|
|
2447
2447
|
}
|
|
@@ -2789,25 +2789,25 @@ let CompanyIntegrationResolver = class CompanyIntegrationResolver extends server
|
|
|
2789
2789
|
}
|
|
2790
2790
|
async ListsArray(companyintegration_, { dataSource, userPayload }, pubSub) {
|
|
2791
2791
|
this.CheckUserReadPermissions('Lists', userPayload);
|
|
2792
|
-
const sSQL = `SELECT * FROM [admin].[vwLists] WHERE [CompanyIntegrationID]
|
|
2792
|
+
const sSQL = `SELECT * FROM [admin].[vwLists] WHERE [CompanyIntegrationID]=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Lists', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2793
2793
|
const result = this.ArrayMapFieldNamesToCodeNames('Lists', await dataSource.query(sSQL));
|
|
2794
2794
|
return result;
|
|
2795
2795
|
}
|
|
2796
2796
|
async EmployeeCompanyIntegrationsArray(companyintegration_, { dataSource, userPayload }, pubSub) {
|
|
2797
2797
|
this.CheckUserReadPermissions('Employee Company Integrations', userPayload);
|
|
2798
|
-
const sSQL = `SELECT * FROM [admin].[vwEmployeeCompanyIntegrations] WHERE [CompanyIntegrationID]
|
|
2798
|
+
const sSQL = `SELECT * FROM [admin].[vwEmployeeCompanyIntegrations] WHERE [CompanyIntegrationID]=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2799
2799
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Company Integrations', await dataSource.query(sSQL));
|
|
2800
2800
|
return result;
|
|
2801
2801
|
}
|
|
2802
2802
|
async CompanyIntegrationRunsArray(companyintegration_, { dataSource, userPayload }, pubSub) {
|
|
2803
2803
|
this.CheckUserReadPermissions('Company Integration Runs', userPayload);
|
|
2804
|
-
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRuns] WHERE [CompanyIntegrationID]
|
|
2804
|
+
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRuns] WHERE [CompanyIntegrationID]=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2805
2805
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Runs', await dataSource.query(sSQL));
|
|
2806
2806
|
return result;
|
|
2807
2807
|
}
|
|
2808
2808
|
async CompanyIntegrationRecordMapsArray(companyintegration_, { dataSource, userPayload }, pubSub) {
|
|
2809
2809
|
this.CheckUserReadPermissions('Company Integration Record Maps', userPayload);
|
|
2810
|
-
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRecordMaps] WHERE [CompanyIntegrationID]
|
|
2810
|
+
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRecordMaps] WHERE [CompanyIntegrationID]=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Record Maps', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2811
2811
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Record Maps', await dataSource.query(sSQL));
|
|
2812
2812
|
return result;
|
|
2813
2813
|
}
|
|
@@ -3396,7 +3396,7 @@ let EntityFieldResolver = class EntityFieldResolver extends server_1.ResolverBas
|
|
|
3396
3396
|
}
|
|
3397
3397
|
async EntityFieldValuesArray(entityfield_, { dataSource, userPayload }, pubSub) {
|
|
3398
3398
|
this.CheckUserReadPermissions('Entity Field Values', userPayload);
|
|
3399
|
-
const sSQL = `SELECT * FROM [admin].[vwEntityFieldValues] WHERE [EntityFieldID]
|
|
3399
|
+
const sSQL = `SELECT * FROM [admin].[vwEntityFieldValues] WHERE [EntityFieldID]=${entityfield_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Field Values', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
3400
3400
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Field Values', await dataSource.query(sSQL));
|
|
3401
3401
|
return result;
|
|
3402
3402
|
}
|
|
@@ -4198,121 +4198,121 @@ let EntityResolverBase = class EntityResolverBase extends server_1.ResolverBase
|
|
|
4198
4198
|
}
|
|
4199
4199
|
async EntityFieldsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4200
4200
|
this.CheckUserReadPermissions('Entity Fields', userPayload);
|
|
4201
|
-
const sSQL = `SELECT * FROM [admin].[vwEntityFields] WHERE [EntityID]
|
|
4201
|
+
const sSQL = `SELECT * FROM [admin].[vwEntityFields] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Fields', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4202
4202
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Fields', await dataSource.query(sSQL));
|
|
4203
4203
|
return result;
|
|
4204
4204
|
}
|
|
4205
4205
|
async EntityPermissionsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4206
4206
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
4207
|
-
const sSQL = `SELECT * FROM [admin].[vwEntityPermissions] WHERE [EntityID]
|
|
4207
|
+
const sSQL = `SELECT * FROM [admin].[vwEntityPermissions] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4208
4208
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL));
|
|
4209
4209
|
return result;
|
|
4210
4210
|
}
|
|
4211
4211
|
async EntityRelationshipsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4212
4212
|
this.CheckUserReadPermissions('Entity Relationships', userPayload);
|
|
4213
|
-
const sSQL = `SELECT * FROM [admin].[vwEntityRelationships] WHERE [EntityID]
|
|
4213
|
+
const sSQL = `SELECT * FROM [admin].[vwEntityRelationships] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Relationships', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4214
4214
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Relationships', await dataSource.query(sSQL));
|
|
4215
4215
|
return result;
|
|
4216
4216
|
}
|
|
4217
4217
|
async EntityAIActionsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4218
4218
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
4219
|
-
const sSQL = `SELECT * FROM [admin].[vwEntityAIActions] WHERE [EntityID]
|
|
4219
|
+
const sSQL = `SELECT * FROM [admin].[vwEntityAIActions] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4220
4220
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL));
|
|
4221
4221
|
return result;
|
|
4222
4222
|
}
|
|
4223
4223
|
async UserRecordLogsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4224
4224
|
this.CheckUserReadPermissions('User Record Logs', userPayload);
|
|
4225
|
-
const sSQL = `SELECT * FROM [admin].[vwUserRecordLogs] WHERE [EntityID]
|
|
4225
|
+
const sSQL = `SELECT * FROM [admin].[vwUserRecordLogs] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Record Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4226
4226
|
const result = this.ArrayMapFieldNamesToCodeNames('User Record Logs', await dataSource.query(sSQL));
|
|
4227
4227
|
return result;
|
|
4228
4228
|
}
|
|
4229
4229
|
async IntegrationURLFormatsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4230
4230
|
this.CheckUserReadPermissions('Integration URL Formats', userPayload);
|
|
4231
|
-
const sSQL = `SELECT * FROM [admin].[vwIntegrationURLFormats] WHERE [EntityID]
|
|
4231
|
+
const sSQL = `SELECT * FROM [admin].[vwIntegrationURLFormats] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Integration URL Formats', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4232
4232
|
const result = this.ArrayMapFieldNamesToCodeNames('Integration URL Formats', await dataSource.query(sSQL));
|
|
4233
4233
|
return result;
|
|
4234
4234
|
}
|
|
4235
4235
|
async EntitiesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4236
4236
|
this.CheckUserReadPermissions('Entities', userPayload);
|
|
4237
|
-
const sSQL = `SELECT * FROM [admin].[vwEntities] WHERE [ParentID]
|
|
4237
|
+
const sSQL = `SELECT * FROM [admin].[vwEntities] WHERE [ParentID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4238
4238
|
const result = this.ArrayMapFieldNamesToCodeNames('Entities', await dataSource.query(sSQL));
|
|
4239
4239
|
return result;
|
|
4240
4240
|
}
|
|
4241
4241
|
async UserFavoritesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4242
4242
|
this.CheckUserReadPermissions('User Favorites', userPayload);
|
|
4243
|
-
const sSQL = `SELECT * FROM [admin].[vwUserFavorites] WHERE [EntityID]
|
|
4243
|
+
const sSQL = `SELECT * FROM [admin].[vwUserFavorites] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Favorites', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4244
4244
|
const result = this.ArrayMapFieldNamesToCodeNames('User Favorites', await dataSource.query(sSQL));
|
|
4245
4245
|
return result;
|
|
4246
4246
|
}
|
|
4247
4247
|
async CompanyIntegrationRunDetailsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4248
4248
|
this.CheckUserReadPermissions('Company Integration Run Details', userPayload);
|
|
4249
|
-
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRunDetails] WHERE [EntityID]
|
|
4249
|
+
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRunDetails] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4250
4250
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Run Details', await dataSource.query(sSQL));
|
|
4251
4251
|
return result;
|
|
4252
4252
|
}
|
|
4253
4253
|
async ApplicationEntitiesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4254
4254
|
this.CheckUserReadPermissions('Application Entities', userPayload);
|
|
4255
|
-
const sSQL = `SELECT * FROM [admin].[vwApplicationEntities] WHERE [EntityID]
|
|
4255
|
+
const sSQL = `SELECT * FROM [admin].[vwApplicationEntities] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4256
4256
|
const result = this.ArrayMapFieldNamesToCodeNames('Application Entities', await dataSource.query(sSQL));
|
|
4257
4257
|
return result;
|
|
4258
4258
|
}
|
|
4259
4259
|
async UserApplicationEntitiesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4260
4260
|
this.CheckUserReadPermissions('User Application Entities', userPayload);
|
|
4261
|
-
const sSQL = `SELECT * FROM [admin].[vwUserApplicationEntities] WHERE [EntityID]
|
|
4261
|
+
const sSQL = `SELECT * FROM [admin].[vwUserApplicationEntities] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4262
4262
|
const result = this.ArrayMapFieldNamesToCodeNames('User Application Entities', await dataSource.query(sSQL));
|
|
4263
4263
|
return result;
|
|
4264
4264
|
}
|
|
4265
4265
|
async ListsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4266
4266
|
this.CheckUserReadPermissions('Lists', userPayload);
|
|
4267
|
-
const sSQL = `SELECT * FROM [admin].[vwLists] WHERE [EntityID]
|
|
4267
|
+
const sSQL = `SELECT * FROM [admin].[vwLists] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Lists', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4268
4268
|
const result = this.ArrayMapFieldNamesToCodeNames('Lists', await dataSource.query(sSQL));
|
|
4269
4269
|
return result;
|
|
4270
4270
|
}
|
|
4271
4271
|
async UserViewsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4272
4272
|
this.CheckUserReadPermissions('User Views', userPayload);
|
|
4273
|
-
const sSQL = `SELECT * FROM [admin].[vwUserViews] WHERE [EntityID]
|
|
4273
|
+
const sSQL = `SELECT * FROM [admin].[vwUserViews] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4274
4274
|
const result = this.ArrayMapFieldNamesToCodeNames('User Views', await dataSource.query(sSQL));
|
|
4275
4275
|
return result;
|
|
4276
4276
|
}
|
|
4277
4277
|
async RecordChangesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4278
4278
|
this.CheckUserReadPermissions('Record Changes', userPayload);
|
|
4279
|
-
const sSQL = `SELECT * FROM [admin].[vwRecordChanges] WHERE [EntityID]
|
|
4279
|
+
const sSQL = `SELECT * FROM [admin].[vwRecordChanges] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Record Changes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4280
4280
|
const result = this.ArrayMapFieldNamesToCodeNames('Record Changes', await dataSource.query(sSQL));
|
|
4281
4281
|
return result;
|
|
4282
4282
|
}
|
|
4283
4283
|
async AuditLogsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4284
4284
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
4285
|
-
const sSQL = `SELECT * FROM [admin].[vwAuditLogs] WHERE [EntityID]
|
|
4285
|
+
const sSQL = `SELECT * FROM [admin].[vwAuditLogs] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4286
4286
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL));
|
|
4287
4287
|
return result;
|
|
4288
4288
|
}
|
|
4289
4289
|
async ResourceTypesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4290
4290
|
this.CheckUserReadPermissions('Resource Types', userPayload);
|
|
4291
|
-
const sSQL = `SELECT * FROM [admin].[vwResourceTypes] WHERE [EntityID]
|
|
4291
|
+
const sSQL = `SELECT * FROM [admin].[vwResourceTypes] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Resource Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4292
4292
|
const result = this.ArrayMapFieldNamesToCodeNames('Resource Types', await dataSource.query(sSQL));
|
|
4293
4293
|
return result;
|
|
4294
4294
|
}
|
|
4295
4295
|
async TaggedItemsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4296
4296
|
this.CheckUserReadPermissions('Tagged Items', userPayload);
|
|
4297
|
-
const sSQL = `SELECT * FROM [admin].[vwTaggedItems] WHERE [EntityID]
|
|
4297
|
+
const sSQL = `SELECT * FROM [admin].[vwTaggedItems] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Tagged Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4298
4298
|
const result = this.ArrayMapFieldNamesToCodeNames('Tagged Items', await dataSource.query(sSQL));
|
|
4299
4299
|
return result;
|
|
4300
4300
|
}
|
|
4301
4301
|
async DatasetItemsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4302
4302
|
this.CheckUserReadPermissions('Dataset Items', userPayload);
|
|
4303
|
-
const sSQL = `SELECT * FROM [admin].[vwDatasetItems] WHERE [EntityID]
|
|
4303
|
+
const sSQL = `SELECT * FROM [admin].[vwDatasetItems] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Dataset Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4304
4304
|
const result = this.ArrayMapFieldNamesToCodeNames('Dataset Items', await dataSource.query(sSQL));
|
|
4305
4305
|
return result;
|
|
4306
4306
|
}
|
|
4307
4307
|
async CompanyIntegrationRecordMapsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4308
4308
|
this.CheckUserReadPermissions('Company Integration Record Maps', userPayload);
|
|
4309
|
-
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRecordMaps] WHERE [EntityID]
|
|
4309
|
+
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRecordMaps] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Record Maps', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4310
4310
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Record Maps', await dataSource.query(sSQL));
|
|
4311
4311
|
return result;
|
|
4312
4312
|
}
|
|
4313
4313
|
async RecordMergeLogsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4314
4314
|
this.CheckUserReadPermissions('Record Merge Logs', userPayload);
|
|
4315
|
-
const sSQL = `SELECT * FROM [admin].[vwRecordMergeLogs] WHERE [EntityID]
|
|
4315
|
+
const sSQL = `SELECT * FROM [admin].[vwRecordMergeLogs] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4316
4316
|
const result = this.ArrayMapFieldNamesToCodeNames('Record Merge Logs', await dataSource.query(sSQL));
|
|
4317
4317
|
return result;
|
|
4318
4318
|
}
|
|
@@ -4971,109 +4971,109 @@ let UserResolverBase = class UserResolverBase extends server_1.ResolverBase {
|
|
|
4971
4971
|
}
|
|
4972
4972
|
async UserApplicationsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
4973
4973
|
this.CheckUserReadPermissions('User Applications', userPayload);
|
|
4974
|
-
const sSQL = `SELECT * FROM [admin].[vwUserApplications] WHERE [UserID]
|
|
4974
|
+
const sSQL = `SELECT * FROM [admin].[vwUserApplications] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Applications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4975
4975
|
const result = this.ArrayMapFieldNamesToCodeNames('User Applications', await dataSource.query(sSQL));
|
|
4976
4976
|
return result;
|
|
4977
4977
|
}
|
|
4978
4978
|
async UserRolesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
4979
4979
|
this.CheckUserReadPermissions('User Roles', userPayload);
|
|
4980
|
-
const sSQL = `SELECT * FROM [admin].[vwUserRoles] WHERE [UserID]
|
|
4980
|
+
const sSQL = `SELECT * FROM [admin].[vwUserRoles] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4981
4981
|
const result = this.ArrayMapFieldNamesToCodeNames('User Roles', await dataSource.query(sSQL));
|
|
4982
4982
|
return result;
|
|
4983
4983
|
}
|
|
4984
4984
|
async WorkspacesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
4985
4985
|
this.CheckUserReadPermissions('Workspaces', userPayload);
|
|
4986
|
-
const sSQL = `SELECT * FROM [admin].[vwWorkspaces] WHERE [UserID]
|
|
4986
|
+
const sSQL = `SELECT * FROM [admin].[vwWorkspaces] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Workspaces', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4987
4987
|
const result = this.ArrayMapFieldNamesToCodeNames('Workspaces', await dataSource.query(sSQL));
|
|
4988
4988
|
return result;
|
|
4989
4989
|
}
|
|
4990
4990
|
async ReportsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
4991
4991
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
4992
|
-
const sSQL = `SELECT * FROM [admin].[vwReports] WHERE [UserID]
|
|
4992
|
+
const sSQL = `SELECT * FROM [admin].[vwReports] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4993
4993
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
4994
4994
|
return result;
|
|
4995
4995
|
}
|
|
4996
4996
|
async ReportSnapshotsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
4997
4997
|
this.CheckUserReadPermissions('Report Snapshots', userPayload);
|
|
4998
|
-
const sSQL = `SELECT * FROM [admin].[vwReportSnapshots] WHERE [UserID]
|
|
4998
|
+
const sSQL = `SELECT * FROM [admin].[vwReportSnapshots] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Report Snapshots', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4999
4999
|
const result = this.ArrayMapFieldNamesToCodeNames('Report Snapshots', await dataSource.query(sSQL));
|
|
5000
5000
|
return result;
|
|
5001
5001
|
}
|
|
5002
5002
|
async RecordChangesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5003
5003
|
this.CheckUserReadPermissions('Record Changes', userPayload);
|
|
5004
|
-
const sSQL = `SELECT * FROM [admin].[vwRecordChanges] WHERE [UserID]
|
|
5004
|
+
const sSQL = `SELECT * FROM [admin].[vwRecordChanges] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Record Changes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5005
5005
|
const result = this.ArrayMapFieldNamesToCodeNames('Record Changes', await dataSource.query(sSQL));
|
|
5006
5006
|
return result;
|
|
5007
5007
|
}
|
|
5008
5008
|
async DashboardsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5009
5009
|
this.CheckUserReadPermissions('Dashboards', userPayload);
|
|
5010
|
-
const sSQL = `SELECT * FROM [admin].[vwDashboards] WHERE [UserID]
|
|
5010
|
+
const sSQL = `SELECT * FROM [admin].[vwDashboards] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Dashboards', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5011
5011
|
const result = this.ArrayMapFieldNamesToCodeNames('Dashboards', await dataSource.query(sSQL));
|
|
5012
5012
|
return result;
|
|
5013
5013
|
}
|
|
5014
5014
|
async UserViewRunsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5015
5015
|
this.CheckUserReadPermissions('User View Runs', userPayload);
|
|
5016
|
-
const sSQL = `SELECT * FROM [admin].[vwUserViewRuns] WHERE [RunByUserID]
|
|
5016
|
+
const sSQL = `SELECT * FROM [admin].[vwUserViewRuns] WHERE [RunByUserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User View Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5017
5017
|
const result = this.ArrayMapFieldNamesToCodeNames('User View Runs', await dataSource.query(sSQL));
|
|
5018
5018
|
return result;
|
|
5019
5019
|
}
|
|
5020
5020
|
async AuditLogsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5021
5021
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
5022
|
-
const sSQL = `SELECT * FROM [admin].[vwAuditLogs] WHERE [UserID]
|
|
5022
|
+
const sSQL = `SELECT * FROM [admin].[vwAuditLogs] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5023
5023
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL));
|
|
5024
5024
|
return result;
|
|
5025
5025
|
}
|
|
5026
5026
|
async ListsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5027
5027
|
this.CheckUserReadPermissions('Lists', userPayload);
|
|
5028
|
-
const sSQL = `SELECT * FROM [admin].[vwLists] WHERE [UserID]
|
|
5028
|
+
const sSQL = `SELECT * FROM [admin].[vwLists] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Lists', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5029
5029
|
const result = this.ArrayMapFieldNamesToCodeNames('Lists', await dataSource.query(sSQL));
|
|
5030
5030
|
return result;
|
|
5031
5031
|
}
|
|
5032
5032
|
async UserFavoritesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5033
5033
|
this.CheckUserReadPermissions('User Favorites', userPayload);
|
|
5034
|
-
const sSQL = `SELECT * FROM [admin].[vwUserFavorites] WHERE [UserID]
|
|
5034
|
+
const sSQL = `SELECT * FROM [admin].[vwUserFavorites] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Favorites', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5035
5035
|
const result = this.ArrayMapFieldNamesToCodeNames('User Favorites', await dataSource.query(sSQL));
|
|
5036
5036
|
return result;
|
|
5037
5037
|
}
|
|
5038
5038
|
async UserRecordLogsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5039
5039
|
this.CheckUserReadPermissions('User Record Logs', userPayload);
|
|
5040
|
-
const sSQL = `SELECT * FROM [admin].[vwUserRecordLogs] WHERE [UserID]
|
|
5040
|
+
const sSQL = `SELECT * FROM [admin].[vwUserRecordLogs] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Record Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5041
5041
|
const result = this.ArrayMapFieldNamesToCodeNames('User Record Logs', await dataSource.query(sSQL));
|
|
5042
5042
|
return result;
|
|
5043
5043
|
}
|
|
5044
5044
|
async UserViewsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5045
5045
|
this.CheckUserReadPermissions('User Views', userPayload);
|
|
5046
|
-
const sSQL = `SELECT * FROM [admin].[vwUserViews] WHERE [UserID]
|
|
5046
|
+
const sSQL = `SELECT * FROM [admin].[vwUserViews] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5047
5047
|
const result = this.ArrayMapFieldNamesToCodeNames('User Views', await dataSource.query(sSQL));
|
|
5048
5048
|
return result;
|
|
5049
5049
|
}
|
|
5050
5050
|
async CompanyIntegrationRunsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5051
5051
|
this.CheckUserReadPermissions('Company Integration Runs', userPayload);
|
|
5052
|
-
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRuns] WHERE [RunByUserID]
|
|
5052
|
+
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRuns] WHERE [RunByUserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5053
5053
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Runs', await dataSource.query(sSQL));
|
|
5054
5054
|
return result;
|
|
5055
5055
|
}
|
|
5056
5056
|
async UserNotificationsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5057
5057
|
this.CheckUserReadPermissions('User Notifications', userPayload);
|
|
5058
|
-
const sSQL = `SELECT * FROM [admin].[vwUserNotifications] WHERE [UserID]
|
|
5058
|
+
const sSQL = `SELECT * FROM [admin].[vwUserNotifications] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Notifications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5059
5059
|
const result = this.ArrayMapFieldNamesToCodeNames('User Notifications', await dataSource.query(sSQL));
|
|
5060
5060
|
return result;
|
|
5061
5061
|
}
|
|
5062
5062
|
async ConversationsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5063
5063
|
this.CheckUserReadPermissions('Conversations', userPayload);
|
|
5064
|
-
const sSQL = `SELECT * FROM [admin].[vwConversations] WHERE [UserID]
|
|
5064
|
+
const sSQL = `SELECT * FROM [admin].[vwConversations] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Conversations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5065
5065
|
const result = this.ArrayMapFieldNamesToCodeNames('Conversations', await dataSource.query(sSQL));
|
|
5066
5066
|
return result;
|
|
5067
5067
|
}
|
|
5068
5068
|
async ResourceFoldersArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5069
5069
|
this.CheckUserReadPermissions('Resource Folders', userPayload);
|
|
5070
|
-
const sSQL = `SELECT * FROM [admin].[vwResourceFolders] WHERE [UserID]
|
|
5070
|
+
const sSQL = `SELECT * FROM [admin].[vwResourceFolders] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Resource Folders', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5071
5071
|
const result = this.ArrayMapFieldNamesToCodeNames('Resource Folders', await dataSource.query(sSQL));
|
|
5072
5072
|
return result;
|
|
5073
5073
|
}
|
|
5074
5074
|
async RecordMergeLogsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5075
5075
|
this.CheckUserReadPermissions('Record Merge Logs', userPayload);
|
|
5076
|
-
const sSQL = `SELECT * FROM [admin].[vwRecordMergeLogs] WHERE [InitiatedByUserID]
|
|
5076
|
+
const sSQL = `SELECT * FROM [admin].[vwRecordMergeLogs] WHERE [InitiatedByUserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5077
5077
|
const result = this.ArrayMapFieldNamesToCodeNames('Record Merge Logs', await dataSource.query(sSQL));
|
|
5078
5078
|
return result;
|
|
5079
5079
|
}
|
|
@@ -6344,13 +6344,13 @@ let UserViewResolverBase = class UserViewResolverBase extends server_1.ResolverB
|
|
|
6344
6344
|
}
|
|
6345
6345
|
async EntityRelationshipsArray(userview_, { dataSource, userPayload }, pubSub) {
|
|
6346
6346
|
this.CheckUserReadPermissions('Entity Relationships', userPayload);
|
|
6347
|
-
const sSQL = `SELECT * FROM [admin].[vwEntityRelationships] WHERE [DisplayUserViewGUID]
|
|
6347
|
+
const sSQL = `SELECT * FROM [admin].[vwEntityRelationships] WHERE [DisplayUserViewGUID]=${userview_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Relationships', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6348
6348
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Relationships', await dataSource.query(sSQL));
|
|
6349
6349
|
return result;
|
|
6350
6350
|
}
|
|
6351
6351
|
async UserViewRunsArray(userview_, { dataSource, userPayload }, pubSub) {
|
|
6352
6352
|
this.CheckUserReadPermissions('User View Runs', userPayload);
|
|
6353
|
-
const sSQL = `SELECT * FROM [admin].[vwUserViewRuns] WHERE [UserViewID]
|
|
6353
|
+
const sSQL = `SELECT * FROM [admin].[vwUserViewRuns] WHERE [UserViewID]=${userview_.ID} ` + this.getRowLevelSecurityWhereClause('User View Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6354
6354
|
const result = this.ArrayMapFieldNamesToCodeNames('User View Runs', await dataSource.query(sSQL));
|
|
6355
6355
|
return result;
|
|
6356
6356
|
}
|
|
@@ -6652,19 +6652,19 @@ let CompanyIntegrationRunResolver = class CompanyIntegrationRunResolver extends
|
|
|
6652
6652
|
}
|
|
6653
6653
|
async CompanyIntegrationRunAPILogsArray(companyintegrationrun_, { dataSource, userPayload }, pubSub) {
|
|
6654
6654
|
this.CheckUserReadPermissions('Company Integration Run API Logs', userPayload);
|
|
6655
|
-
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRunAPILogs] WHERE [CompanyIntegrationRunID]
|
|
6655
|
+
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRunAPILogs] WHERE [CompanyIntegrationRunID]=${companyintegrationrun_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run API Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6656
6656
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Run API Logs', await dataSource.query(sSQL));
|
|
6657
6657
|
return result;
|
|
6658
6658
|
}
|
|
6659
6659
|
async ErrorLogsArray(companyintegrationrun_, { dataSource, userPayload }, pubSub) {
|
|
6660
6660
|
this.CheckUserReadPermissions('Error Logs', userPayload);
|
|
6661
|
-
const sSQL = `SELECT * FROM [admin].[vwErrorLogs] WHERE [CompanyIntegrationRunID]
|
|
6661
|
+
const sSQL = `SELECT * FROM [admin].[vwErrorLogs] WHERE [CompanyIntegrationRunID]=${companyintegrationrun_.ID} ` + this.getRowLevelSecurityWhereClause('Error Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6662
6662
|
const result = this.ArrayMapFieldNamesToCodeNames('Error Logs', await dataSource.query(sSQL));
|
|
6663
6663
|
return result;
|
|
6664
6664
|
}
|
|
6665
6665
|
async CompanyIntegrationRunDetailsArray(companyintegrationrun_, { dataSource, userPayload }, pubSub) {
|
|
6666
6666
|
this.CheckUserReadPermissions('Company Integration Run Details', userPayload);
|
|
6667
|
-
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRunDetails] WHERE [CompanyIntegrationRunID]
|
|
6667
|
+
const sSQL = `SELECT * FROM [admin].[vwCompanyIntegrationRunDetails] WHERE [CompanyIntegrationRunID]=${companyintegrationrun_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6668
6668
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Run Details', await dataSource.query(sSQL));
|
|
6669
6669
|
return result;
|
|
6670
6670
|
}
|
|
@@ -6909,7 +6909,7 @@ let CompanyIntegrationRunDetailResolver = class CompanyIntegrationRunDetailResol
|
|
|
6909
6909
|
}
|
|
6910
6910
|
async ErrorLogsArray(companyintegrationrundetail_, { dataSource, userPayload }, pubSub) {
|
|
6911
6911
|
this.CheckUserReadPermissions('Error Logs', userPayload);
|
|
6912
|
-
const sSQL = `SELECT * FROM [admin].[vwErrorLogs] WHERE [CompanyIntegrationRunDetailID]
|
|
6912
|
+
const sSQL = `SELECT * FROM [admin].[vwErrorLogs] WHERE [CompanyIntegrationRunDetailID]=${companyintegrationrundetail_.ID} ` + this.getRowLevelSecurityWhereClause('Error Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6913
6913
|
const result = this.ArrayMapFieldNamesToCodeNames('Error Logs', await dataSource.query(sSQL));
|
|
6914
6914
|
return result;
|
|
6915
6915
|
}
|
|
@@ -7323,13 +7323,13 @@ let ApplicationResolver = class ApplicationResolver extends server_1.ResolverBas
|
|
|
7323
7323
|
}
|
|
7324
7324
|
async ApplicationEntitiesArray(application_, { dataSource, userPayload }, pubSub) {
|
|
7325
7325
|
this.CheckUserReadPermissions('Application Entities', userPayload);
|
|
7326
|
-
const sSQL = `SELECT * FROM [admin].[vwApplicationEntities] WHERE [ApplicationID]
|
|
7326
|
+
const sSQL = `SELECT * FROM [admin].[vwApplicationEntities] WHERE [ApplicationID]=${application_.ID} ` + this.getRowLevelSecurityWhereClause('Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7327
7327
|
const result = this.ArrayMapFieldNamesToCodeNames('Application Entities', await dataSource.query(sSQL));
|
|
7328
7328
|
return result;
|
|
7329
7329
|
}
|
|
7330
7330
|
async UserApplicationsArray(application_, { dataSource, userPayload }, pubSub) {
|
|
7331
7331
|
this.CheckUserReadPermissions('User Applications', userPayload);
|
|
7332
|
-
const sSQL = `SELECT * FROM [admin].[vwUserApplications] WHERE [ApplicationID]
|
|
7332
|
+
const sSQL = `SELECT * FROM [admin].[vwUserApplications] WHERE [ApplicationID]=${application_.ID} ` + this.getRowLevelSecurityWhereClause('User Applications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7333
7333
|
const result = this.ArrayMapFieldNamesToCodeNames('User Applications', await dataSource.query(sSQL));
|
|
7334
7334
|
return result;
|
|
7335
7335
|
}
|
|
@@ -8500,7 +8500,7 @@ let UserApplicationResolver = class UserApplicationResolver extends server_1.Res
|
|
|
8500
8500
|
}
|
|
8501
8501
|
async UserApplicationEntitiesArray(userapplication_, { dataSource, userPayload }, pubSub) {
|
|
8502
8502
|
this.CheckUserReadPermissions('User Application Entities', userPayload);
|
|
8503
|
-
const sSQL = `SELECT * FROM [admin].[vwUserApplicationEntities] WHERE [UserApplicationID]
|
|
8503
|
+
const sSQL = `SELECT * FROM [admin].[vwUserApplicationEntities] WHERE [UserApplicationID]=${userapplication_.ID} ` + this.getRowLevelSecurityWhereClause('User Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8504
8504
|
const result = this.ArrayMapFieldNamesToCodeNames('User Application Entities', await dataSource.query(sSQL));
|
|
8505
8505
|
return result;
|
|
8506
8506
|
}
|
|
@@ -8957,7 +8957,7 @@ let ListResolver = class ListResolver extends server_1.ResolverBase {
|
|
|
8957
8957
|
}
|
|
8958
8958
|
async ListDetailsArray(list_, { dataSource, userPayload }, pubSub) {
|
|
8959
8959
|
this.CheckUserReadPermissions('List Details', userPayload);
|
|
8960
|
-
const sSQL = `SELECT * FROM [admin].[vwListDetails] WHERE [ListID]
|
|
8960
|
+
const sSQL = `SELECT * FROM [admin].[vwListDetails] WHERE [ListID]=${list_.ID} ` + this.getRowLevelSecurityWhereClause('List Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8961
8961
|
const result = this.ArrayMapFieldNamesToCodeNames('List Details', await dataSource.query(sSQL));
|
|
8962
8962
|
return result;
|
|
8963
8963
|
}
|
|
@@ -9484,7 +9484,7 @@ let UserViewRunResolver = class UserViewRunResolver extends server_1.ResolverBas
|
|
|
9484
9484
|
}
|
|
9485
9485
|
async UserViewRunDetailsArray(userviewrun_, { dataSource, userPayload }, pubSub) {
|
|
9486
9486
|
this.CheckUserReadPermissions('User View Run Details', userPayload);
|
|
9487
|
-
const sSQL = `SELECT * FROM [admin].[vwUserViewRunDetails] WHERE [UserViewRunID]
|
|
9487
|
+
const sSQL = `SELECT * FROM [admin].[vwUserViewRunDetails] WHERE [UserViewRunID]=${userviewrun_.ID} ` + this.getRowLevelSecurityWhereClause('User View Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9488
9488
|
const result = this.ArrayMapFieldNamesToCodeNames('User View Run Details', await dataSource.query(sSQL));
|
|
9489
9489
|
return result;
|
|
9490
9490
|
}
|
|
@@ -10151,13 +10151,13 @@ let WorkflowResolver = class WorkflowResolver extends server_1.ResolverBase {
|
|
|
10151
10151
|
}
|
|
10152
10152
|
async ReportsArray(workflow_, { dataSource, userPayload }, pubSub) {
|
|
10153
10153
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
10154
|
-
const sSQL = `SELECT * FROM [admin].[vwReports] WHERE [OutputWorkflowID]
|
|
10154
|
+
const sSQL = `SELECT * FROM [admin].[vwReports] WHERE [OutputWorkflowID]=${workflow_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10155
10155
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
10156
10156
|
return result;
|
|
10157
10157
|
}
|
|
10158
10158
|
async WorkflowRunsArray(workflow_, { dataSource, userPayload }, pubSub) {
|
|
10159
10159
|
this.CheckUserReadPermissions('Workflow Runs', userPayload);
|
|
10160
|
-
const sSQL = `SELECT * FROM [admin].[vwWorkflowRuns] WHERE [WorkflowName]
|
|
10160
|
+
const sSQL = `SELECT * FROM [admin].[vwWorkflowRuns] WHERE [WorkflowName]=${workflow_.ID} ` + this.getRowLevelSecurityWhereClause('Workflow Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10161
10161
|
const result = this.ArrayMapFieldNamesToCodeNames('Workflow Runs', await dataSource.query(sSQL));
|
|
10162
10162
|
return result;
|
|
10163
10163
|
}
|
|
@@ -10372,7 +10372,7 @@ let WorkflowEngineResolver = class WorkflowEngineResolver extends server_1.Resol
|
|
|
10372
10372
|
}
|
|
10373
10373
|
async WorkflowsArray(workflowengine_, { dataSource, userPayload }, pubSub) {
|
|
10374
10374
|
this.CheckUserReadPermissions('Workflows', userPayload);
|
|
10375
|
-
const sSQL = `SELECT * FROM [admin].[vwWorkflows] WHERE [WorkflowEngineName]
|
|
10375
|
+
const sSQL = `SELECT * FROM [admin].[vwWorkflows] WHERE [WorkflowEngineName]=${workflowengine_.ID} ` + this.getRowLevelSecurityWhereClause('Workflows', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10376
10376
|
const result = this.ArrayMapFieldNamesToCodeNames('Workflows', await dataSource.query(sSQL));
|
|
10377
10377
|
return result;
|
|
10378
10378
|
}
|
|
@@ -10957,7 +10957,7 @@ let RowLevelSecurityFilterResolver = class RowLevelSecurityFilterResolver extend
|
|
|
10957
10957
|
}
|
|
10958
10958
|
async EntityPermissionsArray(rowlevelsecurityfilter_, { dataSource, userPayload }, pubSub) {
|
|
10959
10959
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
10960
|
-
const sSQL = `SELECT * FROM [admin].[vwEntityPermissions] WHERE [ReadRLSFilterID]
|
|
10960
|
+
const sSQL = `SELECT * FROM [admin].[vwEntityPermissions] WHERE [ReadRLSFilterID]=${rowlevelsecurityfilter_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10961
10961
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL));
|
|
10962
10962
|
return result;
|
|
10963
10963
|
}
|
|
@@ -11432,25 +11432,25 @@ let AuthorizationResolver = class AuthorizationResolver extends server_1.Resolve
|
|
|
11432
11432
|
}
|
|
11433
11433
|
async AuthorizationRolesArray(authorization_, { dataSource, userPayload }, pubSub) {
|
|
11434
11434
|
this.CheckUserReadPermissions('Authorization Roles', userPayload);
|
|
11435
|
-
const sSQL = `SELECT * FROM [admin].[vwAuthorizationRoles] WHERE [AuthorizationID]
|
|
11435
|
+
const sSQL = `SELECT * FROM [admin].[vwAuthorizationRoles] WHERE [AuthorizationID]=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Authorization Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11436
11436
|
const result = this.ArrayMapFieldNamesToCodeNames('Authorization Roles', await dataSource.query(sSQL));
|
|
11437
11437
|
return result;
|
|
11438
11438
|
}
|
|
11439
11439
|
async AuthorizationsArray(authorization_, { dataSource, userPayload }, pubSub) {
|
|
11440
11440
|
this.CheckUserReadPermissions('Authorizations', userPayload);
|
|
11441
|
-
const sSQL = `SELECT * FROM [admin].[vwAuthorizations] WHERE [ParentID]
|
|
11441
|
+
const sSQL = `SELECT * FROM [admin].[vwAuthorizations] WHERE [ParentID]=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Authorizations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11442
11442
|
const result = this.ArrayMapFieldNamesToCodeNames('Authorizations', await dataSource.query(sSQL));
|
|
11443
11443
|
return result;
|
|
11444
11444
|
}
|
|
11445
11445
|
async AuditLogTypesArray(authorization_, { dataSource, userPayload }, pubSub) {
|
|
11446
11446
|
this.CheckUserReadPermissions('Audit Log Types', userPayload);
|
|
11447
|
-
const sSQL = `SELECT * FROM [admin].[vwAuditLogTypes] WHERE [AuthorizationName]
|
|
11447
|
+
const sSQL = `SELECT * FROM [admin].[vwAuditLogTypes] WHERE [AuthorizationName]=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Log Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11448
11448
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Log Types', await dataSource.query(sSQL));
|
|
11449
11449
|
return result;
|
|
11450
11450
|
}
|
|
11451
11451
|
async AuditLogsArray(authorization_, { dataSource, userPayload }, pubSub) {
|
|
11452
11452
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
11453
|
-
const sSQL = `SELECT * FROM [admin].[vwAuditLogs] WHERE [AuthorizationName]
|
|
11453
|
+
const sSQL = `SELECT * FROM [admin].[vwAuditLogs] WHERE [AuthorizationName]=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11454
11454
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL));
|
|
11455
11455
|
return result;
|
|
11456
11456
|
}
|
|
@@ -11790,13 +11790,13 @@ let AuditLogTypeResolver = class AuditLogTypeResolver extends server_1.ResolverB
|
|
|
11790
11790
|
}
|
|
11791
11791
|
async AuditLogsArray(auditlogtype_, { dataSource, userPayload }, pubSub) {
|
|
11792
11792
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
11793
|
-
const sSQL = `SELECT * FROM [admin].[vwAuditLogs] WHERE [AuditLogTypeName]
|
|
11793
|
+
const sSQL = `SELECT * FROM [admin].[vwAuditLogs] WHERE [AuditLogTypeName]=${auditlogtype_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11794
11794
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL));
|
|
11795
11795
|
return result;
|
|
11796
11796
|
}
|
|
11797
11797
|
async AuditLogTypesArray(auditlogtype_, { dataSource, userPayload }, pubSub) {
|
|
11798
11798
|
this.CheckUserReadPermissions('Audit Log Types', userPayload);
|
|
11799
|
-
const sSQL = `SELECT * FROM [admin].[vwAuditLogTypes] WHERE [ParentID]
|
|
11799
|
+
const sSQL = `SELECT * FROM [admin].[vwAuditLogTypes] WHERE [ParentID]=${auditlogtype_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Log Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11800
11800
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Log Types', await dataSource.query(sSQL));
|
|
11801
11801
|
return result;
|
|
11802
11802
|
}
|
|
@@ -12186,19 +12186,19 @@ let AIModelResolver = class AIModelResolver extends server_1.ResolverBase {
|
|
|
12186
12186
|
}
|
|
12187
12187
|
async AIActionsArray(aimodel_, { dataSource, userPayload }, pubSub) {
|
|
12188
12188
|
this.CheckUserReadPermissions('AI Actions', userPayload);
|
|
12189
|
-
const sSQL = `SELECT * FROM [admin].[vwAIActions] WHERE [DefaultModelID]
|
|
12189
|
+
const sSQL = `SELECT * FROM [admin].[vwAIActions] WHERE [DefaultModelID]=${aimodel_.ID} ` + this.getRowLevelSecurityWhereClause('AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12190
12190
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Actions', await dataSource.query(sSQL));
|
|
12191
12191
|
return result;
|
|
12192
12192
|
}
|
|
12193
12193
|
async AIModelActionsArray(aimodel_, { dataSource, userPayload }, pubSub) {
|
|
12194
12194
|
this.CheckUserReadPermissions('AI Model Actions', userPayload);
|
|
12195
|
-
const sSQL = `SELECT * FROM [admin].[vwAIModelActions] WHERE [AIModelID]
|
|
12195
|
+
const sSQL = `SELECT * FROM [admin].[vwAIModelActions] WHERE [AIModelID]=${aimodel_.ID} ` + this.getRowLevelSecurityWhereClause('AI Model Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12196
12196
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Model Actions', await dataSource.query(sSQL));
|
|
12197
12197
|
return result;
|
|
12198
12198
|
}
|
|
12199
12199
|
async EntityAIActionsArray(aimodel_, { dataSource, userPayload }, pubSub) {
|
|
12200
12200
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
12201
|
-
const sSQL = `SELECT * FROM [admin].[vwEntityAIActions] WHERE [AIModelID]
|
|
12201
|
+
const sSQL = `SELECT * FROM [admin].[vwEntityAIActions] WHERE [AIModelID]=${aimodel_.ID} ` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12202
12202
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL));
|
|
12203
12203
|
return result;
|
|
12204
12204
|
}
|
|
@@ -12451,13 +12451,13 @@ let AIActionResolver = class AIActionResolver extends server_1.ResolverBase {
|
|
|
12451
12451
|
}
|
|
12452
12452
|
async AIModelActionsArray(aiaction_, { dataSource, userPayload }, pubSub) {
|
|
12453
12453
|
this.CheckUserReadPermissions('AI Model Actions', userPayload);
|
|
12454
|
-
const sSQL = `SELECT * FROM [admin].[vwAIModelActions] WHERE [AIActionID]
|
|
12454
|
+
const sSQL = `SELECT * FROM [admin].[vwAIModelActions] WHERE [AIActionID]=${aiaction_.ID} ` + this.getRowLevelSecurityWhereClause('AI Model Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12455
12455
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Model Actions', await dataSource.query(sSQL));
|
|
12456
12456
|
return result;
|
|
12457
12457
|
}
|
|
12458
12458
|
async EntityAIActionsArray(aiaction_, { dataSource, userPayload }, pubSub) {
|
|
12459
12459
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
12460
|
-
const sSQL = `SELECT * FROM [admin].[vwEntityAIActions] WHERE [AIActionID]
|
|
12460
|
+
const sSQL = `SELECT * FROM [admin].[vwEntityAIActions] WHERE [AIActionID]=${aiaction_.ID} ` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12461
12461
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL));
|
|
12462
12462
|
return result;
|
|
12463
12463
|
}
|
|
@@ -13134,7 +13134,7 @@ let AIModelTypeResolver = class AIModelTypeResolver extends server_1.ResolverBas
|
|
|
13134
13134
|
}
|
|
13135
13135
|
async AIModelsArray(aimodeltype_, { dataSource, userPayload }, pubSub) {
|
|
13136
13136
|
this.CheckUserReadPermissions('AI Models', userPayload);
|
|
13137
|
-
const sSQL = `SELECT * FROM [admin].[vwAIModels] WHERE [AIModelTypeID]
|
|
13137
|
+
const sSQL = `SELECT * FROM [admin].[vwAIModels] WHERE [AIModelTypeID]=${aimodeltype_.ID} ` + this.getRowLevelSecurityWhereClause('AI Models', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13138
13138
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Models', await dataSource.query(sSQL));
|
|
13139
13139
|
return result;
|
|
13140
13140
|
}
|
|
@@ -13316,7 +13316,7 @@ let QueueTypeResolver = class QueueTypeResolver extends server_1.ResolverBase {
|
|
|
13316
13316
|
}
|
|
13317
13317
|
async QueuesArray(queuetype_, { dataSource, userPayload }, pubSub) {
|
|
13318
13318
|
this.CheckUserReadPermissions('Queues', userPayload);
|
|
13319
|
-
const sSQL = `SELECT * FROM [admin].[vwQueues] WHERE [QueueTypeID]
|
|
13319
|
+
const sSQL = `SELECT * FROM [admin].[vwQueues] WHERE [QueueTypeID]=${queuetype_.ID} ` + this.getRowLevelSecurityWhereClause('Queues', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13320
13320
|
const result = this.ArrayMapFieldNamesToCodeNames('Queues', await dataSource.query(sSQL));
|
|
13321
13321
|
return result;
|
|
13322
13322
|
}
|
|
@@ -13672,7 +13672,7 @@ let QueueResolver = class QueueResolver extends server_1.ResolverBase {
|
|
|
13672
13672
|
}
|
|
13673
13673
|
async QueueTasksArray(queue_, { dataSource, userPayload }, pubSub) {
|
|
13674
13674
|
this.CheckUserReadPermissions('Queue Tasks', userPayload);
|
|
13675
|
-
const sSQL = `SELECT * FROM [admin].[vwQueueTasks] WHERE [QueueID]
|
|
13675
|
+
const sSQL = `SELECT * FROM [admin].[vwQueueTasks] WHERE [QueueID]=${queue_.ID} ` + this.getRowLevelSecurityWhereClause('Queue Tasks', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13676
13676
|
const result = this.ArrayMapFieldNamesToCodeNames('Queue Tasks', await dataSource.query(sSQL));
|
|
13677
13677
|
return result;
|
|
13678
13678
|
}
|
|
@@ -14413,7 +14413,7 @@ let OutputTriggerTypeResolver = class OutputTriggerTypeResolver extends server_1
|
|
|
14413
14413
|
}
|
|
14414
14414
|
async ReportsArray(outputtriggertype_, { dataSource, userPayload }, pubSub) {
|
|
14415
14415
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
14416
|
-
const sSQL = `SELECT * FROM [admin].[vwReports] WHERE [OutputTriggerTypeID]
|
|
14416
|
+
const sSQL = `SELECT * FROM [admin].[vwReports] WHERE [OutputTriggerTypeID]=${outputtriggertype_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14417
14417
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
14418
14418
|
return result;
|
|
14419
14419
|
}
|
|
@@ -14548,7 +14548,7 @@ let OutputFormatTypeResolver = class OutputFormatTypeResolver extends server_1.R
|
|
|
14548
14548
|
}
|
|
14549
14549
|
async ReportsArray(outputformattype_, { dataSource, userPayload }, pubSub) {
|
|
14550
14550
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
14551
|
-
const sSQL = `SELECT * FROM [admin].[vwReports] WHERE [OutputFormatTypeID]
|
|
14551
|
+
const sSQL = `SELECT * FROM [admin].[vwReports] WHERE [OutputFormatTypeID]=${outputformattype_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14552
14552
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
14553
14553
|
return result;
|
|
14554
14554
|
}
|
|
@@ -14679,7 +14679,7 @@ let OutputDeliveryTypeResolver = class OutputDeliveryTypeResolver extends server
|
|
|
14679
14679
|
}
|
|
14680
14680
|
async ReportsArray(outputdeliverytype_, { dataSource, userPayload }, pubSub) {
|
|
14681
14681
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
14682
|
-
const sSQL = `SELECT * FROM [admin].[vwReports] WHERE [OutputDeliveryTypeID]
|
|
14682
|
+
const sSQL = `SELECT * FROM [admin].[vwReports] WHERE [OutputDeliveryTypeID]=${outputdeliverytype_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14683
14683
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
14684
14684
|
return result;
|
|
14685
14685
|
}
|
|
@@ -15040,7 +15040,7 @@ let ReportResolver = class ReportResolver extends server_1.ResolverBase {
|
|
|
15040
15040
|
}
|
|
15041
15041
|
async ReportSnapshotsArray(report_, { dataSource, userPayload }, pubSub) {
|
|
15042
15042
|
this.CheckUserReadPermissions('Report Snapshots', userPayload);
|
|
15043
|
-
const sSQL = `SELECT * FROM [admin].[vwReportSnapshots] WHERE [ReportID]
|
|
15043
|
+
const sSQL = `SELECT * FROM [admin].[vwReportSnapshots] WHERE [ReportID]=${report_.ID} ` + this.getRowLevelSecurityWhereClause('Report Snapshots', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15044
15044
|
const result = this.ArrayMapFieldNamesToCodeNames('Report Snapshots', await dataSource.query(sSQL));
|
|
15045
15045
|
return result;
|
|
15046
15046
|
}
|
|
@@ -15553,13 +15553,13 @@ let ResourceTypeResolver = class ResourceTypeResolver extends server_1.ResolverB
|
|
|
15553
15553
|
}
|
|
15554
15554
|
async WorkspaceItemsArray(resourcetype_, { dataSource, userPayload }, pubSub) {
|
|
15555
15555
|
this.CheckUserReadPermissions('Workspace Items', userPayload);
|
|
15556
|
-
const sSQL = `SELECT * FROM [admin].[vwWorkspaceItems] WHERE [ResourceTypeID]
|
|
15556
|
+
const sSQL = `SELECT * FROM [admin].[vwWorkspaceItems] WHERE [ResourceTypeID]=${resourcetype_.ID} ` + this.getRowLevelSecurityWhereClause('Workspace Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15557
15557
|
const result = this.ArrayMapFieldNamesToCodeNames('Workspace Items', await dataSource.query(sSQL));
|
|
15558
15558
|
return result;
|
|
15559
15559
|
}
|
|
15560
15560
|
async ResourceFoldersArray(resourcetype_, { dataSource, userPayload }, pubSub) {
|
|
15561
15561
|
this.CheckUserReadPermissions('Resource Folders', userPayload);
|
|
15562
|
-
const sSQL = `SELECT * FROM [admin].[vwResourceFolders] WHERE [ResourceTypeName]
|
|
15562
|
+
const sSQL = `SELECT * FROM [admin].[vwResourceFolders] WHERE [ResourceTypeName]=${resourcetype_.ID} ` + this.getRowLevelSecurityWhereClause('Resource Folders', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15563
15563
|
const result = this.ArrayMapFieldNamesToCodeNames('Resource Folders', await dataSource.query(sSQL));
|
|
15564
15564
|
return result;
|
|
15565
15565
|
}
|
|
@@ -15717,13 +15717,13 @@ let TagResolver = class TagResolver extends server_1.ResolverBase {
|
|
|
15717
15717
|
}
|
|
15718
15718
|
async TagsArray(tag_, { dataSource, userPayload }, pubSub) {
|
|
15719
15719
|
this.CheckUserReadPermissions('Tags', userPayload);
|
|
15720
|
-
const sSQL = `SELECT * FROM [admin].[vwTags] WHERE [ParentID]
|
|
15720
|
+
const sSQL = `SELECT * FROM [admin].[vwTags] WHERE [ParentID]=${tag_.ID} ` + this.getRowLevelSecurityWhereClause('Tags', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15721
15721
|
const result = this.ArrayMapFieldNamesToCodeNames('Tags', await dataSource.query(sSQL));
|
|
15722
15722
|
return result;
|
|
15723
15723
|
}
|
|
15724
15724
|
async TaggedItemsArray(tag_, { dataSource, userPayload }, pubSub) {
|
|
15725
15725
|
this.CheckUserReadPermissions('Tagged Items', userPayload);
|
|
15726
|
-
const sSQL = `SELECT * FROM [admin].[vwTaggedItems] WHERE [TagID]
|
|
15726
|
+
const sSQL = `SELECT * FROM [admin].[vwTaggedItems] WHERE [TagID]=${tag_.ID} ` + this.getRowLevelSecurityWhereClause('Tagged Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15727
15727
|
const result = this.ArrayMapFieldNamesToCodeNames('Tagged Items', await dataSource.query(sSQL));
|
|
15728
15728
|
return result;
|
|
15729
15729
|
}
|
|
@@ -16038,7 +16038,7 @@ let WorkspaceResolver = class WorkspaceResolver extends server_1.ResolverBase {
|
|
|
16038
16038
|
}
|
|
16039
16039
|
async WorkspaceItemsArray(workspace_, { dataSource, userPayload }, pubSub) {
|
|
16040
16040
|
this.CheckUserReadPermissions('Workspace Items', userPayload);
|
|
16041
|
-
const sSQL = `SELECT * FROM [admin].[vwWorkspaceItems] WHERE [WorkSpaceID]
|
|
16041
|
+
const sSQL = `SELECT * FROM [admin].[vwWorkspaceItems] WHERE [WorkSpaceID]=${workspace_.ID} ` + this.getRowLevelSecurityWhereClause('Workspace Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16042
16042
|
const result = this.ArrayMapFieldNamesToCodeNames('Workspace Items', await dataSource.query(sSQL));
|
|
16043
16043
|
return result;
|
|
16044
16044
|
}
|
|
@@ -16573,7 +16573,7 @@ let DatasetResolver = class DatasetResolver extends server_1.ResolverBase {
|
|
|
16573
16573
|
}
|
|
16574
16574
|
async DatasetItemsArray(dataset_, { dataSource, userPayload }, pubSub) {
|
|
16575
16575
|
this.CheckUserReadPermissions('Dataset Items', userPayload);
|
|
16576
|
-
const sSQL = `SELECT * FROM [admin].[vwDatasetItems] WHERE [DatasetName]
|
|
16576
|
+
const sSQL = `SELECT * FROM [admin].[vwDatasetItems] WHERE [DatasetName]=${dataset_.ID} ` + this.getRowLevelSecurityWhereClause('Dataset Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16577
16577
|
const result = this.ArrayMapFieldNamesToCodeNames('Dataset Items', await dataSource.query(sSQL));
|
|
16578
16578
|
return result;
|
|
16579
16579
|
}
|
|
@@ -16935,7 +16935,7 @@ let ConversationDetailResolver = class ConversationDetailResolver extends server
|
|
|
16935
16935
|
}
|
|
16936
16936
|
async ReportsArray(conversationdetail_, { dataSource, userPayload }, pubSub) {
|
|
16937
16937
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
16938
|
-
const sSQL = `SELECT * FROM [admin].[vwReports] WHERE [ConversationDetailID]
|
|
16938
|
+
const sSQL = `SELECT * FROM [admin].[vwReports] WHERE [ConversationDetailID]=${conversationdetail_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16939
16939
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
16940
16940
|
return result;
|
|
16941
16941
|
}
|
|
@@ -17219,13 +17219,13 @@ let ConversationResolver = class ConversationResolver extends server_1.ResolverB
|
|
|
17219
17219
|
}
|
|
17220
17220
|
async ConversationDetailsArray(conversation_, { dataSource, userPayload }, pubSub) {
|
|
17221
17221
|
this.CheckUserReadPermissions('Conversation Details', userPayload);
|
|
17222
|
-
const sSQL = `SELECT * FROM [admin].[vwConversationDetails] WHERE [ConversationID]
|
|
17222
|
+
const sSQL = `SELECT * FROM [admin].[vwConversationDetails] WHERE [ConversationID]=${conversation_.ID} ` + this.getRowLevelSecurityWhereClause('Conversation Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17223
17223
|
const result = this.ArrayMapFieldNamesToCodeNames('Conversation Details', await dataSource.query(sSQL));
|
|
17224
17224
|
return result;
|
|
17225
17225
|
}
|
|
17226
17226
|
async ReportsArray(conversation_, { dataSource, userPayload }, pubSub) {
|
|
17227
17227
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
17228
|
-
const sSQL = `SELECT * FROM [admin].[vwReports] WHERE [ConversationID]
|
|
17228
|
+
const sSQL = `SELECT * FROM [admin].[vwReports] WHERE [ConversationID]=${conversation_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17229
17229
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
17230
17230
|
return result;
|
|
17231
17231
|
}
|
|
@@ -17833,7 +17833,7 @@ let ResourceFolderResolver = class ResourceFolderResolver extends server_1.Resol
|
|
|
17833
17833
|
}
|
|
17834
17834
|
async ResourceFoldersArray(resourcefolder_, { dataSource, userPayload }, pubSub) {
|
|
17835
17835
|
this.CheckUserReadPermissions('Resource Folders', userPayload);
|
|
17836
|
-
const sSQL = `SELECT * FROM [admin].[vwResourceFolders] WHERE [ParentID]
|
|
17836
|
+
const sSQL = `SELECT * FROM [admin].[vwResourceFolders] WHERE [ParentID]=${resourcefolder_.ID} ` + this.getRowLevelSecurityWhereClause('Resource Folders', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17837
17837
|
const result = this.ArrayMapFieldNamesToCodeNames('Resource Folders', await dataSource.query(sSQL));
|
|
17838
17838
|
return result;
|
|
17839
17839
|
}
|
|
@@ -18652,7 +18652,7 @@ let RecordMergeLogResolver = class RecordMergeLogResolver extends server_1.Resol
|
|
|
18652
18652
|
}
|
|
18653
18653
|
async RecordMergeDeletionLogsArray(recordmergelog_, { dataSource, userPayload }, pubSub) {
|
|
18654
18654
|
this.CheckUserReadPermissions('Record Merge Deletion Logs', userPayload);
|
|
18655
|
-
const sSQL = `SELECT * FROM [admin].[vwRecordMergeDeletionLogs] WHERE [RecordMergeLogID]
|
|
18655
|
+
const sSQL = `SELECT * FROM [admin].[vwRecordMergeDeletionLogs] WHERE [RecordMergeLogID]=${recordmergelog_.ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Deletion Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
18656
18656
|
const result = this.ArrayMapFieldNamesToCodeNames('Record Merge Deletion Logs', await dataSource.query(sSQL));
|
|
18657
18657
|
return result;
|
|
18658
18658
|
}
|