@memberjunction/server 0.9.221 → 0.9.222
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/build.log.json +3 -0
- package/dist/generated/generated.js +304 -231
- package/dist/generated/generated.js.map +1 -1
- package/dist/resolvers/MergeRecordsResolver.js +3 -3
- package/dist/resolvers/MergeRecordsResolver.js.map +1 -1
- package/package.json +1 -1
- package/src/generated/generated.ts +282 -232
- package/src/resolvers/MergeRecordsResolver.ts +2 -2
|
@@ -207,31 +207,31 @@ let CompanyResolver = class CompanyResolver extends server_1.ResolverBase {
|
|
|
207
207
|
}
|
|
208
208
|
async Company(ID, { dataSource, userPayload }, pubSub) {
|
|
209
209
|
this.CheckUserReadPermissions('Companies', userPayload);
|
|
210
|
-
const sSQL = `SELECT * FROM [
|
|
210
|
+
const sSQL = `SELECT * FROM [__mj].[vwCompanies] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Companies', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
211
211
|
const result = this.MapFieldNamesToCodeNames('Companies', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
212
212
|
return result;
|
|
213
213
|
}
|
|
214
214
|
async AllCompanies({ dataSource, userPayload }, pubSub) {
|
|
215
215
|
this.CheckUserReadPermissions('Companies', userPayload);
|
|
216
|
-
const sSQL = 'SELECT * FROM [
|
|
216
|
+
const sSQL = 'SELECT * FROM [__mj].[vwCompanies]' + this.getRowLevelSecurityWhereClause('Companies', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
217
217
|
const result = this.ArrayMapFieldNamesToCodeNames('Companies', await dataSource.query(sSQL));
|
|
218
218
|
return result;
|
|
219
219
|
}
|
|
220
220
|
async EmployeesArray(company_, { dataSource, userPayload }, pubSub) {
|
|
221
221
|
this.CheckUserReadPermissions('Employees', userPayload);
|
|
222
|
-
const sSQL = `SELECT * FROM [
|
|
222
|
+
const sSQL = `SELECT * FROM [__mj].[vwEmployees] WHERE [CompanyID]=${company_.ID} ` + this.getRowLevelSecurityWhereClause('Employees', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
223
223
|
const result = this.ArrayMapFieldNamesToCodeNames('Employees', await dataSource.query(sSQL));
|
|
224
224
|
return result;
|
|
225
225
|
}
|
|
226
226
|
async CompanyIntegrationsArray(company_, { dataSource, userPayload }, pubSub) {
|
|
227
227
|
this.CheckUserReadPermissions('Company Integrations', userPayload);
|
|
228
|
-
const sSQL = `SELECT * FROM [
|
|
228
|
+
const sSQL = `SELECT * FROM [__mj].[vwCompanyIntegrations] WHERE [CompanyName]=${company_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
229
229
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integrations', await dataSource.query(sSQL));
|
|
230
230
|
return result;
|
|
231
231
|
}
|
|
232
232
|
async WorkflowsArray(company_, { dataSource, userPayload }, pubSub) {
|
|
233
233
|
this.CheckUserReadPermissions('Workflows', userPayload);
|
|
234
|
-
const sSQL = `SELECT * FROM [
|
|
234
|
+
const sSQL = `SELECT * FROM [__mj].[vwWorkflows] WHERE [CompanyName]=${company_.ID} ` + this.getRowLevelSecurityWhereClause('Workflows', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
235
235
|
const result = this.ArrayMapFieldNamesToCodeNames('Workflows', await dataSource.query(sSQL));
|
|
236
236
|
return result;
|
|
237
237
|
}
|
|
@@ -632,37 +632,37 @@ let EmployeeResolver = class EmployeeResolver extends server_1.ResolverBase {
|
|
|
632
632
|
}
|
|
633
633
|
async Employee(ID, { dataSource, userPayload }, pubSub) {
|
|
634
634
|
this.CheckUserReadPermissions('Employees', userPayload);
|
|
635
|
-
const sSQL = `SELECT * FROM [
|
|
635
|
+
const sSQL = `SELECT * FROM [__mj].[vwEmployees] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Employees', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
636
636
|
const result = this.MapFieldNamesToCodeNames('Employees', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
637
637
|
return result;
|
|
638
638
|
}
|
|
639
639
|
async AllEmployees({ dataSource, userPayload }, pubSub) {
|
|
640
640
|
this.CheckUserReadPermissions('Employees', userPayload);
|
|
641
|
-
const sSQL = 'SELECT * FROM [
|
|
641
|
+
const sSQL = 'SELECT * FROM [__mj].[vwEmployees]' + this.getRowLevelSecurityWhereClause('Employees', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
642
642
|
const result = this.ArrayMapFieldNamesToCodeNames('Employees', await dataSource.query(sSQL));
|
|
643
643
|
return result;
|
|
644
644
|
}
|
|
645
645
|
async EmployeesArray(employee_, { dataSource, userPayload }, pubSub) {
|
|
646
646
|
this.CheckUserReadPermissions('Employees', userPayload);
|
|
647
|
-
const sSQL = `SELECT * FROM [
|
|
647
|
+
const sSQL = `SELECT * FROM [__mj].[vwEmployees] WHERE [SupervisorID]=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employees', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
648
648
|
const result = this.ArrayMapFieldNamesToCodeNames('Employees', await dataSource.query(sSQL));
|
|
649
649
|
return result;
|
|
650
650
|
}
|
|
651
651
|
async EmployeeCompanyIntegrationsArray(employee_, { dataSource, userPayload }, pubSub) {
|
|
652
652
|
this.CheckUserReadPermissions('Employee Company Integrations', userPayload);
|
|
653
|
-
const sSQL = `SELECT * FROM [
|
|
653
|
+
const sSQL = `SELECT * FROM [__mj].[vwEmployeeCompanyIntegrations] WHERE [EmployeeID]=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
654
654
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Company Integrations', await dataSource.query(sSQL));
|
|
655
655
|
return result;
|
|
656
656
|
}
|
|
657
657
|
async EmployeeRolesArray(employee_, { dataSource, userPayload }, pubSub) {
|
|
658
658
|
this.CheckUserReadPermissions('Employee Roles', userPayload);
|
|
659
|
-
const sSQL = `SELECT * FROM [
|
|
659
|
+
const sSQL = `SELECT * FROM [__mj].[vwEmployeeRoles] WHERE [EmployeeID]=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
660
660
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Roles', await dataSource.query(sSQL));
|
|
661
661
|
return result;
|
|
662
662
|
}
|
|
663
663
|
async EmployeeSkillsArray(employee_, { dataSource, userPayload }, pubSub) {
|
|
664
664
|
this.CheckUserReadPermissions('Employee Skills', userPayload);
|
|
665
|
-
const sSQL = `SELECT * FROM [
|
|
665
|
+
const sSQL = `SELECT * FROM [__mj].[vwEmployeeSkills] WHERE [EmployeeID]=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
666
666
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Skills', await dataSource.query(sSQL));
|
|
667
667
|
return result;
|
|
668
668
|
}
|
|
@@ -977,7 +977,7 @@ let UserFavoriteResolverBase = class UserFavoriteResolverBase extends server_1.R
|
|
|
977
977
|
}
|
|
978
978
|
async UserFavorite(ID, { dataSource, userPayload }, pubSub) {
|
|
979
979
|
this.CheckUserReadPermissions('User Favorites', userPayload);
|
|
980
|
-
const sSQL = `SELECT * FROM [
|
|
980
|
+
const sSQL = `SELECT * FROM [__mj].[vwUserFavorites] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Favorites', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
981
981
|
const result = this.MapFieldNamesToCodeNames('User Favorites', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
982
982
|
return result;
|
|
983
983
|
}
|
|
@@ -1222,7 +1222,7 @@ let EmployeeCompanyIntegrationResolver = class EmployeeCompanyIntegrationResolve
|
|
|
1222
1222
|
}
|
|
1223
1223
|
async EmployeeCompanyIntegration(ID, { dataSource, userPayload }, pubSub) {
|
|
1224
1224
|
this.CheckUserReadPermissions('Employee Company Integrations', userPayload);
|
|
1225
|
-
const sSQL = `SELECT * FROM [
|
|
1225
|
+
const sSQL = `SELECT * FROM [__mj].[vwEmployeeCompanyIntegrations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Employee Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1226
1226
|
const result = this.MapFieldNamesToCodeNames('Employee Company Integrations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
1227
1227
|
return result;
|
|
1228
1228
|
}
|
|
@@ -1395,7 +1395,7 @@ let EmployeeRoleResolver = class EmployeeRoleResolver extends server_1.ResolverB
|
|
|
1395
1395
|
}
|
|
1396
1396
|
async EmployeeRole(ID, { dataSource, userPayload }, pubSub) {
|
|
1397
1397
|
this.CheckUserReadPermissions('Employee Roles', userPayload);
|
|
1398
|
-
const sSQL = `SELECT * FROM [
|
|
1398
|
+
const sSQL = `SELECT * FROM [__mj].[vwEmployeeRoles] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Employee Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1399
1399
|
const result = this.MapFieldNamesToCodeNames('Employee Roles', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
1400
1400
|
return result;
|
|
1401
1401
|
}
|
|
@@ -1569,7 +1569,7 @@ let EmployeeSkillResolver = class EmployeeSkillResolver extends server_1.Resolve
|
|
|
1569
1569
|
}
|
|
1570
1570
|
async EmployeeSkill(ID, { dataSource, userPayload }, pubSub) {
|
|
1571
1571
|
this.CheckUserReadPermissions('Employee Skills', userPayload);
|
|
1572
|
-
const sSQL = `SELECT * FROM [
|
|
1572
|
+
const sSQL = `SELECT * FROM [__mj].[vwEmployeeSkills] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Employee Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1573
1573
|
const result = this.MapFieldNamesToCodeNames('Employee Skills', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
1574
1574
|
return result;
|
|
1575
1575
|
}
|
|
@@ -1778,43 +1778,43 @@ let RoleResolver = class RoleResolver extends server_1.ResolverBase {
|
|
|
1778
1778
|
}
|
|
1779
1779
|
async Role(ID, { dataSource, userPayload }, pubSub) {
|
|
1780
1780
|
this.CheckUserReadPermissions('Roles', userPayload);
|
|
1781
|
-
const sSQL = `SELECT * FROM [
|
|
1781
|
+
const sSQL = `SELECT * FROM [__mj].[vwRoles] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1782
1782
|
const result = this.MapFieldNamesToCodeNames('Roles', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
1783
1783
|
return result;
|
|
1784
1784
|
}
|
|
1785
1785
|
async AllRoles({ dataSource, userPayload }, pubSub) {
|
|
1786
1786
|
this.CheckUserReadPermissions('Roles', userPayload);
|
|
1787
|
-
const sSQL = 'SELECT * FROM [
|
|
1787
|
+
const sSQL = 'SELECT * FROM [__mj].[vwRoles]' + this.getRowLevelSecurityWhereClause('Roles', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
1788
1788
|
const result = this.ArrayMapFieldNamesToCodeNames('Roles', await dataSource.query(sSQL));
|
|
1789
1789
|
return result;
|
|
1790
1790
|
}
|
|
1791
1791
|
async EmployeeRolesArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1792
1792
|
this.CheckUserReadPermissions('Employee Roles', userPayload);
|
|
1793
|
-
const sSQL = `SELECT * FROM [
|
|
1793
|
+
const sSQL = `SELECT * FROM [__mj].[vwEmployeeRoles] WHERE [RoleID]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1794
1794
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Roles', await dataSource.query(sSQL));
|
|
1795
1795
|
return result;
|
|
1796
1796
|
}
|
|
1797
1797
|
async EntityPermissionsArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1798
1798
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
1799
|
-
const sSQL = `SELECT * FROM [
|
|
1799
|
+
const sSQL = `SELECT * FROM [__mj].[vwEntityPermissions] WHERE [RoleName]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1800
1800
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL));
|
|
1801
1801
|
return result;
|
|
1802
1802
|
}
|
|
1803
1803
|
async UserRolesArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1804
1804
|
this.CheckUserReadPermissions('User Roles', userPayload);
|
|
1805
|
-
const sSQL = `SELECT * FROM [
|
|
1805
|
+
const sSQL = `SELECT * FROM [__mj].[vwUserRoles] WHERE [RoleName]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('User Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1806
1806
|
const result = this.ArrayMapFieldNamesToCodeNames('User Roles', await dataSource.query(sSQL));
|
|
1807
1807
|
return result;
|
|
1808
1808
|
}
|
|
1809
1809
|
async AuthorizationRolesArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1810
1810
|
this.CheckUserReadPermissions('Authorization Roles', userPayload);
|
|
1811
|
-
const sSQL = `SELECT * FROM [
|
|
1811
|
+
const sSQL = `SELECT * FROM [__mj].[vwAuthorizationRoles] WHERE [RoleName]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('Authorization Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1812
1812
|
const result = this.ArrayMapFieldNamesToCodeNames('Authorization Roles', await dataSource.query(sSQL));
|
|
1813
1813
|
return result;
|
|
1814
1814
|
}
|
|
1815
1815
|
async QueryPermissionsArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1816
1816
|
this.CheckUserReadPermissions('Query Permissions', userPayload);
|
|
1817
|
-
const sSQL = `SELECT * FROM [
|
|
1817
|
+
const sSQL = `SELECT * FROM [__mj].[vwQueryPermissions] WHERE [RoleName]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('Query Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1818
1818
|
const result = this.ArrayMapFieldNamesToCodeNames('Query Permissions', await dataSource.query(sSQL));
|
|
1819
1819
|
return result;
|
|
1820
1820
|
}
|
|
@@ -2031,25 +2031,25 @@ let SkillResolver = class SkillResolver extends server_1.ResolverBase {
|
|
|
2031
2031
|
}
|
|
2032
2032
|
async Skill(ID, { dataSource, userPayload }, pubSub) {
|
|
2033
2033
|
this.CheckUserReadPermissions('Skills', userPayload);
|
|
2034
|
-
const sSQL = `SELECT * FROM [
|
|
2034
|
+
const sSQL = `SELECT * FROM [__mj].[vwSkills] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2035
2035
|
const result = this.MapFieldNamesToCodeNames('Skills', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
2036
2036
|
return result;
|
|
2037
2037
|
}
|
|
2038
2038
|
async AllSkills({ dataSource, userPayload }, pubSub) {
|
|
2039
2039
|
this.CheckUserReadPermissions('Skills', userPayload);
|
|
2040
|
-
const sSQL = 'SELECT * FROM [
|
|
2040
|
+
const sSQL = 'SELECT * FROM [__mj].[vwSkills]' + this.getRowLevelSecurityWhereClause('Skills', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
2041
2041
|
const result = this.ArrayMapFieldNamesToCodeNames('Skills', await dataSource.query(sSQL));
|
|
2042
2042
|
return result;
|
|
2043
2043
|
}
|
|
2044
2044
|
async EmployeeSkillsArray(skill_, { dataSource, userPayload }, pubSub) {
|
|
2045
2045
|
this.CheckUserReadPermissions('Employee Skills', userPayload);
|
|
2046
|
-
const sSQL = `SELECT * FROM [
|
|
2046
|
+
const sSQL = `SELECT * FROM [__mj].[vwEmployeeSkills] WHERE [SkillID]=${skill_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2047
2047
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Skills', await dataSource.query(sSQL));
|
|
2048
2048
|
return result;
|
|
2049
2049
|
}
|
|
2050
2050
|
async SkillsArray(skill_, { dataSource, userPayload }, pubSub) {
|
|
2051
2051
|
this.CheckUserReadPermissions('Skills', userPayload);
|
|
2052
|
-
const sSQL = `SELECT * FROM [
|
|
2052
|
+
const sSQL = `SELECT * FROM [__mj].[vwSkills] WHERE [ParentID]=${skill_.ID} ` + this.getRowLevelSecurityWhereClause('Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2053
2053
|
const result = this.ArrayMapFieldNamesToCodeNames('Skills', await dataSource.query(sSQL));
|
|
2054
2054
|
return result;
|
|
2055
2055
|
}
|
|
@@ -2232,13 +2232,13 @@ let IntegrationURLFormatResolver = class IntegrationURLFormatResolver extends se
|
|
|
2232
2232
|
}
|
|
2233
2233
|
async IntegrationURLFormat(ID, { dataSource, userPayload }, pubSub) {
|
|
2234
2234
|
this.CheckUserReadPermissions('Integration URL Formats', userPayload);
|
|
2235
|
-
const sSQL = `SELECT * FROM [
|
|
2235
|
+
const sSQL = `SELECT * FROM [__mj].[vwIntegrationURLFormats] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Integration URL Formats', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2236
2236
|
const result = this.MapFieldNamesToCodeNames('Integration URL Formats', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
2237
2237
|
return result;
|
|
2238
2238
|
}
|
|
2239
2239
|
async AllIntegrationURLFormats({ dataSource, userPayload }, pubSub) {
|
|
2240
2240
|
this.CheckUserReadPermissions('Integration URL Formats', userPayload);
|
|
2241
|
-
const sSQL = 'SELECT * FROM [
|
|
2241
|
+
const sSQL = 'SELECT * FROM [__mj].[vwIntegrationURLFormats]' + this.getRowLevelSecurityWhereClause('Integration URL Formats', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
2242
2242
|
const result = this.ArrayMapFieldNamesToCodeNames('Integration URL Formats', await dataSource.query(sSQL));
|
|
2243
2243
|
return result;
|
|
2244
2244
|
}
|
|
@@ -2467,25 +2467,25 @@ let IntegrationResolver = class IntegrationResolver extends server_1.ResolverBas
|
|
|
2467
2467
|
}
|
|
2468
2468
|
async Integration(ID, { dataSource, userPayload }, pubSub) {
|
|
2469
2469
|
this.CheckUserReadPermissions('Integrations', userPayload);
|
|
2470
|
-
const sSQL = `SELECT * FROM [
|
|
2470
|
+
const sSQL = `SELECT * FROM [__mj].[vwIntegrations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2471
2471
|
const result = this.MapFieldNamesToCodeNames('Integrations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
2472
2472
|
return result;
|
|
2473
2473
|
}
|
|
2474
2474
|
async AllIntegrations({ dataSource, userPayload }, pubSub) {
|
|
2475
2475
|
this.CheckUserReadPermissions('Integrations', userPayload);
|
|
2476
|
-
const sSQL = 'SELECT * FROM [
|
|
2476
|
+
const sSQL = 'SELECT * FROM [__mj].[vwIntegrations]' + this.getRowLevelSecurityWhereClause('Integrations', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
2477
2477
|
const result = this.ArrayMapFieldNamesToCodeNames('Integrations', await dataSource.query(sSQL));
|
|
2478
2478
|
return result;
|
|
2479
2479
|
}
|
|
2480
2480
|
async IntegrationURLFormatsArray(integration_, { dataSource, userPayload }, pubSub) {
|
|
2481
2481
|
this.CheckUserReadPermissions('Integration URL Formats', userPayload);
|
|
2482
|
-
const sSQL = `SELECT * FROM [
|
|
2482
|
+
const sSQL = `SELECT * FROM [__mj].[vwIntegrationURLFormats] WHERE [IntegrationID]=${integration_.ID} ` + this.getRowLevelSecurityWhereClause('Integration URL Formats', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2483
2483
|
const result = this.ArrayMapFieldNamesToCodeNames('Integration URL Formats', await dataSource.query(sSQL));
|
|
2484
2484
|
return result;
|
|
2485
2485
|
}
|
|
2486
2486
|
async CompanyIntegrationsArray(integration_, { dataSource, userPayload }, pubSub) {
|
|
2487
2487
|
this.CheckUserReadPermissions('Company Integrations', userPayload);
|
|
2488
|
-
const sSQL = `SELECT * FROM [
|
|
2488
|
+
const sSQL = `SELECT * FROM [__mj].[vwCompanyIntegrations] WHERE [IntegrationName]=${integration_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2489
2489
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integrations', await dataSource.query(sSQL));
|
|
2490
2490
|
return result;
|
|
2491
2491
|
}
|
|
@@ -2827,31 +2827,31 @@ let CompanyIntegrationResolver = class CompanyIntegrationResolver extends server
|
|
|
2827
2827
|
}
|
|
2828
2828
|
async CompanyIntegration(ID, { dataSource, userPayload }, pubSub) {
|
|
2829
2829
|
this.CheckUserReadPermissions('Company Integrations', userPayload);
|
|
2830
|
-
const sSQL = `SELECT * FROM [
|
|
2830
|
+
const sSQL = `SELECT * FROM [__mj].[vwCompanyIntegrations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2831
2831
|
const result = this.MapFieldNamesToCodeNames('Company Integrations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
2832
2832
|
return result;
|
|
2833
2833
|
}
|
|
2834
2834
|
async ListsArray(companyintegration_, { dataSource, userPayload }, pubSub) {
|
|
2835
2835
|
this.CheckUserReadPermissions('Lists', userPayload);
|
|
2836
|
-
const sSQL = `SELECT * FROM [
|
|
2836
|
+
const sSQL = `SELECT * FROM [__mj].[vwLists] WHERE [CompanyIntegrationID]=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Lists', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2837
2837
|
const result = this.ArrayMapFieldNamesToCodeNames('Lists', await dataSource.query(sSQL));
|
|
2838
2838
|
return result;
|
|
2839
2839
|
}
|
|
2840
2840
|
async EmployeeCompanyIntegrationsArray(companyintegration_, { dataSource, userPayload }, pubSub) {
|
|
2841
2841
|
this.CheckUserReadPermissions('Employee Company Integrations', userPayload);
|
|
2842
|
-
const sSQL = `SELECT * FROM [
|
|
2842
|
+
const sSQL = `SELECT * FROM [__mj].[vwEmployeeCompanyIntegrations] WHERE [CompanyIntegrationID]=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2843
2843
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Company Integrations', await dataSource.query(sSQL));
|
|
2844
2844
|
return result;
|
|
2845
2845
|
}
|
|
2846
2846
|
async CompanyIntegrationRunsArray(companyintegration_, { dataSource, userPayload }, pubSub) {
|
|
2847
2847
|
this.CheckUserReadPermissions('Company Integration Runs', userPayload);
|
|
2848
|
-
const sSQL = `SELECT * FROM [
|
|
2848
|
+
const sSQL = `SELECT * FROM [__mj].[vwCompanyIntegrationRuns] WHERE [CompanyIntegrationID]=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2849
2849
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Runs', await dataSource.query(sSQL));
|
|
2850
2850
|
return result;
|
|
2851
2851
|
}
|
|
2852
2852
|
async CompanyIntegrationRecordMapsArray(companyintegration_, { dataSource, userPayload }, pubSub) {
|
|
2853
2853
|
this.CheckUserReadPermissions('Company Integration Record Maps', userPayload);
|
|
2854
|
-
const sSQL = `SELECT * FROM [
|
|
2854
|
+
const sSQL = `SELECT * FROM [__mj].[vwCompanyIntegrationRecordMaps] WHERE [CompanyIntegrationID]=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Record Maps', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2855
2855
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Record Maps', await dataSource.query(sSQL));
|
|
2856
2856
|
return result;
|
|
2857
2857
|
}
|
|
@@ -3440,19 +3440,19 @@ let EntityFieldResolver = class EntityFieldResolver extends server_1.ResolverBas
|
|
|
3440
3440
|
}
|
|
3441
3441
|
async EntityField(ID, { dataSource, userPayload }, pubSub) {
|
|
3442
3442
|
this.CheckUserReadPermissions('Entity Fields', userPayload);
|
|
3443
|
-
const sSQL = `SELECT * FROM [
|
|
3443
|
+
const sSQL = `SELECT * FROM [__mj].[vwEntityFields] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Fields', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
3444
3444
|
const result = this.MapFieldNamesToCodeNames('Entity Fields', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
3445
3445
|
return result;
|
|
3446
3446
|
}
|
|
3447
3447
|
async AllEntityFields({ dataSource, userPayload }, pubSub) {
|
|
3448
3448
|
this.CheckUserReadPermissions('Entity Fields', userPayload);
|
|
3449
|
-
const sSQL = 'SELECT * FROM [
|
|
3449
|
+
const sSQL = 'SELECT * FROM [__mj].[vwEntityFields]' + this.getRowLevelSecurityWhereClause('Entity Fields', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
3450
3450
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Fields', await dataSource.query(sSQL));
|
|
3451
3451
|
return result;
|
|
3452
3452
|
}
|
|
3453
3453
|
async EntityFieldValuesArray(entityfield_, { dataSource, userPayload }, pubSub) {
|
|
3454
3454
|
this.CheckUserReadPermissions('Entity Field Values', userPayload);
|
|
3455
|
-
const sSQL = `SELECT * FROM [
|
|
3455
|
+
const sSQL = `SELECT * FROM [__mj].[vwEntityFieldValues] WHERE [EntityFieldID]=${entityfield_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Field Values', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
3456
3456
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Field Values', await dataSource.query(sSQL));
|
|
3457
3457
|
return result;
|
|
3458
3458
|
}
|
|
@@ -3912,6 +3912,14 @@ __decorate([
|
|
|
3912
3912
|
(0, server_1.Field)(() => [mj_core_schema_server_object_types.DataContextItem_]),
|
|
3913
3913
|
__metadata("design:type", Array)
|
|
3914
3914
|
], Entity_.prototype, "DataContextItemsArray", void 0);
|
|
3915
|
+
__decorate([
|
|
3916
|
+
(0, server_1.Field)(() => [mj_core_schema_server_object_types.User_]),
|
|
3917
|
+
__metadata("design:type", Array)
|
|
3918
|
+
], Entity_.prototype, "UsersArray", void 0);
|
|
3919
|
+
__decorate([
|
|
3920
|
+
(0, server_1.Field)(() => [mj_core_schema_server_object_types.EntityRecordDocument_]),
|
|
3921
|
+
__metadata("design:type", Array)
|
|
3922
|
+
], Entity_.prototype, "EntityRecordDocumentsArray", void 0);
|
|
3915
3923
|
exports.Entity_ = Entity_ = __decorate([
|
|
3916
3924
|
(0, server_1.ObjectType)()
|
|
3917
3925
|
], Entity_);
|
|
@@ -4270,160 +4278,172 @@ let EntityResolverBase = class EntityResolverBase extends server_1.ResolverBase
|
|
|
4270
4278
|
}
|
|
4271
4279
|
async Entity(ID, { dataSource, userPayload }, pubSub) {
|
|
4272
4280
|
this.CheckUserReadPermissions('Entities', userPayload);
|
|
4273
|
-
const sSQL = `SELECT * FROM [
|
|
4281
|
+
const sSQL = `SELECT * FROM [__mj].[vwEntities] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4274
4282
|
const result = this.MapFieldNamesToCodeNames('Entities', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
4275
4283
|
return result;
|
|
4276
4284
|
}
|
|
4277
4285
|
async AllEntities({ dataSource, userPayload }, pubSub) {
|
|
4278
4286
|
this.CheckUserReadPermissions('Entities', userPayload);
|
|
4279
|
-
const sSQL = 'SELECT * FROM [
|
|
4287
|
+
const sSQL = 'SELECT * FROM [__mj].[vwEntities]' + this.getRowLevelSecurityWhereClause('Entities', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
4280
4288
|
const result = this.ArrayMapFieldNamesToCodeNames('Entities', await dataSource.query(sSQL));
|
|
4281
4289
|
return result;
|
|
4282
4290
|
}
|
|
4283
4291
|
async EntityFieldsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4284
4292
|
this.CheckUserReadPermissions('Entity Fields', userPayload);
|
|
4285
|
-
const sSQL = `SELECT * FROM [
|
|
4293
|
+
const sSQL = `SELECT * FROM [__mj].[vwEntityFields] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Fields', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4286
4294
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Fields', await dataSource.query(sSQL));
|
|
4287
4295
|
return result;
|
|
4288
4296
|
}
|
|
4289
4297
|
async EntityPermissionsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4290
4298
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
4291
|
-
const sSQL = `SELECT * FROM [
|
|
4299
|
+
const sSQL = `SELECT * FROM [__mj].[vwEntityPermissions] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4292
4300
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL));
|
|
4293
4301
|
return result;
|
|
4294
4302
|
}
|
|
4295
4303
|
async EntityRelationshipsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4296
4304
|
this.CheckUserReadPermissions('Entity Relationships', userPayload);
|
|
4297
|
-
const sSQL = `SELECT * FROM [
|
|
4305
|
+
const sSQL = `SELECT * FROM [__mj].[vwEntityRelationships] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Relationships', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4298
4306
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Relationships', await dataSource.query(sSQL));
|
|
4299
4307
|
return result;
|
|
4300
4308
|
}
|
|
4301
4309
|
async EntityAIActionsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4302
4310
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
4303
|
-
const sSQL = `SELECT * FROM [
|
|
4311
|
+
const sSQL = `SELECT * FROM [__mj].[vwEntityAIActions] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4304
4312
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL));
|
|
4305
4313
|
return result;
|
|
4306
4314
|
}
|
|
4307
4315
|
async UserRecordLogsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4308
4316
|
this.CheckUserReadPermissions('User Record Logs', userPayload);
|
|
4309
|
-
const sSQL = `SELECT * FROM [
|
|
4317
|
+
const sSQL = `SELECT * FROM [__mj].[vwUserRecordLogs] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Record Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4310
4318
|
const result = this.ArrayMapFieldNamesToCodeNames('User Record Logs', await dataSource.query(sSQL));
|
|
4311
4319
|
return result;
|
|
4312
4320
|
}
|
|
4313
4321
|
async IntegrationURLFormatsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4314
4322
|
this.CheckUserReadPermissions('Integration URL Formats', userPayload);
|
|
4315
|
-
const sSQL = `SELECT * FROM [
|
|
4323
|
+
const sSQL = `SELECT * FROM [__mj].[vwIntegrationURLFormats] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Integration URL Formats', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4316
4324
|
const result = this.ArrayMapFieldNamesToCodeNames('Integration URL Formats', await dataSource.query(sSQL));
|
|
4317
4325
|
return result;
|
|
4318
4326
|
}
|
|
4319
4327
|
async EntitiesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4320
4328
|
this.CheckUserReadPermissions('Entities', userPayload);
|
|
4321
|
-
const sSQL = `SELECT * FROM [
|
|
4329
|
+
const sSQL = `SELECT * FROM [__mj].[vwEntities] WHERE [ParentID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4322
4330
|
const result = this.ArrayMapFieldNamesToCodeNames('Entities', await dataSource.query(sSQL));
|
|
4323
4331
|
return result;
|
|
4324
4332
|
}
|
|
4325
4333
|
async UserFavoritesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4326
4334
|
this.CheckUserReadPermissions('User Favorites', userPayload);
|
|
4327
|
-
const sSQL = `SELECT * FROM [
|
|
4335
|
+
const sSQL = `SELECT * FROM [__mj].[vwUserFavorites] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Favorites', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4328
4336
|
const result = this.ArrayMapFieldNamesToCodeNames('User Favorites', await dataSource.query(sSQL));
|
|
4329
4337
|
return result;
|
|
4330
4338
|
}
|
|
4331
4339
|
async CompanyIntegrationRunDetailsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4332
4340
|
this.CheckUserReadPermissions('Company Integration Run Details', userPayload);
|
|
4333
|
-
const sSQL = `SELECT * FROM [
|
|
4341
|
+
const sSQL = `SELECT * FROM [__mj].[vwCompanyIntegrationRunDetails] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4334
4342
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Run Details', await dataSource.query(sSQL));
|
|
4335
4343
|
return result;
|
|
4336
4344
|
}
|
|
4337
4345
|
async ApplicationEntitiesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4338
4346
|
this.CheckUserReadPermissions('Application Entities', userPayload);
|
|
4339
|
-
const sSQL = `SELECT * FROM [
|
|
4347
|
+
const sSQL = `SELECT * FROM [__mj].[vwApplicationEntities] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4340
4348
|
const result = this.ArrayMapFieldNamesToCodeNames('Application Entities', await dataSource.query(sSQL));
|
|
4341
4349
|
return result;
|
|
4342
4350
|
}
|
|
4343
4351
|
async UserApplicationEntitiesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4344
4352
|
this.CheckUserReadPermissions('User Application Entities', userPayload);
|
|
4345
|
-
const sSQL = `SELECT * FROM [
|
|
4353
|
+
const sSQL = `SELECT * FROM [__mj].[vwUserApplicationEntities] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4346
4354
|
const result = this.ArrayMapFieldNamesToCodeNames('User Application Entities', await dataSource.query(sSQL));
|
|
4347
4355
|
return result;
|
|
4348
4356
|
}
|
|
4349
4357
|
async ListsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4350
4358
|
this.CheckUserReadPermissions('Lists', userPayload);
|
|
4351
|
-
const sSQL = `SELECT * FROM [
|
|
4359
|
+
const sSQL = `SELECT * FROM [__mj].[vwLists] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Lists', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4352
4360
|
const result = this.ArrayMapFieldNamesToCodeNames('Lists', await dataSource.query(sSQL));
|
|
4353
4361
|
return result;
|
|
4354
4362
|
}
|
|
4355
4363
|
async UserViewsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4356
4364
|
this.CheckUserReadPermissions('User Views', userPayload);
|
|
4357
|
-
const sSQL = `SELECT * FROM [
|
|
4365
|
+
const sSQL = `SELECT * FROM [__mj].[vwUserViews] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4358
4366
|
const result = this.ArrayMapFieldNamesToCodeNames('User Views', await dataSource.query(sSQL));
|
|
4359
4367
|
return result;
|
|
4360
4368
|
}
|
|
4361
4369
|
async RecordChangesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4362
4370
|
this.CheckUserReadPermissions('Record Changes', userPayload);
|
|
4363
|
-
const sSQL = `SELECT * FROM [
|
|
4371
|
+
const sSQL = `SELECT * FROM [__mj].[vwRecordChanges] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Record Changes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4364
4372
|
const result = this.ArrayMapFieldNamesToCodeNames('Record Changes', await dataSource.query(sSQL));
|
|
4365
4373
|
return result;
|
|
4366
4374
|
}
|
|
4367
4375
|
async AuditLogsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4368
4376
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
4369
|
-
const sSQL = `SELECT * FROM [
|
|
4377
|
+
const sSQL = `SELECT * FROM [__mj].[vwAuditLogs] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4370
4378
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL));
|
|
4371
4379
|
return result;
|
|
4372
4380
|
}
|
|
4373
4381
|
async ResourceTypesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4374
4382
|
this.CheckUserReadPermissions('Resource Types', userPayload);
|
|
4375
|
-
const sSQL = `SELECT * FROM [
|
|
4383
|
+
const sSQL = `SELECT * FROM [__mj].[vwResourceTypes] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Resource Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4376
4384
|
const result = this.ArrayMapFieldNamesToCodeNames('Resource Types', await dataSource.query(sSQL));
|
|
4377
4385
|
return result;
|
|
4378
4386
|
}
|
|
4379
4387
|
async TaggedItemsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4380
4388
|
this.CheckUserReadPermissions('Tagged Items', userPayload);
|
|
4381
|
-
const sSQL = `SELECT * FROM [
|
|
4389
|
+
const sSQL = `SELECT * FROM [__mj].[vwTaggedItems] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Tagged Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4382
4390
|
const result = this.ArrayMapFieldNamesToCodeNames('Tagged Items', await dataSource.query(sSQL));
|
|
4383
4391
|
return result;
|
|
4384
4392
|
}
|
|
4385
4393
|
async DatasetItemsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4386
4394
|
this.CheckUserReadPermissions('Dataset Items', userPayload);
|
|
4387
|
-
const sSQL = `SELECT * FROM [
|
|
4395
|
+
const sSQL = `SELECT * FROM [__mj].[vwDatasetItems] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Dataset Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4388
4396
|
const result = this.ArrayMapFieldNamesToCodeNames('Dataset Items', await dataSource.query(sSQL));
|
|
4389
4397
|
return result;
|
|
4390
4398
|
}
|
|
4391
4399
|
async CompanyIntegrationRecordMapsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4392
4400
|
this.CheckUserReadPermissions('Company Integration Record Maps', userPayload);
|
|
4393
|
-
const sSQL = `SELECT * FROM [
|
|
4401
|
+
const sSQL = `SELECT * FROM [__mj].[vwCompanyIntegrationRecordMaps] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Record Maps', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4394
4402
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Record Maps', await dataSource.query(sSQL));
|
|
4395
4403
|
return result;
|
|
4396
4404
|
}
|
|
4397
4405
|
async RecordMergeLogsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4398
4406
|
this.CheckUserReadPermissions('Record Merge Logs', userPayload);
|
|
4399
|
-
const sSQL = `SELECT * FROM [
|
|
4407
|
+
const sSQL = `SELECT * FROM [__mj].[vwRecordMergeLogs] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4400
4408
|
const result = this.ArrayMapFieldNamesToCodeNames('Record Merge Logs', await dataSource.query(sSQL));
|
|
4401
4409
|
return result;
|
|
4402
4410
|
}
|
|
4403
4411
|
async QueryFieldsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4404
4412
|
this.CheckUserReadPermissions('Query Fields', userPayload);
|
|
4405
|
-
const sSQL = `SELECT * FROM [
|
|
4413
|
+
const sSQL = `SELECT * FROM [__mj].[vwQueryFields] WHERE [SourceEntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Query Fields', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4406
4414
|
const result = this.ArrayMapFieldNamesToCodeNames('Query Fields', await dataSource.query(sSQL));
|
|
4407
4415
|
return result;
|
|
4408
4416
|
}
|
|
4409
4417
|
async ConversationsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4410
4418
|
this.CheckUserReadPermissions('Conversations', userPayload);
|
|
4411
|
-
const sSQL = `SELECT * FROM [
|
|
4419
|
+
const sSQL = `SELECT * FROM [__mj].[vwConversations] WHERE [LinkedEntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Conversations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4412
4420
|
const result = this.ArrayMapFieldNamesToCodeNames('Conversations', await dataSource.query(sSQL));
|
|
4413
4421
|
return result;
|
|
4414
4422
|
}
|
|
4415
4423
|
async EntityDocumentsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4416
4424
|
this.CheckUserReadPermissions('Entity Documents', userPayload);
|
|
4417
|
-
const sSQL = `SELECT * FROM [
|
|
4425
|
+
const sSQL = `SELECT * FROM [__mj].[vwEntityDocuments] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Documents', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4418
4426
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Documents', await dataSource.query(sSQL));
|
|
4419
4427
|
return result;
|
|
4420
4428
|
}
|
|
4421
4429
|
async DataContextItemsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4422
4430
|
this.CheckUserReadPermissions('Data Context Items', userPayload);
|
|
4423
|
-
const sSQL = `SELECT * FROM [
|
|
4431
|
+
const sSQL = `SELECT * FROM [__mj].[vwDataContextItems] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Data Context Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4424
4432
|
const result = this.ArrayMapFieldNamesToCodeNames('Data Context Items', await dataSource.query(sSQL));
|
|
4425
4433
|
return result;
|
|
4426
4434
|
}
|
|
4435
|
+
async UsersArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4436
|
+
this.CheckUserReadPermissions('Users', userPayload);
|
|
4437
|
+
const sSQL = `SELECT * FROM [__mj].[vwUsers] WHERE [LinkedEntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Users', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4438
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Users', await dataSource.query(sSQL));
|
|
4439
|
+
return result;
|
|
4440
|
+
}
|
|
4441
|
+
async EntityRecordDocumentsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4442
|
+
this.CheckUserReadPermissions('Entity Record Documents', userPayload);
|
|
4443
|
+
const sSQL = `SELECT * FROM [__mj].[vwEntityRecordDocuments] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Record Documents', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4444
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Entity Record Documents', await dataSource.query(sSQL));
|
|
4445
|
+
return result;
|
|
4446
|
+
}
|
|
4427
4447
|
async CreateEntity(input, { dataSource, userPayload }, pubSub) {
|
|
4428
4448
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
4429
4449
|
const entityObject = await new core_1.Metadata().GetEntityObject('Entities', this.GetUserFromPayload(userPayload));
|
|
@@ -4749,6 +4769,24 @@ __decorate([
|
|
|
4749
4769
|
__metadata("design:paramtypes", [Entity_, Object, server_1.PubSubEngine]),
|
|
4750
4770
|
__metadata("design:returntype", Promise)
|
|
4751
4771
|
], EntityResolverBase.prototype, "DataContextItemsArray", null);
|
|
4772
|
+
__decorate([
|
|
4773
|
+
(0, server_1.FieldResolver)(() => [mj_core_schema_server_object_types.User_]),
|
|
4774
|
+
__param(0, (0, server_1.Root)()),
|
|
4775
|
+
__param(1, (0, server_1.Ctx)()),
|
|
4776
|
+
__param(2, (0, server_1.PubSub)()),
|
|
4777
|
+
__metadata("design:type", Function),
|
|
4778
|
+
__metadata("design:paramtypes", [Entity_, Object, server_1.PubSubEngine]),
|
|
4779
|
+
__metadata("design:returntype", Promise)
|
|
4780
|
+
], EntityResolverBase.prototype, "UsersArray", null);
|
|
4781
|
+
__decorate([
|
|
4782
|
+
(0, server_1.FieldResolver)(() => [mj_core_schema_server_object_types.EntityRecordDocument_]),
|
|
4783
|
+
__param(0, (0, server_1.Root)()),
|
|
4784
|
+
__param(1, (0, server_1.Ctx)()),
|
|
4785
|
+
__param(2, (0, server_1.PubSub)()),
|
|
4786
|
+
__metadata("design:type", Function),
|
|
4787
|
+
__metadata("design:paramtypes", [Entity_, Object, server_1.PubSubEngine]),
|
|
4788
|
+
__metadata("design:returntype", Promise)
|
|
4789
|
+
], EntityResolverBase.prototype, "EntityRecordDocumentsArray", null);
|
|
4752
4790
|
__decorate([
|
|
4753
4791
|
(0, server_1.Mutation)(() => Entity_),
|
|
4754
4792
|
__param(0, (0, server_1.Arg)('input', () => CreateEntityInput)),
|
|
@@ -5103,121 +5141,121 @@ let UserResolverBase = class UserResolverBase extends server_1.ResolverBase {
|
|
|
5103
5141
|
}
|
|
5104
5142
|
async User(ID, { dataSource, userPayload }, pubSub) {
|
|
5105
5143
|
this.CheckUserReadPermissions('Users', userPayload);
|
|
5106
|
-
const sSQL = `SELECT * FROM [
|
|
5144
|
+
const sSQL = `SELECT * FROM [__mj].[vwUsers] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Users', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5107
5145
|
const result = this.MapFieldNamesToCodeNames('Users', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
5108
5146
|
return result;
|
|
5109
5147
|
}
|
|
5110
5148
|
async AllUsers({ dataSource, userPayload }, pubSub) {
|
|
5111
5149
|
this.CheckUserReadPermissions('Users', userPayload);
|
|
5112
|
-
const sSQL = 'SELECT * FROM [
|
|
5150
|
+
const sSQL = 'SELECT * FROM [__mj].[vwUsers]' + this.getRowLevelSecurityWhereClause('Users', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
5113
5151
|
const result = this.ArrayMapFieldNamesToCodeNames('Users', await dataSource.query(sSQL));
|
|
5114
5152
|
return result;
|
|
5115
5153
|
}
|
|
5116
5154
|
async UserApplicationsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5117
5155
|
this.CheckUserReadPermissions('User Applications', userPayload);
|
|
5118
|
-
const sSQL = `SELECT * FROM [
|
|
5156
|
+
const sSQL = `SELECT * FROM [__mj].[vwUserApplications] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Applications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5119
5157
|
const result = this.ArrayMapFieldNamesToCodeNames('User Applications', await dataSource.query(sSQL));
|
|
5120
5158
|
return result;
|
|
5121
5159
|
}
|
|
5122
5160
|
async UserRolesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5123
5161
|
this.CheckUserReadPermissions('User Roles', userPayload);
|
|
5124
|
-
const sSQL = `SELECT * FROM [
|
|
5162
|
+
const sSQL = `SELECT * FROM [__mj].[vwUserRoles] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5125
5163
|
const result = this.ArrayMapFieldNamesToCodeNames('User Roles', await dataSource.query(sSQL));
|
|
5126
5164
|
return result;
|
|
5127
5165
|
}
|
|
5128
5166
|
async WorkspacesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5129
5167
|
this.CheckUserReadPermissions('Workspaces', userPayload);
|
|
5130
|
-
const sSQL = `SELECT * FROM [
|
|
5168
|
+
const sSQL = `SELECT * FROM [__mj].[vwWorkspaces] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Workspaces', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5131
5169
|
const result = this.ArrayMapFieldNamesToCodeNames('Workspaces', await dataSource.query(sSQL));
|
|
5132
5170
|
return result;
|
|
5133
5171
|
}
|
|
5134
5172
|
async ReportsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5135
5173
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
5136
|
-
const sSQL = `SELECT * FROM [
|
|
5174
|
+
const sSQL = `SELECT * FROM [__mj].[vwReports] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5137
5175
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
5138
5176
|
return result;
|
|
5139
5177
|
}
|
|
5140
5178
|
async ReportSnapshotsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5141
5179
|
this.CheckUserReadPermissions('Report Snapshots', userPayload);
|
|
5142
|
-
const sSQL = `SELECT * FROM [
|
|
5180
|
+
const sSQL = `SELECT * FROM [__mj].[vwReportSnapshots] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Report Snapshots', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5143
5181
|
const result = this.ArrayMapFieldNamesToCodeNames('Report Snapshots', await dataSource.query(sSQL));
|
|
5144
5182
|
return result;
|
|
5145
5183
|
}
|
|
5146
5184
|
async RecordChangesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5147
5185
|
this.CheckUserReadPermissions('Record Changes', userPayload);
|
|
5148
|
-
const sSQL = `SELECT * FROM [
|
|
5186
|
+
const sSQL = `SELECT * FROM [__mj].[vwRecordChanges] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Record Changes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5149
5187
|
const result = this.ArrayMapFieldNamesToCodeNames('Record Changes', await dataSource.query(sSQL));
|
|
5150
5188
|
return result;
|
|
5151
5189
|
}
|
|
5152
5190
|
async DashboardsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5153
5191
|
this.CheckUserReadPermissions('Dashboards', userPayload);
|
|
5154
|
-
const sSQL = `SELECT * FROM [
|
|
5192
|
+
const sSQL = `SELECT * FROM [__mj].[vwDashboards] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Dashboards', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5155
5193
|
const result = this.ArrayMapFieldNamesToCodeNames('Dashboards', await dataSource.query(sSQL));
|
|
5156
5194
|
return result;
|
|
5157
5195
|
}
|
|
5158
5196
|
async UserViewRunsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5159
5197
|
this.CheckUserReadPermissions('User View Runs', userPayload);
|
|
5160
|
-
const sSQL = `SELECT * FROM [
|
|
5198
|
+
const sSQL = `SELECT * FROM [__mj].[vwUserViewRuns] WHERE [RunByUserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User View Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5161
5199
|
const result = this.ArrayMapFieldNamesToCodeNames('User View Runs', await dataSource.query(sSQL));
|
|
5162
5200
|
return result;
|
|
5163
5201
|
}
|
|
5164
5202
|
async AuditLogsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5165
5203
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
5166
|
-
const sSQL = `SELECT * FROM [
|
|
5204
|
+
const sSQL = `SELECT * FROM [__mj].[vwAuditLogs] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5167
5205
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL));
|
|
5168
5206
|
return result;
|
|
5169
5207
|
}
|
|
5170
5208
|
async ListsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5171
5209
|
this.CheckUserReadPermissions('Lists', userPayload);
|
|
5172
|
-
const sSQL = `SELECT * FROM [
|
|
5210
|
+
const sSQL = `SELECT * FROM [__mj].[vwLists] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Lists', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5173
5211
|
const result = this.ArrayMapFieldNamesToCodeNames('Lists', await dataSource.query(sSQL));
|
|
5174
5212
|
return result;
|
|
5175
5213
|
}
|
|
5176
5214
|
async UserFavoritesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5177
5215
|
this.CheckUserReadPermissions('User Favorites', userPayload);
|
|
5178
|
-
const sSQL = `SELECT * FROM [
|
|
5216
|
+
const sSQL = `SELECT * FROM [__mj].[vwUserFavorites] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Favorites', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5179
5217
|
const result = this.ArrayMapFieldNamesToCodeNames('User Favorites', await dataSource.query(sSQL));
|
|
5180
5218
|
return result;
|
|
5181
5219
|
}
|
|
5182
5220
|
async UserRecordLogsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5183
5221
|
this.CheckUserReadPermissions('User Record Logs', userPayload);
|
|
5184
|
-
const sSQL = `SELECT * FROM [
|
|
5222
|
+
const sSQL = `SELECT * FROM [__mj].[vwUserRecordLogs] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Record Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5185
5223
|
const result = this.ArrayMapFieldNamesToCodeNames('User Record Logs', await dataSource.query(sSQL));
|
|
5186
5224
|
return result;
|
|
5187
5225
|
}
|
|
5188
5226
|
async UserViewsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5189
5227
|
this.CheckUserReadPermissions('User Views', userPayload);
|
|
5190
|
-
const sSQL = `SELECT * FROM [
|
|
5228
|
+
const sSQL = `SELECT * FROM [__mj].[vwUserViews] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5191
5229
|
const result = this.ArrayMapFieldNamesToCodeNames('User Views', await dataSource.query(sSQL));
|
|
5192
5230
|
return result;
|
|
5193
5231
|
}
|
|
5194
5232
|
async CompanyIntegrationRunsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5195
5233
|
this.CheckUserReadPermissions('Company Integration Runs', userPayload);
|
|
5196
|
-
const sSQL = `SELECT * FROM [
|
|
5234
|
+
const sSQL = `SELECT * FROM [__mj].[vwCompanyIntegrationRuns] WHERE [RunByUserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5197
5235
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Runs', await dataSource.query(sSQL));
|
|
5198
5236
|
return result;
|
|
5199
5237
|
}
|
|
5200
5238
|
async UserNotificationsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5201
5239
|
this.CheckUserReadPermissions('User Notifications', userPayload);
|
|
5202
|
-
const sSQL = `SELECT * FROM [
|
|
5240
|
+
const sSQL = `SELECT * FROM [__mj].[vwUserNotifications] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Notifications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5203
5241
|
const result = this.ArrayMapFieldNamesToCodeNames('User Notifications', await dataSource.query(sSQL));
|
|
5204
5242
|
return result;
|
|
5205
5243
|
}
|
|
5206
5244
|
async ConversationsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5207
5245
|
this.CheckUserReadPermissions('Conversations', userPayload);
|
|
5208
|
-
const sSQL = `SELECT * FROM [
|
|
5246
|
+
const sSQL = `SELECT * FROM [__mj].[vwConversations] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Conversations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5209
5247
|
const result = this.ArrayMapFieldNamesToCodeNames('Conversations', await dataSource.query(sSQL));
|
|
5210
5248
|
return result;
|
|
5211
5249
|
}
|
|
5212
5250
|
async RecordMergeLogsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5213
5251
|
this.CheckUserReadPermissions('Record Merge Logs', userPayload);
|
|
5214
|
-
const sSQL = `SELECT * FROM [
|
|
5252
|
+
const sSQL = `SELECT * FROM [__mj].[vwRecordMergeLogs] WHERE [InitiatedByUserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5215
5253
|
const result = this.ArrayMapFieldNamesToCodeNames('Record Merge Logs', await dataSource.query(sSQL));
|
|
5216
5254
|
return result;
|
|
5217
5255
|
}
|
|
5218
5256
|
async DataContextsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5219
5257
|
this.CheckUserReadPermissions('Data Contexts', userPayload);
|
|
5220
|
-
const sSQL = `SELECT * FROM [
|
|
5258
|
+
const sSQL = `SELECT * FROM [__mj].[vwDataContexts] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Data Contexts', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5221
5259
|
const result = this.ArrayMapFieldNamesToCodeNames('Data Contexts', await dataSource.query(sSQL));
|
|
5222
5260
|
return result;
|
|
5223
5261
|
}
|
|
@@ -5785,13 +5823,13 @@ let EntityRelationshipResolver = class EntityRelationshipResolver extends server
|
|
|
5785
5823
|
}
|
|
5786
5824
|
async EntityRelationship(ID, { dataSource, userPayload }, pubSub) {
|
|
5787
5825
|
this.CheckUserReadPermissions('Entity Relationships', userPayload);
|
|
5788
|
-
const sSQL = `SELECT * FROM [
|
|
5826
|
+
const sSQL = `SELECT * FROM [__mj].[vwEntityRelationships] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Relationships', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5789
5827
|
const result = this.MapFieldNamesToCodeNames('Entity Relationships', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
5790
5828
|
return result;
|
|
5791
5829
|
}
|
|
5792
5830
|
async AllEntityRelationships({ dataSource, userPayload }, pubSub) {
|
|
5793
5831
|
this.CheckUserReadPermissions('Entity Relationships', userPayload);
|
|
5794
|
-
const sSQL = 'SELECT * FROM [
|
|
5832
|
+
const sSQL = 'SELECT * FROM [__mj].[vwEntityRelationships]' + this.getRowLevelSecurityWhereClause('Entity Relationships', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
5795
5833
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Relationships', await dataSource.query(sSQL));
|
|
5796
5834
|
return result;
|
|
5797
5835
|
}
|
|
@@ -6082,7 +6120,7 @@ let UserRecordLogResolver = class UserRecordLogResolver extends server_1.Resolve
|
|
|
6082
6120
|
}
|
|
6083
6121
|
async UserRecordLog(ID, { dataSource, userPayload }, pubSub) {
|
|
6084
6122
|
this.CheckUserReadPermissions('User Record Logs', userPayload);
|
|
6085
|
-
const sSQL = `SELECT * FROM [
|
|
6123
|
+
const sSQL = `SELECT * FROM [__mj].[vwUserRecordLogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Record Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6086
6124
|
const result = this.MapFieldNamesToCodeNames('User Record Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
6087
6125
|
return result;
|
|
6088
6126
|
}
|
|
@@ -6492,31 +6530,31 @@ let UserViewResolverBase = class UserViewResolverBase extends server_1.ResolverB
|
|
|
6492
6530
|
}
|
|
6493
6531
|
async UserView(ID, { dataSource, userPayload }, pubSub) {
|
|
6494
6532
|
this.CheckUserReadPermissions('User Views', userPayload);
|
|
6495
|
-
const sSQL = `SELECT * FROM [
|
|
6533
|
+
const sSQL = `SELECT * FROM [__mj].[vwUserViews] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6496
6534
|
const result = this.MapFieldNamesToCodeNames('User Views', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
6497
6535
|
return result;
|
|
6498
6536
|
}
|
|
6499
6537
|
async AllUserViews({ dataSource, userPayload }, pubSub) {
|
|
6500
6538
|
this.CheckUserReadPermissions('User Views', userPayload);
|
|
6501
|
-
const sSQL = 'SELECT * FROM [
|
|
6539
|
+
const sSQL = 'SELECT * FROM [__mj].[vwUserViews]' + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
6502
6540
|
const result = this.ArrayMapFieldNamesToCodeNames('User Views', await dataSource.query(sSQL));
|
|
6503
6541
|
return result;
|
|
6504
6542
|
}
|
|
6505
6543
|
async EntityRelationshipsArray(userview_, { dataSource, userPayload }, pubSub) {
|
|
6506
6544
|
this.CheckUserReadPermissions('Entity Relationships', userPayload);
|
|
6507
|
-
const sSQL = `SELECT * FROM [
|
|
6545
|
+
const sSQL = `SELECT * FROM [__mj].[vwEntityRelationships] WHERE [DisplayUserViewGUID]=${userview_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Relationships', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6508
6546
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Relationships', await dataSource.query(sSQL));
|
|
6509
6547
|
return result;
|
|
6510
6548
|
}
|
|
6511
6549
|
async UserViewRunsArray(userview_, { dataSource, userPayload }, pubSub) {
|
|
6512
6550
|
this.CheckUserReadPermissions('User View Runs', userPayload);
|
|
6513
|
-
const sSQL = `SELECT * FROM [
|
|
6551
|
+
const sSQL = `SELECT * FROM [__mj].[vwUserViewRuns] WHERE [UserViewID]=${userview_.ID} ` + this.getRowLevelSecurityWhereClause('User View Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6514
6552
|
const result = this.ArrayMapFieldNamesToCodeNames('User View Runs', await dataSource.query(sSQL));
|
|
6515
6553
|
return result;
|
|
6516
6554
|
}
|
|
6517
6555
|
async DataContextItemsArray(userview_, { dataSource, userPayload }, pubSub) {
|
|
6518
6556
|
this.CheckUserReadPermissions('Data Context Items', userPayload);
|
|
6519
|
-
const sSQL = `SELECT * FROM [
|
|
6557
|
+
const sSQL = `SELECT * FROM [__mj].[vwDataContextItems] WHERE [ViewID]=${userview_.ID} ` + this.getRowLevelSecurityWhereClause('Data Context Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6520
6558
|
const result = this.ArrayMapFieldNamesToCodeNames('Data Context Items', await dataSource.query(sSQL));
|
|
6521
6559
|
return result;
|
|
6522
6560
|
}
|
|
@@ -6821,25 +6859,25 @@ let CompanyIntegrationRunResolver = class CompanyIntegrationRunResolver extends
|
|
|
6821
6859
|
}
|
|
6822
6860
|
async CompanyIntegrationRun(ID, { dataSource, userPayload }, pubSub) {
|
|
6823
6861
|
this.CheckUserReadPermissions('Company Integration Runs', userPayload);
|
|
6824
|
-
const sSQL = `SELECT * FROM [
|
|
6862
|
+
const sSQL = `SELECT * FROM [__mj].[vwCompanyIntegrationRuns] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6825
6863
|
const result = this.MapFieldNamesToCodeNames('Company Integration Runs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
6826
6864
|
return result;
|
|
6827
6865
|
}
|
|
6828
6866
|
async CompanyIntegrationRunAPILogsArray(companyintegrationrun_, { dataSource, userPayload }, pubSub) {
|
|
6829
6867
|
this.CheckUserReadPermissions('Company Integration Run API Logs', userPayload);
|
|
6830
|
-
const sSQL = `SELECT * FROM [
|
|
6868
|
+
const sSQL = `SELECT * FROM [__mj].[vwCompanyIntegrationRunAPILogs] WHERE [CompanyIntegrationRunID]=${companyintegrationrun_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run API Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6831
6869
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Run API Logs', await dataSource.query(sSQL));
|
|
6832
6870
|
return result;
|
|
6833
6871
|
}
|
|
6834
6872
|
async ErrorLogsArray(companyintegrationrun_, { dataSource, userPayload }, pubSub) {
|
|
6835
6873
|
this.CheckUserReadPermissions('Error Logs', userPayload);
|
|
6836
|
-
const sSQL = `SELECT * FROM [
|
|
6874
|
+
const sSQL = `SELECT * FROM [__mj].[vwErrorLogs] WHERE [CompanyIntegrationRunID]=${companyintegrationrun_.ID} ` + this.getRowLevelSecurityWhereClause('Error Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6837
6875
|
const result = this.ArrayMapFieldNamesToCodeNames('Error Logs', await dataSource.query(sSQL));
|
|
6838
6876
|
return result;
|
|
6839
6877
|
}
|
|
6840
6878
|
async CompanyIntegrationRunDetailsArray(companyintegrationrun_, { dataSource, userPayload }, pubSub) {
|
|
6841
6879
|
this.CheckUserReadPermissions('Company Integration Run Details', userPayload);
|
|
6842
|
-
const sSQL = `SELECT * FROM [
|
|
6880
|
+
const sSQL = `SELECT * FROM [__mj].[vwCompanyIntegrationRunDetails] WHERE [CompanyIntegrationRunID]=${companyintegrationrun_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6843
6881
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Run Details', await dataSource.query(sSQL));
|
|
6844
6882
|
return result;
|
|
6845
6883
|
}
|
|
@@ -7078,13 +7116,13 @@ let CompanyIntegrationRunDetailResolver = class CompanyIntegrationRunDetailResol
|
|
|
7078
7116
|
}
|
|
7079
7117
|
async CompanyIntegrationRunDetail(ID, { dataSource, userPayload }, pubSub) {
|
|
7080
7118
|
this.CheckUserReadPermissions('Company Integration Run Details', userPayload);
|
|
7081
|
-
const sSQL = `SELECT * FROM [
|
|
7119
|
+
const sSQL = `SELECT * FROM [__mj].[vwCompanyIntegrationRunDetails] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7082
7120
|
const result = this.MapFieldNamesToCodeNames('Company Integration Run Details', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
7083
7121
|
return result;
|
|
7084
7122
|
}
|
|
7085
7123
|
async ErrorLogsArray(companyintegrationrundetail_, { dataSource, userPayload }, pubSub) {
|
|
7086
7124
|
this.CheckUserReadPermissions('Error Logs', userPayload);
|
|
7087
|
-
const sSQL = `SELECT * FROM [
|
|
7125
|
+
const sSQL = `SELECT * FROM [__mj].[vwErrorLogs] WHERE [CompanyIntegrationRunDetailID]=${companyintegrationrundetail_.ID} ` + this.getRowLevelSecurityWhereClause('Error Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7088
7126
|
const result = this.ArrayMapFieldNamesToCodeNames('Error Logs', await dataSource.query(sSQL));
|
|
7089
7127
|
return result;
|
|
7090
7128
|
}
|
|
@@ -7308,7 +7346,7 @@ let ErrorLogResolver = class ErrorLogResolver extends server_1.ResolverBase {
|
|
|
7308
7346
|
}
|
|
7309
7347
|
async ErrorLog(ID, { dataSource, userPayload }, pubSub) {
|
|
7310
7348
|
this.CheckUserReadPermissions('Error Logs', userPayload);
|
|
7311
|
-
const sSQL = `SELECT * FROM [
|
|
7349
|
+
const sSQL = `SELECT * FROM [__mj].[vwErrorLogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Error Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7312
7350
|
const result = this.MapFieldNamesToCodeNames('Error Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
7313
7351
|
return result;
|
|
7314
7352
|
}
|
|
@@ -7486,25 +7524,25 @@ let ApplicationResolver = class ApplicationResolver extends server_1.ResolverBas
|
|
|
7486
7524
|
}
|
|
7487
7525
|
async Application(ID, { dataSource, userPayload }, pubSub) {
|
|
7488
7526
|
this.CheckUserReadPermissions('Applications', userPayload);
|
|
7489
|
-
const sSQL = `SELECT * FROM [
|
|
7527
|
+
const sSQL = `SELECT * FROM [__mj].[vwApplications] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Applications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7490
7528
|
const result = this.MapFieldNamesToCodeNames('Applications', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
7491
7529
|
return result;
|
|
7492
7530
|
}
|
|
7493
7531
|
async AllApplications({ dataSource, userPayload }, pubSub) {
|
|
7494
7532
|
this.CheckUserReadPermissions('Applications', userPayload);
|
|
7495
|
-
const sSQL = 'SELECT * FROM [
|
|
7533
|
+
const sSQL = 'SELECT * FROM [__mj].[vwApplications]' + this.getRowLevelSecurityWhereClause('Applications', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
7496
7534
|
const result = this.ArrayMapFieldNamesToCodeNames('Applications', await dataSource.query(sSQL));
|
|
7497
7535
|
return result;
|
|
7498
7536
|
}
|
|
7499
7537
|
async ApplicationEntitiesArray(application_, { dataSource, userPayload }, pubSub) {
|
|
7500
7538
|
this.CheckUserReadPermissions('Application Entities', userPayload);
|
|
7501
|
-
const sSQL = `SELECT * FROM [
|
|
7539
|
+
const sSQL = `SELECT * FROM [__mj].[vwApplicationEntities] WHERE [ApplicationID]=${application_.ID} ` + this.getRowLevelSecurityWhereClause('Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7502
7540
|
const result = this.ArrayMapFieldNamesToCodeNames('Application Entities', await dataSource.query(sSQL));
|
|
7503
7541
|
return result;
|
|
7504
7542
|
}
|
|
7505
7543
|
async UserApplicationsArray(application_, { dataSource, userPayload }, pubSub) {
|
|
7506
7544
|
this.CheckUserReadPermissions('User Applications', userPayload);
|
|
7507
|
-
const sSQL = `SELECT * FROM [
|
|
7545
|
+
const sSQL = `SELECT * FROM [__mj].[vwUserApplications] WHERE [ApplicationID]=${application_.ID} ` + this.getRowLevelSecurityWhereClause('User Applications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7508
7546
|
const result = this.ArrayMapFieldNamesToCodeNames('User Applications', await dataSource.query(sSQL));
|
|
7509
7547
|
return result;
|
|
7510
7548
|
}
|
|
@@ -7771,7 +7809,7 @@ let ApplicationEntityResolver = class ApplicationEntityResolver extends server_1
|
|
|
7771
7809
|
}
|
|
7772
7810
|
async ApplicationEntity(ID, { dataSource, userPayload }, pubSub) {
|
|
7773
7811
|
this.CheckUserReadPermissions('Application Entities', userPayload);
|
|
7774
|
-
const sSQL = `SELECT * FROM [
|
|
7812
|
+
const sSQL = `SELECT * FROM [__mj].[vwApplicationEntities] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7775
7813
|
const result = this.MapFieldNamesToCodeNames('Application Entities', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
7776
7814
|
return result;
|
|
7777
7815
|
}
|
|
@@ -8144,13 +8182,13 @@ let EntityPermissionResolver = class EntityPermissionResolver extends server_1.R
|
|
|
8144
8182
|
}
|
|
8145
8183
|
async EntityPermission(ID, { dataSource, userPayload }, pubSub) {
|
|
8146
8184
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
8147
|
-
const sSQL = `SELECT * FROM [
|
|
8185
|
+
const sSQL = `SELECT * FROM [__mj].[vwEntityPermissions] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8148
8186
|
const result = this.MapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
8149
8187
|
return result;
|
|
8150
8188
|
}
|
|
8151
8189
|
async AllEntityPermissions({ dataSource, userPayload }, pubSub) {
|
|
8152
8190
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
8153
|
-
const sSQL = 'SELECT * FROM [
|
|
8191
|
+
const sSQL = 'SELECT * FROM [__mj].[vwEntityPermissions]' + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
8154
8192
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL));
|
|
8155
8193
|
return result;
|
|
8156
8194
|
}
|
|
@@ -8421,7 +8459,7 @@ let UserApplicationEntityResolver = class UserApplicationEntityResolver extends
|
|
|
8421
8459
|
}
|
|
8422
8460
|
async UserApplicationEntity(ID, { dataSource, userPayload }, pubSub) {
|
|
8423
8461
|
this.CheckUserReadPermissions('User Application Entities', userPayload);
|
|
8424
|
-
const sSQL = `SELECT * FROM [
|
|
8462
|
+
const sSQL = `SELECT * FROM [__mj].[vwUserApplicationEntities] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8425
8463
|
const result = this.MapFieldNamesToCodeNames('User Application Entities', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
8426
8464
|
return result;
|
|
8427
8465
|
}
|
|
@@ -8669,13 +8707,13 @@ let UserApplicationResolver = class UserApplicationResolver extends server_1.Res
|
|
|
8669
8707
|
}
|
|
8670
8708
|
async UserApplication(ID, { dataSource, userPayload }, pubSub) {
|
|
8671
8709
|
this.CheckUserReadPermissions('User Applications', userPayload);
|
|
8672
|
-
const sSQL = `SELECT * FROM [
|
|
8710
|
+
const sSQL = `SELECT * FROM [__mj].[vwUserApplications] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Applications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8673
8711
|
const result = this.MapFieldNamesToCodeNames('User Applications', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
8674
8712
|
return result;
|
|
8675
8713
|
}
|
|
8676
8714
|
async UserApplicationEntitiesArray(userapplication_, { dataSource, userPayload }, pubSub) {
|
|
8677
8715
|
this.CheckUserReadPermissions('User Application Entities', userPayload);
|
|
8678
|
-
const sSQL = `SELECT * FROM [
|
|
8716
|
+
const sSQL = `SELECT * FROM [__mj].[vwUserApplicationEntities] WHERE [UserApplicationID]=${userapplication_.ID} ` + this.getRowLevelSecurityWhereClause('User Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8679
8717
|
const result = this.ArrayMapFieldNamesToCodeNames('User Application Entities', await dataSource.query(sSQL));
|
|
8680
8718
|
return result;
|
|
8681
8719
|
}
|
|
@@ -8876,7 +8914,7 @@ let CompanyIntegrationRunAPILogResolver = class CompanyIntegrationRunAPILogResol
|
|
|
8876
8914
|
}
|
|
8877
8915
|
async CompanyIntegrationRunAPILog(ID, { dataSource, userPayload }, pubSub) {
|
|
8878
8916
|
this.CheckUserReadPermissions('Company Integration Run API Logs', userPayload);
|
|
8879
|
-
const sSQL = `SELECT * FROM [
|
|
8917
|
+
const sSQL = `SELECT * FROM [__mj].[vwCompanyIntegrationRunAPILogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run API Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8880
8918
|
const result = this.MapFieldNamesToCodeNames('Company Integration Run API Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
8881
8919
|
return result;
|
|
8882
8920
|
}
|
|
@@ -8994,6 +9032,11 @@ __decorate([
|
|
|
8994
9032
|
(0, class_validator_1.MaxLength)(8),
|
|
8995
9033
|
__metadata("design:type", Date)
|
|
8996
9034
|
], List_.prototype, "UpdatedAt", void 0);
|
|
9035
|
+
__decorate([
|
|
9036
|
+
(0, server_1.Field)({ nullable: true }),
|
|
9037
|
+
(0, class_validator_1.MaxLength)(510),
|
|
9038
|
+
__metadata("design:type", String)
|
|
9039
|
+
], List_.prototype, "Entity", void 0);
|
|
8997
9040
|
__decorate([
|
|
8998
9041
|
(0, server_1.Field)(),
|
|
8999
9042
|
(0, class_validator_1.MaxLength)(200),
|
|
@@ -9121,13 +9164,13 @@ let ListResolver = class ListResolver extends server_1.ResolverBase {
|
|
|
9121
9164
|
}
|
|
9122
9165
|
async List(ID, { dataSource, userPayload }, pubSub) {
|
|
9123
9166
|
this.CheckUserReadPermissions('Lists', userPayload);
|
|
9124
|
-
const sSQL = `SELECT * FROM [
|
|
9167
|
+
const sSQL = `SELECT * FROM [__mj].[vwLists] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Lists', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9125
9168
|
const result = this.MapFieldNamesToCodeNames('Lists', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
9126
9169
|
return result;
|
|
9127
9170
|
}
|
|
9128
9171
|
async ListDetailsArray(list_, { dataSource, userPayload }, pubSub) {
|
|
9129
9172
|
this.CheckUserReadPermissions('List Details', userPayload);
|
|
9130
|
-
const sSQL = `SELECT * FROM [
|
|
9173
|
+
const sSQL = `SELECT * FROM [__mj].[vwListDetails] WHERE [ListID]=${list_.ID} ` + this.getRowLevelSecurityWhereClause('List Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9131
9174
|
const result = this.ArrayMapFieldNamesToCodeNames('List Details', await dataSource.query(sSQL));
|
|
9132
9175
|
return result;
|
|
9133
9176
|
}
|
|
@@ -9385,7 +9428,7 @@ let ListDetailResolver = class ListDetailResolver extends server_1.ResolverBase
|
|
|
9385
9428
|
}
|
|
9386
9429
|
async ListDetail(ID, { dataSource, userPayload }, pubSub) {
|
|
9387
9430
|
this.CheckUserReadPermissions('List Details', userPayload);
|
|
9388
|
-
const sSQL = `SELECT * FROM [
|
|
9431
|
+
const sSQL = `SELECT * FROM [__mj].[vwListDetails] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('List Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9389
9432
|
const result = this.MapFieldNamesToCodeNames('List Details', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
9390
9433
|
return result;
|
|
9391
9434
|
}
|
|
@@ -9648,13 +9691,13 @@ let UserViewRunResolver = class UserViewRunResolver extends server_1.ResolverBas
|
|
|
9648
9691
|
}
|
|
9649
9692
|
async UserViewRun(ID, { dataSource, userPayload }, pubSub) {
|
|
9650
9693
|
this.CheckUserReadPermissions('User View Runs', userPayload);
|
|
9651
|
-
const sSQL = `SELECT * FROM [
|
|
9694
|
+
const sSQL = `SELECT * FROM [__mj].[vwUserViewRuns] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User View Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9652
9695
|
const result = this.MapFieldNamesToCodeNames('User View Runs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
9653
9696
|
return result;
|
|
9654
9697
|
}
|
|
9655
9698
|
async UserViewRunDetailsArray(userviewrun_, { dataSource, userPayload }, pubSub) {
|
|
9656
9699
|
this.CheckUserReadPermissions('User View Run Details', userPayload);
|
|
9657
|
-
const sSQL = `SELECT * FROM [
|
|
9700
|
+
const sSQL = `SELECT * FROM [__mj].[vwUserViewRunDetails] WHERE [UserViewRunID]=${userviewrun_.ID} ` + this.getRowLevelSecurityWhereClause('User View Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9658
9701
|
const result = this.ArrayMapFieldNamesToCodeNames('User View Run Details', await dataSource.query(sSQL));
|
|
9659
9702
|
return result;
|
|
9660
9703
|
}
|
|
@@ -9877,7 +9920,7 @@ let UserViewRunDetailResolver = class UserViewRunDetailResolver extends server_1
|
|
|
9877
9920
|
}
|
|
9878
9921
|
async UserViewRunDetail(ID, { dataSource, userPayload }, pubSub) {
|
|
9879
9922
|
this.CheckUserReadPermissions('User View Run Details', userPayload);
|
|
9880
|
-
const sSQL = `SELECT * FROM [
|
|
9923
|
+
const sSQL = `SELECT * FROM [__mj].[vwUserViewRunDetails] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User View Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9881
9924
|
const result = this.MapFieldNamesToCodeNames('User View Run Details', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
9882
9925
|
return result;
|
|
9883
9926
|
}
|
|
@@ -10111,7 +10154,7 @@ let WorkflowRunResolver = class WorkflowRunResolver extends server_1.ResolverBas
|
|
|
10111
10154
|
}
|
|
10112
10155
|
async WorkflowRun(ID, { dataSource, userPayload }, pubSub) {
|
|
10113
10156
|
this.CheckUserReadPermissions('Workflow Runs', userPayload);
|
|
10114
|
-
const sSQL = `SELECT * FROM [
|
|
10157
|
+
const sSQL = `SELECT * FROM [__mj].[vwWorkflowRuns] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Workflow Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10115
10158
|
const result = this.MapFieldNamesToCodeNames('Workflow Runs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
10116
10159
|
return result;
|
|
10117
10160
|
}
|
|
@@ -10315,19 +10358,19 @@ let WorkflowResolver = class WorkflowResolver extends server_1.ResolverBase {
|
|
|
10315
10358
|
}
|
|
10316
10359
|
async Workflow(ID, { dataSource, userPayload }, pubSub) {
|
|
10317
10360
|
this.CheckUserReadPermissions('Workflows', userPayload);
|
|
10318
|
-
const sSQL = `SELECT * FROM [
|
|
10361
|
+
const sSQL = `SELECT * FROM [__mj].[vwWorkflows] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Workflows', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10319
10362
|
const result = this.MapFieldNamesToCodeNames('Workflows', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
10320
10363
|
return result;
|
|
10321
10364
|
}
|
|
10322
10365
|
async ReportsArray(workflow_, { dataSource, userPayload }, pubSub) {
|
|
10323
10366
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
10324
|
-
const sSQL = `SELECT * FROM [
|
|
10367
|
+
const sSQL = `SELECT * FROM [__mj].[vwReports] WHERE [OutputWorkflowID]=${workflow_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10325
10368
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
10326
10369
|
return result;
|
|
10327
10370
|
}
|
|
10328
10371
|
async WorkflowRunsArray(workflow_, { dataSource, userPayload }, pubSub) {
|
|
10329
10372
|
this.CheckUserReadPermissions('Workflow Runs', userPayload);
|
|
10330
|
-
const sSQL = `SELECT * FROM [
|
|
10373
|
+
const sSQL = `SELECT * FROM [__mj].[vwWorkflowRuns] WHERE [WorkflowName]=${workflow_.ID} ` + this.getRowLevelSecurityWhereClause('Workflow Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10331
10374
|
const result = this.ArrayMapFieldNamesToCodeNames('Workflow Runs', await dataSource.query(sSQL));
|
|
10332
10375
|
return result;
|
|
10333
10376
|
}
|
|
@@ -10536,13 +10579,13 @@ let WorkflowEngineResolver = class WorkflowEngineResolver extends server_1.Resol
|
|
|
10536
10579
|
}
|
|
10537
10580
|
async WorkflowEngine(ID, { dataSource, userPayload }, pubSub) {
|
|
10538
10581
|
this.CheckUserReadPermissions('Workflow Engines', userPayload);
|
|
10539
|
-
const sSQL = `SELECT * FROM [
|
|
10582
|
+
const sSQL = `SELECT * FROM [__mj].[vwWorkflowEngines] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Workflow Engines', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10540
10583
|
const result = this.MapFieldNamesToCodeNames('Workflow Engines', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
10541
10584
|
return result;
|
|
10542
10585
|
}
|
|
10543
10586
|
async WorkflowsArray(workflowengine_, { dataSource, userPayload }, pubSub) {
|
|
10544
10587
|
this.CheckUserReadPermissions('Workflows', userPayload);
|
|
10545
|
-
const sSQL = `SELECT * FROM [
|
|
10588
|
+
const sSQL = `SELECT * FROM [__mj].[vwWorkflows] WHERE [WorkflowEngineName]=${workflowengine_.ID} ` + this.getRowLevelSecurityWhereClause('Workflows', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10546
10589
|
const result = this.ArrayMapFieldNamesToCodeNames('Workflows', await dataSource.query(sSQL));
|
|
10547
10590
|
return result;
|
|
10548
10591
|
}
|
|
@@ -10774,7 +10817,7 @@ let RecordChangeResolver = class RecordChangeResolver extends server_1.ResolverB
|
|
|
10774
10817
|
}
|
|
10775
10818
|
async RecordChange(ID, { dataSource, userPayload }, pubSub) {
|
|
10776
10819
|
this.CheckUserReadPermissions('Record Changes', userPayload);
|
|
10777
|
-
const sSQL = `SELECT * FROM [
|
|
10820
|
+
const sSQL = `SELECT * FROM [__mj].[vwRecordChanges] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Record Changes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10778
10821
|
const result = this.MapFieldNamesToCodeNames('Record Changes', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
10779
10822
|
return result;
|
|
10780
10823
|
}
|
|
@@ -10943,13 +10986,13 @@ let UserRoleResolver = class UserRoleResolver extends server_1.ResolverBase {
|
|
|
10943
10986
|
}
|
|
10944
10987
|
async UserRole(ID, { dataSource, userPayload }, pubSub) {
|
|
10945
10988
|
this.CheckUserReadPermissions('User Roles', userPayload);
|
|
10946
|
-
const sSQL = `SELECT * FROM [
|
|
10989
|
+
const sSQL = `SELECT * FROM [__mj].[vwUserRoles] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10947
10990
|
const result = this.MapFieldNamesToCodeNames('User Roles', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
10948
10991
|
return result;
|
|
10949
10992
|
}
|
|
10950
10993
|
async AllUserRoles({ dataSource, userPayload }, pubSub) {
|
|
10951
10994
|
this.CheckUserReadPermissions('User Roles', userPayload);
|
|
10952
|
-
const sSQL = 'SELECT * FROM [
|
|
10995
|
+
const sSQL = 'SELECT * FROM [__mj].[vwUserRoles]' + this.getRowLevelSecurityWhereClause('User Roles', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
10953
10996
|
const result = this.ArrayMapFieldNamesToCodeNames('User Roles', await dataSource.query(sSQL));
|
|
10954
10997
|
return result;
|
|
10955
10998
|
}
|
|
@@ -11115,19 +11158,19 @@ let RowLevelSecurityFilterResolver = class RowLevelSecurityFilterResolver extend
|
|
|
11115
11158
|
}
|
|
11116
11159
|
async RowLevelSecurityFilter(ID, { dataSource, userPayload }, pubSub) {
|
|
11117
11160
|
this.CheckUserReadPermissions('Row Level Security Filters', userPayload);
|
|
11118
|
-
const sSQL = `SELECT * FROM [
|
|
11161
|
+
const sSQL = `SELECT * FROM [__mj].[vwRowLevelSecurityFilters] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Row Level Security Filters', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11119
11162
|
const result = this.MapFieldNamesToCodeNames('Row Level Security Filters', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
11120
11163
|
return result;
|
|
11121
11164
|
}
|
|
11122
11165
|
async AllRowLevelSecurityFilters({ dataSource, userPayload }, pubSub) {
|
|
11123
11166
|
this.CheckUserReadPermissions('Row Level Security Filters', userPayload);
|
|
11124
|
-
const sSQL = 'SELECT * FROM [
|
|
11167
|
+
const sSQL = 'SELECT * FROM [__mj].[vwRowLevelSecurityFilters]' + this.getRowLevelSecurityWhereClause('Row Level Security Filters', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
11125
11168
|
const result = this.ArrayMapFieldNamesToCodeNames('Row Level Security Filters', await dataSource.query(sSQL));
|
|
11126
11169
|
return result;
|
|
11127
11170
|
}
|
|
11128
11171
|
async EntityPermissionsArray(rowlevelsecurityfilter_, { dataSource, userPayload }, pubSub) {
|
|
11129
11172
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
11130
|
-
const sSQL = `SELECT * FROM [
|
|
11173
|
+
const sSQL = `SELECT * FROM [__mj].[vwEntityPermissions] WHERE [ReadRLSFilterID]=${rowlevelsecurityfilter_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11131
11174
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL));
|
|
11132
11175
|
return result;
|
|
11133
11176
|
}
|
|
@@ -11247,6 +11290,11 @@ __decorate([
|
|
|
11247
11290
|
(0, class_validator_1.MaxLength)(200),
|
|
11248
11291
|
__metadata("design:type", String)
|
|
11249
11292
|
], AuditLog_.prototype, "User", void 0);
|
|
11293
|
+
__decorate([
|
|
11294
|
+
(0, server_1.Field)({ nullable: true }),
|
|
11295
|
+
(0, class_validator_1.MaxLength)(510),
|
|
11296
|
+
__metadata("design:type", String)
|
|
11297
|
+
], AuditLog_.prototype, "Entity", void 0);
|
|
11250
11298
|
exports.AuditLog_ = AuditLog_ = __decorate([
|
|
11251
11299
|
(0, server_1.ObjectType)()
|
|
11252
11300
|
], AuditLog_);
|
|
@@ -11377,7 +11425,7 @@ let AuditLogResolver = class AuditLogResolver extends server_1.ResolverBase {
|
|
|
11377
11425
|
}
|
|
11378
11426
|
async AuditLog(ID, { dataSource, userPayload }, pubSub) {
|
|
11379
11427
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
11380
|
-
const sSQL = `SELECT * FROM [
|
|
11428
|
+
const sSQL = `SELECT * FROM [__mj].[vwAuditLogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11381
11429
|
const result = this.MapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
11382
11430
|
return result;
|
|
11383
11431
|
}
|
|
@@ -11585,37 +11633,37 @@ let AuthorizationResolver = class AuthorizationResolver extends server_1.Resolve
|
|
|
11585
11633
|
}
|
|
11586
11634
|
async Authorization(ID, { dataSource, userPayload }, pubSub) {
|
|
11587
11635
|
this.CheckUserReadPermissions('Authorizations', userPayload);
|
|
11588
|
-
const sSQL = `SELECT * FROM [
|
|
11636
|
+
const sSQL = `SELECT * FROM [__mj].[vwAuthorizations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Authorizations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11589
11637
|
const result = this.MapFieldNamesToCodeNames('Authorizations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
11590
11638
|
return result;
|
|
11591
11639
|
}
|
|
11592
11640
|
async AllAuthorizations({ dataSource, userPayload }, pubSub) {
|
|
11593
11641
|
this.CheckUserReadPermissions('Authorizations', userPayload);
|
|
11594
|
-
const sSQL = 'SELECT * FROM [
|
|
11642
|
+
const sSQL = 'SELECT * FROM [__mj].[vwAuthorizations]' + this.getRowLevelSecurityWhereClause('Authorizations', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
11595
11643
|
const result = this.ArrayMapFieldNamesToCodeNames('Authorizations', await dataSource.query(sSQL));
|
|
11596
11644
|
return result;
|
|
11597
11645
|
}
|
|
11598
11646
|
async AuthorizationRolesArray(authorization_, { dataSource, userPayload }, pubSub) {
|
|
11599
11647
|
this.CheckUserReadPermissions('Authorization Roles', userPayload);
|
|
11600
|
-
const sSQL = `SELECT * FROM [
|
|
11648
|
+
const sSQL = `SELECT * FROM [__mj].[vwAuthorizationRoles] WHERE [AuthorizationID]=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Authorization Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11601
11649
|
const result = this.ArrayMapFieldNamesToCodeNames('Authorization Roles', await dataSource.query(sSQL));
|
|
11602
11650
|
return result;
|
|
11603
11651
|
}
|
|
11604
11652
|
async AuthorizationsArray(authorization_, { dataSource, userPayload }, pubSub) {
|
|
11605
11653
|
this.CheckUserReadPermissions('Authorizations', userPayload);
|
|
11606
|
-
const sSQL = `SELECT * FROM [
|
|
11654
|
+
const sSQL = `SELECT * FROM [__mj].[vwAuthorizations] WHERE [ParentID]=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Authorizations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11607
11655
|
const result = this.ArrayMapFieldNamesToCodeNames('Authorizations', await dataSource.query(sSQL));
|
|
11608
11656
|
return result;
|
|
11609
11657
|
}
|
|
11610
11658
|
async AuditLogTypesArray(authorization_, { dataSource, userPayload }, pubSub) {
|
|
11611
11659
|
this.CheckUserReadPermissions('Audit Log Types', userPayload);
|
|
11612
|
-
const sSQL = `SELECT * FROM [
|
|
11660
|
+
const sSQL = `SELECT * FROM [__mj].[vwAuditLogTypes] WHERE [AuthorizationName]=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Log Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11613
11661
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Log Types', await dataSource.query(sSQL));
|
|
11614
11662
|
return result;
|
|
11615
11663
|
}
|
|
11616
11664
|
async AuditLogsArray(authorization_, { dataSource, userPayload }, pubSub) {
|
|
11617
11665
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
11618
|
-
const sSQL = `SELECT * FROM [
|
|
11666
|
+
const sSQL = `SELECT * FROM [__mj].[vwAuditLogs] WHERE [AuthorizationName]=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11619
11667
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL));
|
|
11620
11668
|
return result;
|
|
11621
11669
|
}
|
|
@@ -11786,13 +11834,13 @@ let AuthorizationRoleResolver = class AuthorizationRoleResolver extends server_1
|
|
|
11786
11834
|
}
|
|
11787
11835
|
async AuthorizationRole(ID, { dataSource, userPayload }, pubSub) {
|
|
11788
11836
|
this.CheckUserReadPermissions('Authorization Roles', userPayload);
|
|
11789
|
-
const sSQL = `SELECT * FROM [
|
|
11837
|
+
const sSQL = `SELECT * FROM [__mj].[vwAuthorizationRoles] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Authorization Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11790
11838
|
const result = this.MapFieldNamesToCodeNames('Authorization Roles', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
11791
11839
|
return result;
|
|
11792
11840
|
}
|
|
11793
11841
|
async AllAuthorizationRoles({ dataSource, userPayload }, pubSub) {
|
|
11794
11842
|
this.CheckUserReadPermissions('Authorization Roles', userPayload);
|
|
11795
|
-
const sSQL = 'SELECT * FROM [
|
|
11843
|
+
const sSQL = 'SELECT * FROM [__mj].[vwAuthorizationRoles]' + this.getRowLevelSecurityWhereClause('Authorization Roles', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
11796
11844
|
const result = this.ArrayMapFieldNamesToCodeNames('Authorization Roles', await dataSource.query(sSQL));
|
|
11797
11845
|
return result;
|
|
11798
11846
|
}
|
|
@@ -11943,25 +11991,25 @@ let AuditLogTypeResolver = class AuditLogTypeResolver extends server_1.ResolverB
|
|
|
11943
11991
|
}
|
|
11944
11992
|
async AuditLogType(ID, { dataSource, userPayload }, pubSub) {
|
|
11945
11993
|
this.CheckUserReadPermissions('Audit Log Types', userPayload);
|
|
11946
|
-
const sSQL = `SELECT * FROM [
|
|
11994
|
+
const sSQL = `SELECT * FROM [__mj].[vwAuditLogTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Audit Log Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11947
11995
|
const result = this.MapFieldNamesToCodeNames('Audit Log Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
11948
11996
|
return result;
|
|
11949
11997
|
}
|
|
11950
11998
|
async AllAuditLogTypes({ dataSource, userPayload }, pubSub) {
|
|
11951
11999
|
this.CheckUserReadPermissions('Audit Log Types', userPayload);
|
|
11952
|
-
const sSQL = 'SELECT * FROM [
|
|
12000
|
+
const sSQL = 'SELECT * FROM [__mj].[vwAuditLogTypes]' + this.getRowLevelSecurityWhereClause('Audit Log Types', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
11953
12001
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Log Types', await dataSource.query(sSQL));
|
|
11954
12002
|
return result;
|
|
11955
12003
|
}
|
|
11956
12004
|
async AuditLogsArray(auditlogtype_, { dataSource, userPayload }, pubSub) {
|
|
11957
12005
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
11958
|
-
const sSQL = `SELECT * FROM [
|
|
12006
|
+
const sSQL = `SELECT * FROM [__mj].[vwAuditLogs] WHERE [AuditLogTypeName]=${auditlogtype_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11959
12007
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL));
|
|
11960
12008
|
return result;
|
|
11961
12009
|
}
|
|
11962
12010
|
async AuditLogTypesArray(auditlogtype_, { dataSource, userPayload }, pubSub) {
|
|
11963
12011
|
this.CheckUserReadPermissions('Audit Log Types', userPayload);
|
|
11964
|
-
const sSQL = `SELECT * FROM [
|
|
12012
|
+
const sSQL = `SELECT * FROM [__mj].[vwAuditLogTypes] WHERE [ParentID]=${auditlogtype_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Log Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11965
12013
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Log Types', await dataSource.query(sSQL));
|
|
11966
12014
|
return result;
|
|
11967
12015
|
}
|
|
@@ -12131,13 +12179,13 @@ let EntityFieldValueResolver = class EntityFieldValueResolver extends server_1.R
|
|
|
12131
12179
|
}
|
|
12132
12180
|
async EntityFieldValue(ID, { dataSource, userPayload }, pubSub) {
|
|
12133
12181
|
this.CheckUserReadPermissions('Entity Field Values', userPayload);
|
|
12134
|
-
const sSQL = `SELECT * FROM [
|
|
12182
|
+
const sSQL = `SELECT * FROM [__mj].[vwEntityFieldValues] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Field Values', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12135
12183
|
const result = this.MapFieldNamesToCodeNames('Entity Field Values', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
12136
12184
|
return result;
|
|
12137
12185
|
}
|
|
12138
12186
|
async AllEntityFieldValues({ dataSource, userPayload }, pubSub) {
|
|
12139
12187
|
this.CheckUserReadPermissions('Entity Field Values', userPayload);
|
|
12140
|
-
const sSQL = 'SELECT * FROM [
|
|
12188
|
+
const sSQL = 'SELECT * FROM [__mj].[vwEntityFieldValues]' + this.getRowLevelSecurityWhereClause('Entity Field Values', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12141
12189
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Field Values', await dataSource.query(sSQL));
|
|
12142
12190
|
return result;
|
|
12143
12191
|
}
|
|
@@ -12343,37 +12391,37 @@ let AIModelResolver = class AIModelResolver extends server_1.ResolverBase {
|
|
|
12343
12391
|
}
|
|
12344
12392
|
async AIModel(ID, { dataSource, userPayload }, pubSub) {
|
|
12345
12393
|
this.CheckUserReadPermissions('AI Models', userPayload);
|
|
12346
|
-
const sSQL = `SELECT * FROM [
|
|
12394
|
+
const sSQL = `SELECT * FROM [__mj].[vwAIModels] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('AI Models', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12347
12395
|
const result = this.MapFieldNamesToCodeNames('AI Models', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
12348
12396
|
return result;
|
|
12349
12397
|
}
|
|
12350
12398
|
async AllAIModels({ dataSource, userPayload }, pubSub) {
|
|
12351
12399
|
this.CheckUserReadPermissions('AI Models', userPayload);
|
|
12352
|
-
const sSQL = 'SELECT * FROM [
|
|
12400
|
+
const sSQL = 'SELECT * FROM [__mj].[vwAIModels]' + this.getRowLevelSecurityWhereClause('AI Models', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12353
12401
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Models', await dataSource.query(sSQL));
|
|
12354
12402
|
return result;
|
|
12355
12403
|
}
|
|
12356
12404
|
async AIActionsArray(aimodel_, { dataSource, userPayload }, pubSub) {
|
|
12357
12405
|
this.CheckUserReadPermissions('AI Actions', userPayload);
|
|
12358
|
-
const sSQL = `SELECT * FROM [
|
|
12406
|
+
const sSQL = `SELECT * FROM [__mj].[vwAIActions] WHERE [DefaultModelID]=${aimodel_.ID} ` + this.getRowLevelSecurityWhereClause('AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12359
12407
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Actions', await dataSource.query(sSQL));
|
|
12360
12408
|
return result;
|
|
12361
12409
|
}
|
|
12362
12410
|
async AIModelActionsArray(aimodel_, { dataSource, userPayload }, pubSub) {
|
|
12363
12411
|
this.CheckUserReadPermissions('AI Model Actions', userPayload);
|
|
12364
|
-
const sSQL = `SELECT * FROM [
|
|
12412
|
+
const sSQL = `SELECT * FROM [__mj].[vwAIModelActions] WHERE [AIModelID]=${aimodel_.ID} ` + this.getRowLevelSecurityWhereClause('AI Model Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12365
12413
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Model Actions', await dataSource.query(sSQL));
|
|
12366
12414
|
return result;
|
|
12367
12415
|
}
|
|
12368
12416
|
async EntityAIActionsArray(aimodel_, { dataSource, userPayload }, pubSub) {
|
|
12369
12417
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
12370
|
-
const sSQL = `SELECT * FROM [
|
|
12418
|
+
const sSQL = `SELECT * FROM [__mj].[vwEntityAIActions] WHERE [AIModelID]=${aimodel_.ID} ` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12371
12419
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL));
|
|
12372
12420
|
return result;
|
|
12373
12421
|
}
|
|
12374
12422
|
async VectorIndexesArray(aimodel_, { dataSource, userPayload }, pubSub) {
|
|
12375
12423
|
this.CheckUserReadPermissions('Vector Indexes', userPayload);
|
|
12376
|
-
const sSQL = `SELECT * FROM [
|
|
12424
|
+
const sSQL = `SELECT * FROM [__mj].[vwVectorIndexes] WHERE [EmbeddingModelID]=${aimodel_.ID} ` + this.getRowLevelSecurityWhereClause('Vector Indexes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12377
12425
|
const result = this.ArrayMapFieldNamesToCodeNames('Vector Indexes', await dataSource.query(sSQL));
|
|
12378
12426
|
return result;
|
|
12379
12427
|
}
|
|
@@ -12623,25 +12671,25 @@ let AIActionResolver = class AIActionResolver extends server_1.ResolverBase {
|
|
|
12623
12671
|
}
|
|
12624
12672
|
async AIAction(ID, { dataSource, userPayload }, pubSub) {
|
|
12625
12673
|
this.CheckUserReadPermissions('AI Actions', userPayload);
|
|
12626
|
-
const sSQL = `SELECT * FROM [
|
|
12674
|
+
const sSQL = `SELECT * FROM [__mj].[vwAIActions] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12627
12675
|
const result = this.MapFieldNamesToCodeNames('AI Actions', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
12628
12676
|
return result;
|
|
12629
12677
|
}
|
|
12630
12678
|
async AllAIActions({ dataSource, userPayload }, pubSub) {
|
|
12631
12679
|
this.CheckUserReadPermissions('AI Actions', userPayload);
|
|
12632
|
-
const sSQL = 'SELECT * FROM [
|
|
12680
|
+
const sSQL = 'SELECT * FROM [__mj].[vwAIActions]' + this.getRowLevelSecurityWhereClause('AI Actions', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12633
12681
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Actions', await dataSource.query(sSQL));
|
|
12634
12682
|
return result;
|
|
12635
12683
|
}
|
|
12636
12684
|
async AIModelActionsArray(aiaction_, { dataSource, userPayload }, pubSub) {
|
|
12637
12685
|
this.CheckUserReadPermissions('AI Model Actions', userPayload);
|
|
12638
|
-
const sSQL = `SELECT * FROM [
|
|
12686
|
+
const sSQL = `SELECT * FROM [__mj].[vwAIModelActions] WHERE [AIActionID]=${aiaction_.ID} ` + this.getRowLevelSecurityWhereClause('AI Model Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12639
12687
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Model Actions', await dataSource.query(sSQL));
|
|
12640
12688
|
return result;
|
|
12641
12689
|
}
|
|
12642
12690
|
async EntityAIActionsArray(aiaction_, { dataSource, userPayload }, pubSub) {
|
|
12643
12691
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
12644
|
-
const sSQL = `SELECT * FROM [
|
|
12692
|
+
const sSQL = `SELECT * FROM [__mj].[vwEntityAIActions] WHERE [AIActionID]=${aiaction_.ID} ` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12645
12693
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL));
|
|
12646
12694
|
return result;
|
|
12647
12695
|
}
|
|
@@ -12853,13 +12901,13 @@ let AIModelActionResolver = class AIModelActionResolver extends server_1.Resolve
|
|
|
12853
12901
|
}
|
|
12854
12902
|
async AIModelAction(ID, { dataSource, userPayload }, pubSub) {
|
|
12855
12903
|
this.CheckUserReadPermissions('AI Model Actions', userPayload);
|
|
12856
|
-
const sSQL = `SELECT * FROM [
|
|
12904
|
+
const sSQL = `SELECT * FROM [__mj].[vwAIModelActions] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('AI Model Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12857
12905
|
const result = this.MapFieldNamesToCodeNames('AI Model Actions', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
12858
12906
|
return result;
|
|
12859
12907
|
}
|
|
12860
12908
|
async AllAIModelActions({ dataSource, userPayload }, pubSub) {
|
|
12861
12909
|
this.CheckUserReadPermissions('AI Model Actions', userPayload);
|
|
12862
|
-
const sSQL = 'SELECT * FROM [
|
|
12910
|
+
const sSQL = 'SELECT * FROM [__mj].[vwAIModelActions]' + this.getRowLevelSecurityWhereClause('AI Model Actions', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12863
12911
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Model Actions', await dataSource.query(sSQL));
|
|
12864
12912
|
return result;
|
|
12865
12913
|
}
|
|
@@ -13129,13 +13177,13 @@ let EntityAIActionResolver = class EntityAIActionResolver extends server_1.Resol
|
|
|
13129
13177
|
}
|
|
13130
13178
|
async EntityAIAction(ID, { dataSource, userPayload }, pubSub) {
|
|
13131
13179
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
13132
|
-
const sSQL = `SELECT * FROM [
|
|
13180
|
+
const sSQL = `SELECT * FROM [__mj].[vwEntityAIActions] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13133
13181
|
const result = this.MapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
13134
13182
|
return result;
|
|
13135
13183
|
}
|
|
13136
13184
|
async AllEntityAIActions({ dataSource, userPayload }, pubSub) {
|
|
13137
13185
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
13138
|
-
const sSQL = 'SELECT * FROM [
|
|
13186
|
+
const sSQL = 'SELECT * FROM [__mj].[vwEntityAIActions]' + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
13139
13187
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL));
|
|
13140
13188
|
return result;
|
|
13141
13189
|
}
|
|
@@ -13306,19 +13354,19 @@ let AIModelTypeResolver = class AIModelTypeResolver extends server_1.ResolverBas
|
|
|
13306
13354
|
}
|
|
13307
13355
|
async AIModelType(ID, { dataSource, userPayload }, pubSub) {
|
|
13308
13356
|
this.CheckUserReadPermissions('AI Model Types', userPayload);
|
|
13309
|
-
const sSQL = `SELECT * FROM [
|
|
13357
|
+
const sSQL = `SELECT * FROM [__mj].[vwAIModelTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('AI Model Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13310
13358
|
const result = this.MapFieldNamesToCodeNames('AI Model Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
13311
13359
|
return result;
|
|
13312
13360
|
}
|
|
13313
13361
|
async AllAIModelTypes({ dataSource, userPayload }, pubSub) {
|
|
13314
13362
|
this.CheckUserReadPermissions('AI Model Types', userPayload);
|
|
13315
|
-
const sSQL = 'SELECT * FROM [
|
|
13363
|
+
const sSQL = 'SELECT * FROM [__mj].[vwAIModelTypes]' + this.getRowLevelSecurityWhereClause('AI Model Types', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
13316
13364
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Model Types', await dataSource.query(sSQL));
|
|
13317
13365
|
return result;
|
|
13318
13366
|
}
|
|
13319
13367
|
async AIModelsArray(aimodeltype_, { dataSource, userPayload }, pubSub) {
|
|
13320
13368
|
this.CheckUserReadPermissions('AI Models', userPayload);
|
|
13321
|
-
const sSQL = `SELECT * FROM [
|
|
13369
|
+
const sSQL = `SELECT * FROM [__mj].[vwAIModels] WHERE [AIModelTypeID]=${aimodeltype_.ID} ` + this.getRowLevelSecurityWhereClause('AI Models', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13322
13370
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Models', await dataSource.query(sSQL));
|
|
13323
13371
|
return result;
|
|
13324
13372
|
}
|
|
@@ -13494,13 +13542,13 @@ let QueueTypeResolver = class QueueTypeResolver extends server_1.ResolverBase {
|
|
|
13494
13542
|
}
|
|
13495
13543
|
async QueueType(ID, { dataSource, userPayload }, pubSub) {
|
|
13496
13544
|
this.CheckUserReadPermissions('Queue Types', userPayload);
|
|
13497
|
-
const sSQL = `SELECT * FROM [
|
|
13545
|
+
const sSQL = `SELECT * FROM [__mj].[vwQueueTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Queue Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13498
13546
|
const result = this.MapFieldNamesToCodeNames('Queue Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
13499
13547
|
return result;
|
|
13500
13548
|
}
|
|
13501
13549
|
async QueuesArray(queuetype_, { dataSource, userPayload }, pubSub) {
|
|
13502
13550
|
this.CheckUserReadPermissions('Queues', userPayload);
|
|
13503
|
-
const sSQL = `SELECT * FROM [
|
|
13551
|
+
const sSQL = `SELECT * FROM [__mj].[vwQueues] WHERE [QueueTypeID]=${queuetype_.ID} ` + this.getRowLevelSecurityWhereClause('Queues', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13504
13552
|
const result = this.ArrayMapFieldNamesToCodeNames('Queues', await dataSource.query(sSQL));
|
|
13505
13553
|
return result;
|
|
13506
13554
|
}
|
|
@@ -13850,13 +13898,13 @@ let QueueResolver = class QueueResolver extends server_1.ResolverBase {
|
|
|
13850
13898
|
}
|
|
13851
13899
|
async Queue(ID, { dataSource, userPayload }, pubSub) {
|
|
13852
13900
|
this.CheckUserReadPermissions('Queues', userPayload);
|
|
13853
|
-
const sSQL = `SELECT * FROM [
|
|
13901
|
+
const sSQL = `SELECT * FROM [__mj].[vwQueues] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Queues', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13854
13902
|
const result = this.MapFieldNamesToCodeNames('Queues', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
13855
13903
|
return result;
|
|
13856
13904
|
}
|
|
13857
13905
|
async QueueTasksArray(queue_, { dataSource, userPayload }, pubSub) {
|
|
13858
13906
|
this.CheckUserReadPermissions('Queue Tasks', userPayload);
|
|
13859
|
-
const sSQL = `SELECT * FROM [
|
|
13907
|
+
const sSQL = `SELECT * FROM [__mj].[vwQueueTasks] WHERE [QueueID]=${queue_.ID} ` + this.getRowLevelSecurityWhereClause('Queue Tasks', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13860
13908
|
const result = this.ArrayMapFieldNamesToCodeNames('Queue Tasks', await dataSource.query(sSQL));
|
|
13861
13909
|
return result;
|
|
13862
13910
|
}
|
|
@@ -14153,7 +14201,7 @@ let QueueTaskResolver = class QueueTaskResolver extends server_1.ResolverBase {
|
|
|
14153
14201
|
}
|
|
14154
14202
|
async QueueTask(ID, { dataSource, userPayload }, pubSub) {
|
|
14155
14203
|
this.CheckUserReadPermissions('Queue Tasks', userPayload);
|
|
14156
|
-
const sSQL = `SELECT * FROM [
|
|
14204
|
+
const sSQL = `SELECT * FROM [__mj].[vwQueueTasks] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Queue Tasks', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14157
14205
|
const result = this.MapFieldNamesToCodeNames('Queue Tasks', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
14158
14206
|
return result;
|
|
14159
14207
|
}
|
|
@@ -14401,7 +14449,7 @@ let DashboardResolver = class DashboardResolver extends server_1.ResolverBase {
|
|
|
14401
14449
|
}
|
|
14402
14450
|
async Dashboard(ID, { dataSource, userPayload }, pubSub) {
|
|
14403
14451
|
this.CheckUserReadPermissions('Dashboards', userPayload);
|
|
14404
|
-
const sSQL = `SELECT * FROM [
|
|
14452
|
+
const sSQL = `SELECT * FROM [__mj].[vwDashboards] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Dashboards', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14405
14453
|
this.createRecordAccessAuditLogRecord(userPayload, 'Dashboards', ID);
|
|
14406
14454
|
const result = this.MapFieldNamesToCodeNames('Dashboards', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
14407
14455
|
return result;
|
|
@@ -14607,14 +14655,14 @@ let OutputTriggerTypeResolver = class OutputTriggerTypeResolver extends server_1
|
|
|
14607
14655
|
}
|
|
14608
14656
|
async OutputTriggerType(ID, { dataSource, userPayload }, pubSub) {
|
|
14609
14657
|
this.CheckUserReadPermissions('Output Trigger Types', userPayload);
|
|
14610
|
-
const sSQL = `SELECT * FROM [
|
|
14658
|
+
const sSQL = `SELECT * FROM [__mj].[vwOutputTriggerTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Output Trigger Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14611
14659
|
this.createRecordAccessAuditLogRecord(userPayload, 'Output Trigger Types', ID);
|
|
14612
14660
|
const result = this.MapFieldNamesToCodeNames('Output Trigger Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
14613
14661
|
return result;
|
|
14614
14662
|
}
|
|
14615
14663
|
async ReportsArray(outputtriggertype_, { dataSource, userPayload }, pubSub) {
|
|
14616
14664
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
14617
|
-
const sSQL = `SELECT * FROM [
|
|
14665
|
+
const sSQL = `SELECT * FROM [__mj].[vwReports] WHERE [OutputTriggerTypeID]=${outputtriggertype_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14618
14666
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
14619
14667
|
return result;
|
|
14620
14668
|
}
|
|
@@ -14742,14 +14790,14 @@ let OutputFormatTypeResolver = class OutputFormatTypeResolver extends server_1.R
|
|
|
14742
14790
|
}
|
|
14743
14791
|
async OutputFormatType(ID, { dataSource, userPayload }, pubSub) {
|
|
14744
14792
|
this.CheckUserReadPermissions('Output Format Types', userPayload);
|
|
14745
|
-
const sSQL = `SELECT * FROM [
|
|
14793
|
+
const sSQL = `SELECT * FROM [__mj].[vwOutputFormatTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Output Format Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14746
14794
|
this.createRecordAccessAuditLogRecord(userPayload, 'Output Format Types', ID);
|
|
14747
14795
|
const result = this.MapFieldNamesToCodeNames('Output Format Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
14748
14796
|
return result;
|
|
14749
14797
|
}
|
|
14750
14798
|
async ReportsArray(outputformattype_, { dataSource, userPayload }, pubSub) {
|
|
14751
14799
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
14752
|
-
const sSQL = `SELECT * FROM [
|
|
14800
|
+
const sSQL = `SELECT * FROM [__mj].[vwReports] WHERE [OutputFormatTypeID]=${outputformattype_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14753
14801
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
14754
14802
|
return result;
|
|
14755
14803
|
}
|
|
@@ -14873,14 +14921,14 @@ let OutputDeliveryTypeResolver = class OutputDeliveryTypeResolver extends server
|
|
|
14873
14921
|
}
|
|
14874
14922
|
async OutputDeliveryType(ID, { dataSource, userPayload }, pubSub) {
|
|
14875
14923
|
this.CheckUserReadPermissions('Output Delivery Types', userPayload);
|
|
14876
|
-
const sSQL = `SELECT * FROM [
|
|
14924
|
+
const sSQL = `SELECT * FROM [__mj].[vwOutputDeliveryTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Output Delivery Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14877
14925
|
this.createRecordAccessAuditLogRecord(userPayload, 'Output Delivery Types', ID);
|
|
14878
14926
|
const result = this.MapFieldNamesToCodeNames('Output Delivery Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
14879
14927
|
return result;
|
|
14880
14928
|
}
|
|
14881
14929
|
async ReportsArray(outputdeliverytype_, { dataSource, userPayload }, pubSub) {
|
|
14882
14930
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
14883
|
-
const sSQL = `SELECT * FROM [
|
|
14931
|
+
const sSQL = `SELECT * FROM [__mj].[vwReports] WHERE [OutputDeliveryTypeID]=${outputdeliverytype_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14884
14932
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
14885
14933
|
return result;
|
|
14886
14934
|
}
|
|
@@ -15257,13 +15305,13 @@ let ReportResolver = class ReportResolver extends server_1.ResolverBase {
|
|
|
15257
15305
|
}
|
|
15258
15306
|
async Report(ID, { dataSource, userPayload }, pubSub) {
|
|
15259
15307
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
15260
|
-
const sSQL = `SELECT * FROM [
|
|
15308
|
+
const sSQL = `SELECT * FROM [__mj].[vwReports] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15261
15309
|
const result = this.MapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
15262
15310
|
return result;
|
|
15263
15311
|
}
|
|
15264
15312
|
async ReportSnapshotsArray(report_, { dataSource, userPayload }, pubSub) {
|
|
15265
15313
|
this.CheckUserReadPermissions('Report Snapshots', userPayload);
|
|
15266
|
-
const sSQL = `SELECT * FROM [
|
|
15314
|
+
const sSQL = `SELECT * FROM [__mj].[vwReportSnapshots] WHERE [ReportID]=${report_.ID} ` + this.getRowLevelSecurityWhereClause('Report Snapshots', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15267
15315
|
const result = this.ArrayMapFieldNamesToCodeNames('Report Snapshots', await dataSource.query(sSQL));
|
|
15268
15316
|
return result;
|
|
15269
15317
|
}
|
|
@@ -15531,7 +15579,7 @@ let ReportSnapshotResolver = class ReportSnapshotResolver extends server_1.Resol
|
|
|
15531
15579
|
}
|
|
15532
15580
|
async ReportSnapshot(ID, { dataSource, userPayload }, pubSub) {
|
|
15533
15581
|
this.CheckUserReadPermissions('Report Snapshots', userPayload);
|
|
15534
|
-
const sSQL = `SELECT * FROM [
|
|
15582
|
+
const sSQL = `SELECT * FROM [__mj].[vwReportSnapshots] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Report Snapshots', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15535
15583
|
const result = this.MapFieldNamesToCodeNames('Report Snapshots', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
15536
15584
|
return result;
|
|
15537
15585
|
}
|
|
@@ -15765,14 +15813,14 @@ let ResourceTypeResolver = class ResourceTypeResolver extends server_1.ResolverB
|
|
|
15765
15813
|
}
|
|
15766
15814
|
async ResourceType(ID, { dataSource, userPayload }, pubSub) {
|
|
15767
15815
|
this.CheckUserReadPermissions('Resource Types', userPayload);
|
|
15768
|
-
const sSQL = `SELECT * FROM [
|
|
15816
|
+
const sSQL = `SELECT * FROM [__mj].[vwResourceTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Resource Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15769
15817
|
this.createRecordAccessAuditLogRecord(userPayload, 'Resource Types', ID);
|
|
15770
15818
|
const result = this.MapFieldNamesToCodeNames('Resource Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
15771
15819
|
return result;
|
|
15772
15820
|
}
|
|
15773
15821
|
async WorkspaceItemsArray(resourcetype_, { dataSource, userPayload }, pubSub) {
|
|
15774
15822
|
this.CheckUserReadPermissions('Workspace Items', userPayload);
|
|
15775
|
-
const sSQL = `SELECT * FROM [
|
|
15823
|
+
const sSQL = `SELECT * FROM [__mj].[vwWorkspaceItems] WHERE [ResourceTypeID]=${resourcetype_.ID} ` + this.getRowLevelSecurityWhereClause('Workspace Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15776
15824
|
const result = this.ArrayMapFieldNamesToCodeNames('Workspace Items', await dataSource.query(sSQL));
|
|
15777
15825
|
return result;
|
|
15778
15826
|
}
|
|
@@ -15914,20 +15962,20 @@ let TagResolver = class TagResolver extends server_1.ResolverBase {
|
|
|
15914
15962
|
}
|
|
15915
15963
|
async Tag(ID, { dataSource, userPayload }, pubSub) {
|
|
15916
15964
|
this.CheckUserReadPermissions('Tags', userPayload);
|
|
15917
|
-
const sSQL = `SELECT * FROM [
|
|
15965
|
+
const sSQL = `SELECT * FROM [__mj].[vwTags] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Tags', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15918
15966
|
this.createRecordAccessAuditLogRecord(userPayload, 'Tags', ID);
|
|
15919
15967
|
const result = this.MapFieldNamesToCodeNames('Tags', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
15920
15968
|
return result;
|
|
15921
15969
|
}
|
|
15922
15970
|
async TagsArray(tag_, { dataSource, userPayload }, pubSub) {
|
|
15923
15971
|
this.CheckUserReadPermissions('Tags', userPayload);
|
|
15924
|
-
const sSQL = `SELECT * FROM [
|
|
15972
|
+
const sSQL = `SELECT * FROM [__mj].[vwTags] WHERE [ParentID]=${tag_.ID} ` + this.getRowLevelSecurityWhereClause('Tags', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15925
15973
|
const result = this.ArrayMapFieldNamesToCodeNames('Tags', await dataSource.query(sSQL));
|
|
15926
15974
|
return result;
|
|
15927
15975
|
}
|
|
15928
15976
|
async TaggedItemsArray(tag_, { dataSource, userPayload }, pubSub) {
|
|
15929
15977
|
this.CheckUserReadPermissions('Tagged Items', userPayload);
|
|
15930
|
-
const sSQL = `SELECT * FROM [
|
|
15978
|
+
const sSQL = `SELECT * FROM [__mj].[vwTaggedItems] WHERE [TagID]=${tag_.ID} ` + this.getRowLevelSecurityWhereClause('Tagged Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15931
15979
|
const result = this.ArrayMapFieldNamesToCodeNames('Tagged Items', await dataSource.query(sSQL));
|
|
15932
15980
|
return result;
|
|
15933
15981
|
}
|
|
@@ -16015,6 +16063,11 @@ __decorate([
|
|
|
16015
16063
|
(0, class_validator_1.MaxLength)(510),
|
|
16016
16064
|
__metadata("design:type", String)
|
|
16017
16065
|
], TaggedItem_.prototype, "Tag", void 0);
|
|
16066
|
+
__decorate([
|
|
16067
|
+
(0, server_1.Field)(),
|
|
16068
|
+
(0, class_validator_1.MaxLength)(510),
|
|
16069
|
+
__metadata("design:type", String)
|
|
16070
|
+
], TaggedItem_.prototype, "Entity", void 0);
|
|
16018
16071
|
exports.TaggedItem_ = TaggedItem_ = __decorate([
|
|
16019
16072
|
(0, server_1.ObjectType)()
|
|
16020
16073
|
], TaggedItem_);
|
|
@@ -16065,7 +16118,7 @@ let TaggedItemResolver = class TaggedItemResolver extends server_1.ResolverBase
|
|
|
16065
16118
|
}
|
|
16066
16119
|
async TaggedItem(ID, { dataSource, userPayload }, pubSub) {
|
|
16067
16120
|
this.CheckUserReadPermissions('Tagged Items', userPayload);
|
|
16068
|
-
const sSQL = `SELECT * FROM [
|
|
16121
|
+
const sSQL = `SELECT * FROM [__mj].[vwTaggedItems] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Tagged Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16069
16122
|
this.createRecordAccessAuditLogRecord(userPayload, 'Tagged Items', ID);
|
|
16070
16123
|
const result = this.MapFieldNamesToCodeNames('Tagged Items', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
16071
16124
|
return result;
|
|
@@ -16230,14 +16283,14 @@ let WorkspaceResolver = class WorkspaceResolver extends server_1.ResolverBase {
|
|
|
16230
16283
|
}
|
|
16231
16284
|
async Workspace(ID, { dataSource, userPayload }, pubSub) {
|
|
16232
16285
|
this.CheckUserReadPermissions('Workspaces', userPayload);
|
|
16233
|
-
const sSQL = `SELECT * FROM [
|
|
16286
|
+
const sSQL = `SELECT * FROM [__mj].[vwWorkspaces] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Workspaces', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16234
16287
|
this.createRecordAccessAuditLogRecord(userPayload, 'Workspaces', ID);
|
|
16235
16288
|
const result = this.MapFieldNamesToCodeNames('Workspaces', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
16236
16289
|
return result;
|
|
16237
16290
|
}
|
|
16238
16291
|
async WorkspaceItemsArray(workspace_, { dataSource, userPayload }, pubSub) {
|
|
16239
16292
|
this.CheckUserReadPermissions('Workspace Items', userPayload);
|
|
16240
|
-
const sSQL = `SELECT * FROM [
|
|
16293
|
+
const sSQL = `SELECT * FROM [__mj].[vwWorkspaceItems] WHERE [WorkSpaceID]=${workspace_.ID} ` + this.getRowLevelSecurityWhereClause('Workspace Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16241
16294
|
const result = this.ArrayMapFieldNamesToCodeNames('Workspace Items', await dataSource.query(sSQL));
|
|
16242
16295
|
return result;
|
|
16243
16296
|
}
|
|
@@ -16550,7 +16603,7 @@ let WorkspaceItemResolver = class WorkspaceItemResolver extends server_1.Resolve
|
|
|
16550
16603
|
}
|
|
16551
16604
|
async WorkspaceItem(ID, { dataSource, userPayload }, pubSub) {
|
|
16552
16605
|
this.CheckUserReadPermissions('Workspace Items', userPayload);
|
|
16553
|
-
const sSQL = `SELECT * FROM [
|
|
16606
|
+
const sSQL = `SELECT * FROM [__mj].[vwWorkspaceItems] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Workspace Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16554
16607
|
this.createRecordAccessAuditLogRecord(userPayload, 'Workspace Items', ID);
|
|
16555
16608
|
const result = this.MapFieldNamesToCodeNames('Workspace Items', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
16556
16609
|
return result;
|
|
@@ -16766,13 +16819,13 @@ let DatasetResolver = class DatasetResolver extends server_1.ResolverBase {
|
|
|
16766
16819
|
}
|
|
16767
16820
|
async Dataset(ID, { dataSource, userPayload }, pubSub) {
|
|
16768
16821
|
this.CheckUserReadPermissions('Datasets', userPayload);
|
|
16769
|
-
const sSQL = `SELECT * FROM [
|
|
16822
|
+
const sSQL = `SELECT * FROM [__mj].[vwDatasets] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Datasets', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16770
16823
|
const result = this.MapFieldNamesToCodeNames('Datasets', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
16771
16824
|
return result;
|
|
16772
16825
|
}
|
|
16773
16826
|
async DatasetItemsArray(dataset_, { dataSource, userPayload }, pubSub) {
|
|
16774
16827
|
this.CheckUserReadPermissions('Dataset Items', userPayload);
|
|
16775
|
-
const sSQL = `SELECT * FROM [
|
|
16828
|
+
const sSQL = `SELECT * FROM [__mj].[vwDatasetItems] WHERE [DatasetName]=${dataset_.ID} ` + this.getRowLevelSecurityWhereClause('Dataset Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16776
16829
|
const result = this.ArrayMapFieldNamesToCodeNames('Dataset Items', await dataSource.query(sSQL));
|
|
16777
16830
|
return result;
|
|
16778
16831
|
}
|
|
@@ -16929,7 +16982,7 @@ let DatasetItemResolver = class DatasetItemResolver extends server_1.ResolverBas
|
|
|
16929
16982
|
}
|
|
16930
16983
|
async DatasetItem(ID, { dataSource, userPayload }, pubSub) {
|
|
16931
16984
|
this.CheckUserReadPermissions('Dataset Items', userPayload);
|
|
16932
|
-
const sSQL = `SELECT * FROM [
|
|
16985
|
+
const sSQL = `SELECT * FROM [__mj].[vwDatasetItems] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Dataset Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16933
16986
|
const result = this.MapFieldNamesToCodeNames('Dataset Items', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
16934
16987
|
return result;
|
|
16935
16988
|
}
|
|
@@ -17140,13 +17193,13 @@ let ConversationDetailResolver = class ConversationDetailResolver extends server
|
|
|
17140
17193
|
}
|
|
17141
17194
|
async ConversationDetail(ID, { dataSource, userPayload }, pubSub) {
|
|
17142
17195
|
this.CheckUserReadPermissions('Conversation Details', userPayload);
|
|
17143
|
-
const sSQL = `SELECT * FROM [
|
|
17196
|
+
const sSQL = `SELECT * FROM [__mj].[vwConversationDetails] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Conversation Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17144
17197
|
const result = this.MapFieldNamesToCodeNames('Conversation Details', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
17145
17198
|
return result;
|
|
17146
17199
|
}
|
|
17147
17200
|
async ReportsArray(conversationdetail_, { dataSource, userPayload }, pubSub) {
|
|
17148
17201
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
17149
|
-
const sSQL = `SELECT * FROM [
|
|
17202
|
+
const sSQL = `SELECT * FROM [__mj].[vwReports] WHERE [ConversationDetailID]=${conversationdetail_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17150
17203
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
17151
17204
|
return result;
|
|
17152
17205
|
}
|
|
@@ -17502,19 +17555,19 @@ let ConversationResolver = class ConversationResolver extends server_1.ResolverB
|
|
|
17502
17555
|
}
|
|
17503
17556
|
async Conversation(ID, { dataSource, userPayload }, pubSub) {
|
|
17504
17557
|
this.CheckUserReadPermissions('Conversations', userPayload);
|
|
17505
|
-
const sSQL = `SELECT * FROM [
|
|
17558
|
+
const sSQL = `SELECT * FROM [__mj].[vwConversations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Conversations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17506
17559
|
const result = this.MapFieldNamesToCodeNames('Conversations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
17507
17560
|
return result;
|
|
17508
17561
|
}
|
|
17509
17562
|
async ConversationDetailsArray(conversation_, { dataSource, userPayload }, pubSub) {
|
|
17510
17563
|
this.CheckUserReadPermissions('Conversation Details', userPayload);
|
|
17511
|
-
const sSQL = `SELECT * FROM [
|
|
17564
|
+
const sSQL = `SELECT * FROM [__mj].[vwConversationDetails] WHERE [ConversationID]=${conversation_.ID} ` + this.getRowLevelSecurityWhereClause('Conversation Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17512
17565
|
const result = this.ArrayMapFieldNamesToCodeNames('Conversation Details', await dataSource.query(sSQL));
|
|
17513
17566
|
return result;
|
|
17514
17567
|
}
|
|
17515
17568
|
async ReportsArray(conversation_, { dataSource, userPayload }, pubSub) {
|
|
17516
17569
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
17517
|
-
const sSQL = `SELECT * FROM [
|
|
17570
|
+
const sSQL = `SELECT * FROM [__mj].[vwReports] WHERE [ConversationID]=${conversation_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17518
17571
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
17519
17572
|
return result;
|
|
17520
17573
|
}
|
|
@@ -17853,7 +17906,7 @@ let UserNotificationResolver = class UserNotificationResolver extends server_1.R
|
|
|
17853
17906
|
}
|
|
17854
17907
|
async UserNotification(ID, { dataSource, userPayload }, pubSub) {
|
|
17855
17908
|
this.CheckUserReadPermissions('User Notifications', userPayload);
|
|
17856
|
-
const sSQL = `SELECT * FROM [
|
|
17909
|
+
const sSQL = `SELECT * FROM [__mj].[vwUserNotifications] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Notifications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17857
17910
|
const result = this.MapFieldNamesToCodeNames('User Notifications', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
17858
17911
|
return result;
|
|
17859
17912
|
}
|
|
@@ -18089,7 +18142,7 @@ let SchemaInfoResolver = class SchemaInfoResolver extends server_1.ResolverBase
|
|
|
18089
18142
|
}
|
|
18090
18143
|
async SchemaInfo(ID, { dataSource, userPayload }, pubSub) {
|
|
18091
18144
|
this.CheckUserReadPermissions('Schema Info', userPayload);
|
|
18092
|
-
const sSQL = `SELECT * FROM [
|
|
18145
|
+
const sSQL = `SELECT * FROM [__mj].[vwSchemaInfos] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Schema Info', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
18093
18146
|
const result = this.MapFieldNamesToCodeNames('Schema Info', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
18094
18147
|
return result;
|
|
18095
18148
|
}
|
|
@@ -18228,6 +18281,11 @@ __decorate([
|
|
|
18228
18281
|
(0, class_validator_1.MaxLength)(8),
|
|
18229
18282
|
__metadata("design:type", Date)
|
|
18230
18283
|
], CompanyIntegrationRecordMap_.prototype, "UpdatedAt", void 0);
|
|
18284
|
+
__decorate([
|
|
18285
|
+
(0, server_1.Field)(),
|
|
18286
|
+
(0, class_validator_1.MaxLength)(510),
|
|
18287
|
+
__metadata("design:type", String)
|
|
18288
|
+
], CompanyIntegrationRecordMap_.prototype, "Entity", void 0);
|
|
18231
18289
|
exports.CompanyIntegrationRecordMap_ = CompanyIntegrationRecordMap_ = __decorate([
|
|
18232
18290
|
(0, server_1.ObjectType)()
|
|
18233
18291
|
], CompanyIntegrationRecordMap_);
|
|
@@ -18326,7 +18384,7 @@ let CompanyIntegrationRecordMapResolver = class CompanyIntegrationRecordMapResol
|
|
|
18326
18384
|
}
|
|
18327
18385
|
async CompanyIntegrationRecordMap(ID, { dataSource, userPayload }, pubSub) {
|
|
18328
18386
|
this.CheckUserReadPermissions('Company Integration Record Maps', userPayload);
|
|
18329
|
-
const sSQL = `SELECT * FROM [
|
|
18387
|
+
const sSQL = `SELECT * FROM [__mj].[vwCompanyIntegrationRecordMaps] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Record Maps', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
18330
18388
|
const result = this.MapFieldNamesToCodeNames('Company Integration Record Maps', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
18331
18389
|
return result;
|
|
18332
18390
|
}
|
|
@@ -18652,13 +18710,13 @@ let RecordMergeLogResolver = class RecordMergeLogResolver extends server_1.Resol
|
|
|
18652
18710
|
}
|
|
18653
18711
|
async RecordMergeLog(ID, { dataSource, userPayload }, pubSub) {
|
|
18654
18712
|
this.CheckUserReadPermissions('Record Merge Logs', userPayload);
|
|
18655
|
-
const sSQL = `SELECT * FROM [
|
|
18713
|
+
const sSQL = `SELECT * FROM [__mj].[vwRecordMergeLogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
18656
18714
|
const result = this.MapFieldNamesToCodeNames('Record Merge Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
18657
18715
|
return result;
|
|
18658
18716
|
}
|
|
18659
18717
|
async RecordMergeDeletionLogsArray(recordmergelog_, { dataSource, userPayload }, pubSub) {
|
|
18660
18718
|
this.CheckUserReadPermissions('Record Merge Deletion Logs', userPayload);
|
|
18661
|
-
const sSQL = `SELECT * FROM [
|
|
18719
|
+
const sSQL = `SELECT * FROM [__mj].[vwRecordMergeDeletionLogs] WHERE [RecordMergeLogID]=${recordmergelog_.ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Deletion Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
18662
18720
|
const result = this.ArrayMapFieldNamesToCodeNames('Record Merge Deletion Logs', await dataSource.query(sSQL));
|
|
18663
18721
|
return result;
|
|
18664
18722
|
}
|
|
@@ -18904,7 +18962,7 @@ let RecordMergeDeletionLogResolver = class RecordMergeDeletionLogResolver extend
|
|
|
18904
18962
|
}
|
|
18905
18963
|
async RecordMergeDeletionLog(ID, { dataSource, userPayload }, pubSub) {
|
|
18906
18964
|
this.CheckUserReadPermissions('Record Merge Deletion Logs', userPayload);
|
|
18907
|
-
const sSQL = `SELECT * FROM [
|
|
18965
|
+
const sSQL = `SELECT * FROM [__mj].[vwRecordMergeDeletionLogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Deletion Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
18908
18966
|
const result = this.MapFieldNamesToCodeNames('Record Merge Deletion Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
18909
18967
|
return result;
|
|
18910
18968
|
}
|
|
@@ -19082,6 +19140,11 @@ __decorate([
|
|
|
19082
19140
|
(0, class_validator_1.MaxLength)(510),
|
|
19083
19141
|
__metadata("design:type", String)
|
|
19084
19142
|
], QueryField_.prototype, "Query", void 0);
|
|
19143
|
+
__decorate([
|
|
19144
|
+
(0, server_1.Field)({ nullable: true }),
|
|
19145
|
+
(0, class_validator_1.MaxLength)(510),
|
|
19146
|
+
__metadata("design:type", String)
|
|
19147
|
+
], QueryField_.prototype, "SourceEntity", void 0);
|
|
19085
19148
|
exports.QueryField_ = QueryField_ = __decorate([
|
|
19086
19149
|
(0, server_1.ObjectType)()
|
|
19087
19150
|
], QueryField_);
|
|
@@ -19244,7 +19307,7 @@ let QueryFieldResolver = class QueryFieldResolver extends server_1.ResolverBase
|
|
|
19244
19307
|
}
|
|
19245
19308
|
async QueryField(ID, { dataSource, userPayload }, pubSub) {
|
|
19246
19309
|
this.CheckUserReadPermissions('Query Fields', userPayload);
|
|
19247
|
-
const sSQL = `SELECT * FROM [
|
|
19310
|
+
const sSQL = `SELECT * FROM [__mj].[vwQueryFields] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Query Fields', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19248
19311
|
const result = this.MapFieldNamesToCodeNames('Query Fields', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
19249
19312
|
return result;
|
|
19250
19313
|
}
|
|
@@ -19481,19 +19544,19 @@ let QueryCategoryResolver = class QueryCategoryResolver extends server_1.Resolve
|
|
|
19481
19544
|
}
|
|
19482
19545
|
async QueryCategory(ID, { dataSource, userPayload }, pubSub) {
|
|
19483
19546
|
this.CheckUserReadPermissions('Query Categories', userPayload);
|
|
19484
|
-
const sSQL = `SELECT * FROM [
|
|
19547
|
+
const sSQL = `SELECT * FROM [__mj].[vwQueryCategories] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Query Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19485
19548
|
const result = this.MapFieldNamesToCodeNames('Query Categories', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
19486
19549
|
return result;
|
|
19487
19550
|
}
|
|
19488
19551
|
async QueryCategoriesArray(querycategory_, { dataSource, userPayload }, pubSub) {
|
|
19489
19552
|
this.CheckUserReadPermissions('Query Categories', userPayload);
|
|
19490
|
-
const sSQL = `SELECT * FROM [
|
|
19553
|
+
const sSQL = `SELECT * FROM [__mj].[vwQueryCategories] WHERE [ParentID]=${querycategory_.ID} ` + this.getRowLevelSecurityWhereClause('Query Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19491
19554
|
const result = this.ArrayMapFieldNamesToCodeNames('Query Categories', await dataSource.query(sSQL));
|
|
19492
19555
|
return result;
|
|
19493
19556
|
}
|
|
19494
19557
|
async QueriesArray(querycategory_, { dataSource, userPayload }, pubSub) {
|
|
19495
19558
|
this.CheckUserReadPermissions('Queries', userPayload);
|
|
19496
|
-
const sSQL = `SELECT * FROM [
|
|
19559
|
+
const sSQL = `SELECT * FROM [__mj].[vwQueries] WHERE [CategoryID]=${querycategory_.ID} ` + this.getRowLevelSecurityWhereClause('Queries', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19497
19560
|
const result = this.ArrayMapFieldNamesToCodeNames('Queries', await dataSource.query(sSQL));
|
|
19498
19561
|
return result;
|
|
19499
19562
|
}
|
|
@@ -19813,25 +19876,25 @@ let QueryResolver = class QueryResolver extends server_1.ResolverBase {
|
|
|
19813
19876
|
}
|
|
19814
19877
|
async Query(ID, { dataSource, userPayload }, pubSub) {
|
|
19815
19878
|
this.CheckUserReadPermissions('Queries', userPayload);
|
|
19816
|
-
const sSQL = `SELECT * FROM [
|
|
19879
|
+
const sSQL = `SELECT * FROM [__mj].[vwQueries] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Queries', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19817
19880
|
const result = this.MapFieldNamesToCodeNames('Queries', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
19818
19881
|
return result;
|
|
19819
19882
|
}
|
|
19820
19883
|
async QueryFieldsArray(query_, { dataSource, userPayload }, pubSub) {
|
|
19821
19884
|
this.CheckUserReadPermissions('Query Fields', userPayload);
|
|
19822
|
-
const sSQL = `SELECT * FROM [
|
|
19885
|
+
const sSQL = `SELECT * FROM [__mj].[vwQueryFields] WHERE [QueryID]=${query_.ID} ` + this.getRowLevelSecurityWhereClause('Query Fields', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19823
19886
|
const result = this.ArrayMapFieldNamesToCodeNames('Query Fields', await dataSource.query(sSQL));
|
|
19824
19887
|
return result;
|
|
19825
19888
|
}
|
|
19826
19889
|
async QueryPermissionsArray(query_, { dataSource, userPayload }, pubSub) {
|
|
19827
19890
|
this.CheckUserReadPermissions('Query Permissions', userPayload);
|
|
19828
|
-
const sSQL = `SELECT * FROM [
|
|
19891
|
+
const sSQL = `SELECT * FROM [__mj].[vwQueryPermissions] WHERE [QueryID]=${query_.ID} ` + this.getRowLevelSecurityWhereClause('Query Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19829
19892
|
const result = this.ArrayMapFieldNamesToCodeNames('Query Permissions', await dataSource.query(sSQL));
|
|
19830
19893
|
return result;
|
|
19831
19894
|
}
|
|
19832
19895
|
async DataContextItemsArray(query_, { dataSource, userPayload }, pubSub) {
|
|
19833
19896
|
this.CheckUserReadPermissions('Data Context Items', userPayload);
|
|
19834
|
-
const sSQL = `SELECT * FROM [
|
|
19897
|
+
const sSQL = `SELECT * FROM [__mj].[vwDataContextItems] WHERE [QueryID]=${query_.ID} ` + this.getRowLevelSecurityWhereClause('Data Context Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19835
19898
|
const result = this.ArrayMapFieldNamesToCodeNames('Data Context Items', await dataSource.query(sSQL));
|
|
19836
19899
|
return result;
|
|
19837
19900
|
}
|
|
@@ -20070,7 +20133,7 @@ let QueryPermissionResolver = class QueryPermissionResolver extends server_1.Res
|
|
|
20070
20133
|
}
|
|
20071
20134
|
async QueryPermission(ID, { dataSource, userPayload }, pubSub) {
|
|
20072
20135
|
this.CheckUserReadPermissions('Query Permissions', userPayload);
|
|
20073
|
-
const sSQL = `SELECT * FROM [
|
|
20136
|
+
const sSQL = `SELECT * FROM [__mj].[vwQueryPermissions] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Query Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
20074
20137
|
const result = this.MapFieldNamesToCodeNames('Query Permissions', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
20075
20138
|
return result;
|
|
20076
20139
|
}
|
|
@@ -20316,7 +20379,7 @@ let VectorIndexResolver = class VectorIndexResolver extends server_1.ResolverBas
|
|
|
20316
20379
|
}
|
|
20317
20380
|
async VectorIndex(ID, { dataSource, userPayload }, pubSub) {
|
|
20318
20381
|
this.CheckUserReadPermissions('Vector Indexes', userPayload);
|
|
20319
|
-
const sSQL = `SELECT * FROM [
|
|
20382
|
+
const sSQL = `SELECT * FROM [__mj].[vwVectorIndexes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Vector Indexes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
20320
20383
|
const result = this.MapFieldNamesToCodeNames('Vector Indexes', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
20321
20384
|
return result;
|
|
20322
20385
|
}
|
|
@@ -20532,13 +20595,13 @@ let EntityDocumentTypeResolver = class EntityDocumentTypeResolver extends server
|
|
|
20532
20595
|
}
|
|
20533
20596
|
async EntityDocumentType(ID, { dataSource, userPayload }, pubSub) {
|
|
20534
20597
|
this.CheckUserReadPermissions('Entity Document Types', userPayload);
|
|
20535
|
-
const sSQL = `SELECT * FROM [
|
|
20598
|
+
const sSQL = `SELECT * FROM [__mj].[vwEntityDocumentTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Document Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
20536
20599
|
const result = this.MapFieldNamesToCodeNames('Entity Document Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
20537
20600
|
return result;
|
|
20538
20601
|
}
|
|
20539
20602
|
async EntityDocumentsArray(entitydocumenttype_, { dataSource, userPayload }, pubSub) {
|
|
20540
20603
|
this.CheckUserReadPermissions('Entity Documents', userPayload);
|
|
20541
|
-
const sSQL = `SELECT * FROM [
|
|
20604
|
+
const sSQL = `SELECT * FROM [__mj].[vwEntityDocuments] WHERE [TypeID]=${entitydocumenttype_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Documents', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
20542
20605
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Documents', await dataSource.query(sSQL));
|
|
20543
20606
|
return result;
|
|
20544
20607
|
}
|
|
@@ -20790,7 +20853,7 @@ let EntityDocumentRunResolver = class EntityDocumentRunResolver extends server_1
|
|
|
20790
20853
|
}
|
|
20791
20854
|
async EntityDocumentRun(ID, { dataSource, userPayload }, pubSub) {
|
|
20792
20855
|
this.CheckUserReadPermissions('Entity Document Runs', userPayload);
|
|
20793
|
-
const sSQL = `SELECT * FROM [
|
|
20856
|
+
const sSQL = `SELECT * FROM [__mj].[vwEntityDocumentRuns] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Document Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
20794
20857
|
const result = this.MapFieldNamesToCodeNames('Entity Document Runs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
20795
20858
|
return result;
|
|
20796
20859
|
}
|
|
@@ -21032,13 +21095,13 @@ let VectorDatabaseResolver = class VectorDatabaseResolver extends server_1.Resol
|
|
|
21032
21095
|
}
|
|
21033
21096
|
async VectorDatabase(ID, { dataSource, userPayload }, pubSub) {
|
|
21034
21097
|
this.CheckUserReadPermissions('Vector Databases', userPayload);
|
|
21035
|
-
const sSQL = `SELECT * FROM [
|
|
21098
|
+
const sSQL = `SELECT * FROM [__mj].[vwVectorDatabases] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Vector Databases', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
21036
21099
|
const result = this.MapFieldNamesToCodeNames('Vector Databases', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
21037
21100
|
return result;
|
|
21038
21101
|
}
|
|
21039
21102
|
async VectorIndexesArray(vectordatabase_, { dataSource, userPayload }, pubSub) {
|
|
21040
21103
|
this.CheckUserReadPermissions('Vector Indexes', userPayload);
|
|
21041
|
-
const sSQL = `SELECT * FROM [
|
|
21104
|
+
const sSQL = `SELECT * FROM [__mj].[vwVectorIndexes] WHERE [VectorDatabaseID]=${vectordatabase_.ID} ` + this.getRowLevelSecurityWhereClause('Vector Indexes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
21042
21105
|
const result = this.ArrayMapFieldNamesToCodeNames('Vector Indexes', await dataSource.query(sSQL));
|
|
21043
21106
|
return result;
|
|
21044
21107
|
}
|
|
@@ -21321,7 +21384,7 @@ let EntityRecordDocumentResolver = class EntityRecordDocumentResolver extends se
|
|
|
21321
21384
|
}
|
|
21322
21385
|
async EntityRecordDocument(ID, { dataSource, userPayload }, pubSub) {
|
|
21323
21386
|
this.CheckUserReadPermissions('Entity Record Documents', userPayload);
|
|
21324
|
-
const sSQL = `SELECT * FROM [
|
|
21387
|
+
const sSQL = `SELECT * FROM [__mj].[vwEntityRecordDocuments] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Record Documents', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
21325
21388
|
const result = this.MapFieldNamesToCodeNames('Entity Record Documents', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
21326
21389
|
return result;
|
|
21327
21390
|
}
|
|
@@ -21464,6 +21527,11 @@ __decorate([
|
|
|
21464
21527
|
(0, class_validator_1.MaxLength)(8),
|
|
21465
21528
|
__metadata("design:type", Date)
|
|
21466
21529
|
], EntityDocument_.prototype, "UpdatedAt", void 0);
|
|
21530
|
+
__decorate([
|
|
21531
|
+
(0, server_1.Field)(),
|
|
21532
|
+
(0, class_validator_1.MaxLength)(510),
|
|
21533
|
+
__metadata("design:type", String)
|
|
21534
|
+
], EntityDocument_.prototype, "Entity", void 0);
|
|
21467
21535
|
__decorate([
|
|
21468
21536
|
(0, server_1.Field)(),
|
|
21469
21537
|
(0, class_validator_1.MaxLength)(200),
|
|
@@ -21579,13 +21647,13 @@ let EntityDocumentResolver = class EntityDocumentResolver extends server_1.Resol
|
|
|
21579
21647
|
}
|
|
21580
21648
|
async EntityDocument(ID, { dataSource, userPayload }, pubSub) {
|
|
21581
21649
|
this.CheckUserReadPermissions('Entity Documents', userPayload);
|
|
21582
|
-
const sSQL = `SELECT * FROM [
|
|
21650
|
+
const sSQL = `SELECT * FROM [__mj].[vwEntityDocuments] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Documents', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
21583
21651
|
const result = this.MapFieldNamesToCodeNames('Entity Documents', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
21584
21652
|
return result;
|
|
21585
21653
|
}
|
|
21586
21654
|
async EntityDocumentRunsArray(entitydocument_, { dataSource, userPayload }, pubSub) {
|
|
21587
21655
|
this.CheckUserReadPermissions('Entity Document Runs', userPayload);
|
|
21588
|
-
const sSQL = `SELECT * FROM [
|
|
21656
|
+
const sSQL = `SELECT * FROM [__mj].[vwEntityDocumentRuns] WHERE [EntityDocumentID]=${entitydocument_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Document Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
21589
21657
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Document Runs', await dataSource.query(sSQL));
|
|
21590
21658
|
return result;
|
|
21591
21659
|
}
|
|
@@ -21769,6 +21837,11 @@ __decorate([
|
|
|
21769
21837
|
(0, class_validator_1.MaxLength)(510),
|
|
21770
21838
|
__metadata("design:type", String)
|
|
21771
21839
|
], DataContextItem_.prototype, "Query", void 0);
|
|
21840
|
+
__decorate([
|
|
21841
|
+
(0, server_1.Field)({ nullable: true }),
|
|
21842
|
+
(0, class_validator_1.MaxLength)(510),
|
|
21843
|
+
__metadata("design:type", String)
|
|
21844
|
+
], DataContextItem_.prototype, "Entity", void 0);
|
|
21772
21845
|
exports.DataContextItem_ = DataContextItem_ = __decorate([
|
|
21773
21846
|
(0, server_1.ObjectType)({ description: 'Data Context Items store information about each item within a Data Context. Each item stores a link to a view, query, or raw sql statement and can optionally cache the JSON representing the last run of that data object as well.' })
|
|
21774
21847
|
], DataContextItem_);
|
|
@@ -21907,7 +21980,7 @@ let DataContextItemResolver = class DataContextItemResolver extends server_1.Res
|
|
|
21907
21980
|
}
|
|
21908
21981
|
async DataContextItem(ID, { dataSource, userPayload }, pubSub) {
|
|
21909
21982
|
this.CheckUserReadPermissions('Data Context Items', userPayload);
|
|
21910
|
-
const sSQL = `SELECT * FROM [
|
|
21983
|
+
const sSQL = `SELECT * FROM [__mj].[vwDataContextItems] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Data Context Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
21911
21984
|
const result = this.MapFieldNamesToCodeNames('Data Context Items', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
21912
21985
|
return result;
|
|
21913
21986
|
}
|
|
@@ -22157,19 +22230,19 @@ let DataContextResolver = class DataContextResolver extends server_1.ResolverBas
|
|
|
22157
22230
|
}
|
|
22158
22231
|
async DataContext(ID, { dataSource, userPayload }, pubSub) {
|
|
22159
22232
|
this.CheckUserReadPermissions('Data Contexts', userPayload);
|
|
22160
|
-
const sSQL = `SELECT * FROM [
|
|
22233
|
+
const sSQL = `SELECT * FROM [__mj].[vwDataContexts] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Data Contexts', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22161
22234
|
const result = this.MapFieldNamesToCodeNames('Data Contexts', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
22162
22235
|
return result;
|
|
22163
22236
|
}
|
|
22164
22237
|
async DataContextItemsArray(datacontext_, { dataSource, userPayload }, pubSub) {
|
|
22165
22238
|
this.CheckUserReadPermissions('Data Context Items', userPayload);
|
|
22166
|
-
const sSQL = `SELECT * FROM [
|
|
22239
|
+
const sSQL = `SELECT * FROM [__mj].[vwDataContextItems] WHERE [DataContextID]=${datacontext_.ID} ` + this.getRowLevelSecurityWhereClause('Data Context Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22167
22240
|
const result = this.ArrayMapFieldNamesToCodeNames('Data Context Items', await dataSource.query(sSQL));
|
|
22168
22241
|
return result;
|
|
22169
22242
|
}
|
|
22170
22243
|
async ReportsArray(datacontext_, { dataSource, userPayload }, pubSub) {
|
|
22171
22244
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
22172
|
-
const sSQL = `SELECT * FROM [
|
|
22245
|
+
const sSQL = `SELECT * FROM [__mj].[vwReports] WHERE [DataContextID]=${datacontext_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22173
22246
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
22174
22247
|
return result;
|
|
22175
22248
|
}
|
|
@@ -22424,19 +22497,19 @@ let UserViewCategoryResolver = class UserViewCategoryResolver extends server_1.R
|
|
|
22424
22497
|
}
|
|
22425
22498
|
async UserViewCategory(ID, { dataSource, userPayload }, pubSub) {
|
|
22426
22499
|
this.CheckUserReadPermissions('User View Categories', userPayload);
|
|
22427
|
-
const sSQL = `SELECT * FROM [
|
|
22500
|
+
const sSQL = `SELECT * FROM [__mj].[vwUserViewCategories] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User View Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22428
22501
|
const result = this.MapFieldNamesToCodeNames('User View Categories', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
22429
22502
|
return result;
|
|
22430
22503
|
}
|
|
22431
22504
|
async UserViewCategoriesArray(userviewcategory_, { dataSource, userPayload }, pubSub) {
|
|
22432
22505
|
this.CheckUserReadPermissions('User View Categories', userPayload);
|
|
22433
|
-
const sSQL = `SELECT * FROM [
|
|
22506
|
+
const sSQL = `SELECT * FROM [__mj].[vwUserViewCategories] WHERE [ParentID]=${userviewcategory_.ID} ` + this.getRowLevelSecurityWhereClause('User View Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22434
22507
|
const result = this.ArrayMapFieldNamesToCodeNames('User View Categories', await dataSource.query(sSQL));
|
|
22435
22508
|
return result;
|
|
22436
22509
|
}
|
|
22437
22510
|
async UserViewsArray(userviewcategory_, { dataSource, userPayload }, pubSub) {
|
|
22438
22511
|
this.CheckUserReadPermissions('User Views', userPayload);
|
|
22439
|
-
const sSQL = `SELECT * FROM [
|
|
22512
|
+
const sSQL = `SELECT * FROM [__mj].[vwUserViews] WHERE [CategoryID]=${userviewcategory_.ID} ` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22440
22513
|
const result = this.ArrayMapFieldNamesToCodeNames('User Views', await dataSource.query(sSQL));
|
|
22441
22514
|
return result;
|
|
22442
22515
|
}
|
|
@@ -22695,19 +22768,19 @@ let DashboardCategoryResolver = class DashboardCategoryResolver extends server_1
|
|
|
22695
22768
|
}
|
|
22696
22769
|
async DashboardCategory(ID, { dataSource, userPayload }, pubSub) {
|
|
22697
22770
|
this.CheckUserReadPermissions('Dashboard Categories', userPayload);
|
|
22698
|
-
const sSQL = `SELECT * FROM [
|
|
22771
|
+
const sSQL = `SELECT * FROM [__mj].[vwDashboardCategories] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Dashboard Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22699
22772
|
const result = this.MapFieldNamesToCodeNames('Dashboard Categories', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
22700
22773
|
return result;
|
|
22701
22774
|
}
|
|
22702
22775
|
async DashboardsArray(dashboardcategory_, { dataSource, userPayload }, pubSub) {
|
|
22703
22776
|
this.CheckUserReadPermissions('Dashboards', userPayload);
|
|
22704
|
-
const sSQL = `SELECT * FROM [
|
|
22777
|
+
const sSQL = `SELECT * FROM [__mj].[vwDashboards] WHERE [CategoryID]=${dashboardcategory_.ID} ` + this.getRowLevelSecurityWhereClause('Dashboards', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22705
22778
|
const result = this.ArrayMapFieldNamesToCodeNames('Dashboards', await dataSource.query(sSQL));
|
|
22706
22779
|
return result;
|
|
22707
22780
|
}
|
|
22708
22781
|
async DashboardCategoriesArray(dashboardcategory_, { dataSource, userPayload }, pubSub) {
|
|
22709
22782
|
this.CheckUserReadPermissions('Dashboard Categories', userPayload);
|
|
22710
|
-
const sSQL = `SELECT * FROM [
|
|
22783
|
+
const sSQL = `SELECT * FROM [__mj].[vwDashboardCategories] WHERE [ParentID]=${dashboardcategory_.ID} ` + this.getRowLevelSecurityWhereClause('Dashboard Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22711
22784
|
const result = this.ArrayMapFieldNamesToCodeNames('Dashboard Categories', await dataSource.query(sSQL));
|
|
22712
22785
|
return result;
|
|
22713
22786
|
}
|
|
@@ -22962,19 +23035,19 @@ let ReportCategoryResolver = class ReportCategoryResolver extends server_1.Resol
|
|
|
22962
23035
|
}
|
|
22963
23036
|
async ReportCategory(ID, { dataSource, userPayload }, pubSub) {
|
|
22964
23037
|
this.CheckUserReadPermissions('Report Categories', userPayload);
|
|
22965
|
-
const sSQL = `SELECT * FROM [
|
|
23038
|
+
const sSQL = `SELECT * FROM [__mj].[vwReportCategories] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Report Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22966
23039
|
const result = this.MapFieldNamesToCodeNames('Report Categories', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
22967
23040
|
return result;
|
|
22968
23041
|
}
|
|
22969
23042
|
async ReportCategoriesArray(reportcategory_, { dataSource, userPayload }, pubSub) {
|
|
22970
23043
|
this.CheckUserReadPermissions('Report Categories', userPayload);
|
|
22971
|
-
const sSQL = `SELECT * FROM [
|
|
23044
|
+
const sSQL = `SELECT * FROM [__mj].[vwReportCategories] WHERE [ParentID]=${reportcategory_.ID} ` + this.getRowLevelSecurityWhereClause('Report Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22972
23045
|
const result = this.ArrayMapFieldNamesToCodeNames('Report Categories', await dataSource.query(sSQL));
|
|
22973
23046
|
return result;
|
|
22974
23047
|
}
|
|
22975
23048
|
async ReportsArray(reportcategory_, { dataSource, userPayload }, pubSub) {
|
|
22976
23049
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
22977
|
-
const sSQL = `SELECT * FROM [
|
|
23050
|
+
const sSQL = `SELECT * FROM [__mj].[vwReports] WHERE [CategoryID]=${reportcategory_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22978
23051
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
22979
23052
|
return result;
|
|
22980
23053
|
}
|