@memberjunction/server 0.9.221 → 0.9.223
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/build.log.json +3 -0
- package/dist/generated/generated.js +305 -231
- package/dist/generated/generated.js.map +1 -1
- package/dist/resolvers/MergeRecordsResolver.js +3 -3
- package/dist/resolvers/MergeRecordsResolver.js.map +1 -1
- package/package.json +1 -1
- package/src/generated/generated.ts +283 -232
- package/src/resolvers/MergeRecordsResolver.ts +2 -2
|
@@ -46,6 +46,7 @@ exports.ReportCategoryResolver = exports.RunReportCategoryViewResult = exports.U
|
|
|
46
46
|
const server_1 = require("@memberjunction/server");
|
|
47
47
|
const core_1 = require("@memberjunction/core");
|
|
48
48
|
const class_validator_1 = require("class-validator");
|
|
49
|
+
const config_1 = require("../config");
|
|
49
50
|
const mj_core_schema_server_object_types = __importStar(require("@memberjunction/server"));
|
|
50
51
|
let Company_ = class Company_ {
|
|
51
52
|
};
|
|
@@ -207,31 +208,31 @@ let CompanyResolver = class CompanyResolver extends server_1.ResolverBase {
|
|
|
207
208
|
}
|
|
208
209
|
async Company(ID, { dataSource, userPayload }, pubSub) {
|
|
209
210
|
this.CheckUserReadPermissions('Companies', userPayload);
|
|
210
|
-
const sSQL = `SELECT * FROM [
|
|
211
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanies] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Companies', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
211
212
|
const result = this.MapFieldNamesToCodeNames('Companies', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
212
213
|
return result;
|
|
213
214
|
}
|
|
214
215
|
async AllCompanies({ dataSource, userPayload }, pubSub) {
|
|
215
216
|
this.CheckUserReadPermissions('Companies', userPayload);
|
|
216
|
-
const sSQL =
|
|
217
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanies]` + this.getRowLevelSecurityWhereClause('Companies', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
217
218
|
const result = this.ArrayMapFieldNamesToCodeNames('Companies', await dataSource.query(sSQL));
|
|
218
219
|
return result;
|
|
219
220
|
}
|
|
220
221
|
async EmployeesArray(company_, { dataSource, userPayload }, pubSub) {
|
|
221
222
|
this.CheckUserReadPermissions('Employees', userPayload);
|
|
222
|
-
const sSQL = `SELECT * FROM [
|
|
223
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEmployees] WHERE [CompanyID]=${company_.ID} ` + this.getRowLevelSecurityWhereClause('Employees', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
223
224
|
const result = this.ArrayMapFieldNamesToCodeNames('Employees', await dataSource.query(sSQL));
|
|
224
225
|
return result;
|
|
225
226
|
}
|
|
226
227
|
async CompanyIntegrationsArray(company_, { dataSource, userPayload }, pubSub) {
|
|
227
228
|
this.CheckUserReadPermissions('Company Integrations', userPayload);
|
|
228
|
-
const sSQL = `SELECT * FROM [
|
|
229
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanyIntegrations] WHERE [CompanyName]=${company_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
229
230
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integrations', await dataSource.query(sSQL));
|
|
230
231
|
return result;
|
|
231
232
|
}
|
|
232
233
|
async WorkflowsArray(company_, { dataSource, userPayload }, pubSub) {
|
|
233
234
|
this.CheckUserReadPermissions('Workflows', userPayload);
|
|
234
|
-
const sSQL = `SELECT * FROM [
|
|
235
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwWorkflows] WHERE [CompanyName]=${company_.ID} ` + this.getRowLevelSecurityWhereClause('Workflows', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
235
236
|
const result = this.ArrayMapFieldNamesToCodeNames('Workflows', await dataSource.query(sSQL));
|
|
236
237
|
return result;
|
|
237
238
|
}
|
|
@@ -632,37 +633,37 @@ let EmployeeResolver = class EmployeeResolver extends server_1.ResolverBase {
|
|
|
632
633
|
}
|
|
633
634
|
async Employee(ID, { dataSource, userPayload }, pubSub) {
|
|
634
635
|
this.CheckUserReadPermissions('Employees', userPayload);
|
|
635
|
-
const sSQL = `SELECT * FROM [
|
|
636
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEmployees] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Employees', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
636
637
|
const result = this.MapFieldNamesToCodeNames('Employees', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
637
638
|
return result;
|
|
638
639
|
}
|
|
639
640
|
async AllEmployees({ dataSource, userPayload }, pubSub) {
|
|
640
641
|
this.CheckUserReadPermissions('Employees', userPayload);
|
|
641
|
-
const sSQL =
|
|
642
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEmployees]` + this.getRowLevelSecurityWhereClause('Employees', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
642
643
|
const result = this.ArrayMapFieldNamesToCodeNames('Employees', await dataSource.query(sSQL));
|
|
643
644
|
return result;
|
|
644
645
|
}
|
|
645
646
|
async EmployeesArray(employee_, { dataSource, userPayload }, pubSub) {
|
|
646
647
|
this.CheckUserReadPermissions('Employees', userPayload);
|
|
647
|
-
const sSQL = `SELECT * FROM [
|
|
648
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEmployees] WHERE [SupervisorID]=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employees', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
648
649
|
const result = this.ArrayMapFieldNamesToCodeNames('Employees', await dataSource.query(sSQL));
|
|
649
650
|
return result;
|
|
650
651
|
}
|
|
651
652
|
async EmployeeCompanyIntegrationsArray(employee_, { dataSource, userPayload }, pubSub) {
|
|
652
653
|
this.CheckUserReadPermissions('Employee Company Integrations', userPayload);
|
|
653
|
-
const sSQL = `SELECT * FROM [
|
|
654
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEmployeeCompanyIntegrations] WHERE [EmployeeID]=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
654
655
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Company Integrations', await dataSource.query(sSQL));
|
|
655
656
|
return result;
|
|
656
657
|
}
|
|
657
658
|
async EmployeeRolesArray(employee_, { dataSource, userPayload }, pubSub) {
|
|
658
659
|
this.CheckUserReadPermissions('Employee Roles', userPayload);
|
|
659
|
-
const sSQL = `SELECT * FROM [
|
|
660
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEmployeeRoles] WHERE [EmployeeID]=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
660
661
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Roles', await dataSource.query(sSQL));
|
|
661
662
|
return result;
|
|
662
663
|
}
|
|
663
664
|
async EmployeeSkillsArray(employee_, { dataSource, userPayload }, pubSub) {
|
|
664
665
|
this.CheckUserReadPermissions('Employee Skills', userPayload);
|
|
665
|
-
const sSQL = `SELECT * FROM [
|
|
666
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEmployeeSkills] WHERE [EmployeeID]=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
666
667
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Skills', await dataSource.query(sSQL));
|
|
667
668
|
return result;
|
|
668
669
|
}
|
|
@@ -977,7 +978,7 @@ let UserFavoriteResolverBase = class UserFavoriteResolverBase extends server_1.R
|
|
|
977
978
|
}
|
|
978
979
|
async UserFavorite(ID, { dataSource, userPayload }, pubSub) {
|
|
979
980
|
this.CheckUserReadPermissions('User Favorites', userPayload);
|
|
980
|
-
const sSQL = `SELECT * FROM [
|
|
981
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserFavorites] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Favorites', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
981
982
|
const result = this.MapFieldNamesToCodeNames('User Favorites', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
982
983
|
return result;
|
|
983
984
|
}
|
|
@@ -1222,7 +1223,7 @@ let EmployeeCompanyIntegrationResolver = class EmployeeCompanyIntegrationResolve
|
|
|
1222
1223
|
}
|
|
1223
1224
|
async EmployeeCompanyIntegration(ID, { dataSource, userPayload }, pubSub) {
|
|
1224
1225
|
this.CheckUserReadPermissions('Employee Company Integrations', userPayload);
|
|
1225
|
-
const sSQL = `SELECT * FROM [
|
|
1226
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEmployeeCompanyIntegrations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Employee Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1226
1227
|
const result = this.MapFieldNamesToCodeNames('Employee Company Integrations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
1227
1228
|
return result;
|
|
1228
1229
|
}
|
|
@@ -1395,7 +1396,7 @@ let EmployeeRoleResolver = class EmployeeRoleResolver extends server_1.ResolverB
|
|
|
1395
1396
|
}
|
|
1396
1397
|
async EmployeeRole(ID, { dataSource, userPayload }, pubSub) {
|
|
1397
1398
|
this.CheckUserReadPermissions('Employee Roles', userPayload);
|
|
1398
|
-
const sSQL = `SELECT * FROM [
|
|
1399
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEmployeeRoles] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Employee Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1399
1400
|
const result = this.MapFieldNamesToCodeNames('Employee Roles', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
1400
1401
|
return result;
|
|
1401
1402
|
}
|
|
@@ -1569,7 +1570,7 @@ let EmployeeSkillResolver = class EmployeeSkillResolver extends server_1.Resolve
|
|
|
1569
1570
|
}
|
|
1570
1571
|
async EmployeeSkill(ID, { dataSource, userPayload }, pubSub) {
|
|
1571
1572
|
this.CheckUserReadPermissions('Employee Skills', userPayload);
|
|
1572
|
-
const sSQL = `SELECT * FROM [
|
|
1573
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEmployeeSkills] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Employee Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1573
1574
|
const result = this.MapFieldNamesToCodeNames('Employee Skills', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
1574
1575
|
return result;
|
|
1575
1576
|
}
|
|
@@ -1778,43 +1779,43 @@ let RoleResolver = class RoleResolver extends server_1.ResolverBase {
|
|
|
1778
1779
|
}
|
|
1779
1780
|
async Role(ID, { dataSource, userPayload }, pubSub) {
|
|
1780
1781
|
this.CheckUserReadPermissions('Roles', userPayload);
|
|
1781
|
-
const sSQL = `SELECT * FROM [
|
|
1782
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwRoles] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1782
1783
|
const result = this.MapFieldNamesToCodeNames('Roles', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
1783
1784
|
return result;
|
|
1784
1785
|
}
|
|
1785
1786
|
async AllRoles({ dataSource, userPayload }, pubSub) {
|
|
1786
1787
|
this.CheckUserReadPermissions('Roles', userPayload);
|
|
1787
|
-
const sSQL =
|
|
1788
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwRoles]` + this.getRowLevelSecurityWhereClause('Roles', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
1788
1789
|
const result = this.ArrayMapFieldNamesToCodeNames('Roles', await dataSource.query(sSQL));
|
|
1789
1790
|
return result;
|
|
1790
1791
|
}
|
|
1791
1792
|
async EmployeeRolesArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1792
1793
|
this.CheckUserReadPermissions('Employee Roles', userPayload);
|
|
1793
|
-
const sSQL = `SELECT * FROM [
|
|
1794
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEmployeeRoles] WHERE [RoleID]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1794
1795
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Roles', await dataSource.query(sSQL));
|
|
1795
1796
|
return result;
|
|
1796
1797
|
}
|
|
1797
1798
|
async EntityPermissionsArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1798
1799
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
1799
|
-
const sSQL = `SELECT * FROM [
|
|
1800
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityPermissions] WHERE [RoleName]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1800
1801
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL));
|
|
1801
1802
|
return result;
|
|
1802
1803
|
}
|
|
1803
1804
|
async UserRolesArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1804
1805
|
this.CheckUserReadPermissions('User Roles', userPayload);
|
|
1805
|
-
const sSQL = `SELECT * FROM [
|
|
1806
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserRoles] WHERE [RoleName]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('User Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1806
1807
|
const result = this.ArrayMapFieldNamesToCodeNames('User Roles', await dataSource.query(sSQL));
|
|
1807
1808
|
return result;
|
|
1808
1809
|
}
|
|
1809
1810
|
async AuthorizationRolesArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1810
1811
|
this.CheckUserReadPermissions('Authorization Roles', userPayload);
|
|
1811
|
-
const sSQL = `SELECT * FROM [
|
|
1812
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuthorizationRoles] WHERE [RoleName]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('Authorization Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1812
1813
|
const result = this.ArrayMapFieldNamesToCodeNames('Authorization Roles', await dataSource.query(sSQL));
|
|
1813
1814
|
return result;
|
|
1814
1815
|
}
|
|
1815
1816
|
async QueryPermissionsArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1816
1817
|
this.CheckUserReadPermissions('Query Permissions', userPayload);
|
|
1817
|
-
const sSQL = `SELECT * FROM [
|
|
1818
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwQueryPermissions] WHERE [RoleName]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('Query Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1818
1819
|
const result = this.ArrayMapFieldNamesToCodeNames('Query Permissions', await dataSource.query(sSQL));
|
|
1819
1820
|
return result;
|
|
1820
1821
|
}
|
|
@@ -2031,25 +2032,25 @@ let SkillResolver = class SkillResolver extends server_1.ResolverBase {
|
|
|
2031
2032
|
}
|
|
2032
2033
|
async Skill(ID, { dataSource, userPayload }, pubSub) {
|
|
2033
2034
|
this.CheckUserReadPermissions('Skills', userPayload);
|
|
2034
|
-
const sSQL = `SELECT * FROM [
|
|
2035
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwSkills] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2035
2036
|
const result = this.MapFieldNamesToCodeNames('Skills', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
2036
2037
|
return result;
|
|
2037
2038
|
}
|
|
2038
2039
|
async AllSkills({ dataSource, userPayload }, pubSub) {
|
|
2039
2040
|
this.CheckUserReadPermissions('Skills', userPayload);
|
|
2040
|
-
const sSQL =
|
|
2041
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwSkills]` + this.getRowLevelSecurityWhereClause('Skills', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
2041
2042
|
const result = this.ArrayMapFieldNamesToCodeNames('Skills', await dataSource.query(sSQL));
|
|
2042
2043
|
return result;
|
|
2043
2044
|
}
|
|
2044
2045
|
async EmployeeSkillsArray(skill_, { dataSource, userPayload }, pubSub) {
|
|
2045
2046
|
this.CheckUserReadPermissions('Employee Skills', userPayload);
|
|
2046
|
-
const sSQL = `SELECT * FROM [
|
|
2047
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEmployeeSkills] WHERE [SkillID]=${skill_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2047
2048
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Skills', await dataSource.query(sSQL));
|
|
2048
2049
|
return result;
|
|
2049
2050
|
}
|
|
2050
2051
|
async SkillsArray(skill_, { dataSource, userPayload }, pubSub) {
|
|
2051
2052
|
this.CheckUserReadPermissions('Skills', userPayload);
|
|
2052
|
-
const sSQL = `SELECT * FROM [
|
|
2053
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwSkills] WHERE [ParentID]=${skill_.ID} ` + this.getRowLevelSecurityWhereClause('Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2053
2054
|
const result = this.ArrayMapFieldNamesToCodeNames('Skills', await dataSource.query(sSQL));
|
|
2054
2055
|
return result;
|
|
2055
2056
|
}
|
|
@@ -2232,13 +2233,13 @@ let IntegrationURLFormatResolver = class IntegrationURLFormatResolver extends se
|
|
|
2232
2233
|
}
|
|
2233
2234
|
async IntegrationURLFormat(ID, { dataSource, userPayload }, pubSub) {
|
|
2234
2235
|
this.CheckUserReadPermissions('Integration URL Formats', userPayload);
|
|
2235
|
-
const sSQL = `SELECT * FROM [
|
|
2236
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwIntegrationURLFormats] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Integration URL Formats', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2236
2237
|
const result = this.MapFieldNamesToCodeNames('Integration URL Formats', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
2237
2238
|
return result;
|
|
2238
2239
|
}
|
|
2239
2240
|
async AllIntegrationURLFormats({ dataSource, userPayload }, pubSub) {
|
|
2240
2241
|
this.CheckUserReadPermissions('Integration URL Formats', userPayload);
|
|
2241
|
-
const sSQL =
|
|
2242
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwIntegrationURLFormats]` + this.getRowLevelSecurityWhereClause('Integration URL Formats', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
2242
2243
|
const result = this.ArrayMapFieldNamesToCodeNames('Integration URL Formats', await dataSource.query(sSQL));
|
|
2243
2244
|
return result;
|
|
2244
2245
|
}
|
|
@@ -2467,25 +2468,25 @@ let IntegrationResolver = class IntegrationResolver extends server_1.ResolverBas
|
|
|
2467
2468
|
}
|
|
2468
2469
|
async Integration(ID, { dataSource, userPayload }, pubSub) {
|
|
2469
2470
|
this.CheckUserReadPermissions('Integrations', userPayload);
|
|
2470
|
-
const sSQL = `SELECT * FROM [
|
|
2471
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwIntegrations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2471
2472
|
const result = this.MapFieldNamesToCodeNames('Integrations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
2472
2473
|
return result;
|
|
2473
2474
|
}
|
|
2474
2475
|
async AllIntegrations({ dataSource, userPayload }, pubSub) {
|
|
2475
2476
|
this.CheckUserReadPermissions('Integrations', userPayload);
|
|
2476
|
-
const sSQL =
|
|
2477
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwIntegrations]` + this.getRowLevelSecurityWhereClause('Integrations', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
2477
2478
|
const result = this.ArrayMapFieldNamesToCodeNames('Integrations', await dataSource.query(sSQL));
|
|
2478
2479
|
return result;
|
|
2479
2480
|
}
|
|
2480
2481
|
async IntegrationURLFormatsArray(integration_, { dataSource, userPayload }, pubSub) {
|
|
2481
2482
|
this.CheckUserReadPermissions('Integration URL Formats', userPayload);
|
|
2482
|
-
const sSQL = `SELECT * FROM [
|
|
2483
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwIntegrationURLFormats] WHERE [IntegrationID]=${integration_.ID} ` + this.getRowLevelSecurityWhereClause('Integration URL Formats', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2483
2484
|
const result = this.ArrayMapFieldNamesToCodeNames('Integration URL Formats', await dataSource.query(sSQL));
|
|
2484
2485
|
return result;
|
|
2485
2486
|
}
|
|
2486
2487
|
async CompanyIntegrationsArray(integration_, { dataSource, userPayload }, pubSub) {
|
|
2487
2488
|
this.CheckUserReadPermissions('Company Integrations', userPayload);
|
|
2488
|
-
const sSQL = `SELECT * FROM [
|
|
2489
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanyIntegrations] WHERE [IntegrationName]=${integration_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2489
2490
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integrations', await dataSource.query(sSQL));
|
|
2490
2491
|
return result;
|
|
2491
2492
|
}
|
|
@@ -2827,31 +2828,31 @@ let CompanyIntegrationResolver = class CompanyIntegrationResolver extends server
|
|
|
2827
2828
|
}
|
|
2828
2829
|
async CompanyIntegration(ID, { dataSource, userPayload }, pubSub) {
|
|
2829
2830
|
this.CheckUserReadPermissions('Company Integrations', userPayload);
|
|
2830
|
-
const sSQL = `SELECT * FROM [
|
|
2831
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanyIntegrations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2831
2832
|
const result = this.MapFieldNamesToCodeNames('Company Integrations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
2832
2833
|
return result;
|
|
2833
2834
|
}
|
|
2834
2835
|
async ListsArray(companyintegration_, { dataSource, userPayload }, pubSub) {
|
|
2835
2836
|
this.CheckUserReadPermissions('Lists', userPayload);
|
|
2836
|
-
const sSQL = `SELECT * FROM [
|
|
2837
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwLists] WHERE [CompanyIntegrationID]=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Lists', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2837
2838
|
const result = this.ArrayMapFieldNamesToCodeNames('Lists', await dataSource.query(sSQL));
|
|
2838
2839
|
return result;
|
|
2839
2840
|
}
|
|
2840
2841
|
async EmployeeCompanyIntegrationsArray(companyintegration_, { dataSource, userPayload }, pubSub) {
|
|
2841
2842
|
this.CheckUserReadPermissions('Employee Company Integrations', userPayload);
|
|
2842
|
-
const sSQL = `SELECT * FROM [
|
|
2843
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEmployeeCompanyIntegrations] WHERE [CompanyIntegrationID]=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2843
2844
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Company Integrations', await dataSource.query(sSQL));
|
|
2844
2845
|
return result;
|
|
2845
2846
|
}
|
|
2846
2847
|
async CompanyIntegrationRunsArray(companyintegration_, { dataSource, userPayload }, pubSub) {
|
|
2847
2848
|
this.CheckUserReadPermissions('Company Integration Runs', userPayload);
|
|
2848
|
-
const sSQL = `SELECT * FROM [
|
|
2849
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanyIntegrationRuns] WHERE [CompanyIntegrationID]=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2849
2850
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Runs', await dataSource.query(sSQL));
|
|
2850
2851
|
return result;
|
|
2851
2852
|
}
|
|
2852
2853
|
async CompanyIntegrationRecordMapsArray(companyintegration_, { dataSource, userPayload }, pubSub) {
|
|
2853
2854
|
this.CheckUserReadPermissions('Company Integration Record Maps', userPayload);
|
|
2854
|
-
const sSQL = `SELECT * FROM [
|
|
2855
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanyIntegrationRecordMaps] WHERE [CompanyIntegrationID]=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Record Maps', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2855
2856
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Record Maps', await dataSource.query(sSQL));
|
|
2856
2857
|
return result;
|
|
2857
2858
|
}
|
|
@@ -3440,19 +3441,19 @@ let EntityFieldResolver = class EntityFieldResolver extends server_1.ResolverBas
|
|
|
3440
3441
|
}
|
|
3441
3442
|
async EntityField(ID, { dataSource, userPayload }, pubSub) {
|
|
3442
3443
|
this.CheckUserReadPermissions('Entity Fields', userPayload);
|
|
3443
|
-
const sSQL = `SELECT * FROM [
|
|
3444
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityFields] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Fields', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
3444
3445
|
const result = this.MapFieldNamesToCodeNames('Entity Fields', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
3445
3446
|
return result;
|
|
3446
3447
|
}
|
|
3447
3448
|
async AllEntityFields({ dataSource, userPayload }, pubSub) {
|
|
3448
3449
|
this.CheckUserReadPermissions('Entity Fields', userPayload);
|
|
3449
|
-
const sSQL =
|
|
3450
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityFields]` + this.getRowLevelSecurityWhereClause('Entity Fields', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
3450
3451
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Fields', await dataSource.query(sSQL));
|
|
3451
3452
|
return result;
|
|
3452
3453
|
}
|
|
3453
3454
|
async EntityFieldValuesArray(entityfield_, { dataSource, userPayload }, pubSub) {
|
|
3454
3455
|
this.CheckUserReadPermissions('Entity Field Values', userPayload);
|
|
3455
|
-
const sSQL = `SELECT * FROM [
|
|
3456
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityFieldValues] WHERE [EntityFieldID]=${entityfield_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Field Values', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
3456
3457
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Field Values', await dataSource.query(sSQL));
|
|
3457
3458
|
return result;
|
|
3458
3459
|
}
|
|
@@ -3912,6 +3913,14 @@ __decorate([
|
|
|
3912
3913
|
(0, server_1.Field)(() => [mj_core_schema_server_object_types.DataContextItem_]),
|
|
3913
3914
|
__metadata("design:type", Array)
|
|
3914
3915
|
], Entity_.prototype, "DataContextItemsArray", void 0);
|
|
3916
|
+
__decorate([
|
|
3917
|
+
(0, server_1.Field)(() => [mj_core_schema_server_object_types.User_]),
|
|
3918
|
+
__metadata("design:type", Array)
|
|
3919
|
+
], Entity_.prototype, "UsersArray", void 0);
|
|
3920
|
+
__decorate([
|
|
3921
|
+
(0, server_1.Field)(() => [mj_core_schema_server_object_types.EntityRecordDocument_]),
|
|
3922
|
+
__metadata("design:type", Array)
|
|
3923
|
+
], Entity_.prototype, "EntityRecordDocumentsArray", void 0);
|
|
3915
3924
|
exports.Entity_ = Entity_ = __decorate([
|
|
3916
3925
|
(0, server_1.ObjectType)()
|
|
3917
3926
|
], Entity_);
|
|
@@ -4270,160 +4279,172 @@ let EntityResolverBase = class EntityResolverBase extends server_1.ResolverBase
|
|
|
4270
4279
|
}
|
|
4271
4280
|
async Entity(ID, { dataSource, userPayload }, pubSub) {
|
|
4272
4281
|
this.CheckUserReadPermissions('Entities', userPayload);
|
|
4273
|
-
const sSQL = `SELECT * FROM [
|
|
4282
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntities] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4274
4283
|
const result = this.MapFieldNamesToCodeNames('Entities', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
4275
4284
|
return result;
|
|
4276
4285
|
}
|
|
4277
4286
|
async AllEntities({ dataSource, userPayload }, pubSub) {
|
|
4278
4287
|
this.CheckUserReadPermissions('Entities', userPayload);
|
|
4279
|
-
const sSQL =
|
|
4288
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntities]` + this.getRowLevelSecurityWhereClause('Entities', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
4280
4289
|
const result = this.ArrayMapFieldNamesToCodeNames('Entities', await dataSource.query(sSQL));
|
|
4281
4290
|
return result;
|
|
4282
4291
|
}
|
|
4283
4292
|
async EntityFieldsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4284
4293
|
this.CheckUserReadPermissions('Entity Fields', userPayload);
|
|
4285
|
-
const sSQL = `SELECT * FROM [
|
|
4294
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityFields] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Fields', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4286
4295
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Fields', await dataSource.query(sSQL));
|
|
4287
4296
|
return result;
|
|
4288
4297
|
}
|
|
4289
4298
|
async EntityPermissionsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4290
4299
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
4291
|
-
const sSQL = `SELECT * FROM [
|
|
4300
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityPermissions] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4292
4301
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL));
|
|
4293
4302
|
return result;
|
|
4294
4303
|
}
|
|
4295
4304
|
async EntityRelationshipsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4296
4305
|
this.CheckUserReadPermissions('Entity Relationships', userPayload);
|
|
4297
|
-
const sSQL = `SELECT * FROM [
|
|
4306
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityRelationships] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Relationships', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4298
4307
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Relationships', await dataSource.query(sSQL));
|
|
4299
4308
|
return result;
|
|
4300
4309
|
}
|
|
4301
4310
|
async EntityAIActionsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4302
4311
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
4303
|
-
const sSQL = `SELECT * FROM [
|
|
4312
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityAIActions] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4304
4313
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL));
|
|
4305
4314
|
return result;
|
|
4306
4315
|
}
|
|
4307
4316
|
async UserRecordLogsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4308
4317
|
this.CheckUserReadPermissions('User Record Logs', userPayload);
|
|
4309
|
-
const sSQL = `SELECT * FROM [
|
|
4318
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserRecordLogs] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Record Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4310
4319
|
const result = this.ArrayMapFieldNamesToCodeNames('User Record Logs', await dataSource.query(sSQL));
|
|
4311
4320
|
return result;
|
|
4312
4321
|
}
|
|
4313
4322
|
async IntegrationURLFormatsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4314
4323
|
this.CheckUserReadPermissions('Integration URL Formats', userPayload);
|
|
4315
|
-
const sSQL = `SELECT * FROM [
|
|
4324
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwIntegrationURLFormats] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Integration URL Formats', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4316
4325
|
const result = this.ArrayMapFieldNamesToCodeNames('Integration URL Formats', await dataSource.query(sSQL));
|
|
4317
4326
|
return result;
|
|
4318
4327
|
}
|
|
4319
4328
|
async EntitiesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4320
4329
|
this.CheckUserReadPermissions('Entities', userPayload);
|
|
4321
|
-
const sSQL = `SELECT * FROM [
|
|
4330
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntities] WHERE [ParentID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4322
4331
|
const result = this.ArrayMapFieldNamesToCodeNames('Entities', await dataSource.query(sSQL));
|
|
4323
4332
|
return result;
|
|
4324
4333
|
}
|
|
4325
4334
|
async UserFavoritesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4326
4335
|
this.CheckUserReadPermissions('User Favorites', userPayload);
|
|
4327
|
-
const sSQL = `SELECT * FROM [
|
|
4336
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserFavorites] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Favorites', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4328
4337
|
const result = this.ArrayMapFieldNamesToCodeNames('User Favorites', await dataSource.query(sSQL));
|
|
4329
4338
|
return result;
|
|
4330
4339
|
}
|
|
4331
4340
|
async CompanyIntegrationRunDetailsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4332
4341
|
this.CheckUserReadPermissions('Company Integration Run Details', userPayload);
|
|
4333
|
-
const sSQL = `SELECT * FROM [
|
|
4342
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanyIntegrationRunDetails] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4334
4343
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Run Details', await dataSource.query(sSQL));
|
|
4335
4344
|
return result;
|
|
4336
4345
|
}
|
|
4337
4346
|
async ApplicationEntitiesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4338
4347
|
this.CheckUserReadPermissions('Application Entities', userPayload);
|
|
4339
|
-
const sSQL = `SELECT * FROM [
|
|
4348
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwApplicationEntities] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4340
4349
|
const result = this.ArrayMapFieldNamesToCodeNames('Application Entities', await dataSource.query(sSQL));
|
|
4341
4350
|
return result;
|
|
4342
4351
|
}
|
|
4343
4352
|
async UserApplicationEntitiesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4344
4353
|
this.CheckUserReadPermissions('User Application Entities', userPayload);
|
|
4345
|
-
const sSQL = `SELECT * FROM [
|
|
4354
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserApplicationEntities] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4346
4355
|
const result = this.ArrayMapFieldNamesToCodeNames('User Application Entities', await dataSource.query(sSQL));
|
|
4347
4356
|
return result;
|
|
4348
4357
|
}
|
|
4349
4358
|
async ListsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4350
4359
|
this.CheckUserReadPermissions('Lists', userPayload);
|
|
4351
|
-
const sSQL = `SELECT * FROM [
|
|
4360
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwLists] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Lists', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4352
4361
|
const result = this.ArrayMapFieldNamesToCodeNames('Lists', await dataSource.query(sSQL));
|
|
4353
4362
|
return result;
|
|
4354
4363
|
}
|
|
4355
4364
|
async UserViewsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4356
4365
|
this.CheckUserReadPermissions('User Views', userPayload);
|
|
4357
|
-
const sSQL = `SELECT * FROM [
|
|
4366
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserViews] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4358
4367
|
const result = this.ArrayMapFieldNamesToCodeNames('User Views', await dataSource.query(sSQL));
|
|
4359
4368
|
return result;
|
|
4360
4369
|
}
|
|
4361
4370
|
async RecordChangesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4362
4371
|
this.CheckUserReadPermissions('Record Changes', userPayload);
|
|
4363
|
-
const sSQL = `SELECT * FROM [
|
|
4372
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwRecordChanges] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Record Changes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4364
4373
|
const result = this.ArrayMapFieldNamesToCodeNames('Record Changes', await dataSource.query(sSQL));
|
|
4365
4374
|
return result;
|
|
4366
4375
|
}
|
|
4367
4376
|
async AuditLogsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4368
4377
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
4369
|
-
const sSQL = `SELECT * FROM [
|
|
4378
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuditLogs] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4370
4379
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL));
|
|
4371
4380
|
return result;
|
|
4372
4381
|
}
|
|
4373
4382
|
async ResourceTypesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4374
4383
|
this.CheckUserReadPermissions('Resource Types', userPayload);
|
|
4375
|
-
const sSQL = `SELECT * FROM [
|
|
4384
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwResourceTypes] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Resource Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4376
4385
|
const result = this.ArrayMapFieldNamesToCodeNames('Resource Types', await dataSource.query(sSQL));
|
|
4377
4386
|
return result;
|
|
4378
4387
|
}
|
|
4379
4388
|
async TaggedItemsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4380
4389
|
this.CheckUserReadPermissions('Tagged Items', userPayload);
|
|
4381
|
-
const sSQL = `SELECT * FROM [
|
|
4390
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwTaggedItems] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Tagged Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4382
4391
|
const result = this.ArrayMapFieldNamesToCodeNames('Tagged Items', await dataSource.query(sSQL));
|
|
4383
4392
|
return result;
|
|
4384
4393
|
}
|
|
4385
4394
|
async DatasetItemsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4386
4395
|
this.CheckUserReadPermissions('Dataset Items', userPayload);
|
|
4387
|
-
const sSQL = `SELECT * FROM [
|
|
4396
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDatasetItems] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Dataset Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4388
4397
|
const result = this.ArrayMapFieldNamesToCodeNames('Dataset Items', await dataSource.query(sSQL));
|
|
4389
4398
|
return result;
|
|
4390
4399
|
}
|
|
4391
4400
|
async CompanyIntegrationRecordMapsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4392
4401
|
this.CheckUserReadPermissions('Company Integration Record Maps', userPayload);
|
|
4393
|
-
const sSQL = `SELECT * FROM [
|
|
4402
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanyIntegrationRecordMaps] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Record Maps', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4394
4403
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Record Maps', await dataSource.query(sSQL));
|
|
4395
4404
|
return result;
|
|
4396
4405
|
}
|
|
4397
4406
|
async RecordMergeLogsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4398
4407
|
this.CheckUserReadPermissions('Record Merge Logs', userPayload);
|
|
4399
|
-
const sSQL = `SELECT * FROM [
|
|
4408
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwRecordMergeLogs] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4400
4409
|
const result = this.ArrayMapFieldNamesToCodeNames('Record Merge Logs', await dataSource.query(sSQL));
|
|
4401
4410
|
return result;
|
|
4402
4411
|
}
|
|
4403
4412
|
async QueryFieldsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4404
4413
|
this.CheckUserReadPermissions('Query Fields', userPayload);
|
|
4405
|
-
const sSQL = `SELECT * FROM [
|
|
4414
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwQueryFields] WHERE [SourceEntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Query Fields', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4406
4415
|
const result = this.ArrayMapFieldNamesToCodeNames('Query Fields', await dataSource.query(sSQL));
|
|
4407
4416
|
return result;
|
|
4408
4417
|
}
|
|
4409
4418
|
async ConversationsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4410
4419
|
this.CheckUserReadPermissions('Conversations', userPayload);
|
|
4411
|
-
const sSQL = `SELECT * FROM [
|
|
4420
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwConversations] WHERE [LinkedEntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Conversations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4412
4421
|
const result = this.ArrayMapFieldNamesToCodeNames('Conversations', await dataSource.query(sSQL));
|
|
4413
4422
|
return result;
|
|
4414
4423
|
}
|
|
4415
4424
|
async EntityDocumentsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4416
4425
|
this.CheckUserReadPermissions('Entity Documents', userPayload);
|
|
4417
|
-
const sSQL = `SELECT * FROM [
|
|
4426
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityDocuments] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Documents', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4418
4427
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Documents', await dataSource.query(sSQL));
|
|
4419
4428
|
return result;
|
|
4420
4429
|
}
|
|
4421
4430
|
async DataContextItemsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4422
4431
|
this.CheckUserReadPermissions('Data Context Items', userPayload);
|
|
4423
|
-
const sSQL = `SELECT * FROM [
|
|
4432
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDataContextItems] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Data Context Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4424
4433
|
const result = this.ArrayMapFieldNamesToCodeNames('Data Context Items', await dataSource.query(sSQL));
|
|
4425
4434
|
return result;
|
|
4426
4435
|
}
|
|
4436
|
+
async UsersArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4437
|
+
this.CheckUserReadPermissions('Users', userPayload);
|
|
4438
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUsers] WHERE [LinkedEntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Users', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4439
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Users', await dataSource.query(sSQL));
|
|
4440
|
+
return result;
|
|
4441
|
+
}
|
|
4442
|
+
async EntityRecordDocumentsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4443
|
+
this.CheckUserReadPermissions('Entity Record Documents', userPayload);
|
|
4444
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityRecordDocuments] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Record Documents', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4445
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Entity Record Documents', await dataSource.query(sSQL));
|
|
4446
|
+
return result;
|
|
4447
|
+
}
|
|
4427
4448
|
async CreateEntity(input, { dataSource, userPayload }, pubSub) {
|
|
4428
4449
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
4429
4450
|
const entityObject = await new core_1.Metadata().GetEntityObject('Entities', this.GetUserFromPayload(userPayload));
|
|
@@ -4749,6 +4770,24 @@ __decorate([
|
|
|
4749
4770
|
__metadata("design:paramtypes", [Entity_, Object, server_1.PubSubEngine]),
|
|
4750
4771
|
__metadata("design:returntype", Promise)
|
|
4751
4772
|
], EntityResolverBase.prototype, "DataContextItemsArray", null);
|
|
4773
|
+
__decorate([
|
|
4774
|
+
(0, server_1.FieldResolver)(() => [mj_core_schema_server_object_types.User_]),
|
|
4775
|
+
__param(0, (0, server_1.Root)()),
|
|
4776
|
+
__param(1, (0, server_1.Ctx)()),
|
|
4777
|
+
__param(2, (0, server_1.PubSub)()),
|
|
4778
|
+
__metadata("design:type", Function),
|
|
4779
|
+
__metadata("design:paramtypes", [Entity_, Object, server_1.PubSubEngine]),
|
|
4780
|
+
__metadata("design:returntype", Promise)
|
|
4781
|
+
], EntityResolverBase.prototype, "UsersArray", null);
|
|
4782
|
+
__decorate([
|
|
4783
|
+
(0, server_1.FieldResolver)(() => [mj_core_schema_server_object_types.EntityRecordDocument_]),
|
|
4784
|
+
__param(0, (0, server_1.Root)()),
|
|
4785
|
+
__param(1, (0, server_1.Ctx)()),
|
|
4786
|
+
__param(2, (0, server_1.PubSub)()),
|
|
4787
|
+
__metadata("design:type", Function),
|
|
4788
|
+
__metadata("design:paramtypes", [Entity_, Object, server_1.PubSubEngine]),
|
|
4789
|
+
__metadata("design:returntype", Promise)
|
|
4790
|
+
], EntityResolverBase.prototype, "EntityRecordDocumentsArray", null);
|
|
4752
4791
|
__decorate([
|
|
4753
4792
|
(0, server_1.Mutation)(() => Entity_),
|
|
4754
4793
|
__param(0, (0, server_1.Arg)('input', () => CreateEntityInput)),
|
|
@@ -5103,121 +5142,121 @@ let UserResolverBase = class UserResolverBase extends server_1.ResolverBase {
|
|
|
5103
5142
|
}
|
|
5104
5143
|
async User(ID, { dataSource, userPayload }, pubSub) {
|
|
5105
5144
|
this.CheckUserReadPermissions('Users', userPayload);
|
|
5106
|
-
const sSQL = `SELECT * FROM [
|
|
5145
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUsers] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Users', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5107
5146
|
const result = this.MapFieldNamesToCodeNames('Users', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
5108
5147
|
return result;
|
|
5109
5148
|
}
|
|
5110
5149
|
async AllUsers({ dataSource, userPayload }, pubSub) {
|
|
5111
5150
|
this.CheckUserReadPermissions('Users', userPayload);
|
|
5112
|
-
const sSQL =
|
|
5151
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUsers]` + this.getRowLevelSecurityWhereClause('Users', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
5113
5152
|
const result = this.ArrayMapFieldNamesToCodeNames('Users', await dataSource.query(sSQL));
|
|
5114
5153
|
return result;
|
|
5115
5154
|
}
|
|
5116
5155
|
async UserApplicationsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5117
5156
|
this.CheckUserReadPermissions('User Applications', userPayload);
|
|
5118
|
-
const sSQL = `SELECT * FROM [
|
|
5157
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserApplications] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Applications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5119
5158
|
const result = this.ArrayMapFieldNamesToCodeNames('User Applications', await dataSource.query(sSQL));
|
|
5120
5159
|
return result;
|
|
5121
5160
|
}
|
|
5122
5161
|
async UserRolesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5123
5162
|
this.CheckUserReadPermissions('User Roles', userPayload);
|
|
5124
|
-
const sSQL = `SELECT * FROM [
|
|
5163
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserRoles] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5125
5164
|
const result = this.ArrayMapFieldNamesToCodeNames('User Roles', await dataSource.query(sSQL));
|
|
5126
5165
|
return result;
|
|
5127
5166
|
}
|
|
5128
5167
|
async WorkspacesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5129
5168
|
this.CheckUserReadPermissions('Workspaces', userPayload);
|
|
5130
|
-
const sSQL = `SELECT * FROM [
|
|
5169
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwWorkspaces] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Workspaces', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5131
5170
|
const result = this.ArrayMapFieldNamesToCodeNames('Workspaces', await dataSource.query(sSQL));
|
|
5132
5171
|
return result;
|
|
5133
5172
|
}
|
|
5134
5173
|
async ReportsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5135
5174
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
5136
|
-
const sSQL = `SELECT * FROM [
|
|
5175
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwReports] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5137
5176
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
5138
5177
|
return result;
|
|
5139
5178
|
}
|
|
5140
5179
|
async ReportSnapshotsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5141
5180
|
this.CheckUserReadPermissions('Report Snapshots', userPayload);
|
|
5142
|
-
const sSQL = `SELECT * FROM [
|
|
5181
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwReportSnapshots] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Report Snapshots', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5143
5182
|
const result = this.ArrayMapFieldNamesToCodeNames('Report Snapshots', await dataSource.query(sSQL));
|
|
5144
5183
|
return result;
|
|
5145
5184
|
}
|
|
5146
5185
|
async RecordChangesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5147
5186
|
this.CheckUserReadPermissions('Record Changes', userPayload);
|
|
5148
|
-
const sSQL = `SELECT * FROM [
|
|
5187
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwRecordChanges] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Record Changes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5149
5188
|
const result = this.ArrayMapFieldNamesToCodeNames('Record Changes', await dataSource.query(sSQL));
|
|
5150
5189
|
return result;
|
|
5151
5190
|
}
|
|
5152
5191
|
async DashboardsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5153
5192
|
this.CheckUserReadPermissions('Dashboards', userPayload);
|
|
5154
|
-
const sSQL = `SELECT * FROM [
|
|
5193
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDashboards] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Dashboards', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5155
5194
|
const result = this.ArrayMapFieldNamesToCodeNames('Dashboards', await dataSource.query(sSQL));
|
|
5156
5195
|
return result;
|
|
5157
5196
|
}
|
|
5158
5197
|
async UserViewRunsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5159
5198
|
this.CheckUserReadPermissions('User View Runs', userPayload);
|
|
5160
|
-
const sSQL = `SELECT * FROM [
|
|
5199
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserViewRuns] WHERE [RunByUserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User View Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5161
5200
|
const result = this.ArrayMapFieldNamesToCodeNames('User View Runs', await dataSource.query(sSQL));
|
|
5162
5201
|
return result;
|
|
5163
5202
|
}
|
|
5164
5203
|
async AuditLogsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5165
5204
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
5166
|
-
const sSQL = `SELECT * FROM [
|
|
5205
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuditLogs] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5167
5206
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL));
|
|
5168
5207
|
return result;
|
|
5169
5208
|
}
|
|
5170
5209
|
async ListsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5171
5210
|
this.CheckUserReadPermissions('Lists', userPayload);
|
|
5172
|
-
const sSQL = `SELECT * FROM [
|
|
5211
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwLists] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Lists', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5173
5212
|
const result = this.ArrayMapFieldNamesToCodeNames('Lists', await dataSource.query(sSQL));
|
|
5174
5213
|
return result;
|
|
5175
5214
|
}
|
|
5176
5215
|
async UserFavoritesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5177
5216
|
this.CheckUserReadPermissions('User Favorites', userPayload);
|
|
5178
|
-
const sSQL = `SELECT * FROM [
|
|
5217
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserFavorites] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Favorites', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5179
5218
|
const result = this.ArrayMapFieldNamesToCodeNames('User Favorites', await dataSource.query(sSQL));
|
|
5180
5219
|
return result;
|
|
5181
5220
|
}
|
|
5182
5221
|
async UserRecordLogsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5183
5222
|
this.CheckUserReadPermissions('User Record Logs', userPayload);
|
|
5184
|
-
const sSQL = `SELECT * FROM [
|
|
5223
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserRecordLogs] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Record Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5185
5224
|
const result = this.ArrayMapFieldNamesToCodeNames('User Record Logs', await dataSource.query(sSQL));
|
|
5186
5225
|
return result;
|
|
5187
5226
|
}
|
|
5188
5227
|
async UserViewsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5189
5228
|
this.CheckUserReadPermissions('User Views', userPayload);
|
|
5190
|
-
const sSQL = `SELECT * FROM [
|
|
5229
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserViews] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5191
5230
|
const result = this.ArrayMapFieldNamesToCodeNames('User Views', await dataSource.query(sSQL));
|
|
5192
5231
|
return result;
|
|
5193
5232
|
}
|
|
5194
5233
|
async CompanyIntegrationRunsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5195
5234
|
this.CheckUserReadPermissions('Company Integration Runs', userPayload);
|
|
5196
|
-
const sSQL = `SELECT * FROM [
|
|
5235
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanyIntegrationRuns] WHERE [RunByUserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5197
5236
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Runs', await dataSource.query(sSQL));
|
|
5198
5237
|
return result;
|
|
5199
5238
|
}
|
|
5200
5239
|
async UserNotificationsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5201
5240
|
this.CheckUserReadPermissions('User Notifications', userPayload);
|
|
5202
|
-
const sSQL = `SELECT * FROM [
|
|
5241
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserNotifications] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Notifications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5203
5242
|
const result = this.ArrayMapFieldNamesToCodeNames('User Notifications', await dataSource.query(sSQL));
|
|
5204
5243
|
return result;
|
|
5205
5244
|
}
|
|
5206
5245
|
async ConversationsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5207
5246
|
this.CheckUserReadPermissions('Conversations', userPayload);
|
|
5208
|
-
const sSQL = `SELECT * FROM [
|
|
5247
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwConversations] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Conversations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5209
5248
|
const result = this.ArrayMapFieldNamesToCodeNames('Conversations', await dataSource.query(sSQL));
|
|
5210
5249
|
return result;
|
|
5211
5250
|
}
|
|
5212
5251
|
async RecordMergeLogsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5213
5252
|
this.CheckUserReadPermissions('Record Merge Logs', userPayload);
|
|
5214
|
-
const sSQL = `SELECT * FROM [
|
|
5253
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwRecordMergeLogs] WHERE [InitiatedByUserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5215
5254
|
const result = this.ArrayMapFieldNamesToCodeNames('Record Merge Logs', await dataSource.query(sSQL));
|
|
5216
5255
|
return result;
|
|
5217
5256
|
}
|
|
5218
5257
|
async DataContextsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5219
5258
|
this.CheckUserReadPermissions('Data Contexts', userPayload);
|
|
5220
|
-
const sSQL = `SELECT * FROM [
|
|
5259
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDataContexts] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Data Contexts', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5221
5260
|
const result = this.ArrayMapFieldNamesToCodeNames('Data Contexts', await dataSource.query(sSQL));
|
|
5222
5261
|
return result;
|
|
5223
5262
|
}
|
|
@@ -5785,13 +5824,13 @@ let EntityRelationshipResolver = class EntityRelationshipResolver extends server
|
|
|
5785
5824
|
}
|
|
5786
5825
|
async EntityRelationship(ID, { dataSource, userPayload }, pubSub) {
|
|
5787
5826
|
this.CheckUserReadPermissions('Entity Relationships', userPayload);
|
|
5788
|
-
const sSQL = `SELECT * FROM [
|
|
5827
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityRelationships] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Relationships', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5789
5828
|
const result = this.MapFieldNamesToCodeNames('Entity Relationships', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
5790
5829
|
return result;
|
|
5791
5830
|
}
|
|
5792
5831
|
async AllEntityRelationships({ dataSource, userPayload }, pubSub) {
|
|
5793
5832
|
this.CheckUserReadPermissions('Entity Relationships', userPayload);
|
|
5794
|
-
const sSQL =
|
|
5833
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityRelationships]` + this.getRowLevelSecurityWhereClause('Entity Relationships', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
5795
5834
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Relationships', await dataSource.query(sSQL));
|
|
5796
5835
|
return result;
|
|
5797
5836
|
}
|
|
@@ -6082,7 +6121,7 @@ let UserRecordLogResolver = class UserRecordLogResolver extends server_1.Resolve
|
|
|
6082
6121
|
}
|
|
6083
6122
|
async UserRecordLog(ID, { dataSource, userPayload }, pubSub) {
|
|
6084
6123
|
this.CheckUserReadPermissions('User Record Logs', userPayload);
|
|
6085
|
-
const sSQL = `SELECT * FROM [
|
|
6124
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserRecordLogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Record Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6086
6125
|
const result = this.MapFieldNamesToCodeNames('User Record Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
6087
6126
|
return result;
|
|
6088
6127
|
}
|
|
@@ -6492,31 +6531,31 @@ let UserViewResolverBase = class UserViewResolverBase extends server_1.ResolverB
|
|
|
6492
6531
|
}
|
|
6493
6532
|
async UserView(ID, { dataSource, userPayload }, pubSub) {
|
|
6494
6533
|
this.CheckUserReadPermissions('User Views', userPayload);
|
|
6495
|
-
const sSQL = `SELECT * FROM [
|
|
6534
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserViews] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6496
6535
|
const result = this.MapFieldNamesToCodeNames('User Views', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
6497
6536
|
return result;
|
|
6498
6537
|
}
|
|
6499
6538
|
async AllUserViews({ dataSource, userPayload }, pubSub) {
|
|
6500
6539
|
this.CheckUserReadPermissions('User Views', userPayload);
|
|
6501
|
-
const sSQL =
|
|
6540
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserViews]` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
6502
6541
|
const result = this.ArrayMapFieldNamesToCodeNames('User Views', await dataSource.query(sSQL));
|
|
6503
6542
|
return result;
|
|
6504
6543
|
}
|
|
6505
6544
|
async EntityRelationshipsArray(userview_, { dataSource, userPayload }, pubSub) {
|
|
6506
6545
|
this.CheckUserReadPermissions('Entity Relationships', userPayload);
|
|
6507
|
-
const sSQL = `SELECT * FROM [
|
|
6546
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityRelationships] WHERE [DisplayUserViewGUID]=${userview_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Relationships', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6508
6547
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Relationships', await dataSource.query(sSQL));
|
|
6509
6548
|
return result;
|
|
6510
6549
|
}
|
|
6511
6550
|
async UserViewRunsArray(userview_, { dataSource, userPayload }, pubSub) {
|
|
6512
6551
|
this.CheckUserReadPermissions('User View Runs', userPayload);
|
|
6513
|
-
const sSQL = `SELECT * FROM [
|
|
6552
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserViewRuns] WHERE [UserViewID]=${userview_.ID} ` + this.getRowLevelSecurityWhereClause('User View Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6514
6553
|
const result = this.ArrayMapFieldNamesToCodeNames('User View Runs', await dataSource.query(sSQL));
|
|
6515
6554
|
return result;
|
|
6516
6555
|
}
|
|
6517
6556
|
async DataContextItemsArray(userview_, { dataSource, userPayload }, pubSub) {
|
|
6518
6557
|
this.CheckUserReadPermissions('Data Context Items', userPayload);
|
|
6519
|
-
const sSQL = `SELECT * FROM [
|
|
6558
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDataContextItems] WHERE [ViewID]=${userview_.ID} ` + this.getRowLevelSecurityWhereClause('Data Context Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6520
6559
|
const result = this.ArrayMapFieldNamesToCodeNames('Data Context Items', await dataSource.query(sSQL));
|
|
6521
6560
|
return result;
|
|
6522
6561
|
}
|
|
@@ -6821,25 +6860,25 @@ let CompanyIntegrationRunResolver = class CompanyIntegrationRunResolver extends
|
|
|
6821
6860
|
}
|
|
6822
6861
|
async CompanyIntegrationRun(ID, { dataSource, userPayload }, pubSub) {
|
|
6823
6862
|
this.CheckUserReadPermissions('Company Integration Runs', userPayload);
|
|
6824
|
-
const sSQL = `SELECT * FROM [
|
|
6863
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanyIntegrationRuns] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6825
6864
|
const result = this.MapFieldNamesToCodeNames('Company Integration Runs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
6826
6865
|
return result;
|
|
6827
6866
|
}
|
|
6828
6867
|
async CompanyIntegrationRunAPILogsArray(companyintegrationrun_, { dataSource, userPayload }, pubSub) {
|
|
6829
6868
|
this.CheckUserReadPermissions('Company Integration Run API Logs', userPayload);
|
|
6830
|
-
const sSQL = `SELECT * FROM [
|
|
6869
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanyIntegrationRunAPILogs] WHERE [CompanyIntegrationRunID]=${companyintegrationrun_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run API Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6831
6870
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Run API Logs', await dataSource.query(sSQL));
|
|
6832
6871
|
return result;
|
|
6833
6872
|
}
|
|
6834
6873
|
async ErrorLogsArray(companyintegrationrun_, { dataSource, userPayload }, pubSub) {
|
|
6835
6874
|
this.CheckUserReadPermissions('Error Logs', userPayload);
|
|
6836
|
-
const sSQL = `SELECT * FROM [
|
|
6875
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwErrorLogs] WHERE [CompanyIntegrationRunID]=${companyintegrationrun_.ID} ` + this.getRowLevelSecurityWhereClause('Error Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6837
6876
|
const result = this.ArrayMapFieldNamesToCodeNames('Error Logs', await dataSource.query(sSQL));
|
|
6838
6877
|
return result;
|
|
6839
6878
|
}
|
|
6840
6879
|
async CompanyIntegrationRunDetailsArray(companyintegrationrun_, { dataSource, userPayload }, pubSub) {
|
|
6841
6880
|
this.CheckUserReadPermissions('Company Integration Run Details', userPayload);
|
|
6842
|
-
const sSQL = `SELECT * FROM [
|
|
6881
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanyIntegrationRunDetails] WHERE [CompanyIntegrationRunID]=${companyintegrationrun_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6843
6882
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Run Details', await dataSource.query(sSQL));
|
|
6844
6883
|
return result;
|
|
6845
6884
|
}
|
|
@@ -7078,13 +7117,13 @@ let CompanyIntegrationRunDetailResolver = class CompanyIntegrationRunDetailResol
|
|
|
7078
7117
|
}
|
|
7079
7118
|
async CompanyIntegrationRunDetail(ID, { dataSource, userPayload }, pubSub) {
|
|
7080
7119
|
this.CheckUserReadPermissions('Company Integration Run Details', userPayload);
|
|
7081
|
-
const sSQL = `SELECT * FROM [
|
|
7120
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanyIntegrationRunDetails] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7082
7121
|
const result = this.MapFieldNamesToCodeNames('Company Integration Run Details', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
7083
7122
|
return result;
|
|
7084
7123
|
}
|
|
7085
7124
|
async ErrorLogsArray(companyintegrationrundetail_, { dataSource, userPayload }, pubSub) {
|
|
7086
7125
|
this.CheckUserReadPermissions('Error Logs', userPayload);
|
|
7087
|
-
const sSQL = `SELECT * FROM [
|
|
7126
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwErrorLogs] WHERE [CompanyIntegrationRunDetailID]=${companyintegrationrundetail_.ID} ` + this.getRowLevelSecurityWhereClause('Error Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7088
7127
|
const result = this.ArrayMapFieldNamesToCodeNames('Error Logs', await dataSource.query(sSQL));
|
|
7089
7128
|
return result;
|
|
7090
7129
|
}
|
|
@@ -7308,7 +7347,7 @@ let ErrorLogResolver = class ErrorLogResolver extends server_1.ResolverBase {
|
|
|
7308
7347
|
}
|
|
7309
7348
|
async ErrorLog(ID, { dataSource, userPayload }, pubSub) {
|
|
7310
7349
|
this.CheckUserReadPermissions('Error Logs', userPayload);
|
|
7311
|
-
const sSQL = `SELECT * FROM [
|
|
7350
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwErrorLogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Error Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7312
7351
|
const result = this.MapFieldNamesToCodeNames('Error Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
7313
7352
|
return result;
|
|
7314
7353
|
}
|
|
@@ -7486,25 +7525,25 @@ let ApplicationResolver = class ApplicationResolver extends server_1.ResolverBas
|
|
|
7486
7525
|
}
|
|
7487
7526
|
async Application(ID, { dataSource, userPayload }, pubSub) {
|
|
7488
7527
|
this.CheckUserReadPermissions('Applications', userPayload);
|
|
7489
|
-
const sSQL = `SELECT * FROM [
|
|
7528
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwApplications] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Applications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7490
7529
|
const result = this.MapFieldNamesToCodeNames('Applications', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
7491
7530
|
return result;
|
|
7492
7531
|
}
|
|
7493
7532
|
async AllApplications({ dataSource, userPayload }, pubSub) {
|
|
7494
7533
|
this.CheckUserReadPermissions('Applications', userPayload);
|
|
7495
|
-
const sSQL =
|
|
7534
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwApplications]` + this.getRowLevelSecurityWhereClause('Applications', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
7496
7535
|
const result = this.ArrayMapFieldNamesToCodeNames('Applications', await dataSource.query(sSQL));
|
|
7497
7536
|
return result;
|
|
7498
7537
|
}
|
|
7499
7538
|
async ApplicationEntitiesArray(application_, { dataSource, userPayload }, pubSub) {
|
|
7500
7539
|
this.CheckUserReadPermissions('Application Entities', userPayload);
|
|
7501
|
-
const sSQL = `SELECT * FROM [
|
|
7540
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwApplicationEntities] WHERE [ApplicationID]=${application_.ID} ` + this.getRowLevelSecurityWhereClause('Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7502
7541
|
const result = this.ArrayMapFieldNamesToCodeNames('Application Entities', await dataSource.query(sSQL));
|
|
7503
7542
|
return result;
|
|
7504
7543
|
}
|
|
7505
7544
|
async UserApplicationsArray(application_, { dataSource, userPayload }, pubSub) {
|
|
7506
7545
|
this.CheckUserReadPermissions('User Applications', userPayload);
|
|
7507
|
-
const sSQL = `SELECT * FROM [
|
|
7546
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserApplications] WHERE [ApplicationID]=${application_.ID} ` + this.getRowLevelSecurityWhereClause('User Applications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7508
7547
|
const result = this.ArrayMapFieldNamesToCodeNames('User Applications', await dataSource.query(sSQL));
|
|
7509
7548
|
return result;
|
|
7510
7549
|
}
|
|
@@ -7771,7 +7810,7 @@ let ApplicationEntityResolver = class ApplicationEntityResolver extends server_1
|
|
|
7771
7810
|
}
|
|
7772
7811
|
async ApplicationEntity(ID, { dataSource, userPayload }, pubSub) {
|
|
7773
7812
|
this.CheckUserReadPermissions('Application Entities', userPayload);
|
|
7774
|
-
const sSQL = `SELECT * FROM [
|
|
7813
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwApplicationEntities] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7775
7814
|
const result = this.MapFieldNamesToCodeNames('Application Entities', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
7776
7815
|
return result;
|
|
7777
7816
|
}
|
|
@@ -8144,13 +8183,13 @@ let EntityPermissionResolver = class EntityPermissionResolver extends server_1.R
|
|
|
8144
8183
|
}
|
|
8145
8184
|
async EntityPermission(ID, { dataSource, userPayload }, pubSub) {
|
|
8146
8185
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
8147
|
-
const sSQL = `SELECT * FROM [
|
|
8186
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityPermissions] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8148
8187
|
const result = this.MapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
8149
8188
|
return result;
|
|
8150
8189
|
}
|
|
8151
8190
|
async AllEntityPermissions({ dataSource, userPayload }, pubSub) {
|
|
8152
8191
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
8153
|
-
const sSQL =
|
|
8192
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityPermissions]` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
8154
8193
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL));
|
|
8155
8194
|
return result;
|
|
8156
8195
|
}
|
|
@@ -8421,7 +8460,7 @@ let UserApplicationEntityResolver = class UserApplicationEntityResolver extends
|
|
|
8421
8460
|
}
|
|
8422
8461
|
async UserApplicationEntity(ID, { dataSource, userPayload }, pubSub) {
|
|
8423
8462
|
this.CheckUserReadPermissions('User Application Entities', userPayload);
|
|
8424
|
-
const sSQL = `SELECT * FROM [
|
|
8463
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserApplicationEntities] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8425
8464
|
const result = this.MapFieldNamesToCodeNames('User Application Entities', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
8426
8465
|
return result;
|
|
8427
8466
|
}
|
|
@@ -8669,13 +8708,13 @@ let UserApplicationResolver = class UserApplicationResolver extends server_1.Res
|
|
|
8669
8708
|
}
|
|
8670
8709
|
async UserApplication(ID, { dataSource, userPayload }, pubSub) {
|
|
8671
8710
|
this.CheckUserReadPermissions('User Applications', userPayload);
|
|
8672
|
-
const sSQL = `SELECT * FROM [
|
|
8711
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserApplications] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Applications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8673
8712
|
const result = this.MapFieldNamesToCodeNames('User Applications', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
8674
8713
|
return result;
|
|
8675
8714
|
}
|
|
8676
8715
|
async UserApplicationEntitiesArray(userapplication_, { dataSource, userPayload }, pubSub) {
|
|
8677
8716
|
this.CheckUserReadPermissions('User Application Entities', userPayload);
|
|
8678
|
-
const sSQL = `SELECT * FROM [
|
|
8717
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserApplicationEntities] WHERE [UserApplicationID]=${userapplication_.ID} ` + this.getRowLevelSecurityWhereClause('User Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8679
8718
|
const result = this.ArrayMapFieldNamesToCodeNames('User Application Entities', await dataSource.query(sSQL));
|
|
8680
8719
|
return result;
|
|
8681
8720
|
}
|
|
@@ -8876,7 +8915,7 @@ let CompanyIntegrationRunAPILogResolver = class CompanyIntegrationRunAPILogResol
|
|
|
8876
8915
|
}
|
|
8877
8916
|
async CompanyIntegrationRunAPILog(ID, { dataSource, userPayload }, pubSub) {
|
|
8878
8917
|
this.CheckUserReadPermissions('Company Integration Run API Logs', userPayload);
|
|
8879
|
-
const sSQL = `SELECT * FROM [
|
|
8918
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanyIntegrationRunAPILogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run API Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8880
8919
|
const result = this.MapFieldNamesToCodeNames('Company Integration Run API Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
8881
8920
|
return result;
|
|
8882
8921
|
}
|
|
@@ -8994,6 +9033,11 @@ __decorate([
|
|
|
8994
9033
|
(0, class_validator_1.MaxLength)(8),
|
|
8995
9034
|
__metadata("design:type", Date)
|
|
8996
9035
|
], List_.prototype, "UpdatedAt", void 0);
|
|
9036
|
+
__decorate([
|
|
9037
|
+
(0, server_1.Field)({ nullable: true }),
|
|
9038
|
+
(0, class_validator_1.MaxLength)(510),
|
|
9039
|
+
__metadata("design:type", String)
|
|
9040
|
+
], List_.prototype, "Entity", void 0);
|
|
8997
9041
|
__decorate([
|
|
8998
9042
|
(0, server_1.Field)(),
|
|
8999
9043
|
(0, class_validator_1.MaxLength)(200),
|
|
@@ -9121,13 +9165,13 @@ let ListResolver = class ListResolver extends server_1.ResolverBase {
|
|
|
9121
9165
|
}
|
|
9122
9166
|
async List(ID, { dataSource, userPayload }, pubSub) {
|
|
9123
9167
|
this.CheckUserReadPermissions('Lists', userPayload);
|
|
9124
|
-
const sSQL = `SELECT * FROM [
|
|
9168
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwLists] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Lists', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9125
9169
|
const result = this.MapFieldNamesToCodeNames('Lists', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
9126
9170
|
return result;
|
|
9127
9171
|
}
|
|
9128
9172
|
async ListDetailsArray(list_, { dataSource, userPayload }, pubSub) {
|
|
9129
9173
|
this.CheckUserReadPermissions('List Details', userPayload);
|
|
9130
|
-
const sSQL = `SELECT * FROM [
|
|
9174
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwListDetails] WHERE [ListID]=${list_.ID} ` + this.getRowLevelSecurityWhereClause('List Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9131
9175
|
const result = this.ArrayMapFieldNamesToCodeNames('List Details', await dataSource.query(sSQL));
|
|
9132
9176
|
return result;
|
|
9133
9177
|
}
|
|
@@ -9385,7 +9429,7 @@ let ListDetailResolver = class ListDetailResolver extends server_1.ResolverBase
|
|
|
9385
9429
|
}
|
|
9386
9430
|
async ListDetail(ID, { dataSource, userPayload }, pubSub) {
|
|
9387
9431
|
this.CheckUserReadPermissions('List Details', userPayload);
|
|
9388
|
-
const sSQL = `SELECT * FROM [
|
|
9432
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwListDetails] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('List Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9389
9433
|
const result = this.MapFieldNamesToCodeNames('List Details', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
9390
9434
|
return result;
|
|
9391
9435
|
}
|
|
@@ -9648,13 +9692,13 @@ let UserViewRunResolver = class UserViewRunResolver extends server_1.ResolverBas
|
|
|
9648
9692
|
}
|
|
9649
9693
|
async UserViewRun(ID, { dataSource, userPayload }, pubSub) {
|
|
9650
9694
|
this.CheckUserReadPermissions('User View Runs', userPayload);
|
|
9651
|
-
const sSQL = `SELECT * FROM [
|
|
9695
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserViewRuns] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User View Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9652
9696
|
const result = this.MapFieldNamesToCodeNames('User View Runs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
9653
9697
|
return result;
|
|
9654
9698
|
}
|
|
9655
9699
|
async UserViewRunDetailsArray(userviewrun_, { dataSource, userPayload }, pubSub) {
|
|
9656
9700
|
this.CheckUserReadPermissions('User View Run Details', userPayload);
|
|
9657
|
-
const sSQL = `SELECT * FROM [
|
|
9701
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserViewRunDetails] WHERE [UserViewRunID]=${userviewrun_.ID} ` + this.getRowLevelSecurityWhereClause('User View Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9658
9702
|
const result = this.ArrayMapFieldNamesToCodeNames('User View Run Details', await dataSource.query(sSQL));
|
|
9659
9703
|
return result;
|
|
9660
9704
|
}
|
|
@@ -9877,7 +9921,7 @@ let UserViewRunDetailResolver = class UserViewRunDetailResolver extends server_1
|
|
|
9877
9921
|
}
|
|
9878
9922
|
async UserViewRunDetail(ID, { dataSource, userPayload }, pubSub) {
|
|
9879
9923
|
this.CheckUserReadPermissions('User View Run Details', userPayload);
|
|
9880
|
-
const sSQL = `SELECT * FROM [
|
|
9924
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserViewRunDetails] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User View Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9881
9925
|
const result = this.MapFieldNamesToCodeNames('User View Run Details', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
9882
9926
|
return result;
|
|
9883
9927
|
}
|
|
@@ -10111,7 +10155,7 @@ let WorkflowRunResolver = class WorkflowRunResolver extends server_1.ResolverBas
|
|
|
10111
10155
|
}
|
|
10112
10156
|
async WorkflowRun(ID, { dataSource, userPayload }, pubSub) {
|
|
10113
10157
|
this.CheckUserReadPermissions('Workflow Runs', userPayload);
|
|
10114
|
-
const sSQL = `SELECT * FROM [
|
|
10158
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwWorkflowRuns] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Workflow Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10115
10159
|
const result = this.MapFieldNamesToCodeNames('Workflow Runs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
10116
10160
|
return result;
|
|
10117
10161
|
}
|
|
@@ -10315,19 +10359,19 @@ let WorkflowResolver = class WorkflowResolver extends server_1.ResolverBase {
|
|
|
10315
10359
|
}
|
|
10316
10360
|
async Workflow(ID, { dataSource, userPayload }, pubSub) {
|
|
10317
10361
|
this.CheckUserReadPermissions('Workflows', userPayload);
|
|
10318
|
-
const sSQL = `SELECT * FROM [
|
|
10362
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwWorkflows] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Workflows', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10319
10363
|
const result = this.MapFieldNamesToCodeNames('Workflows', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
10320
10364
|
return result;
|
|
10321
10365
|
}
|
|
10322
10366
|
async ReportsArray(workflow_, { dataSource, userPayload }, pubSub) {
|
|
10323
10367
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
10324
|
-
const sSQL = `SELECT * FROM [
|
|
10368
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwReports] WHERE [OutputWorkflowID]=${workflow_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10325
10369
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
10326
10370
|
return result;
|
|
10327
10371
|
}
|
|
10328
10372
|
async WorkflowRunsArray(workflow_, { dataSource, userPayload }, pubSub) {
|
|
10329
10373
|
this.CheckUserReadPermissions('Workflow Runs', userPayload);
|
|
10330
|
-
const sSQL = `SELECT * FROM [
|
|
10374
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwWorkflowRuns] WHERE [WorkflowName]=${workflow_.ID} ` + this.getRowLevelSecurityWhereClause('Workflow Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10331
10375
|
const result = this.ArrayMapFieldNamesToCodeNames('Workflow Runs', await dataSource.query(sSQL));
|
|
10332
10376
|
return result;
|
|
10333
10377
|
}
|
|
@@ -10536,13 +10580,13 @@ let WorkflowEngineResolver = class WorkflowEngineResolver extends server_1.Resol
|
|
|
10536
10580
|
}
|
|
10537
10581
|
async WorkflowEngine(ID, { dataSource, userPayload }, pubSub) {
|
|
10538
10582
|
this.CheckUserReadPermissions('Workflow Engines', userPayload);
|
|
10539
|
-
const sSQL = `SELECT * FROM [
|
|
10583
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwWorkflowEngines] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Workflow Engines', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10540
10584
|
const result = this.MapFieldNamesToCodeNames('Workflow Engines', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
10541
10585
|
return result;
|
|
10542
10586
|
}
|
|
10543
10587
|
async WorkflowsArray(workflowengine_, { dataSource, userPayload }, pubSub) {
|
|
10544
10588
|
this.CheckUserReadPermissions('Workflows', userPayload);
|
|
10545
|
-
const sSQL = `SELECT * FROM [
|
|
10589
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwWorkflows] WHERE [WorkflowEngineName]=${workflowengine_.ID} ` + this.getRowLevelSecurityWhereClause('Workflows', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10546
10590
|
const result = this.ArrayMapFieldNamesToCodeNames('Workflows', await dataSource.query(sSQL));
|
|
10547
10591
|
return result;
|
|
10548
10592
|
}
|
|
@@ -10774,7 +10818,7 @@ let RecordChangeResolver = class RecordChangeResolver extends server_1.ResolverB
|
|
|
10774
10818
|
}
|
|
10775
10819
|
async RecordChange(ID, { dataSource, userPayload }, pubSub) {
|
|
10776
10820
|
this.CheckUserReadPermissions('Record Changes', userPayload);
|
|
10777
|
-
const sSQL = `SELECT * FROM [
|
|
10821
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwRecordChanges] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Record Changes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10778
10822
|
const result = this.MapFieldNamesToCodeNames('Record Changes', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
10779
10823
|
return result;
|
|
10780
10824
|
}
|
|
@@ -10943,13 +10987,13 @@ let UserRoleResolver = class UserRoleResolver extends server_1.ResolverBase {
|
|
|
10943
10987
|
}
|
|
10944
10988
|
async UserRole(ID, { dataSource, userPayload }, pubSub) {
|
|
10945
10989
|
this.CheckUserReadPermissions('User Roles', userPayload);
|
|
10946
|
-
const sSQL = `SELECT * FROM [
|
|
10990
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserRoles] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10947
10991
|
const result = this.MapFieldNamesToCodeNames('User Roles', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
10948
10992
|
return result;
|
|
10949
10993
|
}
|
|
10950
10994
|
async AllUserRoles({ dataSource, userPayload }, pubSub) {
|
|
10951
10995
|
this.CheckUserReadPermissions('User Roles', userPayload);
|
|
10952
|
-
const sSQL =
|
|
10996
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserRoles]` + this.getRowLevelSecurityWhereClause('User Roles', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
10953
10997
|
const result = this.ArrayMapFieldNamesToCodeNames('User Roles', await dataSource.query(sSQL));
|
|
10954
10998
|
return result;
|
|
10955
10999
|
}
|
|
@@ -11115,19 +11159,19 @@ let RowLevelSecurityFilterResolver = class RowLevelSecurityFilterResolver extend
|
|
|
11115
11159
|
}
|
|
11116
11160
|
async RowLevelSecurityFilter(ID, { dataSource, userPayload }, pubSub) {
|
|
11117
11161
|
this.CheckUserReadPermissions('Row Level Security Filters', userPayload);
|
|
11118
|
-
const sSQL = `SELECT * FROM [
|
|
11162
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwRowLevelSecurityFilters] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Row Level Security Filters', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11119
11163
|
const result = this.MapFieldNamesToCodeNames('Row Level Security Filters', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
11120
11164
|
return result;
|
|
11121
11165
|
}
|
|
11122
11166
|
async AllRowLevelSecurityFilters({ dataSource, userPayload }, pubSub) {
|
|
11123
11167
|
this.CheckUserReadPermissions('Row Level Security Filters', userPayload);
|
|
11124
|
-
const sSQL =
|
|
11168
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwRowLevelSecurityFilters]` + this.getRowLevelSecurityWhereClause('Row Level Security Filters', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
11125
11169
|
const result = this.ArrayMapFieldNamesToCodeNames('Row Level Security Filters', await dataSource.query(sSQL));
|
|
11126
11170
|
return result;
|
|
11127
11171
|
}
|
|
11128
11172
|
async EntityPermissionsArray(rowlevelsecurityfilter_, { dataSource, userPayload }, pubSub) {
|
|
11129
11173
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
11130
|
-
const sSQL = `SELECT * FROM [
|
|
11174
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityPermissions] WHERE [ReadRLSFilterID]=${rowlevelsecurityfilter_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11131
11175
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL));
|
|
11132
11176
|
return result;
|
|
11133
11177
|
}
|
|
@@ -11247,6 +11291,11 @@ __decorate([
|
|
|
11247
11291
|
(0, class_validator_1.MaxLength)(200),
|
|
11248
11292
|
__metadata("design:type", String)
|
|
11249
11293
|
], AuditLog_.prototype, "User", void 0);
|
|
11294
|
+
__decorate([
|
|
11295
|
+
(0, server_1.Field)({ nullable: true }),
|
|
11296
|
+
(0, class_validator_1.MaxLength)(510),
|
|
11297
|
+
__metadata("design:type", String)
|
|
11298
|
+
], AuditLog_.prototype, "Entity", void 0);
|
|
11250
11299
|
exports.AuditLog_ = AuditLog_ = __decorate([
|
|
11251
11300
|
(0, server_1.ObjectType)()
|
|
11252
11301
|
], AuditLog_);
|
|
@@ -11377,7 +11426,7 @@ let AuditLogResolver = class AuditLogResolver extends server_1.ResolverBase {
|
|
|
11377
11426
|
}
|
|
11378
11427
|
async AuditLog(ID, { dataSource, userPayload }, pubSub) {
|
|
11379
11428
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
11380
|
-
const sSQL = `SELECT * FROM [
|
|
11429
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuditLogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11381
11430
|
const result = this.MapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
11382
11431
|
return result;
|
|
11383
11432
|
}
|
|
@@ -11585,37 +11634,37 @@ let AuthorizationResolver = class AuthorizationResolver extends server_1.Resolve
|
|
|
11585
11634
|
}
|
|
11586
11635
|
async Authorization(ID, { dataSource, userPayload }, pubSub) {
|
|
11587
11636
|
this.CheckUserReadPermissions('Authorizations', userPayload);
|
|
11588
|
-
const sSQL = `SELECT * FROM [
|
|
11637
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuthorizations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Authorizations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11589
11638
|
const result = this.MapFieldNamesToCodeNames('Authorizations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
11590
11639
|
return result;
|
|
11591
11640
|
}
|
|
11592
11641
|
async AllAuthorizations({ dataSource, userPayload }, pubSub) {
|
|
11593
11642
|
this.CheckUserReadPermissions('Authorizations', userPayload);
|
|
11594
|
-
const sSQL =
|
|
11643
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuthorizations]` + this.getRowLevelSecurityWhereClause('Authorizations', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
11595
11644
|
const result = this.ArrayMapFieldNamesToCodeNames('Authorizations', await dataSource.query(sSQL));
|
|
11596
11645
|
return result;
|
|
11597
11646
|
}
|
|
11598
11647
|
async AuthorizationRolesArray(authorization_, { dataSource, userPayload }, pubSub) {
|
|
11599
11648
|
this.CheckUserReadPermissions('Authorization Roles', userPayload);
|
|
11600
|
-
const sSQL = `SELECT * FROM [
|
|
11649
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuthorizationRoles] WHERE [AuthorizationID]=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Authorization Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11601
11650
|
const result = this.ArrayMapFieldNamesToCodeNames('Authorization Roles', await dataSource.query(sSQL));
|
|
11602
11651
|
return result;
|
|
11603
11652
|
}
|
|
11604
11653
|
async AuthorizationsArray(authorization_, { dataSource, userPayload }, pubSub) {
|
|
11605
11654
|
this.CheckUserReadPermissions('Authorizations', userPayload);
|
|
11606
|
-
const sSQL = `SELECT * FROM [
|
|
11655
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuthorizations] WHERE [ParentID]=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Authorizations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11607
11656
|
const result = this.ArrayMapFieldNamesToCodeNames('Authorizations', await dataSource.query(sSQL));
|
|
11608
11657
|
return result;
|
|
11609
11658
|
}
|
|
11610
11659
|
async AuditLogTypesArray(authorization_, { dataSource, userPayload }, pubSub) {
|
|
11611
11660
|
this.CheckUserReadPermissions('Audit Log Types', userPayload);
|
|
11612
|
-
const sSQL = `SELECT * FROM [
|
|
11661
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuditLogTypes] WHERE [AuthorizationName]=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Log Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11613
11662
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Log Types', await dataSource.query(sSQL));
|
|
11614
11663
|
return result;
|
|
11615
11664
|
}
|
|
11616
11665
|
async AuditLogsArray(authorization_, { dataSource, userPayload }, pubSub) {
|
|
11617
11666
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
11618
|
-
const sSQL = `SELECT * FROM [
|
|
11667
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuditLogs] WHERE [AuthorizationName]=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11619
11668
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL));
|
|
11620
11669
|
return result;
|
|
11621
11670
|
}
|
|
@@ -11786,13 +11835,13 @@ let AuthorizationRoleResolver = class AuthorizationRoleResolver extends server_1
|
|
|
11786
11835
|
}
|
|
11787
11836
|
async AuthorizationRole(ID, { dataSource, userPayload }, pubSub) {
|
|
11788
11837
|
this.CheckUserReadPermissions('Authorization Roles', userPayload);
|
|
11789
|
-
const sSQL = `SELECT * FROM [
|
|
11838
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuthorizationRoles] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Authorization Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11790
11839
|
const result = this.MapFieldNamesToCodeNames('Authorization Roles', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
11791
11840
|
return result;
|
|
11792
11841
|
}
|
|
11793
11842
|
async AllAuthorizationRoles({ dataSource, userPayload }, pubSub) {
|
|
11794
11843
|
this.CheckUserReadPermissions('Authorization Roles', userPayload);
|
|
11795
|
-
const sSQL =
|
|
11844
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuthorizationRoles]` + this.getRowLevelSecurityWhereClause('Authorization Roles', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
11796
11845
|
const result = this.ArrayMapFieldNamesToCodeNames('Authorization Roles', await dataSource.query(sSQL));
|
|
11797
11846
|
return result;
|
|
11798
11847
|
}
|
|
@@ -11943,25 +11992,25 @@ let AuditLogTypeResolver = class AuditLogTypeResolver extends server_1.ResolverB
|
|
|
11943
11992
|
}
|
|
11944
11993
|
async AuditLogType(ID, { dataSource, userPayload }, pubSub) {
|
|
11945
11994
|
this.CheckUserReadPermissions('Audit Log Types', userPayload);
|
|
11946
|
-
const sSQL = `SELECT * FROM [
|
|
11995
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuditLogTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Audit Log Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11947
11996
|
const result = this.MapFieldNamesToCodeNames('Audit Log Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
11948
11997
|
return result;
|
|
11949
11998
|
}
|
|
11950
11999
|
async AllAuditLogTypes({ dataSource, userPayload }, pubSub) {
|
|
11951
12000
|
this.CheckUserReadPermissions('Audit Log Types', userPayload);
|
|
11952
|
-
const sSQL =
|
|
12001
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuditLogTypes]` + this.getRowLevelSecurityWhereClause('Audit Log Types', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
11953
12002
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Log Types', await dataSource.query(sSQL));
|
|
11954
12003
|
return result;
|
|
11955
12004
|
}
|
|
11956
12005
|
async AuditLogsArray(auditlogtype_, { dataSource, userPayload }, pubSub) {
|
|
11957
12006
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
11958
|
-
const sSQL = `SELECT * FROM [
|
|
12007
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuditLogs] WHERE [AuditLogTypeName]=${auditlogtype_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11959
12008
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL));
|
|
11960
12009
|
return result;
|
|
11961
12010
|
}
|
|
11962
12011
|
async AuditLogTypesArray(auditlogtype_, { dataSource, userPayload }, pubSub) {
|
|
11963
12012
|
this.CheckUserReadPermissions('Audit Log Types', userPayload);
|
|
11964
|
-
const sSQL = `SELECT * FROM [
|
|
12013
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuditLogTypes] WHERE [ParentID]=${auditlogtype_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Log Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11965
12014
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Log Types', await dataSource.query(sSQL));
|
|
11966
12015
|
return result;
|
|
11967
12016
|
}
|
|
@@ -12131,13 +12180,13 @@ let EntityFieldValueResolver = class EntityFieldValueResolver extends server_1.R
|
|
|
12131
12180
|
}
|
|
12132
12181
|
async EntityFieldValue(ID, { dataSource, userPayload }, pubSub) {
|
|
12133
12182
|
this.CheckUserReadPermissions('Entity Field Values', userPayload);
|
|
12134
|
-
const sSQL = `SELECT * FROM [
|
|
12183
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityFieldValues] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Field Values', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12135
12184
|
const result = this.MapFieldNamesToCodeNames('Entity Field Values', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
12136
12185
|
return result;
|
|
12137
12186
|
}
|
|
12138
12187
|
async AllEntityFieldValues({ dataSource, userPayload }, pubSub) {
|
|
12139
12188
|
this.CheckUserReadPermissions('Entity Field Values', userPayload);
|
|
12140
|
-
const sSQL =
|
|
12189
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityFieldValues]` + this.getRowLevelSecurityWhereClause('Entity Field Values', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12141
12190
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Field Values', await dataSource.query(sSQL));
|
|
12142
12191
|
return result;
|
|
12143
12192
|
}
|
|
@@ -12343,37 +12392,37 @@ let AIModelResolver = class AIModelResolver extends server_1.ResolverBase {
|
|
|
12343
12392
|
}
|
|
12344
12393
|
async AIModel(ID, { dataSource, userPayload }, pubSub) {
|
|
12345
12394
|
this.CheckUserReadPermissions('AI Models', userPayload);
|
|
12346
|
-
const sSQL = `SELECT * FROM [
|
|
12395
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAIModels] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('AI Models', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12347
12396
|
const result = this.MapFieldNamesToCodeNames('AI Models', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
12348
12397
|
return result;
|
|
12349
12398
|
}
|
|
12350
12399
|
async AllAIModels({ dataSource, userPayload }, pubSub) {
|
|
12351
12400
|
this.CheckUserReadPermissions('AI Models', userPayload);
|
|
12352
|
-
const sSQL =
|
|
12401
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAIModels]` + this.getRowLevelSecurityWhereClause('AI Models', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12353
12402
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Models', await dataSource.query(sSQL));
|
|
12354
12403
|
return result;
|
|
12355
12404
|
}
|
|
12356
12405
|
async AIActionsArray(aimodel_, { dataSource, userPayload }, pubSub) {
|
|
12357
12406
|
this.CheckUserReadPermissions('AI Actions', userPayload);
|
|
12358
|
-
const sSQL = `SELECT * FROM [
|
|
12407
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAIActions] WHERE [DefaultModelID]=${aimodel_.ID} ` + this.getRowLevelSecurityWhereClause('AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12359
12408
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Actions', await dataSource.query(sSQL));
|
|
12360
12409
|
return result;
|
|
12361
12410
|
}
|
|
12362
12411
|
async AIModelActionsArray(aimodel_, { dataSource, userPayload }, pubSub) {
|
|
12363
12412
|
this.CheckUserReadPermissions('AI Model Actions', userPayload);
|
|
12364
|
-
const sSQL = `SELECT * FROM [
|
|
12413
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAIModelActions] WHERE [AIModelID]=${aimodel_.ID} ` + this.getRowLevelSecurityWhereClause('AI Model Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12365
12414
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Model Actions', await dataSource.query(sSQL));
|
|
12366
12415
|
return result;
|
|
12367
12416
|
}
|
|
12368
12417
|
async EntityAIActionsArray(aimodel_, { dataSource, userPayload }, pubSub) {
|
|
12369
12418
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
12370
|
-
const sSQL = `SELECT * FROM [
|
|
12419
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityAIActions] WHERE [AIModelID]=${aimodel_.ID} ` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12371
12420
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL));
|
|
12372
12421
|
return result;
|
|
12373
12422
|
}
|
|
12374
12423
|
async VectorIndexesArray(aimodel_, { dataSource, userPayload }, pubSub) {
|
|
12375
12424
|
this.CheckUserReadPermissions('Vector Indexes', userPayload);
|
|
12376
|
-
const sSQL = `SELECT * FROM [
|
|
12425
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwVectorIndexes] WHERE [EmbeddingModelID]=${aimodel_.ID} ` + this.getRowLevelSecurityWhereClause('Vector Indexes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12377
12426
|
const result = this.ArrayMapFieldNamesToCodeNames('Vector Indexes', await dataSource.query(sSQL));
|
|
12378
12427
|
return result;
|
|
12379
12428
|
}
|
|
@@ -12623,25 +12672,25 @@ let AIActionResolver = class AIActionResolver extends server_1.ResolverBase {
|
|
|
12623
12672
|
}
|
|
12624
12673
|
async AIAction(ID, { dataSource, userPayload }, pubSub) {
|
|
12625
12674
|
this.CheckUserReadPermissions('AI Actions', userPayload);
|
|
12626
|
-
const sSQL = `SELECT * FROM [
|
|
12675
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAIActions] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12627
12676
|
const result = this.MapFieldNamesToCodeNames('AI Actions', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
12628
12677
|
return result;
|
|
12629
12678
|
}
|
|
12630
12679
|
async AllAIActions({ dataSource, userPayload }, pubSub) {
|
|
12631
12680
|
this.CheckUserReadPermissions('AI Actions', userPayload);
|
|
12632
|
-
const sSQL =
|
|
12681
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAIActions]` + this.getRowLevelSecurityWhereClause('AI Actions', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12633
12682
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Actions', await dataSource.query(sSQL));
|
|
12634
12683
|
return result;
|
|
12635
12684
|
}
|
|
12636
12685
|
async AIModelActionsArray(aiaction_, { dataSource, userPayload }, pubSub) {
|
|
12637
12686
|
this.CheckUserReadPermissions('AI Model Actions', userPayload);
|
|
12638
|
-
const sSQL = `SELECT * FROM [
|
|
12687
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAIModelActions] WHERE [AIActionID]=${aiaction_.ID} ` + this.getRowLevelSecurityWhereClause('AI Model Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12639
12688
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Model Actions', await dataSource.query(sSQL));
|
|
12640
12689
|
return result;
|
|
12641
12690
|
}
|
|
12642
12691
|
async EntityAIActionsArray(aiaction_, { dataSource, userPayload }, pubSub) {
|
|
12643
12692
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
12644
|
-
const sSQL = `SELECT * FROM [
|
|
12693
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityAIActions] WHERE [AIActionID]=${aiaction_.ID} ` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12645
12694
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL));
|
|
12646
12695
|
return result;
|
|
12647
12696
|
}
|
|
@@ -12853,13 +12902,13 @@ let AIModelActionResolver = class AIModelActionResolver extends server_1.Resolve
|
|
|
12853
12902
|
}
|
|
12854
12903
|
async AIModelAction(ID, { dataSource, userPayload }, pubSub) {
|
|
12855
12904
|
this.CheckUserReadPermissions('AI Model Actions', userPayload);
|
|
12856
|
-
const sSQL = `SELECT * FROM [
|
|
12905
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAIModelActions] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('AI Model Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12857
12906
|
const result = this.MapFieldNamesToCodeNames('AI Model Actions', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
12858
12907
|
return result;
|
|
12859
12908
|
}
|
|
12860
12909
|
async AllAIModelActions({ dataSource, userPayload }, pubSub) {
|
|
12861
12910
|
this.CheckUserReadPermissions('AI Model Actions', userPayload);
|
|
12862
|
-
const sSQL =
|
|
12911
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAIModelActions]` + this.getRowLevelSecurityWhereClause('AI Model Actions', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12863
12912
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Model Actions', await dataSource.query(sSQL));
|
|
12864
12913
|
return result;
|
|
12865
12914
|
}
|
|
@@ -13129,13 +13178,13 @@ let EntityAIActionResolver = class EntityAIActionResolver extends server_1.Resol
|
|
|
13129
13178
|
}
|
|
13130
13179
|
async EntityAIAction(ID, { dataSource, userPayload }, pubSub) {
|
|
13131
13180
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
13132
|
-
const sSQL = `SELECT * FROM [
|
|
13181
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityAIActions] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13133
13182
|
const result = this.MapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
13134
13183
|
return result;
|
|
13135
13184
|
}
|
|
13136
13185
|
async AllEntityAIActions({ dataSource, userPayload }, pubSub) {
|
|
13137
13186
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
13138
|
-
const sSQL =
|
|
13187
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityAIActions]` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
13139
13188
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL));
|
|
13140
13189
|
return result;
|
|
13141
13190
|
}
|
|
@@ -13306,19 +13355,19 @@ let AIModelTypeResolver = class AIModelTypeResolver extends server_1.ResolverBas
|
|
|
13306
13355
|
}
|
|
13307
13356
|
async AIModelType(ID, { dataSource, userPayload }, pubSub) {
|
|
13308
13357
|
this.CheckUserReadPermissions('AI Model Types', userPayload);
|
|
13309
|
-
const sSQL = `SELECT * FROM [
|
|
13358
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAIModelTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('AI Model Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13310
13359
|
const result = this.MapFieldNamesToCodeNames('AI Model Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
13311
13360
|
return result;
|
|
13312
13361
|
}
|
|
13313
13362
|
async AllAIModelTypes({ dataSource, userPayload }, pubSub) {
|
|
13314
13363
|
this.CheckUserReadPermissions('AI Model Types', userPayload);
|
|
13315
|
-
const sSQL =
|
|
13364
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAIModelTypes]` + this.getRowLevelSecurityWhereClause('AI Model Types', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
13316
13365
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Model Types', await dataSource.query(sSQL));
|
|
13317
13366
|
return result;
|
|
13318
13367
|
}
|
|
13319
13368
|
async AIModelsArray(aimodeltype_, { dataSource, userPayload }, pubSub) {
|
|
13320
13369
|
this.CheckUserReadPermissions('AI Models', userPayload);
|
|
13321
|
-
const sSQL = `SELECT * FROM [
|
|
13370
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAIModels] WHERE [AIModelTypeID]=${aimodeltype_.ID} ` + this.getRowLevelSecurityWhereClause('AI Models', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13322
13371
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Models', await dataSource.query(sSQL));
|
|
13323
13372
|
return result;
|
|
13324
13373
|
}
|
|
@@ -13494,13 +13543,13 @@ let QueueTypeResolver = class QueueTypeResolver extends server_1.ResolverBase {
|
|
|
13494
13543
|
}
|
|
13495
13544
|
async QueueType(ID, { dataSource, userPayload }, pubSub) {
|
|
13496
13545
|
this.CheckUserReadPermissions('Queue Types', userPayload);
|
|
13497
|
-
const sSQL = `SELECT * FROM [
|
|
13546
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwQueueTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Queue Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13498
13547
|
const result = this.MapFieldNamesToCodeNames('Queue Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
13499
13548
|
return result;
|
|
13500
13549
|
}
|
|
13501
13550
|
async QueuesArray(queuetype_, { dataSource, userPayload }, pubSub) {
|
|
13502
13551
|
this.CheckUserReadPermissions('Queues', userPayload);
|
|
13503
|
-
const sSQL = `SELECT * FROM [
|
|
13552
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwQueues] WHERE [QueueTypeID]=${queuetype_.ID} ` + this.getRowLevelSecurityWhereClause('Queues', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13504
13553
|
const result = this.ArrayMapFieldNamesToCodeNames('Queues', await dataSource.query(sSQL));
|
|
13505
13554
|
return result;
|
|
13506
13555
|
}
|
|
@@ -13850,13 +13899,13 @@ let QueueResolver = class QueueResolver extends server_1.ResolverBase {
|
|
|
13850
13899
|
}
|
|
13851
13900
|
async Queue(ID, { dataSource, userPayload }, pubSub) {
|
|
13852
13901
|
this.CheckUserReadPermissions('Queues', userPayload);
|
|
13853
|
-
const sSQL = `SELECT * FROM [
|
|
13902
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwQueues] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Queues', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13854
13903
|
const result = this.MapFieldNamesToCodeNames('Queues', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
13855
13904
|
return result;
|
|
13856
13905
|
}
|
|
13857
13906
|
async QueueTasksArray(queue_, { dataSource, userPayload }, pubSub) {
|
|
13858
13907
|
this.CheckUserReadPermissions('Queue Tasks', userPayload);
|
|
13859
|
-
const sSQL = `SELECT * FROM [
|
|
13908
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwQueueTasks] WHERE [QueueID]=${queue_.ID} ` + this.getRowLevelSecurityWhereClause('Queue Tasks', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13860
13909
|
const result = this.ArrayMapFieldNamesToCodeNames('Queue Tasks', await dataSource.query(sSQL));
|
|
13861
13910
|
return result;
|
|
13862
13911
|
}
|
|
@@ -14153,7 +14202,7 @@ let QueueTaskResolver = class QueueTaskResolver extends server_1.ResolverBase {
|
|
|
14153
14202
|
}
|
|
14154
14203
|
async QueueTask(ID, { dataSource, userPayload }, pubSub) {
|
|
14155
14204
|
this.CheckUserReadPermissions('Queue Tasks', userPayload);
|
|
14156
|
-
const sSQL = `SELECT * FROM [
|
|
14205
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwQueueTasks] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Queue Tasks', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14157
14206
|
const result = this.MapFieldNamesToCodeNames('Queue Tasks', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
14158
14207
|
return result;
|
|
14159
14208
|
}
|
|
@@ -14401,7 +14450,7 @@ let DashboardResolver = class DashboardResolver extends server_1.ResolverBase {
|
|
|
14401
14450
|
}
|
|
14402
14451
|
async Dashboard(ID, { dataSource, userPayload }, pubSub) {
|
|
14403
14452
|
this.CheckUserReadPermissions('Dashboards', userPayload);
|
|
14404
|
-
const sSQL = `SELECT * FROM [
|
|
14453
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDashboards] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Dashboards', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14405
14454
|
this.createRecordAccessAuditLogRecord(userPayload, 'Dashboards', ID);
|
|
14406
14455
|
const result = this.MapFieldNamesToCodeNames('Dashboards', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
14407
14456
|
return result;
|
|
@@ -14607,14 +14656,14 @@ let OutputTriggerTypeResolver = class OutputTriggerTypeResolver extends server_1
|
|
|
14607
14656
|
}
|
|
14608
14657
|
async OutputTriggerType(ID, { dataSource, userPayload }, pubSub) {
|
|
14609
14658
|
this.CheckUserReadPermissions('Output Trigger Types', userPayload);
|
|
14610
|
-
const sSQL = `SELECT * FROM [
|
|
14659
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwOutputTriggerTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Output Trigger Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14611
14660
|
this.createRecordAccessAuditLogRecord(userPayload, 'Output Trigger Types', ID);
|
|
14612
14661
|
const result = this.MapFieldNamesToCodeNames('Output Trigger Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
14613
14662
|
return result;
|
|
14614
14663
|
}
|
|
14615
14664
|
async ReportsArray(outputtriggertype_, { dataSource, userPayload }, pubSub) {
|
|
14616
14665
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
14617
|
-
const sSQL = `SELECT * FROM [
|
|
14666
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwReports] WHERE [OutputTriggerTypeID]=${outputtriggertype_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14618
14667
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
14619
14668
|
return result;
|
|
14620
14669
|
}
|
|
@@ -14742,14 +14791,14 @@ let OutputFormatTypeResolver = class OutputFormatTypeResolver extends server_1.R
|
|
|
14742
14791
|
}
|
|
14743
14792
|
async OutputFormatType(ID, { dataSource, userPayload }, pubSub) {
|
|
14744
14793
|
this.CheckUserReadPermissions('Output Format Types', userPayload);
|
|
14745
|
-
const sSQL = `SELECT * FROM [
|
|
14794
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwOutputFormatTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Output Format Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14746
14795
|
this.createRecordAccessAuditLogRecord(userPayload, 'Output Format Types', ID);
|
|
14747
14796
|
const result = this.MapFieldNamesToCodeNames('Output Format Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
14748
14797
|
return result;
|
|
14749
14798
|
}
|
|
14750
14799
|
async ReportsArray(outputformattype_, { dataSource, userPayload }, pubSub) {
|
|
14751
14800
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
14752
|
-
const sSQL = `SELECT * FROM [
|
|
14801
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwReports] WHERE [OutputFormatTypeID]=${outputformattype_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14753
14802
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
14754
14803
|
return result;
|
|
14755
14804
|
}
|
|
@@ -14873,14 +14922,14 @@ let OutputDeliveryTypeResolver = class OutputDeliveryTypeResolver extends server
|
|
|
14873
14922
|
}
|
|
14874
14923
|
async OutputDeliveryType(ID, { dataSource, userPayload }, pubSub) {
|
|
14875
14924
|
this.CheckUserReadPermissions('Output Delivery Types', userPayload);
|
|
14876
|
-
const sSQL = `SELECT * FROM [
|
|
14925
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwOutputDeliveryTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Output Delivery Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14877
14926
|
this.createRecordAccessAuditLogRecord(userPayload, 'Output Delivery Types', ID);
|
|
14878
14927
|
const result = this.MapFieldNamesToCodeNames('Output Delivery Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
14879
14928
|
return result;
|
|
14880
14929
|
}
|
|
14881
14930
|
async ReportsArray(outputdeliverytype_, { dataSource, userPayload }, pubSub) {
|
|
14882
14931
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
14883
|
-
const sSQL = `SELECT * FROM [
|
|
14932
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwReports] WHERE [OutputDeliveryTypeID]=${outputdeliverytype_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14884
14933
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
14885
14934
|
return result;
|
|
14886
14935
|
}
|
|
@@ -15257,13 +15306,13 @@ let ReportResolver = class ReportResolver extends server_1.ResolverBase {
|
|
|
15257
15306
|
}
|
|
15258
15307
|
async Report(ID, { dataSource, userPayload }, pubSub) {
|
|
15259
15308
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
15260
|
-
const sSQL = `SELECT * FROM [
|
|
15309
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwReports] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15261
15310
|
const result = this.MapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
15262
15311
|
return result;
|
|
15263
15312
|
}
|
|
15264
15313
|
async ReportSnapshotsArray(report_, { dataSource, userPayload }, pubSub) {
|
|
15265
15314
|
this.CheckUserReadPermissions('Report Snapshots', userPayload);
|
|
15266
|
-
const sSQL = `SELECT * FROM [
|
|
15315
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwReportSnapshots] WHERE [ReportID]=${report_.ID} ` + this.getRowLevelSecurityWhereClause('Report Snapshots', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15267
15316
|
const result = this.ArrayMapFieldNamesToCodeNames('Report Snapshots', await dataSource.query(sSQL));
|
|
15268
15317
|
return result;
|
|
15269
15318
|
}
|
|
@@ -15531,7 +15580,7 @@ let ReportSnapshotResolver = class ReportSnapshotResolver extends server_1.Resol
|
|
|
15531
15580
|
}
|
|
15532
15581
|
async ReportSnapshot(ID, { dataSource, userPayload }, pubSub) {
|
|
15533
15582
|
this.CheckUserReadPermissions('Report Snapshots', userPayload);
|
|
15534
|
-
const sSQL = `SELECT * FROM [
|
|
15583
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwReportSnapshots] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Report Snapshots', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15535
15584
|
const result = this.MapFieldNamesToCodeNames('Report Snapshots', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
15536
15585
|
return result;
|
|
15537
15586
|
}
|
|
@@ -15765,14 +15814,14 @@ let ResourceTypeResolver = class ResourceTypeResolver extends server_1.ResolverB
|
|
|
15765
15814
|
}
|
|
15766
15815
|
async ResourceType(ID, { dataSource, userPayload }, pubSub) {
|
|
15767
15816
|
this.CheckUserReadPermissions('Resource Types', userPayload);
|
|
15768
|
-
const sSQL = `SELECT * FROM [
|
|
15817
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwResourceTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Resource Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15769
15818
|
this.createRecordAccessAuditLogRecord(userPayload, 'Resource Types', ID);
|
|
15770
15819
|
const result = this.MapFieldNamesToCodeNames('Resource Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
15771
15820
|
return result;
|
|
15772
15821
|
}
|
|
15773
15822
|
async WorkspaceItemsArray(resourcetype_, { dataSource, userPayload }, pubSub) {
|
|
15774
15823
|
this.CheckUserReadPermissions('Workspace Items', userPayload);
|
|
15775
|
-
const sSQL = `SELECT * FROM [
|
|
15824
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwWorkspaceItems] WHERE [ResourceTypeID]=${resourcetype_.ID} ` + this.getRowLevelSecurityWhereClause('Workspace Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15776
15825
|
const result = this.ArrayMapFieldNamesToCodeNames('Workspace Items', await dataSource.query(sSQL));
|
|
15777
15826
|
return result;
|
|
15778
15827
|
}
|
|
@@ -15914,20 +15963,20 @@ let TagResolver = class TagResolver extends server_1.ResolverBase {
|
|
|
15914
15963
|
}
|
|
15915
15964
|
async Tag(ID, { dataSource, userPayload }, pubSub) {
|
|
15916
15965
|
this.CheckUserReadPermissions('Tags', userPayload);
|
|
15917
|
-
const sSQL = `SELECT * FROM [
|
|
15966
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwTags] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Tags', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15918
15967
|
this.createRecordAccessAuditLogRecord(userPayload, 'Tags', ID);
|
|
15919
15968
|
const result = this.MapFieldNamesToCodeNames('Tags', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
15920
15969
|
return result;
|
|
15921
15970
|
}
|
|
15922
15971
|
async TagsArray(tag_, { dataSource, userPayload }, pubSub) {
|
|
15923
15972
|
this.CheckUserReadPermissions('Tags', userPayload);
|
|
15924
|
-
const sSQL = `SELECT * FROM [
|
|
15973
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwTags] WHERE [ParentID]=${tag_.ID} ` + this.getRowLevelSecurityWhereClause('Tags', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15925
15974
|
const result = this.ArrayMapFieldNamesToCodeNames('Tags', await dataSource.query(sSQL));
|
|
15926
15975
|
return result;
|
|
15927
15976
|
}
|
|
15928
15977
|
async TaggedItemsArray(tag_, { dataSource, userPayload }, pubSub) {
|
|
15929
15978
|
this.CheckUserReadPermissions('Tagged Items', userPayload);
|
|
15930
|
-
const sSQL = `SELECT * FROM [
|
|
15979
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwTaggedItems] WHERE [TagID]=${tag_.ID} ` + this.getRowLevelSecurityWhereClause('Tagged Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15931
15980
|
const result = this.ArrayMapFieldNamesToCodeNames('Tagged Items', await dataSource.query(sSQL));
|
|
15932
15981
|
return result;
|
|
15933
15982
|
}
|
|
@@ -16015,6 +16064,11 @@ __decorate([
|
|
|
16015
16064
|
(0, class_validator_1.MaxLength)(510),
|
|
16016
16065
|
__metadata("design:type", String)
|
|
16017
16066
|
], TaggedItem_.prototype, "Tag", void 0);
|
|
16067
|
+
__decorate([
|
|
16068
|
+
(0, server_1.Field)(),
|
|
16069
|
+
(0, class_validator_1.MaxLength)(510),
|
|
16070
|
+
__metadata("design:type", String)
|
|
16071
|
+
], TaggedItem_.prototype, "Entity", void 0);
|
|
16018
16072
|
exports.TaggedItem_ = TaggedItem_ = __decorate([
|
|
16019
16073
|
(0, server_1.ObjectType)()
|
|
16020
16074
|
], TaggedItem_);
|
|
@@ -16065,7 +16119,7 @@ let TaggedItemResolver = class TaggedItemResolver extends server_1.ResolverBase
|
|
|
16065
16119
|
}
|
|
16066
16120
|
async TaggedItem(ID, { dataSource, userPayload }, pubSub) {
|
|
16067
16121
|
this.CheckUserReadPermissions('Tagged Items', userPayload);
|
|
16068
|
-
const sSQL = `SELECT * FROM [
|
|
16122
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwTaggedItems] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Tagged Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16069
16123
|
this.createRecordAccessAuditLogRecord(userPayload, 'Tagged Items', ID);
|
|
16070
16124
|
const result = this.MapFieldNamesToCodeNames('Tagged Items', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
16071
16125
|
return result;
|
|
@@ -16230,14 +16284,14 @@ let WorkspaceResolver = class WorkspaceResolver extends server_1.ResolverBase {
|
|
|
16230
16284
|
}
|
|
16231
16285
|
async Workspace(ID, { dataSource, userPayload }, pubSub) {
|
|
16232
16286
|
this.CheckUserReadPermissions('Workspaces', userPayload);
|
|
16233
|
-
const sSQL = `SELECT * FROM [
|
|
16287
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwWorkspaces] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Workspaces', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16234
16288
|
this.createRecordAccessAuditLogRecord(userPayload, 'Workspaces', ID);
|
|
16235
16289
|
const result = this.MapFieldNamesToCodeNames('Workspaces', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
16236
16290
|
return result;
|
|
16237
16291
|
}
|
|
16238
16292
|
async WorkspaceItemsArray(workspace_, { dataSource, userPayload }, pubSub) {
|
|
16239
16293
|
this.CheckUserReadPermissions('Workspace Items', userPayload);
|
|
16240
|
-
const sSQL = `SELECT * FROM [
|
|
16294
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwWorkspaceItems] WHERE [WorkSpaceID]=${workspace_.ID} ` + this.getRowLevelSecurityWhereClause('Workspace Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16241
16295
|
const result = this.ArrayMapFieldNamesToCodeNames('Workspace Items', await dataSource.query(sSQL));
|
|
16242
16296
|
return result;
|
|
16243
16297
|
}
|
|
@@ -16550,7 +16604,7 @@ let WorkspaceItemResolver = class WorkspaceItemResolver extends server_1.Resolve
|
|
|
16550
16604
|
}
|
|
16551
16605
|
async WorkspaceItem(ID, { dataSource, userPayload }, pubSub) {
|
|
16552
16606
|
this.CheckUserReadPermissions('Workspace Items', userPayload);
|
|
16553
|
-
const sSQL = `SELECT * FROM [
|
|
16607
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwWorkspaceItems] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Workspace Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16554
16608
|
this.createRecordAccessAuditLogRecord(userPayload, 'Workspace Items', ID);
|
|
16555
16609
|
const result = this.MapFieldNamesToCodeNames('Workspace Items', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
16556
16610
|
return result;
|
|
@@ -16766,13 +16820,13 @@ let DatasetResolver = class DatasetResolver extends server_1.ResolverBase {
|
|
|
16766
16820
|
}
|
|
16767
16821
|
async Dataset(ID, { dataSource, userPayload }, pubSub) {
|
|
16768
16822
|
this.CheckUserReadPermissions('Datasets', userPayload);
|
|
16769
|
-
const sSQL = `SELECT * FROM [
|
|
16823
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDatasets] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Datasets', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16770
16824
|
const result = this.MapFieldNamesToCodeNames('Datasets', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
16771
16825
|
return result;
|
|
16772
16826
|
}
|
|
16773
16827
|
async DatasetItemsArray(dataset_, { dataSource, userPayload }, pubSub) {
|
|
16774
16828
|
this.CheckUserReadPermissions('Dataset Items', userPayload);
|
|
16775
|
-
const sSQL = `SELECT * FROM [
|
|
16829
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDatasetItems] WHERE [DatasetName]=${dataset_.ID} ` + this.getRowLevelSecurityWhereClause('Dataset Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16776
16830
|
const result = this.ArrayMapFieldNamesToCodeNames('Dataset Items', await dataSource.query(sSQL));
|
|
16777
16831
|
return result;
|
|
16778
16832
|
}
|
|
@@ -16929,7 +16983,7 @@ let DatasetItemResolver = class DatasetItemResolver extends server_1.ResolverBas
|
|
|
16929
16983
|
}
|
|
16930
16984
|
async DatasetItem(ID, { dataSource, userPayload }, pubSub) {
|
|
16931
16985
|
this.CheckUserReadPermissions('Dataset Items', userPayload);
|
|
16932
|
-
const sSQL = `SELECT * FROM [
|
|
16986
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDatasetItems] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Dataset Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16933
16987
|
const result = this.MapFieldNamesToCodeNames('Dataset Items', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
16934
16988
|
return result;
|
|
16935
16989
|
}
|
|
@@ -17140,13 +17194,13 @@ let ConversationDetailResolver = class ConversationDetailResolver extends server
|
|
|
17140
17194
|
}
|
|
17141
17195
|
async ConversationDetail(ID, { dataSource, userPayload }, pubSub) {
|
|
17142
17196
|
this.CheckUserReadPermissions('Conversation Details', userPayload);
|
|
17143
|
-
const sSQL = `SELECT * FROM [
|
|
17197
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwConversationDetails] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Conversation Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17144
17198
|
const result = this.MapFieldNamesToCodeNames('Conversation Details', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
17145
17199
|
return result;
|
|
17146
17200
|
}
|
|
17147
17201
|
async ReportsArray(conversationdetail_, { dataSource, userPayload }, pubSub) {
|
|
17148
17202
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
17149
|
-
const sSQL = `SELECT * FROM [
|
|
17203
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwReports] WHERE [ConversationDetailID]=${conversationdetail_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17150
17204
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
17151
17205
|
return result;
|
|
17152
17206
|
}
|
|
@@ -17502,19 +17556,19 @@ let ConversationResolver = class ConversationResolver extends server_1.ResolverB
|
|
|
17502
17556
|
}
|
|
17503
17557
|
async Conversation(ID, { dataSource, userPayload }, pubSub) {
|
|
17504
17558
|
this.CheckUserReadPermissions('Conversations', userPayload);
|
|
17505
|
-
const sSQL = `SELECT * FROM [
|
|
17559
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwConversations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Conversations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17506
17560
|
const result = this.MapFieldNamesToCodeNames('Conversations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
17507
17561
|
return result;
|
|
17508
17562
|
}
|
|
17509
17563
|
async ConversationDetailsArray(conversation_, { dataSource, userPayload }, pubSub) {
|
|
17510
17564
|
this.CheckUserReadPermissions('Conversation Details', userPayload);
|
|
17511
|
-
const sSQL = `SELECT * FROM [
|
|
17565
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwConversationDetails] WHERE [ConversationID]=${conversation_.ID} ` + this.getRowLevelSecurityWhereClause('Conversation Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17512
17566
|
const result = this.ArrayMapFieldNamesToCodeNames('Conversation Details', await dataSource.query(sSQL));
|
|
17513
17567
|
return result;
|
|
17514
17568
|
}
|
|
17515
17569
|
async ReportsArray(conversation_, { dataSource, userPayload }, pubSub) {
|
|
17516
17570
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
17517
|
-
const sSQL = `SELECT * FROM [
|
|
17571
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwReports] WHERE [ConversationID]=${conversation_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17518
17572
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
17519
17573
|
return result;
|
|
17520
17574
|
}
|
|
@@ -17853,7 +17907,7 @@ let UserNotificationResolver = class UserNotificationResolver extends server_1.R
|
|
|
17853
17907
|
}
|
|
17854
17908
|
async UserNotification(ID, { dataSource, userPayload }, pubSub) {
|
|
17855
17909
|
this.CheckUserReadPermissions('User Notifications', userPayload);
|
|
17856
|
-
const sSQL = `SELECT * FROM [
|
|
17910
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserNotifications] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Notifications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17857
17911
|
const result = this.MapFieldNamesToCodeNames('User Notifications', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
17858
17912
|
return result;
|
|
17859
17913
|
}
|
|
@@ -18089,7 +18143,7 @@ let SchemaInfoResolver = class SchemaInfoResolver extends server_1.ResolverBase
|
|
|
18089
18143
|
}
|
|
18090
18144
|
async SchemaInfo(ID, { dataSource, userPayload }, pubSub) {
|
|
18091
18145
|
this.CheckUserReadPermissions('Schema Info', userPayload);
|
|
18092
|
-
const sSQL = `SELECT * FROM [
|
|
18146
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwSchemaInfos] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Schema Info', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
18093
18147
|
const result = this.MapFieldNamesToCodeNames('Schema Info', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
18094
18148
|
return result;
|
|
18095
18149
|
}
|
|
@@ -18228,6 +18282,11 @@ __decorate([
|
|
|
18228
18282
|
(0, class_validator_1.MaxLength)(8),
|
|
18229
18283
|
__metadata("design:type", Date)
|
|
18230
18284
|
], CompanyIntegrationRecordMap_.prototype, "UpdatedAt", void 0);
|
|
18285
|
+
__decorate([
|
|
18286
|
+
(0, server_1.Field)(),
|
|
18287
|
+
(0, class_validator_1.MaxLength)(510),
|
|
18288
|
+
__metadata("design:type", String)
|
|
18289
|
+
], CompanyIntegrationRecordMap_.prototype, "Entity", void 0);
|
|
18231
18290
|
exports.CompanyIntegrationRecordMap_ = CompanyIntegrationRecordMap_ = __decorate([
|
|
18232
18291
|
(0, server_1.ObjectType)()
|
|
18233
18292
|
], CompanyIntegrationRecordMap_);
|
|
@@ -18326,7 +18385,7 @@ let CompanyIntegrationRecordMapResolver = class CompanyIntegrationRecordMapResol
|
|
|
18326
18385
|
}
|
|
18327
18386
|
async CompanyIntegrationRecordMap(ID, { dataSource, userPayload }, pubSub) {
|
|
18328
18387
|
this.CheckUserReadPermissions('Company Integration Record Maps', userPayload);
|
|
18329
|
-
const sSQL = `SELECT * FROM [
|
|
18388
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanyIntegrationRecordMaps] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Record Maps', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
18330
18389
|
const result = this.MapFieldNamesToCodeNames('Company Integration Record Maps', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
18331
18390
|
return result;
|
|
18332
18391
|
}
|
|
@@ -18652,13 +18711,13 @@ let RecordMergeLogResolver = class RecordMergeLogResolver extends server_1.Resol
|
|
|
18652
18711
|
}
|
|
18653
18712
|
async RecordMergeLog(ID, { dataSource, userPayload }, pubSub) {
|
|
18654
18713
|
this.CheckUserReadPermissions('Record Merge Logs', userPayload);
|
|
18655
|
-
const sSQL = `SELECT * FROM [
|
|
18714
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwRecordMergeLogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
18656
18715
|
const result = this.MapFieldNamesToCodeNames('Record Merge Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
18657
18716
|
return result;
|
|
18658
18717
|
}
|
|
18659
18718
|
async RecordMergeDeletionLogsArray(recordmergelog_, { dataSource, userPayload }, pubSub) {
|
|
18660
18719
|
this.CheckUserReadPermissions('Record Merge Deletion Logs', userPayload);
|
|
18661
|
-
const sSQL = `SELECT * FROM [
|
|
18720
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwRecordMergeDeletionLogs] WHERE [RecordMergeLogID]=${recordmergelog_.ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Deletion Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
18662
18721
|
const result = this.ArrayMapFieldNamesToCodeNames('Record Merge Deletion Logs', await dataSource.query(sSQL));
|
|
18663
18722
|
return result;
|
|
18664
18723
|
}
|
|
@@ -18904,7 +18963,7 @@ let RecordMergeDeletionLogResolver = class RecordMergeDeletionLogResolver extend
|
|
|
18904
18963
|
}
|
|
18905
18964
|
async RecordMergeDeletionLog(ID, { dataSource, userPayload }, pubSub) {
|
|
18906
18965
|
this.CheckUserReadPermissions('Record Merge Deletion Logs', userPayload);
|
|
18907
|
-
const sSQL = `SELECT * FROM [
|
|
18966
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwRecordMergeDeletionLogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Deletion Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
18908
18967
|
const result = this.MapFieldNamesToCodeNames('Record Merge Deletion Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
18909
18968
|
return result;
|
|
18910
18969
|
}
|
|
@@ -19082,6 +19141,11 @@ __decorate([
|
|
|
19082
19141
|
(0, class_validator_1.MaxLength)(510),
|
|
19083
19142
|
__metadata("design:type", String)
|
|
19084
19143
|
], QueryField_.prototype, "Query", void 0);
|
|
19144
|
+
__decorate([
|
|
19145
|
+
(0, server_1.Field)({ nullable: true }),
|
|
19146
|
+
(0, class_validator_1.MaxLength)(510),
|
|
19147
|
+
__metadata("design:type", String)
|
|
19148
|
+
], QueryField_.prototype, "SourceEntity", void 0);
|
|
19085
19149
|
exports.QueryField_ = QueryField_ = __decorate([
|
|
19086
19150
|
(0, server_1.ObjectType)()
|
|
19087
19151
|
], QueryField_);
|
|
@@ -19244,7 +19308,7 @@ let QueryFieldResolver = class QueryFieldResolver extends server_1.ResolverBase
|
|
|
19244
19308
|
}
|
|
19245
19309
|
async QueryField(ID, { dataSource, userPayload }, pubSub) {
|
|
19246
19310
|
this.CheckUserReadPermissions('Query Fields', userPayload);
|
|
19247
|
-
const sSQL = `SELECT * FROM [
|
|
19311
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwQueryFields] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Query Fields', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19248
19312
|
const result = this.MapFieldNamesToCodeNames('Query Fields', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
19249
19313
|
return result;
|
|
19250
19314
|
}
|
|
@@ -19481,19 +19545,19 @@ let QueryCategoryResolver = class QueryCategoryResolver extends server_1.Resolve
|
|
|
19481
19545
|
}
|
|
19482
19546
|
async QueryCategory(ID, { dataSource, userPayload }, pubSub) {
|
|
19483
19547
|
this.CheckUserReadPermissions('Query Categories', userPayload);
|
|
19484
|
-
const sSQL = `SELECT * FROM [
|
|
19548
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwQueryCategories] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Query Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19485
19549
|
const result = this.MapFieldNamesToCodeNames('Query Categories', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
19486
19550
|
return result;
|
|
19487
19551
|
}
|
|
19488
19552
|
async QueryCategoriesArray(querycategory_, { dataSource, userPayload }, pubSub) {
|
|
19489
19553
|
this.CheckUserReadPermissions('Query Categories', userPayload);
|
|
19490
|
-
const sSQL = `SELECT * FROM [
|
|
19554
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwQueryCategories] WHERE [ParentID]=${querycategory_.ID} ` + this.getRowLevelSecurityWhereClause('Query Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19491
19555
|
const result = this.ArrayMapFieldNamesToCodeNames('Query Categories', await dataSource.query(sSQL));
|
|
19492
19556
|
return result;
|
|
19493
19557
|
}
|
|
19494
19558
|
async QueriesArray(querycategory_, { dataSource, userPayload }, pubSub) {
|
|
19495
19559
|
this.CheckUserReadPermissions('Queries', userPayload);
|
|
19496
|
-
const sSQL = `SELECT * FROM [
|
|
19560
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwQueries] WHERE [CategoryID]=${querycategory_.ID} ` + this.getRowLevelSecurityWhereClause('Queries', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19497
19561
|
const result = this.ArrayMapFieldNamesToCodeNames('Queries', await dataSource.query(sSQL));
|
|
19498
19562
|
return result;
|
|
19499
19563
|
}
|
|
@@ -19813,25 +19877,25 @@ let QueryResolver = class QueryResolver extends server_1.ResolverBase {
|
|
|
19813
19877
|
}
|
|
19814
19878
|
async Query(ID, { dataSource, userPayload }, pubSub) {
|
|
19815
19879
|
this.CheckUserReadPermissions('Queries', userPayload);
|
|
19816
|
-
const sSQL = `SELECT * FROM [
|
|
19880
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwQueries] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Queries', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19817
19881
|
const result = this.MapFieldNamesToCodeNames('Queries', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
19818
19882
|
return result;
|
|
19819
19883
|
}
|
|
19820
19884
|
async QueryFieldsArray(query_, { dataSource, userPayload }, pubSub) {
|
|
19821
19885
|
this.CheckUserReadPermissions('Query Fields', userPayload);
|
|
19822
|
-
const sSQL = `SELECT * FROM [
|
|
19886
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwQueryFields] WHERE [QueryID]=${query_.ID} ` + this.getRowLevelSecurityWhereClause('Query Fields', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19823
19887
|
const result = this.ArrayMapFieldNamesToCodeNames('Query Fields', await dataSource.query(sSQL));
|
|
19824
19888
|
return result;
|
|
19825
19889
|
}
|
|
19826
19890
|
async QueryPermissionsArray(query_, { dataSource, userPayload }, pubSub) {
|
|
19827
19891
|
this.CheckUserReadPermissions('Query Permissions', userPayload);
|
|
19828
|
-
const sSQL = `SELECT * FROM [
|
|
19892
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwQueryPermissions] WHERE [QueryID]=${query_.ID} ` + this.getRowLevelSecurityWhereClause('Query Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19829
19893
|
const result = this.ArrayMapFieldNamesToCodeNames('Query Permissions', await dataSource.query(sSQL));
|
|
19830
19894
|
return result;
|
|
19831
19895
|
}
|
|
19832
19896
|
async DataContextItemsArray(query_, { dataSource, userPayload }, pubSub) {
|
|
19833
19897
|
this.CheckUserReadPermissions('Data Context Items', userPayload);
|
|
19834
|
-
const sSQL = `SELECT * FROM [
|
|
19898
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDataContextItems] WHERE [QueryID]=${query_.ID} ` + this.getRowLevelSecurityWhereClause('Data Context Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19835
19899
|
const result = this.ArrayMapFieldNamesToCodeNames('Data Context Items', await dataSource.query(sSQL));
|
|
19836
19900
|
return result;
|
|
19837
19901
|
}
|
|
@@ -20070,7 +20134,7 @@ let QueryPermissionResolver = class QueryPermissionResolver extends server_1.Res
|
|
|
20070
20134
|
}
|
|
20071
20135
|
async QueryPermission(ID, { dataSource, userPayload }, pubSub) {
|
|
20072
20136
|
this.CheckUserReadPermissions('Query Permissions', userPayload);
|
|
20073
|
-
const sSQL = `SELECT * FROM [
|
|
20137
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwQueryPermissions] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Query Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
20074
20138
|
const result = this.MapFieldNamesToCodeNames('Query Permissions', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
20075
20139
|
return result;
|
|
20076
20140
|
}
|
|
@@ -20316,7 +20380,7 @@ let VectorIndexResolver = class VectorIndexResolver extends server_1.ResolverBas
|
|
|
20316
20380
|
}
|
|
20317
20381
|
async VectorIndex(ID, { dataSource, userPayload }, pubSub) {
|
|
20318
20382
|
this.CheckUserReadPermissions('Vector Indexes', userPayload);
|
|
20319
|
-
const sSQL = `SELECT * FROM [
|
|
20383
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwVectorIndexes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Vector Indexes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
20320
20384
|
const result = this.MapFieldNamesToCodeNames('Vector Indexes', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
20321
20385
|
return result;
|
|
20322
20386
|
}
|
|
@@ -20532,13 +20596,13 @@ let EntityDocumentTypeResolver = class EntityDocumentTypeResolver extends server
|
|
|
20532
20596
|
}
|
|
20533
20597
|
async EntityDocumentType(ID, { dataSource, userPayload }, pubSub) {
|
|
20534
20598
|
this.CheckUserReadPermissions('Entity Document Types', userPayload);
|
|
20535
|
-
const sSQL = `SELECT * FROM [
|
|
20599
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityDocumentTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Document Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
20536
20600
|
const result = this.MapFieldNamesToCodeNames('Entity Document Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
20537
20601
|
return result;
|
|
20538
20602
|
}
|
|
20539
20603
|
async EntityDocumentsArray(entitydocumenttype_, { dataSource, userPayload }, pubSub) {
|
|
20540
20604
|
this.CheckUserReadPermissions('Entity Documents', userPayload);
|
|
20541
|
-
const sSQL = `SELECT * FROM [
|
|
20605
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityDocuments] WHERE [TypeID]=${entitydocumenttype_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Documents', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
20542
20606
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Documents', await dataSource.query(sSQL));
|
|
20543
20607
|
return result;
|
|
20544
20608
|
}
|
|
@@ -20790,7 +20854,7 @@ let EntityDocumentRunResolver = class EntityDocumentRunResolver extends server_1
|
|
|
20790
20854
|
}
|
|
20791
20855
|
async EntityDocumentRun(ID, { dataSource, userPayload }, pubSub) {
|
|
20792
20856
|
this.CheckUserReadPermissions('Entity Document Runs', userPayload);
|
|
20793
|
-
const sSQL = `SELECT * FROM [
|
|
20857
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityDocumentRuns] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Document Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
20794
20858
|
const result = this.MapFieldNamesToCodeNames('Entity Document Runs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
20795
20859
|
return result;
|
|
20796
20860
|
}
|
|
@@ -21032,13 +21096,13 @@ let VectorDatabaseResolver = class VectorDatabaseResolver extends server_1.Resol
|
|
|
21032
21096
|
}
|
|
21033
21097
|
async VectorDatabase(ID, { dataSource, userPayload }, pubSub) {
|
|
21034
21098
|
this.CheckUserReadPermissions('Vector Databases', userPayload);
|
|
21035
|
-
const sSQL = `SELECT * FROM [
|
|
21099
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwVectorDatabases] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Vector Databases', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
21036
21100
|
const result = this.MapFieldNamesToCodeNames('Vector Databases', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
21037
21101
|
return result;
|
|
21038
21102
|
}
|
|
21039
21103
|
async VectorIndexesArray(vectordatabase_, { dataSource, userPayload }, pubSub) {
|
|
21040
21104
|
this.CheckUserReadPermissions('Vector Indexes', userPayload);
|
|
21041
|
-
const sSQL = `SELECT * FROM [
|
|
21105
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwVectorIndexes] WHERE [VectorDatabaseID]=${vectordatabase_.ID} ` + this.getRowLevelSecurityWhereClause('Vector Indexes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
21042
21106
|
const result = this.ArrayMapFieldNamesToCodeNames('Vector Indexes', await dataSource.query(sSQL));
|
|
21043
21107
|
return result;
|
|
21044
21108
|
}
|
|
@@ -21321,7 +21385,7 @@ let EntityRecordDocumentResolver = class EntityRecordDocumentResolver extends se
|
|
|
21321
21385
|
}
|
|
21322
21386
|
async EntityRecordDocument(ID, { dataSource, userPayload }, pubSub) {
|
|
21323
21387
|
this.CheckUserReadPermissions('Entity Record Documents', userPayload);
|
|
21324
|
-
const sSQL = `SELECT * FROM [
|
|
21388
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityRecordDocuments] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Record Documents', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
21325
21389
|
const result = this.MapFieldNamesToCodeNames('Entity Record Documents', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
21326
21390
|
return result;
|
|
21327
21391
|
}
|
|
@@ -21464,6 +21528,11 @@ __decorate([
|
|
|
21464
21528
|
(0, class_validator_1.MaxLength)(8),
|
|
21465
21529
|
__metadata("design:type", Date)
|
|
21466
21530
|
], EntityDocument_.prototype, "UpdatedAt", void 0);
|
|
21531
|
+
__decorate([
|
|
21532
|
+
(0, server_1.Field)(),
|
|
21533
|
+
(0, class_validator_1.MaxLength)(510),
|
|
21534
|
+
__metadata("design:type", String)
|
|
21535
|
+
], EntityDocument_.prototype, "Entity", void 0);
|
|
21467
21536
|
__decorate([
|
|
21468
21537
|
(0, server_1.Field)(),
|
|
21469
21538
|
(0, class_validator_1.MaxLength)(200),
|
|
@@ -21579,13 +21648,13 @@ let EntityDocumentResolver = class EntityDocumentResolver extends server_1.Resol
|
|
|
21579
21648
|
}
|
|
21580
21649
|
async EntityDocument(ID, { dataSource, userPayload }, pubSub) {
|
|
21581
21650
|
this.CheckUserReadPermissions('Entity Documents', userPayload);
|
|
21582
|
-
const sSQL = `SELECT * FROM [
|
|
21651
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityDocuments] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Documents', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
21583
21652
|
const result = this.MapFieldNamesToCodeNames('Entity Documents', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
21584
21653
|
return result;
|
|
21585
21654
|
}
|
|
21586
21655
|
async EntityDocumentRunsArray(entitydocument_, { dataSource, userPayload }, pubSub) {
|
|
21587
21656
|
this.CheckUserReadPermissions('Entity Document Runs', userPayload);
|
|
21588
|
-
const sSQL = `SELECT * FROM [
|
|
21657
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityDocumentRuns] WHERE [EntityDocumentID]=${entitydocument_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Document Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
21589
21658
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Document Runs', await dataSource.query(sSQL));
|
|
21590
21659
|
return result;
|
|
21591
21660
|
}
|
|
@@ -21769,6 +21838,11 @@ __decorate([
|
|
|
21769
21838
|
(0, class_validator_1.MaxLength)(510),
|
|
21770
21839
|
__metadata("design:type", String)
|
|
21771
21840
|
], DataContextItem_.prototype, "Query", void 0);
|
|
21841
|
+
__decorate([
|
|
21842
|
+
(0, server_1.Field)({ nullable: true }),
|
|
21843
|
+
(0, class_validator_1.MaxLength)(510),
|
|
21844
|
+
__metadata("design:type", String)
|
|
21845
|
+
], DataContextItem_.prototype, "Entity", void 0);
|
|
21772
21846
|
exports.DataContextItem_ = DataContextItem_ = __decorate([
|
|
21773
21847
|
(0, server_1.ObjectType)({ description: 'Data Context Items store information about each item within a Data Context. Each item stores a link to a view, query, or raw sql statement and can optionally cache the JSON representing the last run of that data object as well.' })
|
|
21774
21848
|
], DataContextItem_);
|
|
@@ -21907,7 +21981,7 @@ let DataContextItemResolver = class DataContextItemResolver extends server_1.Res
|
|
|
21907
21981
|
}
|
|
21908
21982
|
async DataContextItem(ID, { dataSource, userPayload }, pubSub) {
|
|
21909
21983
|
this.CheckUserReadPermissions('Data Context Items', userPayload);
|
|
21910
|
-
const sSQL = `SELECT * FROM [
|
|
21984
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDataContextItems] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Data Context Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
21911
21985
|
const result = this.MapFieldNamesToCodeNames('Data Context Items', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
21912
21986
|
return result;
|
|
21913
21987
|
}
|
|
@@ -22157,19 +22231,19 @@ let DataContextResolver = class DataContextResolver extends server_1.ResolverBas
|
|
|
22157
22231
|
}
|
|
22158
22232
|
async DataContext(ID, { dataSource, userPayload }, pubSub) {
|
|
22159
22233
|
this.CheckUserReadPermissions('Data Contexts', userPayload);
|
|
22160
|
-
const sSQL = `SELECT * FROM [
|
|
22234
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDataContexts] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Data Contexts', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22161
22235
|
const result = this.MapFieldNamesToCodeNames('Data Contexts', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
22162
22236
|
return result;
|
|
22163
22237
|
}
|
|
22164
22238
|
async DataContextItemsArray(datacontext_, { dataSource, userPayload }, pubSub) {
|
|
22165
22239
|
this.CheckUserReadPermissions('Data Context Items', userPayload);
|
|
22166
|
-
const sSQL = `SELECT * FROM [
|
|
22240
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDataContextItems] WHERE [DataContextID]=${datacontext_.ID} ` + this.getRowLevelSecurityWhereClause('Data Context Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22167
22241
|
const result = this.ArrayMapFieldNamesToCodeNames('Data Context Items', await dataSource.query(sSQL));
|
|
22168
22242
|
return result;
|
|
22169
22243
|
}
|
|
22170
22244
|
async ReportsArray(datacontext_, { dataSource, userPayload }, pubSub) {
|
|
22171
22245
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
22172
|
-
const sSQL = `SELECT * FROM [
|
|
22246
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwReports] WHERE [DataContextID]=${datacontext_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22173
22247
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
22174
22248
|
return result;
|
|
22175
22249
|
}
|
|
@@ -22424,19 +22498,19 @@ let UserViewCategoryResolver = class UserViewCategoryResolver extends server_1.R
|
|
|
22424
22498
|
}
|
|
22425
22499
|
async UserViewCategory(ID, { dataSource, userPayload }, pubSub) {
|
|
22426
22500
|
this.CheckUserReadPermissions('User View Categories', userPayload);
|
|
22427
|
-
const sSQL = `SELECT * FROM [
|
|
22501
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserViewCategories] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User View Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22428
22502
|
const result = this.MapFieldNamesToCodeNames('User View Categories', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
22429
22503
|
return result;
|
|
22430
22504
|
}
|
|
22431
22505
|
async UserViewCategoriesArray(userviewcategory_, { dataSource, userPayload }, pubSub) {
|
|
22432
22506
|
this.CheckUserReadPermissions('User View Categories', userPayload);
|
|
22433
|
-
const sSQL = `SELECT * FROM [
|
|
22507
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserViewCategories] WHERE [ParentID]=${userviewcategory_.ID} ` + this.getRowLevelSecurityWhereClause('User View Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22434
22508
|
const result = this.ArrayMapFieldNamesToCodeNames('User View Categories', await dataSource.query(sSQL));
|
|
22435
22509
|
return result;
|
|
22436
22510
|
}
|
|
22437
22511
|
async UserViewsArray(userviewcategory_, { dataSource, userPayload }, pubSub) {
|
|
22438
22512
|
this.CheckUserReadPermissions('User Views', userPayload);
|
|
22439
|
-
const sSQL = `SELECT * FROM [
|
|
22513
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserViews] WHERE [CategoryID]=${userviewcategory_.ID} ` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22440
22514
|
const result = this.ArrayMapFieldNamesToCodeNames('User Views', await dataSource.query(sSQL));
|
|
22441
22515
|
return result;
|
|
22442
22516
|
}
|
|
@@ -22695,19 +22769,19 @@ let DashboardCategoryResolver = class DashboardCategoryResolver extends server_1
|
|
|
22695
22769
|
}
|
|
22696
22770
|
async DashboardCategory(ID, { dataSource, userPayload }, pubSub) {
|
|
22697
22771
|
this.CheckUserReadPermissions('Dashboard Categories', userPayload);
|
|
22698
|
-
const sSQL = `SELECT * FROM [
|
|
22772
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDashboardCategories] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Dashboard Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22699
22773
|
const result = this.MapFieldNamesToCodeNames('Dashboard Categories', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
22700
22774
|
return result;
|
|
22701
22775
|
}
|
|
22702
22776
|
async DashboardsArray(dashboardcategory_, { dataSource, userPayload }, pubSub) {
|
|
22703
22777
|
this.CheckUserReadPermissions('Dashboards', userPayload);
|
|
22704
|
-
const sSQL = `SELECT * FROM [
|
|
22778
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDashboards] WHERE [CategoryID]=${dashboardcategory_.ID} ` + this.getRowLevelSecurityWhereClause('Dashboards', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22705
22779
|
const result = this.ArrayMapFieldNamesToCodeNames('Dashboards', await dataSource.query(sSQL));
|
|
22706
22780
|
return result;
|
|
22707
22781
|
}
|
|
22708
22782
|
async DashboardCategoriesArray(dashboardcategory_, { dataSource, userPayload }, pubSub) {
|
|
22709
22783
|
this.CheckUserReadPermissions('Dashboard Categories', userPayload);
|
|
22710
|
-
const sSQL = `SELECT * FROM [
|
|
22784
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDashboardCategories] WHERE [ParentID]=${dashboardcategory_.ID} ` + this.getRowLevelSecurityWhereClause('Dashboard Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22711
22785
|
const result = this.ArrayMapFieldNamesToCodeNames('Dashboard Categories', await dataSource.query(sSQL));
|
|
22712
22786
|
return result;
|
|
22713
22787
|
}
|
|
@@ -22962,19 +23036,19 @@ let ReportCategoryResolver = class ReportCategoryResolver extends server_1.Resol
|
|
|
22962
23036
|
}
|
|
22963
23037
|
async ReportCategory(ID, { dataSource, userPayload }, pubSub) {
|
|
22964
23038
|
this.CheckUserReadPermissions('Report Categories', userPayload);
|
|
22965
|
-
const sSQL = `SELECT * FROM [
|
|
23039
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwReportCategories] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Report Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22966
23040
|
const result = this.MapFieldNamesToCodeNames('Report Categories', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
22967
23041
|
return result;
|
|
22968
23042
|
}
|
|
22969
23043
|
async ReportCategoriesArray(reportcategory_, { dataSource, userPayload }, pubSub) {
|
|
22970
23044
|
this.CheckUserReadPermissions('Report Categories', userPayload);
|
|
22971
|
-
const sSQL = `SELECT * FROM [
|
|
23045
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwReportCategories] WHERE [ParentID]=${reportcategory_.ID} ` + this.getRowLevelSecurityWhereClause('Report Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22972
23046
|
const result = this.ArrayMapFieldNamesToCodeNames('Report Categories', await dataSource.query(sSQL));
|
|
22973
23047
|
return result;
|
|
22974
23048
|
}
|
|
22975
23049
|
async ReportsArray(reportcategory_, { dataSource, userPayload }, pubSub) {
|
|
22976
23050
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
22977
|
-
const sSQL = `SELECT * FROM [
|
|
23051
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwReports] WHERE [CategoryID]=${reportcategory_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22978
23052
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
22979
23053
|
return result;
|
|
22980
23054
|
}
|