@memberjunction/server 0.9.222 → 0.9.223
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/generated/generated.js +234 -233
- package/dist/generated/generated.js.map +1 -1
- package/package.json +1 -1
- package/src/generated/generated.ts +235 -234
|
@@ -46,6 +46,7 @@ exports.ReportCategoryResolver = exports.RunReportCategoryViewResult = exports.U
|
|
|
46
46
|
const server_1 = require("@memberjunction/server");
|
|
47
47
|
const core_1 = require("@memberjunction/core");
|
|
48
48
|
const class_validator_1 = require("class-validator");
|
|
49
|
+
const config_1 = require("../config");
|
|
49
50
|
const mj_core_schema_server_object_types = __importStar(require("@memberjunction/server"));
|
|
50
51
|
let Company_ = class Company_ {
|
|
51
52
|
};
|
|
@@ -207,31 +208,31 @@ let CompanyResolver = class CompanyResolver extends server_1.ResolverBase {
|
|
|
207
208
|
}
|
|
208
209
|
async Company(ID, { dataSource, userPayload }, pubSub) {
|
|
209
210
|
this.CheckUserReadPermissions('Companies', userPayload);
|
|
210
|
-
const sSQL = `SELECT * FROM [
|
|
211
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanies] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Companies', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
211
212
|
const result = this.MapFieldNamesToCodeNames('Companies', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
212
213
|
return result;
|
|
213
214
|
}
|
|
214
215
|
async AllCompanies({ dataSource, userPayload }, pubSub) {
|
|
215
216
|
this.CheckUserReadPermissions('Companies', userPayload);
|
|
216
|
-
const sSQL =
|
|
217
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanies]` + this.getRowLevelSecurityWhereClause('Companies', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
217
218
|
const result = this.ArrayMapFieldNamesToCodeNames('Companies', await dataSource.query(sSQL));
|
|
218
219
|
return result;
|
|
219
220
|
}
|
|
220
221
|
async EmployeesArray(company_, { dataSource, userPayload }, pubSub) {
|
|
221
222
|
this.CheckUserReadPermissions('Employees', userPayload);
|
|
222
|
-
const sSQL = `SELECT * FROM [
|
|
223
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEmployees] WHERE [CompanyID]=${company_.ID} ` + this.getRowLevelSecurityWhereClause('Employees', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
223
224
|
const result = this.ArrayMapFieldNamesToCodeNames('Employees', await dataSource.query(sSQL));
|
|
224
225
|
return result;
|
|
225
226
|
}
|
|
226
227
|
async CompanyIntegrationsArray(company_, { dataSource, userPayload }, pubSub) {
|
|
227
228
|
this.CheckUserReadPermissions('Company Integrations', userPayload);
|
|
228
|
-
const sSQL = `SELECT * FROM [
|
|
229
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanyIntegrations] WHERE [CompanyName]=${company_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
229
230
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integrations', await dataSource.query(sSQL));
|
|
230
231
|
return result;
|
|
231
232
|
}
|
|
232
233
|
async WorkflowsArray(company_, { dataSource, userPayload }, pubSub) {
|
|
233
234
|
this.CheckUserReadPermissions('Workflows', userPayload);
|
|
234
|
-
const sSQL = `SELECT * FROM [
|
|
235
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwWorkflows] WHERE [CompanyName]=${company_.ID} ` + this.getRowLevelSecurityWhereClause('Workflows', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
235
236
|
const result = this.ArrayMapFieldNamesToCodeNames('Workflows', await dataSource.query(sSQL));
|
|
236
237
|
return result;
|
|
237
238
|
}
|
|
@@ -632,37 +633,37 @@ let EmployeeResolver = class EmployeeResolver extends server_1.ResolverBase {
|
|
|
632
633
|
}
|
|
633
634
|
async Employee(ID, { dataSource, userPayload }, pubSub) {
|
|
634
635
|
this.CheckUserReadPermissions('Employees', userPayload);
|
|
635
|
-
const sSQL = `SELECT * FROM [
|
|
636
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEmployees] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Employees', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
636
637
|
const result = this.MapFieldNamesToCodeNames('Employees', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
637
638
|
return result;
|
|
638
639
|
}
|
|
639
640
|
async AllEmployees({ dataSource, userPayload }, pubSub) {
|
|
640
641
|
this.CheckUserReadPermissions('Employees', userPayload);
|
|
641
|
-
const sSQL =
|
|
642
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEmployees]` + this.getRowLevelSecurityWhereClause('Employees', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
642
643
|
const result = this.ArrayMapFieldNamesToCodeNames('Employees', await dataSource.query(sSQL));
|
|
643
644
|
return result;
|
|
644
645
|
}
|
|
645
646
|
async EmployeesArray(employee_, { dataSource, userPayload }, pubSub) {
|
|
646
647
|
this.CheckUserReadPermissions('Employees', userPayload);
|
|
647
|
-
const sSQL = `SELECT * FROM [
|
|
648
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEmployees] WHERE [SupervisorID]=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employees', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
648
649
|
const result = this.ArrayMapFieldNamesToCodeNames('Employees', await dataSource.query(sSQL));
|
|
649
650
|
return result;
|
|
650
651
|
}
|
|
651
652
|
async EmployeeCompanyIntegrationsArray(employee_, { dataSource, userPayload }, pubSub) {
|
|
652
653
|
this.CheckUserReadPermissions('Employee Company Integrations', userPayload);
|
|
653
|
-
const sSQL = `SELECT * FROM [
|
|
654
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEmployeeCompanyIntegrations] WHERE [EmployeeID]=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
654
655
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Company Integrations', await dataSource.query(sSQL));
|
|
655
656
|
return result;
|
|
656
657
|
}
|
|
657
658
|
async EmployeeRolesArray(employee_, { dataSource, userPayload }, pubSub) {
|
|
658
659
|
this.CheckUserReadPermissions('Employee Roles', userPayload);
|
|
659
|
-
const sSQL = `SELECT * FROM [
|
|
660
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEmployeeRoles] WHERE [EmployeeID]=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
660
661
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Roles', await dataSource.query(sSQL));
|
|
661
662
|
return result;
|
|
662
663
|
}
|
|
663
664
|
async EmployeeSkillsArray(employee_, { dataSource, userPayload }, pubSub) {
|
|
664
665
|
this.CheckUserReadPermissions('Employee Skills', userPayload);
|
|
665
|
-
const sSQL = `SELECT * FROM [
|
|
666
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEmployeeSkills] WHERE [EmployeeID]=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
666
667
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Skills', await dataSource.query(sSQL));
|
|
667
668
|
return result;
|
|
668
669
|
}
|
|
@@ -977,7 +978,7 @@ let UserFavoriteResolverBase = class UserFavoriteResolverBase extends server_1.R
|
|
|
977
978
|
}
|
|
978
979
|
async UserFavorite(ID, { dataSource, userPayload }, pubSub) {
|
|
979
980
|
this.CheckUserReadPermissions('User Favorites', userPayload);
|
|
980
|
-
const sSQL = `SELECT * FROM [
|
|
981
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserFavorites] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Favorites', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
981
982
|
const result = this.MapFieldNamesToCodeNames('User Favorites', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
982
983
|
return result;
|
|
983
984
|
}
|
|
@@ -1222,7 +1223,7 @@ let EmployeeCompanyIntegrationResolver = class EmployeeCompanyIntegrationResolve
|
|
|
1222
1223
|
}
|
|
1223
1224
|
async EmployeeCompanyIntegration(ID, { dataSource, userPayload }, pubSub) {
|
|
1224
1225
|
this.CheckUserReadPermissions('Employee Company Integrations', userPayload);
|
|
1225
|
-
const sSQL = `SELECT * FROM [
|
|
1226
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEmployeeCompanyIntegrations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Employee Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1226
1227
|
const result = this.MapFieldNamesToCodeNames('Employee Company Integrations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
1227
1228
|
return result;
|
|
1228
1229
|
}
|
|
@@ -1395,7 +1396,7 @@ let EmployeeRoleResolver = class EmployeeRoleResolver extends server_1.ResolverB
|
|
|
1395
1396
|
}
|
|
1396
1397
|
async EmployeeRole(ID, { dataSource, userPayload }, pubSub) {
|
|
1397
1398
|
this.CheckUserReadPermissions('Employee Roles', userPayload);
|
|
1398
|
-
const sSQL = `SELECT * FROM [
|
|
1399
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEmployeeRoles] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Employee Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1399
1400
|
const result = this.MapFieldNamesToCodeNames('Employee Roles', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
1400
1401
|
return result;
|
|
1401
1402
|
}
|
|
@@ -1569,7 +1570,7 @@ let EmployeeSkillResolver = class EmployeeSkillResolver extends server_1.Resolve
|
|
|
1569
1570
|
}
|
|
1570
1571
|
async EmployeeSkill(ID, { dataSource, userPayload }, pubSub) {
|
|
1571
1572
|
this.CheckUserReadPermissions('Employee Skills', userPayload);
|
|
1572
|
-
const sSQL = `SELECT * FROM [
|
|
1573
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEmployeeSkills] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Employee Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1573
1574
|
const result = this.MapFieldNamesToCodeNames('Employee Skills', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
1574
1575
|
return result;
|
|
1575
1576
|
}
|
|
@@ -1778,43 +1779,43 @@ let RoleResolver = class RoleResolver extends server_1.ResolverBase {
|
|
|
1778
1779
|
}
|
|
1779
1780
|
async Role(ID, { dataSource, userPayload }, pubSub) {
|
|
1780
1781
|
this.CheckUserReadPermissions('Roles', userPayload);
|
|
1781
|
-
const sSQL = `SELECT * FROM [
|
|
1782
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwRoles] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1782
1783
|
const result = this.MapFieldNamesToCodeNames('Roles', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
1783
1784
|
return result;
|
|
1784
1785
|
}
|
|
1785
1786
|
async AllRoles({ dataSource, userPayload }, pubSub) {
|
|
1786
1787
|
this.CheckUserReadPermissions('Roles', userPayload);
|
|
1787
|
-
const sSQL =
|
|
1788
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwRoles]` + this.getRowLevelSecurityWhereClause('Roles', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
1788
1789
|
const result = this.ArrayMapFieldNamesToCodeNames('Roles', await dataSource.query(sSQL));
|
|
1789
1790
|
return result;
|
|
1790
1791
|
}
|
|
1791
1792
|
async EmployeeRolesArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1792
1793
|
this.CheckUserReadPermissions('Employee Roles', userPayload);
|
|
1793
|
-
const sSQL = `SELECT * FROM [
|
|
1794
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEmployeeRoles] WHERE [RoleID]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1794
1795
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Roles', await dataSource.query(sSQL));
|
|
1795
1796
|
return result;
|
|
1796
1797
|
}
|
|
1797
1798
|
async EntityPermissionsArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1798
1799
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
1799
|
-
const sSQL = `SELECT * FROM [
|
|
1800
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityPermissions] WHERE [RoleName]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1800
1801
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL));
|
|
1801
1802
|
return result;
|
|
1802
1803
|
}
|
|
1803
1804
|
async UserRolesArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1804
1805
|
this.CheckUserReadPermissions('User Roles', userPayload);
|
|
1805
|
-
const sSQL = `SELECT * FROM [
|
|
1806
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserRoles] WHERE [RoleName]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('User Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1806
1807
|
const result = this.ArrayMapFieldNamesToCodeNames('User Roles', await dataSource.query(sSQL));
|
|
1807
1808
|
return result;
|
|
1808
1809
|
}
|
|
1809
1810
|
async AuthorizationRolesArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1810
1811
|
this.CheckUserReadPermissions('Authorization Roles', userPayload);
|
|
1811
|
-
const sSQL = `SELECT * FROM [
|
|
1812
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuthorizationRoles] WHERE [RoleName]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('Authorization Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1812
1813
|
const result = this.ArrayMapFieldNamesToCodeNames('Authorization Roles', await dataSource.query(sSQL));
|
|
1813
1814
|
return result;
|
|
1814
1815
|
}
|
|
1815
1816
|
async QueryPermissionsArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1816
1817
|
this.CheckUserReadPermissions('Query Permissions', userPayload);
|
|
1817
|
-
const sSQL = `SELECT * FROM [
|
|
1818
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwQueryPermissions] WHERE [RoleName]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('Query Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1818
1819
|
const result = this.ArrayMapFieldNamesToCodeNames('Query Permissions', await dataSource.query(sSQL));
|
|
1819
1820
|
return result;
|
|
1820
1821
|
}
|
|
@@ -2031,25 +2032,25 @@ let SkillResolver = class SkillResolver extends server_1.ResolverBase {
|
|
|
2031
2032
|
}
|
|
2032
2033
|
async Skill(ID, { dataSource, userPayload }, pubSub) {
|
|
2033
2034
|
this.CheckUserReadPermissions('Skills', userPayload);
|
|
2034
|
-
const sSQL = `SELECT * FROM [
|
|
2035
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwSkills] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2035
2036
|
const result = this.MapFieldNamesToCodeNames('Skills', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
2036
2037
|
return result;
|
|
2037
2038
|
}
|
|
2038
2039
|
async AllSkills({ dataSource, userPayload }, pubSub) {
|
|
2039
2040
|
this.CheckUserReadPermissions('Skills', userPayload);
|
|
2040
|
-
const sSQL =
|
|
2041
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwSkills]` + this.getRowLevelSecurityWhereClause('Skills', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
2041
2042
|
const result = this.ArrayMapFieldNamesToCodeNames('Skills', await dataSource.query(sSQL));
|
|
2042
2043
|
return result;
|
|
2043
2044
|
}
|
|
2044
2045
|
async EmployeeSkillsArray(skill_, { dataSource, userPayload }, pubSub) {
|
|
2045
2046
|
this.CheckUserReadPermissions('Employee Skills', userPayload);
|
|
2046
|
-
const sSQL = `SELECT * FROM [
|
|
2047
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEmployeeSkills] WHERE [SkillID]=${skill_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2047
2048
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Skills', await dataSource.query(sSQL));
|
|
2048
2049
|
return result;
|
|
2049
2050
|
}
|
|
2050
2051
|
async SkillsArray(skill_, { dataSource, userPayload }, pubSub) {
|
|
2051
2052
|
this.CheckUserReadPermissions('Skills', userPayload);
|
|
2052
|
-
const sSQL = `SELECT * FROM [
|
|
2053
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwSkills] WHERE [ParentID]=${skill_.ID} ` + this.getRowLevelSecurityWhereClause('Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2053
2054
|
const result = this.ArrayMapFieldNamesToCodeNames('Skills', await dataSource.query(sSQL));
|
|
2054
2055
|
return result;
|
|
2055
2056
|
}
|
|
@@ -2232,13 +2233,13 @@ let IntegrationURLFormatResolver = class IntegrationURLFormatResolver extends se
|
|
|
2232
2233
|
}
|
|
2233
2234
|
async IntegrationURLFormat(ID, { dataSource, userPayload }, pubSub) {
|
|
2234
2235
|
this.CheckUserReadPermissions('Integration URL Formats', userPayload);
|
|
2235
|
-
const sSQL = `SELECT * FROM [
|
|
2236
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwIntegrationURLFormats] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Integration URL Formats', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2236
2237
|
const result = this.MapFieldNamesToCodeNames('Integration URL Formats', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
2237
2238
|
return result;
|
|
2238
2239
|
}
|
|
2239
2240
|
async AllIntegrationURLFormats({ dataSource, userPayload }, pubSub) {
|
|
2240
2241
|
this.CheckUserReadPermissions('Integration URL Formats', userPayload);
|
|
2241
|
-
const sSQL =
|
|
2242
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwIntegrationURLFormats]` + this.getRowLevelSecurityWhereClause('Integration URL Formats', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
2242
2243
|
const result = this.ArrayMapFieldNamesToCodeNames('Integration URL Formats', await dataSource.query(sSQL));
|
|
2243
2244
|
return result;
|
|
2244
2245
|
}
|
|
@@ -2467,25 +2468,25 @@ let IntegrationResolver = class IntegrationResolver extends server_1.ResolverBas
|
|
|
2467
2468
|
}
|
|
2468
2469
|
async Integration(ID, { dataSource, userPayload }, pubSub) {
|
|
2469
2470
|
this.CheckUserReadPermissions('Integrations', userPayload);
|
|
2470
|
-
const sSQL = `SELECT * FROM [
|
|
2471
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwIntegrations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2471
2472
|
const result = this.MapFieldNamesToCodeNames('Integrations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
2472
2473
|
return result;
|
|
2473
2474
|
}
|
|
2474
2475
|
async AllIntegrations({ dataSource, userPayload }, pubSub) {
|
|
2475
2476
|
this.CheckUserReadPermissions('Integrations', userPayload);
|
|
2476
|
-
const sSQL =
|
|
2477
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwIntegrations]` + this.getRowLevelSecurityWhereClause('Integrations', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
2477
2478
|
const result = this.ArrayMapFieldNamesToCodeNames('Integrations', await dataSource.query(sSQL));
|
|
2478
2479
|
return result;
|
|
2479
2480
|
}
|
|
2480
2481
|
async IntegrationURLFormatsArray(integration_, { dataSource, userPayload }, pubSub) {
|
|
2481
2482
|
this.CheckUserReadPermissions('Integration URL Formats', userPayload);
|
|
2482
|
-
const sSQL = `SELECT * FROM [
|
|
2483
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwIntegrationURLFormats] WHERE [IntegrationID]=${integration_.ID} ` + this.getRowLevelSecurityWhereClause('Integration URL Formats', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2483
2484
|
const result = this.ArrayMapFieldNamesToCodeNames('Integration URL Formats', await dataSource.query(sSQL));
|
|
2484
2485
|
return result;
|
|
2485
2486
|
}
|
|
2486
2487
|
async CompanyIntegrationsArray(integration_, { dataSource, userPayload }, pubSub) {
|
|
2487
2488
|
this.CheckUserReadPermissions('Company Integrations', userPayload);
|
|
2488
|
-
const sSQL = `SELECT * FROM [
|
|
2489
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanyIntegrations] WHERE [IntegrationName]=${integration_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2489
2490
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integrations', await dataSource.query(sSQL));
|
|
2490
2491
|
return result;
|
|
2491
2492
|
}
|
|
@@ -2827,31 +2828,31 @@ let CompanyIntegrationResolver = class CompanyIntegrationResolver extends server
|
|
|
2827
2828
|
}
|
|
2828
2829
|
async CompanyIntegration(ID, { dataSource, userPayload }, pubSub) {
|
|
2829
2830
|
this.CheckUserReadPermissions('Company Integrations', userPayload);
|
|
2830
|
-
const sSQL = `SELECT * FROM [
|
|
2831
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanyIntegrations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2831
2832
|
const result = this.MapFieldNamesToCodeNames('Company Integrations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
2832
2833
|
return result;
|
|
2833
2834
|
}
|
|
2834
2835
|
async ListsArray(companyintegration_, { dataSource, userPayload }, pubSub) {
|
|
2835
2836
|
this.CheckUserReadPermissions('Lists', userPayload);
|
|
2836
|
-
const sSQL = `SELECT * FROM [
|
|
2837
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwLists] WHERE [CompanyIntegrationID]=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Lists', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2837
2838
|
const result = this.ArrayMapFieldNamesToCodeNames('Lists', await dataSource.query(sSQL));
|
|
2838
2839
|
return result;
|
|
2839
2840
|
}
|
|
2840
2841
|
async EmployeeCompanyIntegrationsArray(companyintegration_, { dataSource, userPayload }, pubSub) {
|
|
2841
2842
|
this.CheckUserReadPermissions('Employee Company Integrations', userPayload);
|
|
2842
|
-
const sSQL = `SELECT * FROM [
|
|
2843
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEmployeeCompanyIntegrations] WHERE [CompanyIntegrationID]=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2843
2844
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Company Integrations', await dataSource.query(sSQL));
|
|
2844
2845
|
return result;
|
|
2845
2846
|
}
|
|
2846
2847
|
async CompanyIntegrationRunsArray(companyintegration_, { dataSource, userPayload }, pubSub) {
|
|
2847
2848
|
this.CheckUserReadPermissions('Company Integration Runs', userPayload);
|
|
2848
|
-
const sSQL = `SELECT * FROM [
|
|
2849
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanyIntegrationRuns] WHERE [CompanyIntegrationID]=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2849
2850
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Runs', await dataSource.query(sSQL));
|
|
2850
2851
|
return result;
|
|
2851
2852
|
}
|
|
2852
2853
|
async CompanyIntegrationRecordMapsArray(companyintegration_, { dataSource, userPayload }, pubSub) {
|
|
2853
2854
|
this.CheckUserReadPermissions('Company Integration Record Maps', userPayload);
|
|
2854
|
-
const sSQL = `SELECT * FROM [
|
|
2855
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanyIntegrationRecordMaps] WHERE [CompanyIntegrationID]=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Record Maps', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2855
2856
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Record Maps', await dataSource.query(sSQL));
|
|
2856
2857
|
return result;
|
|
2857
2858
|
}
|
|
@@ -3440,19 +3441,19 @@ let EntityFieldResolver = class EntityFieldResolver extends server_1.ResolverBas
|
|
|
3440
3441
|
}
|
|
3441
3442
|
async EntityField(ID, { dataSource, userPayload }, pubSub) {
|
|
3442
3443
|
this.CheckUserReadPermissions('Entity Fields', userPayload);
|
|
3443
|
-
const sSQL = `SELECT * FROM [
|
|
3444
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityFields] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Fields', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
3444
3445
|
const result = this.MapFieldNamesToCodeNames('Entity Fields', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
3445
3446
|
return result;
|
|
3446
3447
|
}
|
|
3447
3448
|
async AllEntityFields({ dataSource, userPayload }, pubSub) {
|
|
3448
3449
|
this.CheckUserReadPermissions('Entity Fields', userPayload);
|
|
3449
|
-
const sSQL =
|
|
3450
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityFields]` + this.getRowLevelSecurityWhereClause('Entity Fields', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
3450
3451
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Fields', await dataSource.query(sSQL));
|
|
3451
3452
|
return result;
|
|
3452
3453
|
}
|
|
3453
3454
|
async EntityFieldValuesArray(entityfield_, { dataSource, userPayload }, pubSub) {
|
|
3454
3455
|
this.CheckUserReadPermissions('Entity Field Values', userPayload);
|
|
3455
|
-
const sSQL = `SELECT * FROM [
|
|
3456
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityFieldValues] WHERE [EntityFieldID]=${entityfield_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Field Values', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
3456
3457
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Field Values', await dataSource.query(sSQL));
|
|
3457
3458
|
return result;
|
|
3458
3459
|
}
|
|
@@ -4278,169 +4279,169 @@ let EntityResolverBase = class EntityResolverBase extends server_1.ResolverBase
|
|
|
4278
4279
|
}
|
|
4279
4280
|
async Entity(ID, { dataSource, userPayload }, pubSub) {
|
|
4280
4281
|
this.CheckUserReadPermissions('Entities', userPayload);
|
|
4281
|
-
const sSQL = `SELECT * FROM [
|
|
4282
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntities] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4282
4283
|
const result = this.MapFieldNamesToCodeNames('Entities', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
4283
4284
|
return result;
|
|
4284
4285
|
}
|
|
4285
4286
|
async AllEntities({ dataSource, userPayload }, pubSub) {
|
|
4286
4287
|
this.CheckUserReadPermissions('Entities', userPayload);
|
|
4287
|
-
const sSQL =
|
|
4288
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntities]` + this.getRowLevelSecurityWhereClause('Entities', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
4288
4289
|
const result = this.ArrayMapFieldNamesToCodeNames('Entities', await dataSource.query(sSQL));
|
|
4289
4290
|
return result;
|
|
4290
4291
|
}
|
|
4291
4292
|
async EntityFieldsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4292
4293
|
this.CheckUserReadPermissions('Entity Fields', userPayload);
|
|
4293
|
-
const sSQL = `SELECT * FROM [
|
|
4294
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityFields] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Fields', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4294
4295
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Fields', await dataSource.query(sSQL));
|
|
4295
4296
|
return result;
|
|
4296
4297
|
}
|
|
4297
4298
|
async EntityPermissionsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4298
4299
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
4299
|
-
const sSQL = `SELECT * FROM [
|
|
4300
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityPermissions] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4300
4301
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL));
|
|
4301
4302
|
return result;
|
|
4302
4303
|
}
|
|
4303
4304
|
async EntityRelationshipsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4304
4305
|
this.CheckUserReadPermissions('Entity Relationships', userPayload);
|
|
4305
|
-
const sSQL = `SELECT * FROM [
|
|
4306
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityRelationships] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Relationships', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4306
4307
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Relationships', await dataSource.query(sSQL));
|
|
4307
4308
|
return result;
|
|
4308
4309
|
}
|
|
4309
4310
|
async EntityAIActionsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4310
4311
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
4311
|
-
const sSQL = `SELECT * FROM [
|
|
4312
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityAIActions] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4312
4313
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL));
|
|
4313
4314
|
return result;
|
|
4314
4315
|
}
|
|
4315
4316
|
async UserRecordLogsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4316
4317
|
this.CheckUserReadPermissions('User Record Logs', userPayload);
|
|
4317
|
-
const sSQL = `SELECT * FROM [
|
|
4318
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserRecordLogs] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Record Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4318
4319
|
const result = this.ArrayMapFieldNamesToCodeNames('User Record Logs', await dataSource.query(sSQL));
|
|
4319
4320
|
return result;
|
|
4320
4321
|
}
|
|
4321
4322
|
async IntegrationURLFormatsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4322
4323
|
this.CheckUserReadPermissions('Integration URL Formats', userPayload);
|
|
4323
|
-
const sSQL = `SELECT * FROM [
|
|
4324
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwIntegrationURLFormats] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Integration URL Formats', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4324
4325
|
const result = this.ArrayMapFieldNamesToCodeNames('Integration URL Formats', await dataSource.query(sSQL));
|
|
4325
4326
|
return result;
|
|
4326
4327
|
}
|
|
4327
4328
|
async EntitiesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4328
4329
|
this.CheckUserReadPermissions('Entities', userPayload);
|
|
4329
|
-
const sSQL = `SELECT * FROM [
|
|
4330
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntities] WHERE [ParentID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4330
4331
|
const result = this.ArrayMapFieldNamesToCodeNames('Entities', await dataSource.query(sSQL));
|
|
4331
4332
|
return result;
|
|
4332
4333
|
}
|
|
4333
4334
|
async UserFavoritesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4334
4335
|
this.CheckUserReadPermissions('User Favorites', userPayload);
|
|
4335
|
-
const sSQL = `SELECT * FROM [
|
|
4336
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserFavorites] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Favorites', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4336
4337
|
const result = this.ArrayMapFieldNamesToCodeNames('User Favorites', await dataSource.query(sSQL));
|
|
4337
4338
|
return result;
|
|
4338
4339
|
}
|
|
4339
4340
|
async CompanyIntegrationRunDetailsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4340
4341
|
this.CheckUserReadPermissions('Company Integration Run Details', userPayload);
|
|
4341
|
-
const sSQL = `SELECT * FROM [
|
|
4342
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanyIntegrationRunDetails] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4342
4343
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Run Details', await dataSource.query(sSQL));
|
|
4343
4344
|
return result;
|
|
4344
4345
|
}
|
|
4345
4346
|
async ApplicationEntitiesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4346
4347
|
this.CheckUserReadPermissions('Application Entities', userPayload);
|
|
4347
|
-
const sSQL = `SELECT * FROM [
|
|
4348
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwApplicationEntities] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4348
4349
|
const result = this.ArrayMapFieldNamesToCodeNames('Application Entities', await dataSource.query(sSQL));
|
|
4349
4350
|
return result;
|
|
4350
4351
|
}
|
|
4351
4352
|
async UserApplicationEntitiesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4352
4353
|
this.CheckUserReadPermissions('User Application Entities', userPayload);
|
|
4353
|
-
const sSQL = `SELECT * FROM [
|
|
4354
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserApplicationEntities] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4354
4355
|
const result = this.ArrayMapFieldNamesToCodeNames('User Application Entities', await dataSource.query(sSQL));
|
|
4355
4356
|
return result;
|
|
4356
4357
|
}
|
|
4357
4358
|
async ListsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4358
4359
|
this.CheckUserReadPermissions('Lists', userPayload);
|
|
4359
|
-
const sSQL = `SELECT * FROM [
|
|
4360
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwLists] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Lists', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4360
4361
|
const result = this.ArrayMapFieldNamesToCodeNames('Lists', await dataSource.query(sSQL));
|
|
4361
4362
|
return result;
|
|
4362
4363
|
}
|
|
4363
4364
|
async UserViewsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4364
4365
|
this.CheckUserReadPermissions('User Views', userPayload);
|
|
4365
|
-
const sSQL = `SELECT * FROM [
|
|
4366
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserViews] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4366
4367
|
const result = this.ArrayMapFieldNamesToCodeNames('User Views', await dataSource.query(sSQL));
|
|
4367
4368
|
return result;
|
|
4368
4369
|
}
|
|
4369
4370
|
async RecordChangesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4370
4371
|
this.CheckUserReadPermissions('Record Changes', userPayload);
|
|
4371
|
-
const sSQL = `SELECT * FROM [
|
|
4372
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwRecordChanges] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Record Changes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4372
4373
|
const result = this.ArrayMapFieldNamesToCodeNames('Record Changes', await dataSource.query(sSQL));
|
|
4373
4374
|
return result;
|
|
4374
4375
|
}
|
|
4375
4376
|
async AuditLogsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4376
4377
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
4377
|
-
const sSQL = `SELECT * FROM [
|
|
4378
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuditLogs] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4378
4379
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL));
|
|
4379
4380
|
return result;
|
|
4380
4381
|
}
|
|
4381
4382
|
async ResourceTypesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4382
4383
|
this.CheckUserReadPermissions('Resource Types', userPayload);
|
|
4383
|
-
const sSQL = `SELECT * FROM [
|
|
4384
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwResourceTypes] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Resource Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4384
4385
|
const result = this.ArrayMapFieldNamesToCodeNames('Resource Types', await dataSource.query(sSQL));
|
|
4385
4386
|
return result;
|
|
4386
4387
|
}
|
|
4387
4388
|
async TaggedItemsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4388
4389
|
this.CheckUserReadPermissions('Tagged Items', userPayload);
|
|
4389
|
-
const sSQL = `SELECT * FROM [
|
|
4390
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwTaggedItems] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Tagged Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4390
4391
|
const result = this.ArrayMapFieldNamesToCodeNames('Tagged Items', await dataSource.query(sSQL));
|
|
4391
4392
|
return result;
|
|
4392
4393
|
}
|
|
4393
4394
|
async DatasetItemsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4394
4395
|
this.CheckUserReadPermissions('Dataset Items', userPayload);
|
|
4395
|
-
const sSQL = `SELECT * FROM [
|
|
4396
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDatasetItems] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Dataset Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4396
4397
|
const result = this.ArrayMapFieldNamesToCodeNames('Dataset Items', await dataSource.query(sSQL));
|
|
4397
4398
|
return result;
|
|
4398
4399
|
}
|
|
4399
4400
|
async CompanyIntegrationRecordMapsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4400
4401
|
this.CheckUserReadPermissions('Company Integration Record Maps', userPayload);
|
|
4401
|
-
const sSQL = `SELECT * FROM [
|
|
4402
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanyIntegrationRecordMaps] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Record Maps', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4402
4403
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Record Maps', await dataSource.query(sSQL));
|
|
4403
4404
|
return result;
|
|
4404
4405
|
}
|
|
4405
4406
|
async RecordMergeLogsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4406
4407
|
this.CheckUserReadPermissions('Record Merge Logs', userPayload);
|
|
4407
|
-
const sSQL = `SELECT * FROM [
|
|
4408
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwRecordMergeLogs] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4408
4409
|
const result = this.ArrayMapFieldNamesToCodeNames('Record Merge Logs', await dataSource.query(sSQL));
|
|
4409
4410
|
return result;
|
|
4410
4411
|
}
|
|
4411
4412
|
async QueryFieldsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4412
4413
|
this.CheckUserReadPermissions('Query Fields', userPayload);
|
|
4413
|
-
const sSQL = `SELECT * FROM [
|
|
4414
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwQueryFields] WHERE [SourceEntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Query Fields', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4414
4415
|
const result = this.ArrayMapFieldNamesToCodeNames('Query Fields', await dataSource.query(sSQL));
|
|
4415
4416
|
return result;
|
|
4416
4417
|
}
|
|
4417
4418
|
async ConversationsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4418
4419
|
this.CheckUserReadPermissions('Conversations', userPayload);
|
|
4419
|
-
const sSQL = `SELECT * FROM [
|
|
4420
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwConversations] WHERE [LinkedEntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Conversations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4420
4421
|
const result = this.ArrayMapFieldNamesToCodeNames('Conversations', await dataSource.query(sSQL));
|
|
4421
4422
|
return result;
|
|
4422
4423
|
}
|
|
4423
4424
|
async EntityDocumentsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4424
4425
|
this.CheckUserReadPermissions('Entity Documents', userPayload);
|
|
4425
|
-
const sSQL = `SELECT * FROM [
|
|
4426
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityDocuments] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Documents', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4426
4427
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Documents', await dataSource.query(sSQL));
|
|
4427
4428
|
return result;
|
|
4428
4429
|
}
|
|
4429
4430
|
async DataContextItemsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4430
4431
|
this.CheckUserReadPermissions('Data Context Items', userPayload);
|
|
4431
|
-
const sSQL = `SELECT * FROM [
|
|
4432
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDataContextItems] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Data Context Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4432
4433
|
const result = this.ArrayMapFieldNamesToCodeNames('Data Context Items', await dataSource.query(sSQL));
|
|
4433
4434
|
return result;
|
|
4434
4435
|
}
|
|
4435
4436
|
async UsersArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4436
4437
|
this.CheckUserReadPermissions('Users', userPayload);
|
|
4437
|
-
const sSQL = `SELECT * FROM [
|
|
4438
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUsers] WHERE [LinkedEntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Users', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4438
4439
|
const result = this.ArrayMapFieldNamesToCodeNames('Users', await dataSource.query(sSQL));
|
|
4439
4440
|
return result;
|
|
4440
4441
|
}
|
|
4441
4442
|
async EntityRecordDocumentsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4442
4443
|
this.CheckUserReadPermissions('Entity Record Documents', userPayload);
|
|
4443
|
-
const sSQL = `SELECT * FROM [
|
|
4444
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityRecordDocuments] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Record Documents', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4444
4445
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Record Documents', await dataSource.query(sSQL));
|
|
4445
4446
|
return result;
|
|
4446
4447
|
}
|
|
@@ -5141,121 +5142,121 @@ let UserResolverBase = class UserResolverBase extends server_1.ResolverBase {
|
|
|
5141
5142
|
}
|
|
5142
5143
|
async User(ID, { dataSource, userPayload }, pubSub) {
|
|
5143
5144
|
this.CheckUserReadPermissions('Users', userPayload);
|
|
5144
|
-
const sSQL = `SELECT * FROM [
|
|
5145
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUsers] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Users', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5145
5146
|
const result = this.MapFieldNamesToCodeNames('Users', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
5146
5147
|
return result;
|
|
5147
5148
|
}
|
|
5148
5149
|
async AllUsers({ dataSource, userPayload }, pubSub) {
|
|
5149
5150
|
this.CheckUserReadPermissions('Users', userPayload);
|
|
5150
|
-
const sSQL =
|
|
5151
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUsers]` + this.getRowLevelSecurityWhereClause('Users', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
5151
5152
|
const result = this.ArrayMapFieldNamesToCodeNames('Users', await dataSource.query(sSQL));
|
|
5152
5153
|
return result;
|
|
5153
5154
|
}
|
|
5154
5155
|
async UserApplicationsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5155
5156
|
this.CheckUserReadPermissions('User Applications', userPayload);
|
|
5156
|
-
const sSQL = `SELECT * FROM [
|
|
5157
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserApplications] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Applications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5157
5158
|
const result = this.ArrayMapFieldNamesToCodeNames('User Applications', await dataSource.query(sSQL));
|
|
5158
5159
|
return result;
|
|
5159
5160
|
}
|
|
5160
5161
|
async UserRolesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5161
5162
|
this.CheckUserReadPermissions('User Roles', userPayload);
|
|
5162
|
-
const sSQL = `SELECT * FROM [
|
|
5163
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserRoles] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5163
5164
|
const result = this.ArrayMapFieldNamesToCodeNames('User Roles', await dataSource.query(sSQL));
|
|
5164
5165
|
return result;
|
|
5165
5166
|
}
|
|
5166
5167
|
async WorkspacesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5167
5168
|
this.CheckUserReadPermissions('Workspaces', userPayload);
|
|
5168
|
-
const sSQL = `SELECT * FROM [
|
|
5169
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwWorkspaces] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Workspaces', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5169
5170
|
const result = this.ArrayMapFieldNamesToCodeNames('Workspaces', await dataSource.query(sSQL));
|
|
5170
5171
|
return result;
|
|
5171
5172
|
}
|
|
5172
5173
|
async ReportsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5173
5174
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
5174
|
-
const sSQL = `SELECT * FROM [
|
|
5175
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwReports] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5175
5176
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
5176
5177
|
return result;
|
|
5177
5178
|
}
|
|
5178
5179
|
async ReportSnapshotsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5179
5180
|
this.CheckUserReadPermissions('Report Snapshots', userPayload);
|
|
5180
|
-
const sSQL = `SELECT * FROM [
|
|
5181
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwReportSnapshots] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Report Snapshots', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5181
5182
|
const result = this.ArrayMapFieldNamesToCodeNames('Report Snapshots', await dataSource.query(sSQL));
|
|
5182
5183
|
return result;
|
|
5183
5184
|
}
|
|
5184
5185
|
async RecordChangesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5185
5186
|
this.CheckUserReadPermissions('Record Changes', userPayload);
|
|
5186
|
-
const sSQL = `SELECT * FROM [
|
|
5187
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwRecordChanges] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Record Changes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5187
5188
|
const result = this.ArrayMapFieldNamesToCodeNames('Record Changes', await dataSource.query(sSQL));
|
|
5188
5189
|
return result;
|
|
5189
5190
|
}
|
|
5190
5191
|
async DashboardsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5191
5192
|
this.CheckUserReadPermissions('Dashboards', userPayload);
|
|
5192
|
-
const sSQL = `SELECT * FROM [
|
|
5193
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDashboards] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Dashboards', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5193
5194
|
const result = this.ArrayMapFieldNamesToCodeNames('Dashboards', await dataSource.query(sSQL));
|
|
5194
5195
|
return result;
|
|
5195
5196
|
}
|
|
5196
5197
|
async UserViewRunsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5197
5198
|
this.CheckUserReadPermissions('User View Runs', userPayload);
|
|
5198
|
-
const sSQL = `SELECT * FROM [
|
|
5199
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserViewRuns] WHERE [RunByUserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User View Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5199
5200
|
const result = this.ArrayMapFieldNamesToCodeNames('User View Runs', await dataSource.query(sSQL));
|
|
5200
5201
|
return result;
|
|
5201
5202
|
}
|
|
5202
5203
|
async AuditLogsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5203
5204
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
5204
|
-
const sSQL = `SELECT * FROM [
|
|
5205
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuditLogs] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5205
5206
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL));
|
|
5206
5207
|
return result;
|
|
5207
5208
|
}
|
|
5208
5209
|
async ListsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5209
5210
|
this.CheckUserReadPermissions('Lists', userPayload);
|
|
5210
|
-
const sSQL = `SELECT * FROM [
|
|
5211
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwLists] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Lists', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5211
5212
|
const result = this.ArrayMapFieldNamesToCodeNames('Lists', await dataSource.query(sSQL));
|
|
5212
5213
|
return result;
|
|
5213
5214
|
}
|
|
5214
5215
|
async UserFavoritesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5215
5216
|
this.CheckUserReadPermissions('User Favorites', userPayload);
|
|
5216
|
-
const sSQL = `SELECT * FROM [
|
|
5217
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserFavorites] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Favorites', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5217
5218
|
const result = this.ArrayMapFieldNamesToCodeNames('User Favorites', await dataSource.query(sSQL));
|
|
5218
5219
|
return result;
|
|
5219
5220
|
}
|
|
5220
5221
|
async UserRecordLogsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5221
5222
|
this.CheckUserReadPermissions('User Record Logs', userPayload);
|
|
5222
|
-
const sSQL = `SELECT * FROM [
|
|
5223
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserRecordLogs] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Record Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5223
5224
|
const result = this.ArrayMapFieldNamesToCodeNames('User Record Logs', await dataSource.query(sSQL));
|
|
5224
5225
|
return result;
|
|
5225
5226
|
}
|
|
5226
5227
|
async UserViewsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5227
5228
|
this.CheckUserReadPermissions('User Views', userPayload);
|
|
5228
|
-
const sSQL = `SELECT * FROM [
|
|
5229
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserViews] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5229
5230
|
const result = this.ArrayMapFieldNamesToCodeNames('User Views', await dataSource.query(sSQL));
|
|
5230
5231
|
return result;
|
|
5231
5232
|
}
|
|
5232
5233
|
async CompanyIntegrationRunsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5233
5234
|
this.CheckUserReadPermissions('Company Integration Runs', userPayload);
|
|
5234
|
-
const sSQL = `SELECT * FROM [
|
|
5235
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanyIntegrationRuns] WHERE [RunByUserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5235
5236
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Runs', await dataSource.query(sSQL));
|
|
5236
5237
|
return result;
|
|
5237
5238
|
}
|
|
5238
5239
|
async UserNotificationsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5239
5240
|
this.CheckUserReadPermissions('User Notifications', userPayload);
|
|
5240
|
-
const sSQL = `SELECT * FROM [
|
|
5241
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserNotifications] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Notifications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5241
5242
|
const result = this.ArrayMapFieldNamesToCodeNames('User Notifications', await dataSource.query(sSQL));
|
|
5242
5243
|
return result;
|
|
5243
5244
|
}
|
|
5244
5245
|
async ConversationsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5245
5246
|
this.CheckUserReadPermissions('Conversations', userPayload);
|
|
5246
|
-
const sSQL = `SELECT * FROM [
|
|
5247
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwConversations] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Conversations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5247
5248
|
const result = this.ArrayMapFieldNamesToCodeNames('Conversations', await dataSource.query(sSQL));
|
|
5248
5249
|
return result;
|
|
5249
5250
|
}
|
|
5250
5251
|
async RecordMergeLogsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5251
5252
|
this.CheckUserReadPermissions('Record Merge Logs', userPayload);
|
|
5252
|
-
const sSQL = `SELECT * FROM [
|
|
5253
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwRecordMergeLogs] WHERE [InitiatedByUserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5253
5254
|
const result = this.ArrayMapFieldNamesToCodeNames('Record Merge Logs', await dataSource.query(sSQL));
|
|
5254
5255
|
return result;
|
|
5255
5256
|
}
|
|
5256
5257
|
async DataContextsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5257
5258
|
this.CheckUserReadPermissions('Data Contexts', userPayload);
|
|
5258
|
-
const sSQL = `SELECT * FROM [
|
|
5259
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDataContexts] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Data Contexts', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5259
5260
|
const result = this.ArrayMapFieldNamesToCodeNames('Data Contexts', await dataSource.query(sSQL));
|
|
5260
5261
|
return result;
|
|
5261
5262
|
}
|
|
@@ -5823,13 +5824,13 @@ let EntityRelationshipResolver = class EntityRelationshipResolver extends server
|
|
|
5823
5824
|
}
|
|
5824
5825
|
async EntityRelationship(ID, { dataSource, userPayload }, pubSub) {
|
|
5825
5826
|
this.CheckUserReadPermissions('Entity Relationships', userPayload);
|
|
5826
|
-
const sSQL = `SELECT * FROM [
|
|
5827
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityRelationships] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Relationships', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5827
5828
|
const result = this.MapFieldNamesToCodeNames('Entity Relationships', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
5828
5829
|
return result;
|
|
5829
5830
|
}
|
|
5830
5831
|
async AllEntityRelationships({ dataSource, userPayload }, pubSub) {
|
|
5831
5832
|
this.CheckUserReadPermissions('Entity Relationships', userPayload);
|
|
5832
|
-
const sSQL =
|
|
5833
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityRelationships]` + this.getRowLevelSecurityWhereClause('Entity Relationships', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
5833
5834
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Relationships', await dataSource.query(sSQL));
|
|
5834
5835
|
return result;
|
|
5835
5836
|
}
|
|
@@ -6120,7 +6121,7 @@ let UserRecordLogResolver = class UserRecordLogResolver extends server_1.Resolve
|
|
|
6120
6121
|
}
|
|
6121
6122
|
async UserRecordLog(ID, { dataSource, userPayload }, pubSub) {
|
|
6122
6123
|
this.CheckUserReadPermissions('User Record Logs', userPayload);
|
|
6123
|
-
const sSQL = `SELECT * FROM [
|
|
6124
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserRecordLogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Record Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6124
6125
|
const result = this.MapFieldNamesToCodeNames('User Record Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
6125
6126
|
return result;
|
|
6126
6127
|
}
|
|
@@ -6530,31 +6531,31 @@ let UserViewResolverBase = class UserViewResolverBase extends server_1.ResolverB
|
|
|
6530
6531
|
}
|
|
6531
6532
|
async UserView(ID, { dataSource, userPayload }, pubSub) {
|
|
6532
6533
|
this.CheckUserReadPermissions('User Views', userPayload);
|
|
6533
|
-
const sSQL = `SELECT * FROM [
|
|
6534
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserViews] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6534
6535
|
const result = this.MapFieldNamesToCodeNames('User Views', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
6535
6536
|
return result;
|
|
6536
6537
|
}
|
|
6537
6538
|
async AllUserViews({ dataSource, userPayload }, pubSub) {
|
|
6538
6539
|
this.CheckUserReadPermissions('User Views', userPayload);
|
|
6539
|
-
const sSQL =
|
|
6540
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserViews]` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
6540
6541
|
const result = this.ArrayMapFieldNamesToCodeNames('User Views', await dataSource.query(sSQL));
|
|
6541
6542
|
return result;
|
|
6542
6543
|
}
|
|
6543
6544
|
async EntityRelationshipsArray(userview_, { dataSource, userPayload }, pubSub) {
|
|
6544
6545
|
this.CheckUserReadPermissions('Entity Relationships', userPayload);
|
|
6545
|
-
const sSQL = `SELECT * FROM [
|
|
6546
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityRelationships] WHERE [DisplayUserViewGUID]=${userview_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Relationships', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6546
6547
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Relationships', await dataSource.query(sSQL));
|
|
6547
6548
|
return result;
|
|
6548
6549
|
}
|
|
6549
6550
|
async UserViewRunsArray(userview_, { dataSource, userPayload }, pubSub) {
|
|
6550
6551
|
this.CheckUserReadPermissions('User View Runs', userPayload);
|
|
6551
|
-
const sSQL = `SELECT * FROM [
|
|
6552
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserViewRuns] WHERE [UserViewID]=${userview_.ID} ` + this.getRowLevelSecurityWhereClause('User View Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6552
6553
|
const result = this.ArrayMapFieldNamesToCodeNames('User View Runs', await dataSource.query(sSQL));
|
|
6553
6554
|
return result;
|
|
6554
6555
|
}
|
|
6555
6556
|
async DataContextItemsArray(userview_, { dataSource, userPayload }, pubSub) {
|
|
6556
6557
|
this.CheckUserReadPermissions('Data Context Items', userPayload);
|
|
6557
|
-
const sSQL = `SELECT * FROM [
|
|
6558
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDataContextItems] WHERE [ViewID]=${userview_.ID} ` + this.getRowLevelSecurityWhereClause('Data Context Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6558
6559
|
const result = this.ArrayMapFieldNamesToCodeNames('Data Context Items', await dataSource.query(sSQL));
|
|
6559
6560
|
return result;
|
|
6560
6561
|
}
|
|
@@ -6859,25 +6860,25 @@ let CompanyIntegrationRunResolver = class CompanyIntegrationRunResolver extends
|
|
|
6859
6860
|
}
|
|
6860
6861
|
async CompanyIntegrationRun(ID, { dataSource, userPayload }, pubSub) {
|
|
6861
6862
|
this.CheckUserReadPermissions('Company Integration Runs', userPayload);
|
|
6862
|
-
const sSQL = `SELECT * FROM [
|
|
6863
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanyIntegrationRuns] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6863
6864
|
const result = this.MapFieldNamesToCodeNames('Company Integration Runs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
6864
6865
|
return result;
|
|
6865
6866
|
}
|
|
6866
6867
|
async CompanyIntegrationRunAPILogsArray(companyintegrationrun_, { dataSource, userPayload }, pubSub) {
|
|
6867
6868
|
this.CheckUserReadPermissions('Company Integration Run API Logs', userPayload);
|
|
6868
|
-
const sSQL = `SELECT * FROM [
|
|
6869
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanyIntegrationRunAPILogs] WHERE [CompanyIntegrationRunID]=${companyintegrationrun_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run API Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6869
6870
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Run API Logs', await dataSource.query(sSQL));
|
|
6870
6871
|
return result;
|
|
6871
6872
|
}
|
|
6872
6873
|
async ErrorLogsArray(companyintegrationrun_, { dataSource, userPayload }, pubSub) {
|
|
6873
6874
|
this.CheckUserReadPermissions('Error Logs', userPayload);
|
|
6874
|
-
const sSQL = `SELECT * FROM [
|
|
6875
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwErrorLogs] WHERE [CompanyIntegrationRunID]=${companyintegrationrun_.ID} ` + this.getRowLevelSecurityWhereClause('Error Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6875
6876
|
const result = this.ArrayMapFieldNamesToCodeNames('Error Logs', await dataSource.query(sSQL));
|
|
6876
6877
|
return result;
|
|
6877
6878
|
}
|
|
6878
6879
|
async CompanyIntegrationRunDetailsArray(companyintegrationrun_, { dataSource, userPayload }, pubSub) {
|
|
6879
6880
|
this.CheckUserReadPermissions('Company Integration Run Details', userPayload);
|
|
6880
|
-
const sSQL = `SELECT * FROM [
|
|
6881
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanyIntegrationRunDetails] WHERE [CompanyIntegrationRunID]=${companyintegrationrun_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6881
6882
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Run Details', await dataSource.query(sSQL));
|
|
6882
6883
|
return result;
|
|
6883
6884
|
}
|
|
@@ -7116,13 +7117,13 @@ let CompanyIntegrationRunDetailResolver = class CompanyIntegrationRunDetailResol
|
|
|
7116
7117
|
}
|
|
7117
7118
|
async CompanyIntegrationRunDetail(ID, { dataSource, userPayload }, pubSub) {
|
|
7118
7119
|
this.CheckUserReadPermissions('Company Integration Run Details', userPayload);
|
|
7119
|
-
const sSQL = `SELECT * FROM [
|
|
7120
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanyIntegrationRunDetails] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7120
7121
|
const result = this.MapFieldNamesToCodeNames('Company Integration Run Details', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
7121
7122
|
return result;
|
|
7122
7123
|
}
|
|
7123
7124
|
async ErrorLogsArray(companyintegrationrundetail_, { dataSource, userPayload }, pubSub) {
|
|
7124
7125
|
this.CheckUserReadPermissions('Error Logs', userPayload);
|
|
7125
|
-
const sSQL = `SELECT * FROM [
|
|
7126
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwErrorLogs] WHERE [CompanyIntegrationRunDetailID]=${companyintegrationrundetail_.ID} ` + this.getRowLevelSecurityWhereClause('Error Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7126
7127
|
const result = this.ArrayMapFieldNamesToCodeNames('Error Logs', await dataSource.query(sSQL));
|
|
7127
7128
|
return result;
|
|
7128
7129
|
}
|
|
@@ -7346,7 +7347,7 @@ let ErrorLogResolver = class ErrorLogResolver extends server_1.ResolverBase {
|
|
|
7346
7347
|
}
|
|
7347
7348
|
async ErrorLog(ID, { dataSource, userPayload }, pubSub) {
|
|
7348
7349
|
this.CheckUserReadPermissions('Error Logs', userPayload);
|
|
7349
|
-
const sSQL = `SELECT * FROM [
|
|
7350
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwErrorLogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Error Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7350
7351
|
const result = this.MapFieldNamesToCodeNames('Error Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
7351
7352
|
return result;
|
|
7352
7353
|
}
|
|
@@ -7524,25 +7525,25 @@ let ApplicationResolver = class ApplicationResolver extends server_1.ResolverBas
|
|
|
7524
7525
|
}
|
|
7525
7526
|
async Application(ID, { dataSource, userPayload }, pubSub) {
|
|
7526
7527
|
this.CheckUserReadPermissions('Applications', userPayload);
|
|
7527
|
-
const sSQL = `SELECT * FROM [
|
|
7528
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwApplications] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Applications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7528
7529
|
const result = this.MapFieldNamesToCodeNames('Applications', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
7529
7530
|
return result;
|
|
7530
7531
|
}
|
|
7531
7532
|
async AllApplications({ dataSource, userPayload }, pubSub) {
|
|
7532
7533
|
this.CheckUserReadPermissions('Applications', userPayload);
|
|
7533
|
-
const sSQL =
|
|
7534
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwApplications]` + this.getRowLevelSecurityWhereClause('Applications', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
7534
7535
|
const result = this.ArrayMapFieldNamesToCodeNames('Applications', await dataSource.query(sSQL));
|
|
7535
7536
|
return result;
|
|
7536
7537
|
}
|
|
7537
7538
|
async ApplicationEntitiesArray(application_, { dataSource, userPayload }, pubSub) {
|
|
7538
7539
|
this.CheckUserReadPermissions('Application Entities', userPayload);
|
|
7539
|
-
const sSQL = `SELECT * FROM [
|
|
7540
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwApplicationEntities] WHERE [ApplicationID]=${application_.ID} ` + this.getRowLevelSecurityWhereClause('Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7540
7541
|
const result = this.ArrayMapFieldNamesToCodeNames('Application Entities', await dataSource.query(sSQL));
|
|
7541
7542
|
return result;
|
|
7542
7543
|
}
|
|
7543
7544
|
async UserApplicationsArray(application_, { dataSource, userPayload }, pubSub) {
|
|
7544
7545
|
this.CheckUserReadPermissions('User Applications', userPayload);
|
|
7545
|
-
const sSQL = `SELECT * FROM [
|
|
7546
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserApplications] WHERE [ApplicationID]=${application_.ID} ` + this.getRowLevelSecurityWhereClause('User Applications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7546
7547
|
const result = this.ArrayMapFieldNamesToCodeNames('User Applications', await dataSource.query(sSQL));
|
|
7547
7548
|
return result;
|
|
7548
7549
|
}
|
|
@@ -7809,7 +7810,7 @@ let ApplicationEntityResolver = class ApplicationEntityResolver extends server_1
|
|
|
7809
7810
|
}
|
|
7810
7811
|
async ApplicationEntity(ID, { dataSource, userPayload }, pubSub) {
|
|
7811
7812
|
this.CheckUserReadPermissions('Application Entities', userPayload);
|
|
7812
|
-
const sSQL = `SELECT * FROM [
|
|
7813
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwApplicationEntities] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7813
7814
|
const result = this.MapFieldNamesToCodeNames('Application Entities', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
7814
7815
|
return result;
|
|
7815
7816
|
}
|
|
@@ -8182,13 +8183,13 @@ let EntityPermissionResolver = class EntityPermissionResolver extends server_1.R
|
|
|
8182
8183
|
}
|
|
8183
8184
|
async EntityPermission(ID, { dataSource, userPayload }, pubSub) {
|
|
8184
8185
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
8185
|
-
const sSQL = `SELECT * FROM [
|
|
8186
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityPermissions] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8186
8187
|
const result = this.MapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
8187
8188
|
return result;
|
|
8188
8189
|
}
|
|
8189
8190
|
async AllEntityPermissions({ dataSource, userPayload }, pubSub) {
|
|
8190
8191
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
8191
|
-
const sSQL =
|
|
8192
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityPermissions]` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
8192
8193
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL));
|
|
8193
8194
|
return result;
|
|
8194
8195
|
}
|
|
@@ -8459,7 +8460,7 @@ let UserApplicationEntityResolver = class UserApplicationEntityResolver extends
|
|
|
8459
8460
|
}
|
|
8460
8461
|
async UserApplicationEntity(ID, { dataSource, userPayload }, pubSub) {
|
|
8461
8462
|
this.CheckUserReadPermissions('User Application Entities', userPayload);
|
|
8462
|
-
const sSQL = `SELECT * FROM [
|
|
8463
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserApplicationEntities] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8463
8464
|
const result = this.MapFieldNamesToCodeNames('User Application Entities', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
8464
8465
|
return result;
|
|
8465
8466
|
}
|
|
@@ -8707,13 +8708,13 @@ let UserApplicationResolver = class UserApplicationResolver extends server_1.Res
|
|
|
8707
8708
|
}
|
|
8708
8709
|
async UserApplication(ID, { dataSource, userPayload }, pubSub) {
|
|
8709
8710
|
this.CheckUserReadPermissions('User Applications', userPayload);
|
|
8710
|
-
const sSQL = `SELECT * FROM [
|
|
8711
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserApplications] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Applications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8711
8712
|
const result = this.MapFieldNamesToCodeNames('User Applications', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
8712
8713
|
return result;
|
|
8713
8714
|
}
|
|
8714
8715
|
async UserApplicationEntitiesArray(userapplication_, { dataSource, userPayload }, pubSub) {
|
|
8715
8716
|
this.CheckUserReadPermissions('User Application Entities', userPayload);
|
|
8716
|
-
const sSQL = `SELECT * FROM [
|
|
8717
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserApplicationEntities] WHERE [UserApplicationID]=${userapplication_.ID} ` + this.getRowLevelSecurityWhereClause('User Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8717
8718
|
const result = this.ArrayMapFieldNamesToCodeNames('User Application Entities', await dataSource.query(sSQL));
|
|
8718
8719
|
return result;
|
|
8719
8720
|
}
|
|
@@ -8914,7 +8915,7 @@ let CompanyIntegrationRunAPILogResolver = class CompanyIntegrationRunAPILogResol
|
|
|
8914
8915
|
}
|
|
8915
8916
|
async CompanyIntegrationRunAPILog(ID, { dataSource, userPayload }, pubSub) {
|
|
8916
8917
|
this.CheckUserReadPermissions('Company Integration Run API Logs', userPayload);
|
|
8917
|
-
const sSQL = `SELECT * FROM [
|
|
8918
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanyIntegrationRunAPILogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run API Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8918
8919
|
const result = this.MapFieldNamesToCodeNames('Company Integration Run API Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
8919
8920
|
return result;
|
|
8920
8921
|
}
|
|
@@ -9164,13 +9165,13 @@ let ListResolver = class ListResolver extends server_1.ResolverBase {
|
|
|
9164
9165
|
}
|
|
9165
9166
|
async List(ID, { dataSource, userPayload }, pubSub) {
|
|
9166
9167
|
this.CheckUserReadPermissions('Lists', userPayload);
|
|
9167
|
-
const sSQL = `SELECT * FROM [
|
|
9168
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwLists] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Lists', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9168
9169
|
const result = this.MapFieldNamesToCodeNames('Lists', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
9169
9170
|
return result;
|
|
9170
9171
|
}
|
|
9171
9172
|
async ListDetailsArray(list_, { dataSource, userPayload }, pubSub) {
|
|
9172
9173
|
this.CheckUserReadPermissions('List Details', userPayload);
|
|
9173
|
-
const sSQL = `SELECT * FROM [
|
|
9174
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwListDetails] WHERE [ListID]=${list_.ID} ` + this.getRowLevelSecurityWhereClause('List Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9174
9175
|
const result = this.ArrayMapFieldNamesToCodeNames('List Details', await dataSource.query(sSQL));
|
|
9175
9176
|
return result;
|
|
9176
9177
|
}
|
|
@@ -9428,7 +9429,7 @@ let ListDetailResolver = class ListDetailResolver extends server_1.ResolverBase
|
|
|
9428
9429
|
}
|
|
9429
9430
|
async ListDetail(ID, { dataSource, userPayload }, pubSub) {
|
|
9430
9431
|
this.CheckUserReadPermissions('List Details', userPayload);
|
|
9431
|
-
const sSQL = `SELECT * FROM [
|
|
9432
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwListDetails] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('List Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9432
9433
|
const result = this.MapFieldNamesToCodeNames('List Details', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
9433
9434
|
return result;
|
|
9434
9435
|
}
|
|
@@ -9691,13 +9692,13 @@ let UserViewRunResolver = class UserViewRunResolver extends server_1.ResolverBas
|
|
|
9691
9692
|
}
|
|
9692
9693
|
async UserViewRun(ID, { dataSource, userPayload }, pubSub) {
|
|
9693
9694
|
this.CheckUserReadPermissions('User View Runs', userPayload);
|
|
9694
|
-
const sSQL = `SELECT * FROM [
|
|
9695
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserViewRuns] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User View Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9695
9696
|
const result = this.MapFieldNamesToCodeNames('User View Runs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
9696
9697
|
return result;
|
|
9697
9698
|
}
|
|
9698
9699
|
async UserViewRunDetailsArray(userviewrun_, { dataSource, userPayload }, pubSub) {
|
|
9699
9700
|
this.CheckUserReadPermissions('User View Run Details', userPayload);
|
|
9700
|
-
const sSQL = `SELECT * FROM [
|
|
9701
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserViewRunDetails] WHERE [UserViewRunID]=${userviewrun_.ID} ` + this.getRowLevelSecurityWhereClause('User View Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9701
9702
|
const result = this.ArrayMapFieldNamesToCodeNames('User View Run Details', await dataSource.query(sSQL));
|
|
9702
9703
|
return result;
|
|
9703
9704
|
}
|
|
@@ -9920,7 +9921,7 @@ let UserViewRunDetailResolver = class UserViewRunDetailResolver extends server_1
|
|
|
9920
9921
|
}
|
|
9921
9922
|
async UserViewRunDetail(ID, { dataSource, userPayload }, pubSub) {
|
|
9922
9923
|
this.CheckUserReadPermissions('User View Run Details', userPayload);
|
|
9923
|
-
const sSQL = `SELECT * FROM [
|
|
9924
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserViewRunDetails] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User View Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9924
9925
|
const result = this.MapFieldNamesToCodeNames('User View Run Details', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
9925
9926
|
return result;
|
|
9926
9927
|
}
|
|
@@ -10154,7 +10155,7 @@ let WorkflowRunResolver = class WorkflowRunResolver extends server_1.ResolverBas
|
|
|
10154
10155
|
}
|
|
10155
10156
|
async WorkflowRun(ID, { dataSource, userPayload }, pubSub) {
|
|
10156
10157
|
this.CheckUserReadPermissions('Workflow Runs', userPayload);
|
|
10157
|
-
const sSQL = `SELECT * FROM [
|
|
10158
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwWorkflowRuns] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Workflow Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10158
10159
|
const result = this.MapFieldNamesToCodeNames('Workflow Runs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
10159
10160
|
return result;
|
|
10160
10161
|
}
|
|
@@ -10358,19 +10359,19 @@ let WorkflowResolver = class WorkflowResolver extends server_1.ResolverBase {
|
|
|
10358
10359
|
}
|
|
10359
10360
|
async Workflow(ID, { dataSource, userPayload }, pubSub) {
|
|
10360
10361
|
this.CheckUserReadPermissions('Workflows', userPayload);
|
|
10361
|
-
const sSQL = `SELECT * FROM [
|
|
10362
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwWorkflows] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Workflows', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10362
10363
|
const result = this.MapFieldNamesToCodeNames('Workflows', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
10363
10364
|
return result;
|
|
10364
10365
|
}
|
|
10365
10366
|
async ReportsArray(workflow_, { dataSource, userPayload }, pubSub) {
|
|
10366
10367
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
10367
|
-
const sSQL = `SELECT * FROM [
|
|
10368
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwReports] WHERE [OutputWorkflowID]=${workflow_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10368
10369
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
10369
10370
|
return result;
|
|
10370
10371
|
}
|
|
10371
10372
|
async WorkflowRunsArray(workflow_, { dataSource, userPayload }, pubSub) {
|
|
10372
10373
|
this.CheckUserReadPermissions('Workflow Runs', userPayload);
|
|
10373
|
-
const sSQL = `SELECT * FROM [
|
|
10374
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwWorkflowRuns] WHERE [WorkflowName]=${workflow_.ID} ` + this.getRowLevelSecurityWhereClause('Workflow Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10374
10375
|
const result = this.ArrayMapFieldNamesToCodeNames('Workflow Runs', await dataSource.query(sSQL));
|
|
10375
10376
|
return result;
|
|
10376
10377
|
}
|
|
@@ -10579,13 +10580,13 @@ let WorkflowEngineResolver = class WorkflowEngineResolver extends server_1.Resol
|
|
|
10579
10580
|
}
|
|
10580
10581
|
async WorkflowEngine(ID, { dataSource, userPayload }, pubSub) {
|
|
10581
10582
|
this.CheckUserReadPermissions('Workflow Engines', userPayload);
|
|
10582
|
-
const sSQL = `SELECT * FROM [
|
|
10583
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwWorkflowEngines] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Workflow Engines', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10583
10584
|
const result = this.MapFieldNamesToCodeNames('Workflow Engines', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
10584
10585
|
return result;
|
|
10585
10586
|
}
|
|
10586
10587
|
async WorkflowsArray(workflowengine_, { dataSource, userPayload }, pubSub) {
|
|
10587
10588
|
this.CheckUserReadPermissions('Workflows', userPayload);
|
|
10588
|
-
const sSQL = `SELECT * FROM [
|
|
10589
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwWorkflows] WHERE [WorkflowEngineName]=${workflowengine_.ID} ` + this.getRowLevelSecurityWhereClause('Workflows', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10589
10590
|
const result = this.ArrayMapFieldNamesToCodeNames('Workflows', await dataSource.query(sSQL));
|
|
10590
10591
|
return result;
|
|
10591
10592
|
}
|
|
@@ -10817,7 +10818,7 @@ let RecordChangeResolver = class RecordChangeResolver extends server_1.ResolverB
|
|
|
10817
10818
|
}
|
|
10818
10819
|
async RecordChange(ID, { dataSource, userPayload }, pubSub) {
|
|
10819
10820
|
this.CheckUserReadPermissions('Record Changes', userPayload);
|
|
10820
|
-
const sSQL = `SELECT * FROM [
|
|
10821
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwRecordChanges] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Record Changes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10821
10822
|
const result = this.MapFieldNamesToCodeNames('Record Changes', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
10822
10823
|
return result;
|
|
10823
10824
|
}
|
|
@@ -10986,13 +10987,13 @@ let UserRoleResolver = class UserRoleResolver extends server_1.ResolverBase {
|
|
|
10986
10987
|
}
|
|
10987
10988
|
async UserRole(ID, { dataSource, userPayload }, pubSub) {
|
|
10988
10989
|
this.CheckUserReadPermissions('User Roles', userPayload);
|
|
10989
|
-
const sSQL = `SELECT * FROM [
|
|
10990
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserRoles] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10990
10991
|
const result = this.MapFieldNamesToCodeNames('User Roles', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
10991
10992
|
return result;
|
|
10992
10993
|
}
|
|
10993
10994
|
async AllUserRoles({ dataSource, userPayload }, pubSub) {
|
|
10994
10995
|
this.CheckUserReadPermissions('User Roles', userPayload);
|
|
10995
|
-
const sSQL =
|
|
10996
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserRoles]` + this.getRowLevelSecurityWhereClause('User Roles', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
10996
10997
|
const result = this.ArrayMapFieldNamesToCodeNames('User Roles', await dataSource.query(sSQL));
|
|
10997
10998
|
return result;
|
|
10998
10999
|
}
|
|
@@ -11158,19 +11159,19 @@ let RowLevelSecurityFilterResolver = class RowLevelSecurityFilterResolver extend
|
|
|
11158
11159
|
}
|
|
11159
11160
|
async RowLevelSecurityFilter(ID, { dataSource, userPayload }, pubSub) {
|
|
11160
11161
|
this.CheckUserReadPermissions('Row Level Security Filters', userPayload);
|
|
11161
|
-
const sSQL = `SELECT * FROM [
|
|
11162
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwRowLevelSecurityFilters] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Row Level Security Filters', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11162
11163
|
const result = this.MapFieldNamesToCodeNames('Row Level Security Filters', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
11163
11164
|
return result;
|
|
11164
11165
|
}
|
|
11165
11166
|
async AllRowLevelSecurityFilters({ dataSource, userPayload }, pubSub) {
|
|
11166
11167
|
this.CheckUserReadPermissions('Row Level Security Filters', userPayload);
|
|
11167
|
-
const sSQL =
|
|
11168
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwRowLevelSecurityFilters]` + this.getRowLevelSecurityWhereClause('Row Level Security Filters', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
11168
11169
|
const result = this.ArrayMapFieldNamesToCodeNames('Row Level Security Filters', await dataSource.query(sSQL));
|
|
11169
11170
|
return result;
|
|
11170
11171
|
}
|
|
11171
11172
|
async EntityPermissionsArray(rowlevelsecurityfilter_, { dataSource, userPayload }, pubSub) {
|
|
11172
11173
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
11173
|
-
const sSQL = `SELECT * FROM [
|
|
11174
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityPermissions] WHERE [ReadRLSFilterID]=${rowlevelsecurityfilter_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11174
11175
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL));
|
|
11175
11176
|
return result;
|
|
11176
11177
|
}
|
|
@@ -11425,7 +11426,7 @@ let AuditLogResolver = class AuditLogResolver extends server_1.ResolverBase {
|
|
|
11425
11426
|
}
|
|
11426
11427
|
async AuditLog(ID, { dataSource, userPayload }, pubSub) {
|
|
11427
11428
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
11428
|
-
const sSQL = `SELECT * FROM [
|
|
11429
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuditLogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11429
11430
|
const result = this.MapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
11430
11431
|
return result;
|
|
11431
11432
|
}
|
|
@@ -11633,37 +11634,37 @@ let AuthorizationResolver = class AuthorizationResolver extends server_1.Resolve
|
|
|
11633
11634
|
}
|
|
11634
11635
|
async Authorization(ID, { dataSource, userPayload }, pubSub) {
|
|
11635
11636
|
this.CheckUserReadPermissions('Authorizations', userPayload);
|
|
11636
|
-
const sSQL = `SELECT * FROM [
|
|
11637
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuthorizations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Authorizations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11637
11638
|
const result = this.MapFieldNamesToCodeNames('Authorizations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
11638
11639
|
return result;
|
|
11639
11640
|
}
|
|
11640
11641
|
async AllAuthorizations({ dataSource, userPayload }, pubSub) {
|
|
11641
11642
|
this.CheckUserReadPermissions('Authorizations', userPayload);
|
|
11642
|
-
const sSQL =
|
|
11643
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuthorizations]` + this.getRowLevelSecurityWhereClause('Authorizations', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
11643
11644
|
const result = this.ArrayMapFieldNamesToCodeNames('Authorizations', await dataSource.query(sSQL));
|
|
11644
11645
|
return result;
|
|
11645
11646
|
}
|
|
11646
11647
|
async AuthorizationRolesArray(authorization_, { dataSource, userPayload }, pubSub) {
|
|
11647
11648
|
this.CheckUserReadPermissions('Authorization Roles', userPayload);
|
|
11648
|
-
const sSQL = `SELECT * FROM [
|
|
11649
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuthorizationRoles] WHERE [AuthorizationID]=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Authorization Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11649
11650
|
const result = this.ArrayMapFieldNamesToCodeNames('Authorization Roles', await dataSource.query(sSQL));
|
|
11650
11651
|
return result;
|
|
11651
11652
|
}
|
|
11652
11653
|
async AuthorizationsArray(authorization_, { dataSource, userPayload }, pubSub) {
|
|
11653
11654
|
this.CheckUserReadPermissions('Authorizations', userPayload);
|
|
11654
|
-
const sSQL = `SELECT * FROM [
|
|
11655
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuthorizations] WHERE [ParentID]=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Authorizations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11655
11656
|
const result = this.ArrayMapFieldNamesToCodeNames('Authorizations', await dataSource.query(sSQL));
|
|
11656
11657
|
return result;
|
|
11657
11658
|
}
|
|
11658
11659
|
async AuditLogTypesArray(authorization_, { dataSource, userPayload }, pubSub) {
|
|
11659
11660
|
this.CheckUserReadPermissions('Audit Log Types', userPayload);
|
|
11660
|
-
const sSQL = `SELECT * FROM [
|
|
11661
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuditLogTypes] WHERE [AuthorizationName]=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Log Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11661
11662
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Log Types', await dataSource.query(sSQL));
|
|
11662
11663
|
return result;
|
|
11663
11664
|
}
|
|
11664
11665
|
async AuditLogsArray(authorization_, { dataSource, userPayload }, pubSub) {
|
|
11665
11666
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
11666
|
-
const sSQL = `SELECT * FROM [
|
|
11667
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuditLogs] WHERE [AuthorizationName]=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11667
11668
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL));
|
|
11668
11669
|
return result;
|
|
11669
11670
|
}
|
|
@@ -11834,13 +11835,13 @@ let AuthorizationRoleResolver = class AuthorizationRoleResolver extends server_1
|
|
|
11834
11835
|
}
|
|
11835
11836
|
async AuthorizationRole(ID, { dataSource, userPayload }, pubSub) {
|
|
11836
11837
|
this.CheckUserReadPermissions('Authorization Roles', userPayload);
|
|
11837
|
-
const sSQL = `SELECT * FROM [
|
|
11838
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuthorizationRoles] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Authorization Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11838
11839
|
const result = this.MapFieldNamesToCodeNames('Authorization Roles', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
11839
11840
|
return result;
|
|
11840
11841
|
}
|
|
11841
11842
|
async AllAuthorizationRoles({ dataSource, userPayload }, pubSub) {
|
|
11842
11843
|
this.CheckUserReadPermissions('Authorization Roles', userPayload);
|
|
11843
|
-
const sSQL =
|
|
11844
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuthorizationRoles]` + this.getRowLevelSecurityWhereClause('Authorization Roles', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
11844
11845
|
const result = this.ArrayMapFieldNamesToCodeNames('Authorization Roles', await dataSource.query(sSQL));
|
|
11845
11846
|
return result;
|
|
11846
11847
|
}
|
|
@@ -11991,25 +11992,25 @@ let AuditLogTypeResolver = class AuditLogTypeResolver extends server_1.ResolverB
|
|
|
11991
11992
|
}
|
|
11992
11993
|
async AuditLogType(ID, { dataSource, userPayload }, pubSub) {
|
|
11993
11994
|
this.CheckUserReadPermissions('Audit Log Types', userPayload);
|
|
11994
|
-
const sSQL = `SELECT * FROM [
|
|
11995
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuditLogTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Audit Log Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11995
11996
|
const result = this.MapFieldNamesToCodeNames('Audit Log Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
11996
11997
|
return result;
|
|
11997
11998
|
}
|
|
11998
11999
|
async AllAuditLogTypes({ dataSource, userPayload }, pubSub) {
|
|
11999
12000
|
this.CheckUserReadPermissions('Audit Log Types', userPayload);
|
|
12000
|
-
const sSQL =
|
|
12001
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuditLogTypes]` + this.getRowLevelSecurityWhereClause('Audit Log Types', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12001
12002
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Log Types', await dataSource.query(sSQL));
|
|
12002
12003
|
return result;
|
|
12003
12004
|
}
|
|
12004
12005
|
async AuditLogsArray(auditlogtype_, { dataSource, userPayload }, pubSub) {
|
|
12005
12006
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
12006
|
-
const sSQL = `SELECT * FROM [
|
|
12007
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuditLogs] WHERE [AuditLogTypeName]=${auditlogtype_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12007
12008
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL));
|
|
12008
12009
|
return result;
|
|
12009
12010
|
}
|
|
12010
12011
|
async AuditLogTypesArray(auditlogtype_, { dataSource, userPayload }, pubSub) {
|
|
12011
12012
|
this.CheckUserReadPermissions('Audit Log Types', userPayload);
|
|
12012
|
-
const sSQL = `SELECT * FROM [
|
|
12013
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAuditLogTypes] WHERE [ParentID]=${auditlogtype_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Log Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12013
12014
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Log Types', await dataSource.query(sSQL));
|
|
12014
12015
|
return result;
|
|
12015
12016
|
}
|
|
@@ -12179,13 +12180,13 @@ let EntityFieldValueResolver = class EntityFieldValueResolver extends server_1.R
|
|
|
12179
12180
|
}
|
|
12180
12181
|
async EntityFieldValue(ID, { dataSource, userPayload }, pubSub) {
|
|
12181
12182
|
this.CheckUserReadPermissions('Entity Field Values', userPayload);
|
|
12182
|
-
const sSQL = `SELECT * FROM [
|
|
12183
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityFieldValues] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Field Values', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12183
12184
|
const result = this.MapFieldNamesToCodeNames('Entity Field Values', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
12184
12185
|
return result;
|
|
12185
12186
|
}
|
|
12186
12187
|
async AllEntityFieldValues({ dataSource, userPayload }, pubSub) {
|
|
12187
12188
|
this.CheckUserReadPermissions('Entity Field Values', userPayload);
|
|
12188
|
-
const sSQL =
|
|
12189
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityFieldValues]` + this.getRowLevelSecurityWhereClause('Entity Field Values', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12189
12190
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Field Values', await dataSource.query(sSQL));
|
|
12190
12191
|
return result;
|
|
12191
12192
|
}
|
|
@@ -12391,37 +12392,37 @@ let AIModelResolver = class AIModelResolver extends server_1.ResolverBase {
|
|
|
12391
12392
|
}
|
|
12392
12393
|
async AIModel(ID, { dataSource, userPayload }, pubSub) {
|
|
12393
12394
|
this.CheckUserReadPermissions('AI Models', userPayload);
|
|
12394
|
-
const sSQL = `SELECT * FROM [
|
|
12395
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAIModels] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('AI Models', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12395
12396
|
const result = this.MapFieldNamesToCodeNames('AI Models', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
12396
12397
|
return result;
|
|
12397
12398
|
}
|
|
12398
12399
|
async AllAIModels({ dataSource, userPayload }, pubSub) {
|
|
12399
12400
|
this.CheckUserReadPermissions('AI Models', userPayload);
|
|
12400
|
-
const sSQL =
|
|
12401
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAIModels]` + this.getRowLevelSecurityWhereClause('AI Models', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12401
12402
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Models', await dataSource.query(sSQL));
|
|
12402
12403
|
return result;
|
|
12403
12404
|
}
|
|
12404
12405
|
async AIActionsArray(aimodel_, { dataSource, userPayload }, pubSub) {
|
|
12405
12406
|
this.CheckUserReadPermissions('AI Actions', userPayload);
|
|
12406
|
-
const sSQL = `SELECT * FROM [
|
|
12407
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAIActions] WHERE [DefaultModelID]=${aimodel_.ID} ` + this.getRowLevelSecurityWhereClause('AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12407
12408
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Actions', await dataSource.query(sSQL));
|
|
12408
12409
|
return result;
|
|
12409
12410
|
}
|
|
12410
12411
|
async AIModelActionsArray(aimodel_, { dataSource, userPayload }, pubSub) {
|
|
12411
12412
|
this.CheckUserReadPermissions('AI Model Actions', userPayload);
|
|
12412
|
-
const sSQL = `SELECT * FROM [
|
|
12413
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAIModelActions] WHERE [AIModelID]=${aimodel_.ID} ` + this.getRowLevelSecurityWhereClause('AI Model Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12413
12414
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Model Actions', await dataSource.query(sSQL));
|
|
12414
12415
|
return result;
|
|
12415
12416
|
}
|
|
12416
12417
|
async EntityAIActionsArray(aimodel_, { dataSource, userPayload }, pubSub) {
|
|
12417
12418
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
12418
|
-
const sSQL = `SELECT * FROM [
|
|
12419
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityAIActions] WHERE [AIModelID]=${aimodel_.ID} ` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12419
12420
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL));
|
|
12420
12421
|
return result;
|
|
12421
12422
|
}
|
|
12422
12423
|
async VectorIndexesArray(aimodel_, { dataSource, userPayload }, pubSub) {
|
|
12423
12424
|
this.CheckUserReadPermissions('Vector Indexes', userPayload);
|
|
12424
|
-
const sSQL = `SELECT * FROM [
|
|
12425
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwVectorIndexes] WHERE [EmbeddingModelID]=${aimodel_.ID} ` + this.getRowLevelSecurityWhereClause('Vector Indexes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12425
12426
|
const result = this.ArrayMapFieldNamesToCodeNames('Vector Indexes', await dataSource.query(sSQL));
|
|
12426
12427
|
return result;
|
|
12427
12428
|
}
|
|
@@ -12671,25 +12672,25 @@ let AIActionResolver = class AIActionResolver extends server_1.ResolverBase {
|
|
|
12671
12672
|
}
|
|
12672
12673
|
async AIAction(ID, { dataSource, userPayload }, pubSub) {
|
|
12673
12674
|
this.CheckUserReadPermissions('AI Actions', userPayload);
|
|
12674
|
-
const sSQL = `SELECT * FROM [
|
|
12675
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAIActions] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12675
12676
|
const result = this.MapFieldNamesToCodeNames('AI Actions', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
12676
12677
|
return result;
|
|
12677
12678
|
}
|
|
12678
12679
|
async AllAIActions({ dataSource, userPayload }, pubSub) {
|
|
12679
12680
|
this.CheckUserReadPermissions('AI Actions', userPayload);
|
|
12680
|
-
const sSQL =
|
|
12681
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAIActions]` + this.getRowLevelSecurityWhereClause('AI Actions', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12681
12682
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Actions', await dataSource.query(sSQL));
|
|
12682
12683
|
return result;
|
|
12683
12684
|
}
|
|
12684
12685
|
async AIModelActionsArray(aiaction_, { dataSource, userPayload }, pubSub) {
|
|
12685
12686
|
this.CheckUserReadPermissions('AI Model Actions', userPayload);
|
|
12686
|
-
const sSQL = `SELECT * FROM [
|
|
12687
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAIModelActions] WHERE [AIActionID]=${aiaction_.ID} ` + this.getRowLevelSecurityWhereClause('AI Model Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12687
12688
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Model Actions', await dataSource.query(sSQL));
|
|
12688
12689
|
return result;
|
|
12689
12690
|
}
|
|
12690
12691
|
async EntityAIActionsArray(aiaction_, { dataSource, userPayload }, pubSub) {
|
|
12691
12692
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
12692
|
-
const sSQL = `SELECT * FROM [
|
|
12693
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityAIActions] WHERE [AIActionID]=${aiaction_.ID} ` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12693
12694
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL));
|
|
12694
12695
|
return result;
|
|
12695
12696
|
}
|
|
@@ -12901,13 +12902,13 @@ let AIModelActionResolver = class AIModelActionResolver extends server_1.Resolve
|
|
|
12901
12902
|
}
|
|
12902
12903
|
async AIModelAction(ID, { dataSource, userPayload }, pubSub) {
|
|
12903
12904
|
this.CheckUserReadPermissions('AI Model Actions', userPayload);
|
|
12904
|
-
const sSQL = `SELECT * FROM [
|
|
12905
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAIModelActions] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('AI Model Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12905
12906
|
const result = this.MapFieldNamesToCodeNames('AI Model Actions', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
12906
12907
|
return result;
|
|
12907
12908
|
}
|
|
12908
12909
|
async AllAIModelActions({ dataSource, userPayload }, pubSub) {
|
|
12909
12910
|
this.CheckUserReadPermissions('AI Model Actions', userPayload);
|
|
12910
|
-
const sSQL =
|
|
12911
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAIModelActions]` + this.getRowLevelSecurityWhereClause('AI Model Actions', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12911
12912
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Model Actions', await dataSource.query(sSQL));
|
|
12912
12913
|
return result;
|
|
12913
12914
|
}
|
|
@@ -13177,13 +13178,13 @@ let EntityAIActionResolver = class EntityAIActionResolver extends server_1.Resol
|
|
|
13177
13178
|
}
|
|
13178
13179
|
async EntityAIAction(ID, { dataSource, userPayload }, pubSub) {
|
|
13179
13180
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
13180
|
-
const sSQL = `SELECT * FROM [
|
|
13181
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityAIActions] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13181
13182
|
const result = this.MapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
13182
13183
|
return result;
|
|
13183
13184
|
}
|
|
13184
13185
|
async AllEntityAIActions({ dataSource, userPayload }, pubSub) {
|
|
13185
13186
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
13186
|
-
const sSQL =
|
|
13187
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityAIActions]` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
13187
13188
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL));
|
|
13188
13189
|
return result;
|
|
13189
13190
|
}
|
|
@@ -13354,19 +13355,19 @@ let AIModelTypeResolver = class AIModelTypeResolver extends server_1.ResolverBas
|
|
|
13354
13355
|
}
|
|
13355
13356
|
async AIModelType(ID, { dataSource, userPayload }, pubSub) {
|
|
13356
13357
|
this.CheckUserReadPermissions('AI Model Types', userPayload);
|
|
13357
|
-
const sSQL = `SELECT * FROM [
|
|
13358
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAIModelTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('AI Model Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13358
13359
|
const result = this.MapFieldNamesToCodeNames('AI Model Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
13359
13360
|
return result;
|
|
13360
13361
|
}
|
|
13361
13362
|
async AllAIModelTypes({ dataSource, userPayload }, pubSub) {
|
|
13362
13363
|
this.CheckUserReadPermissions('AI Model Types', userPayload);
|
|
13363
|
-
const sSQL =
|
|
13364
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAIModelTypes]` + this.getRowLevelSecurityWhereClause('AI Model Types', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
13364
13365
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Model Types', await dataSource.query(sSQL));
|
|
13365
13366
|
return result;
|
|
13366
13367
|
}
|
|
13367
13368
|
async AIModelsArray(aimodeltype_, { dataSource, userPayload }, pubSub) {
|
|
13368
13369
|
this.CheckUserReadPermissions('AI Models', userPayload);
|
|
13369
|
-
const sSQL = `SELECT * FROM [
|
|
13370
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwAIModels] WHERE [AIModelTypeID]=${aimodeltype_.ID} ` + this.getRowLevelSecurityWhereClause('AI Models', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13370
13371
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Models', await dataSource.query(sSQL));
|
|
13371
13372
|
return result;
|
|
13372
13373
|
}
|
|
@@ -13542,13 +13543,13 @@ let QueueTypeResolver = class QueueTypeResolver extends server_1.ResolverBase {
|
|
|
13542
13543
|
}
|
|
13543
13544
|
async QueueType(ID, { dataSource, userPayload }, pubSub) {
|
|
13544
13545
|
this.CheckUserReadPermissions('Queue Types', userPayload);
|
|
13545
|
-
const sSQL = `SELECT * FROM [
|
|
13546
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwQueueTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Queue Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13546
13547
|
const result = this.MapFieldNamesToCodeNames('Queue Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
13547
13548
|
return result;
|
|
13548
13549
|
}
|
|
13549
13550
|
async QueuesArray(queuetype_, { dataSource, userPayload }, pubSub) {
|
|
13550
13551
|
this.CheckUserReadPermissions('Queues', userPayload);
|
|
13551
|
-
const sSQL = `SELECT * FROM [
|
|
13552
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwQueues] WHERE [QueueTypeID]=${queuetype_.ID} ` + this.getRowLevelSecurityWhereClause('Queues', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13552
13553
|
const result = this.ArrayMapFieldNamesToCodeNames('Queues', await dataSource.query(sSQL));
|
|
13553
13554
|
return result;
|
|
13554
13555
|
}
|
|
@@ -13898,13 +13899,13 @@ let QueueResolver = class QueueResolver extends server_1.ResolverBase {
|
|
|
13898
13899
|
}
|
|
13899
13900
|
async Queue(ID, { dataSource, userPayload }, pubSub) {
|
|
13900
13901
|
this.CheckUserReadPermissions('Queues', userPayload);
|
|
13901
|
-
const sSQL = `SELECT * FROM [
|
|
13902
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwQueues] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Queues', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13902
13903
|
const result = this.MapFieldNamesToCodeNames('Queues', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
13903
13904
|
return result;
|
|
13904
13905
|
}
|
|
13905
13906
|
async QueueTasksArray(queue_, { dataSource, userPayload }, pubSub) {
|
|
13906
13907
|
this.CheckUserReadPermissions('Queue Tasks', userPayload);
|
|
13907
|
-
const sSQL = `SELECT * FROM [
|
|
13908
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwQueueTasks] WHERE [QueueID]=${queue_.ID} ` + this.getRowLevelSecurityWhereClause('Queue Tasks', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13908
13909
|
const result = this.ArrayMapFieldNamesToCodeNames('Queue Tasks', await dataSource.query(sSQL));
|
|
13909
13910
|
return result;
|
|
13910
13911
|
}
|
|
@@ -14201,7 +14202,7 @@ let QueueTaskResolver = class QueueTaskResolver extends server_1.ResolverBase {
|
|
|
14201
14202
|
}
|
|
14202
14203
|
async QueueTask(ID, { dataSource, userPayload }, pubSub) {
|
|
14203
14204
|
this.CheckUserReadPermissions('Queue Tasks', userPayload);
|
|
14204
|
-
const sSQL = `SELECT * FROM [
|
|
14205
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwQueueTasks] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Queue Tasks', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14205
14206
|
const result = this.MapFieldNamesToCodeNames('Queue Tasks', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
14206
14207
|
return result;
|
|
14207
14208
|
}
|
|
@@ -14449,7 +14450,7 @@ let DashboardResolver = class DashboardResolver extends server_1.ResolverBase {
|
|
|
14449
14450
|
}
|
|
14450
14451
|
async Dashboard(ID, { dataSource, userPayload }, pubSub) {
|
|
14451
14452
|
this.CheckUserReadPermissions('Dashboards', userPayload);
|
|
14452
|
-
const sSQL = `SELECT * FROM [
|
|
14453
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDashboards] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Dashboards', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14453
14454
|
this.createRecordAccessAuditLogRecord(userPayload, 'Dashboards', ID);
|
|
14454
14455
|
const result = this.MapFieldNamesToCodeNames('Dashboards', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
14455
14456
|
return result;
|
|
@@ -14655,14 +14656,14 @@ let OutputTriggerTypeResolver = class OutputTriggerTypeResolver extends server_1
|
|
|
14655
14656
|
}
|
|
14656
14657
|
async OutputTriggerType(ID, { dataSource, userPayload }, pubSub) {
|
|
14657
14658
|
this.CheckUserReadPermissions('Output Trigger Types', userPayload);
|
|
14658
|
-
const sSQL = `SELECT * FROM [
|
|
14659
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwOutputTriggerTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Output Trigger Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14659
14660
|
this.createRecordAccessAuditLogRecord(userPayload, 'Output Trigger Types', ID);
|
|
14660
14661
|
const result = this.MapFieldNamesToCodeNames('Output Trigger Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
14661
14662
|
return result;
|
|
14662
14663
|
}
|
|
14663
14664
|
async ReportsArray(outputtriggertype_, { dataSource, userPayload }, pubSub) {
|
|
14664
14665
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
14665
|
-
const sSQL = `SELECT * FROM [
|
|
14666
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwReports] WHERE [OutputTriggerTypeID]=${outputtriggertype_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14666
14667
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
14667
14668
|
return result;
|
|
14668
14669
|
}
|
|
@@ -14790,14 +14791,14 @@ let OutputFormatTypeResolver = class OutputFormatTypeResolver extends server_1.R
|
|
|
14790
14791
|
}
|
|
14791
14792
|
async OutputFormatType(ID, { dataSource, userPayload }, pubSub) {
|
|
14792
14793
|
this.CheckUserReadPermissions('Output Format Types', userPayload);
|
|
14793
|
-
const sSQL = `SELECT * FROM [
|
|
14794
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwOutputFormatTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Output Format Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14794
14795
|
this.createRecordAccessAuditLogRecord(userPayload, 'Output Format Types', ID);
|
|
14795
14796
|
const result = this.MapFieldNamesToCodeNames('Output Format Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
14796
14797
|
return result;
|
|
14797
14798
|
}
|
|
14798
14799
|
async ReportsArray(outputformattype_, { dataSource, userPayload }, pubSub) {
|
|
14799
14800
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
14800
|
-
const sSQL = `SELECT * FROM [
|
|
14801
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwReports] WHERE [OutputFormatTypeID]=${outputformattype_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14801
14802
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
14802
14803
|
return result;
|
|
14803
14804
|
}
|
|
@@ -14921,14 +14922,14 @@ let OutputDeliveryTypeResolver = class OutputDeliveryTypeResolver extends server
|
|
|
14921
14922
|
}
|
|
14922
14923
|
async OutputDeliveryType(ID, { dataSource, userPayload }, pubSub) {
|
|
14923
14924
|
this.CheckUserReadPermissions('Output Delivery Types', userPayload);
|
|
14924
|
-
const sSQL = `SELECT * FROM [
|
|
14925
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwOutputDeliveryTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Output Delivery Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14925
14926
|
this.createRecordAccessAuditLogRecord(userPayload, 'Output Delivery Types', ID);
|
|
14926
14927
|
const result = this.MapFieldNamesToCodeNames('Output Delivery Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
14927
14928
|
return result;
|
|
14928
14929
|
}
|
|
14929
14930
|
async ReportsArray(outputdeliverytype_, { dataSource, userPayload }, pubSub) {
|
|
14930
14931
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
14931
|
-
const sSQL = `SELECT * FROM [
|
|
14932
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwReports] WHERE [OutputDeliveryTypeID]=${outputdeliverytype_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14932
14933
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
14933
14934
|
return result;
|
|
14934
14935
|
}
|
|
@@ -15305,13 +15306,13 @@ let ReportResolver = class ReportResolver extends server_1.ResolverBase {
|
|
|
15305
15306
|
}
|
|
15306
15307
|
async Report(ID, { dataSource, userPayload }, pubSub) {
|
|
15307
15308
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
15308
|
-
const sSQL = `SELECT * FROM [
|
|
15309
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwReports] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15309
15310
|
const result = this.MapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
15310
15311
|
return result;
|
|
15311
15312
|
}
|
|
15312
15313
|
async ReportSnapshotsArray(report_, { dataSource, userPayload }, pubSub) {
|
|
15313
15314
|
this.CheckUserReadPermissions('Report Snapshots', userPayload);
|
|
15314
|
-
const sSQL = `SELECT * FROM [
|
|
15315
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwReportSnapshots] WHERE [ReportID]=${report_.ID} ` + this.getRowLevelSecurityWhereClause('Report Snapshots', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15315
15316
|
const result = this.ArrayMapFieldNamesToCodeNames('Report Snapshots', await dataSource.query(sSQL));
|
|
15316
15317
|
return result;
|
|
15317
15318
|
}
|
|
@@ -15579,7 +15580,7 @@ let ReportSnapshotResolver = class ReportSnapshotResolver extends server_1.Resol
|
|
|
15579
15580
|
}
|
|
15580
15581
|
async ReportSnapshot(ID, { dataSource, userPayload }, pubSub) {
|
|
15581
15582
|
this.CheckUserReadPermissions('Report Snapshots', userPayload);
|
|
15582
|
-
const sSQL = `SELECT * FROM [
|
|
15583
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwReportSnapshots] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Report Snapshots', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15583
15584
|
const result = this.MapFieldNamesToCodeNames('Report Snapshots', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
15584
15585
|
return result;
|
|
15585
15586
|
}
|
|
@@ -15813,14 +15814,14 @@ let ResourceTypeResolver = class ResourceTypeResolver extends server_1.ResolverB
|
|
|
15813
15814
|
}
|
|
15814
15815
|
async ResourceType(ID, { dataSource, userPayload }, pubSub) {
|
|
15815
15816
|
this.CheckUserReadPermissions('Resource Types', userPayload);
|
|
15816
|
-
const sSQL = `SELECT * FROM [
|
|
15817
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwResourceTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Resource Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15817
15818
|
this.createRecordAccessAuditLogRecord(userPayload, 'Resource Types', ID);
|
|
15818
15819
|
const result = this.MapFieldNamesToCodeNames('Resource Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
15819
15820
|
return result;
|
|
15820
15821
|
}
|
|
15821
15822
|
async WorkspaceItemsArray(resourcetype_, { dataSource, userPayload }, pubSub) {
|
|
15822
15823
|
this.CheckUserReadPermissions('Workspace Items', userPayload);
|
|
15823
|
-
const sSQL = `SELECT * FROM [
|
|
15824
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwWorkspaceItems] WHERE [ResourceTypeID]=${resourcetype_.ID} ` + this.getRowLevelSecurityWhereClause('Workspace Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15824
15825
|
const result = this.ArrayMapFieldNamesToCodeNames('Workspace Items', await dataSource.query(sSQL));
|
|
15825
15826
|
return result;
|
|
15826
15827
|
}
|
|
@@ -15962,20 +15963,20 @@ let TagResolver = class TagResolver extends server_1.ResolverBase {
|
|
|
15962
15963
|
}
|
|
15963
15964
|
async Tag(ID, { dataSource, userPayload }, pubSub) {
|
|
15964
15965
|
this.CheckUserReadPermissions('Tags', userPayload);
|
|
15965
|
-
const sSQL = `SELECT * FROM [
|
|
15966
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwTags] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Tags', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15966
15967
|
this.createRecordAccessAuditLogRecord(userPayload, 'Tags', ID);
|
|
15967
15968
|
const result = this.MapFieldNamesToCodeNames('Tags', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
15968
15969
|
return result;
|
|
15969
15970
|
}
|
|
15970
15971
|
async TagsArray(tag_, { dataSource, userPayload }, pubSub) {
|
|
15971
15972
|
this.CheckUserReadPermissions('Tags', userPayload);
|
|
15972
|
-
const sSQL = `SELECT * FROM [
|
|
15973
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwTags] WHERE [ParentID]=${tag_.ID} ` + this.getRowLevelSecurityWhereClause('Tags', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15973
15974
|
const result = this.ArrayMapFieldNamesToCodeNames('Tags', await dataSource.query(sSQL));
|
|
15974
15975
|
return result;
|
|
15975
15976
|
}
|
|
15976
15977
|
async TaggedItemsArray(tag_, { dataSource, userPayload }, pubSub) {
|
|
15977
15978
|
this.CheckUserReadPermissions('Tagged Items', userPayload);
|
|
15978
|
-
const sSQL = `SELECT * FROM [
|
|
15979
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwTaggedItems] WHERE [TagID]=${tag_.ID} ` + this.getRowLevelSecurityWhereClause('Tagged Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15979
15980
|
const result = this.ArrayMapFieldNamesToCodeNames('Tagged Items', await dataSource.query(sSQL));
|
|
15980
15981
|
return result;
|
|
15981
15982
|
}
|
|
@@ -16118,7 +16119,7 @@ let TaggedItemResolver = class TaggedItemResolver extends server_1.ResolverBase
|
|
|
16118
16119
|
}
|
|
16119
16120
|
async TaggedItem(ID, { dataSource, userPayload }, pubSub) {
|
|
16120
16121
|
this.CheckUserReadPermissions('Tagged Items', userPayload);
|
|
16121
|
-
const sSQL = `SELECT * FROM [
|
|
16122
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwTaggedItems] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Tagged Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16122
16123
|
this.createRecordAccessAuditLogRecord(userPayload, 'Tagged Items', ID);
|
|
16123
16124
|
const result = this.MapFieldNamesToCodeNames('Tagged Items', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
16124
16125
|
return result;
|
|
@@ -16283,14 +16284,14 @@ let WorkspaceResolver = class WorkspaceResolver extends server_1.ResolverBase {
|
|
|
16283
16284
|
}
|
|
16284
16285
|
async Workspace(ID, { dataSource, userPayload }, pubSub) {
|
|
16285
16286
|
this.CheckUserReadPermissions('Workspaces', userPayload);
|
|
16286
|
-
const sSQL = `SELECT * FROM [
|
|
16287
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwWorkspaces] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Workspaces', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16287
16288
|
this.createRecordAccessAuditLogRecord(userPayload, 'Workspaces', ID);
|
|
16288
16289
|
const result = this.MapFieldNamesToCodeNames('Workspaces', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
16289
16290
|
return result;
|
|
16290
16291
|
}
|
|
16291
16292
|
async WorkspaceItemsArray(workspace_, { dataSource, userPayload }, pubSub) {
|
|
16292
16293
|
this.CheckUserReadPermissions('Workspace Items', userPayload);
|
|
16293
|
-
const sSQL = `SELECT * FROM [
|
|
16294
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwWorkspaceItems] WHERE [WorkSpaceID]=${workspace_.ID} ` + this.getRowLevelSecurityWhereClause('Workspace Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16294
16295
|
const result = this.ArrayMapFieldNamesToCodeNames('Workspace Items', await dataSource.query(sSQL));
|
|
16295
16296
|
return result;
|
|
16296
16297
|
}
|
|
@@ -16603,7 +16604,7 @@ let WorkspaceItemResolver = class WorkspaceItemResolver extends server_1.Resolve
|
|
|
16603
16604
|
}
|
|
16604
16605
|
async WorkspaceItem(ID, { dataSource, userPayload }, pubSub) {
|
|
16605
16606
|
this.CheckUserReadPermissions('Workspace Items', userPayload);
|
|
16606
|
-
const sSQL = `SELECT * FROM [
|
|
16607
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwWorkspaceItems] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Workspace Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16607
16608
|
this.createRecordAccessAuditLogRecord(userPayload, 'Workspace Items', ID);
|
|
16608
16609
|
const result = this.MapFieldNamesToCodeNames('Workspace Items', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
16609
16610
|
return result;
|
|
@@ -16819,13 +16820,13 @@ let DatasetResolver = class DatasetResolver extends server_1.ResolverBase {
|
|
|
16819
16820
|
}
|
|
16820
16821
|
async Dataset(ID, { dataSource, userPayload }, pubSub) {
|
|
16821
16822
|
this.CheckUserReadPermissions('Datasets', userPayload);
|
|
16822
|
-
const sSQL = `SELECT * FROM [
|
|
16823
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDatasets] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Datasets', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16823
16824
|
const result = this.MapFieldNamesToCodeNames('Datasets', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
16824
16825
|
return result;
|
|
16825
16826
|
}
|
|
16826
16827
|
async DatasetItemsArray(dataset_, { dataSource, userPayload }, pubSub) {
|
|
16827
16828
|
this.CheckUserReadPermissions('Dataset Items', userPayload);
|
|
16828
|
-
const sSQL = `SELECT * FROM [
|
|
16829
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDatasetItems] WHERE [DatasetName]=${dataset_.ID} ` + this.getRowLevelSecurityWhereClause('Dataset Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16829
16830
|
const result = this.ArrayMapFieldNamesToCodeNames('Dataset Items', await dataSource.query(sSQL));
|
|
16830
16831
|
return result;
|
|
16831
16832
|
}
|
|
@@ -16982,7 +16983,7 @@ let DatasetItemResolver = class DatasetItemResolver extends server_1.ResolverBas
|
|
|
16982
16983
|
}
|
|
16983
16984
|
async DatasetItem(ID, { dataSource, userPayload }, pubSub) {
|
|
16984
16985
|
this.CheckUserReadPermissions('Dataset Items', userPayload);
|
|
16985
|
-
const sSQL = `SELECT * FROM [
|
|
16986
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDatasetItems] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Dataset Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16986
16987
|
const result = this.MapFieldNamesToCodeNames('Dataset Items', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
16987
16988
|
return result;
|
|
16988
16989
|
}
|
|
@@ -17193,13 +17194,13 @@ let ConversationDetailResolver = class ConversationDetailResolver extends server
|
|
|
17193
17194
|
}
|
|
17194
17195
|
async ConversationDetail(ID, { dataSource, userPayload }, pubSub) {
|
|
17195
17196
|
this.CheckUserReadPermissions('Conversation Details', userPayload);
|
|
17196
|
-
const sSQL = `SELECT * FROM [
|
|
17197
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwConversationDetails] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Conversation Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17197
17198
|
const result = this.MapFieldNamesToCodeNames('Conversation Details', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
17198
17199
|
return result;
|
|
17199
17200
|
}
|
|
17200
17201
|
async ReportsArray(conversationdetail_, { dataSource, userPayload }, pubSub) {
|
|
17201
17202
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
17202
|
-
const sSQL = `SELECT * FROM [
|
|
17203
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwReports] WHERE [ConversationDetailID]=${conversationdetail_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17203
17204
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
17204
17205
|
return result;
|
|
17205
17206
|
}
|
|
@@ -17555,19 +17556,19 @@ let ConversationResolver = class ConversationResolver extends server_1.ResolverB
|
|
|
17555
17556
|
}
|
|
17556
17557
|
async Conversation(ID, { dataSource, userPayload }, pubSub) {
|
|
17557
17558
|
this.CheckUserReadPermissions('Conversations', userPayload);
|
|
17558
|
-
const sSQL = `SELECT * FROM [
|
|
17559
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwConversations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Conversations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17559
17560
|
const result = this.MapFieldNamesToCodeNames('Conversations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
17560
17561
|
return result;
|
|
17561
17562
|
}
|
|
17562
17563
|
async ConversationDetailsArray(conversation_, { dataSource, userPayload }, pubSub) {
|
|
17563
17564
|
this.CheckUserReadPermissions('Conversation Details', userPayload);
|
|
17564
|
-
const sSQL = `SELECT * FROM [
|
|
17565
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwConversationDetails] WHERE [ConversationID]=${conversation_.ID} ` + this.getRowLevelSecurityWhereClause('Conversation Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17565
17566
|
const result = this.ArrayMapFieldNamesToCodeNames('Conversation Details', await dataSource.query(sSQL));
|
|
17566
17567
|
return result;
|
|
17567
17568
|
}
|
|
17568
17569
|
async ReportsArray(conversation_, { dataSource, userPayload }, pubSub) {
|
|
17569
17570
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
17570
|
-
const sSQL = `SELECT * FROM [
|
|
17571
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwReports] WHERE [ConversationID]=${conversation_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17571
17572
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
17572
17573
|
return result;
|
|
17573
17574
|
}
|
|
@@ -17906,7 +17907,7 @@ let UserNotificationResolver = class UserNotificationResolver extends server_1.R
|
|
|
17906
17907
|
}
|
|
17907
17908
|
async UserNotification(ID, { dataSource, userPayload }, pubSub) {
|
|
17908
17909
|
this.CheckUserReadPermissions('User Notifications', userPayload);
|
|
17909
|
-
const sSQL = `SELECT * FROM [
|
|
17910
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserNotifications] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Notifications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17910
17911
|
const result = this.MapFieldNamesToCodeNames('User Notifications', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
17911
17912
|
return result;
|
|
17912
17913
|
}
|
|
@@ -18142,7 +18143,7 @@ let SchemaInfoResolver = class SchemaInfoResolver extends server_1.ResolverBase
|
|
|
18142
18143
|
}
|
|
18143
18144
|
async SchemaInfo(ID, { dataSource, userPayload }, pubSub) {
|
|
18144
18145
|
this.CheckUserReadPermissions('Schema Info', userPayload);
|
|
18145
|
-
const sSQL = `SELECT * FROM [
|
|
18146
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwSchemaInfos] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Schema Info', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
18146
18147
|
const result = this.MapFieldNamesToCodeNames('Schema Info', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
18147
18148
|
return result;
|
|
18148
18149
|
}
|
|
@@ -18384,7 +18385,7 @@ let CompanyIntegrationRecordMapResolver = class CompanyIntegrationRecordMapResol
|
|
|
18384
18385
|
}
|
|
18385
18386
|
async CompanyIntegrationRecordMap(ID, { dataSource, userPayload }, pubSub) {
|
|
18386
18387
|
this.CheckUserReadPermissions('Company Integration Record Maps', userPayload);
|
|
18387
|
-
const sSQL = `SELECT * FROM [
|
|
18388
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwCompanyIntegrationRecordMaps] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Record Maps', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
18388
18389
|
const result = this.MapFieldNamesToCodeNames('Company Integration Record Maps', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
18389
18390
|
return result;
|
|
18390
18391
|
}
|
|
@@ -18710,13 +18711,13 @@ let RecordMergeLogResolver = class RecordMergeLogResolver extends server_1.Resol
|
|
|
18710
18711
|
}
|
|
18711
18712
|
async RecordMergeLog(ID, { dataSource, userPayload }, pubSub) {
|
|
18712
18713
|
this.CheckUserReadPermissions('Record Merge Logs', userPayload);
|
|
18713
|
-
const sSQL = `SELECT * FROM [
|
|
18714
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwRecordMergeLogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
18714
18715
|
const result = this.MapFieldNamesToCodeNames('Record Merge Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
18715
18716
|
return result;
|
|
18716
18717
|
}
|
|
18717
18718
|
async RecordMergeDeletionLogsArray(recordmergelog_, { dataSource, userPayload }, pubSub) {
|
|
18718
18719
|
this.CheckUserReadPermissions('Record Merge Deletion Logs', userPayload);
|
|
18719
|
-
const sSQL = `SELECT * FROM [
|
|
18720
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwRecordMergeDeletionLogs] WHERE [RecordMergeLogID]=${recordmergelog_.ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Deletion Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
18720
18721
|
const result = this.ArrayMapFieldNamesToCodeNames('Record Merge Deletion Logs', await dataSource.query(sSQL));
|
|
18721
18722
|
return result;
|
|
18722
18723
|
}
|
|
@@ -18962,7 +18963,7 @@ let RecordMergeDeletionLogResolver = class RecordMergeDeletionLogResolver extend
|
|
|
18962
18963
|
}
|
|
18963
18964
|
async RecordMergeDeletionLog(ID, { dataSource, userPayload }, pubSub) {
|
|
18964
18965
|
this.CheckUserReadPermissions('Record Merge Deletion Logs', userPayload);
|
|
18965
|
-
const sSQL = `SELECT * FROM [
|
|
18966
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwRecordMergeDeletionLogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Deletion Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
18966
18967
|
const result = this.MapFieldNamesToCodeNames('Record Merge Deletion Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
18967
18968
|
return result;
|
|
18968
18969
|
}
|
|
@@ -19307,7 +19308,7 @@ let QueryFieldResolver = class QueryFieldResolver extends server_1.ResolverBase
|
|
|
19307
19308
|
}
|
|
19308
19309
|
async QueryField(ID, { dataSource, userPayload }, pubSub) {
|
|
19309
19310
|
this.CheckUserReadPermissions('Query Fields', userPayload);
|
|
19310
|
-
const sSQL = `SELECT * FROM [
|
|
19311
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwQueryFields] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Query Fields', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19311
19312
|
const result = this.MapFieldNamesToCodeNames('Query Fields', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
19312
19313
|
return result;
|
|
19313
19314
|
}
|
|
@@ -19544,19 +19545,19 @@ let QueryCategoryResolver = class QueryCategoryResolver extends server_1.Resolve
|
|
|
19544
19545
|
}
|
|
19545
19546
|
async QueryCategory(ID, { dataSource, userPayload }, pubSub) {
|
|
19546
19547
|
this.CheckUserReadPermissions('Query Categories', userPayload);
|
|
19547
|
-
const sSQL = `SELECT * FROM [
|
|
19548
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwQueryCategories] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Query Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19548
19549
|
const result = this.MapFieldNamesToCodeNames('Query Categories', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
19549
19550
|
return result;
|
|
19550
19551
|
}
|
|
19551
19552
|
async QueryCategoriesArray(querycategory_, { dataSource, userPayload }, pubSub) {
|
|
19552
19553
|
this.CheckUserReadPermissions('Query Categories', userPayload);
|
|
19553
|
-
const sSQL = `SELECT * FROM [
|
|
19554
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwQueryCategories] WHERE [ParentID]=${querycategory_.ID} ` + this.getRowLevelSecurityWhereClause('Query Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19554
19555
|
const result = this.ArrayMapFieldNamesToCodeNames('Query Categories', await dataSource.query(sSQL));
|
|
19555
19556
|
return result;
|
|
19556
19557
|
}
|
|
19557
19558
|
async QueriesArray(querycategory_, { dataSource, userPayload }, pubSub) {
|
|
19558
19559
|
this.CheckUserReadPermissions('Queries', userPayload);
|
|
19559
|
-
const sSQL = `SELECT * FROM [
|
|
19560
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwQueries] WHERE [CategoryID]=${querycategory_.ID} ` + this.getRowLevelSecurityWhereClause('Queries', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19560
19561
|
const result = this.ArrayMapFieldNamesToCodeNames('Queries', await dataSource.query(sSQL));
|
|
19561
19562
|
return result;
|
|
19562
19563
|
}
|
|
@@ -19876,25 +19877,25 @@ let QueryResolver = class QueryResolver extends server_1.ResolverBase {
|
|
|
19876
19877
|
}
|
|
19877
19878
|
async Query(ID, { dataSource, userPayload }, pubSub) {
|
|
19878
19879
|
this.CheckUserReadPermissions('Queries', userPayload);
|
|
19879
|
-
const sSQL = `SELECT * FROM [
|
|
19880
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwQueries] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Queries', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19880
19881
|
const result = this.MapFieldNamesToCodeNames('Queries', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
19881
19882
|
return result;
|
|
19882
19883
|
}
|
|
19883
19884
|
async QueryFieldsArray(query_, { dataSource, userPayload }, pubSub) {
|
|
19884
19885
|
this.CheckUserReadPermissions('Query Fields', userPayload);
|
|
19885
|
-
const sSQL = `SELECT * FROM [
|
|
19886
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwQueryFields] WHERE [QueryID]=${query_.ID} ` + this.getRowLevelSecurityWhereClause('Query Fields', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19886
19887
|
const result = this.ArrayMapFieldNamesToCodeNames('Query Fields', await dataSource.query(sSQL));
|
|
19887
19888
|
return result;
|
|
19888
19889
|
}
|
|
19889
19890
|
async QueryPermissionsArray(query_, { dataSource, userPayload }, pubSub) {
|
|
19890
19891
|
this.CheckUserReadPermissions('Query Permissions', userPayload);
|
|
19891
|
-
const sSQL = `SELECT * FROM [
|
|
19892
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwQueryPermissions] WHERE [QueryID]=${query_.ID} ` + this.getRowLevelSecurityWhereClause('Query Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19892
19893
|
const result = this.ArrayMapFieldNamesToCodeNames('Query Permissions', await dataSource.query(sSQL));
|
|
19893
19894
|
return result;
|
|
19894
19895
|
}
|
|
19895
19896
|
async DataContextItemsArray(query_, { dataSource, userPayload }, pubSub) {
|
|
19896
19897
|
this.CheckUserReadPermissions('Data Context Items', userPayload);
|
|
19897
|
-
const sSQL = `SELECT * FROM [
|
|
19898
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDataContextItems] WHERE [QueryID]=${query_.ID} ` + this.getRowLevelSecurityWhereClause('Data Context Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19898
19899
|
const result = this.ArrayMapFieldNamesToCodeNames('Data Context Items', await dataSource.query(sSQL));
|
|
19899
19900
|
return result;
|
|
19900
19901
|
}
|
|
@@ -20133,7 +20134,7 @@ let QueryPermissionResolver = class QueryPermissionResolver extends server_1.Res
|
|
|
20133
20134
|
}
|
|
20134
20135
|
async QueryPermission(ID, { dataSource, userPayload }, pubSub) {
|
|
20135
20136
|
this.CheckUserReadPermissions('Query Permissions', userPayload);
|
|
20136
|
-
const sSQL = `SELECT * FROM [
|
|
20137
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwQueryPermissions] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Query Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
20137
20138
|
const result = this.MapFieldNamesToCodeNames('Query Permissions', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
20138
20139
|
return result;
|
|
20139
20140
|
}
|
|
@@ -20379,7 +20380,7 @@ let VectorIndexResolver = class VectorIndexResolver extends server_1.ResolverBas
|
|
|
20379
20380
|
}
|
|
20380
20381
|
async VectorIndex(ID, { dataSource, userPayload }, pubSub) {
|
|
20381
20382
|
this.CheckUserReadPermissions('Vector Indexes', userPayload);
|
|
20382
|
-
const sSQL = `SELECT * FROM [
|
|
20383
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwVectorIndexes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Vector Indexes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
20383
20384
|
const result = this.MapFieldNamesToCodeNames('Vector Indexes', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
20384
20385
|
return result;
|
|
20385
20386
|
}
|
|
@@ -20595,13 +20596,13 @@ let EntityDocumentTypeResolver = class EntityDocumentTypeResolver extends server
|
|
|
20595
20596
|
}
|
|
20596
20597
|
async EntityDocumentType(ID, { dataSource, userPayload }, pubSub) {
|
|
20597
20598
|
this.CheckUserReadPermissions('Entity Document Types', userPayload);
|
|
20598
|
-
const sSQL = `SELECT * FROM [
|
|
20599
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityDocumentTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Document Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
20599
20600
|
const result = this.MapFieldNamesToCodeNames('Entity Document Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
20600
20601
|
return result;
|
|
20601
20602
|
}
|
|
20602
20603
|
async EntityDocumentsArray(entitydocumenttype_, { dataSource, userPayload }, pubSub) {
|
|
20603
20604
|
this.CheckUserReadPermissions('Entity Documents', userPayload);
|
|
20604
|
-
const sSQL = `SELECT * FROM [
|
|
20605
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityDocuments] WHERE [TypeID]=${entitydocumenttype_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Documents', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
20605
20606
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Documents', await dataSource.query(sSQL));
|
|
20606
20607
|
return result;
|
|
20607
20608
|
}
|
|
@@ -20853,7 +20854,7 @@ let EntityDocumentRunResolver = class EntityDocumentRunResolver extends server_1
|
|
|
20853
20854
|
}
|
|
20854
20855
|
async EntityDocumentRun(ID, { dataSource, userPayload }, pubSub) {
|
|
20855
20856
|
this.CheckUserReadPermissions('Entity Document Runs', userPayload);
|
|
20856
|
-
const sSQL = `SELECT * FROM [
|
|
20857
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityDocumentRuns] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Document Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
20857
20858
|
const result = this.MapFieldNamesToCodeNames('Entity Document Runs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
20858
20859
|
return result;
|
|
20859
20860
|
}
|
|
@@ -21095,13 +21096,13 @@ let VectorDatabaseResolver = class VectorDatabaseResolver extends server_1.Resol
|
|
|
21095
21096
|
}
|
|
21096
21097
|
async VectorDatabase(ID, { dataSource, userPayload }, pubSub) {
|
|
21097
21098
|
this.CheckUserReadPermissions('Vector Databases', userPayload);
|
|
21098
|
-
const sSQL = `SELECT * FROM [
|
|
21099
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwVectorDatabases] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Vector Databases', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
21099
21100
|
const result = this.MapFieldNamesToCodeNames('Vector Databases', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
21100
21101
|
return result;
|
|
21101
21102
|
}
|
|
21102
21103
|
async VectorIndexesArray(vectordatabase_, { dataSource, userPayload }, pubSub) {
|
|
21103
21104
|
this.CheckUserReadPermissions('Vector Indexes', userPayload);
|
|
21104
|
-
const sSQL = `SELECT * FROM [
|
|
21105
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwVectorIndexes] WHERE [VectorDatabaseID]=${vectordatabase_.ID} ` + this.getRowLevelSecurityWhereClause('Vector Indexes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
21105
21106
|
const result = this.ArrayMapFieldNamesToCodeNames('Vector Indexes', await dataSource.query(sSQL));
|
|
21106
21107
|
return result;
|
|
21107
21108
|
}
|
|
@@ -21384,7 +21385,7 @@ let EntityRecordDocumentResolver = class EntityRecordDocumentResolver extends se
|
|
|
21384
21385
|
}
|
|
21385
21386
|
async EntityRecordDocument(ID, { dataSource, userPayload }, pubSub) {
|
|
21386
21387
|
this.CheckUserReadPermissions('Entity Record Documents', userPayload);
|
|
21387
|
-
const sSQL = `SELECT * FROM [
|
|
21388
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityRecordDocuments] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Record Documents', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
21388
21389
|
const result = this.MapFieldNamesToCodeNames('Entity Record Documents', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
21389
21390
|
return result;
|
|
21390
21391
|
}
|
|
@@ -21647,13 +21648,13 @@ let EntityDocumentResolver = class EntityDocumentResolver extends server_1.Resol
|
|
|
21647
21648
|
}
|
|
21648
21649
|
async EntityDocument(ID, { dataSource, userPayload }, pubSub) {
|
|
21649
21650
|
this.CheckUserReadPermissions('Entity Documents', userPayload);
|
|
21650
|
-
const sSQL = `SELECT * FROM [
|
|
21651
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityDocuments] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Documents', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
21651
21652
|
const result = this.MapFieldNamesToCodeNames('Entity Documents', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
21652
21653
|
return result;
|
|
21653
21654
|
}
|
|
21654
21655
|
async EntityDocumentRunsArray(entitydocument_, { dataSource, userPayload }, pubSub) {
|
|
21655
21656
|
this.CheckUserReadPermissions('Entity Document Runs', userPayload);
|
|
21656
|
-
const sSQL = `SELECT * FROM [
|
|
21657
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwEntityDocumentRuns] WHERE [EntityDocumentID]=${entitydocument_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Document Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
21657
21658
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Document Runs', await dataSource.query(sSQL));
|
|
21658
21659
|
return result;
|
|
21659
21660
|
}
|
|
@@ -21980,7 +21981,7 @@ let DataContextItemResolver = class DataContextItemResolver extends server_1.Res
|
|
|
21980
21981
|
}
|
|
21981
21982
|
async DataContextItem(ID, { dataSource, userPayload }, pubSub) {
|
|
21982
21983
|
this.CheckUserReadPermissions('Data Context Items', userPayload);
|
|
21983
|
-
const sSQL = `SELECT * FROM [
|
|
21984
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDataContextItems] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Data Context Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
21984
21985
|
const result = this.MapFieldNamesToCodeNames('Data Context Items', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
21985
21986
|
return result;
|
|
21986
21987
|
}
|
|
@@ -22230,19 +22231,19 @@ let DataContextResolver = class DataContextResolver extends server_1.ResolverBas
|
|
|
22230
22231
|
}
|
|
22231
22232
|
async DataContext(ID, { dataSource, userPayload }, pubSub) {
|
|
22232
22233
|
this.CheckUserReadPermissions('Data Contexts', userPayload);
|
|
22233
|
-
const sSQL = `SELECT * FROM [
|
|
22234
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDataContexts] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Data Contexts', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22234
22235
|
const result = this.MapFieldNamesToCodeNames('Data Contexts', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
22235
22236
|
return result;
|
|
22236
22237
|
}
|
|
22237
22238
|
async DataContextItemsArray(datacontext_, { dataSource, userPayload }, pubSub) {
|
|
22238
22239
|
this.CheckUserReadPermissions('Data Context Items', userPayload);
|
|
22239
|
-
const sSQL = `SELECT * FROM [
|
|
22240
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDataContextItems] WHERE [DataContextID]=${datacontext_.ID} ` + this.getRowLevelSecurityWhereClause('Data Context Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22240
22241
|
const result = this.ArrayMapFieldNamesToCodeNames('Data Context Items', await dataSource.query(sSQL));
|
|
22241
22242
|
return result;
|
|
22242
22243
|
}
|
|
22243
22244
|
async ReportsArray(datacontext_, { dataSource, userPayload }, pubSub) {
|
|
22244
22245
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
22245
|
-
const sSQL = `SELECT * FROM [
|
|
22246
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwReports] WHERE [DataContextID]=${datacontext_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22246
22247
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
22247
22248
|
return result;
|
|
22248
22249
|
}
|
|
@@ -22497,19 +22498,19 @@ let UserViewCategoryResolver = class UserViewCategoryResolver extends server_1.R
|
|
|
22497
22498
|
}
|
|
22498
22499
|
async UserViewCategory(ID, { dataSource, userPayload }, pubSub) {
|
|
22499
22500
|
this.CheckUserReadPermissions('User View Categories', userPayload);
|
|
22500
|
-
const sSQL = `SELECT * FROM [
|
|
22501
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserViewCategories] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User View Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22501
22502
|
const result = this.MapFieldNamesToCodeNames('User View Categories', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
22502
22503
|
return result;
|
|
22503
22504
|
}
|
|
22504
22505
|
async UserViewCategoriesArray(userviewcategory_, { dataSource, userPayload }, pubSub) {
|
|
22505
22506
|
this.CheckUserReadPermissions('User View Categories', userPayload);
|
|
22506
|
-
const sSQL = `SELECT * FROM [
|
|
22507
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserViewCategories] WHERE [ParentID]=${userviewcategory_.ID} ` + this.getRowLevelSecurityWhereClause('User View Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22507
22508
|
const result = this.ArrayMapFieldNamesToCodeNames('User View Categories', await dataSource.query(sSQL));
|
|
22508
22509
|
return result;
|
|
22509
22510
|
}
|
|
22510
22511
|
async UserViewsArray(userviewcategory_, { dataSource, userPayload }, pubSub) {
|
|
22511
22512
|
this.CheckUserReadPermissions('User Views', userPayload);
|
|
22512
|
-
const sSQL = `SELECT * FROM [
|
|
22513
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwUserViews] WHERE [CategoryID]=${userviewcategory_.ID} ` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22513
22514
|
const result = this.ArrayMapFieldNamesToCodeNames('User Views', await dataSource.query(sSQL));
|
|
22514
22515
|
return result;
|
|
22515
22516
|
}
|
|
@@ -22768,19 +22769,19 @@ let DashboardCategoryResolver = class DashboardCategoryResolver extends server_1
|
|
|
22768
22769
|
}
|
|
22769
22770
|
async DashboardCategory(ID, { dataSource, userPayload }, pubSub) {
|
|
22770
22771
|
this.CheckUserReadPermissions('Dashboard Categories', userPayload);
|
|
22771
|
-
const sSQL = `SELECT * FROM [
|
|
22772
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDashboardCategories] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Dashboard Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22772
22773
|
const result = this.MapFieldNamesToCodeNames('Dashboard Categories', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
22773
22774
|
return result;
|
|
22774
22775
|
}
|
|
22775
22776
|
async DashboardsArray(dashboardcategory_, { dataSource, userPayload }, pubSub) {
|
|
22776
22777
|
this.CheckUserReadPermissions('Dashboards', userPayload);
|
|
22777
|
-
const sSQL = `SELECT * FROM [
|
|
22778
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDashboards] WHERE [CategoryID]=${dashboardcategory_.ID} ` + this.getRowLevelSecurityWhereClause('Dashboards', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22778
22779
|
const result = this.ArrayMapFieldNamesToCodeNames('Dashboards', await dataSource.query(sSQL));
|
|
22779
22780
|
return result;
|
|
22780
22781
|
}
|
|
22781
22782
|
async DashboardCategoriesArray(dashboardcategory_, { dataSource, userPayload }, pubSub) {
|
|
22782
22783
|
this.CheckUserReadPermissions('Dashboard Categories', userPayload);
|
|
22783
|
-
const sSQL = `SELECT * FROM [
|
|
22784
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwDashboardCategories] WHERE [ParentID]=${dashboardcategory_.ID} ` + this.getRowLevelSecurityWhereClause('Dashboard Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22784
22785
|
const result = this.ArrayMapFieldNamesToCodeNames('Dashboard Categories', await dataSource.query(sSQL));
|
|
22785
22786
|
return result;
|
|
22786
22787
|
}
|
|
@@ -23035,19 +23036,19 @@ let ReportCategoryResolver = class ReportCategoryResolver extends server_1.Resol
|
|
|
23035
23036
|
}
|
|
23036
23037
|
async ReportCategory(ID, { dataSource, userPayload }, pubSub) {
|
|
23037
23038
|
this.CheckUserReadPermissions('Report Categories', userPayload);
|
|
23038
|
-
const sSQL = `SELECT * FROM [
|
|
23039
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwReportCategories] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Report Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
23039
23040
|
const result = this.MapFieldNamesToCodeNames('Report Categories', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
23040
23041
|
return result;
|
|
23041
23042
|
}
|
|
23042
23043
|
async ReportCategoriesArray(reportcategory_, { dataSource, userPayload }, pubSub) {
|
|
23043
23044
|
this.CheckUserReadPermissions('Report Categories', userPayload);
|
|
23044
|
-
const sSQL = `SELECT * FROM [
|
|
23045
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwReportCategories] WHERE [ParentID]=${reportcategory_.ID} ` + this.getRowLevelSecurityWhereClause('Report Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
23045
23046
|
const result = this.ArrayMapFieldNamesToCodeNames('Report Categories', await dataSource.query(sSQL));
|
|
23046
23047
|
return result;
|
|
23047
23048
|
}
|
|
23048
23049
|
async ReportsArray(reportcategory_, { dataSource, userPayload }, pubSub) {
|
|
23049
23050
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
23050
|
-
const sSQL = `SELECT * FROM [
|
|
23051
|
+
const sSQL = `SELECT * FROM [${config_1.mj_core_schema}].[vwReports] WHERE [CategoryID]=${reportcategory_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
23051
23052
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
23052
23053
|
return result;
|
|
23053
23054
|
}
|