@memberjunction/server 0.9.260 → 0.9.261
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/build.log.json +3 -0
- package/dist/generated/generated.js +244 -245
- package/dist/generated/generated.js.map +1 -1
- package/package.json +9 -9
- package/src/generated/generated.ts +18700 -18700
|
@@ -46,7 +46,6 @@ exports.VersionInstallationResolver = exports.RunVersionInstallationViewResult =
|
|
|
46
46
|
const server_1 = require("@memberjunction/server");
|
|
47
47
|
const core_1 = require("@memberjunction/core");
|
|
48
48
|
const class_validator_1 = require("class-validator");
|
|
49
|
-
const config_1 = require("../config");
|
|
50
49
|
const mj_core_schema_server_object_types = __importStar(require("@memberjunction/server"));
|
|
51
50
|
let Company_ = class Company_ {
|
|
52
51
|
};
|
|
@@ -208,31 +207,31 @@ let CompanyResolver = class CompanyResolver extends server_1.ResolverBase {
|
|
|
208
207
|
}
|
|
209
208
|
async Company(ID, { dataSource, userPayload }, pubSub) {
|
|
210
209
|
this.CheckUserReadPermissions('Companies', userPayload);
|
|
211
|
-
const sSQL = `SELECT * FROM [${
|
|
210
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanies] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Companies', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
212
211
|
const result = this.MapFieldNamesToCodeNames('Companies', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
213
212
|
return result;
|
|
214
213
|
}
|
|
215
214
|
async AllCompanies({ dataSource, userPayload }, pubSub) {
|
|
216
215
|
this.CheckUserReadPermissions('Companies', userPayload);
|
|
217
|
-
const sSQL = `SELECT * FROM [${
|
|
216
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanies]` + this.getRowLevelSecurityWhereClause('Companies', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
218
217
|
const result = this.ArrayMapFieldNamesToCodeNames('Companies', await dataSource.query(sSQL));
|
|
219
218
|
return result;
|
|
220
219
|
}
|
|
221
220
|
async EmployeesArray(company_, { dataSource, userPayload }, pubSub) {
|
|
222
221
|
this.CheckUserReadPermissions('Employees', userPayload);
|
|
223
|
-
const sSQL = `SELECT * FROM [${
|
|
222
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEmployees] WHERE [CompanyID]=${company_.ID} ` + this.getRowLevelSecurityWhereClause('Employees', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
224
223
|
const result = this.ArrayMapFieldNamesToCodeNames('Employees', await dataSource.query(sSQL));
|
|
225
224
|
return result;
|
|
226
225
|
}
|
|
227
226
|
async CompanyIntegrationsArray(company_, { dataSource, userPayload }, pubSub) {
|
|
228
227
|
this.CheckUserReadPermissions('Company Integrations', userPayload);
|
|
229
|
-
const sSQL = `SELECT * FROM [${
|
|
228
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanyIntegrations] WHERE [CompanyName]=${company_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
230
229
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integrations', await dataSource.query(sSQL));
|
|
231
230
|
return result;
|
|
232
231
|
}
|
|
233
232
|
async WorkflowsArray(company_, { dataSource, userPayload }, pubSub) {
|
|
234
233
|
this.CheckUserReadPermissions('Workflows', userPayload);
|
|
235
|
-
const sSQL = `SELECT * FROM [${
|
|
234
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwWorkflows] WHERE [CompanyName]=${company_.ID} ` + this.getRowLevelSecurityWhereClause('Workflows', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
236
235
|
const result = this.ArrayMapFieldNamesToCodeNames('Workflows', await dataSource.query(sSQL));
|
|
237
236
|
return result;
|
|
238
237
|
}
|
|
@@ -633,37 +632,37 @@ let EmployeeResolver = class EmployeeResolver extends server_1.ResolverBase {
|
|
|
633
632
|
}
|
|
634
633
|
async Employee(ID, { dataSource, userPayload }, pubSub) {
|
|
635
634
|
this.CheckUserReadPermissions('Employees', userPayload);
|
|
636
|
-
const sSQL = `SELECT * FROM [${
|
|
635
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEmployees] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Employees', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
637
636
|
const result = this.MapFieldNamesToCodeNames('Employees', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
638
637
|
return result;
|
|
639
638
|
}
|
|
640
639
|
async AllEmployees({ dataSource, userPayload }, pubSub) {
|
|
641
640
|
this.CheckUserReadPermissions('Employees', userPayload);
|
|
642
|
-
const sSQL = `SELECT * FROM [${
|
|
641
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEmployees]` + this.getRowLevelSecurityWhereClause('Employees', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
643
642
|
const result = this.ArrayMapFieldNamesToCodeNames('Employees', await dataSource.query(sSQL));
|
|
644
643
|
return result;
|
|
645
644
|
}
|
|
646
645
|
async EmployeesArray(employee_, { dataSource, userPayload }, pubSub) {
|
|
647
646
|
this.CheckUserReadPermissions('Employees', userPayload);
|
|
648
|
-
const sSQL = `SELECT * FROM [${
|
|
647
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEmployees] WHERE [SupervisorID]=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employees', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
649
648
|
const result = this.ArrayMapFieldNamesToCodeNames('Employees', await dataSource.query(sSQL));
|
|
650
649
|
return result;
|
|
651
650
|
}
|
|
652
651
|
async EmployeeCompanyIntegrationsArray(employee_, { dataSource, userPayload }, pubSub) {
|
|
653
652
|
this.CheckUserReadPermissions('Employee Company Integrations', userPayload);
|
|
654
|
-
const sSQL = `SELECT * FROM [${
|
|
653
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEmployeeCompanyIntegrations] WHERE [EmployeeID]=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
655
654
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Company Integrations', await dataSource.query(sSQL));
|
|
656
655
|
return result;
|
|
657
656
|
}
|
|
658
657
|
async EmployeeRolesArray(employee_, { dataSource, userPayload }, pubSub) {
|
|
659
658
|
this.CheckUserReadPermissions('Employee Roles', userPayload);
|
|
660
|
-
const sSQL = `SELECT * FROM [${
|
|
659
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEmployeeRoles] WHERE [EmployeeID]=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
661
660
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Roles', await dataSource.query(sSQL));
|
|
662
661
|
return result;
|
|
663
662
|
}
|
|
664
663
|
async EmployeeSkillsArray(employee_, { dataSource, userPayload }, pubSub) {
|
|
665
664
|
this.CheckUserReadPermissions('Employee Skills', userPayload);
|
|
666
|
-
const sSQL = `SELECT * FROM [${
|
|
665
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEmployeeSkills] WHERE [EmployeeID]=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
667
666
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Skills', await dataSource.query(sSQL));
|
|
668
667
|
return result;
|
|
669
668
|
}
|
|
@@ -978,7 +977,7 @@ let UserFavoriteResolverBase = class UserFavoriteResolverBase extends server_1.R
|
|
|
978
977
|
}
|
|
979
978
|
async UserFavorite(ID, { dataSource, userPayload }, pubSub) {
|
|
980
979
|
this.CheckUserReadPermissions('User Favorites', userPayload);
|
|
981
|
-
const sSQL = `SELECT * FROM [${
|
|
980
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserFavorites] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Favorites', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
982
981
|
const result = this.MapFieldNamesToCodeNames('User Favorites', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
983
982
|
return result;
|
|
984
983
|
}
|
|
@@ -1223,7 +1222,7 @@ let EmployeeCompanyIntegrationResolver = class EmployeeCompanyIntegrationResolve
|
|
|
1223
1222
|
}
|
|
1224
1223
|
async EmployeeCompanyIntegration(ID, { dataSource, userPayload }, pubSub) {
|
|
1225
1224
|
this.CheckUserReadPermissions('Employee Company Integrations', userPayload);
|
|
1226
|
-
const sSQL = `SELECT * FROM [${
|
|
1225
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEmployeeCompanyIntegrations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Employee Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1227
1226
|
const result = this.MapFieldNamesToCodeNames('Employee Company Integrations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
1228
1227
|
return result;
|
|
1229
1228
|
}
|
|
@@ -1396,7 +1395,7 @@ let EmployeeRoleResolver = class EmployeeRoleResolver extends server_1.ResolverB
|
|
|
1396
1395
|
}
|
|
1397
1396
|
async EmployeeRole(ID, { dataSource, userPayload }, pubSub) {
|
|
1398
1397
|
this.CheckUserReadPermissions('Employee Roles', userPayload);
|
|
1399
|
-
const sSQL = `SELECT * FROM [${
|
|
1398
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEmployeeRoles] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Employee Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1400
1399
|
const result = this.MapFieldNamesToCodeNames('Employee Roles', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
1401
1400
|
return result;
|
|
1402
1401
|
}
|
|
@@ -1570,7 +1569,7 @@ let EmployeeSkillResolver = class EmployeeSkillResolver extends server_1.Resolve
|
|
|
1570
1569
|
}
|
|
1571
1570
|
async EmployeeSkill(ID, { dataSource, userPayload }, pubSub) {
|
|
1572
1571
|
this.CheckUserReadPermissions('Employee Skills', userPayload);
|
|
1573
|
-
const sSQL = `SELECT * FROM [${
|
|
1572
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEmployeeSkills] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Employee Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1574
1573
|
const result = this.MapFieldNamesToCodeNames('Employee Skills', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
1575
1574
|
return result;
|
|
1576
1575
|
}
|
|
@@ -1800,43 +1799,43 @@ let RoleResolver = class RoleResolver extends server_1.ResolverBase {
|
|
|
1800
1799
|
}
|
|
1801
1800
|
async Role(ID, { dataSource, userPayload }, pubSub) {
|
|
1802
1801
|
this.CheckUserReadPermissions('Roles', userPayload);
|
|
1803
|
-
const sSQL = `SELECT * FROM [${
|
|
1802
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwRoles] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1804
1803
|
const result = this.MapFieldNamesToCodeNames('Roles', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
1805
1804
|
return result;
|
|
1806
1805
|
}
|
|
1807
1806
|
async AllRoles({ dataSource, userPayload }, pubSub) {
|
|
1808
1807
|
this.CheckUserReadPermissions('Roles', userPayload);
|
|
1809
|
-
const sSQL = `SELECT * FROM [${
|
|
1808
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwRoles]` + this.getRowLevelSecurityWhereClause('Roles', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
1810
1809
|
const result = this.ArrayMapFieldNamesToCodeNames('Roles', await dataSource.query(sSQL));
|
|
1811
1810
|
return result;
|
|
1812
1811
|
}
|
|
1813
1812
|
async EmployeeRolesArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1814
1813
|
this.CheckUserReadPermissions('Employee Roles', userPayload);
|
|
1815
|
-
const sSQL = `SELECT * FROM [${
|
|
1814
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEmployeeRoles] WHERE [RoleID]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1816
1815
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Roles', await dataSource.query(sSQL));
|
|
1817
1816
|
return result;
|
|
1818
1817
|
}
|
|
1819
1818
|
async EntityPermissionsArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1820
1819
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
1821
|
-
const sSQL = `SELECT * FROM [${
|
|
1820
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityPermissions] WHERE [RoleName]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1822
1821
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL));
|
|
1823
1822
|
return result;
|
|
1824
1823
|
}
|
|
1825
1824
|
async UserRolesArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1826
1825
|
this.CheckUserReadPermissions('User Roles', userPayload);
|
|
1827
|
-
const sSQL = `SELECT * FROM [${
|
|
1826
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserRoles] WHERE [RoleName]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('User Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1828
1827
|
const result = this.ArrayMapFieldNamesToCodeNames('User Roles', await dataSource.query(sSQL));
|
|
1829
1828
|
return result;
|
|
1830
1829
|
}
|
|
1831
1830
|
async AuthorizationRolesArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1832
1831
|
this.CheckUserReadPermissions('Authorization Roles', userPayload);
|
|
1833
|
-
const sSQL = `SELECT * FROM [${
|
|
1832
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuthorizationRoles] WHERE [RoleName]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('Authorization Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1834
1833
|
const result = this.ArrayMapFieldNamesToCodeNames('Authorization Roles', await dataSource.query(sSQL));
|
|
1835
1834
|
return result;
|
|
1836
1835
|
}
|
|
1837
1836
|
async QueryPermissionsArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1838
1837
|
this.CheckUserReadPermissions('Query Permissions', userPayload);
|
|
1839
|
-
const sSQL = `SELECT * FROM [${
|
|
1838
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwQueryPermissions] WHERE [RoleName]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('Query Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1840
1839
|
const result = this.ArrayMapFieldNamesToCodeNames('Query Permissions', await dataSource.query(sSQL));
|
|
1841
1840
|
return result;
|
|
1842
1841
|
}
|
|
@@ -2113,25 +2112,25 @@ let SkillResolver = class SkillResolver extends server_1.ResolverBase {
|
|
|
2113
2112
|
}
|
|
2114
2113
|
async Skill(ID, { dataSource, userPayload }, pubSub) {
|
|
2115
2114
|
this.CheckUserReadPermissions('Skills', userPayload);
|
|
2116
|
-
const sSQL = `SELECT * FROM [${
|
|
2115
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwSkills] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2117
2116
|
const result = this.MapFieldNamesToCodeNames('Skills', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
2118
2117
|
return result;
|
|
2119
2118
|
}
|
|
2120
2119
|
async AllSkills({ dataSource, userPayload }, pubSub) {
|
|
2121
2120
|
this.CheckUserReadPermissions('Skills', userPayload);
|
|
2122
|
-
const sSQL = `SELECT * FROM [${
|
|
2121
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwSkills]` + this.getRowLevelSecurityWhereClause('Skills', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
2123
2122
|
const result = this.ArrayMapFieldNamesToCodeNames('Skills', await dataSource.query(sSQL));
|
|
2124
2123
|
return result;
|
|
2125
2124
|
}
|
|
2126
2125
|
async EmployeeSkillsArray(skill_, { dataSource, userPayload }, pubSub) {
|
|
2127
2126
|
this.CheckUserReadPermissions('Employee Skills', userPayload);
|
|
2128
|
-
const sSQL = `SELECT * FROM [${
|
|
2127
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEmployeeSkills] WHERE [SkillID]=${skill_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2129
2128
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Skills', await dataSource.query(sSQL));
|
|
2130
2129
|
return result;
|
|
2131
2130
|
}
|
|
2132
2131
|
async SkillsArray(skill_, { dataSource, userPayload }, pubSub) {
|
|
2133
2132
|
this.CheckUserReadPermissions('Skills', userPayload);
|
|
2134
|
-
const sSQL = `SELECT * FROM [${
|
|
2133
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwSkills] WHERE [ParentID]=${skill_.ID} ` + this.getRowLevelSecurityWhereClause('Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2135
2134
|
const result = this.ArrayMapFieldNamesToCodeNames('Skills', await dataSource.query(sSQL));
|
|
2136
2135
|
return result;
|
|
2137
2136
|
}
|
|
@@ -2314,13 +2313,13 @@ let IntegrationURLFormatResolver = class IntegrationURLFormatResolver extends se
|
|
|
2314
2313
|
}
|
|
2315
2314
|
async IntegrationURLFormat(ID, { dataSource, userPayload }, pubSub) {
|
|
2316
2315
|
this.CheckUserReadPermissions('Integration URL Formats', userPayload);
|
|
2317
|
-
const sSQL = `SELECT * FROM [${
|
|
2316
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwIntegrationURLFormats] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Integration URL Formats', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2318
2317
|
const result = this.MapFieldNamesToCodeNames('Integration URL Formats', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
2319
2318
|
return result;
|
|
2320
2319
|
}
|
|
2321
2320
|
async AllIntegrationURLFormats({ dataSource, userPayload }, pubSub) {
|
|
2322
2321
|
this.CheckUserReadPermissions('Integration URL Formats', userPayload);
|
|
2323
|
-
const sSQL = `SELECT * FROM [${
|
|
2322
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwIntegrationURLFormats]` + this.getRowLevelSecurityWhereClause('Integration URL Formats', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
2324
2323
|
const result = this.ArrayMapFieldNamesToCodeNames('Integration URL Formats', await dataSource.query(sSQL));
|
|
2325
2324
|
return result;
|
|
2326
2325
|
}
|
|
@@ -2549,25 +2548,25 @@ let IntegrationResolver = class IntegrationResolver extends server_1.ResolverBas
|
|
|
2549
2548
|
}
|
|
2550
2549
|
async Integration(ID, { dataSource, userPayload }, pubSub) {
|
|
2551
2550
|
this.CheckUserReadPermissions('Integrations', userPayload);
|
|
2552
|
-
const sSQL = `SELECT * FROM [${
|
|
2551
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwIntegrations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2553
2552
|
const result = this.MapFieldNamesToCodeNames('Integrations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
2554
2553
|
return result;
|
|
2555
2554
|
}
|
|
2556
2555
|
async AllIntegrations({ dataSource, userPayload }, pubSub) {
|
|
2557
2556
|
this.CheckUserReadPermissions('Integrations', userPayload);
|
|
2558
|
-
const sSQL = `SELECT * FROM [${
|
|
2557
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwIntegrations]` + this.getRowLevelSecurityWhereClause('Integrations', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
2559
2558
|
const result = this.ArrayMapFieldNamesToCodeNames('Integrations', await dataSource.query(sSQL));
|
|
2560
2559
|
return result;
|
|
2561
2560
|
}
|
|
2562
2561
|
async IntegrationURLFormatsArray(integration_, { dataSource, userPayload }, pubSub) {
|
|
2563
2562
|
this.CheckUserReadPermissions('Integration URL Formats', userPayload);
|
|
2564
|
-
const sSQL = `SELECT * FROM [${
|
|
2563
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwIntegrationURLFormats] WHERE [IntegrationID]=${integration_.ID} ` + this.getRowLevelSecurityWhereClause('Integration URL Formats', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2565
2564
|
const result = this.ArrayMapFieldNamesToCodeNames('Integration URL Formats', await dataSource.query(sSQL));
|
|
2566
2565
|
return result;
|
|
2567
2566
|
}
|
|
2568
2567
|
async CompanyIntegrationsArray(integration_, { dataSource, userPayload }, pubSub) {
|
|
2569
2568
|
this.CheckUserReadPermissions('Company Integrations', userPayload);
|
|
2570
|
-
const sSQL = `SELECT * FROM [${
|
|
2569
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanyIntegrations] WHERE [IntegrationName]=${integration_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2571
2570
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integrations', await dataSource.query(sSQL));
|
|
2572
2571
|
return result;
|
|
2573
2572
|
}
|
|
@@ -2909,31 +2908,31 @@ let CompanyIntegrationResolver = class CompanyIntegrationResolver extends server
|
|
|
2909
2908
|
}
|
|
2910
2909
|
async CompanyIntegration(ID, { dataSource, userPayload }, pubSub) {
|
|
2911
2910
|
this.CheckUserReadPermissions('Company Integrations', userPayload);
|
|
2912
|
-
const sSQL = `SELECT * FROM [${
|
|
2911
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanyIntegrations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2913
2912
|
const result = this.MapFieldNamesToCodeNames('Company Integrations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
2914
2913
|
return result;
|
|
2915
2914
|
}
|
|
2916
2915
|
async ListsArray(companyintegration_, { dataSource, userPayload }, pubSub) {
|
|
2917
2916
|
this.CheckUserReadPermissions('Lists', userPayload);
|
|
2918
|
-
const sSQL = `SELECT * FROM [${
|
|
2917
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwLists] WHERE [CompanyIntegrationID]=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Lists', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2919
2918
|
const result = this.ArrayMapFieldNamesToCodeNames('Lists', await dataSource.query(sSQL));
|
|
2920
2919
|
return result;
|
|
2921
2920
|
}
|
|
2922
2921
|
async EmployeeCompanyIntegrationsArray(companyintegration_, { dataSource, userPayload }, pubSub) {
|
|
2923
2922
|
this.CheckUserReadPermissions('Employee Company Integrations', userPayload);
|
|
2924
|
-
const sSQL = `SELECT * FROM [${
|
|
2923
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEmployeeCompanyIntegrations] WHERE [CompanyIntegrationID]=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2925
2924
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Company Integrations', await dataSource.query(sSQL));
|
|
2926
2925
|
return result;
|
|
2927
2926
|
}
|
|
2928
2927
|
async CompanyIntegrationRunsArray(companyintegration_, { dataSource, userPayload }, pubSub) {
|
|
2929
2928
|
this.CheckUserReadPermissions('Company Integration Runs', userPayload);
|
|
2930
|
-
const sSQL = `SELECT * FROM [${
|
|
2929
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanyIntegrationRuns] WHERE [CompanyIntegrationID]=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2931
2930
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Runs', await dataSource.query(sSQL));
|
|
2932
2931
|
return result;
|
|
2933
2932
|
}
|
|
2934
2933
|
async CompanyIntegrationRecordMapsArray(companyintegration_, { dataSource, userPayload }, pubSub) {
|
|
2935
2934
|
this.CheckUserReadPermissions('Company Integration Record Maps', userPayload);
|
|
2936
|
-
const sSQL = `SELECT * FROM [${
|
|
2935
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanyIntegrationRecordMaps] WHERE [CompanyIntegrationID]=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Record Maps', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2937
2936
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Record Maps', await dataSource.query(sSQL));
|
|
2938
2937
|
return result;
|
|
2939
2938
|
}
|
|
@@ -3522,19 +3521,19 @@ let EntityFieldResolver = class EntityFieldResolver extends server_1.ResolverBas
|
|
|
3522
3521
|
}
|
|
3523
3522
|
async EntityField(ID, { dataSource, userPayload }, pubSub) {
|
|
3524
3523
|
this.CheckUserReadPermissions('Entity Fields', userPayload);
|
|
3525
|
-
const sSQL = `SELECT * FROM [${
|
|
3524
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityFields] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Fields', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
3526
3525
|
const result = this.MapFieldNamesToCodeNames('Entity Fields', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
3527
3526
|
return result;
|
|
3528
3527
|
}
|
|
3529
3528
|
async AllEntityFields({ dataSource, userPayload }, pubSub) {
|
|
3530
3529
|
this.CheckUserReadPermissions('Entity Fields', userPayload);
|
|
3531
|
-
const sSQL = `SELECT * FROM [${
|
|
3530
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityFields]` + this.getRowLevelSecurityWhereClause('Entity Fields', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
3532
3531
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Fields', await dataSource.query(sSQL));
|
|
3533
3532
|
return result;
|
|
3534
3533
|
}
|
|
3535
3534
|
async EntityFieldValuesArray(entityfield_, { dataSource, userPayload }, pubSub) {
|
|
3536
3535
|
this.CheckUserReadPermissions('Entity Field Values', userPayload);
|
|
3537
|
-
const sSQL = `SELECT * FROM [${
|
|
3536
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityFieldValues] WHERE [EntityFieldID]=${entityfield_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Field Values', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
3538
3537
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Field Values', await dataSource.query(sSQL));
|
|
3539
3538
|
return result;
|
|
3540
3539
|
}
|
|
@@ -4368,181 +4367,181 @@ let EntityResolverBase = class EntityResolverBase extends server_1.ResolverBase
|
|
|
4368
4367
|
}
|
|
4369
4368
|
async Entity(ID, { dataSource, userPayload }, pubSub) {
|
|
4370
4369
|
this.CheckUserReadPermissions('Entities', userPayload);
|
|
4371
|
-
const sSQL = `SELECT * FROM [${
|
|
4370
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntities] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4372
4371
|
const result = this.MapFieldNamesToCodeNames('Entities', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
4373
4372
|
return result;
|
|
4374
4373
|
}
|
|
4375
4374
|
async AllEntities({ dataSource, userPayload }, pubSub) {
|
|
4376
4375
|
this.CheckUserReadPermissions('Entities', userPayload);
|
|
4377
|
-
const sSQL = `SELECT * FROM [${
|
|
4376
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntities]` + this.getRowLevelSecurityWhereClause('Entities', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
4378
4377
|
const result = this.ArrayMapFieldNamesToCodeNames('Entities', await dataSource.query(sSQL));
|
|
4379
4378
|
return result;
|
|
4380
4379
|
}
|
|
4381
4380
|
async EntityFieldsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4382
4381
|
this.CheckUserReadPermissions('Entity Fields', userPayload);
|
|
4383
|
-
const sSQL = `SELECT * FROM [${
|
|
4382
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityFields] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Fields', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4384
4383
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Fields', await dataSource.query(sSQL));
|
|
4385
4384
|
return result;
|
|
4386
4385
|
}
|
|
4387
4386
|
async EntityPermissionsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4388
4387
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
4389
|
-
const sSQL = `SELECT * FROM [${
|
|
4388
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityPermissions] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4390
4389
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL));
|
|
4391
4390
|
return result;
|
|
4392
4391
|
}
|
|
4393
4392
|
async EntityRelationshipsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4394
4393
|
this.CheckUserReadPermissions('Entity Relationships', userPayload);
|
|
4395
|
-
const sSQL = `SELECT * FROM [${
|
|
4394
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityRelationships] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Relationships', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4396
4395
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Relationships', await dataSource.query(sSQL));
|
|
4397
4396
|
return result;
|
|
4398
4397
|
}
|
|
4399
4398
|
async EntityAIActionsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4400
4399
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
4401
|
-
const sSQL = `SELECT * FROM [${
|
|
4400
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityAIActions] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4402
4401
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL));
|
|
4403
4402
|
return result;
|
|
4404
4403
|
}
|
|
4405
4404
|
async UserRecordLogsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4406
4405
|
this.CheckUserReadPermissions('User Record Logs', userPayload);
|
|
4407
|
-
const sSQL = `SELECT * FROM [${
|
|
4406
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserRecordLogs] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Record Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4408
4407
|
const result = this.ArrayMapFieldNamesToCodeNames('User Record Logs', await dataSource.query(sSQL));
|
|
4409
4408
|
return result;
|
|
4410
4409
|
}
|
|
4411
4410
|
async IntegrationURLFormatsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4412
4411
|
this.CheckUserReadPermissions('Integration URL Formats', userPayload);
|
|
4413
|
-
const sSQL = `SELECT * FROM [${
|
|
4412
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwIntegrationURLFormats] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Integration URL Formats', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4414
4413
|
const result = this.ArrayMapFieldNamesToCodeNames('Integration URL Formats', await dataSource.query(sSQL));
|
|
4415
4414
|
return result;
|
|
4416
4415
|
}
|
|
4417
4416
|
async EntitiesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4418
4417
|
this.CheckUserReadPermissions('Entities', userPayload);
|
|
4419
|
-
const sSQL = `SELECT * FROM [${
|
|
4418
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntities] WHERE [ParentID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4420
4419
|
const result = this.ArrayMapFieldNamesToCodeNames('Entities', await dataSource.query(sSQL));
|
|
4421
4420
|
return result;
|
|
4422
4421
|
}
|
|
4423
4422
|
async UserFavoritesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4424
4423
|
this.CheckUserReadPermissions('User Favorites', userPayload);
|
|
4425
|
-
const sSQL = `SELECT * FROM [${
|
|
4424
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserFavorites] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Favorites', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4426
4425
|
const result = this.ArrayMapFieldNamesToCodeNames('User Favorites', await dataSource.query(sSQL));
|
|
4427
4426
|
return result;
|
|
4428
4427
|
}
|
|
4429
4428
|
async CompanyIntegrationRunDetailsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4430
4429
|
this.CheckUserReadPermissions('Company Integration Run Details', userPayload);
|
|
4431
|
-
const sSQL = `SELECT * FROM [${
|
|
4430
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanyIntegrationRunDetails] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4432
4431
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Run Details', await dataSource.query(sSQL));
|
|
4433
4432
|
return result;
|
|
4434
4433
|
}
|
|
4435
4434
|
async ApplicationEntitiesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4436
4435
|
this.CheckUserReadPermissions('Application Entities', userPayload);
|
|
4437
|
-
const sSQL = `SELECT * FROM [${
|
|
4436
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwApplicationEntities] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4438
4437
|
const result = this.ArrayMapFieldNamesToCodeNames('Application Entities', await dataSource.query(sSQL));
|
|
4439
4438
|
return result;
|
|
4440
4439
|
}
|
|
4441
4440
|
async UserApplicationEntitiesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4442
4441
|
this.CheckUserReadPermissions('User Application Entities', userPayload);
|
|
4443
|
-
const sSQL = `SELECT * FROM [${
|
|
4442
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserApplicationEntities] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4444
4443
|
const result = this.ArrayMapFieldNamesToCodeNames('User Application Entities', await dataSource.query(sSQL));
|
|
4445
4444
|
return result;
|
|
4446
4445
|
}
|
|
4447
4446
|
async ListsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4448
4447
|
this.CheckUserReadPermissions('Lists', userPayload);
|
|
4449
|
-
const sSQL = `SELECT * FROM [${
|
|
4448
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwLists] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Lists', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4450
4449
|
const result = this.ArrayMapFieldNamesToCodeNames('Lists', await dataSource.query(sSQL));
|
|
4451
4450
|
return result;
|
|
4452
4451
|
}
|
|
4453
4452
|
async UserViewsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4454
4453
|
this.CheckUserReadPermissions('User Views', userPayload);
|
|
4455
|
-
const sSQL = `SELECT * FROM [${
|
|
4454
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserViews] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4456
4455
|
const result = this.ArrayMapFieldNamesToCodeNames('User Views', await dataSource.query(sSQL));
|
|
4457
4456
|
return result;
|
|
4458
4457
|
}
|
|
4459
4458
|
async RecordChangesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4460
4459
|
this.CheckUserReadPermissions('Record Changes', userPayload);
|
|
4461
|
-
const sSQL = `SELECT * FROM [${
|
|
4460
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwRecordChanges] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Record Changes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4462
4461
|
const result = this.ArrayMapFieldNamesToCodeNames('Record Changes', await dataSource.query(sSQL));
|
|
4463
4462
|
return result;
|
|
4464
4463
|
}
|
|
4465
4464
|
async AuditLogsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4466
4465
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
4467
|
-
const sSQL = `SELECT * FROM [${
|
|
4466
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuditLogs] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4468
4467
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL));
|
|
4469
4468
|
return result;
|
|
4470
4469
|
}
|
|
4471
4470
|
async ResourceTypesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4472
4471
|
this.CheckUserReadPermissions('Resource Types', userPayload);
|
|
4473
|
-
const sSQL = `SELECT * FROM [${
|
|
4472
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwResourceTypes] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Resource Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4474
4473
|
const result = this.ArrayMapFieldNamesToCodeNames('Resource Types', await dataSource.query(sSQL));
|
|
4475
4474
|
return result;
|
|
4476
4475
|
}
|
|
4477
4476
|
async TaggedItemsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4478
4477
|
this.CheckUserReadPermissions('Tagged Items', userPayload);
|
|
4479
|
-
const sSQL = `SELECT * FROM [${
|
|
4478
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwTaggedItems] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Tagged Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4480
4479
|
const result = this.ArrayMapFieldNamesToCodeNames('Tagged Items', await dataSource.query(sSQL));
|
|
4481
4480
|
return result;
|
|
4482
4481
|
}
|
|
4483
4482
|
async DatasetItemsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4484
4483
|
this.CheckUserReadPermissions('Dataset Items', userPayload);
|
|
4485
|
-
const sSQL = `SELECT * FROM [${
|
|
4484
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDatasetItems] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Dataset Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4486
4485
|
const result = this.ArrayMapFieldNamesToCodeNames('Dataset Items', await dataSource.query(sSQL));
|
|
4487
4486
|
return result;
|
|
4488
4487
|
}
|
|
4489
4488
|
async CompanyIntegrationRecordMapsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4490
4489
|
this.CheckUserReadPermissions('Company Integration Record Maps', userPayload);
|
|
4491
|
-
const sSQL = `SELECT * FROM [${
|
|
4490
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanyIntegrationRecordMaps] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Record Maps', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4492
4491
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Record Maps', await dataSource.query(sSQL));
|
|
4493
4492
|
return result;
|
|
4494
4493
|
}
|
|
4495
4494
|
async RecordMergeLogsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4496
4495
|
this.CheckUserReadPermissions('Record Merge Logs', userPayload);
|
|
4497
|
-
const sSQL = `SELECT * FROM [${
|
|
4496
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwRecordMergeLogs] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4498
4497
|
const result = this.ArrayMapFieldNamesToCodeNames('Record Merge Logs', await dataSource.query(sSQL));
|
|
4499
4498
|
return result;
|
|
4500
4499
|
}
|
|
4501
4500
|
async QueryFieldsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4502
4501
|
this.CheckUserReadPermissions('Query Fields', userPayload);
|
|
4503
|
-
const sSQL = `SELECT * FROM [${
|
|
4502
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwQueryFields] WHERE [SourceEntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Query Fields', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4504
4503
|
const result = this.ArrayMapFieldNamesToCodeNames('Query Fields', await dataSource.query(sSQL));
|
|
4505
4504
|
return result;
|
|
4506
4505
|
}
|
|
4507
4506
|
async ConversationsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4508
4507
|
this.CheckUserReadPermissions('Conversations', userPayload);
|
|
4509
|
-
const sSQL = `SELECT * FROM [${
|
|
4508
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwConversations] WHERE [LinkedEntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Conversations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4510
4509
|
const result = this.ArrayMapFieldNamesToCodeNames('Conversations', await dataSource.query(sSQL));
|
|
4511
4510
|
return result;
|
|
4512
4511
|
}
|
|
4513
4512
|
async EntityDocumentsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4514
4513
|
this.CheckUserReadPermissions('Entity Documents', userPayload);
|
|
4515
|
-
const sSQL = `SELECT * FROM [${
|
|
4514
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityDocuments] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Documents', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4516
4515
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Documents', await dataSource.query(sSQL));
|
|
4517
4516
|
return result;
|
|
4518
4517
|
}
|
|
4519
4518
|
async DataContextItemsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4520
4519
|
this.CheckUserReadPermissions('Data Context Items', userPayload);
|
|
4521
|
-
const sSQL = `SELECT * FROM [${
|
|
4520
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDataContextItems] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Data Context Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4522
4521
|
const result = this.ArrayMapFieldNamesToCodeNames('Data Context Items', await dataSource.query(sSQL));
|
|
4523
4522
|
return result;
|
|
4524
4523
|
}
|
|
4525
4524
|
async UsersArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4526
4525
|
this.CheckUserReadPermissions('Users', userPayload);
|
|
4527
|
-
const sSQL = `SELECT * FROM [${
|
|
4526
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUsers] WHERE [LinkedEntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Users', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4528
4527
|
const result = this.ArrayMapFieldNamesToCodeNames('Users', await dataSource.query(sSQL));
|
|
4529
4528
|
return result;
|
|
4530
4529
|
}
|
|
4531
4530
|
async EntityRecordDocumentsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4532
4531
|
this.CheckUserReadPermissions('Entity Record Documents', userPayload);
|
|
4533
|
-
const sSQL = `SELECT * FROM [${
|
|
4532
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityRecordDocuments] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Record Documents', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4534
4533
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Record Documents', await dataSource.query(sSQL));
|
|
4535
4534
|
return result;
|
|
4536
4535
|
}
|
|
4537
4536
|
async FileEntityRecordLinksArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4538
4537
|
this.CheckUserReadPermissions('File Entity Record Links', userPayload);
|
|
4539
|
-
const sSQL = `SELECT * FROM [${
|
|
4538
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwFileEntityRecordLinks] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('File Entity Record Links', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4540
4539
|
const result = this.ArrayMapFieldNamesToCodeNames('File Entity Record Links', await dataSource.query(sSQL));
|
|
4541
4540
|
return result;
|
|
4542
4541
|
}
|
|
4543
4542
|
async UserViewCategoriesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4544
4543
|
this.CheckUserReadPermissions('User View Categories', userPayload);
|
|
4545
|
-
const sSQL = `SELECT * FROM [${
|
|
4544
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserViewCategories] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User View Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4546
4545
|
const result = this.ArrayMapFieldNamesToCodeNames('User View Categories', await dataSource.query(sSQL));
|
|
4547
4546
|
return result;
|
|
4548
4547
|
}
|
|
@@ -5261,121 +5260,121 @@ let UserResolverBase = class UserResolverBase extends server_1.ResolverBase {
|
|
|
5261
5260
|
}
|
|
5262
5261
|
async User(ID, { dataSource, userPayload }, pubSub) {
|
|
5263
5262
|
this.CheckUserReadPermissions('Users', userPayload);
|
|
5264
|
-
const sSQL = `SELECT * FROM [${
|
|
5263
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUsers] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Users', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5265
5264
|
const result = this.MapFieldNamesToCodeNames('Users', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
5266
5265
|
return result;
|
|
5267
5266
|
}
|
|
5268
5267
|
async AllUsers({ dataSource, userPayload }, pubSub) {
|
|
5269
5268
|
this.CheckUserReadPermissions('Users', userPayload);
|
|
5270
|
-
const sSQL = `SELECT * FROM [${
|
|
5269
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUsers]` + this.getRowLevelSecurityWhereClause('Users', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
5271
5270
|
const result = this.ArrayMapFieldNamesToCodeNames('Users', await dataSource.query(sSQL));
|
|
5272
5271
|
return result;
|
|
5273
5272
|
}
|
|
5274
5273
|
async UserApplicationsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5275
5274
|
this.CheckUserReadPermissions('User Applications', userPayload);
|
|
5276
|
-
const sSQL = `SELECT * FROM [${
|
|
5275
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserApplications] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Applications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5277
5276
|
const result = this.ArrayMapFieldNamesToCodeNames('User Applications', await dataSource.query(sSQL));
|
|
5278
5277
|
return result;
|
|
5279
5278
|
}
|
|
5280
5279
|
async UserRolesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5281
5280
|
this.CheckUserReadPermissions('User Roles', userPayload);
|
|
5282
|
-
const sSQL = `SELECT * FROM [${
|
|
5281
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserRoles] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5283
5282
|
const result = this.ArrayMapFieldNamesToCodeNames('User Roles', await dataSource.query(sSQL));
|
|
5284
5283
|
return result;
|
|
5285
5284
|
}
|
|
5286
5285
|
async WorkspacesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5287
5286
|
this.CheckUserReadPermissions('Workspaces', userPayload);
|
|
5288
|
-
const sSQL = `SELECT * FROM [${
|
|
5287
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwWorkspaces] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Workspaces', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5289
5288
|
const result = this.ArrayMapFieldNamesToCodeNames('Workspaces', await dataSource.query(sSQL));
|
|
5290
5289
|
return result;
|
|
5291
5290
|
}
|
|
5292
5291
|
async ReportsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5293
5292
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
5294
|
-
const sSQL = `SELECT * FROM [${
|
|
5293
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwReports] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5295
5294
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
5296
5295
|
return result;
|
|
5297
5296
|
}
|
|
5298
5297
|
async ReportSnapshotsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5299
5298
|
this.CheckUserReadPermissions('Report Snapshots', userPayload);
|
|
5300
|
-
const sSQL = `SELECT * FROM [${
|
|
5299
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwReportSnapshots] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Report Snapshots', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5301
5300
|
const result = this.ArrayMapFieldNamesToCodeNames('Report Snapshots', await dataSource.query(sSQL));
|
|
5302
5301
|
return result;
|
|
5303
5302
|
}
|
|
5304
5303
|
async RecordChangesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5305
5304
|
this.CheckUserReadPermissions('Record Changes', userPayload);
|
|
5306
|
-
const sSQL = `SELECT * FROM [${
|
|
5305
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwRecordChanges] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Record Changes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5307
5306
|
const result = this.ArrayMapFieldNamesToCodeNames('Record Changes', await dataSource.query(sSQL));
|
|
5308
5307
|
return result;
|
|
5309
5308
|
}
|
|
5310
5309
|
async DashboardsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5311
5310
|
this.CheckUserReadPermissions('Dashboards', userPayload);
|
|
5312
|
-
const sSQL = `SELECT * FROM [${
|
|
5311
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDashboards] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Dashboards', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5313
5312
|
const result = this.ArrayMapFieldNamesToCodeNames('Dashboards', await dataSource.query(sSQL));
|
|
5314
5313
|
return result;
|
|
5315
5314
|
}
|
|
5316
5315
|
async UserViewRunsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5317
5316
|
this.CheckUserReadPermissions('User View Runs', userPayload);
|
|
5318
|
-
const sSQL = `SELECT * FROM [${
|
|
5317
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserViewRuns] WHERE [RunByUserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User View Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5319
5318
|
const result = this.ArrayMapFieldNamesToCodeNames('User View Runs', await dataSource.query(sSQL));
|
|
5320
5319
|
return result;
|
|
5321
5320
|
}
|
|
5322
5321
|
async AuditLogsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5323
5322
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
5324
|
-
const sSQL = `SELECT * FROM [${
|
|
5323
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuditLogs] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5325
5324
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL));
|
|
5326
5325
|
return result;
|
|
5327
5326
|
}
|
|
5328
5327
|
async ListsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5329
5328
|
this.CheckUserReadPermissions('Lists', userPayload);
|
|
5330
|
-
const sSQL = `SELECT * FROM [${
|
|
5329
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwLists] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Lists', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5331
5330
|
const result = this.ArrayMapFieldNamesToCodeNames('Lists', await dataSource.query(sSQL));
|
|
5332
5331
|
return result;
|
|
5333
5332
|
}
|
|
5334
5333
|
async UserFavoritesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5335
5334
|
this.CheckUserReadPermissions('User Favorites', userPayload);
|
|
5336
|
-
const sSQL = `SELECT * FROM [${
|
|
5335
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserFavorites] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Favorites', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5337
5336
|
const result = this.ArrayMapFieldNamesToCodeNames('User Favorites', await dataSource.query(sSQL));
|
|
5338
5337
|
return result;
|
|
5339
5338
|
}
|
|
5340
5339
|
async UserRecordLogsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5341
5340
|
this.CheckUserReadPermissions('User Record Logs', userPayload);
|
|
5342
|
-
const sSQL = `SELECT * FROM [${
|
|
5341
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserRecordLogs] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Record Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5343
5342
|
const result = this.ArrayMapFieldNamesToCodeNames('User Record Logs', await dataSource.query(sSQL));
|
|
5344
5343
|
return result;
|
|
5345
5344
|
}
|
|
5346
5345
|
async UserViewsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5347
5346
|
this.CheckUserReadPermissions('User Views', userPayload);
|
|
5348
|
-
const sSQL = `SELECT * FROM [${
|
|
5347
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserViews] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5349
5348
|
const result = this.ArrayMapFieldNamesToCodeNames('User Views', await dataSource.query(sSQL));
|
|
5350
5349
|
return result;
|
|
5351
5350
|
}
|
|
5352
5351
|
async CompanyIntegrationRunsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5353
5352
|
this.CheckUserReadPermissions('Company Integration Runs', userPayload);
|
|
5354
|
-
const sSQL = `SELECT * FROM [${
|
|
5353
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanyIntegrationRuns] WHERE [RunByUserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5355
5354
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Runs', await dataSource.query(sSQL));
|
|
5356
5355
|
return result;
|
|
5357
5356
|
}
|
|
5358
5357
|
async UserNotificationsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5359
5358
|
this.CheckUserReadPermissions('User Notifications', userPayload);
|
|
5360
|
-
const sSQL = `SELECT * FROM [${
|
|
5359
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserNotifications] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Notifications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5361
5360
|
const result = this.ArrayMapFieldNamesToCodeNames('User Notifications', await dataSource.query(sSQL));
|
|
5362
5361
|
return result;
|
|
5363
5362
|
}
|
|
5364
5363
|
async ConversationsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5365
5364
|
this.CheckUserReadPermissions('Conversations', userPayload);
|
|
5366
|
-
const sSQL = `SELECT * FROM [${
|
|
5365
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwConversations] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Conversations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5367
5366
|
const result = this.ArrayMapFieldNamesToCodeNames('Conversations', await dataSource.query(sSQL));
|
|
5368
5367
|
return result;
|
|
5369
5368
|
}
|
|
5370
5369
|
async RecordMergeLogsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5371
5370
|
this.CheckUserReadPermissions('Record Merge Logs', userPayload);
|
|
5372
|
-
const sSQL = `SELECT * FROM [${
|
|
5371
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwRecordMergeLogs] WHERE [InitiatedByUserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5373
5372
|
const result = this.ArrayMapFieldNamesToCodeNames('Record Merge Logs', await dataSource.query(sSQL));
|
|
5374
5373
|
return result;
|
|
5375
5374
|
}
|
|
5376
5375
|
async DataContextsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5377
5376
|
this.CheckUserReadPermissions('Data Contexts', userPayload);
|
|
5378
|
-
const sSQL = `SELECT * FROM [${
|
|
5377
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDataContexts] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Data Contexts', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5379
5378
|
const result = this.ArrayMapFieldNamesToCodeNames('Data Contexts', await dataSource.query(sSQL));
|
|
5380
5379
|
return result;
|
|
5381
5380
|
}
|
|
@@ -5986,13 +5985,13 @@ let EntityRelationshipResolver = class EntityRelationshipResolver extends server
|
|
|
5986
5985
|
}
|
|
5987
5986
|
async EntityRelationship(ID, { dataSource, userPayload }, pubSub) {
|
|
5988
5987
|
this.CheckUserReadPermissions('Entity Relationships', userPayload);
|
|
5989
|
-
const sSQL = `SELECT * FROM [${
|
|
5988
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityRelationships] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Relationships', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5990
5989
|
const result = this.MapFieldNamesToCodeNames('Entity Relationships', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
5991
5990
|
return result;
|
|
5992
5991
|
}
|
|
5993
5992
|
async AllEntityRelationships({ dataSource, userPayload }, pubSub) {
|
|
5994
5993
|
this.CheckUserReadPermissions('Entity Relationships', userPayload);
|
|
5995
|
-
const sSQL = `SELECT * FROM [${
|
|
5994
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityRelationships]` + this.getRowLevelSecurityWhereClause('Entity Relationships', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
5996
5995
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Relationships', await dataSource.query(sSQL));
|
|
5997
5996
|
return result;
|
|
5998
5997
|
}
|
|
@@ -6283,7 +6282,7 @@ let UserRecordLogResolver = class UserRecordLogResolver extends server_1.Resolve
|
|
|
6283
6282
|
}
|
|
6284
6283
|
async UserRecordLog(ID, { dataSource, userPayload }, pubSub) {
|
|
6285
6284
|
this.CheckUserReadPermissions('User Record Logs', userPayload);
|
|
6286
|
-
const sSQL = `SELECT * FROM [${
|
|
6285
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserRecordLogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Record Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6287
6286
|
const result = this.MapFieldNamesToCodeNames('User Record Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
6288
6287
|
return result;
|
|
6289
6288
|
}
|
|
@@ -6693,31 +6692,31 @@ let UserViewResolverBase = class UserViewResolverBase extends server_1.ResolverB
|
|
|
6693
6692
|
}
|
|
6694
6693
|
async UserView(ID, { dataSource, userPayload }, pubSub) {
|
|
6695
6694
|
this.CheckUserReadPermissions('User Views', userPayload);
|
|
6696
|
-
const sSQL = `SELECT * FROM [${
|
|
6695
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserViews] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6697
6696
|
const result = this.MapFieldNamesToCodeNames('User Views', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
6698
6697
|
return result;
|
|
6699
6698
|
}
|
|
6700
6699
|
async AllUserViews({ dataSource, userPayload }, pubSub) {
|
|
6701
6700
|
this.CheckUserReadPermissions('User Views', userPayload);
|
|
6702
|
-
const sSQL = `SELECT * FROM [${
|
|
6701
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserViews]` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
6703
6702
|
const result = this.ArrayMapFieldNamesToCodeNames('User Views', await dataSource.query(sSQL));
|
|
6704
6703
|
return result;
|
|
6705
6704
|
}
|
|
6706
6705
|
async EntityRelationshipsArray(userview_, { dataSource, userPayload }, pubSub) {
|
|
6707
6706
|
this.CheckUserReadPermissions('Entity Relationships', userPayload);
|
|
6708
|
-
const sSQL = `SELECT * FROM [${
|
|
6707
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityRelationships] WHERE [DisplayUserViewGUID]=${userview_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Relationships', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6709
6708
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Relationships', await dataSource.query(sSQL));
|
|
6710
6709
|
return result;
|
|
6711
6710
|
}
|
|
6712
6711
|
async UserViewRunsArray(userview_, { dataSource, userPayload }, pubSub) {
|
|
6713
6712
|
this.CheckUserReadPermissions('User View Runs', userPayload);
|
|
6714
|
-
const sSQL = `SELECT * FROM [${
|
|
6713
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserViewRuns] WHERE [UserViewID]=${userview_.ID} ` + this.getRowLevelSecurityWhereClause('User View Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6715
6714
|
const result = this.ArrayMapFieldNamesToCodeNames('User View Runs', await dataSource.query(sSQL));
|
|
6716
6715
|
return result;
|
|
6717
6716
|
}
|
|
6718
6717
|
async DataContextItemsArray(userview_, { dataSource, userPayload }, pubSub) {
|
|
6719
6718
|
this.CheckUserReadPermissions('Data Context Items', userPayload);
|
|
6720
|
-
const sSQL = `SELECT * FROM [${
|
|
6719
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDataContextItems] WHERE [ViewID]=${userview_.ID} ` + this.getRowLevelSecurityWhereClause('Data Context Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6721
6720
|
const result = this.ArrayMapFieldNamesToCodeNames('Data Context Items', await dataSource.query(sSQL));
|
|
6722
6721
|
return result;
|
|
6723
6722
|
}
|
|
@@ -7022,25 +7021,25 @@ let CompanyIntegrationRunResolver = class CompanyIntegrationRunResolver extends
|
|
|
7022
7021
|
}
|
|
7023
7022
|
async CompanyIntegrationRun(ID, { dataSource, userPayload }, pubSub) {
|
|
7024
7023
|
this.CheckUserReadPermissions('Company Integration Runs', userPayload);
|
|
7025
|
-
const sSQL = `SELECT * FROM [${
|
|
7024
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanyIntegrationRuns] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7026
7025
|
const result = this.MapFieldNamesToCodeNames('Company Integration Runs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
7027
7026
|
return result;
|
|
7028
7027
|
}
|
|
7029
7028
|
async CompanyIntegrationRunAPILogsArray(companyintegrationrun_, { dataSource, userPayload }, pubSub) {
|
|
7030
7029
|
this.CheckUserReadPermissions('Company Integration Run API Logs', userPayload);
|
|
7031
|
-
const sSQL = `SELECT * FROM [${
|
|
7030
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanyIntegrationRunAPILogs] WHERE [CompanyIntegrationRunID]=${companyintegrationrun_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run API Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7032
7031
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Run API Logs', await dataSource.query(sSQL));
|
|
7033
7032
|
return result;
|
|
7034
7033
|
}
|
|
7035
7034
|
async ErrorLogsArray(companyintegrationrun_, { dataSource, userPayload }, pubSub) {
|
|
7036
7035
|
this.CheckUserReadPermissions('Error Logs', userPayload);
|
|
7037
|
-
const sSQL = `SELECT * FROM [${
|
|
7036
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwErrorLogs] WHERE [CompanyIntegrationRunID]=${companyintegrationrun_.ID} ` + this.getRowLevelSecurityWhereClause('Error Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7038
7037
|
const result = this.ArrayMapFieldNamesToCodeNames('Error Logs', await dataSource.query(sSQL));
|
|
7039
7038
|
return result;
|
|
7040
7039
|
}
|
|
7041
7040
|
async CompanyIntegrationRunDetailsArray(companyintegrationrun_, { dataSource, userPayload }, pubSub) {
|
|
7042
7041
|
this.CheckUserReadPermissions('Company Integration Run Details', userPayload);
|
|
7043
|
-
const sSQL = `SELECT * FROM [${
|
|
7042
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanyIntegrationRunDetails] WHERE [CompanyIntegrationRunID]=${companyintegrationrun_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7044
7043
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Run Details', await dataSource.query(sSQL));
|
|
7045
7044
|
return result;
|
|
7046
7045
|
}
|
|
@@ -7279,13 +7278,13 @@ let CompanyIntegrationRunDetailResolver = class CompanyIntegrationRunDetailResol
|
|
|
7279
7278
|
}
|
|
7280
7279
|
async CompanyIntegrationRunDetail(ID, { dataSource, userPayload }, pubSub) {
|
|
7281
7280
|
this.CheckUserReadPermissions('Company Integration Run Details', userPayload);
|
|
7282
|
-
const sSQL = `SELECT * FROM [${
|
|
7281
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanyIntegrationRunDetails] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7283
7282
|
const result = this.MapFieldNamesToCodeNames('Company Integration Run Details', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
7284
7283
|
return result;
|
|
7285
7284
|
}
|
|
7286
7285
|
async ErrorLogsArray(companyintegrationrundetail_, { dataSource, userPayload }, pubSub) {
|
|
7287
7286
|
this.CheckUserReadPermissions('Error Logs', userPayload);
|
|
7288
|
-
const sSQL = `SELECT * FROM [${
|
|
7287
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwErrorLogs] WHERE [CompanyIntegrationRunDetailID]=${companyintegrationrundetail_.ID} ` + this.getRowLevelSecurityWhereClause('Error Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7289
7288
|
const result = this.ArrayMapFieldNamesToCodeNames('Error Logs', await dataSource.query(sSQL));
|
|
7290
7289
|
return result;
|
|
7291
7290
|
}
|
|
@@ -7509,7 +7508,7 @@ let ErrorLogResolver = class ErrorLogResolver extends server_1.ResolverBase {
|
|
|
7509
7508
|
}
|
|
7510
7509
|
async ErrorLog(ID, { dataSource, userPayload }, pubSub) {
|
|
7511
7510
|
this.CheckUserReadPermissions('Error Logs', userPayload);
|
|
7512
|
-
const sSQL = `SELECT * FROM [${
|
|
7511
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwErrorLogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Error Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7513
7512
|
const result = this.MapFieldNamesToCodeNames('Error Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
7514
7513
|
return result;
|
|
7515
7514
|
}
|
|
@@ -7701,25 +7700,25 @@ let ApplicationResolver = class ApplicationResolver extends server_1.ResolverBas
|
|
|
7701
7700
|
}
|
|
7702
7701
|
async Application(ID, { dataSource, userPayload }, pubSub) {
|
|
7703
7702
|
this.CheckUserReadPermissions('Applications', userPayload);
|
|
7704
|
-
const sSQL = `SELECT * FROM [${
|
|
7703
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwApplications] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Applications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7705
7704
|
const result = this.MapFieldNamesToCodeNames('Applications', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
7706
7705
|
return result;
|
|
7707
7706
|
}
|
|
7708
7707
|
async AllApplications({ dataSource, userPayload }, pubSub) {
|
|
7709
7708
|
this.CheckUserReadPermissions('Applications', userPayload);
|
|
7710
|
-
const sSQL = `SELECT * FROM [${
|
|
7709
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwApplications]` + this.getRowLevelSecurityWhereClause('Applications', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
7711
7710
|
const result = this.ArrayMapFieldNamesToCodeNames('Applications', await dataSource.query(sSQL));
|
|
7712
7711
|
return result;
|
|
7713
7712
|
}
|
|
7714
7713
|
async ApplicationEntitiesArray(application_, { dataSource, userPayload }, pubSub) {
|
|
7715
7714
|
this.CheckUserReadPermissions('Application Entities', userPayload);
|
|
7716
|
-
const sSQL = `SELECT * FROM [${
|
|
7715
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwApplicationEntities] WHERE [ApplicationID]=${application_.ID} ` + this.getRowLevelSecurityWhereClause('Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7717
7716
|
const result = this.ArrayMapFieldNamesToCodeNames('Application Entities', await dataSource.query(sSQL));
|
|
7718
7717
|
return result;
|
|
7719
7718
|
}
|
|
7720
7719
|
async UserApplicationsArray(application_, { dataSource, userPayload }, pubSub) {
|
|
7721
7720
|
this.CheckUserReadPermissions('User Applications', userPayload);
|
|
7722
|
-
const sSQL = `SELECT * FROM [${
|
|
7721
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserApplications] WHERE [ApplicationID]=${application_.ID} ` + this.getRowLevelSecurityWhereClause('User Applications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7723
7722
|
const result = this.ArrayMapFieldNamesToCodeNames('User Applications', await dataSource.query(sSQL));
|
|
7724
7723
|
return result;
|
|
7725
7724
|
}
|
|
@@ -8043,7 +8042,7 @@ let ApplicationEntityResolver = class ApplicationEntityResolver extends server_1
|
|
|
8043
8042
|
}
|
|
8044
8043
|
async ApplicationEntity(ID, { dataSource, userPayload }, pubSub) {
|
|
8045
8044
|
this.CheckUserReadPermissions('Application Entities', userPayload);
|
|
8046
|
-
const sSQL = `SELECT * FROM [${
|
|
8045
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwApplicationEntities] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8047
8046
|
const result = this.MapFieldNamesToCodeNames('Application Entities', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
8048
8047
|
return result;
|
|
8049
8048
|
}
|
|
@@ -8412,13 +8411,13 @@ let EntityPermissionResolver = class EntityPermissionResolver extends server_1.R
|
|
|
8412
8411
|
}
|
|
8413
8412
|
async EntityPermission(ID, { dataSource, userPayload }, pubSub) {
|
|
8414
8413
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
8415
|
-
const sSQL = `SELECT * FROM [${
|
|
8414
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityPermissions] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8416
8415
|
const result = this.MapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
8417
8416
|
return result;
|
|
8418
8417
|
}
|
|
8419
8418
|
async AllEntityPermissions({ dataSource, userPayload }, pubSub) {
|
|
8420
8419
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
8421
|
-
const sSQL = `SELECT * FROM [${
|
|
8420
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityPermissions]` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
8422
8421
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL));
|
|
8423
8422
|
return result;
|
|
8424
8423
|
}
|
|
@@ -8685,7 +8684,7 @@ let UserApplicationEntityResolver = class UserApplicationEntityResolver extends
|
|
|
8685
8684
|
}
|
|
8686
8685
|
async UserApplicationEntity(ID, { dataSource, userPayload }, pubSub) {
|
|
8687
8686
|
this.CheckUserReadPermissions('User Application Entities', userPayload);
|
|
8688
|
-
const sSQL = `SELECT * FROM [${
|
|
8687
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserApplicationEntities] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8689
8688
|
const result = this.MapFieldNamesToCodeNames('User Application Entities', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
8690
8689
|
return result;
|
|
8691
8690
|
}
|
|
@@ -8933,13 +8932,13 @@ let UserApplicationResolver = class UserApplicationResolver extends server_1.Res
|
|
|
8933
8932
|
}
|
|
8934
8933
|
async UserApplication(ID, { dataSource, userPayload }, pubSub) {
|
|
8935
8934
|
this.CheckUserReadPermissions('User Applications', userPayload);
|
|
8936
|
-
const sSQL = `SELECT * FROM [${
|
|
8935
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserApplications] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Applications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8937
8936
|
const result = this.MapFieldNamesToCodeNames('User Applications', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
8938
8937
|
return result;
|
|
8939
8938
|
}
|
|
8940
8939
|
async UserApplicationEntitiesArray(userapplication_, { dataSource, userPayload }, pubSub) {
|
|
8941
8940
|
this.CheckUserReadPermissions('User Application Entities', userPayload);
|
|
8942
|
-
const sSQL = `SELECT * FROM [${
|
|
8941
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserApplicationEntities] WHERE [UserApplicationID]=${userapplication_.ID} ` + this.getRowLevelSecurityWhereClause('User Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8943
8942
|
const result = this.ArrayMapFieldNamesToCodeNames('User Application Entities', await dataSource.query(sSQL));
|
|
8944
8943
|
return result;
|
|
8945
8944
|
}
|
|
@@ -9171,7 +9170,7 @@ let CompanyIntegrationRunAPILogResolver = class CompanyIntegrationRunAPILogResol
|
|
|
9171
9170
|
}
|
|
9172
9171
|
async CompanyIntegrationRunAPILog(ID, { dataSource, userPayload }, pubSub) {
|
|
9173
9172
|
this.CheckUserReadPermissions('Company Integration Run API Logs', userPayload);
|
|
9174
|
-
const sSQL = `SELECT * FROM [${
|
|
9173
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanyIntegrationRunAPILogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run API Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9175
9174
|
const result = this.MapFieldNamesToCodeNames('Company Integration Run API Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
9176
9175
|
return result;
|
|
9177
9176
|
}
|
|
@@ -9417,13 +9416,13 @@ let ListResolver = class ListResolver extends server_1.ResolverBase {
|
|
|
9417
9416
|
}
|
|
9418
9417
|
async List(ID, { dataSource, userPayload }, pubSub) {
|
|
9419
9418
|
this.CheckUserReadPermissions('Lists', userPayload);
|
|
9420
|
-
const sSQL = `SELECT * FROM [${
|
|
9419
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwLists] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Lists', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9421
9420
|
const result = this.MapFieldNamesToCodeNames('Lists', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
9422
9421
|
return result;
|
|
9423
9422
|
}
|
|
9424
9423
|
async ListDetailsArray(list_, { dataSource, userPayload }, pubSub) {
|
|
9425
9424
|
this.CheckUserReadPermissions('List Details', userPayload);
|
|
9426
|
-
const sSQL = `SELECT * FROM [${
|
|
9425
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwListDetails] WHERE [ListID]=${list_.ID} ` + this.getRowLevelSecurityWhereClause('List Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9427
9426
|
const result = this.ArrayMapFieldNamesToCodeNames('List Details', await dataSource.query(sSQL));
|
|
9428
9427
|
return result;
|
|
9429
9428
|
}
|
|
@@ -9677,7 +9676,7 @@ let ListDetailResolver = class ListDetailResolver extends server_1.ResolverBase
|
|
|
9677
9676
|
}
|
|
9678
9677
|
async ListDetail(ID, { dataSource, userPayload }, pubSub) {
|
|
9679
9678
|
this.CheckUserReadPermissions('List Details', userPayload);
|
|
9680
|
-
const sSQL = `SELECT * FROM [${
|
|
9679
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwListDetails] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('List Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9681
9680
|
const result = this.MapFieldNamesToCodeNames('List Details', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
9682
9681
|
return result;
|
|
9683
9682
|
}
|
|
@@ -9936,13 +9935,13 @@ let UserViewRunResolver = class UserViewRunResolver extends server_1.ResolverBas
|
|
|
9936
9935
|
}
|
|
9937
9936
|
async UserViewRun(ID, { dataSource, userPayload }, pubSub) {
|
|
9938
9937
|
this.CheckUserReadPermissions('User View Runs', userPayload);
|
|
9939
|
-
const sSQL = `SELECT * FROM [${
|
|
9938
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserViewRuns] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User View Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9940
9939
|
const result = this.MapFieldNamesToCodeNames('User View Runs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
9941
9940
|
return result;
|
|
9942
9941
|
}
|
|
9943
9942
|
async UserViewRunDetailsArray(userviewrun_, { dataSource, userPayload }, pubSub) {
|
|
9944
9943
|
this.CheckUserReadPermissions('User View Run Details', userPayload);
|
|
9945
|
-
const sSQL = `SELECT * FROM [${
|
|
9944
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserViewRunDetails] WHERE [UserViewRunID]=${userviewrun_.ID} ` + this.getRowLevelSecurityWhereClause('User View Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9946
9945
|
const result = this.ArrayMapFieldNamesToCodeNames('User View Run Details', await dataSource.query(sSQL));
|
|
9947
9946
|
return result;
|
|
9948
9947
|
}
|
|
@@ -10161,7 +10160,7 @@ let UserViewRunDetailResolver = class UserViewRunDetailResolver extends server_1
|
|
|
10161
10160
|
}
|
|
10162
10161
|
async UserViewRunDetail(ID, { dataSource, userPayload }, pubSub) {
|
|
10163
10162
|
this.CheckUserReadPermissions('User View Run Details', userPayload);
|
|
10164
|
-
const sSQL = `SELECT * FROM [${
|
|
10163
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserViewRunDetails] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User View Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10165
10164
|
const result = this.MapFieldNamesToCodeNames('User View Run Details', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
10166
10165
|
return result;
|
|
10167
10166
|
}
|
|
@@ -10395,7 +10394,7 @@ let WorkflowRunResolver = class WorkflowRunResolver extends server_1.ResolverBas
|
|
|
10395
10394
|
}
|
|
10396
10395
|
async WorkflowRun(ID, { dataSource, userPayload }, pubSub) {
|
|
10397
10396
|
this.CheckUserReadPermissions('Workflow Runs', userPayload);
|
|
10398
|
-
const sSQL = `SELECT * FROM [${
|
|
10397
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwWorkflowRuns] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Workflow Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10399
10398
|
const result = this.MapFieldNamesToCodeNames('Workflow Runs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
10400
10399
|
return result;
|
|
10401
10400
|
}
|
|
@@ -10637,19 +10636,19 @@ let WorkflowResolver = class WorkflowResolver extends server_1.ResolverBase {
|
|
|
10637
10636
|
}
|
|
10638
10637
|
async Workflow(ID, { dataSource, userPayload }, pubSub) {
|
|
10639
10638
|
this.CheckUserReadPermissions('Workflows', userPayload);
|
|
10640
|
-
const sSQL = `SELECT * FROM [${
|
|
10639
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwWorkflows] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Workflows', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10641
10640
|
const result = this.MapFieldNamesToCodeNames('Workflows', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
10642
10641
|
return result;
|
|
10643
10642
|
}
|
|
10644
10643
|
async ReportsArray(workflow_, { dataSource, userPayload }, pubSub) {
|
|
10645
10644
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
10646
|
-
const sSQL = `SELECT * FROM [${
|
|
10645
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwReports] WHERE [OutputWorkflowID]=${workflow_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10647
10646
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
10648
10647
|
return result;
|
|
10649
10648
|
}
|
|
10650
10649
|
async WorkflowRunsArray(workflow_, { dataSource, userPayload }, pubSub) {
|
|
10651
10650
|
this.CheckUserReadPermissions('Workflow Runs', userPayload);
|
|
10652
|
-
const sSQL = `SELECT * FROM [${
|
|
10651
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwWorkflowRuns] WHERE [WorkflowName]=${workflow_.ID} ` + this.getRowLevelSecurityWhereClause('Workflow Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10653
10652
|
const result = this.ArrayMapFieldNamesToCodeNames('Workflow Runs', await dataSource.query(sSQL));
|
|
10654
10653
|
return result;
|
|
10655
10654
|
}
|
|
@@ -10858,13 +10857,13 @@ let WorkflowEngineResolver = class WorkflowEngineResolver extends server_1.Resol
|
|
|
10858
10857
|
}
|
|
10859
10858
|
async WorkflowEngine(ID, { dataSource, userPayload }, pubSub) {
|
|
10860
10859
|
this.CheckUserReadPermissions('Workflow Engines', userPayload);
|
|
10861
|
-
const sSQL = `SELECT * FROM [${
|
|
10860
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwWorkflowEngines] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Workflow Engines', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10862
10861
|
const result = this.MapFieldNamesToCodeNames('Workflow Engines', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
10863
10862
|
return result;
|
|
10864
10863
|
}
|
|
10865
10864
|
async WorkflowsArray(workflowengine_, { dataSource, userPayload }, pubSub) {
|
|
10866
10865
|
this.CheckUserReadPermissions('Workflows', userPayload);
|
|
10867
|
-
const sSQL = `SELECT * FROM [${
|
|
10866
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwWorkflows] WHERE [WorkflowEngineName]=${workflowengine_.ID} ` + this.getRowLevelSecurityWhereClause('Workflows', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10868
10867
|
const result = this.ArrayMapFieldNamesToCodeNames('Workflows', await dataSource.query(sSQL));
|
|
10869
10868
|
return result;
|
|
10870
10869
|
}
|
|
@@ -11096,7 +11095,7 @@ let RecordChangeResolver = class RecordChangeResolver extends server_1.ResolverB
|
|
|
11096
11095
|
}
|
|
11097
11096
|
async RecordChange(ID, { dataSource, userPayload }, pubSub) {
|
|
11098
11097
|
this.CheckUserReadPermissions('Record Changes', userPayload);
|
|
11099
|
-
const sSQL = `SELECT * FROM [${
|
|
11098
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwRecordChanges] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Record Changes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11100
11099
|
const result = this.MapFieldNamesToCodeNames('Record Changes', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
11101
11100
|
return result;
|
|
11102
11101
|
}
|
|
@@ -11265,13 +11264,13 @@ let UserRoleResolver = class UserRoleResolver extends server_1.ResolverBase {
|
|
|
11265
11264
|
}
|
|
11266
11265
|
async UserRole(ID, { dataSource, userPayload }, pubSub) {
|
|
11267
11266
|
this.CheckUserReadPermissions('User Roles', userPayload);
|
|
11268
|
-
const sSQL = `SELECT * FROM [${
|
|
11267
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserRoles] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11269
11268
|
const result = this.MapFieldNamesToCodeNames('User Roles', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
11270
11269
|
return result;
|
|
11271
11270
|
}
|
|
11272
11271
|
async AllUserRoles({ dataSource, userPayload }, pubSub) {
|
|
11273
11272
|
this.CheckUserReadPermissions('User Roles', userPayload);
|
|
11274
|
-
const sSQL = `SELECT * FROM [${
|
|
11273
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserRoles]` + this.getRowLevelSecurityWhereClause('User Roles', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
11275
11274
|
const result = this.ArrayMapFieldNamesToCodeNames('User Roles', await dataSource.query(sSQL));
|
|
11276
11275
|
return result;
|
|
11277
11276
|
}
|
|
@@ -11468,19 +11467,19 @@ let RowLevelSecurityFilterResolver = class RowLevelSecurityFilterResolver extend
|
|
|
11468
11467
|
}
|
|
11469
11468
|
async RowLevelSecurityFilter(ID, { dataSource, userPayload }, pubSub) {
|
|
11470
11469
|
this.CheckUserReadPermissions('Row Level Security Filters', userPayload);
|
|
11471
|
-
const sSQL = `SELECT * FROM [${
|
|
11470
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwRowLevelSecurityFilters] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Row Level Security Filters', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11472
11471
|
const result = this.MapFieldNamesToCodeNames('Row Level Security Filters', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
11473
11472
|
return result;
|
|
11474
11473
|
}
|
|
11475
11474
|
async AllRowLevelSecurityFilters({ dataSource, userPayload }, pubSub) {
|
|
11476
11475
|
this.CheckUserReadPermissions('Row Level Security Filters', userPayload);
|
|
11477
|
-
const sSQL = `SELECT * FROM [${
|
|
11476
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwRowLevelSecurityFilters]` + this.getRowLevelSecurityWhereClause('Row Level Security Filters', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
11478
11477
|
const result = this.ArrayMapFieldNamesToCodeNames('Row Level Security Filters', await dataSource.query(sSQL));
|
|
11479
11478
|
return result;
|
|
11480
11479
|
}
|
|
11481
11480
|
async EntityPermissionsArray(rowlevelsecurityfilter_, { dataSource, userPayload }, pubSub) {
|
|
11482
11481
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
11483
|
-
const sSQL = `SELECT * FROM [${
|
|
11482
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityPermissions] WHERE [ReadRLSFilterID]=${rowlevelsecurityfilter_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11484
11483
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL));
|
|
11485
11484
|
return result;
|
|
11486
11485
|
}
|
|
@@ -11735,7 +11734,7 @@ let AuditLogResolver = class AuditLogResolver extends server_1.ResolverBase {
|
|
|
11735
11734
|
}
|
|
11736
11735
|
async AuditLog(ID, { dataSource, userPayload }, pubSub) {
|
|
11737
11736
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
11738
|
-
const sSQL = `SELECT * FROM [${
|
|
11737
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuditLogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11739
11738
|
const result = this.MapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
11740
11739
|
return result;
|
|
11741
11740
|
}
|
|
@@ -11943,37 +11942,37 @@ let AuthorizationResolver = class AuthorizationResolver extends server_1.Resolve
|
|
|
11943
11942
|
}
|
|
11944
11943
|
async Authorization(ID, { dataSource, userPayload }, pubSub) {
|
|
11945
11944
|
this.CheckUserReadPermissions('Authorizations', userPayload);
|
|
11946
|
-
const sSQL = `SELECT * FROM [${
|
|
11945
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuthorizations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Authorizations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11947
11946
|
const result = this.MapFieldNamesToCodeNames('Authorizations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
11948
11947
|
return result;
|
|
11949
11948
|
}
|
|
11950
11949
|
async AllAuthorizations({ dataSource, userPayload }, pubSub) {
|
|
11951
11950
|
this.CheckUserReadPermissions('Authorizations', userPayload);
|
|
11952
|
-
const sSQL = `SELECT * FROM [${
|
|
11951
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuthorizations]` + this.getRowLevelSecurityWhereClause('Authorizations', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
11953
11952
|
const result = this.ArrayMapFieldNamesToCodeNames('Authorizations', await dataSource.query(sSQL));
|
|
11954
11953
|
return result;
|
|
11955
11954
|
}
|
|
11956
11955
|
async AuthorizationRolesArray(authorization_, { dataSource, userPayload }, pubSub) {
|
|
11957
11956
|
this.CheckUserReadPermissions('Authorization Roles', userPayload);
|
|
11958
|
-
const sSQL = `SELECT * FROM [${
|
|
11957
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuthorizationRoles] WHERE [AuthorizationID]=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Authorization Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11959
11958
|
const result = this.ArrayMapFieldNamesToCodeNames('Authorization Roles', await dataSource.query(sSQL));
|
|
11960
11959
|
return result;
|
|
11961
11960
|
}
|
|
11962
11961
|
async AuthorizationsArray(authorization_, { dataSource, userPayload }, pubSub) {
|
|
11963
11962
|
this.CheckUserReadPermissions('Authorizations', userPayload);
|
|
11964
|
-
const sSQL = `SELECT * FROM [${
|
|
11963
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuthorizations] WHERE [ParentID]=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Authorizations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11965
11964
|
const result = this.ArrayMapFieldNamesToCodeNames('Authorizations', await dataSource.query(sSQL));
|
|
11966
11965
|
return result;
|
|
11967
11966
|
}
|
|
11968
11967
|
async AuditLogTypesArray(authorization_, { dataSource, userPayload }, pubSub) {
|
|
11969
11968
|
this.CheckUserReadPermissions('Audit Log Types', userPayload);
|
|
11970
|
-
const sSQL = `SELECT * FROM [${
|
|
11969
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuditLogTypes] WHERE [AuthorizationName]=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Log Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11971
11970
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Log Types', await dataSource.query(sSQL));
|
|
11972
11971
|
return result;
|
|
11973
11972
|
}
|
|
11974
11973
|
async AuditLogsArray(authorization_, { dataSource, userPayload }, pubSub) {
|
|
11975
11974
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
11976
|
-
const sSQL = `SELECT * FROM [${
|
|
11975
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuditLogs] WHERE [AuthorizationName]=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11977
11976
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL));
|
|
11978
11977
|
return result;
|
|
11979
11978
|
}
|
|
@@ -12144,13 +12143,13 @@ let AuthorizationRoleResolver = class AuthorizationRoleResolver extends server_1
|
|
|
12144
12143
|
}
|
|
12145
12144
|
async AuthorizationRole(ID, { dataSource, userPayload }, pubSub) {
|
|
12146
12145
|
this.CheckUserReadPermissions('Authorization Roles', userPayload);
|
|
12147
|
-
const sSQL = `SELECT * FROM [${
|
|
12146
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuthorizationRoles] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Authorization Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12148
12147
|
const result = this.MapFieldNamesToCodeNames('Authorization Roles', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
12149
12148
|
return result;
|
|
12150
12149
|
}
|
|
12151
12150
|
async AllAuthorizationRoles({ dataSource, userPayload }, pubSub) {
|
|
12152
12151
|
this.CheckUserReadPermissions('Authorization Roles', userPayload);
|
|
12153
|
-
const sSQL = `SELECT * FROM [${
|
|
12152
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuthorizationRoles]` + this.getRowLevelSecurityWhereClause('Authorization Roles', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12154
12153
|
const result = this.ArrayMapFieldNamesToCodeNames('Authorization Roles', await dataSource.query(sSQL));
|
|
12155
12154
|
return result;
|
|
12156
12155
|
}
|
|
@@ -12301,25 +12300,25 @@ let AuditLogTypeResolver = class AuditLogTypeResolver extends server_1.ResolverB
|
|
|
12301
12300
|
}
|
|
12302
12301
|
async AuditLogType(ID, { dataSource, userPayload }, pubSub) {
|
|
12303
12302
|
this.CheckUserReadPermissions('Audit Log Types', userPayload);
|
|
12304
|
-
const sSQL = `SELECT * FROM [${
|
|
12303
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuditLogTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Audit Log Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12305
12304
|
const result = this.MapFieldNamesToCodeNames('Audit Log Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
12306
12305
|
return result;
|
|
12307
12306
|
}
|
|
12308
12307
|
async AllAuditLogTypes({ dataSource, userPayload }, pubSub) {
|
|
12309
12308
|
this.CheckUserReadPermissions('Audit Log Types', userPayload);
|
|
12310
|
-
const sSQL = `SELECT * FROM [${
|
|
12309
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuditLogTypes]` + this.getRowLevelSecurityWhereClause('Audit Log Types', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12311
12310
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Log Types', await dataSource.query(sSQL));
|
|
12312
12311
|
return result;
|
|
12313
12312
|
}
|
|
12314
12313
|
async AuditLogsArray(auditlogtype_, { dataSource, userPayload }, pubSub) {
|
|
12315
12314
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
12316
|
-
const sSQL = `SELECT * FROM [${
|
|
12315
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuditLogs] WHERE [AuditLogTypeName]=${auditlogtype_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12317
12316
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL));
|
|
12318
12317
|
return result;
|
|
12319
12318
|
}
|
|
12320
12319
|
async AuditLogTypesArray(auditlogtype_, { dataSource, userPayload }, pubSub) {
|
|
12321
12320
|
this.CheckUserReadPermissions('Audit Log Types', userPayload);
|
|
12322
|
-
const sSQL = `SELECT * FROM [${
|
|
12321
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuditLogTypes] WHERE [ParentID]=${auditlogtype_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Log Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12323
12322
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Log Types', await dataSource.query(sSQL));
|
|
12324
12323
|
return result;
|
|
12325
12324
|
}
|
|
@@ -12494,13 +12493,13 @@ let EntityFieldValueResolver = class EntityFieldValueResolver extends server_1.R
|
|
|
12494
12493
|
}
|
|
12495
12494
|
async EntityFieldValue(ID, { dataSource, userPayload }, pubSub) {
|
|
12496
12495
|
this.CheckUserReadPermissions('Entity Field Values', userPayload);
|
|
12497
|
-
const sSQL = `SELECT * FROM [${
|
|
12496
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityFieldValues] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Field Values', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12498
12497
|
const result = this.MapFieldNamesToCodeNames('Entity Field Values', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
12499
12498
|
return result;
|
|
12500
12499
|
}
|
|
12501
12500
|
async AllEntityFieldValues({ dataSource, userPayload }, pubSub) {
|
|
12502
12501
|
this.CheckUserReadPermissions('Entity Field Values', userPayload);
|
|
12503
|
-
const sSQL = `SELECT * FROM [${
|
|
12502
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityFieldValues]` + this.getRowLevelSecurityWhereClause('Entity Field Values', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12504
12503
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Field Values', await dataSource.query(sSQL));
|
|
12505
12504
|
return result;
|
|
12506
12505
|
}
|
|
@@ -12706,37 +12705,37 @@ let AIModelResolver = class AIModelResolver extends server_1.ResolverBase {
|
|
|
12706
12705
|
}
|
|
12707
12706
|
async AIModel(ID, { dataSource, userPayload }, pubSub) {
|
|
12708
12707
|
this.CheckUserReadPermissions('AI Models', userPayload);
|
|
12709
|
-
const sSQL = `SELECT * FROM [${
|
|
12708
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAIModels] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('AI Models', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12710
12709
|
const result = this.MapFieldNamesToCodeNames('AI Models', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
12711
12710
|
return result;
|
|
12712
12711
|
}
|
|
12713
12712
|
async AllAIModels({ dataSource, userPayload }, pubSub) {
|
|
12714
12713
|
this.CheckUserReadPermissions('AI Models', userPayload);
|
|
12715
|
-
const sSQL = `SELECT * FROM [${
|
|
12714
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAIModels]` + this.getRowLevelSecurityWhereClause('AI Models', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12716
12715
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Models', await dataSource.query(sSQL));
|
|
12717
12716
|
return result;
|
|
12718
12717
|
}
|
|
12719
12718
|
async AIActionsArray(aimodel_, { dataSource, userPayload }, pubSub) {
|
|
12720
12719
|
this.CheckUserReadPermissions('AI Actions', userPayload);
|
|
12721
|
-
const sSQL = `SELECT * FROM [${
|
|
12720
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAIActions] WHERE [DefaultModelID]=${aimodel_.ID} ` + this.getRowLevelSecurityWhereClause('AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12722
12721
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Actions', await dataSource.query(sSQL));
|
|
12723
12722
|
return result;
|
|
12724
12723
|
}
|
|
12725
12724
|
async AIModelActionsArray(aimodel_, { dataSource, userPayload }, pubSub) {
|
|
12726
12725
|
this.CheckUserReadPermissions('AI Model Actions', userPayload);
|
|
12727
|
-
const sSQL = `SELECT * FROM [${
|
|
12726
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAIModelActions] WHERE [AIModelID]=${aimodel_.ID} ` + this.getRowLevelSecurityWhereClause('AI Model Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12728
12727
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Model Actions', await dataSource.query(sSQL));
|
|
12729
12728
|
return result;
|
|
12730
12729
|
}
|
|
12731
12730
|
async EntityAIActionsArray(aimodel_, { dataSource, userPayload }, pubSub) {
|
|
12732
12731
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
12733
|
-
const sSQL = `SELECT * FROM [${
|
|
12732
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityAIActions] WHERE [AIModelID]=${aimodel_.ID} ` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12734
12733
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL));
|
|
12735
12734
|
return result;
|
|
12736
12735
|
}
|
|
12737
12736
|
async VectorIndexesArray(aimodel_, { dataSource, userPayload }, pubSub) {
|
|
12738
12737
|
this.CheckUserReadPermissions('Vector Indexes', userPayload);
|
|
12739
|
-
const sSQL = `SELECT * FROM [${
|
|
12738
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwVectorIndexes] WHERE [EmbeddingModelID]=${aimodel_.ID} ` + this.getRowLevelSecurityWhereClause('Vector Indexes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12740
12739
|
const result = this.ArrayMapFieldNamesToCodeNames('Vector Indexes', await dataSource.query(sSQL));
|
|
12741
12740
|
return result;
|
|
12742
12741
|
}
|
|
@@ -12986,25 +12985,25 @@ let AIActionResolver = class AIActionResolver extends server_1.ResolverBase {
|
|
|
12986
12985
|
}
|
|
12987
12986
|
async AIAction(ID, { dataSource, userPayload }, pubSub) {
|
|
12988
12987
|
this.CheckUserReadPermissions('AI Actions', userPayload);
|
|
12989
|
-
const sSQL = `SELECT * FROM [${
|
|
12988
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAIActions] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12990
12989
|
const result = this.MapFieldNamesToCodeNames('AI Actions', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
12991
12990
|
return result;
|
|
12992
12991
|
}
|
|
12993
12992
|
async AllAIActions({ dataSource, userPayload }, pubSub) {
|
|
12994
12993
|
this.CheckUserReadPermissions('AI Actions', userPayload);
|
|
12995
|
-
const sSQL = `SELECT * FROM [${
|
|
12994
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAIActions]` + this.getRowLevelSecurityWhereClause('AI Actions', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12996
12995
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Actions', await dataSource.query(sSQL));
|
|
12997
12996
|
return result;
|
|
12998
12997
|
}
|
|
12999
12998
|
async AIModelActionsArray(aiaction_, { dataSource, userPayload }, pubSub) {
|
|
13000
12999
|
this.CheckUserReadPermissions('AI Model Actions', userPayload);
|
|
13001
|
-
const sSQL = `SELECT * FROM [${
|
|
13000
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAIModelActions] WHERE [AIActionID]=${aiaction_.ID} ` + this.getRowLevelSecurityWhereClause('AI Model Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13002
13001
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Model Actions', await dataSource.query(sSQL));
|
|
13003
13002
|
return result;
|
|
13004
13003
|
}
|
|
13005
13004
|
async EntityAIActionsArray(aiaction_, { dataSource, userPayload }, pubSub) {
|
|
13006
13005
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
13007
|
-
const sSQL = `SELECT * FROM [${
|
|
13006
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityAIActions] WHERE [AIActionID]=${aiaction_.ID} ` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13008
13007
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL));
|
|
13009
13008
|
return result;
|
|
13010
13009
|
}
|
|
@@ -13216,13 +13215,13 @@ let AIModelActionResolver = class AIModelActionResolver extends server_1.Resolve
|
|
|
13216
13215
|
}
|
|
13217
13216
|
async AIModelAction(ID, { dataSource, userPayload }, pubSub) {
|
|
13218
13217
|
this.CheckUserReadPermissions('AI Model Actions', userPayload);
|
|
13219
|
-
const sSQL = `SELECT * FROM [${
|
|
13218
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAIModelActions] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('AI Model Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13220
13219
|
const result = this.MapFieldNamesToCodeNames('AI Model Actions', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
13221
13220
|
return result;
|
|
13222
13221
|
}
|
|
13223
13222
|
async AllAIModelActions({ dataSource, userPayload }, pubSub) {
|
|
13224
13223
|
this.CheckUserReadPermissions('AI Model Actions', userPayload);
|
|
13225
|
-
const sSQL = `SELECT * FROM [${
|
|
13224
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAIModelActions]` + this.getRowLevelSecurityWhereClause('AI Model Actions', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
13226
13225
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Model Actions', await dataSource.query(sSQL));
|
|
13227
13226
|
return result;
|
|
13228
13227
|
}
|
|
@@ -13492,13 +13491,13 @@ let EntityAIActionResolver = class EntityAIActionResolver extends server_1.Resol
|
|
|
13492
13491
|
}
|
|
13493
13492
|
async EntityAIAction(ID, { dataSource, userPayload }, pubSub) {
|
|
13494
13493
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
13495
|
-
const sSQL = `SELECT * FROM [${
|
|
13494
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityAIActions] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13496
13495
|
const result = this.MapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
13497
13496
|
return result;
|
|
13498
13497
|
}
|
|
13499
13498
|
async AllEntityAIActions({ dataSource, userPayload }, pubSub) {
|
|
13500
13499
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
13501
|
-
const sSQL = `SELECT * FROM [${
|
|
13500
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityAIActions]` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
13502
13501
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL));
|
|
13503
13502
|
return result;
|
|
13504
13503
|
}
|
|
@@ -13669,19 +13668,19 @@ let AIModelTypeResolver = class AIModelTypeResolver extends server_1.ResolverBas
|
|
|
13669
13668
|
}
|
|
13670
13669
|
async AIModelType(ID, { dataSource, userPayload }, pubSub) {
|
|
13671
13670
|
this.CheckUserReadPermissions('AI Model Types', userPayload);
|
|
13672
|
-
const sSQL = `SELECT * FROM [${
|
|
13671
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAIModelTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('AI Model Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13673
13672
|
const result = this.MapFieldNamesToCodeNames('AI Model Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
13674
13673
|
return result;
|
|
13675
13674
|
}
|
|
13676
13675
|
async AllAIModelTypes({ dataSource, userPayload }, pubSub) {
|
|
13677
13676
|
this.CheckUserReadPermissions('AI Model Types', userPayload);
|
|
13678
|
-
const sSQL = `SELECT * FROM [${
|
|
13677
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAIModelTypes]` + this.getRowLevelSecurityWhereClause('AI Model Types', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
13679
13678
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Model Types', await dataSource.query(sSQL));
|
|
13680
13679
|
return result;
|
|
13681
13680
|
}
|
|
13682
13681
|
async AIModelsArray(aimodeltype_, { dataSource, userPayload }, pubSub) {
|
|
13683
13682
|
this.CheckUserReadPermissions('AI Models', userPayload);
|
|
13684
|
-
const sSQL = `SELECT * FROM [${
|
|
13683
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAIModels] WHERE [AIModelTypeID]=${aimodeltype_.ID} ` + this.getRowLevelSecurityWhereClause('AI Models', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13685
13684
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Models', await dataSource.query(sSQL));
|
|
13686
13685
|
return result;
|
|
13687
13686
|
}
|
|
@@ -13857,13 +13856,13 @@ let QueueTypeResolver = class QueueTypeResolver extends server_1.ResolverBase {
|
|
|
13857
13856
|
}
|
|
13858
13857
|
async QueueType(ID, { dataSource, userPayload }, pubSub) {
|
|
13859
13858
|
this.CheckUserReadPermissions('Queue Types', userPayload);
|
|
13860
|
-
const sSQL = `SELECT * FROM [${
|
|
13859
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwQueueTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Queue Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13861
13860
|
const result = this.MapFieldNamesToCodeNames('Queue Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
13862
13861
|
return result;
|
|
13863
13862
|
}
|
|
13864
13863
|
async QueuesArray(queuetype_, { dataSource, userPayload }, pubSub) {
|
|
13865
13864
|
this.CheckUserReadPermissions('Queues', userPayload);
|
|
13866
|
-
const sSQL = `SELECT * FROM [${
|
|
13865
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwQueues] WHERE [QueueTypeID]=${queuetype_.ID} ` + this.getRowLevelSecurityWhereClause('Queues', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13867
13866
|
const result = this.ArrayMapFieldNamesToCodeNames('Queues', await dataSource.query(sSQL));
|
|
13868
13867
|
return result;
|
|
13869
13868
|
}
|
|
@@ -14213,13 +14212,13 @@ let QueueResolver = class QueueResolver extends server_1.ResolverBase {
|
|
|
14213
14212
|
}
|
|
14214
14213
|
async Queue(ID, { dataSource, userPayload }, pubSub) {
|
|
14215
14214
|
this.CheckUserReadPermissions('Queues', userPayload);
|
|
14216
|
-
const sSQL = `SELECT * FROM [${
|
|
14215
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwQueues] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Queues', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14217
14216
|
const result = this.MapFieldNamesToCodeNames('Queues', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
14218
14217
|
return result;
|
|
14219
14218
|
}
|
|
14220
14219
|
async QueueTasksArray(queue_, { dataSource, userPayload }, pubSub) {
|
|
14221
14220
|
this.CheckUserReadPermissions('Queue Tasks', userPayload);
|
|
14222
|
-
const sSQL = `SELECT * FROM [${
|
|
14221
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwQueueTasks] WHERE [QueueID]=${queue_.ID} ` + this.getRowLevelSecurityWhereClause('Queue Tasks', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14223
14222
|
const result = this.ArrayMapFieldNamesToCodeNames('Queue Tasks', await dataSource.query(sSQL));
|
|
14224
14223
|
return result;
|
|
14225
14224
|
}
|
|
@@ -14516,7 +14515,7 @@ let QueueTaskResolver = class QueueTaskResolver extends server_1.ResolverBase {
|
|
|
14516
14515
|
}
|
|
14517
14516
|
async QueueTask(ID, { dataSource, userPayload }, pubSub) {
|
|
14518
14517
|
this.CheckUserReadPermissions('Queue Tasks', userPayload);
|
|
14519
|
-
const sSQL = `SELECT * FROM [${
|
|
14518
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwQueueTasks] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Queue Tasks', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14520
14519
|
const result = this.MapFieldNamesToCodeNames('Queue Tasks', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
14521
14520
|
return result;
|
|
14522
14521
|
}
|
|
@@ -14764,7 +14763,7 @@ let DashboardResolver = class DashboardResolver extends server_1.ResolverBase {
|
|
|
14764
14763
|
}
|
|
14765
14764
|
async Dashboard(ID, { dataSource, userPayload }, pubSub) {
|
|
14766
14765
|
this.CheckUserReadPermissions('Dashboards', userPayload);
|
|
14767
|
-
const sSQL = `SELECT * FROM [${
|
|
14766
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDashboards] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Dashboards', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14768
14767
|
this.createRecordAccessAuditLogRecord(userPayload, 'Dashboards', ID);
|
|
14769
14768
|
const result = this.MapFieldNamesToCodeNames('Dashboards', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
14770
14769
|
return result;
|
|
@@ -14970,14 +14969,14 @@ let OutputTriggerTypeResolver = class OutputTriggerTypeResolver extends server_1
|
|
|
14970
14969
|
}
|
|
14971
14970
|
async OutputTriggerType(ID, { dataSource, userPayload }, pubSub) {
|
|
14972
14971
|
this.CheckUserReadPermissions('Output Trigger Types', userPayload);
|
|
14973
|
-
const sSQL = `SELECT * FROM [${
|
|
14972
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwOutputTriggerTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Output Trigger Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14974
14973
|
this.createRecordAccessAuditLogRecord(userPayload, 'Output Trigger Types', ID);
|
|
14975
14974
|
const result = this.MapFieldNamesToCodeNames('Output Trigger Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
14976
14975
|
return result;
|
|
14977
14976
|
}
|
|
14978
14977
|
async ReportsArray(outputtriggertype_, { dataSource, userPayload }, pubSub) {
|
|
14979
14978
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
14980
|
-
const sSQL = `SELECT * FROM [${
|
|
14979
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwReports] WHERE [OutputTriggerTypeID]=${outputtriggertype_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14981
14980
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
14982
14981
|
return result;
|
|
14983
14982
|
}
|
|
@@ -15105,14 +15104,14 @@ let OutputFormatTypeResolver = class OutputFormatTypeResolver extends server_1.R
|
|
|
15105
15104
|
}
|
|
15106
15105
|
async OutputFormatType(ID, { dataSource, userPayload }, pubSub) {
|
|
15107
15106
|
this.CheckUserReadPermissions('Output Format Types', userPayload);
|
|
15108
|
-
const sSQL = `SELECT * FROM [${
|
|
15107
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwOutputFormatTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Output Format Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15109
15108
|
this.createRecordAccessAuditLogRecord(userPayload, 'Output Format Types', ID);
|
|
15110
15109
|
const result = this.MapFieldNamesToCodeNames('Output Format Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
15111
15110
|
return result;
|
|
15112
15111
|
}
|
|
15113
15112
|
async ReportsArray(outputformattype_, { dataSource, userPayload }, pubSub) {
|
|
15114
15113
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
15115
|
-
const sSQL = `SELECT * FROM [${
|
|
15114
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwReports] WHERE [OutputFormatTypeID]=${outputformattype_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15116
15115
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
15117
15116
|
return result;
|
|
15118
15117
|
}
|
|
@@ -15236,14 +15235,14 @@ let OutputDeliveryTypeResolver = class OutputDeliveryTypeResolver extends server
|
|
|
15236
15235
|
}
|
|
15237
15236
|
async OutputDeliveryType(ID, { dataSource, userPayload }, pubSub) {
|
|
15238
15237
|
this.CheckUserReadPermissions('Output Delivery Types', userPayload);
|
|
15239
|
-
const sSQL = `SELECT * FROM [${
|
|
15238
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwOutputDeliveryTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Output Delivery Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15240
15239
|
this.createRecordAccessAuditLogRecord(userPayload, 'Output Delivery Types', ID);
|
|
15241
15240
|
const result = this.MapFieldNamesToCodeNames('Output Delivery Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
15242
15241
|
return result;
|
|
15243
15242
|
}
|
|
15244
15243
|
async ReportsArray(outputdeliverytype_, { dataSource, userPayload }, pubSub) {
|
|
15245
15244
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
15246
|
-
const sSQL = `SELECT * FROM [${
|
|
15245
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwReports] WHERE [OutputDeliveryTypeID]=${outputdeliverytype_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15247
15246
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
15248
15247
|
return result;
|
|
15249
15248
|
}
|
|
@@ -15620,13 +15619,13 @@ let ReportResolver = class ReportResolver extends server_1.ResolverBase {
|
|
|
15620
15619
|
}
|
|
15621
15620
|
async Report(ID, { dataSource, userPayload }, pubSub) {
|
|
15622
15621
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
15623
|
-
const sSQL = `SELECT * FROM [${
|
|
15622
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwReports] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15624
15623
|
const result = this.MapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
15625
15624
|
return result;
|
|
15626
15625
|
}
|
|
15627
15626
|
async ReportSnapshotsArray(report_, { dataSource, userPayload }, pubSub) {
|
|
15628
15627
|
this.CheckUserReadPermissions('Report Snapshots', userPayload);
|
|
15629
|
-
const sSQL = `SELECT * FROM [${
|
|
15628
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwReportSnapshots] WHERE [ReportID]=${report_.ID} ` + this.getRowLevelSecurityWhereClause('Report Snapshots', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15630
15629
|
const result = this.ArrayMapFieldNamesToCodeNames('Report Snapshots', await dataSource.query(sSQL));
|
|
15631
15630
|
return result;
|
|
15632
15631
|
}
|
|
@@ -15894,7 +15893,7 @@ let ReportSnapshotResolver = class ReportSnapshotResolver extends server_1.Resol
|
|
|
15894
15893
|
}
|
|
15895
15894
|
async ReportSnapshot(ID, { dataSource, userPayload }, pubSub) {
|
|
15896
15895
|
this.CheckUserReadPermissions('Report Snapshots', userPayload);
|
|
15897
|
-
const sSQL = `SELECT * FROM [${
|
|
15896
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwReportSnapshots] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Report Snapshots', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15898
15897
|
const result = this.MapFieldNamesToCodeNames('Report Snapshots', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
15899
15898
|
return result;
|
|
15900
15899
|
}
|
|
@@ -16128,14 +16127,14 @@ let ResourceTypeResolver = class ResourceTypeResolver extends server_1.ResolverB
|
|
|
16128
16127
|
}
|
|
16129
16128
|
async ResourceType(ID, { dataSource, userPayload }, pubSub) {
|
|
16130
16129
|
this.CheckUserReadPermissions('Resource Types', userPayload);
|
|
16131
|
-
const sSQL = `SELECT * FROM [${
|
|
16130
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwResourceTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Resource Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16132
16131
|
this.createRecordAccessAuditLogRecord(userPayload, 'Resource Types', ID);
|
|
16133
16132
|
const result = this.MapFieldNamesToCodeNames('Resource Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
16134
16133
|
return result;
|
|
16135
16134
|
}
|
|
16136
16135
|
async WorkspaceItemsArray(resourcetype_, { dataSource, userPayload }, pubSub) {
|
|
16137
16136
|
this.CheckUserReadPermissions('Workspace Items', userPayload);
|
|
16138
|
-
const sSQL = `SELECT * FROM [${
|
|
16137
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwWorkspaceItems] WHERE [ResourceTypeID]=${resourcetype_.ID} ` + this.getRowLevelSecurityWhereClause('Workspace Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16139
16138
|
const result = this.ArrayMapFieldNamesToCodeNames('Workspace Items', await dataSource.query(sSQL));
|
|
16140
16139
|
return result;
|
|
16141
16140
|
}
|
|
@@ -16277,20 +16276,20 @@ let TagResolver = class TagResolver extends server_1.ResolverBase {
|
|
|
16277
16276
|
}
|
|
16278
16277
|
async Tag(ID, { dataSource, userPayload }, pubSub) {
|
|
16279
16278
|
this.CheckUserReadPermissions('Tags', userPayload);
|
|
16280
|
-
const sSQL = `SELECT * FROM [${
|
|
16279
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwTags] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Tags', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16281
16280
|
this.createRecordAccessAuditLogRecord(userPayload, 'Tags', ID);
|
|
16282
16281
|
const result = this.MapFieldNamesToCodeNames('Tags', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
16283
16282
|
return result;
|
|
16284
16283
|
}
|
|
16285
16284
|
async TagsArray(tag_, { dataSource, userPayload }, pubSub) {
|
|
16286
16285
|
this.CheckUserReadPermissions('Tags', userPayload);
|
|
16287
|
-
const sSQL = `SELECT * FROM [${
|
|
16286
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwTags] WHERE [ParentID]=${tag_.ID} ` + this.getRowLevelSecurityWhereClause('Tags', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16288
16287
|
const result = this.ArrayMapFieldNamesToCodeNames('Tags', await dataSource.query(sSQL));
|
|
16289
16288
|
return result;
|
|
16290
16289
|
}
|
|
16291
16290
|
async TaggedItemsArray(tag_, { dataSource, userPayload }, pubSub) {
|
|
16292
16291
|
this.CheckUserReadPermissions('Tagged Items', userPayload);
|
|
16293
|
-
const sSQL = `SELECT * FROM [${
|
|
16292
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwTaggedItems] WHERE [TagID]=${tag_.ID} ` + this.getRowLevelSecurityWhereClause('Tagged Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16294
16293
|
const result = this.ArrayMapFieldNamesToCodeNames('Tagged Items', await dataSource.query(sSQL));
|
|
16295
16294
|
return result;
|
|
16296
16295
|
}
|
|
@@ -16433,7 +16432,7 @@ let TaggedItemResolver = class TaggedItemResolver extends server_1.ResolverBase
|
|
|
16433
16432
|
}
|
|
16434
16433
|
async TaggedItem(ID, { dataSource, userPayload }, pubSub) {
|
|
16435
16434
|
this.CheckUserReadPermissions('Tagged Items', userPayload);
|
|
16436
|
-
const sSQL = `SELECT * FROM [${
|
|
16435
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwTaggedItems] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Tagged Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16437
16436
|
this.createRecordAccessAuditLogRecord(userPayload, 'Tagged Items', ID);
|
|
16438
16437
|
const result = this.MapFieldNamesToCodeNames('Tagged Items', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
16439
16438
|
return result;
|
|
@@ -16598,14 +16597,14 @@ let WorkspaceResolver = class WorkspaceResolver extends server_1.ResolverBase {
|
|
|
16598
16597
|
}
|
|
16599
16598
|
async Workspace(ID, { dataSource, userPayload }, pubSub) {
|
|
16600
16599
|
this.CheckUserReadPermissions('Workspaces', userPayload);
|
|
16601
|
-
const sSQL = `SELECT * FROM [${
|
|
16600
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwWorkspaces] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Workspaces', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16602
16601
|
this.createRecordAccessAuditLogRecord(userPayload, 'Workspaces', ID);
|
|
16603
16602
|
const result = this.MapFieldNamesToCodeNames('Workspaces', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
16604
16603
|
return result;
|
|
16605
16604
|
}
|
|
16606
16605
|
async WorkspaceItemsArray(workspace_, { dataSource, userPayload }, pubSub) {
|
|
16607
16606
|
this.CheckUserReadPermissions('Workspace Items', userPayload);
|
|
16608
|
-
const sSQL = `SELECT * FROM [${
|
|
16607
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwWorkspaceItems] WHERE [WorkSpaceID]=${workspace_.ID} ` + this.getRowLevelSecurityWhereClause('Workspace Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16609
16608
|
const result = this.ArrayMapFieldNamesToCodeNames('Workspace Items', await dataSource.query(sSQL));
|
|
16610
16609
|
return result;
|
|
16611
16610
|
}
|
|
@@ -16918,7 +16917,7 @@ let WorkspaceItemResolver = class WorkspaceItemResolver extends server_1.Resolve
|
|
|
16918
16917
|
}
|
|
16919
16918
|
async WorkspaceItem(ID, { dataSource, userPayload }, pubSub) {
|
|
16920
16919
|
this.CheckUserReadPermissions('Workspace Items', userPayload);
|
|
16921
|
-
const sSQL = `SELECT * FROM [${
|
|
16920
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwWorkspaceItems] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Workspace Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16922
16921
|
this.createRecordAccessAuditLogRecord(userPayload, 'Workspace Items', ID);
|
|
16923
16922
|
const result = this.MapFieldNamesToCodeNames('Workspace Items', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
16924
16923
|
return result;
|
|
@@ -17134,13 +17133,13 @@ let DatasetResolver = class DatasetResolver extends server_1.ResolverBase {
|
|
|
17134
17133
|
}
|
|
17135
17134
|
async Dataset(ID, { dataSource, userPayload }, pubSub) {
|
|
17136
17135
|
this.CheckUserReadPermissions('Datasets', userPayload);
|
|
17137
|
-
const sSQL = `SELECT * FROM [${
|
|
17136
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDatasets] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Datasets', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17138
17137
|
const result = this.MapFieldNamesToCodeNames('Datasets', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
17139
17138
|
return result;
|
|
17140
17139
|
}
|
|
17141
17140
|
async DatasetItemsArray(dataset_, { dataSource, userPayload }, pubSub) {
|
|
17142
17141
|
this.CheckUserReadPermissions('Dataset Items', userPayload);
|
|
17143
|
-
const sSQL = `SELECT * FROM [${
|
|
17142
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDatasetItems] WHERE [DatasetName]=${dataset_.ID} ` + this.getRowLevelSecurityWhereClause('Dataset Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17144
17143
|
const result = this.ArrayMapFieldNamesToCodeNames('Dataset Items', await dataSource.query(sSQL));
|
|
17145
17144
|
return result;
|
|
17146
17145
|
}
|
|
@@ -17297,7 +17296,7 @@ let DatasetItemResolver = class DatasetItemResolver extends server_1.ResolverBas
|
|
|
17297
17296
|
}
|
|
17298
17297
|
async DatasetItem(ID, { dataSource, userPayload }, pubSub) {
|
|
17299
17298
|
this.CheckUserReadPermissions('Dataset Items', userPayload);
|
|
17300
|
-
const sSQL = `SELECT * FROM [${
|
|
17299
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDatasetItems] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Dataset Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17301
17300
|
const result = this.MapFieldNamesToCodeNames('Dataset Items', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
17302
17301
|
return result;
|
|
17303
17302
|
}
|
|
@@ -17508,13 +17507,13 @@ let ConversationDetailResolver = class ConversationDetailResolver extends server
|
|
|
17508
17507
|
}
|
|
17509
17508
|
async ConversationDetail(ID, { dataSource, userPayload }, pubSub) {
|
|
17510
17509
|
this.CheckUserReadPermissions('Conversation Details', userPayload);
|
|
17511
|
-
const sSQL = `SELECT * FROM [${
|
|
17510
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwConversationDetails] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Conversation Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17512
17511
|
const result = this.MapFieldNamesToCodeNames('Conversation Details', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
17513
17512
|
return result;
|
|
17514
17513
|
}
|
|
17515
17514
|
async ReportsArray(conversationdetail_, { dataSource, userPayload }, pubSub) {
|
|
17516
17515
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
17517
|
-
const sSQL = `SELECT * FROM [${
|
|
17516
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwReports] WHERE [ConversationDetailID]=${conversationdetail_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17518
17517
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
17519
17518
|
return result;
|
|
17520
17519
|
}
|
|
@@ -17870,19 +17869,19 @@ let ConversationResolver = class ConversationResolver extends server_1.ResolverB
|
|
|
17870
17869
|
}
|
|
17871
17870
|
async Conversation(ID, { dataSource, userPayload }, pubSub) {
|
|
17872
17871
|
this.CheckUserReadPermissions('Conversations', userPayload);
|
|
17873
|
-
const sSQL = `SELECT * FROM [${
|
|
17872
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwConversations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Conversations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17874
17873
|
const result = this.MapFieldNamesToCodeNames('Conversations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
17875
17874
|
return result;
|
|
17876
17875
|
}
|
|
17877
17876
|
async ConversationDetailsArray(conversation_, { dataSource, userPayload }, pubSub) {
|
|
17878
17877
|
this.CheckUserReadPermissions('Conversation Details', userPayload);
|
|
17879
|
-
const sSQL = `SELECT * FROM [${
|
|
17878
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwConversationDetails] WHERE [ConversationID]=${conversation_.ID} ` + this.getRowLevelSecurityWhereClause('Conversation Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17880
17879
|
const result = this.ArrayMapFieldNamesToCodeNames('Conversation Details', await dataSource.query(sSQL));
|
|
17881
17880
|
return result;
|
|
17882
17881
|
}
|
|
17883
17882
|
async ReportsArray(conversation_, { dataSource, userPayload }, pubSub) {
|
|
17884
17883
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
17885
|
-
const sSQL = `SELECT * FROM [${
|
|
17884
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwReports] WHERE [ConversationID]=${conversation_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17886
17885
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
17887
17886
|
return result;
|
|
17888
17887
|
}
|
|
@@ -18221,7 +18220,7 @@ let UserNotificationResolver = class UserNotificationResolver extends server_1.R
|
|
|
18221
18220
|
}
|
|
18222
18221
|
async UserNotification(ID, { dataSource, userPayload }, pubSub) {
|
|
18223
18222
|
this.CheckUserReadPermissions('User Notifications', userPayload);
|
|
18224
|
-
const sSQL = `SELECT * FROM [${
|
|
18223
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserNotifications] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Notifications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
18225
18224
|
const result = this.MapFieldNamesToCodeNames('User Notifications', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
18226
18225
|
return result;
|
|
18227
18226
|
}
|
|
@@ -18488,7 +18487,7 @@ let SchemaInfoResolver = class SchemaInfoResolver extends server_1.ResolverBase
|
|
|
18488
18487
|
}
|
|
18489
18488
|
async SchemaInfo(ID, { dataSource, userPayload }, pubSub) {
|
|
18490
18489
|
this.CheckUserReadPermissions('Schema Info', userPayload);
|
|
18491
|
-
const sSQL = `SELECT * FROM [${
|
|
18490
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwSchemaInfos] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Schema Info', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
18492
18491
|
const result = this.MapFieldNamesToCodeNames('Schema Info', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
18493
18492
|
return result;
|
|
18494
18493
|
}
|
|
@@ -18730,7 +18729,7 @@ let CompanyIntegrationRecordMapResolver = class CompanyIntegrationRecordMapResol
|
|
|
18730
18729
|
}
|
|
18731
18730
|
async CompanyIntegrationRecordMap(ID, { dataSource, userPayload }, pubSub) {
|
|
18732
18731
|
this.CheckUserReadPermissions('Company Integration Record Maps', userPayload);
|
|
18733
|
-
const sSQL = `SELECT * FROM [${
|
|
18732
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanyIntegrationRecordMaps] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Record Maps', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
18734
18733
|
const result = this.MapFieldNamesToCodeNames('Company Integration Record Maps', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
18735
18734
|
return result;
|
|
18736
18735
|
}
|
|
@@ -19056,13 +19055,13 @@ let RecordMergeLogResolver = class RecordMergeLogResolver extends server_1.Resol
|
|
|
19056
19055
|
}
|
|
19057
19056
|
async RecordMergeLog(ID, { dataSource, userPayload }, pubSub) {
|
|
19058
19057
|
this.CheckUserReadPermissions('Record Merge Logs', userPayload);
|
|
19059
|
-
const sSQL = `SELECT * FROM [${
|
|
19058
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwRecordMergeLogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19060
19059
|
const result = this.MapFieldNamesToCodeNames('Record Merge Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
19061
19060
|
return result;
|
|
19062
19061
|
}
|
|
19063
19062
|
async RecordMergeDeletionLogsArray(recordmergelog_, { dataSource, userPayload }, pubSub) {
|
|
19064
19063
|
this.CheckUserReadPermissions('Record Merge Deletion Logs', userPayload);
|
|
19065
|
-
const sSQL = `SELECT * FROM [${
|
|
19064
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwRecordMergeDeletionLogs] WHERE [RecordMergeLogID]=${recordmergelog_.ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Deletion Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19066
19065
|
const result = this.ArrayMapFieldNamesToCodeNames('Record Merge Deletion Logs', await dataSource.query(sSQL));
|
|
19067
19066
|
return result;
|
|
19068
19067
|
}
|
|
@@ -19308,7 +19307,7 @@ let RecordMergeDeletionLogResolver = class RecordMergeDeletionLogResolver extend
|
|
|
19308
19307
|
}
|
|
19309
19308
|
async RecordMergeDeletionLog(ID, { dataSource, userPayload }, pubSub) {
|
|
19310
19309
|
this.CheckUserReadPermissions('Record Merge Deletion Logs', userPayload);
|
|
19311
|
-
const sSQL = `SELECT * FROM [${
|
|
19310
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwRecordMergeDeletionLogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Deletion Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19312
19311
|
const result = this.MapFieldNamesToCodeNames('Record Merge Deletion Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
19313
19312
|
return result;
|
|
19314
19313
|
}
|
|
@@ -19653,7 +19652,7 @@ let QueryFieldResolver = class QueryFieldResolver extends server_1.ResolverBase
|
|
|
19653
19652
|
}
|
|
19654
19653
|
async QueryField(ID, { dataSource, userPayload }, pubSub) {
|
|
19655
19654
|
this.CheckUserReadPermissions('Query Fields', userPayload);
|
|
19656
|
-
const sSQL = `SELECT * FROM [${
|
|
19655
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwQueryFields] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Query Fields', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19657
19656
|
const result = this.MapFieldNamesToCodeNames('Query Fields', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
19658
19657
|
return result;
|
|
19659
19658
|
}
|
|
@@ -19890,19 +19889,19 @@ let QueryCategoryResolver = class QueryCategoryResolver extends server_1.Resolve
|
|
|
19890
19889
|
}
|
|
19891
19890
|
async QueryCategory(ID, { dataSource, userPayload }, pubSub) {
|
|
19892
19891
|
this.CheckUserReadPermissions('Query Categories', userPayload);
|
|
19893
|
-
const sSQL = `SELECT * FROM [${
|
|
19892
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwQueryCategories] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Query Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19894
19893
|
const result = this.MapFieldNamesToCodeNames('Query Categories', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
19895
19894
|
return result;
|
|
19896
19895
|
}
|
|
19897
19896
|
async QueryCategoriesArray(querycategory_, { dataSource, userPayload }, pubSub) {
|
|
19898
19897
|
this.CheckUserReadPermissions('Query Categories', userPayload);
|
|
19899
|
-
const sSQL = `SELECT * FROM [${
|
|
19898
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwQueryCategories] WHERE [ParentID]=${querycategory_.ID} ` + this.getRowLevelSecurityWhereClause('Query Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19900
19899
|
const result = this.ArrayMapFieldNamesToCodeNames('Query Categories', await dataSource.query(sSQL));
|
|
19901
19900
|
return result;
|
|
19902
19901
|
}
|
|
19903
19902
|
async QueriesArray(querycategory_, { dataSource, userPayload }, pubSub) {
|
|
19904
19903
|
this.CheckUserReadPermissions('Queries', userPayload);
|
|
19905
|
-
const sSQL = `SELECT * FROM [${
|
|
19904
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwQueries] WHERE [CategoryID]=${querycategory_.ID} ` + this.getRowLevelSecurityWhereClause('Queries', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19906
19905
|
const result = this.ArrayMapFieldNamesToCodeNames('Queries', await dataSource.query(sSQL));
|
|
19907
19906
|
return result;
|
|
19908
19907
|
}
|
|
@@ -20253,25 +20252,25 @@ let QueryResolver = class QueryResolver extends server_1.ResolverBase {
|
|
|
20253
20252
|
}
|
|
20254
20253
|
async Query(ID, { dataSource, userPayload }, pubSub) {
|
|
20255
20254
|
this.CheckUserReadPermissions('Queries', userPayload);
|
|
20256
|
-
const sSQL = `SELECT * FROM [${
|
|
20255
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwQueries] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Queries', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
20257
20256
|
const result = this.MapFieldNamesToCodeNames('Queries', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
20258
20257
|
return result;
|
|
20259
20258
|
}
|
|
20260
20259
|
async QueryFieldsArray(query_, { dataSource, userPayload }, pubSub) {
|
|
20261
20260
|
this.CheckUserReadPermissions('Query Fields', userPayload);
|
|
20262
|
-
const sSQL = `SELECT * FROM [${
|
|
20261
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwQueryFields] WHERE [QueryID]=${query_.ID} ` + this.getRowLevelSecurityWhereClause('Query Fields', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
20263
20262
|
const result = this.ArrayMapFieldNamesToCodeNames('Query Fields', await dataSource.query(sSQL));
|
|
20264
20263
|
return result;
|
|
20265
20264
|
}
|
|
20266
20265
|
async QueryPermissionsArray(query_, { dataSource, userPayload }, pubSub) {
|
|
20267
20266
|
this.CheckUserReadPermissions('Query Permissions', userPayload);
|
|
20268
|
-
const sSQL = `SELECT * FROM [${
|
|
20267
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwQueryPermissions] WHERE [QueryID]=${query_.ID} ` + this.getRowLevelSecurityWhereClause('Query Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
20269
20268
|
const result = this.ArrayMapFieldNamesToCodeNames('Query Permissions', await dataSource.query(sSQL));
|
|
20270
20269
|
return result;
|
|
20271
20270
|
}
|
|
20272
20271
|
async DataContextItemsArray(query_, { dataSource, userPayload }, pubSub) {
|
|
20273
20272
|
this.CheckUserReadPermissions('Data Context Items', userPayload);
|
|
20274
|
-
const sSQL = `SELECT * FROM [${
|
|
20273
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDataContextItems] WHERE [QueryID]=${query_.ID} ` + this.getRowLevelSecurityWhereClause('Data Context Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
20275
20274
|
const result = this.ArrayMapFieldNamesToCodeNames('Data Context Items', await dataSource.query(sSQL));
|
|
20276
20275
|
return result;
|
|
20277
20276
|
}
|
|
@@ -20510,7 +20509,7 @@ let QueryPermissionResolver = class QueryPermissionResolver extends server_1.Res
|
|
|
20510
20509
|
}
|
|
20511
20510
|
async QueryPermission(ID, { dataSource, userPayload }, pubSub) {
|
|
20512
20511
|
this.CheckUserReadPermissions('Query Permissions', userPayload);
|
|
20513
|
-
const sSQL = `SELECT * FROM [${
|
|
20512
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwQueryPermissions] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Query Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
20514
20513
|
const result = this.MapFieldNamesToCodeNames('Query Permissions', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
20515
20514
|
return result;
|
|
20516
20515
|
}
|
|
@@ -20756,7 +20755,7 @@ let VectorIndexResolver = class VectorIndexResolver extends server_1.ResolverBas
|
|
|
20756
20755
|
}
|
|
20757
20756
|
async VectorIndex(ID, { dataSource, userPayload }, pubSub) {
|
|
20758
20757
|
this.CheckUserReadPermissions('Vector Indexes', userPayload);
|
|
20759
|
-
const sSQL = `SELECT * FROM [${
|
|
20758
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwVectorIndexes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Vector Indexes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
20760
20759
|
const result = this.MapFieldNamesToCodeNames('Vector Indexes', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
20761
20760
|
return result;
|
|
20762
20761
|
}
|
|
@@ -20972,13 +20971,13 @@ let EntityDocumentTypeResolver = class EntityDocumentTypeResolver extends server
|
|
|
20972
20971
|
}
|
|
20973
20972
|
async EntityDocumentType(ID, { dataSource, userPayload }, pubSub) {
|
|
20974
20973
|
this.CheckUserReadPermissions('Entity Document Types', userPayload);
|
|
20975
|
-
const sSQL = `SELECT * FROM [${
|
|
20974
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityDocumentTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Document Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
20976
20975
|
const result = this.MapFieldNamesToCodeNames('Entity Document Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
20977
20976
|
return result;
|
|
20978
20977
|
}
|
|
20979
20978
|
async EntityDocumentsArray(entitydocumenttype_, { dataSource, userPayload }, pubSub) {
|
|
20980
20979
|
this.CheckUserReadPermissions('Entity Documents', userPayload);
|
|
20981
|
-
const sSQL = `SELECT * FROM [${
|
|
20980
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityDocuments] WHERE [TypeID]=${entitydocumenttype_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Documents', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
20982
20981
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Documents', await dataSource.query(sSQL));
|
|
20983
20982
|
return result;
|
|
20984
20983
|
}
|
|
@@ -21230,7 +21229,7 @@ let EntityDocumentRunResolver = class EntityDocumentRunResolver extends server_1
|
|
|
21230
21229
|
}
|
|
21231
21230
|
async EntityDocumentRun(ID, { dataSource, userPayload }, pubSub) {
|
|
21232
21231
|
this.CheckUserReadPermissions('Entity Document Runs', userPayload);
|
|
21233
|
-
const sSQL = `SELECT * FROM [${
|
|
21232
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityDocumentRuns] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Document Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
21234
21233
|
const result = this.MapFieldNamesToCodeNames('Entity Document Runs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
21235
21234
|
return result;
|
|
21236
21235
|
}
|
|
@@ -21472,13 +21471,13 @@ let VectorDatabaseResolver = class VectorDatabaseResolver extends server_1.Resol
|
|
|
21472
21471
|
}
|
|
21473
21472
|
async VectorDatabase(ID, { dataSource, userPayload }, pubSub) {
|
|
21474
21473
|
this.CheckUserReadPermissions('Vector Databases', userPayload);
|
|
21475
|
-
const sSQL = `SELECT * FROM [${
|
|
21474
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwVectorDatabases] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Vector Databases', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
21476
21475
|
const result = this.MapFieldNamesToCodeNames('Vector Databases', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
21477
21476
|
return result;
|
|
21478
21477
|
}
|
|
21479
21478
|
async VectorIndexesArray(vectordatabase_, { dataSource, userPayload }, pubSub) {
|
|
21480
21479
|
this.CheckUserReadPermissions('Vector Indexes', userPayload);
|
|
21481
|
-
const sSQL = `SELECT * FROM [${
|
|
21480
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwVectorIndexes] WHERE [VectorDatabaseID]=${vectordatabase_.ID} ` + this.getRowLevelSecurityWhereClause('Vector Indexes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
21482
21481
|
const result = this.ArrayMapFieldNamesToCodeNames('Vector Indexes', await dataSource.query(sSQL));
|
|
21483
21482
|
return result;
|
|
21484
21483
|
}
|
|
@@ -21761,7 +21760,7 @@ let EntityRecordDocumentResolver = class EntityRecordDocumentResolver extends se
|
|
|
21761
21760
|
}
|
|
21762
21761
|
async EntityRecordDocument(ID, { dataSource, userPayload }, pubSub) {
|
|
21763
21762
|
this.CheckUserReadPermissions('Entity Record Documents', userPayload);
|
|
21764
|
-
const sSQL = `SELECT * FROM [${
|
|
21763
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityRecordDocuments] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Record Documents', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
21765
21764
|
const result = this.MapFieldNamesToCodeNames('Entity Record Documents', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
21766
21765
|
return result;
|
|
21767
21766
|
}
|
|
@@ -22024,13 +22023,13 @@ let EntityDocumentResolver = class EntityDocumentResolver extends server_1.Resol
|
|
|
22024
22023
|
}
|
|
22025
22024
|
async EntityDocument(ID, { dataSource, userPayload }, pubSub) {
|
|
22026
22025
|
this.CheckUserReadPermissions('Entity Documents', userPayload);
|
|
22027
|
-
const sSQL = `SELECT * FROM [${
|
|
22026
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityDocuments] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Documents', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22028
22027
|
const result = this.MapFieldNamesToCodeNames('Entity Documents', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
22029
22028
|
return result;
|
|
22030
22029
|
}
|
|
22031
22030
|
async EntityDocumentRunsArray(entitydocument_, { dataSource, userPayload }, pubSub) {
|
|
22032
22031
|
this.CheckUserReadPermissions('Entity Document Runs', userPayload);
|
|
22033
|
-
const sSQL = `SELECT * FROM [${
|
|
22032
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityDocumentRuns] WHERE [EntityDocumentID]=${entitydocument_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Document Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22034
22033
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Document Runs', await dataSource.query(sSQL));
|
|
22035
22034
|
return result;
|
|
22036
22035
|
}
|
|
@@ -22357,7 +22356,7 @@ let DataContextItemResolver = class DataContextItemResolver extends server_1.Res
|
|
|
22357
22356
|
}
|
|
22358
22357
|
async DataContextItem(ID, { dataSource, userPayload }, pubSub) {
|
|
22359
22358
|
this.CheckUserReadPermissions('Data Context Items', userPayload);
|
|
22360
|
-
const sSQL = `SELECT * FROM [${
|
|
22359
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDataContextItems] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Data Context Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22361
22360
|
const result = this.MapFieldNamesToCodeNames('Data Context Items', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
22362
22361
|
return result;
|
|
22363
22362
|
}
|
|
@@ -22607,19 +22606,19 @@ let DataContextResolver = class DataContextResolver extends server_1.ResolverBas
|
|
|
22607
22606
|
}
|
|
22608
22607
|
async DataContext(ID, { dataSource, userPayload }, pubSub) {
|
|
22609
22608
|
this.CheckUserReadPermissions('Data Contexts', userPayload);
|
|
22610
|
-
const sSQL = `SELECT * FROM [${
|
|
22609
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDataContexts] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Data Contexts', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22611
22610
|
const result = this.MapFieldNamesToCodeNames('Data Contexts', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
22612
22611
|
return result;
|
|
22613
22612
|
}
|
|
22614
22613
|
async DataContextItemsArray(datacontext_, { dataSource, userPayload }, pubSub) {
|
|
22615
22614
|
this.CheckUserReadPermissions('Data Context Items', userPayload);
|
|
22616
|
-
const sSQL = `SELECT * FROM [${
|
|
22615
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDataContextItems] WHERE [DataContextID]=${datacontext_.ID} ` + this.getRowLevelSecurityWhereClause('Data Context Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22617
22616
|
const result = this.ArrayMapFieldNamesToCodeNames('Data Context Items', await dataSource.query(sSQL));
|
|
22618
22617
|
return result;
|
|
22619
22618
|
}
|
|
22620
22619
|
async ReportsArray(datacontext_, { dataSource, userPayload }, pubSub) {
|
|
22621
22620
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
22622
|
-
const sSQL = `SELECT * FROM [${
|
|
22621
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwReports] WHERE [DataContextID]=${datacontext_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22623
22622
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
22624
22623
|
return result;
|
|
22625
22624
|
}
|
|
@@ -22886,19 +22885,19 @@ let UserViewCategoryResolver = class UserViewCategoryResolver extends server_1.R
|
|
|
22886
22885
|
}
|
|
22887
22886
|
async UserViewCategory(ID, { dataSource, userPayload }, pubSub) {
|
|
22888
22887
|
this.CheckUserReadPermissions('User View Categories', userPayload);
|
|
22889
|
-
const sSQL = `SELECT * FROM [${
|
|
22888
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserViewCategories] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User View Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22890
22889
|
const result = this.MapFieldNamesToCodeNames('User View Categories', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
22891
22890
|
return result;
|
|
22892
22891
|
}
|
|
22893
22892
|
async UserViewCategoriesArray(userviewcategory_, { dataSource, userPayload }, pubSub) {
|
|
22894
22893
|
this.CheckUserReadPermissions('User View Categories', userPayload);
|
|
22895
|
-
const sSQL = `SELECT * FROM [${
|
|
22894
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserViewCategories] WHERE [ParentID]=${userviewcategory_.ID} ` + this.getRowLevelSecurityWhereClause('User View Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22896
22895
|
const result = this.ArrayMapFieldNamesToCodeNames('User View Categories', await dataSource.query(sSQL));
|
|
22897
22896
|
return result;
|
|
22898
22897
|
}
|
|
22899
22898
|
async UserViewsArray(userviewcategory_, { dataSource, userPayload }, pubSub) {
|
|
22900
22899
|
this.CheckUserReadPermissions('User Views', userPayload);
|
|
22901
|
-
const sSQL = `SELECT * FROM [${
|
|
22900
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserViews] WHERE [CategoryID]=${userviewcategory_.ID} ` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22902
22901
|
const result = this.ArrayMapFieldNamesToCodeNames('User Views', await dataSource.query(sSQL));
|
|
22903
22902
|
return result;
|
|
22904
22903
|
}
|
|
@@ -23184,19 +23183,19 @@ let DashboardCategoryResolver = class DashboardCategoryResolver extends server_1
|
|
|
23184
23183
|
}
|
|
23185
23184
|
async DashboardCategory(ID, { dataSource, userPayload }, pubSub) {
|
|
23186
23185
|
this.CheckUserReadPermissions('Dashboard Categories', userPayload);
|
|
23187
|
-
const sSQL = `SELECT * FROM [${
|
|
23186
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDashboardCategories] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Dashboard Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
23188
23187
|
const result = this.MapFieldNamesToCodeNames('Dashboard Categories', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
23189
23188
|
return result;
|
|
23190
23189
|
}
|
|
23191
23190
|
async DashboardsArray(dashboardcategory_, { dataSource, userPayload }, pubSub) {
|
|
23192
23191
|
this.CheckUserReadPermissions('Dashboards', userPayload);
|
|
23193
|
-
const sSQL = `SELECT * FROM [${
|
|
23192
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDashboards] WHERE [CategoryID]=${dashboardcategory_.ID} ` + this.getRowLevelSecurityWhereClause('Dashboards', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
23194
23193
|
const result = this.ArrayMapFieldNamesToCodeNames('Dashboards', await dataSource.query(sSQL));
|
|
23195
23194
|
return result;
|
|
23196
23195
|
}
|
|
23197
23196
|
async DashboardCategoriesArray(dashboardcategory_, { dataSource, userPayload }, pubSub) {
|
|
23198
23197
|
this.CheckUserReadPermissions('Dashboard Categories', userPayload);
|
|
23199
|
-
const sSQL = `SELECT * FROM [${
|
|
23198
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDashboardCategories] WHERE [ParentID]=${dashboardcategory_.ID} ` + this.getRowLevelSecurityWhereClause('Dashboard Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
23200
23199
|
const result = this.ArrayMapFieldNamesToCodeNames('Dashboard Categories', await dataSource.query(sSQL));
|
|
23201
23200
|
return result;
|
|
23202
23201
|
}
|
|
@@ -23482,19 +23481,19 @@ let ReportCategoryResolver = class ReportCategoryResolver extends server_1.Resol
|
|
|
23482
23481
|
}
|
|
23483
23482
|
async ReportCategory(ID, { dataSource, userPayload }, pubSub) {
|
|
23484
23483
|
this.CheckUserReadPermissions('Report Categories', userPayload);
|
|
23485
|
-
const sSQL = `SELECT * FROM [${
|
|
23484
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwReportCategories] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Report Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
23486
23485
|
const result = this.MapFieldNamesToCodeNames('Report Categories', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
23487
23486
|
return result;
|
|
23488
23487
|
}
|
|
23489
23488
|
async ReportCategoriesArray(reportcategory_, { dataSource, userPayload }, pubSub) {
|
|
23490
23489
|
this.CheckUserReadPermissions('Report Categories', userPayload);
|
|
23491
|
-
const sSQL = `SELECT * FROM [${
|
|
23490
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwReportCategories] WHERE [ParentID]=${reportcategory_.ID} ` + this.getRowLevelSecurityWhereClause('Report Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
23492
23491
|
const result = this.ArrayMapFieldNamesToCodeNames('Report Categories', await dataSource.query(sSQL));
|
|
23493
23492
|
return result;
|
|
23494
23493
|
}
|
|
23495
23494
|
async ReportsArray(reportcategory_, { dataSource, userPayload }, pubSub) {
|
|
23496
23495
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
23497
|
-
const sSQL = `SELECT * FROM [${
|
|
23496
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwReports] WHERE [CategoryID]=${reportcategory_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
23498
23497
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
23499
23498
|
return result;
|
|
23500
23499
|
}
|
|
@@ -23809,13 +23808,13 @@ let FileStorageProviderResolver = class FileStorageProviderResolver extends serv
|
|
|
23809
23808
|
}
|
|
23810
23809
|
async FileStorageProvider(ID, { dataSource, userPayload }, pubSub) {
|
|
23811
23810
|
this.CheckUserReadPermissions('File Storage Providers', userPayload);
|
|
23812
|
-
const sSQL = `SELECT * FROM [${
|
|
23811
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwFileStorageProviders] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('File Storage Providers', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
23813
23812
|
const result = this.MapFieldNamesToCodeNames('File Storage Providers', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
23814
23813
|
return result;
|
|
23815
23814
|
}
|
|
23816
23815
|
async FilesArray(filestorageprovider_, { dataSource, userPayload }, pubSub) {
|
|
23817
23816
|
this.CheckUserReadPermissions('Files', userPayload);
|
|
23818
|
-
const sSQL = `SELECT * FROM [${
|
|
23817
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwFiles] WHERE [ProviderID]=${filestorageprovider_.ID} ` + this.getRowLevelSecurityWhereClause('Files', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
23819
23818
|
const result = this.ArrayMapFieldNamesToCodeNames('Files', await dataSource.query(sSQL));
|
|
23820
23819
|
return result;
|
|
23821
23820
|
}
|
|
@@ -24113,13 +24112,13 @@ let FileResolver = class FileResolver extends server_1.ResolverBase {
|
|
|
24113
24112
|
}
|
|
24114
24113
|
async File(ID, { dataSource, userPayload }, pubSub) {
|
|
24115
24114
|
this.CheckUserReadPermissions('Files', userPayload);
|
|
24116
|
-
const sSQL = `SELECT * FROM [${
|
|
24115
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwFiles] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Files', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
24117
24116
|
const result = this.MapFieldNamesToCodeNames('Files', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
24118
24117
|
return result;
|
|
24119
24118
|
}
|
|
24120
24119
|
async FileEntityRecordLinksArray(file_, { dataSource, userPayload }, pubSub) {
|
|
24121
24120
|
this.CheckUserReadPermissions('File Entity Record Links', userPayload);
|
|
24122
|
-
const sSQL = `SELECT * FROM [${
|
|
24121
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwFileEntityRecordLinks] WHERE [FileID]=${file_.ID} ` + this.getRowLevelSecurityWhereClause('File Entity Record Links', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
24123
24122
|
const result = this.ArrayMapFieldNamesToCodeNames('File Entity Record Links', await dataSource.query(sSQL));
|
|
24124
24123
|
return result;
|
|
24125
24124
|
}
|
|
@@ -24396,19 +24395,19 @@ let FileCategoryResolver = class FileCategoryResolver extends server_1.ResolverB
|
|
|
24396
24395
|
}
|
|
24397
24396
|
async FileCategory(ID, { dataSource, userPayload }, pubSub) {
|
|
24398
24397
|
this.CheckUserReadPermissions('File Categories', userPayload);
|
|
24399
|
-
const sSQL = `SELECT * FROM [${
|
|
24398
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwFileCategories] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('File Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
24400
24399
|
const result = this.MapFieldNamesToCodeNames('File Categories', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
24401
24400
|
return result;
|
|
24402
24401
|
}
|
|
24403
24402
|
async FilesArray(filecategory_, { dataSource, userPayload }, pubSub) {
|
|
24404
24403
|
this.CheckUserReadPermissions('Files', userPayload);
|
|
24405
|
-
const sSQL = `SELECT * FROM [${
|
|
24404
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwFiles] WHERE [CategoryID]=${filecategory_.ID} ` + this.getRowLevelSecurityWhereClause('Files', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
24406
24405
|
const result = this.ArrayMapFieldNamesToCodeNames('Files', await dataSource.query(sSQL));
|
|
24407
24406
|
return result;
|
|
24408
24407
|
}
|
|
24409
24408
|
async FileCategoriesArray(filecategory_, { dataSource, userPayload }, pubSub) {
|
|
24410
24409
|
this.CheckUserReadPermissions('File Categories', userPayload);
|
|
24411
|
-
const sSQL = `SELECT * FROM [${
|
|
24410
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwFileCategories] WHERE [ParentID]=${filecategory_.ID} ` + this.getRowLevelSecurityWhereClause('File Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
24412
24411
|
const result = this.ArrayMapFieldNamesToCodeNames('File Categories', await dataSource.query(sSQL));
|
|
24413
24412
|
return result;
|
|
24414
24413
|
}
|
|
@@ -24691,7 +24690,7 @@ let FileEntityRecordLinkResolver = class FileEntityRecordLinkResolver extends se
|
|
|
24691
24690
|
}
|
|
24692
24691
|
async FileEntityRecordLink(ID, { dataSource, userPayload }, pubSub) {
|
|
24693
24692
|
this.CheckUserReadPermissions('File Entity Record Links', userPayload);
|
|
24694
|
-
const sSQL = `SELECT * FROM [${
|
|
24693
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwFileEntityRecordLinks] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('File Entity Record Links', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
24695
24694
|
const result = this.MapFieldNamesToCodeNames('File Entity Record Links', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
24696
24695
|
return result;
|
|
24697
24696
|
}
|
|
@@ -24982,7 +24981,7 @@ let VersionInstallationResolver = class VersionInstallationResolver extends serv
|
|
|
24982
24981
|
}
|
|
24983
24982
|
async VersionInstallation(ID, { dataSource, userPayload }, pubSub) {
|
|
24984
24983
|
this.CheckUserReadPermissions('Version Installations', userPayload);
|
|
24985
|
-
const sSQL = `SELECT * FROM [${
|
|
24984
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwVersionInstallations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Version Installations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
24986
24985
|
const result = this.MapFieldNamesToCodeNames('Version Installations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
24987
24986
|
return result;
|
|
24988
24987
|
}
|