@memberjunction/server 0.9.260 → 0.9.263
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/build.log.json +9 -0
- package/dist/generated/generated.d.ts +24 -0
- package/dist/generated/generated.d.ts.map +1 -1
- package/dist/generated/generated.js +388 -245
- package/dist/generated/generated.js.map +1 -1
- package/package.json +12 -12
- package/src/generated/generated.ts +18796 -18700
|
@@ -46,7 +46,6 @@ exports.VersionInstallationResolver = exports.RunVersionInstallationViewResult =
|
|
|
46
46
|
const server_1 = require("@memberjunction/server");
|
|
47
47
|
const core_1 = require("@memberjunction/core");
|
|
48
48
|
const class_validator_1 = require("class-validator");
|
|
49
|
-
const config_1 = require("../config");
|
|
50
49
|
const mj_core_schema_server_object_types = __importStar(require("@memberjunction/server"));
|
|
51
50
|
let Company_ = class Company_ {
|
|
52
51
|
};
|
|
@@ -208,31 +207,31 @@ let CompanyResolver = class CompanyResolver extends server_1.ResolverBase {
|
|
|
208
207
|
}
|
|
209
208
|
async Company(ID, { dataSource, userPayload }, pubSub) {
|
|
210
209
|
this.CheckUserReadPermissions('Companies', userPayload);
|
|
211
|
-
const sSQL = `SELECT * FROM [${
|
|
210
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanies] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Companies', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
212
211
|
const result = this.MapFieldNamesToCodeNames('Companies', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
213
212
|
return result;
|
|
214
213
|
}
|
|
215
214
|
async AllCompanies({ dataSource, userPayload }, pubSub) {
|
|
216
215
|
this.CheckUserReadPermissions('Companies', userPayload);
|
|
217
|
-
const sSQL = `SELECT * FROM [${
|
|
216
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanies]` + this.getRowLevelSecurityWhereClause('Companies', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
218
217
|
const result = this.ArrayMapFieldNamesToCodeNames('Companies', await dataSource.query(sSQL));
|
|
219
218
|
return result;
|
|
220
219
|
}
|
|
221
220
|
async EmployeesArray(company_, { dataSource, userPayload }, pubSub) {
|
|
222
221
|
this.CheckUserReadPermissions('Employees', userPayload);
|
|
223
|
-
const sSQL = `SELECT * FROM [${
|
|
222
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEmployees] WHERE [CompanyID]=${company_.ID} ` + this.getRowLevelSecurityWhereClause('Employees', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
224
223
|
const result = this.ArrayMapFieldNamesToCodeNames('Employees', await dataSource.query(sSQL));
|
|
225
224
|
return result;
|
|
226
225
|
}
|
|
227
226
|
async CompanyIntegrationsArray(company_, { dataSource, userPayload }, pubSub) {
|
|
228
227
|
this.CheckUserReadPermissions('Company Integrations', userPayload);
|
|
229
|
-
const sSQL = `SELECT * FROM [${
|
|
228
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanyIntegrations] WHERE [CompanyName]=${company_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
230
229
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integrations', await dataSource.query(sSQL));
|
|
231
230
|
return result;
|
|
232
231
|
}
|
|
233
232
|
async WorkflowsArray(company_, { dataSource, userPayload }, pubSub) {
|
|
234
233
|
this.CheckUserReadPermissions('Workflows', userPayload);
|
|
235
|
-
const sSQL = `SELECT * FROM [${
|
|
234
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwWorkflows] WHERE [CompanyName]=${company_.ID} ` + this.getRowLevelSecurityWhereClause('Workflows', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
236
235
|
const result = this.ArrayMapFieldNamesToCodeNames('Workflows', await dataSource.query(sSQL));
|
|
237
236
|
return result;
|
|
238
237
|
}
|
|
@@ -633,37 +632,37 @@ let EmployeeResolver = class EmployeeResolver extends server_1.ResolverBase {
|
|
|
633
632
|
}
|
|
634
633
|
async Employee(ID, { dataSource, userPayload }, pubSub) {
|
|
635
634
|
this.CheckUserReadPermissions('Employees', userPayload);
|
|
636
|
-
const sSQL = `SELECT * FROM [${
|
|
635
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEmployees] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Employees', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
637
636
|
const result = this.MapFieldNamesToCodeNames('Employees', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
638
637
|
return result;
|
|
639
638
|
}
|
|
640
639
|
async AllEmployees({ dataSource, userPayload }, pubSub) {
|
|
641
640
|
this.CheckUserReadPermissions('Employees', userPayload);
|
|
642
|
-
const sSQL = `SELECT * FROM [${
|
|
641
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEmployees]` + this.getRowLevelSecurityWhereClause('Employees', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
643
642
|
const result = this.ArrayMapFieldNamesToCodeNames('Employees', await dataSource.query(sSQL));
|
|
644
643
|
return result;
|
|
645
644
|
}
|
|
646
645
|
async EmployeesArray(employee_, { dataSource, userPayload }, pubSub) {
|
|
647
646
|
this.CheckUserReadPermissions('Employees', userPayload);
|
|
648
|
-
const sSQL = `SELECT * FROM [${
|
|
647
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEmployees] WHERE [SupervisorID]=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employees', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
649
648
|
const result = this.ArrayMapFieldNamesToCodeNames('Employees', await dataSource.query(sSQL));
|
|
650
649
|
return result;
|
|
651
650
|
}
|
|
652
651
|
async EmployeeCompanyIntegrationsArray(employee_, { dataSource, userPayload }, pubSub) {
|
|
653
652
|
this.CheckUserReadPermissions('Employee Company Integrations', userPayload);
|
|
654
|
-
const sSQL = `SELECT * FROM [${
|
|
653
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEmployeeCompanyIntegrations] WHERE [EmployeeID]=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
655
654
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Company Integrations', await dataSource.query(sSQL));
|
|
656
655
|
return result;
|
|
657
656
|
}
|
|
658
657
|
async EmployeeRolesArray(employee_, { dataSource, userPayload }, pubSub) {
|
|
659
658
|
this.CheckUserReadPermissions('Employee Roles', userPayload);
|
|
660
|
-
const sSQL = `SELECT * FROM [${
|
|
659
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEmployeeRoles] WHERE [EmployeeID]=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
661
660
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Roles', await dataSource.query(sSQL));
|
|
662
661
|
return result;
|
|
663
662
|
}
|
|
664
663
|
async EmployeeSkillsArray(employee_, { dataSource, userPayload }, pubSub) {
|
|
665
664
|
this.CheckUserReadPermissions('Employee Skills', userPayload);
|
|
666
|
-
const sSQL = `SELECT * FROM [${
|
|
665
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEmployeeSkills] WHERE [EmployeeID]=${employee_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
667
666
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Skills', await dataSource.query(sSQL));
|
|
668
667
|
return result;
|
|
669
668
|
}
|
|
@@ -978,7 +977,7 @@ let UserFavoriteResolverBase = class UserFavoriteResolverBase extends server_1.R
|
|
|
978
977
|
}
|
|
979
978
|
async UserFavorite(ID, { dataSource, userPayload }, pubSub) {
|
|
980
979
|
this.CheckUserReadPermissions('User Favorites', userPayload);
|
|
981
|
-
const sSQL = `SELECT * FROM [${
|
|
980
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserFavorites] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Favorites', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
982
981
|
const result = this.MapFieldNamesToCodeNames('User Favorites', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
983
982
|
return result;
|
|
984
983
|
}
|
|
@@ -1223,7 +1222,7 @@ let EmployeeCompanyIntegrationResolver = class EmployeeCompanyIntegrationResolve
|
|
|
1223
1222
|
}
|
|
1224
1223
|
async EmployeeCompanyIntegration(ID, { dataSource, userPayload }, pubSub) {
|
|
1225
1224
|
this.CheckUserReadPermissions('Employee Company Integrations', userPayload);
|
|
1226
|
-
const sSQL = `SELECT * FROM [${
|
|
1225
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEmployeeCompanyIntegrations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Employee Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1227
1226
|
const result = this.MapFieldNamesToCodeNames('Employee Company Integrations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
1228
1227
|
return result;
|
|
1229
1228
|
}
|
|
@@ -1396,7 +1395,7 @@ let EmployeeRoleResolver = class EmployeeRoleResolver extends server_1.ResolverB
|
|
|
1396
1395
|
}
|
|
1397
1396
|
async EmployeeRole(ID, { dataSource, userPayload }, pubSub) {
|
|
1398
1397
|
this.CheckUserReadPermissions('Employee Roles', userPayload);
|
|
1399
|
-
const sSQL = `SELECT * FROM [${
|
|
1398
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEmployeeRoles] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Employee Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1400
1399
|
const result = this.MapFieldNamesToCodeNames('Employee Roles', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
1401
1400
|
return result;
|
|
1402
1401
|
}
|
|
@@ -1570,7 +1569,7 @@ let EmployeeSkillResolver = class EmployeeSkillResolver extends server_1.Resolve
|
|
|
1570
1569
|
}
|
|
1571
1570
|
async EmployeeSkill(ID, { dataSource, userPayload }, pubSub) {
|
|
1572
1571
|
this.CheckUserReadPermissions('Employee Skills', userPayload);
|
|
1573
|
-
const sSQL = `SELECT * FROM [${
|
|
1572
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEmployeeSkills] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Employee Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1574
1573
|
const result = this.MapFieldNamesToCodeNames('Employee Skills', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
1575
1574
|
return result;
|
|
1576
1575
|
}
|
|
@@ -1800,43 +1799,43 @@ let RoleResolver = class RoleResolver extends server_1.ResolverBase {
|
|
|
1800
1799
|
}
|
|
1801
1800
|
async Role(ID, { dataSource, userPayload }, pubSub) {
|
|
1802
1801
|
this.CheckUserReadPermissions('Roles', userPayload);
|
|
1803
|
-
const sSQL = `SELECT * FROM [${
|
|
1802
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwRoles] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1804
1803
|
const result = this.MapFieldNamesToCodeNames('Roles', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
1805
1804
|
return result;
|
|
1806
1805
|
}
|
|
1807
1806
|
async AllRoles({ dataSource, userPayload }, pubSub) {
|
|
1808
1807
|
this.CheckUserReadPermissions('Roles', userPayload);
|
|
1809
|
-
const sSQL = `SELECT * FROM [${
|
|
1808
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwRoles]` + this.getRowLevelSecurityWhereClause('Roles', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
1810
1809
|
const result = this.ArrayMapFieldNamesToCodeNames('Roles', await dataSource.query(sSQL));
|
|
1811
1810
|
return result;
|
|
1812
1811
|
}
|
|
1813
1812
|
async EmployeeRolesArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1814
1813
|
this.CheckUserReadPermissions('Employee Roles', userPayload);
|
|
1815
|
-
const sSQL = `SELECT * FROM [${
|
|
1814
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEmployeeRoles] WHERE [RoleID]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1816
1815
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Roles', await dataSource.query(sSQL));
|
|
1817
1816
|
return result;
|
|
1818
1817
|
}
|
|
1819
1818
|
async EntityPermissionsArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1820
1819
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
1821
|
-
const sSQL = `SELECT * FROM [${
|
|
1820
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityPermissions] WHERE [RoleName]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1822
1821
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL));
|
|
1823
1822
|
return result;
|
|
1824
1823
|
}
|
|
1825
1824
|
async UserRolesArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1826
1825
|
this.CheckUserReadPermissions('User Roles', userPayload);
|
|
1827
|
-
const sSQL = `SELECT * FROM [${
|
|
1826
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserRoles] WHERE [RoleName]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('User Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1828
1827
|
const result = this.ArrayMapFieldNamesToCodeNames('User Roles', await dataSource.query(sSQL));
|
|
1829
1828
|
return result;
|
|
1830
1829
|
}
|
|
1831
1830
|
async AuthorizationRolesArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1832
1831
|
this.CheckUserReadPermissions('Authorization Roles', userPayload);
|
|
1833
|
-
const sSQL = `SELECT * FROM [${
|
|
1832
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuthorizationRoles] WHERE [RoleName]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('Authorization Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1834
1833
|
const result = this.ArrayMapFieldNamesToCodeNames('Authorization Roles', await dataSource.query(sSQL));
|
|
1835
1834
|
return result;
|
|
1836
1835
|
}
|
|
1837
1836
|
async QueryPermissionsArray(role_, { dataSource, userPayload }, pubSub) {
|
|
1838
1837
|
this.CheckUserReadPermissions('Query Permissions', userPayload);
|
|
1839
|
-
const sSQL = `SELECT * FROM [${
|
|
1838
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwQueryPermissions] WHERE [RoleName]=${role_.ID} ` + this.getRowLevelSecurityWhereClause('Query Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
1840
1839
|
const result = this.ArrayMapFieldNamesToCodeNames('Query Permissions', await dataSource.query(sSQL));
|
|
1841
1840
|
return result;
|
|
1842
1841
|
}
|
|
@@ -2113,25 +2112,25 @@ let SkillResolver = class SkillResolver extends server_1.ResolverBase {
|
|
|
2113
2112
|
}
|
|
2114
2113
|
async Skill(ID, { dataSource, userPayload }, pubSub) {
|
|
2115
2114
|
this.CheckUserReadPermissions('Skills', userPayload);
|
|
2116
|
-
const sSQL = `SELECT * FROM [${
|
|
2115
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwSkills] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2117
2116
|
const result = this.MapFieldNamesToCodeNames('Skills', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
2118
2117
|
return result;
|
|
2119
2118
|
}
|
|
2120
2119
|
async AllSkills({ dataSource, userPayload }, pubSub) {
|
|
2121
2120
|
this.CheckUserReadPermissions('Skills', userPayload);
|
|
2122
|
-
const sSQL = `SELECT * FROM [${
|
|
2121
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwSkills]` + this.getRowLevelSecurityWhereClause('Skills', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
2123
2122
|
const result = this.ArrayMapFieldNamesToCodeNames('Skills', await dataSource.query(sSQL));
|
|
2124
2123
|
return result;
|
|
2125
2124
|
}
|
|
2126
2125
|
async EmployeeSkillsArray(skill_, { dataSource, userPayload }, pubSub) {
|
|
2127
2126
|
this.CheckUserReadPermissions('Employee Skills', userPayload);
|
|
2128
|
-
const sSQL = `SELECT * FROM [${
|
|
2127
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEmployeeSkills] WHERE [SkillID]=${skill_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2129
2128
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Skills', await dataSource.query(sSQL));
|
|
2130
2129
|
return result;
|
|
2131
2130
|
}
|
|
2132
2131
|
async SkillsArray(skill_, { dataSource, userPayload }, pubSub) {
|
|
2133
2132
|
this.CheckUserReadPermissions('Skills', userPayload);
|
|
2134
|
-
const sSQL = `SELECT * FROM [${
|
|
2133
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwSkills] WHERE [ParentID]=${skill_.ID} ` + this.getRowLevelSecurityWhereClause('Skills', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2135
2134
|
const result = this.ArrayMapFieldNamesToCodeNames('Skills', await dataSource.query(sSQL));
|
|
2136
2135
|
return result;
|
|
2137
2136
|
}
|
|
@@ -2314,13 +2313,13 @@ let IntegrationURLFormatResolver = class IntegrationURLFormatResolver extends se
|
|
|
2314
2313
|
}
|
|
2315
2314
|
async IntegrationURLFormat(ID, { dataSource, userPayload }, pubSub) {
|
|
2316
2315
|
this.CheckUserReadPermissions('Integration URL Formats', userPayload);
|
|
2317
|
-
const sSQL = `SELECT * FROM [${
|
|
2316
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwIntegrationURLFormats] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Integration URL Formats', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2318
2317
|
const result = this.MapFieldNamesToCodeNames('Integration URL Formats', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
2319
2318
|
return result;
|
|
2320
2319
|
}
|
|
2321
2320
|
async AllIntegrationURLFormats({ dataSource, userPayload }, pubSub) {
|
|
2322
2321
|
this.CheckUserReadPermissions('Integration URL Formats', userPayload);
|
|
2323
|
-
const sSQL = `SELECT * FROM [${
|
|
2322
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwIntegrationURLFormats]` + this.getRowLevelSecurityWhereClause('Integration URL Formats', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
2324
2323
|
const result = this.ArrayMapFieldNamesToCodeNames('Integration URL Formats', await dataSource.query(sSQL));
|
|
2325
2324
|
return result;
|
|
2326
2325
|
}
|
|
@@ -2549,25 +2548,25 @@ let IntegrationResolver = class IntegrationResolver extends server_1.ResolverBas
|
|
|
2549
2548
|
}
|
|
2550
2549
|
async Integration(ID, { dataSource, userPayload }, pubSub) {
|
|
2551
2550
|
this.CheckUserReadPermissions('Integrations', userPayload);
|
|
2552
|
-
const sSQL = `SELECT * FROM [${
|
|
2551
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwIntegrations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2553
2552
|
const result = this.MapFieldNamesToCodeNames('Integrations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
2554
2553
|
return result;
|
|
2555
2554
|
}
|
|
2556
2555
|
async AllIntegrations({ dataSource, userPayload }, pubSub) {
|
|
2557
2556
|
this.CheckUserReadPermissions('Integrations', userPayload);
|
|
2558
|
-
const sSQL = `SELECT * FROM [${
|
|
2557
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwIntegrations]` + this.getRowLevelSecurityWhereClause('Integrations', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
2559
2558
|
const result = this.ArrayMapFieldNamesToCodeNames('Integrations', await dataSource.query(sSQL));
|
|
2560
2559
|
return result;
|
|
2561
2560
|
}
|
|
2562
2561
|
async IntegrationURLFormatsArray(integration_, { dataSource, userPayload }, pubSub) {
|
|
2563
2562
|
this.CheckUserReadPermissions('Integration URL Formats', userPayload);
|
|
2564
|
-
const sSQL = `SELECT * FROM [${
|
|
2563
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwIntegrationURLFormats] WHERE [IntegrationID]=${integration_.ID} ` + this.getRowLevelSecurityWhereClause('Integration URL Formats', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2565
2564
|
const result = this.ArrayMapFieldNamesToCodeNames('Integration URL Formats', await dataSource.query(sSQL));
|
|
2566
2565
|
return result;
|
|
2567
2566
|
}
|
|
2568
2567
|
async CompanyIntegrationsArray(integration_, { dataSource, userPayload }, pubSub) {
|
|
2569
2568
|
this.CheckUserReadPermissions('Company Integrations', userPayload);
|
|
2570
|
-
const sSQL = `SELECT * FROM [${
|
|
2569
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanyIntegrations] WHERE [IntegrationName]=${integration_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2571
2570
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integrations', await dataSource.query(sSQL));
|
|
2572
2571
|
return result;
|
|
2573
2572
|
}
|
|
@@ -2909,31 +2908,31 @@ let CompanyIntegrationResolver = class CompanyIntegrationResolver extends server
|
|
|
2909
2908
|
}
|
|
2910
2909
|
async CompanyIntegration(ID, { dataSource, userPayload }, pubSub) {
|
|
2911
2910
|
this.CheckUserReadPermissions('Company Integrations', userPayload);
|
|
2912
|
-
const sSQL = `SELECT * FROM [${
|
|
2911
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanyIntegrations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2913
2912
|
const result = this.MapFieldNamesToCodeNames('Company Integrations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
2914
2913
|
return result;
|
|
2915
2914
|
}
|
|
2916
2915
|
async ListsArray(companyintegration_, { dataSource, userPayload }, pubSub) {
|
|
2917
2916
|
this.CheckUserReadPermissions('Lists', userPayload);
|
|
2918
|
-
const sSQL = `SELECT * FROM [${
|
|
2917
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwLists] WHERE [CompanyIntegrationID]=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Lists', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2919
2918
|
const result = this.ArrayMapFieldNamesToCodeNames('Lists', await dataSource.query(sSQL));
|
|
2920
2919
|
return result;
|
|
2921
2920
|
}
|
|
2922
2921
|
async EmployeeCompanyIntegrationsArray(companyintegration_, { dataSource, userPayload }, pubSub) {
|
|
2923
2922
|
this.CheckUserReadPermissions('Employee Company Integrations', userPayload);
|
|
2924
|
-
const sSQL = `SELECT * FROM [${
|
|
2923
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEmployeeCompanyIntegrations] WHERE [CompanyIntegrationID]=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Employee Company Integrations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2925
2924
|
const result = this.ArrayMapFieldNamesToCodeNames('Employee Company Integrations', await dataSource.query(sSQL));
|
|
2926
2925
|
return result;
|
|
2927
2926
|
}
|
|
2928
2927
|
async CompanyIntegrationRunsArray(companyintegration_, { dataSource, userPayload }, pubSub) {
|
|
2929
2928
|
this.CheckUserReadPermissions('Company Integration Runs', userPayload);
|
|
2930
|
-
const sSQL = `SELECT * FROM [${
|
|
2929
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanyIntegrationRuns] WHERE [CompanyIntegrationID]=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2931
2930
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Runs', await dataSource.query(sSQL));
|
|
2932
2931
|
return result;
|
|
2933
2932
|
}
|
|
2934
2933
|
async CompanyIntegrationRecordMapsArray(companyintegration_, { dataSource, userPayload }, pubSub) {
|
|
2935
2934
|
this.CheckUserReadPermissions('Company Integration Record Maps', userPayload);
|
|
2936
|
-
const sSQL = `SELECT * FROM [${
|
|
2935
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanyIntegrationRecordMaps] WHERE [CompanyIntegrationID]=${companyintegration_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Record Maps', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
2937
2936
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Record Maps', await dataSource.query(sSQL));
|
|
2938
2937
|
return result;
|
|
2939
2938
|
}
|
|
@@ -3522,19 +3521,19 @@ let EntityFieldResolver = class EntityFieldResolver extends server_1.ResolverBas
|
|
|
3522
3521
|
}
|
|
3523
3522
|
async EntityField(ID, { dataSource, userPayload }, pubSub) {
|
|
3524
3523
|
this.CheckUserReadPermissions('Entity Fields', userPayload);
|
|
3525
|
-
const sSQL = `SELECT * FROM [${
|
|
3524
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityFields] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Fields', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
3526
3525
|
const result = this.MapFieldNamesToCodeNames('Entity Fields', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
3527
3526
|
return result;
|
|
3528
3527
|
}
|
|
3529
3528
|
async AllEntityFields({ dataSource, userPayload }, pubSub) {
|
|
3530
3529
|
this.CheckUserReadPermissions('Entity Fields', userPayload);
|
|
3531
|
-
const sSQL = `SELECT * FROM [${
|
|
3530
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityFields]` + this.getRowLevelSecurityWhereClause('Entity Fields', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
3532
3531
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Fields', await dataSource.query(sSQL));
|
|
3533
3532
|
return result;
|
|
3534
3533
|
}
|
|
3535
3534
|
async EntityFieldValuesArray(entityfield_, { dataSource, userPayload }, pubSub) {
|
|
3536
3535
|
this.CheckUserReadPermissions('Entity Field Values', userPayload);
|
|
3537
|
-
const sSQL = `SELECT * FROM [${
|
|
3536
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityFieldValues] WHERE [EntityFieldID]=${entityfield_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Field Values', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
3538
3537
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Field Values', await dataSource.query(sSQL));
|
|
3539
3538
|
return result;
|
|
3540
3539
|
}
|
|
@@ -4368,181 +4367,181 @@ let EntityResolverBase = class EntityResolverBase extends server_1.ResolverBase
|
|
|
4368
4367
|
}
|
|
4369
4368
|
async Entity(ID, { dataSource, userPayload }, pubSub) {
|
|
4370
4369
|
this.CheckUserReadPermissions('Entities', userPayload);
|
|
4371
|
-
const sSQL = `SELECT * FROM [${
|
|
4370
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntities] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4372
4371
|
const result = this.MapFieldNamesToCodeNames('Entities', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
4373
4372
|
return result;
|
|
4374
4373
|
}
|
|
4375
4374
|
async AllEntities({ dataSource, userPayload }, pubSub) {
|
|
4376
4375
|
this.CheckUserReadPermissions('Entities', userPayload);
|
|
4377
|
-
const sSQL = `SELECT * FROM [${
|
|
4376
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntities]` + this.getRowLevelSecurityWhereClause('Entities', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
4378
4377
|
const result = this.ArrayMapFieldNamesToCodeNames('Entities', await dataSource.query(sSQL));
|
|
4379
4378
|
return result;
|
|
4380
4379
|
}
|
|
4381
4380
|
async EntityFieldsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4382
4381
|
this.CheckUserReadPermissions('Entity Fields', userPayload);
|
|
4383
|
-
const sSQL = `SELECT * FROM [${
|
|
4382
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityFields] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Fields', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4384
4383
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Fields', await dataSource.query(sSQL));
|
|
4385
4384
|
return result;
|
|
4386
4385
|
}
|
|
4387
4386
|
async EntityPermissionsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4388
4387
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
4389
|
-
const sSQL = `SELECT * FROM [${
|
|
4388
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityPermissions] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4390
4389
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL));
|
|
4391
4390
|
return result;
|
|
4392
4391
|
}
|
|
4393
4392
|
async EntityRelationshipsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4394
4393
|
this.CheckUserReadPermissions('Entity Relationships', userPayload);
|
|
4395
|
-
const sSQL = `SELECT * FROM [${
|
|
4394
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityRelationships] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Relationships', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4396
4395
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Relationships', await dataSource.query(sSQL));
|
|
4397
4396
|
return result;
|
|
4398
4397
|
}
|
|
4399
4398
|
async EntityAIActionsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4400
4399
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
4401
|
-
const sSQL = `SELECT * FROM [${
|
|
4400
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityAIActions] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4402
4401
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL));
|
|
4403
4402
|
return result;
|
|
4404
4403
|
}
|
|
4405
4404
|
async UserRecordLogsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4406
4405
|
this.CheckUserReadPermissions('User Record Logs', userPayload);
|
|
4407
|
-
const sSQL = `SELECT * FROM [${
|
|
4406
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserRecordLogs] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Record Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4408
4407
|
const result = this.ArrayMapFieldNamesToCodeNames('User Record Logs', await dataSource.query(sSQL));
|
|
4409
4408
|
return result;
|
|
4410
4409
|
}
|
|
4411
4410
|
async IntegrationURLFormatsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4412
4411
|
this.CheckUserReadPermissions('Integration URL Formats', userPayload);
|
|
4413
|
-
const sSQL = `SELECT * FROM [${
|
|
4412
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwIntegrationURLFormats] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Integration URL Formats', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4414
4413
|
const result = this.ArrayMapFieldNamesToCodeNames('Integration URL Formats', await dataSource.query(sSQL));
|
|
4415
4414
|
return result;
|
|
4416
4415
|
}
|
|
4417
4416
|
async EntitiesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4418
4417
|
this.CheckUserReadPermissions('Entities', userPayload);
|
|
4419
|
-
const sSQL = `SELECT * FROM [${
|
|
4418
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntities] WHERE [ParentID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4420
4419
|
const result = this.ArrayMapFieldNamesToCodeNames('Entities', await dataSource.query(sSQL));
|
|
4421
4420
|
return result;
|
|
4422
4421
|
}
|
|
4423
4422
|
async UserFavoritesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4424
4423
|
this.CheckUserReadPermissions('User Favorites', userPayload);
|
|
4425
|
-
const sSQL = `SELECT * FROM [${
|
|
4424
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserFavorites] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Favorites', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4426
4425
|
const result = this.ArrayMapFieldNamesToCodeNames('User Favorites', await dataSource.query(sSQL));
|
|
4427
4426
|
return result;
|
|
4428
4427
|
}
|
|
4429
4428
|
async CompanyIntegrationRunDetailsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4430
4429
|
this.CheckUserReadPermissions('Company Integration Run Details', userPayload);
|
|
4431
|
-
const sSQL = `SELECT * FROM [${
|
|
4430
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanyIntegrationRunDetails] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4432
4431
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Run Details', await dataSource.query(sSQL));
|
|
4433
4432
|
return result;
|
|
4434
4433
|
}
|
|
4435
4434
|
async ApplicationEntitiesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4436
4435
|
this.CheckUserReadPermissions('Application Entities', userPayload);
|
|
4437
|
-
const sSQL = `SELECT * FROM [${
|
|
4436
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwApplicationEntities] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4438
4437
|
const result = this.ArrayMapFieldNamesToCodeNames('Application Entities', await dataSource.query(sSQL));
|
|
4439
4438
|
return result;
|
|
4440
4439
|
}
|
|
4441
4440
|
async UserApplicationEntitiesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4442
4441
|
this.CheckUserReadPermissions('User Application Entities', userPayload);
|
|
4443
|
-
const sSQL = `SELECT * FROM [${
|
|
4442
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserApplicationEntities] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4444
4443
|
const result = this.ArrayMapFieldNamesToCodeNames('User Application Entities', await dataSource.query(sSQL));
|
|
4445
4444
|
return result;
|
|
4446
4445
|
}
|
|
4447
4446
|
async ListsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4448
4447
|
this.CheckUserReadPermissions('Lists', userPayload);
|
|
4449
|
-
const sSQL = `SELECT * FROM [${
|
|
4448
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwLists] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Lists', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4450
4449
|
const result = this.ArrayMapFieldNamesToCodeNames('Lists', await dataSource.query(sSQL));
|
|
4451
4450
|
return result;
|
|
4452
4451
|
}
|
|
4453
4452
|
async UserViewsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4454
4453
|
this.CheckUserReadPermissions('User Views', userPayload);
|
|
4455
|
-
const sSQL = `SELECT * FROM [${
|
|
4454
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserViews] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4456
4455
|
const result = this.ArrayMapFieldNamesToCodeNames('User Views', await dataSource.query(sSQL));
|
|
4457
4456
|
return result;
|
|
4458
4457
|
}
|
|
4459
4458
|
async RecordChangesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4460
4459
|
this.CheckUserReadPermissions('Record Changes', userPayload);
|
|
4461
|
-
const sSQL = `SELECT * FROM [${
|
|
4460
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwRecordChanges] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Record Changes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4462
4461
|
const result = this.ArrayMapFieldNamesToCodeNames('Record Changes', await dataSource.query(sSQL));
|
|
4463
4462
|
return result;
|
|
4464
4463
|
}
|
|
4465
4464
|
async AuditLogsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4466
4465
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
4467
|
-
const sSQL = `SELECT * FROM [${
|
|
4466
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuditLogs] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4468
4467
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL));
|
|
4469
4468
|
return result;
|
|
4470
4469
|
}
|
|
4471
4470
|
async ResourceTypesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4472
4471
|
this.CheckUserReadPermissions('Resource Types', userPayload);
|
|
4473
|
-
const sSQL = `SELECT * FROM [${
|
|
4472
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwResourceTypes] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Resource Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4474
4473
|
const result = this.ArrayMapFieldNamesToCodeNames('Resource Types', await dataSource.query(sSQL));
|
|
4475
4474
|
return result;
|
|
4476
4475
|
}
|
|
4477
4476
|
async TaggedItemsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4478
4477
|
this.CheckUserReadPermissions('Tagged Items', userPayload);
|
|
4479
|
-
const sSQL = `SELECT * FROM [${
|
|
4478
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwTaggedItems] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Tagged Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4480
4479
|
const result = this.ArrayMapFieldNamesToCodeNames('Tagged Items', await dataSource.query(sSQL));
|
|
4481
4480
|
return result;
|
|
4482
4481
|
}
|
|
4483
4482
|
async DatasetItemsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4484
4483
|
this.CheckUserReadPermissions('Dataset Items', userPayload);
|
|
4485
|
-
const sSQL = `SELECT * FROM [${
|
|
4484
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDatasetItems] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Dataset Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4486
4485
|
const result = this.ArrayMapFieldNamesToCodeNames('Dataset Items', await dataSource.query(sSQL));
|
|
4487
4486
|
return result;
|
|
4488
4487
|
}
|
|
4489
4488
|
async CompanyIntegrationRecordMapsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4490
4489
|
this.CheckUserReadPermissions('Company Integration Record Maps', userPayload);
|
|
4491
|
-
const sSQL = `SELECT * FROM [${
|
|
4490
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanyIntegrationRecordMaps] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Record Maps', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4492
4491
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Record Maps', await dataSource.query(sSQL));
|
|
4493
4492
|
return result;
|
|
4494
4493
|
}
|
|
4495
4494
|
async RecordMergeLogsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4496
4495
|
this.CheckUserReadPermissions('Record Merge Logs', userPayload);
|
|
4497
|
-
const sSQL = `SELECT * FROM [${
|
|
4496
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwRecordMergeLogs] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4498
4497
|
const result = this.ArrayMapFieldNamesToCodeNames('Record Merge Logs', await dataSource.query(sSQL));
|
|
4499
4498
|
return result;
|
|
4500
4499
|
}
|
|
4501
4500
|
async QueryFieldsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4502
4501
|
this.CheckUserReadPermissions('Query Fields', userPayload);
|
|
4503
|
-
const sSQL = `SELECT * FROM [${
|
|
4502
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwQueryFields] WHERE [SourceEntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Query Fields', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4504
4503
|
const result = this.ArrayMapFieldNamesToCodeNames('Query Fields', await dataSource.query(sSQL));
|
|
4505
4504
|
return result;
|
|
4506
4505
|
}
|
|
4507
4506
|
async ConversationsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4508
4507
|
this.CheckUserReadPermissions('Conversations', userPayload);
|
|
4509
|
-
const sSQL = `SELECT * FROM [${
|
|
4508
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwConversations] WHERE [LinkedEntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Conversations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4510
4509
|
const result = this.ArrayMapFieldNamesToCodeNames('Conversations', await dataSource.query(sSQL));
|
|
4511
4510
|
return result;
|
|
4512
4511
|
}
|
|
4513
4512
|
async EntityDocumentsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4514
4513
|
this.CheckUserReadPermissions('Entity Documents', userPayload);
|
|
4515
|
-
const sSQL = `SELECT * FROM [${
|
|
4514
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityDocuments] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Documents', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4516
4515
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Documents', await dataSource.query(sSQL));
|
|
4517
4516
|
return result;
|
|
4518
4517
|
}
|
|
4519
4518
|
async DataContextItemsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4520
4519
|
this.CheckUserReadPermissions('Data Context Items', userPayload);
|
|
4521
|
-
const sSQL = `SELECT * FROM [${
|
|
4520
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDataContextItems] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Data Context Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4522
4521
|
const result = this.ArrayMapFieldNamesToCodeNames('Data Context Items', await dataSource.query(sSQL));
|
|
4523
4522
|
return result;
|
|
4524
4523
|
}
|
|
4525
4524
|
async UsersArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4526
4525
|
this.CheckUserReadPermissions('Users', userPayload);
|
|
4527
|
-
const sSQL = `SELECT * FROM [${
|
|
4526
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUsers] WHERE [LinkedEntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Users', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4528
4527
|
const result = this.ArrayMapFieldNamesToCodeNames('Users', await dataSource.query(sSQL));
|
|
4529
4528
|
return result;
|
|
4530
4529
|
}
|
|
4531
4530
|
async EntityRecordDocumentsArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4532
4531
|
this.CheckUserReadPermissions('Entity Record Documents', userPayload);
|
|
4533
|
-
const sSQL = `SELECT * FROM [${
|
|
4532
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityRecordDocuments] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Record Documents', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4534
4533
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Record Documents', await dataSource.query(sSQL));
|
|
4535
4534
|
return result;
|
|
4536
4535
|
}
|
|
4537
4536
|
async FileEntityRecordLinksArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4538
4537
|
this.CheckUserReadPermissions('File Entity Record Links', userPayload);
|
|
4539
|
-
const sSQL = `SELECT * FROM [${
|
|
4538
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwFileEntityRecordLinks] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('File Entity Record Links', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4540
4539
|
const result = this.ArrayMapFieldNamesToCodeNames('File Entity Record Links', await dataSource.query(sSQL));
|
|
4541
4540
|
return result;
|
|
4542
4541
|
}
|
|
4543
4542
|
async UserViewCategoriesArray(entity_, { dataSource, userPayload }, pubSub) {
|
|
4544
4543
|
this.CheckUserReadPermissions('User View Categories', userPayload);
|
|
4545
|
-
const sSQL = `SELECT * FROM [${
|
|
4544
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserViewCategories] WHERE [EntityID]=${entity_.ID} ` + this.getRowLevelSecurityWhereClause('User View Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
4546
4545
|
const result = this.ArrayMapFieldNamesToCodeNames('User View Categories', await dataSource.query(sSQL));
|
|
4547
4546
|
return result;
|
|
4548
4547
|
}
|
|
@@ -5107,6 +5106,22 @@ __decorate([
|
|
|
5107
5106
|
(0, server_1.Field)(() => [mj_core_schema_server_object_types.DataContext_]),
|
|
5108
5107
|
__metadata("design:type", Array)
|
|
5109
5108
|
], User_.prototype, "DataContextsArray", void 0);
|
|
5109
|
+
__decorate([
|
|
5110
|
+
(0, server_1.Field)(() => [mj_core_schema_server_object_types.ReportCategory_]),
|
|
5111
|
+
__metadata("design:type", Array)
|
|
5112
|
+
], User_.prototype, "ReportCategoriesArray", void 0);
|
|
5113
|
+
__decorate([
|
|
5114
|
+
(0, server_1.Field)(() => [mj_core_schema_server_object_types.UserViewCategory_]),
|
|
5115
|
+
__metadata("design:type", Array)
|
|
5116
|
+
], User_.prototype, "UserViewCategoriesArray", void 0);
|
|
5117
|
+
__decorate([
|
|
5118
|
+
(0, server_1.Field)(() => [mj_core_schema_server_object_types.DashboardCategory_]),
|
|
5119
|
+
__metadata("design:type", Array)
|
|
5120
|
+
], User_.prototype, "DashboardCategoriesArray", void 0);
|
|
5121
|
+
__decorate([
|
|
5122
|
+
(0, server_1.Field)(() => [mj_core_schema_server_object_types.QueryCategory_]),
|
|
5123
|
+
__metadata("design:type", Array)
|
|
5124
|
+
], User_.prototype, "QueryCategoriesArray", void 0);
|
|
5110
5125
|
exports.User_ = User_ = __decorate([
|
|
5111
5126
|
(0, server_1.ObjectType)({ description: 'A list of all users who have or had access to the system' })
|
|
5112
5127
|
], User_);
|
|
@@ -5261,124 +5276,148 @@ let UserResolverBase = class UserResolverBase extends server_1.ResolverBase {
|
|
|
5261
5276
|
}
|
|
5262
5277
|
async User(ID, { dataSource, userPayload }, pubSub) {
|
|
5263
5278
|
this.CheckUserReadPermissions('Users', userPayload);
|
|
5264
|
-
const sSQL = `SELECT * FROM [${
|
|
5279
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUsers] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Users', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5265
5280
|
const result = this.MapFieldNamesToCodeNames('Users', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
5266
5281
|
return result;
|
|
5267
5282
|
}
|
|
5268
5283
|
async AllUsers({ dataSource, userPayload }, pubSub) {
|
|
5269
5284
|
this.CheckUserReadPermissions('Users', userPayload);
|
|
5270
|
-
const sSQL = `SELECT * FROM [${
|
|
5285
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUsers]` + this.getRowLevelSecurityWhereClause('Users', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
5271
5286
|
const result = this.ArrayMapFieldNamesToCodeNames('Users', await dataSource.query(sSQL));
|
|
5272
5287
|
return result;
|
|
5273
5288
|
}
|
|
5274
5289
|
async UserApplicationsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5275
5290
|
this.CheckUserReadPermissions('User Applications', userPayload);
|
|
5276
|
-
const sSQL = `SELECT * FROM [${
|
|
5291
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserApplications] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Applications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5277
5292
|
const result = this.ArrayMapFieldNamesToCodeNames('User Applications', await dataSource.query(sSQL));
|
|
5278
5293
|
return result;
|
|
5279
5294
|
}
|
|
5280
5295
|
async UserRolesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5281
5296
|
this.CheckUserReadPermissions('User Roles', userPayload);
|
|
5282
|
-
const sSQL = `SELECT * FROM [${
|
|
5297
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserRoles] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5283
5298
|
const result = this.ArrayMapFieldNamesToCodeNames('User Roles', await dataSource.query(sSQL));
|
|
5284
5299
|
return result;
|
|
5285
5300
|
}
|
|
5286
5301
|
async WorkspacesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5287
5302
|
this.CheckUserReadPermissions('Workspaces', userPayload);
|
|
5288
|
-
const sSQL = `SELECT * FROM [${
|
|
5303
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwWorkspaces] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Workspaces', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5289
5304
|
const result = this.ArrayMapFieldNamesToCodeNames('Workspaces', await dataSource.query(sSQL));
|
|
5290
5305
|
return result;
|
|
5291
5306
|
}
|
|
5292
5307
|
async ReportsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5293
5308
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
5294
|
-
const sSQL = `SELECT * FROM [${
|
|
5309
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwReports] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5295
5310
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
5296
5311
|
return result;
|
|
5297
5312
|
}
|
|
5298
5313
|
async ReportSnapshotsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5299
5314
|
this.CheckUserReadPermissions('Report Snapshots', userPayload);
|
|
5300
|
-
const sSQL = `SELECT * FROM [${
|
|
5315
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwReportSnapshots] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Report Snapshots', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5301
5316
|
const result = this.ArrayMapFieldNamesToCodeNames('Report Snapshots', await dataSource.query(sSQL));
|
|
5302
5317
|
return result;
|
|
5303
5318
|
}
|
|
5304
5319
|
async RecordChangesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5305
5320
|
this.CheckUserReadPermissions('Record Changes', userPayload);
|
|
5306
|
-
const sSQL = `SELECT * FROM [${
|
|
5321
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwRecordChanges] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Record Changes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5307
5322
|
const result = this.ArrayMapFieldNamesToCodeNames('Record Changes', await dataSource.query(sSQL));
|
|
5308
5323
|
return result;
|
|
5309
5324
|
}
|
|
5310
5325
|
async DashboardsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5311
5326
|
this.CheckUserReadPermissions('Dashboards', userPayload);
|
|
5312
|
-
const sSQL = `SELECT * FROM [${
|
|
5327
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDashboards] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Dashboards', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5313
5328
|
const result = this.ArrayMapFieldNamesToCodeNames('Dashboards', await dataSource.query(sSQL));
|
|
5314
5329
|
return result;
|
|
5315
5330
|
}
|
|
5316
5331
|
async UserViewRunsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5317
5332
|
this.CheckUserReadPermissions('User View Runs', userPayload);
|
|
5318
|
-
const sSQL = `SELECT * FROM [${
|
|
5333
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserViewRuns] WHERE [RunByUserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User View Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5319
5334
|
const result = this.ArrayMapFieldNamesToCodeNames('User View Runs', await dataSource.query(sSQL));
|
|
5320
5335
|
return result;
|
|
5321
5336
|
}
|
|
5322
5337
|
async AuditLogsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5323
5338
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
5324
|
-
const sSQL = `SELECT * FROM [${
|
|
5339
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuditLogs] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5325
5340
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL));
|
|
5326
5341
|
return result;
|
|
5327
5342
|
}
|
|
5328
5343
|
async ListsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5329
5344
|
this.CheckUserReadPermissions('Lists', userPayload);
|
|
5330
|
-
const sSQL = `SELECT * FROM [${
|
|
5345
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwLists] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Lists', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5331
5346
|
const result = this.ArrayMapFieldNamesToCodeNames('Lists', await dataSource.query(sSQL));
|
|
5332
5347
|
return result;
|
|
5333
5348
|
}
|
|
5334
5349
|
async UserFavoritesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5335
5350
|
this.CheckUserReadPermissions('User Favorites', userPayload);
|
|
5336
|
-
const sSQL = `SELECT * FROM [${
|
|
5351
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserFavorites] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Favorites', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5337
5352
|
const result = this.ArrayMapFieldNamesToCodeNames('User Favorites', await dataSource.query(sSQL));
|
|
5338
5353
|
return result;
|
|
5339
5354
|
}
|
|
5340
5355
|
async UserRecordLogsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5341
5356
|
this.CheckUserReadPermissions('User Record Logs', userPayload);
|
|
5342
|
-
const sSQL = `SELECT * FROM [${
|
|
5357
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserRecordLogs] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Record Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5343
5358
|
const result = this.ArrayMapFieldNamesToCodeNames('User Record Logs', await dataSource.query(sSQL));
|
|
5344
5359
|
return result;
|
|
5345
5360
|
}
|
|
5346
5361
|
async UserViewsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5347
5362
|
this.CheckUserReadPermissions('User Views', userPayload);
|
|
5348
|
-
const sSQL = `SELECT * FROM [${
|
|
5363
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserViews] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5349
5364
|
const result = this.ArrayMapFieldNamesToCodeNames('User Views', await dataSource.query(sSQL));
|
|
5350
5365
|
return result;
|
|
5351
5366
|
}
|
|
5352
5367
|
async CompanyIntegrationRunsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5353
5368
|
this.CheckUserReadPermissions('Company Integration Runs', userPayload);
|
|
5354
|
-
const sSQL = `SELECT * FROM [${
|
|
5369
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanyIntegrationRuns] WHERE [RunByUserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5355
5370
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Runs', await dataSource.query(sSQL));
|
|
5356
5371
|
return result;
|
|
5357
5372
|
}
|
|
5358
5373
|
async UserNotificationsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5359
5374
|
this.CheckUserReadPermissions('User Notifications', userPayload);
|
|
5360
|
-
const sSQL = `SELECT * FROM [${
|
|
5375
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserNotifications] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User Notifications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5361
5376
|
const result = this.ArrayMapFieldNamesToCodeNames('User Notifications', await dataSource.query(sSQL));
|
|
5362
5377
|
return result;
|
|
5363
5378
|
}
|
|
5364
5379
|
async ConversationsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5365
5380
|
this.CheckUserReadPermissions('Conversations', userPayload);
|
|
5366
|
-
const sSQL = `SELECT * FROM [${
|
|
5381
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwConversations] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Conversations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5367
5382
|
const result = this.ArrayMapFieldNamesToCodeNames('Conversations', await dataSource.query(sSQL));
|
|
5368
5383
|
return result;
|
|
5369
5384
|
}
|
|
5370
5385
|
async RecordMergeLogsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5371
5386
|
this.CheckUserReadPermissions('Record Merge Logs', userPayload);
|
|
5372
|
-
const sSQL = `SELECT * FROM [${
|
|
5387
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwRecordMergeLogs] WHERE [InitiatedByUserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5373
5388
|
const result = this.ArrayMapFieldNamesToCodeNames('Record Merge Logs', await dataSource.query(sSQL));
|
|
5374
5389
|
return result;
|
|
5375
5390
|
}
|
|
5376
5391
|
async DataContextsArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5377
5392
|
this.CheckUserReadPermissions('Data Contexts', userPayload);
|
|
5378
|
-
const sSQL = `SELECT * FROM [${
|
|
5393
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDataContexts] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Data Contexts', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5379
5394
|
const result = this.ArrayMapFieldNamesToCodeNames('Data Contexts', await dataSource.query(sSQL));
|
|
5380
5395
|
return result;
|
|
5381
5396
|
}
|
|
5397
|
+
async ReportCategoriesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5398
|
+
this.CheckUserReadPermissions('Report Categories', userPayload);
|
|
5399
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwReportCategories] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Report Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5400
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Report Categories', await dataSource.query(sSQL));
|
|
5401
|
+
return result;
|
|
5402
|
+
}
|
|
5403
|
+
async UserViewCategoriesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5404
|
+
this.CheckUserReadPermissions('User View Categories', userPayload);
|
|
5405
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserViewCategories] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('User View Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5406
|
+
const result = this.ArrayMapFieldNamesToCodeNames('User View Categories', await dataSource.query(sSQL));
|
|
5407
|
+
return result;
|
|
5408
|
+
}
|
|
5409
|
+
async DashboardCategoriesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5410
|
+
this.CheckUserReadPermissions('Dashboard Categories', userPayload);
|
|
5411
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDashboardCategories] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Dashboard Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5412
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Dashboard Categories', await dataSource.query(sSQL));
|
|
5413
|
+
return result;
|
|
5414
|
+
}
|
|
5415
|
+
async QueryCategoriesArray(user_, { dataSource, userPayload }, pubSub) {
|
|
5416
|
+
this.CheckUserReadPermissions('Query Categories', userPayload);
|
|
5417
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwQueryCategories] WHERE [UserID]=${user_.ID} ` + this.getRowLevelSecurityWhereClause('Query Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5418
|
+
const result = this.ArrayMapFieldNamesToCodeNames('Query Categories', await dataSource.query(sSQL));
|
|
5419
|
+
return result;
|
|
5420
|
+
}
|
|
5382
5421
|
async CreateUser(input, { dataSource, userPayload }, pubSub) {
|
|
5383
5422
|
if (await this.BeforeCreate(dataSource, input)) {
|
|
5384
5423
|
const entityObject = await new core_1.Metadata().GetEntityObject('Users', this.GetUserFromPayload(userPayload));
|
|
@@ -5651,6 +5690,42 @@ __decorate([
|
|
|
5651
5690
|
__metadata("design:paramtypes", [User_, Object, server_1.PubSubEngine]),
|
|
5652
5691
|
__metadata("design:returntype", Promise)
|
|
5653
5692
|
], UserResolverBase.prototype, "DataContextsArray", null);
|
|
5693
|
+
__decorate([
|
|
5694
|
+
(0, server_1.FieldResolver)(() => [mj_core_schema_server_object_types.ReportCategory_]),
|
|
5695
|
+
__param(0, (0, server_1.Root)()),
|
|
5696
|
+
__param(1, (0, server_1.Ctx)()),
|
|
5697
|
+
__param(2, (0, server_1.PubSub)()),
|
|
5698
|
+
__metadata("design:type", Function),
|
|
5699
|
+
__metadata("design:paramtypes", [User_, Object, server_1.PubSubEngine]),
|
|
5700
|
+
__metadata("design:returntype", Promise)
|
|
5701
|
+
], UserResolverBase.prototype, "ReportCategoriesArray", null);
|
|
5702
|
+
__decorate([
|
|
5703
|
+
(0, server_1.FieldResolver)(() => [mj_core_schema_server_object_types.UserViewCategory_]),
|
|
5704
|
+
__param(0, (0, server_1.Root)()),
|
|
5705
|
+
__param(1, (0, server_1.Ctx)()),
|
|
5706
|
+
__param(2, (0, server_1.PubSub)()),
|
|
5707
|
+
__metadata("design:type", Function),
|
|
5708
|
+
__metadata("design:paramtypes", [User_, Object, server_1.PubSubEngine]),
|
|
5709
|
+
__metadata("design:returntype", Promise)
|
|
5710
|
+
], UserResolverBase.prototype, "UserViewCategoriesArray", null);
|
|
5711
|
+
__decorate([
|
|
5712
|
+
(0, server_1.FieldResolver)(() => [mj_core_schema_server_object_types.DashboardCategory_]),
|
|
5713
|
+
__param(0, (0, server_1.Root)()),
|
|
5714
|
+
__param(1, (0, server_1.Ctx)()),
|
|
5715
|
+
__param(2, (0, server_1.PubSub)()),
|
|
5716
|
+
__metadata("design:type", Function),
|
|
5717
|
+
__metadata("design:paramtypes", [User_, Object, server_1.PubSubEngine]),
|
|
5718
|
+
__metadata("design:returntype", Promise)
|
|
5719
|
+
], UserResolverBase.prototype, "DashboardCategoriesArray", null);
|
|
5720
|
+
__decorate([
|
|
5721
|
+
(0, server_1.FieldResolver)(() => [mj_core_schema_server_object_types.QueryCategory_]),
|
|
5722
|
+
__param(0, (0, server_1.Root)()),
|
|
5723
|
+
__param(1, (0, server_1.Ctx)()),
|
|
5724
|
+
__param(2, (0, server_1.PubSub)()),
|
|
5725
|
+
__metadata("design:type", Function),
|
|
5726
|
+
__metadata("design:paramtypes", [User_, Object, server_1.PubSubEngine]),
|
|
5727
|
+
__metadata("design:returntype", Promise)
|
|
5728
|
+
], UserResolverBase.prototype, "QueryCategoriesArray", null);
|
|
5654
5729
|
__decorate([
|
|
5655
5730
|
(0, server_1.Mutation)(() => User_),
|
|
5656
5731
|
__param(0, (0, server_1.Arg)('input', () => CreateUserInput)),
|
|
@@ -5986,13 +6061,13 @@ let EntityRelationshipResolver = class EntityRelationshipResolver extends server
|
|
|
5986
6061
|
}
|
|
5987
6062
|
async EntityRelationship(ID, { dataSource, userPayload }, pubSub) {
|
|
5988
6063
|
this.CheckUserReadPermissions('Entity Relationships', userPayload);
|
|
5989
|
-
const sSQL = `SELECT * FROM [${
|
|
6064
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityRelationships] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Relationships', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
5990
6065
|
const result = this.MapFieldNamesToCodeNames('Entity Relationships', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
5991
6066
|
return result;
|
|
5992
6067
|
}
|
|
5993
6068
|
async AllEntityRelationships({ dataSource, userPayload }, pubSub) {
|
|
5994
6069
|
this.CheckUserReadPermissions('Entity Relationships', userPayload);
|
|
5995
|
-
const sSQL = `SELECT * FROM [${
|
|
6070
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityRelationships]` + this.getRowLevelSecurityWhereClause('Entity Relationships', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
5996
6071
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Relationships', await dataSource.query(sSQL));
|
|
5997
6072
|
return result;
|
|
5998
6073
|
}
|
|
@@ -6283,7 +6358,7 @@ let UserRecordLogResolver = class UserRecordLogResolver extends server_1.Resolve
|
|
|
6283
6358
|
}
|
|
6284
6359
|
async UserRecordLog(ID, { dataSource, userPayload }, pubSub) {
|
|
6285
6360
|
this.CheckUserReadPermissions('User Record Logs', userPayload);
|
|
6286
|
-
const sSQL = `SELECT * FROM [${
|
|
6361
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserRecordLogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Record Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6287
6362
|
const result = this.MapFieldNamesToCodeNames('User Record Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
6288
6363
|
return result;
|
|
6289
6364
|
}
|
|
@@ -6693,31 +6768,31 @@ let UserViewResolverBase = class UserViewResolverBase extends server_1.ResolverB
|
|
|
6693
6768
|
}
|
|
6694
6769
|
async UserView(ID, { dataSource, userPayload }, pubSub) {
|
|
6695
6770
|
this.CheckUserReadPermissions('User Views', userPayload);
|
|
6696
|
-
const sSQL = `SELECT * FROM [${
|
|
6771
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserViews] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6697
6772
|
const result = this.MapFieldNamesToCodeNames('User Views', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
6698
6773
|
return result;
|
|
6699
6774
|
}
|
|
6700
6775
|
async AllUserViews({ dataSource, userPayload }, pubSub) {
|
|
6701
6776
|
this.CheckUserReadPermissions('User Views', userPayload);
|
|
6702
|
-
const sSQL = `SELECT * FROM [${
|
|
6777
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserViews]` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
6703
6778
|
const result = this.ArrayMapFieldNamesToCodeNames('User Views', await dataSource.query(sSQL));
|
|
6704
6779
|
return result;
|
|
6705
6780
|
}
|
|
6706
6781
|
async EntityRelationshipsArray(userview_, { dataSource, userPayload }, pubSub) {
|
|
6707
6782
|
this.CheckUserReadPermissions('Entity Relationships', userPayload);
|
|
6708
|
-
const sSQL = `SELECT * FROM [${
|
|
6783
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityRelationships] WHERE [DisplayUserViewGUID]=${userview_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Relationships', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6709
6784
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Relationships', await dataSource.query(sSQL));
|
|
6710
6785
|
return result;
|
|
6711
6786
|
}
|
|
6712
6787
|
async UserViewRunsArray(userview_, { dataSource, userPayload }, pubSub) {
|
|
6713
6788
|
this.CheckUserReadPermissions('User View Runs', userPayload);
|
|
6714
|
-
const sSQL = `SELECT * FROM [${
|
|
6789
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserViewRuns] WHERE [UserViewID]=${userview_.ID} ` + this.getRowLevelSecurityWhereClause('User View Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6715
6790
|
const result = this.ArrayMapFieldNamesToCodeNames('User View Runs', await dataSource.query(sSQL));
|
|
6716
6791
|
return result;
|
|
6717
6792
|
}
|
|
6718
6793
|
async DataContextItemsArray(userview_, { dataSource, userPayload }, pubSub) {
|
|
6719
6794
|
this.CheckUserReadPermissions('Data Context Items', userPayload);
|
|
6720
|
-
const sSQL = `SELECT * FROM [${
|
|
6795
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDataContextItems] WHERE [ViewID]=${userview_.ID} ` + this.getRowLevelSecurityWhereClause('Data Context Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
6721
6796
|
const result = this.ArrayMapFieldNamesToCodeNames('Data Context Items', await dataSource.query(sSQL));
|
|
6722
6797
|
return result;
|
|
6723
6798
|
}
|
|
@@ -7022,25 +7097,25 @@ let CompanyIntegrationRunResolver = class CompanyIntegrationRunResolver extends
|
|
|
7022
7097
|
}
|
|
7023
7098
|
async CompanyIntegrationRun(ID, { dataSource, userPayload }, pubSub) {
|
|
7024
7099
|
this.CheckUserReadPermissions('Company Integration Runs', userPayload);
|
|
7025
|
-
const sSQL = `SELECT * FROM [${
|
|
7100
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanyIntegrationRuns] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7026
7101
|
const result = this.MapFieldNamesToCodeNames('Company Integration Runs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
7027
7102
|
return result;
|
|
7028
7103
|
}
|
|
7029
7104
|
async CompanyIntegrationRunAPILogsArray(companyintegrationrun_, { dataSource, userPayload }, pubSub) {
|
|
7030
7105
|
this.CheckUserReadPermissions('Company Integration Run API Logs', userPayload);
|
|
7031
|
-
const sSQL = `SELECT * FROM [${
|
|
7106
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanyIntegrationRunAPILogs] WHERE [CompanyIntegrationRunID]=${companyintegrationrun_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run API Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7032
7107
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Run API Logs', await dataSource.query(sSQL));
|
|
7033
7108
|
return result;
|
|
7034
7109
|
}
|
|
7035
7110
|
async ErrorLogsArray(companyintegrationrun_, { dataSource, userPayload }, pubSub) {
|
|
7036
7111
|
this.CheckUserReadPermissions('Error Logs', userPayload);
|
|
7037
|
-
const sSQL = `SELECT * FROM [${
|
|
7112
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwErrorLogs] WHERE [CompanyIntegrationRunID]=${companyintegrationrun_.ID} ` + this.getRowLevelSecurityWhereClause('Error Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7038
7113
|
const result = this.ArrayMapFieldNamesToCodeNames('Error Logs', await dataSource.query(sSQL));
|
|
7039
7114
|
return result;
|
|
7040
7115
|
}
|
|
7041
7116
|
async CompanyIntegrationRunDetailsArray(companyintegrationrun_, { dataSource, userPayload }, pubSub) {
|
|
7042
7117
|
this.CheckUserReadPermissions('Company Integration Run Details', userPayload);
|
|
7043
|
-
const sSQL = `SELECT * FROM [${
|
|
7118
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanyIntegrationRunDetails] WHERE [CompanyIntegrationRunID]=${companyintegrationrun_.ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7044
7119
|
const result = this.ArrayMapFieldNamesToCodeNames('Company Integration Run Details', await dataSource.query(sSQL));
|
|
7045
7120
|
return result;
|
|
7046
7121
|
}
|
|
@@ -7279,13 +7354,13 @@ let CompanyIntegrationRunDetailResolver = class CompanyIntegrationRunDetailResol
|
|
|
7279
7354
|
}
|
|
7280
7355
|
async CompanyIntegrationRunDetail(ID, { dataSource, userPayload }, pubSub) {
|
|
7281
7356
|
this.CheckUserReadPermissions('Company Integration Run Details', userPayload);
|
|
7282
|
-
const sSQL = `SELECT * FROM [${
|
|
7357
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanyIntegrationRunDetails] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7283
7358
|
const result = this.MapFieldNamesToCodeNames('Company Integration Run Details', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
7284
7359
|
return result;
|
|
7285
7360
|
}
|
|
7286
7361
|
async ErrorLogsArray(companyintegrationrundetail_, { dataSource, userPayload }, pubSub) {
|
|
7287
7362
|
this.CheckUserReadPermissions('Error Logs', userPayload);
|
|
7288
|
-
const sSQL = `SELECT * FROM [${
|
|
7363
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwErrorLogs] WHERE [CompanyIntegrationRunDetailID]=${companyintegrationrundetail_.ID} ` + this.getRowLevelSecurityWhereClause('Error Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7289
7364
|
const result = this.ArrayMapFieldNamesToCodeNames('Error Logs', await dataSource.query(sSQL));
|
|
7290
7365
|
return result;
|
|
7291
7366
|
}
|
|
@@ -7509,7 +7584,7 @@ let ErrorLogResolver = class ErrorLogResolver extends server_1.ResolverBase {
|
|
|
7509
7584
|
}
|
|
7510
7585
|
async ErrorLog(ID, { dataSource, userPayload }, pubSub) {
|
|
7511
7586
|
this.CheckUserReadPermissions('Error Logs', userPayload);
|
|
7512
|
-
const sSQL = `SELECT * FROM [${
|
|
7587
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwErrorLogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Error Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7513
7588
|
const result = this.MapFieldNamesToCodeNames('Error Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
7514
7589
|
return result;
|
|
7515
7590
|
}
|
|
@@ -7701,25 +7776,25 @@ let ApplicationResolver = class ApplicationResolver extends server_1.ResolverBas
|
|
|
7701
7776
|
}
|
|
7702
7777
|
async Application(ID, { dataSource, userPayload }, pubSub) {
|
|
7703
7778
|
this.CheckUserReadPermissions('Applications', userPayload);
|
|
7704
|
-
const sSQL = `SELECT * FROM [${
|
|
7779
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwApplications] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Applications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7705
7780
|
const result = this.MapFieldNamesToCodeNames('Applications', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
7706
7781
|
return result;
|
|
7707
7782
|
}
|
|
7708
7783
|
async AllApplications({ dataSource, userPayload }, pubSub) {
|
|
7709
7784
|
this.CheckUserReadPermissions('Applications', userPayload);
|
|
7710
|
-
const sSQL = `SELECT * FROM [${
|
|
7785
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwApplications]` + this.getRowLevelSecurityWhereClause('Applications', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
7711
7786
|
const result = this.ArrayMapFieldNamesToCodeNames('Applications', await dataSource.query(sSQL));
|
|
7712
7787
|
return result;
|
|
7713
7788
|
}
|
|
7714
7789
|
async ApplicationEntitiesArray(application_, { dataSource, userPayload }, pubSub) {
|
|
7715
7790
|
this.CheckUserReadPermissions('Application Entities', userPayload);
|
|
7716
|
-
const sSQL = `SELECT * FROM [${
|
|
7791
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwApplicationEntities] WHERE [ApplicationID]=${application_.ID} ` + this.getRowLevelSecurityWhereClause('Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7717
7792
|
const result = this.ArrayMapFieldNamesToCodeNames('Application Entities', await dataSource.query(sSQL));
|
|
7718
7793
|
return result;
|
|
7719
7794
|
}
|
|
7720
7795
|
async UserApplicationsArray(application_, { dataSource, userPayload }, pubSub) {
|
|
7721
7796
|
this.CheckUserReadPermissions('User Applications', userPayload);
|
|
7722
|
-
const sSQL = `SELECT * FROM [${
|
|
7797
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserApplications] WHERE [ApplicationID]=${application_.ID} ` + this.getRowLevelSecurityWhereClause('User Applications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
7723
7798
|
const result = this.ArrayMapFieldNamesToCodeNames('User Applications', await dataSource.query(sSQL));
|
|
7724
7799
|
return result;
|
|
7725
7800
|
}
|
|
@@ -8043,7 +8118,7 @@ let ApplicationEntityResolver = class ApplicationEntityResolver extends server_1
|
|
|
8043
8118
|
}
|
|
8044
8119
|
async ApplicationEntity(ID, { dataSource, userPayload }, pubSub) {
|
|
8045
8120
|
this.CheckUserReadPermissions('Application Entities', userPayload);
|
|
8046
|
-
const sSQL = `SELECT * FROM [${
|
|
8121
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwApplicationEntities] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8047
8122
|
const result = this.MapFieldNamesToCodeNames('Application Entities', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
8048
8123
|
return result;
|
|
8049
8124
|
}
|
|
@@ -8412,13 +8487,13 @@ let EntityPermissionResolver = class EntityPermissionResolver extends server_1.R
|
|
|
8412
8487
|
}
|
|
8413
8488
|
async EntityPermission(ID, { dataSource, userPayload }, pubSub) {
|
|
8414
8489
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
8415
|
-
const sSQL = `SELECT * FROM [${
|
|
8490
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityPermissions] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8416
8491
|
const result = this.MapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
8417
8492
|
return result;
|
|
8418
8493
|
}
|
|
8419
8494
|
async AllEntityPermissions({ dataSource, userPayload }, pubSub) {
|
|
8420
8495
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
8421
|
-
const sSQL = `SELECT * FROM [${
|
|
8496
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityPermissions]` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
8422
8497
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL));
|
|
8423
8498
|
return result;
|
|
8424
8499
|
}
|
|
@@ -8685,7 +8760,7 @@ let UserApplicationEntityResolver = class UserApplicationEntityResolver extends
|
|
|
8685
8760
|
}
|
|
8686
8761
|
async UserApplicationEntity(ID, { dataSource, userPayload }, pubSub) {
|
|
8687
8762
|
this.CheckUserReadPermissions('User Application Entities', userPayload);
|
|
8688
|
-
const sSQL = `SELECT * FROM [${
|
|
8763
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserApplicationEntities] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8689
8764
|
const result = this.MapFieldNamesToCodeNames('User Application Entities', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
8690
8765
|
return result;
|
|
8691
8766
|
}
|
|
@@ -8933,13 +9008,13 @@ let UserApplicationResolver = class UserApplicationResolver extends server_1.Res
|
|
|
8933
9008
|
}
|
|
8934
9009
|
async UserApplication(ID, { dataSource, userPayload }, pubSub) {
|
|
8935
9010
|
this.CheckUserReadPermissions('User Applications', userPayload);
|
|
8936
|
-
const sSQL = `SELECT * FROM [${
|
|
9011
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserApplications] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Applications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8937
9012
|
const result = this.MapFieldNamesToCodeNames('User Applications', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
8938
9013
|
return result;
|
|
8939
9014
|
}
|
|
8940
9015
|
async UserApplicationEntitiesArray(userapplication_, { dataSource, userPayload }, pubSub) {
|
|
8941
9016
|
this.CheckUserReadPermissions('User Application Entities', userPayload);
|
|
8942
|
-
const sSQL = `SELECT * FROM [${
|
|
9017
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserApplicationEntities] WHERE [UserApplicationID]=${userapplication_.ID} ` + this.getRowLevelSecurityWhereClause('User Application Entities', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
8943
9018
|
const result = this.ArrayMapFieldNamesToCodeNames('User Application Entities', await dataSource.query(sSQL));
|
|
8944
9019
|
return result;
|
|
8945
9020
|
}
|
|
@@ -9171,7 +9246,7 @@ let CompanyIntegrationRunAPILogResolver = class CompanyIntegrationRunAPILogResol
|
|
|
9171
9246
|
}
|
|
9172
9247
|
async CompanyIntegrationRunAPILog(ID, { dataSource, userPayload }, pubSub) {
|
|
9173
9248
|
this.CheckUserReadPermissions('Company Integration Run API Logs', userPayload);
|
|
9174
|
-
const sSQL = `SELECT * FROM [${
|
|
9249
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanyIntegrationRunAPILogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Run API Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9175
9250
|
const result = this.MapFieldNamesToCodeNames('Company Integration Run API Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
9176
9251
|
return result;
|
|
9177
9252
|
}
|
|
@@ -9417,13 +9492,13 @@ let ListResolver = class ListResolver extends server_1.ResolverBase {
|
|
|
9417
9492
|
}
|
|
9418
9493
|
async List(ID, { dataSource, userPayload }, pubSub) {
|
|
9419
9494
|
this.CheckUserReadPermissions('Lists', userPayload);
|
|
9420
|
-
const sSQL = `SELECT * FROM [${
|
|
9495
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwLists] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Lists', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9421
9496
|
const result = this.MapFieldNamesToCodeNames('Lists', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
9422
9497
|
return result;
|
|
9423
9498
|
}
|
|
9424
9499
|
async ListDetailsArray(list_, { dataSource, userPayload }, pubSub) {
|
|
9425
9500
|
this.CheckUserReadPermissions('List Details', userPayload);
|
|
9426
|
-
const sSQL = `SELECT * FROM [${
|
|
9501
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwListDetails] WHERE [ListID]=${list_.ID} ` + this.getRowLevelSecurityWhereClause('List Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9427
9502
|
const result = this.ArrayMapFieldNamesToCodeNames('List Details', await dataSource.query(sSQL));
|
|
9428
9503
|
return result;
|
|
9429
9504
|
}
|
|
@@ -9677,7 +9752,7 @@ let ListDetailResolver = class ListDetailResolver extends server_1.ResolverBase
|
|
|
9677
9752
|
}
|
|
9678
9753
|
async ListDetail(ID, { dataSource, userPayload }, pubSub) {
|
|
9679
9754
|
this.CheckUserReadPermissions('List Details', userPayload);
|
|
9680
|
-
const sSQL = `SELECT * FROM [${
|
|
9755
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwListDetails] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('List Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9681
9756
|
const result = this.MapFieldNamesToCodeNames('List Details', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
9682
9757
|
return result;
|
|
9683
9758
|
}
|
|
@@ -9936,13 +10011,13 @@ let UserViewRunResolver = class UserViewRunResolver extends server_1.ResolverBas
|
|
|
9936
10011
|
}
|
|
9937
10012
|
async UserViewRun(ID, { dataSource, userPayload }, pubSub) {
|
|
9938
10013
|
this.CheckUserReadPermissions('User View Runs', userPayload);
|
|
9939
|
-
const sSQL = `SELECT * FROM [${
|
|
10014
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserViewRuns] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User View Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9940
10015
|
const result = this.MapFieldNamesToCodeNames('User View Runs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
9941
10016
|
return result;
|
|
9942
10017
|
}
|
|
9943
10018
|
async UserViewRunDetailsArray(userviewrun_, { dataSource, userPayload }, pubSub) {
|
|
9944
10019
|
this.CheckUserReadPermissions('User View Run Details', userPayload);
|
|
9945
|
-
const sSQL = `SELECT * FROM [${
|
|
10020
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserViewRunDetails] WHERE [UserViewRunID]=${userviewrun_.ID} ` + this.getRowLevelSecurityWhereClause('User View Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
9946
10021
|
const result = this.ArrayMapFieldNamesToCodeNames('User View Run Details', await dataSource.query(sSQL));
|
|
9947
10022
|
return result;
|
|
9948
10023
|
}
|
|
@@ -10161,7 +10236,7 @@ let UserViewRunDetailResolver = class UserViewRunDetailResolver extends server_1
|
|
|
10161
10236
|
}
|
|
10162
10237
|
async UserViewRunDetail(ID, { dataSource, userPayload }, pubSub) {
|
|
10163
10238
|
this.CheckUserReadPermissions('User View Run Details', userPayload);
|
|
10164
|
-
const sSQL = `SELECT * FROM [${
|
|
10239
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserViewRunDetails] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User View Run Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10165
10240
|
const result = this.MapFieldNamesToCodeNames('User View Run Details', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
10166
10241
|
return result;
|
|
10167
10242
|
}
|
|
@@ -10395,7 +10470,7 @@ let WorkflowRunResolver = class WorkflowRunResolver extends server_1.ResolverBas
|
|
|
10395
10470
|
}
|
|
10396
10471
|
async WorkflowRun(ID, { dataSource, userPayload }, pubSub) {
|
|
10397
10472
|
this.CheckUserReadPermissions('Workflow Runs', userPayload);
|
|
10398
|
-
const sSQL = `SELECT * FROM [${
|
|
10473
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwWorkflowRuns] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Workflow Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10399
10474
|
const result = this.MapFieldNamesToCodeNames('Workflow Runs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
10400
10475
|
return result;
|
|
10401
10476
|
}
|
|
@@ -10637,19 +10712,19 @@ let WorkflowResolver = class WorkflowResolver extends server_1.ResolverBase {
|
|
|
10637
10712
|
}
|
|
10638
10713
|
async Workflow(ID, { dataSource, userPayload }, pubSub) {
|
|
10639
10714
|
this.CheckUserReadPermissions('Workflows', userPayload);
|
|
10640
|
-
const sSQL = `SELECT * FROM [${
|
|
10715
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwWorkflows] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Workflows', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10641
10716
|
const result = this.MapFieldNamesToCodeNames('Workflows', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
10642
10717
|
return result;
|
|
10643
10718
|
}
|
|
10644
10719
|
async ReportsArray(workflow_, { dataSource, userPayload }, pubSub) {
|
|
10645
10720
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
10646
|
-
const sSQL = `SELECT * FROM [${
|
|
10721
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwReports] WHERE [OutputWorkflowID]=${workflow_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10647
10722
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
10648
10723
|
return result;
|
|
10649
10724
|
}
|
|
10650
10725
|
async WorkflowRunsArray(workflow_, { dataSource, userPayload }, pubSub) {
|
|
10651
10726
|
this.CheckUserReadPermissions('Workflow Runs', userPayload);
|
|
10652
|
-
const sSQL = `SELECT * FROM [${
|
|
10727
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwWorkflowRuns] WHERE [WorkflowName]=${workflow_.ID} ` + this.getRowLevelSecurityWhereClause('Workflow Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10653
10728
|
const result = this.ArrayMapFieldNamesToCodeNames('Workflow Runs', await dataSource.query(sSQL));
|
|
10654
10729
|
return result;
|
|
10655
10730
|
}
|
|
@@ -10858,13 +10933,13 @@ let WorkflowEngineResolver = class WorkflowEngineResolver extends server_1.Resol
|
|
|
10858
10933
|
}
|
|
10859
10934
|
async WorkflowEngine(ID, { dataSource, userPayload }, pubSub) {
|
|
10860
10935
|
this.CheckUserReadPermissions('Workflow Engines', userPayload);
|
|
10861
|
-
const sSQL = `SELECT * FROM [${
|
|
10936
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwWorkflowEngines] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Workflow Engines', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10862
10937
|
const result = this.MapFieldNamesToCodeNames('Workflow Engines', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
10863
10938
|
return result;
|
|
10864
10939
|
}
|
|
10865
10940
|
async WorkflowsArray(workflowengine_, { dataSource, userPayload }, pubSub) {
|
|
10866
10941
|
this.CheckUserReadPermissions('Workflows', userPayload);
|
|
10867
|
-
const sSQL = `SELECT * FROM [${
|
|
10942
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwWorkflows] WHERE [WorkflowEngineName]=${workflowengine_.ID} ` + this.getRowLevelSecurityWhereClause('Workflows', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
10868
10943
|
const result = this.ArrayMapFieldNamesToCodeNames('Workflows', await dataSource.query(sSQL));
|
|
10869
10944
|
return result;
|
|
10870
10945
|
}
|
|
@@ -11096,7 +11171,7 @@ let RecordChangeResolver = class RecordChangeResolver extends server_1.ResolverB
|
|
|
11096
11171
|
}
|
|
11097
11172
|
async RecordChange(ID, { dataSource, userPayload }, pubSub) {
|
|
11098
11173
|
this.CheckUserReadPermissions('Record Changes', userPayload);
|
|
11099
|
-
const sSQL = `SELECT * FROM [${
|
|
11174
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwRecordChanges] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Record Changes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11100
11175
|
const result = this.MapFieldNamesToCodeNames('Record Changes', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
11101
11176
|
return result;
|
|
11102
11177
|
}
|
|
@@ -11265,13 +11340,13 @@ let UserRoleResolver = class UserRoleResolver extends server_1.ResolverBase {
|
|
|
11265
11340
|
}
|
|
11266
11341
|
async UserRole(ID, { dataSource, userPayload }, pubSub) {
|
|
11267
11342
|
this.CheckUserReadPermissions('User Roles', userPayload);
|
|
11268
|
-
const sSQL = `SELECT * FROM [${
|
|
11343
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserRoles] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11269
11344
|
const result = this.MapFieldNamesToCodeNames('User Roles', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
11270
11345
|
return result;
|
|
11271
11346
|
}
|
|
11272
11347
|
async AllUserRoles({ dataSource, userPayload }, pubSub) {
|
|
11273
11348
|
this.CheckUserReadPermissions('User Roles', userPayload);
|
|
11274
|
-
const sSQL = `SELECT * FROM [${
|
|
11349
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserRoles]` + this.getRowLevelSecurityWhereClause('User Roles', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
11275
11350
|
const result = this.ArrayMapFieldNamesToCodeNames('User Roles', await dataSource.query(sSQL));
|
|
11276
11351
|
return result;
|
|
11277
11352
|
}
|
|
@@ -11468,19 +11543,19 @@ let RowLevelSecurityFilterResolver = class RowLevelSecurityFilterResolver extend
|
|
|
11468
11543
|
}
|
|
11469
11544
|
async RowLevelSecurityFilter(ID, { dataSource, userPayload }, pubSub) {
|
|
11470
11545
|
this.CheckUserReadPermissions('Row Level Security Filters', userPayload);
|
|
11471
|
-
const sSQL = `SELECT * FROM [${
|
|
11546
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwRowLevelSecurityFilters] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Row Level Security Filters', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11472
11547
|
const result = this.MapFieldNamesToCodeNames('Row Level Security Filters', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
11473
11548
|
return result;
|
|
11474
11549
|
}
|
|
11475
11550
|
async AllRowLevelSecurityFilters({ dataSource, userPayload }, pubSub) {
|
|
11476
11551
|
this.CheckUserReadPermissions('Row Level Security Filters', userPayload);
|
|
11477
|
-
const sSQL = `SELECT * FROM [${
|
|
11552
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwRowLevelSecurityFilters]` + this.getRowLevelSecurityWhereClause('Row Level Security Filters', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
11478
11553
|
const result = this.ArrayMapFieldNamesToCodeNames('Row Level Security Filters', await dataSource.query(sSQL));
|
|
11479
11554
|
return result;
|
|
11480
11555
|
}
|
|
11481
11556
|
async EntityPermissionsArray(rowlevelsecurityfilter_, { dataSource, userPayload }, pubSub) {
|
|
11482
11557
|
this.CheckUserReadPermissions('Entity Permissions', userPayload);
|
|
11483
|
-
const sSQL = `SELECT * FROM [${
|
|
11558
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityPermissions] WHERE [ReadRLSFilterID]=${rowlevelsecurityfilter_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11484
11559
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Permissions', await dataSource.query(sSQL));
|
|
11485
11560
|
return result;
|
|
11486
11561
|
}
|
|
@@ -11735,7 +11810,7 @@ let AuditLogResolver = class AuditLogResolver extends server_1.ResolverBase {
|
|
|
11735
11810
|
}
|
|
11736
11811
|
async AuditLog(ID, { dataSource, userPayload }, pubSub) {
|
|
11737
11812
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
11738
|
-
const sSQL = `SELECT * FROM [${
|
|
11813
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuditLogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11739
11814
|
const result = this.MapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
11740
11815
|
return result;
|
|
11741
11816
|
}
|
|
@@ -11943,37 +12018,37 @@ let AuthorizationResolver = class AuthorizationResolver extends server_1.Resolve
|
|
|
11943
12018
|
}
|
|
11944
12019
|
async Authorization(ID, { dataSource, userPayload }, pubSub) {
|
|
11945
12020
|
this.CheckUserReadPermissions('Authorizations', userPayload);
|
|
11946
|
-
const sSQL = `SELECT * FROM [${
|
|
12021
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuthorizations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Authorizations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11947
12022
|
const result = this.MapFieldNamesToCodeNames('Authorizations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
11948
12023
|
return result;
|
|
11949
12024
|
}
|
|
11950
12025
|
async AllAuthorizations({ dataSource, userPayload }, pubSub) {
|
|
11951
12026
|
this.CheckUserReadPermissions('Authorizations', userPayload);
|
|
11952
|
-
const sSQL = `SELECT * FROM [${
|
|
12027
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuthorizations]` + this.getRowLevelSecurityWhereClause('Authorizations', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
11953
12028
|
const result = this.ArrayMapFieldNamesToCodeNames('Authorizations', await dataSource.query(sSQL));
|
|
11954
12029
|
return result;
|
|
11955
12030
|
}
|
|
11956
12031
|
async AuthorizationRolesArray(authorization_, { dataSource, userPayload }, pubSub) {
|
|
11957
12032
|
this.CheckUserReadPermissions('Authorization Roles', userPayload);
|
|
11958
|
-
const sSQL = `SELECT * FROM [${
|
|
12033
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuthorizationRoles] WHERE [AuthorizationID]=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Authorization Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11959
12034
|
const result = this.ArrayMapFieldNamesToCodeNames('Authorization Roles', await dataSource.query(sSQL));
|
|
11960
12035
|
return result;
|
|
11961
12036
|
}
|
|
11962
12037
|
async AuthorizationsArray(authorization_, { dataSource, userPayload }, pubSub) {
|
|
11963
12038
|
this.CheckUserReadPermissions('Authorizations', userPayload);
|
|
11964
|
-
const sSQL = `SELECT * FROM [${
|
|
12039
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuthorizations] WHERE [ParentID]=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Authorizations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11965
12040
|
const result = this.ArrayMapFieldNamesToCodeNames('Authorizations', await dataSource.query(sSQL));
|
|
11966
12041
|
return result;
|
|
11967
12042
|
}
|
|
11968
12043
|
async AuditLogTypesArray(authorization_, { dataSource, userPayload }, pubSub) {
|
|
11969
12044
|
this.CheckUserReadPermissions('Audit Log Types', userPayload);
|
|
11970
|
-
const sSQL = `SELECT * FROM [${
|
|
12045
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuditLogTypes] WHERE [AuthorizationName]=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Log Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11971
12046
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Log Types', await dataSource.query(sSQL));
|
|
11972
12047
|
return result;
|
|
11973
12048
|
}
|
|
11974
12049
|
async AuditLogsArray(authorization_, { dataSource, userPayload }, pubSub) {
|
|
11975
12050
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
11976
|
-
const sSQL = `SELECT * FROM [${
|
|
12051
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuditLogs] WHERE [AuthorizationName]=${authorization_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
11977
12052
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL));
|
|
11978
12053
|
return result;
|
|
11979
12054
|
}
|
|
@@ -12144,13 +12219,13 @@ let AuthorizationRoleResolver = class AuthorizationRoleResolver extends server_1
|
|
|
12144
12219
|
}
|
|
12145
12220
|
async AuthorizationRole(ID, { dataSource, userPayload }, pubSub) {
|
|
12146
12221
|
this.CheckUserReadPermissions('Authorization Roles', userPayload);
|
|
12147
|
-
const sSQL = `SELECT * FROM [${
|
|
12222
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuthorizationRoles] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Authorization Roles', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12148
12223
|
const result = this.MapFieldNamesToCodeNames('Authorization Roles', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
12149
12224
|
return result;
|
|
12150
12225
|
}
|
|
12151
12226
|
async AllAuthorizationRoles({ dataSource, userPayload }, pubSub) {
|
|
12152
12227
|
this.CheckUserReadPermissions('Authorization Roles', userPayload);
|
|
12153
|
-
const sSQL = `SELECT * FROM [${
|
|
12228
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuthorizationRoles]` + this.getRowLevelSecurityWhereClause('Authorization Roles', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12154
12229
|
const result = this.ArrayMapFieldNamesToCodeNames('Authorization Roles', await dataSource.query(sSQL));
|
|
12155
12230
|
return result;
|
|
12156
12231
|
}
|
|
@@ -12301,25 +12376,25 @@ let AuditLogTypeResolver = class AuditLogTypeResolver extends server_1.ResolverB
|
|
|
12301
12376
|
}
|
|
12302
12377
|
async AuditLogType(ID, { dataSource, userPayload }, pubSub) {
|
|
12303
12378
|
this.CheckUserReadPermissions('Audit Log Types', userPayload);
|
|
12304
|
-
const sSQL = `SELECT * FROM [${
|
|
12379
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuditLogTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Audit Log Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12305
12380
|
const result = this.MapFieldNamesToCodeNames('Audit Log Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
12306
12381
|
return result;
|
|
12307
12382
|
}
|
|
12308
12383
|
async AllAuditLogTypes({ dataSource, userPayload }, pubSub) {
|
|
12309
12384
|
this.CheckUserReadPermissions('Audit Log Types', userPayload);
|
|
12310
|
-
const sSQL = `SELECT * FROM [${
|
|
12385
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuditLogTypes]` + this.getRowLevelSecurityWhereClause('Audit Log Types', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12311
12386
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Log Types', await dataSource.query(sSQL));
|
|
12312
12387
|
return result;
|
|
12313
12388
|
}
|
|
12314
12389
|
async AuditLogsArray(auditlogtype_, { dataSource, userPayload }, pubSub) {
|
|
12315
12390
|
this.CheckUserReadPermissions('Audit Logs', userPayload);
|
|
12316
|
-
const sSQL = `SELECT * FROM [${
|
|
12391
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuditLogs] WHERE [AuditLogTypeName]=${auditlogtype_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12317
12392
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Logs', await dataSource.query(sSQL));
|
|
12318
12393
|
return result;
|
|
12319
12394
|
}
|
|
12320
12395
|
async AuditLogTypesArray(auditlogtype_, { dataSource, userPayload }, pubSub) {
|
|
12321
12396
|
this.CheckUserReadPermissions('Audit Log Types', userPayload);
|
|
12322
|
-
const sSQL = `SELECT * FROM [${
|
|
12397
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAuditLogTypes] WHERE [ParentID]=${auditlogtype_.ID} ` + this.getRowLevelSecurityWhereClause('Audit Log Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12323
12398
|
const result = this.ArrayMapFieldNamesToCodeNames('Audit Log Types', await dataSource.query(sSQL));
|
|
12324
12399
|
return result;
|
|
12325
12400
|
}
|
|
@@ -12494,13 +12569,13 @@ let EntityFieldValueResolver = class EntityFieldValueResolver extends server_1.R
|
|
|
12494
12569
|
}
|
|
12495
12570
|
async EntityFieldValue(ID, { dataSource, userPayload }, pubSub) {
|
|
12496
12571
|
this.CheckUserReadPermissions('Entity Field Values', userPayload);
|
|
12497
|
-
const sSQL = `SELECT * FROM [${
|
|
12572
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityFieldValues] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Field Values', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12498
12573
|
const result = this.MapFieldNamesToCodeNames('Entity Field Values', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
12499
12574
|
return result;
|
|
12500
12575
|
}
|
|
12501
12576
|
async AllEntityFieldValues({ dataSource, userPayload }, pubSub) {
|
|
12502
12577
|
this.CheckUserReadPermissions('Entity Field Values', userPayload);
|
|
12503
|
-
const sSQL = `SELECT * FROM [${
|
|
12578
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityFieldValues]` + this.getRowLevelSecurityWhereClause('Entity Field Values', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12504
12579
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Field Values', await dataSource.query(sSQL));
|
|
12505
12580
|
return result;
|
|
12506
12581
|
}
|
|
@@ -12706,37 +12781,37 @@ let AIModelResolver = class AIModelResolver extends server_1.ResolverBase {
|
|
|
12706
12781
|
}
|
|
12707
12782
|
async AIModel(ID, { dataSource, userPayload }, pubSub) {
|
|
12708
12783
|
this.CheckUserReadPermissions('AI Models', userPayload);
|
|
12709
|
-
const sSQL = `SELECT * FROM [${
|
|
12784
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAIModels] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('AI Models', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12710
12785
|
const result = this.MapFieldNamesToCodeNames('AI Models', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
12711
12786
|
return result;
|
|
12712
12787
|
}
|
|
12713
12788
|
async AllAIModels({ dataSource, userPayload }, pubSub) {
|
|
12714
12789
|
this.CheckUserReadPermissions('AI Models', userPayload);
|
|
12715
|
-
const sSQL = `SELECT * FROM [${
|
|
12790
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAIModels]` + this.getRowLevelSecurityWhereClause('AI Models', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12716
12791
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Models', await dataSource.query(sSQL));
|
|
12717
12792
|
return result;
|
|
12718
12793
|
}
|
|
12719
12794
|
async AIActionsArray(aimodel_, { dataSource, userPayload }, pubSub) {
|
|
12720
12795
|
this.CheckUserReadPermissions('AI Actions', userPayload);
|
|
12721
|
-
const sSQL = `SELECT * FROM [${
|
|
12796
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAIActions] WHERE [DefaultModelID]=${aimodel_.ID} ` + this.getRowLevelSecurityWhereClause('AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12722
12797
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Actions', await dataSource.query(sSQL));
|
|
12723
12798
|
return result;
|
|
12724
12799
|
}
|
|
12725
12800
|
async AIModelActionsArray(aimodel_, { dataSource, userPayload }, pubSub) {
|
|
12726
12801
|
this.CheckUserReadPermissions('AI Model Actions', userPayload);
|
|
12727
|
-
const sSQL = `SELECT * FROM [${
|
|
12802
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAIModelActions] WHERE [AIModelID]=${aimodel_.ID} ` + this.getRowLevelSecurityWhereClause('AI Model Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12728
12803
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Model Actions', await dataSource.query(sSQL));
|
|
12729
12804
|
return result;
|
|
12730
12805
|
}
|
|
12731
12806
|
async EntityAIActionsArray(aimodel_, { dataSource, userPayload }, pubSub) {
|
|
12732
12807
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
12733
|
-
const sSQL = `SELECT * FROM [${
|
|
12808
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityAIActions] WHERE [AIModelID]=${aimodel_.ID} ` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12734
12809
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL));
|
|
12735
12810
|
return result;
|
|
12736
12811
|
}
|
|
12737
12812
|
async VectorIndexesArray(aimodel_, { dataSource, userPayload }, pubSub) {
|
|
12738
12813
|
this.CheckUserReadPermissions('Vector Indexes', userPayload);
|
|
12739
|
-
const sSQL = `SELECT * FROM [${
|
|
12814
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwVectorIndexes] WHERE [EmbeddingModelID]=${aimodel_.ID} ` + this.getRowLevelSecurityWhereClause('Vector Indexes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12740
12815
|
const result = this.ArrayMapFieldNamesToCodeNames('Vector Indexes', await dataSource.query(sSQL));
|
|
12741
12816
|
return result;
|
|
12742
12817
|
}
|
|
@@ -12986,25 +13061,25 @@ let AIActionResolver = class AIActionResolver extends server_1.ResolverBase {
|
|
|
12986
13061
|
}
|
|
12987
13062
|
async AIAction(ID, { dataSource, userPayload }, pubSub) {
|
|
12988
13063
|
this.CheckUserReadPermissions('AI Actions', userPayload);
|
|
12989
|
-
const sSQL = `SELECT * FROM [${
|
|
13064
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAIActions] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
12990
13065
|
const result = this.MapFieldNamesToCodeNames('AI Actions', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
12991
13066
|
return result;
|
|
12992
13067
|
}
|
|
12993
13068
|
async AllAIActions({ dataSource, userPayload }, pubSub) {
|
|
12994
13069
|
this.CheckUserReadPermissions('AI Actions', userPayload);
|
|
12995
|
-
const sSQL = `SELECT * FROM [${
|
|
13070
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAIActions]` + this.getRowLevelSecurityWhereClause('AI Actions', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
12996
13071
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Actions', await dataSource.query(sSQL));
|
|
12997
13072
|
return result;
|
|
12998
13073
|
}
|
|
12999
13074
|
async AIModelActionsArray(aiaction_, { dataSource, userPayload }, pubSub) {
|
|
13000
13075
|
this.CheckUserReadPermissions('AI Model Actions', userPayload);
|
|
13001
|
-
const sSQL = `SELECT * FROM [${
|
|
13076
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAIModelActions] WHERE [AIActionID]=${aiaction_.ID} ` + this.getRowLevelSecurityWhereClause('AI Model Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13002
13077
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Model Actions', await dataSource.query(sSQL));
|
|
13003
13078
|
return result;
|
|
13004
13079
|
}
|
|
13005
13080
|
async EntityAIActionsArray(aiaction_, { dataSource, userPayload }, pubSub) {
|
|
13006
13081
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
13007
|
-
const sSQL = `SELECT * FROM [${
|
|
13082
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityAIActions] WHERE [AIActionID]=${aiaction_.ID} ` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13008
13083
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL));
|
|
13009
13084
|
return result;
|
|
13010
13085
|
}
|
|
@@ -13216,13 +13291,13 @@ let AIModelActionResolver = class AIModelActionResolver extends server_1.Resolve
|
|
|
13216
13291
|
}
|
|
13217
13292
|
async AIModelAction(ID, { dataSource, userPayload }, pubSub) {
|
|
13218
13293
|
this.CheckUserReadPermissions('AI Model Actions', userPayload);
|
|
13219
|
-
const sSQL = `SELECT * FROM [${
|
|
13294
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAIModelActions] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('AI Model Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13220
13295
|
const result = this.MapFieldNamesToCodeNames('AI Model Actions', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
13221
13296
|
return result;
|
|
13222
13297
|
}
|
|
13223
13298
|
async AllAIModelActions({ dataSource, userPayload }, pubSub) {
|
|
13224
13299
|
this.CheckUserReadPermissions('AI Model Actions', userPayload);
|
|
13225
|
-
const sSQL = `SELECT * FROM [${
|
|
13300
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAIModelActions]` + this.getRowLevelSecurityWhereClause('AI Model Actions', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
13226
13301
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Model Actions', await dataSource.query(sSQL));
|
|
13227
13302
|
return result;
|
|
13228
13303
|
}
|
|
@@ -13492,13 +13567,13 @@ let EntityAIActionResolver = class EntityAIActionResolver extends server_1.Resol
|
|
|
13492
13567
|
}
|
|
13493
13568
|
async EntityAIAction(ID, { dataSource, userPayload }, pubSub) {
|
|
13494
13569
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
13495
|
-
const sSQL = `SELECT * FROM [${
|
|
13570
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityAIActions] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13496
13571
|
const result = this.MapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
13497
13572
|
return result;
|
|
13498
13573
|
}
|
|
13499
13574
|
async AllEntityAIActions({ dataSource, userPayload }, pubSub) {
|
|
13500
13575
|
this.CheckUserReadPermissions('Entity AI Actions', userPayload);
|
|
13501
|
-
const sSQL = `SELECT * FROM [${
|
|
13576
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityAIActions]` + this.getRowLevelSecurityWhereClause('Entity AI Actions', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
13502
13577
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity AI Actions', await dataSource.query(sSQL));
|
|
13503
13578
|
return result;
|
|
13504
13579
|
}
|
|
@@ -13669,19 +13744,19 @@ let AIModelTypeResolver = class AIModelTypeResolver extends server_1.ResolverBas
|
|
|
13669
13744
|
}
|
|
13670
13745
|
async AIModelType(ID, { dataSource, userPayload }, pubSub) {
|
|
13671
13746
|
this.CheckUserReadPermissions('AI Model Types', userPayload);
|
|
13672
|
-
const sSQL = `SELECT * FROM [${
|
|
13747
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAIModelTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('AI Model Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13673
13748
|
const result = this.MapFieldNamesToCodeNames('AI Model Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
13674
13749
|
return result;
|
|
13675
13750
|
}
|
|
13676
13751
|
async AllAIModelTypes({ dataSource, userPayload }, pubSub) {
|
|
13677
13752
|
this.CheckUserReadPermissions('AI Model Types', userPayload);
|
|
13678
|
-
const sSQL = `SELECT * FROM [${
|
|
13753
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAIModelTypes]` + this.getRowLevelSecurityWhereClause('AI Model Types', userPayload, core_1.EntityPermissionType.Read, ' WHERE');
|
|
13679
13754
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Model Types', await dataSource.query(sSQL));
|
|
13680
13755
|
return result;
|
|
13681
13756
|
}
|
|
13682
13757
|
async AIModelsArray(aimodeltype_, { dataSource, userPayload }, pubSub) {
|
|
13683
13758
|
this.CheckUserReadPermissions('AI Models', userPayload);
|
|
13684
|
-
const sSQL = `SELECT * FROM [${
|
|
13759
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwAIModels] WHERE [AIModelTypeID]=${aimodeltype_.ID} ` + this.getRowLevelSecurityWhereClause('AI Models', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13685
13760
|
const result = this.ArrayMapFieldNamesToCodeNames('AI Models', await dataSource.query(sSQL));
|
|
13686
13761
|
return result;
|
|
13687
13762
|
}
|
|
@@ -13857,13 +13932,13 @@ let QueueTypeResolver = class QueueTypeResolver extends server_1.ResolverBase {
|
|
|
13857
13932
|
}
|
|
13858
13933
|
async QueueType(ID, { dataSource, userPayload }, pubSub) {
|
|
13859
13934
|
this.CheckUserReadPermissions('Queue Types', userPayload);
|
|
13860
|
-
const sSQL = `SELECT * FROM [${
|
|
13935
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwQueueTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Queue Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13861
13936
|
const result = this.MapFieldNamesToCodeNames('Queue Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
13862
13937
|
return result;
|
|
13863
13938
|
}
|
|
13864
13939
|
async QueuesArray(queuetype_, { dataSource, userPayload }, pubSub) {
|
|
13865
13940
|
this.CheckUserReadPermissions('Queues', userPayload);
|
|
13866
|
-
const sSQL = `SELECT * FROM [${
|
|
13941
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwQueues] WHERE [QueueTypeID]=${queuetype_.ID} ` + this.getRowLevelSecurityWhereClause('Queues', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
13867
13942
|
const result = this.ArrayMapFieldNamesToCodeNames('Queues', await dataSource.query(sSQL));
|
|
13868
13943
|
return result;
|
|
13869
13944
|
}
|
|
@@ -14213,13 +14288,13 @@ let QueueResolver = class QueueResolver extends server_1.ResolverBase {
|
|
|
14213
14288
|
}
|
|
14214
14289
|
async Queue(ID, { dataSource, userPayload }, pubSub) {
|
|
14215
14290
|
this.CheckUserReadPermissions('Queues', userPayload);
|
|
14216
|
-
const sSQL = `SELECT * FROM [${
|
|
14291
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwQueues] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Queues', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14217
14292
|
const result = this.MapFieldNamesToCodeNames('Queues', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
14218
14293
|
return result;
|
|
14219
14294
|
}
|
|
14220
14295
|
async QueueTasksArray(queue_, { dataSource, userPayload }, pubSub) {
|
|
14221
14296
|
this.CheckUserReadPermissions('Queue Tasks', userPayload);
|
|
14222
|
-
const sSQL = `SELECT * FROM [${
|
|
14297
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwQueueTasks] WHERE [QueueID]=${queue_.ID} ` + this.getRowLevelSecurityWhereClause('Queue Tasks', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14223
14298
|
const result = this.ArrayMapFieldNamesToCodeNames('Queue Tasks', await dataSource.query(sSQL));
|
|
14224
14299
|
return result;
|
|
14225
14300
|
}
|
|
@@ -14516,7 +14591,7 @@ let QueueTaskResolver = class QueueTaskResolver extends server_1.ResolverBase {
|
|
|
14516
14591
|
}
|
|
14517
14592
|
async QueueTask(ID, { dataSource, userPayload }, pubSub) {
|
|
14518
14593
|
this.CheckUserReadPermissions('Queue Tasks', userPayload);
|
|
14519
|
-
const sSQL = `SELECT * FROM [${
|
|
14594
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwQueueTasks] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Queue Tasks', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14520
14595
|
const result = this.MapFieldNamesToCodeNames('Queue Tasks', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
14521
14596
|
return result;
|
|
14522
14597
|
}
|
|
@@ -14764,7 +14839,7 @@ let DashboardResolver = class DashboardResolver extends server_1.ResolverBase {
|
|
|
14764
14839
|
}
|
|
14765
14840
|
async Dashboard(ID, { dataSource, userPayload }, pubSub) {
|
|
14766
14841
|
this.CheckUserReadPermissions('Dashboards', userPayload);
|
|
14767
|
-
const sSQL = `SELECT * FROM [${
|
|
14842
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDashboards] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Dashboards', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14768
14843
|
this.createRecordAccessAuditLogRecord(userPayload, 'Dashboards', ID);
|
|
14769
14844
|
const result = this.MapFieldNamesToCodeNames('Dashboards', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
14770
14845
|
return result;
|
|
@@ -14970,14 +15045,14 @@ let OutputTriggerTypeResolver = class OutputTriggerTypeResolver extends server_1
|
|
|
14970
15045
|
}
|
|
14971
15046
|
async OutputTriggerType(ID, { dataSource, userPayload }, pubSub) {
|
|
14972
15047
|
this.CheckUserReadPermissions('Output Trigger Types', userPayload);
|
|
14973
|
-
const sSQL = `SELECT * FROM [${
|
|
15048
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwOutputTriggerTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Output Trigger Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14974
15049
|
this.createRecordAccessAuditLogRecord(userPayload, 'Output Trigger Types', ID);
|
|
14975
15050
|
const result = this.MapFieldNamesToCodeNames('Output Trigger Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
14976
15051
|
return result;
|
|
14977
15052
|
}
|
|
14978
15053
|
async ReportsArray(outputtriggertype_, { dataSource, userPayload }, pubSub) {
|
|
14979
15054
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
14980
|
-
const sSQL = `SELECT * FROM [${
|
|
15055
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwReports] WHERE [OutputTriggerTypeID]=${outputtriggertype_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
14981
15056
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
14982
15057
|
return result;
|
|
14983
15058
|
}
|
|
@@ -15105,14 +15180,14 @@ let OutputFormatTypeResolver = class OutputFormatTypeResolver extends server_1.R
|
|
|
15105
15180
|
}
|
|
15106
15181
|
async OutputFormatType(ID, { dataSource, userPayload }, pubSub) {
|
|
15107
15182
|
this.CheckUserReadPermissions('Output Format Types', userPayload);
|
|
15108
|
-
const sSQL = `SELECT * FROM [${
|
|
15183
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwOutputFormatTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Output Format Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15109
15184
|
this.createRecordAccessAuditLogRecord(userPayload, 'Output Format Types', ID);
|
|
15110
15185
|
const result = this.MapFieldNamesToCodeNames('Output Format Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
15111
15186
|
return result;
|
|
15112
15187
|
}
|
|
15113
15188
|
async ReportsArray(outputformattype_, { dataSource, userPayload }, pubSub) {
|
|
15114
15189
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
15115
|
-
const sSQL = `SELECT * FROM [${
|
|
15190
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwReports] WHERE [OutputFormatTypeID]=${outputformattype_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15116
15191
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
15117
15192
|
return result;
|
|
15118
15193
|
}
|
|
@@ -15236,14 +15311,14 @@ let OutputDeliveryTypeResolver = class OutputDeliveryTypeResolver extends server
|
|
|
15236
15311
|
}
|
|
15237
15312
|
async OutputDeliveryType(ID, { dataSource, userPayload }, pubSub) {
|
|
15238
15313
|
this.CheckUserReadPermissions('Output Delivery Types', userPayload);
|
|
15239
|
-
const sSQL = `SELECT * FROM [${
|
|
15314
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwOutputDeliveryTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Output Delivery Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15240
15315
|
this.createRecordAccessAuditLogRecord(userPayload, 'Output Delivery Types', ID);
|
|
15241
15316
|
const result = this.MapFieldNamesToCodeNames('Output Delivery Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
15242
15317
|
return result;
|
|
15243
15318
|
}
|
|
15244
15319
|
async ReportsArray(outputdeliverytype_, { dataSource, userPayload }, pubSub) {
|
|
15245
15320
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
15246
|
-
const sSQL = `SELECT * FROM [${
|
|
15321
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwReports] WHERE [OutputDeliveryTypeID]=${outputdeliverytype_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15247
15322
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
15248
15323
|
return result;
|
|
15249
15324
|
}
|
|
@@ -15620,13 +15695,13 @@ let ReportResolver = class ReportResolver extends server_1.ResolverBase {
|
|
|
15620
15695
|
}
|
|
15621
15696
|
async Report(ID, { dataSource, userPayload }, pubSub) {
|
|
15622
15697
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
15623
|
-
const sSQL = `SELECT * FROM [${
|
|
15698
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwReports] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15624
15699
|
const result = this.MapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
15625
15700
|
return result;
|
|
15626
15701
|
}
|
|
15627
15702
|
async ReportSnapshotsArray(report_, { dataSource, userPayload }, pubSub) {
|
|
15628
15703
|
this.CheckUserReadPermissions('Report Snapshots', userPayload);
|
|
15629
|
-
const sSQL = `SELECT * FROM [${
|
|
15704
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwReportSnapshots] WHERE [ReportID]=${report_.ID} ` + this.getRowLevelSecurityWhereClause('Report Snapshots', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15630
15705
|
const result = this.ArrayMapFieldNamesToCodeNames('Report Snapshots', await dataSource.query(sSQL));
|
|
15631
15706
|
return result;
|
|
15632
15707
|
}
|
|
@@ -15894,7 +15969,7 @@ let ReportSnapshotResolver = class ReportSnapshotResolver extends server_1.Resol
|
|
|
15894
15969
|
}
|
|
15895
15970
|
async ReportSnapshot(ID, { dataSource, userPayload }, pubSub) {
|
|
15896
15971
|
this.CheckUserReadPermissions('Report Snapshots', userPayload);
|
|
15897
|
-
const sSQL = `SELECT * FROM [${
|
|
15972
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwReportSnapshots] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Report Snapshots', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
15898
15973
|
const result = this.MapFieldNamesToCodeNames('Report Snapshots', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
15899
15974
|
return result;
|
|
15900
15975
|
}
|
|
@@ -16128,14 +16203,14 @@ let ResourceTypeResolver = class ResourceTypeResolver extends server_1.ResolverB
|
|
|
16128
16203
|
}
|
|
16129
16204
|
async ResourceType(ID, { dataSource, userPayload }, pubSub) {
|
|
16130
16205
|
this.CheckUserReadPermissions('Resource Types', userPayload);
|
|
16131
|
-
const sSQL = `SELECT * FROM [${
|
|
16206
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwResourceTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Resource Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16132
16207
|
this.createRecordAccessAuditLogRecord(userPayload, 'Resource Types', ID);
|
|
16133
16208
|
const result = this.MapFieldNamesToCodeNames('Resource Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
16134
16209
|
return result;
|
|
16135
16210
|
}
|
|
16136
16211
|
async WorkspaceItemsArray(resourcetype_, { dataSource, userPayload }, pubSub) {
|
|
16137
16212
|
this.CheckUserReadPermissions('Workspace Items', userPayload);
|
|
16138
|
-
const sSQL = `SELECT * FROM [${
|
|
16213
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwWorkspaceItems] WHERE [ResourceTypeID]=${resourcetype_.ID} ` + this.getRowLevelSecurityWhereClause('Workspace Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16139
16214
|
const result = this.ArrayMapFieldNamesToCodeNames('Workspace Items', await dataSource.query(sSQL));
|
|
16140
16215
|
return result;
|
|
16141
16216
|
}
|
|
@@ -16277,20 +16352,20 @@ let TagResolver = class TagResolver extends server_1.ResolverBase {
|
|
|
16277
16352
|
}
|
|
16278
16353
|
async Tag(ID, { dataSource, userPayload }, pubSub) {
|
|
16279
16354
|
this.CheckUserReadPermissions('Tags', userPayload);
|
|
16280
|
-
const sSQL = `SELECT * FROM [${
|
|
16355
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwTags] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Tags', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16281
16356
|
this.createRecordAccessAuditLogRecord(userPayload, 'Tags', ID);
|
|
16282
16357
|
const result = this.MapFieldNamesToCodeNames('Tags', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
16283
16358
|
return result;
|
|
16284
16359
|
}
|
|
16285
16360
|
async TagsArray(tag_, { dataSource, userPayload }, pubSub) {
|
|
16286
16361
|
this.CheckUserReadPermissions('Tags', userPayload);
|
|
16287
|
-
const sSQL = `SELECT * FROM [${
|
|
16362
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwTags] WHERE [ParentID]=${tag_.ID} ` + this.getRowLevelSecurityWhereClause('Tags', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16288
16363
|
const result = this.ArrayMapFieldNamesToCodeNames('Tags', await dataSource.query(sSQL));
|
|
16289
16364
|
return result;
|
|
16290
16365
|
}
|
|
16291
16366
|
async TaggedItemsArray(tag_, { dataSource, userPayload }, pubSub) {
|
|
16292
16367
|
this.CheckUserReadPermissions('Tagged Items', userPayload);
|
|
16293
|
-
const sSQL = `SELECT * FROM [${
|
|
16368
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwTaggedItems] WHERE [TagID]=${tag_.ID} ` + this.getRowLevelSecurityWhereClause('Tagged Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16294
16369
|
const result = this.ArrayMapFieldNamesToCodeNames('Tagged Items', await dataSource.query(sSQL));
|
|
16295
16370
|
return result;
|
|
16296
16371
|
}
|
|
@@ -16433,7 +16508,7 @@ let TaggedItemResolver = class TaggedItemResolver extends server_1.ResolverBase
|
|
|
16433
16508
|
}
|
|
16434
16509
|
async TaggedItem(ID, { dataSource, userPayload }, pubSub) {
|
|
16435
16510
|
this.CheckUserReadPermissions('Tagged Items', userPayload);
|
|
16436
|
-
const sSQL = `SELECT * FROM [${
|
|
16511
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwTaggedItems] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Tagged Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16437
16512
|
this.createRecordAccessAuditLogRecord(userPayload, 'Tagged Items', ID);
|
|
16438
16513
|
const result = this.MapFieldNamesToCodeNames('Tagged Items', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
16439
16514
|
return result;
|
|
@@ -16598,14 +16673,14 @@ let WorkspaceResolver = class WorkspaceResolver extends server_1.ResolverBase {
|
|
|
16598
16673
|
}
|
|
16599
16674
|
async Workspace(ID, { dataSource, userPayload }, pubSub) {
|
|
16600
16675
|
this.CheckUserReadPermissions('Workspaces', userPayload);
|
|
16601
|
-
const sSQL = `SELECT * FROM [${
|
|
16676
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwWorkspaces] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Workspaces', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16602
16677
|
this.createRecordAccessAuditLogRecord(userPayload, 'Workspaces', ID);
|
|
16603
16678
|
const result = this.MapFieldNamesToCodeNames('Workspaces', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
16604
16679
|
return result;
|
|
16605
16680
|
}
|
|
16606
16681
|
async WorkspaceItemsArray(workspace_, { dataSource, userPayload }, pubSub) {
|
|
16607
16682
|
this.CheckUserReadPermissions('Workspace Items', userPayload);
|
|
16608
|
-
const sSQL = `SELECT * FROM [${
|
|
16683
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwWorkspaceItems] WHERE [WorkSpaceID]=${workspace_.ID} ` + this.getRowLevelSecurityWhereClause('Workspace Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16609
16684
|
const result = this.ArrayMapFieldNamesToCodeNames('Workspace Items', await dataSource.query(sSQL));
|
|
16610
16685
|
return result;
|
|
16611
16686
|
}
|
|
@@ -16918,7 +16993,7 @@ let WorkspaceItemResolver = class WorkspaceItemResolver extends server_1.Resolve
|
|
|
16918
16993
|
}
|
|
16919
16994
|
async WorkspaceItem(ID, { dataSource, userPayload }, pubSub) {
|
|
16920
16995
|
this.CheckUserReadPermissions('Workspace Items', userPayload);
|
|
16921
|
-
const sSQL = `SELECT * FROM [${
|
|
16996
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwWorkspaceItems] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Workspace Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
16922
16997
|
this.createRecordAccessAuditLogRecord(userPayload, 'Workspace Items', ID);
|
|
16923
16998
|
const result = this.MapFieldNamesToCodeNames('Workspace Items', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
16924
16999
|
return result;
|
|
@@ -17134,13 +17209,13 @@ let DatasetResolver = class DatasetResolver extends server_1.ResolverBase {
|
|
|
17134
17209
|
}
|
|
17135
17210
|
async Dataset(ID, { dataSource, userPayload }, pubSub) {
|
|
17136
17211
|
this.CheckUserReadPermissions('Datasets', userPayload);
|
|
17137
|
-
const sSQL = `SELECT * FROM [${
|
|
17212
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDatasets] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Datasets', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17138
17213
|
const result = this.MapFieldNamesToCodeNames('Datasets', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
17139
17214
|
return result;
|
|
17140
17215
|
}
|
|
17141
17216
|
async DatasetItemsArray(dataset_, { dataSource, userPayload }, pubSub) {
|
|
17142
17217
|
this.CheckUserReadPermissions('Dataset Items', userPayload);
|
|
17143
|
-
const sSQL = `SELECT * FROM [${
|
|
17218
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDatasetItems] WHERE [DatasetName]=${dataset_.ID} ` + this.getRowLevelSecurityWhereClause('Dataset Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17144
17219
|
const result = this.ArrayMapFieldNamesToCodeNames('Dataset Items', await dataSource.query(sSQL));
|
|
17145
17220
|
return result;
|
|
17146
17221
|
}
|
|
@@ -17297,7 +17372,7 @@ let DatasetItemResolver = class DatasetItemResolver extends server_1.ResolverBas
|
|
|
17297
17372
|
}
|
|
17298
17373
|
async DatasetItem(ID, { dataSource, userPayload }, pubSub) {
|
|
17299
17374
|
this.CheckUserReadPermissions('Dataset Items', userPayload);
|
|
17300
|
-
const sSQL = `SELECT * FROM [${
|
|
17375
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDatasetItems] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Dataset Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17301
17376
|
const result = this.MapFieldNamesToCodeNames('Dataset Items', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
17302
17377
|
return result;
|
|
17303
17378
|
}
|
|
@@ -17508,13 +17583,13 @@ let ConversationDetailResolver = class ConversationDetailResolver extends server
|
|
|
17508
17583
|
}
|
|
17509
17584
|
async ConversationDetail(ID, { dataSource, userPayload }, pubSub) {
|
|
17510
17585
|
this.CheckUserReadPermissions('Conversation Details', userPayload);
|
|
17511
|
-
const sSQL = `SELECT * FROM [${
|
|
17586
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwConversationDetails] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Conversation Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17512
17587
|
const result = this.MapFieldNamesToCodeNames('Conversation Details', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
17513
17588
|
return result;
|
|
17514
17589
|
}
|
|
17515
17590
|
async ReportsArray(conversationdetail_, { dataSource, userPayload }, pubSub) {
|
|
17516
17591
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
17517
|
-
const sSQL = `SELECT * FROM [${
|
|
17592
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwReports] WHERE [ConversationDetailID]=${conversationdetail_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17518
17593
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
17519
17594
|
return result;
|
|
17520
17595
|
}
|
|
@@ -17870,19 +17945,19 @@ let ConversationResolver = class ConversationResolver extends server_1.ResolverB
|
|
|
17870
17945
|
}
|
|
17871
17946
|
async Conversation(ID, { dataSource, userPayload }, pubSub) {
|
|
17872
17947
|
this.CheckUserReadPermissions('Conversations', userPayload);
|
|
17873
|
-
const sSQL = `SELECT * FROM [${
|
|
17948
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwConversations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Conversations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17874
17949
|
const result = this.MapFieldNamesToCodeNames('Conversations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
17875
17950
|
return result;
|
|
17876
17951
|
}
|
|
17877
17952
|
async ConversationDetailsArray(conversation_, { dataSource, userPayload }, pubSub) {
|
|
17878
17953
|
this.CheckUserReadPermissions('Conversation Details', userPayload);
|
|
17879
|
-
const sSQL = `SELECT * FROM [${
|
|
17954
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwConversationDetails] WHERE [ConversationID]=${conversation_.ID} ` + this.getRowLevelSecurityWhereClause('Conversation Details', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17880
17955
|
const result = this.ArrayMapFieldNamesToCodeNames('Conversation Details', await dataSource.query(sSQL));
|
|
17881
17956
|
return result;
|
|
17882
17957
|
}
|
|
17883
17958
|
async ReportsArray(conversation_, { dataSource, userPayload }, pubSub) {
|
|
17884
17959
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
17885
|
-
const sSQL = `SELECT * FROM [${
|
|
17960
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwReports] WHERE [ConversationID]=${conversation_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
17886
17961
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
17887
17962
|
return result;
|
|
17888
17963
|
}
|
|
@@ -18221,7 +18296,7 @@ let UserNotificationResolver = class UserNotificationResolver extends server_1.R
|
|
|
18221
18296
|
}
|
|
18222
18297
|
async UserNotification(ID, { dataSource, userPayload }, pubSub) {
|
|
18223
18298
|
this.CheckUserReadPermissions('User Notifications', userPayload);
|
|
18224
|
-
const sSQL = `SELECT * FROM [${
|
|
18299
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserNotifications] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User Notifications', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
18225
18300
|
const result = this.MapFieldNamesToCodeNames('User Notifications', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
18226
18301
|
return result;
|
|
18227
18302
|
}
|
|
@@ -18488,7 +18563,7 @@ let SchemaInfoResolver = class SchemaInfoResolver extends server_1.ResolverBase
|
|
|
18488
18563
|
}
|
|
18489
18564
|
async SchemaInfo(ID, { dataSource, userPayload }, pubSub) {
|
|
18490
18565
|
this.CheckUserReadPermissions('Schema Info', userPayload);
|
|
18491
|
-
const sSQL = `SELECT * FROM [${
|
|
18566
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwSchemaInfos] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Schema Info', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
18492
18567
|
const result = this.MapFieldNamesToCodeNames('Schema Info', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
18493
18568
|
return result;
|
|
18494
18569
|
}
|
|
@@ -18730,7 +18805,7 @@ let CompanyIntegrationRecordMapResolver = class CompanyIntegrationRecordMapResol
|
|
|
18730
18805
|
}
|
|
18731
18806
|
async CompanyIntegrationRecordMap(ID, { dataSource, userPayload }, pubSub) {
|
|
18732
18807
|
this.CheckUserReadPermissions('Company Integration Record Maps', userPayload);
|
|
18733
|
-
const sSQL = `SELECT * FROM [${
|
|
18808
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwCompanyIntegrationRecordMaps] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Company Integration Record Maps', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
18734
18809
|
const result = this.MapFieldNamesToCodeNames('Company Integration Record Maps', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
18735
18810
|
return result;
|
|
18736
18811
|
}
|
|
@@ -19056,13 +19131,13 @@ let RecordMergeLogResolver = class RecordMergeLogResolver extends server_1.Resol
|
|
|
19056
19131
|
}
|
|
19057
19132
|
async RecordMergeLog(ID, { dataSource, userPayload }, pubSub) {
|
|
19058
19133
|
this.CheckUserReadPermissions('Record Merge Logs', userPayload);
|
|
19059
|
-
const sSQL = `SELECT * FROM [${
|
|
19134
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwRecordMergeLogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19060
19135
|
const result = this.MapFieldNamesToCodeNames('Record Merge Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
19061
19136
|
return result;
|
|
19062
19137
|
}
|
|
19063
19138
|
async RecordMergeDeletionLogsArray(recordmergelog_, { dataSource, userPayload }, pubSub) {
|
|
19064
19139
|
this.CheckUserReadPermissions('Record Merge Deletion Logs', userPayload);
|
|
19065
|
-
const sSQL = `SELECT * FROM [${
|
|
19140
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwRecordMergeDeletionLogs] WHERE [RecordMergeLogID]=${recordmergelog_.ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Deletion Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19066
19141
|
const result = this.ArrayMapFieldNamesToCodeNames('Record Merge Deletion Logs', await dataSource.query(sSQL));
|
|
19067
19142
|
return result;
|
|
19068
19143
|
}
|
|
@@ -19308,7 +19383,7 @@ let RecordMergeDeletionLogResolver = class RecordMergeDeletionLogResolver extend
|
|
|
19308
19383
|
}
|
|
19309
19384
|
async RecordMergeDeletionLog(ID, { dataSource, userPayload }, pubSub) {
|
|
19310
19385
|
this.CheckUserReadPermissions('Record Merge Deletion Logs', userPayload);
|
|
19311
|
-
const sSQL = `SELECT * FROM [${
|
|
19386
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwRecordMergeDeletionLogs] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Record Merge Deletion Logs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19312
19387
|
const result = this.MapFieldNamesToCodeNames('Record Merge Deletion Logs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
19313
19388
|
return result;
|
|
19314
19389
|
}
|
|
@@ -19653,7 +19728,7 @@ let QueryFieldResolver = class QueryFieldResolver extends server_1.ResolverBase
|
|
|
19653
19728
|
}
|
|
19654
19729
|
async QueryField(ID, { dataSource, userPayload }, pubSub) {
|
|
19655
19730
|
this.CheckUserReadPermissions('Query Fields', userPayload);
|
|
19656
|
-
const sSQL = `SELECT * FROM [${
|
|
19731
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwQueryFields] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Query Fields', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19657
19732
|
const result = this.MapFieldNamesToCodeNames('Query Fields', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
19658
19733
|
return result;
|
|
19659
19734
|
}
|
|
@@ -19787,11 +19862,20 @@ __decorate([
|
|
|
19787
19862
|
(0, class_validator_1.MaxLength)(8),
|
|
19788
19863
|
__metadata("design:type", Date)
|
|
19789
19864
|
], QueryCategory_.prototype, "UpdatedAt", void 0);
|
|
19865
|
+
__decorate([
|
|
19866
|
+
(0, server_1.Field)(() => server_1.Int),
|
|
19867
|
+
__metadata("design:type", Number)
|
|
19868
|
+
], QueryCategory_.prototype, "UserID", void 0);
|
|
19790
19869
|
__decorate([
|
|
19791
19870
|
(0, server_1.Field)({ nullable: true }),
|
|
19792
19871
|
(0, class_validator_1.MaxLength)(100),
|
|
19793
19872
|
__metadata("design:type", String)
|
|
19794
19873
|
], QueryCategory_.prototype, "Parent", void 0);
|
|
19874
|
+
__decorate([
|
|
19875
|
+
(0, server_1.Field)(),
|
|
19876
|
+
(0, class_validator_1.MaxLength)(200),
|
|
19877
|
+
__metadata("design:type", String)
|
|
19878
|
+
], QueryCategory_.prototype, "User", void 0);
|
|
19795
19879
|
__decorate([
|
|
19796
19880
|
(0, server_1.Field)(() => [mj_core_schema_server_object_types.QueryCategory_]),
|
|
19797
19881
|
__metadata("design:type", Array)
|
|
@@ -19818,6 +19902,10 @@ __decorate([
|
|
|
19818
19902
|
(0, server_1.Field)({ nullable: true }),
|
|
19819
19903
|
__metadata("design:type", String)
|
|
19820
19904
|
], CreateQueryCategoryInput.prototype, "Description", void 0);
|
|
19905
|
+
__decorate([
|
|
19906
|
+
(0, server_1.Field)(() => server_1.Int),
|
|
19907
|
+
__metadata("design:type", Number)
|
|
19908
|
+
], CreateQueryCategoryInput.prototype, "UserID", void 0);
|
|
19821
19909
|
exports.CreateQueryCategoryInput = CreateQueryCategoryInput = __decorate([
|
|
19822
19910
|
(0, server_1.InputType)()
|
|
19823
19911
|
], CreateQueryCategoryInput);
|
|
@@ -19840,6 +19928,10 @@ __decorate([
|
|
|
19840
19928
|
(0, server_1.Field)({ nullable: true }),
|
|
19841
19929
|
__metadata("design:type", String)
|
|
19842
19930
|
], UpdateQueryCategoryInput.prototype, "Description", void 0);
|
|
19931
|
+
__decorate([
|
|
19932
|
+
(0, server_1.Field)(() => server_1.Int),
|
|
19933
|
+
__metadata("design:type", Number)
|
|
19934
|
+
], UpdateQueryCategoryInput.prototype, "UserID", void 0);
|
|
19843
19935
|
exports.UpdateQueryCategoryInput = UpdateQueryCategoryInput = __decorate([
|
|
19844
19936
|
(0, server_1.InputType)()
|
|
19845
19937
|
], UpdateQueryCategoryInput);
|
|
@@ -19890,19 +19982,19 @@ let QueryCategoryResolver = class QueryCategoryResolver extends server_1.Resolve
|
|
|
19890
19982
|
}
|
|
19891
19983
|
async QueryCategory(ID, { dataSource, userPayload }, pubSub) {
|
|
19892
19984
|
this.CheckUserReadPermissions('Query Categories', userPayload);
|
|
19893
|
-
const sSQL = `SELECT * FROM [${
|
|
19985
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwQueryCategories] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Query Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19894
19986
|
const result = this.MapFieldNamesToCodeNames('Query Categories', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
19895
19987
|
return result;
|
|
19896
19988
|
}
|
|
19897
19989
|
async QueryCategoriesArray(querycategory_, { dataSource, userPayload }, pubSub) {
|
|
19898
19990
|
this.CheckUserReadPermissions('Query Categories', userPayload);
|
|
19899
|
-
const sSQL = `SELECT * FROM [${
|
|
19991
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwQueryCategories] WHERE [ParentID]=${querycategory_.ID} ` + this.getRowLevelSecurityWhereClause('Query Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19900
19992
|
const result = this.ArrayMapFieldNamesToCodeNames('Query Categories', await dataSource.query(sSQL));
|
|
19901
19993
|
return result;
|
|
19902
19994
|
}
|
|
19903
19995
|
async QueriesArray(querycategory_, { dataSource, userPayload }, pubSub) {
|
|
19904
19996
|
this.CheckUserReadPermissions('Queries', userPayload);
|
|
19905
|
-
const sSQL = `SELECT * FROM [${
|
|
19997
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwQueries] WHERE [CategoryID]=${querycategory_.ID} ` + this.getRowLevelSecurityWhereClause('Queries', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
19906
19998
|
const result = this.ArrayMapFieldNamesToCodeNames('Queries', await dataSource.query(sSQL));
|
|
19907
19999
|
return result;
|
|
19908
20000
|
}
|
|
@@ -20253,25 +20345,25 @@ let QueryResolver = class QueryResolver extends server_1.ResolverBase {
|
|
|
20253
20345
|
}
|
|
20254
20346
|
async Query(ID, { dataSource, userPayload }, pubSub) {
|
|
20255
20347
|
this.CheckUserReadPermissions('Queries', userPayload);
|
|
20256
|
-
const sSQL = `SELECT * FROM [${
|
|
20348
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwQueries] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Queries', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
20257
20349
|
const result = this.MapFieldNamesToCodeNames('Queries', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
20258
20350
|
return result;
|
|
20259
20351
|
}
|
|
20260
20352
|
async QueryFieldsArray(query_, { dataSource, userPayload }, pubSub) {
|
|
20261
20353
|
this.CheckUserReadPermissions('Query Fields', userPayload);
|
|
20262
|
-
const sSQL = `SELECT * FROM [${
|
|
20354
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwQueryFields] WHERE [QueryID]=${query_.ID} ` + this.getRowLevelSecurityWhereClause('Query Fields', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
20263
20355
|
const result = this.ArrayMapFieldNamesToCodeNames('Query Fields', await dataSource.query(sSQL));
|
|
20264
20356
|
return result;
|
|
20265
20357
|
}
|
|
20266
20358
|
async QueryPermissionsArray(query_, { dataSource, userPayload }, pubSub) {
|
|
20267
20359
|
this.CheckUserReadPermissions('Query Permissions', userPayload);
|
|
20268
|
-
const sSQL = `SELECT * FROM [${
|
|
20360
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwQueryPermissions] WHERE [QueryID]=${query_.ID} ` + this.getRowLevelSecurityWhereClause('Query Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
20269
20361
|
const result = this.ArrayMapFieldNamesToCodeNames('Query Permissions', await dataSource.query(sSQL));
|
|
20270
20362
|
return result;
|
|
20271
20363
|
}
|
|
20272
20364
|
async DataContextItemsArray(query_, { dataSource, userPayload }, pubSub) {
|
|
20273
20365
|
this.CheckUserReadPermissions('Data Context Items', userPayload);
|
|
20274
|
-
const sSQL = `SELECT * FROM [${
|
|
20366
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDataContextItems] WHERE [QueryID]=${query_.ID} ` + this.getRowLevelSecurityWhereClause('Data Context Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
20275
20367
|
const result = this.ArrayMapFieldNamesToCodeNames('Data Context Items', await dataSource.query(sSQL));
|
|
20276
20368
|
return result;
|
|
20277
20369
|
}
|
|
@@ -20510,7 +20602,7 @@ let QueryPermissionResolver = class QueryPermissionResolver extends server_1.Res
|
|
|
20510
20602
|
}
|
|
20511
20603
|
async QueryPermission(ID, { dataSource, userPayload }, pubSub) {
|
|
20512
20604
|
this.CheckUserReadPermissions('Query Permissions', userPayload);
|
|
20513
|
-
const sSQL = `SELECT * FROM [${
|
|
20605
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwQueryPermissions] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Query Permissions', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
20514
20606
|
const result = this.MapFieldNamesToCodeNames('Query Permissions', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
20515
20607
|
return result;
|
|
20516
20608
|
}
|
|
@@ -20756,7 +20848,7 @@ let VectorIndexResolver = class VectorIndexResolver extends server_1.ResolverBas
|
|
|
20756
20848
|
}
|
|
20757
20849
|
async VectorIndex(ID, { dataSource, userPayload }, pubSub) {
|
|
20758
20850
|
this.CheckUserReadPermissions('Vector Indexes', userPayload);
|
|
20759
|
-
const sSQL = `SELECT * FROM [${
|
|
20851
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwVectorIndexes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Vector Indexes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
20760
20852
|
const result = this.MapFieldNamesToCodeNames('Vector Indexes', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
20761
20853
|
return result;
|
|
20762
20854
|
}
|
|
@@ -20972,13 +21064,13 @@ let EntityDocumentTypeResolver = class EntityDocumentTypeResolver extends server
|
|
|
20972
21064
|
}
|
|
20973
21065
|
async EntityDocumentType(ID, { dataSource, userPayload }, pubSub) {
|
|
20974
21066
|
this.CheckUserReadPermissions('Entity Document Types', userPayload);
|
|
20975
|
-
const sSQL = `SELECT * FROM [${
|
|
21067
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityDocumentTypes] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Document Types', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
20976
21068
|
const result = this.MapFieldNamesToCodeNames('Entity Document Types', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
20977
21069
|
return result;
|
|
20978
21070
|
}
|
|
20979
21071
|
async EntityDocumentsArray(entitydocumenttype_, { dataSource, userPayload }, pubSub) {
|
|
20980
21072
|
this.CheckUserReadPermissions('Entity Documents', userPayload);
|
|
20981
|
-
const sSQL = `SELECT * FROM [${
|
|
21073
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityDocuments] WHERE [TypeID]=${entitydocumenttype_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Documents', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
20982
21074
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Documents', await dataSource.query(sSQL));
|
|
20983
21075
|
return result;
|
|
20984
21076
|
}
|
|
@@ -21230,7 +21322,7 @@ let EntityDocumentRunResolver = class EntityDocumentRunResolver extends server_1
|
|
|
21230
21322
|
}
|
|
21231
21323
|
async EntityDocumentRun(ID, { dataSource, userPayload }, pubSub) {
|
|
21232
21324
|
this.CheckUserReadPermissions('Entity Document Runs', userPayload);
|
|
21233
|
-
const sSQL = `SELECT * FROM [${
|
|
21325
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityDocumentRuns] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Document Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
21234
21326
|
const result = this.MapFieldNamesToCodeNames('Entity Document Runs', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
21235
21327
|
return result;
|
|
21236
21328
|
}
|
|
@@ -21472,13 +21564,13 @@ let VectorDatabaseResolver = class VectorDatabaseResolver extends server_1.Resol
|
|
|
21472
21564
|
}
|
|
21473
21565
|
async VectorDatabase(ID, { dataSource, userPayload }, pubSub) {
|
|
21474
21566
|
this.CheckUserReadPermissions('Vector Databases', userPayload);
|
|
21475
|
-
const sSQL = `SELECT * FROM [${
|
|
21567
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwVectorDatabases] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Vector Databases', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
21476
21568
|
const result = this.MapFieldNamesToCodeNames('Vector Databases', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
21477
21569
|
return result;
|
|
21478
21570
|
}
|
|
21479
21571
|
async VectorIndexesArray(vectordatabase_, { dataSource, userPayload }, pubSub) {
|
|
21480
21572
|
this.CheckUserReadPermissions('Vector Indexes', userPayload);
|
|
21481
|
-
const sSQL = `SELECT * FROM [${
|
|
21573
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwVectorIndexes] WHERE [VectorDatabaseID]=${vectordatabase_.ID} ` + this.getRowLevelSecurityWhereClause('Vector Indexes', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
21482
21574
|
const result = this.ArrayMapFieldNamesToCodeNames('Vector Indexes', await dataSource.query(sSQL));
|
|
21483
21575
|
return result;
|
|
21484
21576
|
}
|
|
@@ -21761,7 +21853,7 @@ let EntityRecordDocumentResolver = class EntityRecordDocumentResolver extends se
|
|
|
21761
21853
|
}
|
|
21762
21854
|
async EntityRecordDocument(ID, { dataSource, userPayload }, pubSub) {
|
|
21763
21855
|
this.CheckUserReadPermissions('Entity Record Documents', userPayload);
|
|
21764
|
-
const sSQL = `SELECT * FROM [${
|
|
21856
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityRecordDocuments] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Record Documents', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
21765
21857
|
const result = this.MapFieldNamesToCodeNames('Entity Record Documents', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
21766
21858
|
return result;
|
|
21767
21859
|
}
|
|
@@ -22024,13 +22116,13 @@ let EntityDocumentResolver = class EntityDocumentResolver extends server_1.Resol
|
|
|
22024
22116
|
}
|
|
22025
22117
|
async EntityDocument(ID, { dataSource, userPayload }, pubSub) {
|
|
22026
22118
|
this.CheckUserReadPermissions('Entity Documents', userPayload);
|
|
22027
|
-
const sSQL = `SELECT * FROM [${
|
|
22119
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityDocuments] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Entity Documents', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22028
22120
|
const result = this.MapFieldNamesToCodeNames('Entity Documents', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
22029
22121
|
return result;
|
|
22030
22122
|
}
|
|
22031
22123
|
async EntityDocumentRunsArray(entitydocument_, { dataSource, userPayload }, pubSub) {
|
|
22032
22124
|
this.CheckUserReadPermissions('Entity Document Runs', userPayload);
|
|
22033
|
-
const sSQL = `SELECT * FROM [${
|
|
22125
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwEntityDocumentRuns] WHERE [EntityDocumentID]=${entitydocument_.ID} ` + this.getRowLevelSecurityWhereClause('Entity Document Runs', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22034
22126
|
const result = this.ArrayMapFieldNamesToCodeNames('Entity Document Runs', await dataSource.query(sSQL));
|
|
22035
22127
|
return result;
|
|
22036
22128
|
}
|
|
@@ -22357,7 +22449,7 @@ let DataContextItemResolver = class DataContextItemResolver extends server_1.Res
|
|
|
22357
22449
|
}
|
|
22358
22450
|
async DataContextItem(ID, { dataSource, userPayload }, pubSub) {
|
|
22359
22451
|
this.CheckUserReadPermissions('Data Context Items', userPayload);
|
|
22360
|
-
const sSQL = `SELECT * FROM [${
|
|
22452
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDataContextItems] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Data Context Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22361
22453
|
const result = this.MapFieldNamesToCodeNames('Data Context Items', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
22362
22454
|
return result;
|
|
22363
22455
|
}
|
|
@@ -22607,19 +22699,19 @@ let DataContextResolver = class DataContextResolver extends server_1.ResolverBas
|
|
|
22607
22699
|
}
|
|
22608
22700
|
async DataContext(ID, { dataSource, userPayload }, pubSub) {
|
|
22609
22701
|
this.CheckUserReadPermissions('Data Contexts', userPayload);
|
|
22610
|
-
const sSQL = `SELECT * FROM [${
|
|
22702
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDataContexts] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Data Contexts', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22611
22703
|
const result = this.MapFieldNamesToCodeNames('Data Contexts', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
22612
22704
|
return result;
|
|
22613
22705
|
}
|
|
22614
22706
|
async DataContextItemsArray(datacontext_, { dataSource, userPayload }, pubSub) {
|
|
22615
22707
|
this.CheckUserReadPermissions('Data Context Items', userPayload);
|
|
22616
|
-
const sSQL = `SELECT * FROM [${
|
|
22708
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDataContextItems] WHERE [DataContextID]=${datacontext_.ID} ` + this.getRowLevelSecurityWhereClause('Data Context Items', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22617
22709
|
const result = this.ArrayMapFieldNamesToCodeNames('Data Context Items', await dataSource.query(sSQL));
|
|
22618
22710
|
return result;
|
|
22619
22711
|
}
|
|
22620
22712
|
async ReportsArray(datacontext_, { dataSource, userPayload }, pubSub) {
|
|
22621
22713
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
22622
|
-
const sSQL = `SELECT * FROM [${
|
|
22714
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwReports] WHERE [DataContextID]=${datacontext_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22623
22715
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
22624
22716
|
return result;
|
|
22625
22717
|
}
|
|
@@ -22775,11 +22867,20 @@ __decorate([
|
|
|
22775
22867
|
(0, server_1.Field)(() => server_1.Int),
|
|
22776
22868
|
__metadata("design:type", Number)
|
|
22777
22869
|
], UserViewCategory_.prototype, "EntityID", void 0);
|
|
22870
|
+
__decorate([
|
|
22871
|
+
(0, server_1.Field)(() => server_1.Int),
|
|
22872
|
+
__metadata("design:type", Number)
|
|
22873
|
+
], UserViewCategory_.prototype, "UserID", void 0);
|
|
22778
22874
|
__decorate([
|
|
22779
22875
|
(0, server_1.Field)({ nullable: true }),
|
|
22780
22876
|
(0, class_validator_1.MaxLength)(200),
|
|
22781
22877
|
__metadata("design:type", String)
|
|
22782
22878
|
], UserViewCategory_.prototype, "Parent", void 0);
|
|
22879
|
+
__decorate([
|
|
22880
|
+
(0, server_1.Field)(),
|
|
22881
|
+
(0, class_validator_1.MaxLength)(200),
|
|
22882
|
+
__metadata("design:type", String)
|
|
22883
|
+
], UserViewCategory_.prototype, "User", void 0);
|
|
22783
22884
|
__decorate([
|
|
22784
22885
|
(0, server_1.Field)(() => [mj_core_schema_server_object_types.UserViewCategory_]),
|
|
22785
22886
|
__metadata("design:type", Array)
|
|
@@ -22810,6 +22911,10 @@ __decorate([
|
|
|
22810
22911
|
(0, server_1.Field)(() => server_1.Int),
|
|
22811
22912
|
__metadata("design:type", Number)
|
|
22812
22913
|
], CreateUserViewCategoryInput.prototype, "EntityID", void 0);
|
|
22914
|
+
__decorate([
|
|
22915
|
+
(0, server_1.Field)(() => server_1.Int),
|
|
22916
|
+
__metadata("design:type", Number)
|
|
22917
|
+
], CreateUserViewCategoryInput.prototype, "UserID", void 0);
|
|
22813
22918
|
exports.CreateUserViewCategoryInput = CreateUserViewCategoryInput = __decorate([
|
|
22814
22919
|
(0, server_1.InputType)()
|
|
22815
22920
|
], CreateUserViewCategoryInput);
|
|
@@ -22836,6 +22941,10 @@ __decorate([
|
|
|
22836
22941
|
(0, server_1.Field)(() => server_1.Int),
|
|
22837
22942
|
__metadata("design:type", Number)
|
|
22838
22943
|
], UpdateUserViewCategoryInput.prototype, "EntityID", void 0);
|
|
22944
|
+
__decorate([
|
|
22945
|
+
(0, server_1.Field)(() => server_1.Int),
|
|
22946
|
+
__metadata("design:type", Number)
|
|
22947
|
+
], UpdateUserViewCategoryInput.prototype, "UserID", void 0);
|
|
22839
22948
|
exports.UpdateUserViewCategoryInput = UpdateUserViewCategoryInput = __decorate([
|
|
22840
22949
|
(0, server_1.InputType)()
|
|
22841
22950
|
], UpdateUserViewCategoryInput);
|
|
@@ -22886,19 +22995,19 @@ let UserViewCategoryResolver = class UserViewCategoryResolver extends server_1.R
|
|
|
22886
22995
|
}
|
|
22887
22996
|
async UserViewCategory(ID, { dataSource, userPayload }, pubSub) {
|
|
22888
22997
|
this.CheckUserReadPermissions('User View Categories', userPayload);
|
|
22889
|
-
const sSQL = `SELECT * FROM [${
|
|
22998
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserViewCategories] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('User View Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22890
22999
|
const result = this.MapFieldNamesToCodeNames('User View Categories', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
22891
23000
|
return result;
|
|
22892
23001
|
}
|
|
22893
23002
|
async UserViewCategoriesArray(userviewcategory_, { dataSource, userPayload }, pubSub) {
|
|
22894
23003
|
this.CheckUserReadPermissions('User View Categories', userPayload);
|
|
22895
|
-
const sSQL = `SELECT * FROM [${
|
|
23004
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserViewCategories] WHERE [ParentID]=${userviewcategory_.ID} ` + this.getRowLevelSecurityWhereClause('User View Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22896
23005
|
const result = this.ArrayMapFieldNamesToCodeNames('User View Categories', await dataSource.query(sSQL));
|
|
22897
23006
|
return result;
|
|
22898
23007
|
}
|
|
22899
23008
|
async UserViewsArray(userviewcategory_, { dataSource, userPayload }, pubSub) {
|
|
22900
23009
|
this.CheckUserReadPermissions('User Views', userPayload);
|
|
22901
|
-
const sSQL = `SELECT * FROM [${
|
|
23010
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwUserViews] WHERE [CategoryID]=${userviewcategory_.ID} ` + this.getRowLevelSecurityWhereClause('User Views', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
22902
23011
|
const result = this.ArrayMapFieldNamesToCodeNames('User Views', await dataSource.query(sSQL));
|
|
22903
23012
|
return result;
|
|
22904
23013
|
}
|
|
@@ -23081,11 +23190,20 @@ __decorate([
|
|
|
23081
23190
|
(0, class_validator_1.MaxLength)(8),
|
|
23082
23191
|
__metadata("design:type", Date)
|
|
23083
23192
|
], DashboardCategory_.prototype, "UpdatedAt", void 0);
|
|
23193
|
+
__decorate([
|
|
23194
|
+
(0, server_1.Field)(() => server_1.Int),
|
|
23195
|
+
__metadata("design:type", Number)
|
|
23196
|
+
], DashboardCategory_.prototype, "UserID", void 0);
|
|
23084
23197
|
__decorate([
|
|
23085
23198
|
(0, server_1.Field)({ nullable: true }),
|
|
23086
23199
|
(0, class_validator_1.MaxLength)(200),
|
|
23087
23200
|
__metadata("design:type", String)
|
|
23088
23201
|
], DashboardCategory_.prototype, "Parent", void 0);
|
|
23202
|
+
__decorate([
|
|
23203
|
+
(0, server_1.Field)(),
|
|
23204
|
+
(0, class_validator_1.MaxLength)(200),
|
|
23205
|
+
__metadata("design:type", String)
|
|
23206
|
+
], DashboardCategory_.prototype, "User", void 0);
|
|
23089
23207
|
__decorate([
|
|
23090
23208
|
(0, server_1.Field)(() => [mj_core_schema_server_object_types.Dashboard_]),
|
|
23091
23209
|
__metadata("design:type", Array)
|
|
@@ -23112,6 +23230,10 @@ __decorate([
|
|
|
23112
23230
|
(0, server_1.Field)(() => server_1.Int, { nullable: true }),
|
|
23113
23231
|
__metadata("design:type", Number)
|
|
23114
23232
|
], CreateDashboardCategoryInput.prototype, "ParentID", void 0);
|
|
23233
|
+
__decorate([
|
|
23234
|
+
(0, server_1.Field)(() => server_1.Int),
|
|
23235
|
+
__metadata("design:type", Number)
|
|
23236
|
+
], CreateDashboardCategoryInput.prototype, "UserID", void 0);
|
|
23115
23237
|
exports.CreateDashboardCategoryInput = CreateDashboardCategoryInput = __decorate([
|
|
23116
23238
|
(0, server_1.InputType)()
|
|
23117
23239
|
], CreateDashboardCategoryInput);
|
|
@@ -23134,6 +23256,10 @@ __decorate([
|
|
|
23134
23256
|
(0, server_1.Field)(() => server_1.Int, { nullable: true }),
|
|
23135
23257
|
__metadata("design:type", Number)
|
|
23136
23258
|
], UpdateDashboardCategoryInput.prototype, "ParentID", void 0);
|
|
23259
|
+
__decorate([
|
|
23260
|
+
(0, server_1.Field)(() => server_1.Int),
|
|
23261
|
+
__metadata("design:type", Number)
|
|
23262
|
+
], UpdateDashboardCategoryInput.prototype, "UserID", void 0);
|
|
23137
23263
|
exports.UpdateDashboardCategoryInput = UpdateDashboardCategoryInput = __decorate([
|
|
23138
23264
|
(0, server_1.InputType)()
|
|
23139
23265
|
], UpdateDashboardCategoryInput);
|
|
@@ -23184,19 +23310,19 @@ let DashboardCategoryResolver = class DashboardCategoryResolver extends server_1
|
|
|
23184
23310
|
}
|
|
23185
23311
|
async DashboardCategory(ID, { dataSource, userPayload }, pubSub) {
|
|
23186
23312
|
this.CheckUserReadPermissions('Dashboard Categories', userPayload);
|
|
23187
|
-
const sSQL = `SELECT * FROM [${
|
|
23313
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDashboardCategories] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Dashboard Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
23188
23314
|
const result = this.MapFieldNamesToCodeNames('Dashboard Categories', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
23189
23315
|
return result;
|
|
23190
23316
|
}
|
|
23191
23317
|
async DashboardsArray(dashboardcategory_, { dataSource, userPayload }, pubSub) {
|
|
23192
23318
|
this.CheckUserReadPermissions('Dashboards', userPayload);
|
|
23193
|
-
const sSQL = `SELECT * FROM [${
|
|
23319
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDashboards] WHERE [CategoryID]=${dashboardcategory_.ID} ` + this.getRowLevelSecurityWhereClause('Dashboards', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
23194
23320
|
const result = this.ArrayMapFieldNamesToCodeNames('Dashboards', await dataSource.query(sSQL));
|
|
23195
23321
|
return result;
|
|
23196
23322
|
}
|
|
23197
23323
|
async DashboardCategoriesArray(dashboardcategory_, { dataSource, userPayload }, pubSub) {
|
|
23198
23324
|
this.CheckUserReadPermissions('Dashboard Categories', userPayload);
|
|
23199
|
-
const sSQL = `SELECT * FROM [${
|
|
23325
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwDashboardCategories] WHERE [ParentID]=${dashboardcategory_.ID} ` + this.getRowLevelSecurityWhereClause('Dashboard Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
23200
23326
|
const result = this.ArrayMapFieldNamesToCodeNames('Dashboard Categories', await dataSource.query(sSQL));
|
|
23201
23327
|
return result;
|
|
23202
23328
|
}
|
|
@@ -23379,11 +23505,20 @@ __decorate([
|
|
|
23379
23505
|
(0, class_validator_1.MaxLength)(8),
|
|
23380
23506
|
__metadata("design:type", Date)
|
|
23381
23507
|
], ReportCategory_.prototype, "UpdatedAt", void 0);
|
|
23508
|
+
__decorate([
|
|
23509
|
+
(0, server_1.Field)(() => server_1.Int),
|
|
23510
|
+
__metadata("design:type", Number)
|
|
23511
|
+
], ReportCategory_.prototype, "UserID", void 0);
|
|
23382
23512
|
__decorate([
|
|
23383
23513
|
(0, server_1.Field)({ nullable: true }),
|
|
23384
23514
|
(0, class_validator_1.MaxLength)(200),
|
|
23385
23515
|
__metadata("design:type", String)
|
|
23386
23516
|
], ReportCategory_.prototype, "Parent", void 0);
|
|
23517
|
+
__decorate([
|
|
23518
|
+
(0, server_1.Field)(),
|
|
23519
|
+
(0, class_validator_1.MaxLength)(200),
|
|
23520
|
+
__metadata("design:type", String)
|
|
23521
|
+
], ReportCategory_.prototype, "User", void 0);
|
|
23387
23522
|
__decorate([
|
|
23388
23523
|
(0, server_1.Field)(() => [mj_core_schema_server_object_types.ReportCategory_]),
|
|
23389
23524
|
__metadata("design:type", Array)
|
|
@@ -23410,6 +23545,10 @@ __decorate([
|
|
|
23410
23545
|
(0, server_1.Field)(() => server_1.Int, { nullable: true }),
|
|
23411
23546
|
__metadata("design:type", Number)
|
|
23412
23547
|
], CreateReportCategoryInput.prototype, "ParentID", void 0);
|
|
23548
|
+
__decorate([
|
|
23549
|
+
(0, server_1.Field)(() => server_1.Int),
|
|
23550
|
+
__metadata("design:type", Number)
|
|
23551
|
+
], CreateReportCategoryInput.prototype, "UserID", void 0);
|
|
23413
23552
|
exports.CreateReportCategoryInput = CreateReportCategoryInput = __decorate([
|
|
23414
23553
|
(0, server_1.InputType)()
|
|
23415
23554
|
], CreateReportCategoryInput);
|
|
@@ -23432,6 +23571,10 @@ __decorate([
|
|
|
23432
23571
|
(0, server_1.Field)(() => server_1.Int, { nullable: true }),
|
|
23433
23572
|
__metadata("design:type", Number)
|
|
23434
23573
|
], UpdateReportCategoryInput.prototype, "ParentID", void 0);
|
|
23574
|
+
__decorate([
|
|
23575
|
+
(0, server_1.Field)(() => server_1.Int),
|
|
23576
|
+
__metadata("design:type", Number)
|
|
23577
|
+
], UpdateReportCategoryInput.prototype, "UserID", void 0);
|
|
23435
23578
|
exports.UpdateReportCategoryInput = UpdateReportCategoryInput = __decorate([
|
|
23436
23579
|
(0, server_1.InputType)()
|
|
23437
23580
|
], UpdateReportCategoryInput);
|
|
@@ -23482,19 +23625,19 @@ let ReportCategoryResolver = class ReportCategoryResolver extends server_1.Resol
|
|
|
23482
23625
|
}
|
|
23483
23626
|
async ReportCategory(ID, { dataSource, userPayload }, pubSub) {
|
|
23484
23627
|
this.CheckUserReadPermissions('Report Categories', userPayload);
|
|
23485
|
-
const sSQL = `SELECT * FROM [${
|
|
23628
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwReportCategories] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Report Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
23486
23629
|
const result = this.MapFieldNamesToCodeNames('Report Categories', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
23487
23630
|
return result;
|
|
23488
23631
|
}
|
|
23489
23632
|
async ReportCategoriesArray(reportcategory_, { dataSource, userPayload }, pubSub) {
|
|
23490
23633
|
this.CheckUserReadPermissions('Report Categories', userPayload);
|
|
23491
|
-
const sSQL = `SELECT * FROM [${
|
|
23634
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwReportCategories] WHERE [ParentID]=${reportcategory_.ID} ` + this.getRowLevelSecurityWhereClause('Report Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
23492
23635
|
const result = this.ArrayMapFieldNamesToCodeNames('Report Categories', await dataSource.query(sSQL));
|
|
23493
23636
|
return result;
|
|
23494
23637
|
}
|
|
23495
23638
|
async ReportsArray(reportcategory_, { dataSource, userPayload }, pubSub) {
|
|
23496
23639
|
this.CheckUserReadPermissions('Reports', userPayload);
|
|
23497
|
-
const sSQL = `SELECT * FROM [${
|
|
23640
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwReports] WHERE [CategoryID]=${reportcategory_.ID} ` + this.getRowLevelSecurityWhereClause('Reports', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
23498
23641
|
const result = this.ArrayMapFieldNamesToCodeNames('Reports', await dataSource.query(sSQL));
|
|
23499
23642
|
return result;
|
|
23500
23643
|
}
|
|
@@ -23809,13 +23952,13 @@ let FileStorageProviderResolver = class FileStorageProviderResolver extends serv
|
|
|
23809
23952
|
}
|
|
23810
23953
|
async FileStorageProvider(ID, { dataSource, userPayload }, pubSub) {
|
|
23811
23954
|
this.CheckUserReadPermissions('File Storage Providers', userPayload);
|
|
23812
|
-
const sSQL = `SELECT * FROM [${
|
|
23955
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwFileStorageProviders] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('File Storage Providers', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
23813
23956
|
const result = this.MapFieldNamesToCodeNames('File Storage Providers', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
23814
23957
|
return result;
|
|
23815
23958
|
}
|
|
23816
23959
|
async FilesArray(filestorageprovider_, { dataSource, userPayload }, pubSub) {
|
|
23817
23960
|
this.CheckUserReadPermissions('Files', userPayload);
|
|
23818
|
-
const sSQL = `SELECT * FROM [${
|
|
23961
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwFiles] WHERE [ProviderID]=${filestorageprovider_.ID} ` + this.getRowLevelSecurityWhereClause('Files', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
23819
23962
|
const result = this.ArrayMapFieldNamesToCodeNames('Files', await dataSource.query(sSQL));
|
|
23820
23963
|
return result;
|
|
23821
23964
|
}
|
|
@@ -24113,13 +24256,13 @@ let FileResolver = class FileResolver extends server_1.ResolverBase {
|
|
|
24113
24256
|
}
|
|
24114
24257
|
async File(ID, { dataSource, userPayload }, pubSub) {
|
|
24115
24258
|
this.CheckUserReadPermissions('Files', userPayload);
|
|
24116
|
-
const sSQL = `SELECT * FROM [${
|
|
24259
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwFiles] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Files', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
24117
24260
|
const result = this.MapFieldNamesToCodeNames('Files', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
24118
24261
|
return result;
|
|
24119
24262
|
}
|
|
24120
24263
|
async FileEntityRecordLinksArray(file_, { dataSource, userPayload }, pubSub) {
|
|
24121
24264
|
this.CheckUserReadPermissions('File Entity Record Links', userPayload);
|
|
24122
|
-
const sSQL = `SELECT * FROM [${
|
|
24265
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwFileEntityRecordLinks] WHERE [FileID]=${file_.ID} ` + this.getRowLevelSecurityWhereClause('File Entity Record Links', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
24123
24266
|
const result = this.ArrayMapFieldNamesToCodeNames('File Entity Record Links', await dataSource.query(sSQL));
|
|
24124
24267
|
return result;
|
|
24125
24268
|
}
|
|
@@ -24396,19 +24539,19 @@ let FileCategoryResolver = class FileCategoryResolver extends server_1.ResolverB
|
|
|
24396
24539
|
}
|
|
24397
24540
|
async FileCategory(ID, { dataSource, userPayload }, pubSub) {
|
|
24398
24541
|
this.CheckUserReadPermissions('File Categories', userPayload);
|
|
24399
|
-
const sSQL = `SELECT * FROM [${
|
|
24542
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwFileCategories] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('File Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
24400
24543
|
const result = this.MapFieldNamesToCodeNames('File Categories', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
24401
24544
|
return result;
|
|
24402
24545
|
}
|
|
24403
24546
|
async FilesArray(filecategory_, { dataSource, userPayload }, pubSub) {
|
|
24404
24547
|
this.CheckUserReadPermissions('Files', userPayload);
|
|
24405
|
-
const sSQL = `SELECT * FROM [${
|
|
24548
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwFiles] WHERE [CategoryID]=${filecategory_.ID} ` + this.getRowLevelSecurityWhereClause('Files', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
24406
24549
|
const result = this.ArrayMapFieldNamesToCodeNames('Files', await dataSource.query(sSQL));
|
|
24407
24550
|
return result;
|
|
24408
24551
|
}
|
|
24409
24552
|
async FileCategoriesArray(filecategory_, { dataSource, userPayload }, pubSub) {
|
|
24410
24553
|
this.CheckUserReadPermissions('File Categories', userPayload);
|
|
24411
|
-
const sSQL = `SELECT * FROM [${
|
|
24554
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwFileCategories] WHERE [ParentID]=${filecategory_.ID} ` + this.getRowLevelSecurityWhereClause('File Categories', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
24412
24555
|
const result = this.ArrayMapFieldNamesToCodeNames('File Categories', await dataSource.query(sSQL));
|
|
24413
24556
|
return result;
|
|
24414
24557
|
}
|
|
@@ -24691,7 +24834,7 @@ let FileEntityRecordLinkResolver = class FileEntityRecordLinkResolver extends se
|
|
|
24691
24834
|
}
|
|
24692
24835
|
async FileEntityRecordLink(ID, { dataSource, userPayload }, pubSub) {
|
|
24693
24836
|
this.CheckUserReadPermissions('File Entity Record Links', userPayload);
|
|
24694
|
-
const sSQL = `SELECT * FROM [${
|
|
24837
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwFileEntityRecordLinks] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('File Entity Record Links', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
24695
24838
|
const result = this.MapFieldNamesToCodeNames('File Entity Record Links', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
24696
24839
|
return result;
|
|
24697
24840
|
}
|
|
@@ -24982,7 +25125,7 @@ let VersionInstallationResolver = class VersionInstallationResolver extends serv
|
|
|
24982
25125
|
}
|
|
24983
25126
|
async VersionInstallation(ID, { dataSource, userPayload }, pubSub) {
|
|
24984
25127
|
this.CheckUserReadPermissions('Version Installations', userPayload);
|
|
24985
|
-
const sSQL = `SELECT * FROM [${
|
|
25128
|
+
const sSQL = `SELECT * FROM [${core_1.Metadata.Provider.ConfigData.MJCoreSchemaName}].[vwVersionInstallations] WHERE [ID]=${ID} ` + this.getRowLevelSecurityWhereClause('Version Installations', userPayload, core_1.EntityPermissionType.Read, 'AND');
|
|
24986
25129
|
const result = this.MapFieldNamesToCodeNames('Version Installations', await dataSource.query(sSQL).then((r) => r && r.length > 0 ? r[0] : {}));
|
|
24987
25130
|
return result;
|
|
24988
25131
|
}
|