@app-connect/core 1.7.20 → 1.7.22
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +8 -1
- package/connector/developerPortal.js +4 -4
- package/docs/README.md +50 -0
- package/docs/architecture.md +93 -0
- package/docs/connectors.md +117 -0
- package/docs/handlers.md +125 -0
- package/docs/libraries.md +101 -0
- package/docs/models.md +144 -0
- package/docs/routes.md +115 -0
- package/docs/tests.md +73 -0
- package/handlers/admin.js +22 -2
- package/handlers/auth.js +51 -10
- package/handlers/contact.js +7 -2
- package/handlers/log.js +4 -4
- package/handlers/managedAuth.js +446 -0
- package/index.js +263 -38
- package/lib/jwt.js +1 -1
- package/mcp/tools/createCallLog.js +5 -1
- package/mcp/tools/createContact.js +5 -1
- package/mcp/tools/createMessageLog.js +5 -1
- package/mcp/tools/findContactByName.js +5 -1
- package/mcp/tools/findContactByPhone.js +6 -2
- package/mcp/tools/getCallLog.js +5 -1
- package/mcp/tools/rcGetCallLogs.js +6 -2
- package/mcp/tools/updateCallLog.js +5 -1
- package/mcp/ui/App/lib/developerPortal.ts +1 -1
- package/package.json +1 -1
- package/releaseNotes.json +20 -0
- package/test/handlers/admin.test.js +34 -0
- package/test/handlers/auth.test.js +402 -6
- package/test/handlers/contact.test.js +162 -0
- package/test/handlers/managedAuth.test.js +458 -0
- package/test/index.test.js +105 -0
- package/test/lib/jwt.test.js +15 -0
- package/test/mcp/tools/createCallLog.test.js +11 -0
- package/test/mcp/tools/createContact.test.js +58 -0
- package/test/mcp/tools/createMessageLog.test.js +15 -0
- package/test/mcp/tools/findContactByName.test.js +12 -0
- package/test/mcp/tools/findContactByPhone.test.js +12 -0
- package/test/mcp/tools/getCallLog.test.js +12 -0
- package/test/mcp/tools/rcGetCallLogs.test.js +56 -0
- package/test/mcp/tools/updateCallLog.test.js +14 -0
- package/test/routes/managedAuthRoutes.test.js +132 -0
- package/test/setup.js +2 -0
|
@@ -436,6 +436,168 @@ describe('Contact Handler', () => {
|
|
|
436
436
|
expect(cachedData.data).toEqual(updatedContact);
|
|
437
437
|
});
|
|
438
438
|
|
|
439
|
+
test('should remove cached contact when force refresh returns null', async () => {
|
|
440
|
+
// Arrange
|
|
441
|
+
await UserModel.create(mockUser);
|
|
442
|
+
await AccountDataModel.create({
|
|
443
|
+
rcAccountId: 'rc-account-123',
|
|
444
|
+
platformName: 'testCRM',
|
|
445
|
+
dataKey: 'contact-+3333333333',
|
|
446
|
+
data: [{ id: 'stale-contact', name: 'Stale Contact' }]
|
|
447
|
+
});
|
|
448
|
+
|
|
449
|
+
const mockConnector = {
|
|
450
|
+
getAuthType: jest.fn().mockResolvedValue('apiKey'),
|
|
451
|
+
getBasicAuth: jest.fn().mockReturnValue('base64-encoded'),
|
|
452
|
+
findContact: jest.fn().mockResolvedValue({
|
|
453
|
+
successful: false,
|
|
454
|
+
matchedContactInfo: null
|
|
455
|
+
})
|
|
456
|
+
};
|
|
457
|
+
connectorRegistry.getConnector.mockReturnValue(mockConnector);
|
|
458
|
+
|
|
459
|
+
// Act
|
|
460
|
+
const result = await contactHandler.findContact({
|
|
461
|
+
platform: 'testCRM',
|
|
462
|
+
userId: 'test-user-id',
|
|
463
|
+
phoneNumber: '+3333333333',
|
|
464
|
+
isForceRefreshAccountData: true
|
|
465
|
+
});
|
|
466
|
+
|
|
467
|
+
// Assert
|
|
468
|
+
expect(result.successful).toBe(false);
|
|
469
|
+
const cachedData = await AccountDataModel.findOne({
|
|
470
|
+
where: {
|
|
471
|
+
rcAccountId: 'rc-account-123',
|
|
472
|
+
platformName: 'testCRM',
|
|
473
|
+
dataKey: 'contact-+3333333333'
|
|
474
|
+
}
|
|
475
|
+
});
|
|
476
|
+
expect(cachedData).toBeNull();
|
|
477
|
+
});
|
|
478
|
+
|
|
479
|
+
test('should remove cached contact when force refresh returns empty array', async () => {
|
|
480
|
+
// Arrange
|
|
481
|
+
await UserModel.create(mockUser);
|
|
482
|
+
await AccountDataModel.create({
|
|
483
|
+
rcAccountId: 'rc-account-123',
|
|
484
|
+
platformName: 'testCRM',
|
|
485
|
+
dataKey: 'contact-+1212121212',
|
|
486
|
+
data: [{ id: 'stale-contact', name: 'Stale Contact' }]
|
|
487
|
+
});
|
|
488
|
+
|
|
489
|
+
const mockConnector = {
|
|
490
|
+
getAuthType: jest.fn().mockResolvedValue('apiKey'),
|
|
491
|
+
getBasicAuth: jest.fn().mockReturnValue('base64-encoded'),
|
|
492
|
+
findContact: jest.fn().mockResolvedValue({
|
|
493
|
+
successful: false,
|
|
494
|
+
matchedContactInfo: []
|
|
495
|
+
})
|
|
496
|
+
};
|
|
497
|
+
connectorRegistry.getConnector.mockReturnValue(mockConnector);
|
|
498
|
+
|
|
499
|
+
// Act
|
|
500
|
+
await contactHandler.findContact({
|
|
501
|
+
platform: 'testCRM',
|
|
502
|
+
userId: 'test-user-id',
|
|
503
|
+
phoneNumber: '+1212121212',
|
|
504
|
+
isForceRefreshAccountData: true
|
|
505
|
+
});
|
|
506
|
+
|
|
507
|
+
// Assert
|
|
508
|
+
const cachedData = await AccountDataModel.findOne({
|
|
509
|
+
where: {
|
|
510
|
+
rcAccountId: 'rc-account-123',
|
|
511
|
+
platformName: 'testCRM',
|
|
512
|
+
dataKey: 'contact-+1212121212'
|
|
513
|
+
}
|
|
514
|
+
});
|
|
515
|
+
expect(cachedData).toBeNull();
|
|
516
|
+
});
|
|
517
|
+
|
|
518
|
+
test('should remove cached contact when force refresh returns only new contact placeholder', async () => {
|
|
519
|
+
// Arrange
|
|
520
|
+
await UserModel.create(mockUser);
|
|
521
|
+
await AccountDataModel.create({
|
|
522
|
+
rcAccountId: 'rc-account-123',
|
|
523
|
+
platformName: 'testCRM',
|
|
524
|
+
dataKey: 'contact-+3434343434',
|
|
525
|
+
data: [{ id: 'stale-contact', name: 'Stale Contact' }]
|
|
526
|
+
});
|
|
527
|
+
|
|
528
|
+
const placeholderContact = [
|
|
529
|
+
{ id: 'new-contact', name: 'Create Contact', isNewContact: true }
|
|
530
|
+
];
|
|
531
|
+
const mockConnector = {
|
|
532
|
+
getAuthType: jest.fn().mockResolvedValue('apiKey'),
|
|
533
|
+
getBasicAuth: jest.fn().mockReturnValue('base64-encoded'),
|
|
534
|
+
findContact: jest.fn().mockResolvedValue({
|
|
535
|
+
successful: false,
|
|
536
|
+
matchedContactInfo: placeholderContact
|
|
537
|
+
})
|
|
538
|
+
};
|
|
539
|
+
connectorRegistry.getConnector.mockReturnValue(mockConnector);
|
|
540
|
+
|
|
541
|
+
// Act
|
|
542
|
+
const result = await contactHandler.findContact({
|
|
543
|
+
platform: 'testCRM',
|
|
544
|
+
userId: 'test-user-id',
|
|
545
|
+
phoneNumber: '+3434343434',
|
|
546
|
+
isForceRefreshAccountData: true
|
|
547
|
+
});
|
|
548
|
+
|
|
549
|
+
// Assert
|
|
550
|
+
expect(result.contact).toEqual(placeholderContact);
|
|
551
|
+
const cachedData = await AccountDataModel.findOne({
|
|
552
|
+
where: {
|
|
553
|
+
rcAccountId: 'rc-account-123',
|
|
554
|
+
platformName: 'testCRM',
|
|
555
|
+
dataKey: 'contact-+3434343434'
|
|
556
|
+
}
|
|
557
|
+
});
|
|
558
|
+
expect(cachedData).toBeNull();
|
|
559
|
+
});
|
|
560
|
+
|
|
561
|
+
test('should keep cached contact when force refresh connector call errors', async () => {
|
|
562
|
+
// Arrange
|
|
563
|
+
await UserModel.create(mockUser);
|
|
564
|
+
await AccountDataModel.create({
|
|
565
|
+
rcAccountId: 'rc-account-123',
|
|
566
|
+
platformName: 'testCRM',
|
|
567
|
+
dataKey: 'contact-+5656565656',
|
|
568
|
+
data: [{ id: 'stale-contact', name: 'Stale Contact' }]
|
|
569
|
+
});
|
|
570
|
+
|
|
571
|
+
const mockConnector = {
|
|
572
|
+
getAuthType: jest.fn().mockResolvedValue('apiKey'),
|
|
573
|
+
getBasicAuth: jest.fn().mockReturnValue('base64-encoded'),
|
|
574
|
+
findContact: jest.fn().mockRejectedValue({
|
|
575
|
+
response: { status: 500 }
|
|
576
|
+
})
|
|
577
|
+
};
|
|
578
|
+
connectorRegistry.getConnector.mockReturnValue(mockConnector);
|
|
579
|
+
|
|
580
|
+
// Act
|
|
581
|
+
const result = await contactHandler.findContact({
|
|
582
|
+
platform: 'testCRM',
|
|
583
|
+
userId: 'test-user-id',
|
|
584
|
+
phoneNumber: '+5656565656',
|
|
585
|
+
isForceRefreshAccountData: true
|
|
586
|
+
});
|
|
587
|
+
|
|
588
|
+
// Assert
|
|
589
|
+
expect(result.successful).toBe(false);
|
|
590
|
+
const cachedData = await AccountDataModel.findOne({
|
|
591
|
+
where: {
|
|
592
|
+
rcAccountId: 'rc-account-123',
|
|
593
|
+
platformName: 'testCRM',
|
|
594
|
+
dataKey: 'contact-+5656565656'
|
|
595
|
+
}
|
|
596
|
+
});
|
|
597
|
+
expect(cachedData).not.toBeNull();
|
|
598
|
+
expect(cachedData.data).toEqual([{ id: 'stale-contact', name: 'Stale Contact' }]);
|
|
599
|
+
});
|
|
600
|
+
|
|
439
601
|
test('should work with tracer when provided', async () => {
|
|
440
602
|
// Arrange
|
|
441
603
|
await UserModel.create(mockUser);
|
|
@@ -0,0 +1,458 @@
|
|
|
1
|
+
// Use in-memory SQLite for isolated model tests
|
|
2
|
+
jest.mock('../../models/sequelize', () => {
|
|
3
|
+
const { Sequelize } = require('sequelize');
|
|
4
|
+
return {
|
|
5
|
+
sequelize: new Sequelize({
|
|
6
|
+
dialect: 'sqlite',
|
|
7
|
+
storage: ':memory:',
|
|
8
|
+
logging: false,
|
|
9
|
+
}),
|
|
10
|
+
};
|
|
11
|
+
});
|
|
12
|
+
|
|
13
|
+
jest.mock('../../connector/registry');
|
|
14
|
+
jest.mock('../../connector/developerPortal', () => ({
|
|
15
|
+
getConnectorManifest: jest.fn()
|
|
16
|
+
}));
|
|
17
|
+
|
|
18
|
+
const managedAuthHandler = require('../../handlers/managedAuth');
|
|
19
|
+
const connectorRegistry = require('../../connector/registry');
|
|
20
|
+
const developerPortal = require('../../connector/developerPortal');
|
|
21
|
+
const { AccountDataModel } = require('../../models/accountDataModel');
|
|
22
|
+
const { sequelize } = require('../../models/sequelize');
|
|
23
|
+
|
|
24
|
+
describe('Managed Auth Handler', () => {
|
|
25
|
+
beforeAll(async () => {
|
|
26
|
+
process.env.APP_SERVER_SECRET_KEY = 'test-app-server-secret-key-123456';
|
|
27
|
+
await AccountDataModel.sync({ force: true });
|
|
28
|
+
});
|
|
29
|
+
|
|
30
|
+
afterEach(async () => {
|
|
31
|
+
await AccountDataModel.destroy({ where: {} });
|
|
32
|
+
jest.clearAllMocks();
|
|
33
|
+
});
|
|
34
|
+
|
|
35
|
+
afterAll(async () => {
|
|
36
|
+
await sequelize.close();
|
|
37
|
+
});
|
|
38
|
+
|
|
39
|
+
test('getManagedAuthState reports all required fields satisfied when shared values exist', async () => {
|
|
40
|
+
connectorRegistry.getManifest.mockReturnValue({
|
|
41
|
+
platforms: {
|
|
42
|
+
testCRM: {
|
|
43
|
+
auth: {
|
|
44
|
+
type: 'apiKey',
|
|
45
|
+
apiKey: {
|
|
46
|
+
page: {
|
|
47
|
+
content: [
|
|
48
|
+
{ const: 'tenantId', required: true, managed: true, managedScope: 'account' },
|
|
49
|
+
{ const: 'apiKey', required: true, managed: true, managedScope: 'user' }
|
|
50
|
+
]
|
|
51
|
+
}
|
|
52
|
+
}
|
|
53
|
+
}
|
|
54
|
+
}
|
|
55
|
+
}
|
|
56
|
+
});
|
|
57
|
+
|
|
58
|
+
await managedAuthHandler.upsertOrgManagedAuthValues({
|
|
59
|
+
rcAccountId: 'acc-1',
|
|
60
|
+
platform: 'testCRM',
|
|
61
|
+
values: { tenantId: 'tenant-1' }
|
|
62
|
+
});
|
|
63
|
+
await managedAuthHandler.upsertUserManagedAuthValues({
|
|
64
|
+
rcAccountId: 'acc-1',
|
|
65
|
+
platform: 'testCRM',
|
|
66
|
+
rcExtensionId: '101',
|
|
67
|
+
rcUserName: 'Agent 101',
|
|
68
|
+
values: { apiKey: 'user-api-key' }
|
|
69
|
+
});
|
|
70
|
+
|
|
71
|
+
const state = await managedAuthHandler.getManagedAuthState({
|
|
72
|
+
platform: 'testCRM',
|
|
73
|
+
rcAccountId: 'acc-1',
|
|
74
|
+
rcExtensionId: '101'
|
|
75
|
+
});
|
|
76
|
+
|
|
77
|
+
expect(state.hasManagedAuth).toBe(true);
|
|
78
|
+
expect(state.allRequiredFieldsSatisfied).toBe(true);
|
|
79
|
+
expect(state.visibleFieldConsts).toEqual([]);
|
|
80
|
+
});
|
|
81
|
+
|
|
82
|
+
test('getManagedAuthAdminSettings returns configured field values and keeps user records separate', async () => {
|
|
83
|
+
connectorRegistry.getManifest.mockReturnValue({
|
|
84
|
+
platforms: {
|
|
85
|
+
testCRM: {
|
|
86
|
+
auth: {
|
|
87
|
+
type: 'apiKey',
|
|
88
|
+
apiKey: {
|
|
89
|
+
page: {
|
|
90
|
+
content: [
|
|
91
|
+
{ const: 'tenantId', managed: true, managedScope: 'account' },
|
|
92
|
+
{ const: 'apiKey', managed: true, managedScope: 'user' }
|
|
93
|
+
]
|
|
94
|
+
}
|
|
95
|
+
}
|
|
96
|
+
}
|
|
97
|
+
}
|
|
98
|
+
}
|
|
99
|
+
});
|
|
100
|
+
|
|
101
|
+
await managedAuthHandler.upsertOrgManagedAuthValues({
|
|
102
|
+
rcAccountId: 'acc-2',
|
|
103
|
+
platform: 'testCRM',
|
|
104
|
+
values: { tenantId: 'tenant-secret' }
|
|
105
|
+
});
|
|
106
|
+
await managedAuthHandler.upsertUserManagedAuthValues({
|
|
107
|
+
rcAccountId: 'acc-2',
|
|
108
|
+
platform: 'testCRM',
|
|
109
|
+
rcExtensionId: '102',
|
|
110
|
+
rcUserName: 'Agent 102',
|
|
111
|
+
values: { apiKey: 'user-key' }
|
|
112
|
+
});
|
|
113
|
+
|
|
114
|
+
const settings = await managedAuthHandler.getManagedAuthAdminSettings({
|
|
115
|
+
platform: 'testCRM',
|
|
116
|
+
rcAccountId: 'acc-2'
|
|
117
|
+
});
|
|
118
|
+
|
|
119
|
+
expect(settings.orgValues.tenantId.hasValue).toBe(true);
|
|
120
|
+
expect(settings.orgValues.tenantId.value).toBe('tenant-secret');
|
|
121
|
+
expect(settings.userValues[0].rcExtensionId).toBe('102');
|
|
122
|
+
expect(settings.userValues[0].fields.apiKey.value).toBe('user-key');
|
|
123
|
+
});
|
|
124
|
+
|
|
125
|
+
test('upsertUserManagedAuthValues stores one row per extension with scoped dataKey', async () => {
|
|
126
|
+
await managedAuthHandler.upsertUserManagedAuthValues({
|
|
127
|
+
rcAccountId: 'acc-scope',
|
|
128
|
+
platform: 'testCRM',
|
|
129
|
+
rcExtensionId: '201',
|
|
130
|
+
rcUserName: 'Agent 201',
|
|
131
|
+
values: { apiKey: 'key-201' }
|
|
132
|
+
});
|
|
133
|
+
await managedAuthHandler.upsertUserManagedAuthValues({
|
|
134
|
+
rcAccountId: 'acc-scope',
|
|
135
|
+
platform: 'testCRM',
|
|
136
|
+
rcExtensionId: '202',
|
|
137
|
+
rcUserName: 'Agent 202',
|
|
138
|
+
values: { apiKey: 'key-202' }
|
|
139
|
+
});
|
|
140
|
+
|
|
141
|
+
const records = await AccountDataModel.findAll({
|
|
142
|
+
where: {
|
|
143
|
+
rcAccountId: 'acc-scope',
|
|
144
|
+
platformName: 'testCRM'
|
|
145
|
+
}
|
|
146
|
+
});
|
|
147
|
+
const dataKeys = records.map(r => r.dataKey).sort();
|
|
148
|
+
|
|
149
|
+
expect(dataKeys).toEqual(['managed-auth-user:201', 'managed-auth-user:202']);
|
|
150
|
+
expect(records).toHaveLength(2);
|
|
151
|
+
});
|
|
152
|
+
|
|
153
|
+
test('getManagedAuthState loads field definitions from Developer Portal when connectorId is provided', async () => {
|
|
154
|
+
developerPortal.getConnectorManifest.mockResolvedValue({
|
|
155
|
+
platforms: {
|
|
156
|
+
testCRM: {
|
|
157
|
+
auth: {
|
|
158
|
+
type: 'apiKey',
|
|
159
|
+
apiKey: {
|
|
160
|
+
page: {
|
|
161
|
+
content: [
|
|
162
|
+
{ const: 'orgToken', required: true, managed: true, managedScope: 'account' }
|
|
163
|
+
]
|
|
164
|
+
}
|
|
165
|
+
}
|
|
166
|
+
}
|
|
167
|
+
}
|
|
168
|
+
}
|
|
169
|
+
});
|
|
170
|
+
|
|
171
|
+
await managedAuthHandler.upsertOrgManagedAuthValues({
|
|
172
|
+
rcAccountId: 'acc-3',
|
|
173
|
+
platform: 'testCRM',
|
|
174
|
+
values: { orgToken: 'portal-token' }
|
|
175
|
+
});
|
|
176
|
+
|
|
177
|
+
const state = await managedAuthHandler.getManagedAuthState({
|
|
178
|
+
platform: 'testCRM',
|
|
179
|
+
connectorId: 'connector-123',
|
|
180
|
+
rcAccountId: 'acc-3'
|
|
181
|
+
});
|
|
182
|
+
|
|
183
|
+
expect(developerPortal.getConnectorManifest).toHaveBeenCalledWith({ connectorId: 'connector-123', isPrivate: false });
|
|
184
|
+
expect(state.hasManagedAuth).toBe(true);
|
|
185
|
+
expect(state.allRequiredFieldsSatisfied).toBe(true);
|
|
186
|
+
expect(state.visibleFieldConsts).toEqual([]);
|
|
187
|
+
});
|
|
188
|
+
|
|
189
|
+
test('getManagedAuthState surfaces missing required fields for unshared and missing shared values', async () => {
|
|
190
|
+
connectorRegistry.getManifest.mockReturnValue({
|
|
191
|
+
platforms: {
|
|
192
|
+
testCRM: {
|
|
193
|
+
auth: {
|
|
194
|
+
type: 'apiKey',
|
|
195
|
+
apiKey: {
|
|
196
|
+
page: {
|
|
197
|
+
content: [
|
|
198
|
+
{ const: 'tenantId', required: true, managed: true, managedScope: 'account' },
|
|
199
|
+
{ const: 'userToken', required: true, managed: true, managedScope: 'user' },
|
|
200
|
+
{ const: 'apiSecret', required: true }
|
|
201
|
+
]
|
|
202
|
+
}
|
|
203
|
+
}
|
|
204
|
+
}
|
|
205
|
+
}
|
|
206
|
+
}
|
|
207
|
+
});
|
|
208
|
+
|
|
209
|
+
await managedAuthHandler.upsertOrgManagedAuthValues({
|
|
210
|
+
rcAccountId: 'acc-4',
|
|
211
|
+
platform: 'testCRM',
|
|
212
|
+
values: { tenantId: 'tenant-4' }
|
|
213
|
+
});
|
|
214
|
+
|
|
215
|
+
const state = await managedAuthHandler.getManagedAuthState({
|
|
216
|
+
platform: 'testCRM',
|
|
217
|
+
rcAccountId: 'acc-4',
|
|
218
|
+
rcExtensionId: '404'
|
|
219
|
+
});
|
|
220
|
+
|
|
221
|
+
expect(state.hasManagedAuth).toBe(true);
|
|
222
|
+
expect(state.allRequiredFieldsSatisfied).toBe(false);
|
|
223
|
+
expect(state.visibleFieldConsts).toEqual(['userToken', 'apiSecret']);
|
|
224
|
+
expect(state.missingRequiredFieldConsts).toEqual(['userToken', 'apiSecret']);
|
|
225
|
+
});
|
|
226
|
+
|
|
227
|
+
test('getManagedAuthState returns full-form behavior when connector has no shared fields', async () => {
|
|
228
|
+
connectorRegistry.getManifest.mockReturnValue({
|
|
229
|
+
platforms: {
|
|
230
|
+
testCRM: {
|
|
231
|
+
auth: {
|
|
232
|
+
type: 'apiKey',
|
|
233
|
+
apiKey: {
|
|
234
|
+
page: {
|
|
235
|
+
content: [
|
|
236
|
+
{ const: 'apiKey', required: true },
|
|
237
|
+
{ const: 'tenantId', required: true },
|
|
238
|
+
{ const: 'region', required: false }
|
|
239
|
+
]
|
|
240
|
+
}
|
|
241
|
+
}
|
|
242
|
+
}
|
|
243
|
+
}
|
|
244
|
+
}
|
|
245
|
+
});
|
|
246
|
+
|
|
247
|
+
const state = await managedAuthHandler.getManagedAuthState({
|
|
248
|
+
platform: 'testCRM',
|
|
249
|
+
rcAccountId: 'acc-plain',
|
|
250
|
+
rcExtensionId: '100'
|
|
251
|
+
});
|
|
252
|
+
|
|
253
|
+
expect(state.hasManagedAuth).toBe(false);
|
|
254
|
+
expect(state.allRequiredFieldsSatisfied).toBe(false);
|
|
255
|
+
expect(state.visibleFieldConsts).toBeNull();
|
|
256
|
+
expect(state.missingRequiredFieldConsts).toEqual(['apiKey', 'tenantId']);
|
|
257
|
+
});
|
|
258
|
+
|
|
259
|
+
test('getManagedAuthState falls back to the full auth form after managed auto-login fails', async () => {
|
|
260
|
+
connectorRegistry.getManifest.mockReturnValue({
|
|
261
|
+
platforms: {
|
|
262
|
+
testCRM: {
|
|
263
|
+
auth: {
|
|
264
|
+
type: 'apiKey',
|
|
265
|
+
apiKey: {
|
|
266
|
+
page: {
|
|
267
|
+
content: [
|
|
268
|
+
{ const: 'tenantId', required: true, managed: true, managedScope: 'account' },
|
|
269
|
+
{ const: 'apiKey', required: true, managed: true, managedScope: 'user' },
|
|
270
|
+
{ const: 'region', required: false }
|
|
271
|
+
]
|
|
272
|
+
}
|
|
273
|
+
}
|
|
274
|
+
}
|
|
275
|
+
}
|
|
276
|
+
}
|
|
277
|
+
});
|
|
278
|
+
|
|
279
|
+
await managedAuthHandler.upsertOrgManagedAuthValues({
|
|
280
|
+
rcAccountId: 'acc-fallback',
|
|
281
|
+
platform: 'testCRM',
|
|
282
|
+
values: { tenantId: 'tenant-1' }
|
|
283
|
+
});
|
|
284
|
+
await managedAuthHandler.upsertUserManagedAuthValues({
|
|
285
|
+
rcAccountId: 'acc-fallback',
|
|
286
|
+
platform: 'testCRM',
|
|
287
|
+
rcExtensionId: '501',
|
|
288
|
+
rcUserName: 'Agent 501',
|
|
289
|
+
values: { apiKey: 'bad-key' }
|
|
290
|
+
});
|
|
291
|
+
await managedAuthHandler.markManagedAuthLoginFailure({
|
|
292
|
+
rcAccountId: 'acc-fallback',
|
|
293
|
+
platform: 'testCRM',
|
|
294
|
+
rcExtensionId: '501'
|
|
295
|
+
});
|
|
296
|
+
|
|
297
|
+
const state = await managedAuthHandler.getManagedAuthState({
|
|
298
|
+
platform: 'testCRM',
|
|
299
|
+
rcAccountId: 'acc-fallback',
|
|
300
|
+
rcExtensionId: '501'
|
|
301
|
+
});
|
|
302
|
+
|
|
303
|
+
expect(state.hasManagedAuth).toBe(true);
|
|
304
|
+
expect(state.allRequiredFieldsSatisfied).toBe(false);
|
|
305
|
+
expect(state.visibleFieldConsts).toBeNull();
|
|
306
|
+
expect(state.missingRequiredFieldConsts).toEqual(['tenantId', 'apiKey']);
|
|
307
|
+
expect(state.fallbackToManualAuth).toBe(true);
|
|
308
|
+
});
|
|
309
|
+
|
|
310
|
+
test('resolveApiKeyLoginFields keeps submitted shared values when managed values are missing', async () => {
|
|
311
|
+
connectorRegistry.getManifest.mockReturnValue({
|
|
312
|
+
platforms: {
|
|
313
|
+
testCRM: {
|
|
314
|
+
auth: {
|
|
315
|
+
type: 'apiKey',
|
|
316
|
+
apiKey: {
|
|
317
|
+
page: {
|
|
318
|
+
content: [
|
|
319
|
+
{ const: 'companyId', required: true, managed: true, managedScope: 'account' },
|
|
320
|
+
{ const: 'userToken', required: true, managed: true, managedScope: 'user' },
|
|
321
|
+
{ const: 'region', required: false, managed: true, managedScope: 'account' }
|
|
322
|
+
]
|
|
323
|
+
}
|
|
324
|
+
}
|
|
325
|
+
}
|
|
326
|
+
}
|
|
327
|
+
}
|
|
328
|
+
});
|
|
329
|
+
|
|
330
|
+
const result = await managedAuthHandler.resolveApiKeyLoginFields({
|
|
331
|
+
platform: 'testCRM',
|
|
332
|
+
rcAccountId: 'acc-shared-fallback',
|
|
333
|
+
rcExtensionId: '201',
|
|
334
|
+
additionalInfo: {
|
|
335
|
+
companyId: 'company-123',
|
|
336
|
+
userToken: 'user-token-123',
|
|
337
|
+
region: 'us'
|
|
338
|
+
}
|
|
339
|
+
});
|
|
340
|
+
|
|
341
|
+
expect(result.resolvedAdditionalInfo).toEqual({
|
|
342
|
+
companyId: 'company-123',
|
|
343
|
+
userToken: 'user-token-123',
|
|
344
|
+
region: 'us'
|
|
345
|
+
});
|
|
346
|
+
expect(result.missingRequiredFieldConsts).toEqual([]);
|
|
347
|
+
});
|
|
348
|
+
|
|
349
|
+
test('resolveApiKeyLoginFields prefers submitted managed values during manual fallback', async () => {
|
|
350
|
+
connectorRegistry.getManifest.mockReturnValue({
|
|
351
|
+
platforms: {
|
|
352
|
+
testCRM: {
|
|
353
|
+
auth: {
|
|
354
|
+
type: 'apiKey',
|
|
355
|
+
apiKey: {
|
|
356
|
+
page: {
|
|
357
|
+
content: [
|
|
358
|
+
{ const: 'companyId', required: true, managed: true, managedScope: 'account' },
|
|
359
|
+
{ const: 'apiKey', required: true, managed: true, managedScope: 'user' }
|
|
360
|
+
]
|
|
361
|
+
}
|
|
362
|
+
}
|
|
363
|
+
}
|
|
364
|
+
}
|
|
365
|
+
}
|
|
366
|
+
});
|
|
367
|
+
|
|
368
|
+
await managedAuthHandler.upsertOrgManagedAuthValues({
|
|
369
|
+
rcAccountId: 'acc-override',
|
|
370
|
+
platform: 'testCRM',
|
|
371
|
+
values: { companyId: 'stored-company' }
|
|
372
|
+
});
|
|
373
|
+
await managedAuthHandler.upsertUserManagedAuthValues({
|
|
374
|
+
rcAccountId: 'acc-override',
|
|
375
|
+
platform: 'testCRM',
|
|
376
|
+
rcExtensionId: '777',
|
|
377
|
+
rcUserName: 'Agent 777',
|
|
378
|
+
values: { apiKey: 'stored-key' }
|
|
379
|
+
});
|
|
380
|
+
|
|
381
|
+
const result = await managedAuthHandler.resolveApiKeyLoginFields({
|
|
382
|
+
platform: 'testCRM',
|
|
383
|
+
rcAccountId: 'acc-override',
|
|
384
|
+
rcExtensionId: '777',
|
|
385
|
+
additionalInfo: {
|
|
386
|
+
companyId: 'manual-company',
|
|
387
|
+
apiKey: 'manual-key'
|
|
388
|
+
},
|
|
389
|
+
preferSubmittedValuesForManagedFields: true
|
|
390
|
+
});
|
|
391
|
+
|
|
392
|
+
expect(result.resolvedAdditionalInfo).toEqual({
|
|
393
|
+
companyId: 'manual-company',
|
|
394
|
+
apiKey: 'manual-key'
|
|
395
|
+
});
|
|
396
|
+
expect(result.resolvedApiKey).toBe('manual-key');
|
|
397
|
+
expect(result.missingRequiredFieldConsts).toEqual([]);
|
|
398
|
+
});
|
|
399
|
+
|
|
400
|
+
test('upsertUserManagedAuthValues throws when rcExtensionId is missing', async () => {
|
|
401
|
+
await expect(managedAuthHandler.upsertUserManagedAuthValues({
|
|
402
|
+
rcAccountId: 'acc-5',
|
|
403
|
+
platform: 'testCRM',
|
|
404
|
+
values: { apiKey: 'x' }
|
|
405
|
+
})).rejects.toThrow('rcExtensionId is required for user managed auth values');
|
|
406
|
+
});
|
|
407
|
+
|
|
408
|
+
test('upsertOrgManagedAuthValues removes specified fields', async () => {
|
|
409
|
+
connectorRegistry.getManifest.mockReturnValue({
|
|
410
|
+
platforms: {
|
|
411
|
+
testCRM: {
|
|
412
|
+
auth: {
|
|
413
|
+
type: 'apiKey',
|
|
414
|
+
apiKey: {
|
|
415
|
+
page: {
|
|
416
|
+
content: [
|
|
417
|
+
{ const: 'tenantId', managed: true, managedScope: 'account' },
|
|
418
|
+
{ const: 'region', managed: true, managedScope: 'account' }
|
|
419
|
+
]
|
|
420
|
+
}
|
|
421
|
+
}
|
|
422
|
+
}
|
|
423
|
+
}
|
|
424
|
+
}
|
|
425
|
+
});
|
|
426
|
+
|
|
427
|
+
await managedAuthHandler.upsertOrgManagedAuthValues({
|
|
428
|
+
rcAccountId: 'acc-6',
|
|
429
|
+
platform: 'testCRM',
|
|
430
|
+
values: { tenantId: 'tenant-6', region: 'us' }
|
|
431
|
+
});
|
|
432
|
+
|
|
433
|
+
await managedAuthHandler.upsertOrgManagedAuthValues({
|
|
434
|
+
rcAccountId: 'acc-6',
|
|
435
|
+
platform: 'testCRM',
|
|
436
|
+
values: {},
|
|
437
|
+
fieldsToRemove: ['tenantId']
|
|
438
|
+
});
|
|
439
|
+
|
|
440
|
+
const settings = await managedAuthHandler.getManagedAuthAdminSettings({
|
|
441
|
+
platform: 'testCRM',
|
|
442
|
+
rcAccountId: 'acc-6'
|
|
443
|
+
});
|
|
444
|
+
expect(settings.orgValues.tenantId.hasValue).toBe(false);
|
|
445
|
+
expect(settings.orgValues.region.value).toBe('us');
|
|
446
|
+
|
|
447
|
+
const record = await AccountDataModel.findOne({
|
|
448
|
+
where: {
|
|
449
|
+
rcAccountId: 'acc-6',
|
|
450
|
+
platformName: 'testCRM',
|
|
451
|
+
dataKey: 'managed-auth-org'
|
|
452
|
+
}
|
|
453
|
+
});
|
|
454
|
+
expect(record.data.fields.tenantId).toBeUndefined();
|
|
455
|
+
expect(record.data.fields.region).toBeDefined();
|
|
456
|
+
});
|
|
457
|
+
});
|
|
458
|
+
|