@app-connect/core 1.7.20 → 1.7.22

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (44) hide show
  1. package/README.md +8 -1
  2. package/connector/developerPortal.js +4 -4
  3. package/docs/README.md +50 -0
  4. package/docs/architecture.md +93 -0
  5. package/docs/connectors.md +117 -0
  6. package/docs/handlers.md +125 -0
  7. package/docs/libraries.md +101 -0
  8. package/docs/models.md +144 -0
  9. package/docs/routes.md +115 -0
  10. package/docs/tests.md +73 -0
  11. package/handlers/admin.js +22 -2
  12. package/handlers/auth.js +51 -10
  13. package/handlers/contact.js +7 -2
  14. package/handlers/log.js +4 -4
  15. package/handlers/managedAuth.js +446 -0
  16. package/index.js +263 -38
  17. package/lib/jwt.js +1 -1
  18. package/mcp/tools/createCallLog.js +5 -1
  19. package/mcp/tools/createContact.js +5 -1
  20. package/mcp/tools/createMessageLog.js +5 -1
  21. package/mcp/tools/findContactByName.js +5 -1
  22. package/mcp/tools/findContactByPhone.js +6 -2
  23. package/mcp/tools/getCallLog.js +5 -1
  24. package/mcp/tools/rcGetCallLogs.js +6 -2
  25. package/mcp/tools/updateCallLog.js +5 -1
  26. package/mcp/ui/App/lib/developerPortal.ts +1 -1
  27. package/package.json +1 -1
  28. package/releaseNotes.json +20 -0
  29. package/test/handlers/admin.test.js +34 -0
  30. package/test/handlers/auth.test.js +402 -6
  31. package/test/handlers/contact.test.js +162 -0
  32. package/test/handlers/managedAuth.test.js +458 -0
  33. package/test/index.test.js +105 -0
  34. package/test/lib/jwt.test.js +15 -0
  35. package/test/mcp/tools/createCallLog.test.js +11 -0
  36. package/test/mcp/tools/createContact.test.js +58 -0
  37. package/test/mcp/tools/createMessageLog.test.js +15 -0
  38. package/test/mcp/tools/findContactByName.test.js +12 -0
  39. package/test/mcp/tools/findContactByPhone.test.js +12 -0
  40. package/test/mcp/tools/getCallLog.test.js +12 -0
  41. package/test/mcp/tools/rcGetCallLogs.test.js +56 -0
  42. package/test/mcp/tools/updateCallLog.test.js +14 -0
  43. package/test/routes/managedAuthRoutes.test.js +132 -0
  44. package/test/setup.js +2 -0
@@ -436,6 +436,168 @@ describe('Contact Handler', () => {
436
436
  expect(cachedData.data).toEqual(updatedContact);
437
437
  });
438
438
 
439
+ test('should remove cached contact when force refresh returns null', async () => {
440
+ // Arrange
441
+ await UserModel.create(mockUser);
442
+ await AccountDataModel.create({
443
+ rcAccountId: 'rc-account-123',
444
+ platformName: 'testCRM',
445
+ dataKey: 'contact-+3333333333',
446
+ data: [{ id: 'stale-contact', name: 'Stale Contact' }]
447
+ });
448
+
449
+ const mockConnector = {
450
+ getAuthType: jest.fn().mockResolvedValue('apiKey'),
451
+ getBasicAuth: jest.fn().mockReturnValue('base64-encoded'),
452
+ findContact: jest.fn().mockResolvedValue({
453
+ successful: false,
454
+ matchedContactInfo: null
455
+ })
456
+ };
457
+ connectorRegistry.getConnector.mockReturnValue(mockConnector);
458
+
459
+ // Act
460
+ const result = await contactHandler.findContact({
461
+ platform: 'testCRM',
462
+ userId: 'test-user-id',
463
+ phoneNumber: '+3333333333',
464
+ isForceRefreshAccountData: true
465
+ });
466
+
467
+ // Assert
468
+ expect(result.successful).toBe(false);
469
+ const cachedData = await AccountDataModel.findOne({
470
+ where: {
471
+ rcAccountId: 'rc-account-123',
472
+ platformName: 'testCRM',
473
+ dataKey: 'contact-+3333333333'
474
+ }
475
+ });
476
+ expect(cachedData).toBeNull();
477
+ });
478
+
479
+ test('should remove cached contact when force refresh returns empty array', async () => {
480
+ // Arrange
481
+ await UserModel.create(mockUser);
482
+ await AccountDataModel.create({
483
+ rcAccountId: 'rc-account-123',
484
+ platformName: 'testCRM',
485
+ dataKey: 'contact-+1212121212',
486
+ data: [{ id: 'stale-contact', name: 'Stale Contact' }]
487
+ });
488
+
489
+ const mockConnector = {
490
+ getAuthType: jest.fn().mockResolvedValue('apiKey'),
491
+ getBasicAuth: jest.fn().mockReturnValue('base64-encoded'),
492
+ findContact: jest.fn().mockResolvedValue({
493
+ successful: false,
494
+ matchedContactInfo: []
495
+ })
496
+ };
497
+ connectorRegistry.getConnector.mockReturnValue(mockConnector);
498
+
499
+ // Act
500
+ await contactHandler.findContact({
501
+ platform: 'testCRM',
502
+ userId: 'test-user-id',
503
+ phoneNumber: '+1212121212',
504
+ isForceRefreshAccountData: true
505
+ });
506
+
507
+ // Assert
508
+ const cachedData = await AccountDataModel.findOne({
509
+ where: {
510
+ rcAccountId: 'rc-account-123',
511
+ platformName: 'testCRM',
512
+ dataKey: 'contact-+1212121212'
513
+ }
514
+ });
515
+ expect(cachedData).toBeNull();
516
+ });
517
+
518
+ test('should remove cached contact when force refresh returns only new contact placeholder', async () => {
519
+ // Arrange
520
+ await UserModel.create(mockUser);
521
+ await AccountDataModel.create({
522
+ rcAccountId: 'rc-account-123',
523
+ platformName: 'testCRM',
524
+ dataKey: 'contact-+3434343434',
525
+ data: [{ id: 'stale-contact', name: 'Stale Contact' }]
526
+ });
527
+
528
+ const placeholderContact = [
529
+ { id: 'new-contact', name: 'Create Contact', isNewContact: true }
530
+ ];
531
+ const mockConnector = {
532
+ getAuthType: jest.fn().mockResolvedValue('apiKey'),
533
+ getBasicAuth: jest.fn().mockReturnValue('base64-encoded'),
534
+ findContact: jest.fn().mockResolvedValue({
535
+ successful: false,
536
+ matchedContactInfo: placeholderContact
537
+ })
538
+ };
539
+ connectorRegistry.getConnector.mockReturnValue(mockConnector);
540
+
541
+ // Act
542
+ const result = await contactHandler.findContact({
543
+ platform: 'testCRM',
544
+ userId: 'test-user-id',
545
+ phoneNumber: '+3434343434',
546
+ isForceRefreshAccountData: true
547
+ });
548
+
549
+ // Assert
550
+ expect(result.contact).toEqual(placeholderContact);
551
+ const cachedData = await AccountDataModel.findOne({
552
+ where: {
553
+ rcAccountId: 'rc-account-123',
554
+ platformName: 'testCRM',
555
+ dataKey: 'contact-+3434343434'
556
+ }
557
+ });
558
+ expect(cachedData).toBeNull();
559
+ });
560
+
561
+ test('should keep cached contact when force refresh connector call errors', async () => {
562
+ // Arrange
563
+ await UserModel.create(mockUser);
564
+ await AccountDataModel.create({
565
+ rcAccountId: 'rc-account-123',
566
+ platformName: 'testCRM',
567
+ dataKey: 'contact-+5656565656',
568
+ data: [{ id: 'stale-contact', name: 'Stale Contact' }]
569
+ });
570
+
571
+ const mockConnector = {
572
+ getAuthType: jest.fn().mockResolvedValue('apiKey'),
573
+ getBasicAuth: jest.fn().mockReturnValue('base64-encoded'),
574
+ findContact: jest.fn().mockRejectedValue({
575
+ response: { status: 500 }
576
+ })
577
+ };
578
+ connectorRegistry.getConnector.mockReturnValue(mockConnector);
579
+
580
+ // Act
581
+ const result = await contactHandler.findContact({
582
+ platform: 'testCRM',
583
+ userId: 'test-user-id',
584
+ phoneNumber: '+5656565656',
585
+ isForceRefreshAccountData: true
586
+ });
587
+
588
+ // Assert
589
+ expect(result.successful).toBe(false);
590
+ const cachedData = await AccountDataModel.findOne({
591
+ where: {
592
+ rcAccountId: 'rc-account-123',
593
+ platformName: 'testCRM',
594
+ dataKey: 'contact-+5656565656'
595
+ }
596
+ });
597
+ expect(cachedData).not.toBeNull();
598
+ expect(cachedData.data).toEqual([{ id: 'stale-contact', name: 'Stale Contact' }]);
599
+ });
600
+
439
601
  test('should work with tracer when provided', async () => {
440
602
  // Arrange
441
603
  await UserModel.create(mockUser);
@@ -0,0 +1,458 @@
1
+ // Use in-memory SQLite for isolated model tests
2
+ jest.mock('../../models/sequelize', () => {
3
+ const { Sequelize } = require('sequelize');
4
+ return {
5
+ sequelize: new Sequelize({
6
+ dialect: 'sqlite',
7
+ storage: ':memory:',
8
+ logging: false,
9
+ }),
10
+ };
11
+ });
12
+
13
+ jest.mock('../../connector/registry');
14
+ jest.mock('../../connector/developerPortal', () => ({
15
+ getConnectorManifest: jest.fn()
16
+ }));
17
+
18
+ const managedAuthHandler = require('../../handlers/managedAuth');
19
+ const connectorRegistry = require('../../connector/registry');
20
+ const developerPortal = require('../../connector/developerPortal');
21
+ const { AccountDataModel } = require('../../models/accountDataModel');
22
+ const { sequelize } = require('../../models/sequelize');
23
+
24
+ describe('Managed Auth Handler', () => {
25
+ beforeAll(async () => {
26
+ process.env.APP_SERVER_SECRET_KEY = 'test-app-server-secret-key-123456';
27
+ await AccountDataModel.sync({ force: true });
28
+ });
29
+
30
+ afterEach(async () => {
31
+ await AccountDataModel.destroy({ where: {} });
32
+ jest.clearAllMocks();
33
+ });
34
+
35
+ afterAll(async () => {
36
+ await sequelize.close();
37
+ });
38
+
39
+ test('getManagedAuthState reports all required fields satisfied when shared values exist', async () => {
40
+ connectorRegistry.getManifest.mockReturnValue({
41
+ platforms: {
42
+ testCRM: {
43
+ auth: {
44
+ type: 'apiKey',
45
+ apiKey: {
46
+ page: {
47
+ content: [
48
+ { const: 'tenantId', required: true, managed: true, managedScope: 'account' },
49
+ { const: 'apiKey', required: true, managed: true, managedScope: 'user' }
50
+ ]
51
+ }
52
+ }
53
+ }
54
+ }
55
+ }
56
+ });
57
+
58
+ await managedAuthHandler.upsertOrgManagedAuthValues({
59
+ rcAccountId: 'acc-1',
60
+ platform: 'testCRM',
61
+ values: { tenantId: 'tenant-1' }
62
+ });
63
+ await managedAuthHandler.upsertUserManagedAuthValues({
64
+ rcAccountId: 'acc-1',
65
+ platform: 'testCRM',
66
+ rcExtensionId: '101',
67
+ rcUserName: 'Agent 101',
68
+ values: { apiKey: 'user-api-key' }
69
+ });
70
+
71
+ const state = await managedAuthHandler.getManagedAuthState({
72
+ platform: 'testCRM',
73
+ rcAccountId: 'acc-1',
74
+ rcExtensionId: '101'
75
+ });
76
+
77
+ expect(state.hasManagedAuth).toBe(true);
78
+ expect(state.allRequiredFieldsSatisfied).toBe(true);
79
+ expect(state.visibleFieldConsts).toEqual([]);
80
+ });
81
+
82
+ test('getManagedAuthAdminSettings returns configured field values and keeps user records separate', async () => {
83
+ connectorRegistry.getManifest.mockReturnValue({
84
+ platforms: {
85
+ testCRM: {
86
+ auth: {
87
+ type: 'apiKey',
88
+ apiKey: {
89
+ page: {
90
+ content: [
91
+ { const: 'tenantId', managed: true, managedScope: 'account' },
92
+ { const: 'apiKey', managed: true, managedScope: 'user' }
93
+ ]
94
+ }
95
+ }
96
+ }
97
+ }
98
+ }
99
+ });
100
+
101
+ await managedAuthHandler.upsertOrgManagedAuthValues({
102
+ rcAccountId: 'acc-2',
103
+ platform: 'testCRM',
104
+ values: { tenantId: 'tenant-secret' }
105
+ });
106
+ await managedAuthHandler.upsertUserManagedAuthValues({
107
+ rcAccountId: 'acc-2',
108
+ platform: 'testCRM',
109
+ rcExtensionId: '102',
110
+ rcUserName: 'Agent 102',
111
+ values: { apiKey: 'user-key' }
112
+ });
113
+
114
+ const settings = await managedAuthHandler.getManagedAuthAdminSettings({
115
+ platform: 'testCRM',
116
+ rcAccountId: 'acc-2'
117
+ });
118
+
119
+ expect(settings.orgValues.tenantId.hasValue).toBe(true);
120
+ expect(settings.orgValues.tenantId.value).toBe('tenant-secret');
121
+ expect(settings.userValues[0].rcExtensionId).toBe('102');
122
+ expect(settings.userValues[0].fields.apiKey.value).toBe('user-key');
123
+ });
124
+
125
+ test('upsertUserManagedAuthValues stores one row per extension with scoped dataKey', async () => {
126
+ await managedAuthHandler.upsertUserManagedAuthValues({
127
+ rcAccountId: 'acc-scope',
128
+ platform: 'testCRM',
129
+ rcExtensionId: '201',
130
+ rcUserName: 'Agent 201',
131
+ values: { apiKey: 'key-201' }
132
+ });
133
+ await managedAuthHandler.upsertUserManagedAuthValues({
134
+ rcAccountId: 'acc-scope',
135
+ platform: 'testCRM',
136
+ rcExtensionId: '202',
137
+ rcUserName: 'Agent 202',
138
+ values: { apiKey: 'key-202' }
139
+ });
140
+
141
+ const records = await AccountDataModel.findAll({
142
+ where: {
143
+ rcAccountId: 'acc-scope',
144
+ platformName: 'testCRM'
145
+ }
146
+ });
147
+ const dataKeys = records.map(r => r.dataKey).sort();
148
+
149
+ expect(dataKeys).toEqual(['managed-auth-user:201', 'managed-auth-user:202']);
150
+ expect(records).toHaveLength(2);
151
+ });
152
+
153
+ test('getManagedAuthState loads field definitions from Developer Portal when connectorId is provided', async () => {
154
+ developerPortal.getConnectorManifest.mockResolvedValue({
155
+ platforms: {
156
+ testCRM: {
157
+ auth: {
158
+ type: 'apiKey',
159
+ apiKey: {
160
+ page: {
161
+ content: [
162
+ { const: 'orgToken', required: true, managed: true, managedScope: 'account' }
163
+ ]
164
+ }
165
+ }
166
+ }
167
+ }
168
+ }
169
+ });
170
+
171
+ await managedAuthHandler.upsertOrgManagedAuthValues({
172
+ rcAccountId: 'acc-3',
173
+ platform: 'testCRM',
174
+ values: { orgToken: 'portal-token' }
175
+ });
176
+
177
+ const state = await managedAuthHandler.getManagedAuthState({
178
+ platform: 'testCRM',
179
+ connectorId: 'connector-123',
180
+ rcAccountId: 'acc-3'
181
+ });
182
+
183
+ expect(developerPortal.getConnectorManifest).toHaveBeenCalledWith({ connectorId: 'connector-123', isPrivate: false });
184
+ expect(state.hasManagedAuth).toBe(true);
185
+ expect(state.allRequiredFieldsSatisfied).toBe(true);
186
+ expect(state.visibleFieldConsts).toEqual([]);
187
+ });
188
+
189
+ test('getManagedAuthState surfaces missing required fields for unshared and missing shared values', async () => {
190
+ connectorRegistry.getManifest.mockReturnValue({
191
+ platforms: {
192
+ testCRM: {
193
+ auth: {
194
+ type: 'apiKey',
195
+ apiKey: {
196
+ page: {
197
+ content: [
198
+ { const: 'tenantId', required: true, managed: true, managedScope: 'account' },
199
+ { const: 'userToken', required: true, managed: true, managedScope: 'user' },
200
+ { const: 'apiSecret', required: true }
201
+ ]
202
+ }
203
+ }
204
+ }
205
+ }
206
+ }
207
+ });
208
+
209
+ await managedAuthHandler.upsertOrgManagedAuthValues({
210
+ rcAccountId: 'acc-4',
211
+ platform: 'testCRM',
212
+ values: { tenantId: 'tenant-4' }
213
+ });
214
+
215
+ const state = await managedAuthHandler.getManagedAuthState({
216
+ platform: 'testCRM',
217
+ rcAccountId: 'acc-4',
218
+ rcExtensionId: '404'
219
+ });
220
+
221
+ expect(state.hasManagedAuth).toBe(true);
222
+ expect(state.allRequiredFieldsSatisfied).toBe(false);
223
+ expect(state.visibleFieldConsts).toEqual(['userToken', 'apiSecret']);
224
+ expect(state.missingRequiredFieldConsts).toEqual(['userToken', 'apiSecret']);
225
+ });
226
+
227
+ test('getManagedAuthState returns full-form behavior when connector has no shared fields', async () => {
228
+ connectorRegistry.getManifest.mockReturnValue({
229
+ platforms: {
230
+ testCRM: {
231
+ auth: {
232
+ type: 'apiKey',
233
+ apiKey: {
234
+ page: {
235
+ content: [
236
+ { const: 'apiKey', required: true },
237
+ { const: 'tenantId', required: true },
238
+ { const: 'region', required: false }
239
+ ]
240
+ }
241
+ }
242
+ }
243
+ }
244
+ }
245
+ });
246
+
247
+ const state = await managedAuthHandler.getManagedAuthState({
248
+ platform: 'testCRM',
249
+ rcAccountId: 'acc-plain',
250
+ rcExtensionId: '100'
251
+ });
252
+
253
+ expect(state.hasManagedAuth).toBe(false);
254
+ expect(state.allRequiredFieldsSatisfied).toBe(false);
255
+ expect(state.visibleFieldConsts).toBeNull();
256
+ expect(state.missingRequiredFieldConsts).toEqual(['apiKey', 'tenantId']);
257
+ });
258
+
259
+ test('getManagedAuthState falls back to the full auth form after managed auto-login fails', async () => {
260
+ connectorRegistry.getManifest.mockReturnValue({
261
+ platforms: {
262
+ testCRM: {
263
+ auth: {
264
+ type: 'apiKey',
265
+ apiKey: {
266
+ page: {
267
+ content: [
268
+ { const: 'tenantId', required: true, managed: true, managedScope: 'account' },
269
+ { const: 'apiKey', required: true, managed: true, managedScope: 'user' },
270
+ { const: 'region', required: false }
271
+ ]
272
+ }
273
+ }
274
+ }
275
+ }
276
+ }
277
+ });
278
+
279
+ await managedAuthHandler.upsertOrgManagedAuthValues({
280
+ rcAccountId: 'acc-fallback',
281
+ platform: 'testCRM',
282
+ values: { tenantId: 'tenant-1' }
283
+ });
284
+ await managedAuthHandler.upsertUserManagedAuthValues({
285
+ rcAccountId: 'acc-fallback',
286
+ platform: 'testCRM',
287
+ rcExtensionId: '501',
288
+ rcUserName: 'Agent 501',
289
+ values: { apiKey: 'bad-key' }
290
+ });
291
+ await managedAuthHandler.markManagedAuthLoginFailure({
292
+ rcAccountId: 'acc-fallback',
293
+ platform: 'testCRM',
294
+ rcExtensionId: '501'
295
+ });
296
+
297
+ const state = await managedAuthHandler.getManagedAuthState({
298
+ platform: 'testCRM',
299
+ rcAccountId: 'acc-fallback',
300
+ rcExtensionId: '501'
301
+ });
302
+
303
+ expect(state.hasManagedAuth).toBe(true);
304
+ expect(state.allRequiredFieldsSatisfied).toBe(false);
305
+ expect(state.visibleFieldConsts).toBeNull();
306
+ expect(state.missingRequiredFieldConsts).toEqual(['tenantId', 'apiKey']);
307
+ expect(state.fallbackToManualAuth).toBe(true);
308
+ });
309
+
310
+ test('resolveApiKeyLoginFields keeps submitted shared values when managed values are missing', async () => {
311
+ connectorRegistry.getManifest.mockReturnValue({
312
+ platforms: {
313
+ testCRM: {
314
+ auth: {
315
+ type: 'apiKey',
316
+ apiKey: {
317
+ page: {
318
+ content: [
319
+ { const: 'companyId', required: true, managed: true, managedScope: 'account' },
320
+ { const: 'userToken', required: true, managed: true, managedScope: 'user' },
321
+ { const: 'region', required: false, managed: true, managedScope: 'account' }
322
+ ]
323
+ }
324
+ }
325
+ }
326
+ }
327
+ }
328
+ });
329
+
330
+ const result = await managedAuthHandler.resolveApiKeyLoginFields({
331
+ platform: 'testCRM',
332
+ rcAccountId: 'acc-shared-fallback',
333
+ rcExtensionId: '201',
334
+ additionalInfo: {
335
+ companyId: 'company-123',
336
+ userToken: 'user-token-123',
337
+ region: 'us'
338
+ }
339
+ });
340
+
341
+ expect(result.resolvedAdditionalInfo).toEqual({
342
+ companyId: 'company-123',
343
+ userToken: 'user-token-123',
344
+ region: 'us'
345
+ });
346
+ expect(result.missingRequiredFieldConsts).toEqual([]);
347
+ });
348
+
349
+ test('resolveApiKeyLoginFields prefers submitted managed values during manual fallback', async () => {
350
+ connectorRegistry.getManifest.mockReturnValue({
351
+ platforms: {
352
+ testCRM: {
353
+ auth: {
354
+ type: 'apiKey',
355
+ apiKey: {
356
+ page: {
357
+ content: [
358
+ { const: 'companyId', required: true, managed: true, managedScope: 'account' },
359
+ { const: 'apiKey', required: true, managed: true, managedScope: 'user' }
360
+ ]
361
+ }
362
+ }
363
+ }
364
+ }
365
+ }
366
+ });
367
+
368
+ await managedAuthHandler.upsertOrgManagedAuthValues({
369
+ rcAccountId: 'acc-override',
370
+ platform: 'testCRM',
371
+ values: { companyId: 'stored-company' }
372
+ });
373
+ await managedAuthHandler.upsertUserManagedAuthValues({
374
+ rcAccountId: 'acc-override',
375
+ platform: 'testCRM',
376
+ rcExtensionId: '777',
377
+ rcUserName: 'Agent 777',
378
+ values: { apiKey: 'stored-key' }
379
+ });
380
+
381
+ const result = await managedAuthHandler.resolveApiKeyLoginFields({
382
+ platform: 'testCRM',
383
+ rcAccountId: 'acc-override',
384
+ rcExtensionId: '777',
385
+ additionalInfo: {
386
+ companyId: 'manual-company',
387
+ apiKey: 'manual-key'
388
+ },
389
+ preferSubmittedValuesForManagedFields: true
390
+ });
391
+
392
+ expect(result.resolvedAdditionalInfo).toEqual({
393
+ companyId: 'manual-company',
394
+ apiKey: 'manual-key'
395
+ });
396
+ expect(result.resolvedApiKey).toBe('manual-key');
397
+ expect(result.missingRequiredFieldConsts).toEqual([]);
398
+ });
399
+
400
+ test('upsertUserManagedAuthValues throws when rcExtensionId is missing', async () => {
401
+ await expect(managedAuthHandler.upsertUserManagedAuthValues({
402
+ rcAccountId: 'acc-5',
403
+ platform: 'testCRM',
404
+ values: { apiKey: 'x' }
405
+ })).rejects.toThrow('rcExtensionId is required for user managed auth values');
406
+ });
407
+
408
+ test('upsertOrgManagedAuthValues removes specified fields', async () => {
409
+ connectorRegistry.getManifest.mockReturnValue({
410
+ platforms: {
411
+ testCRM: {
412
+ auth: {
413
+ type: 'apiKey',
414
+ apiKey: {
415
+ page: {
416
+ content: [
417
+ { const: 'tenantId', managed: true, managedScope: 'account' },
418
+ { const: 'region', managed: true, managedScope: 'account' }
419
+ ]
420
+ }
421
+ }
422
+ }
423
+ }
424
+ }
425
+ });
426
+
427
+ await managedAuthHandler.upsertOrgManagedAuthValues({
428
+ rcAccountId: 'acc-6',
429
+ platform: 'testCRM',
430
+ values: { tenantId: 'tenant-6', region: 'us' }
431
+ });
432
+
433
+ await managedAuthHandler.upsertOrgManagedAuthValues({
434
+ rcAccountId: 'acc-6',
435
+ platform: 'testCRM',
436
+ values: {},
437
+ fieldsToRemove: ['tenantId']
438
+ });
439
+
440
+ const settings = await managedAuthHandler.getManagedAuthAdminSettings({
441
+ platform: 'testCRM',
442
+ rcAccountId: 'acc-6'
443
+ });
444
+ expect(settings.orgValues.tenantId.hasValue).toBe(false);
445
+ expect(settings.orgValues.region.value).toBe('us');
446
+
447
+ const record = await AccountDataModel.findOne({
448
+ where: {
449
+ rcAccountId: 'acc-6',
450
+ platformName: 'testCRM',
451
+ dataKey: 'managed-auth-org'
452
+ }
453
+ });
454
+ expect(record.data.fields.tenantId).toBeUndefined();
455
+ expect(record.data.fields.region).toBeDefined();
456
+ });
457
+ });
458
+