@app-connect/core 1.7.24 → 1.7.26

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (137) hide show
  1. package/.env.test +5 -5
  2. package/README.md +441 -441
  3. package/connector/developerPortal.js +31 -42
  4. package/connector/mock.js +84 -77
  5. package/connector/proxy/engine.js +164 -163
  6. package/connector/proxy/index.js +500 -500
  7. package/connector/registry.js +252 -252
  8. package/docs/README.md +50 -50
  9. package/docs/architecture.md +93 -93
  10. package/docs/connectors.md +116 -117
  11. package/docs/handlers.md +125 -125
  12. package/docs/libraries.md +101 -101
  13. package/docs/models.md +144 -144
  14. package/docs/routes.md +115 -115
  15. package/docs/tests.md +73 -73
  16. package/handlers/admin.js +523 -523
  17. package/handlers/appointment.js +193 -0
  18. package/handlers/auth.js +296 -296
  19. package/handlers/calldown.js +99 -99
  20. package/handlers/contact.js +280 -280
  21. package/handlers/disposition.js +82 -80
  22. package/handlers/log.js +984 -973
  23. package/handlers/managedAuth.js +446 -446
  24. package/handlers/plugin.js +208 -208
  25. package/handlers/user.js +142 -142
  26. package/index.js +3140 -2652
  27. package/jest.config.js +56 -56
  28. package/lib/analytics.js +54 -54
  29. package/lib/authSession.js +109 -109
  30. package/lib/cacheCleanup.js +21 -0
  31. package/lib/callLogComposer.js +898 -898
  32. package/lib/callLogLookup.js +34 -0
  33. package/lib/constants.js +8 -8
  34. package/lib/debugTracer.js +177 -177
  35. package/lib/encode.js +30 -30
  36. package/lib/errorHandler.js +218 -206
  37. package/lib/generalErrorMessage.js +41 -41
  38. package/lib/jwt.js +18 -18
  39. package/lib/logger.js +190 -190
  40. package/lib/migrateCallLogsSchema.js +116 -0
  41. package/lib/ringcentral.js +266 -266
  42. package/lib/s3ErrorLogReport.js +65 -65
  43. package/lib/sharedSMSComposer.js +471 -471
  44. package/lib/util.js +67 -67
  45. package/mcp/README.md +412 -395
  46. package/mcp/lib/validator.js +91 -91
  47. package/mcp/mcpHandler.js +425 -425
  48. package/mcp/tools/cancelAppointment.js +101 -0
  49. package/mcp/tools/checkAuthStatus.js +105 -105
  50. package/mcp/tools/confirmAppointment.js +101 -0
  51. package/mcp/tools/createAppointment.js +157 -0
  52. package/mcp/tools/createCallLog.js +327 -316
  53. package/mcp/tools/createContact.js +117 -117
  54. package/mcp/tools/createMessageLog.js +287 -287
  55. package/mcp/tools/doAuth.js +60 -60
  56. package/mcp/tools/findContactByName.js +93 -93
  57. package/mcp/tools/findContactByPhone.js +101 -101
  58. package/mcp/tools/getCallLog.js +111 -102
  59. package/mcp/tools/getGoogleFilePicker.js +99 -99
  60. package/mcp/tools/getHelp.js +43 -43
  61. package/mcp/tools/getPublicConnectors.js +94 -94
  62. package/mcp/tools/getSessionInfo.js +90 -90
  63. package/mcp/tools/index.js +51 -41
  64. package/mcp/tools/listAppointments.js +163 -0
  65. package/mcp/tools/logout.js +96 -96
  66. package/mcp/tools/rcGetCallLogs.js +65 -65
  67. package/mcp/tools/updateAppointment.js +154 -0
  68. package/mcp/tools/updateCallLog.js +130 -126
  69. package/mcp/ui/App/App.tsx +358 -358
  70. package/mcp/ui/App/components/AuthInfoForm.tsx +113 -113
  71. package/mcp/ui/App/components/AuthSuccess.tsx +22 -22
  72. package/mcp/ui/App/components/ConnectorList.tsx +82 -82
  73. package/mcp/ui/App/components/DebugPanel.tsx +43 -43
  74. package/mcp/ui/App/components/OAuthConnect.tsx +270 -270
  75. package/mcp/ui/App/lib/callTool.ts +130 -130
  76. package/mcp/ui/App/lib/debugLog.ts +41 -41
  77. package/mcp/ui/App/lib/developerPortal.ts +111 -111
  78. package/mcp/ui/App/main.css +5 -5
  79. package/mcp/ui/App/root.tsx +13 -13
  80. package/mcp/ui/index.html +13 -13
  81. package/mcp/ui/package-lock.json +6356 -6356
  82. package/mcp/ui/package.json +25 -25
  83. package/mcp/ui/tsconfig.json +26 -26
  84. package/mcp/ui/vite.config.ts +16 -16
  85. package/models/accountDataModel.js +33 -33
  86. package/models/adminConfigModel.js +35 -35
  87. package/models/cacheModel.js +30 -26
  88. package/models/callDownListModel.js +34 -34
  89. package/models/callLogModel.js +33 -27
  90. package/models/dynamo/connectorSchema.js +146 -146
  91. package/models/dynamo/lockSchema.js +24 -24
  92. package/models/dynamo/noteCacheSchema.js +29 -29
  93. package/models/llmSessionModel.js +17 -17
  94. package/models/messageLogModel.js +25 -25
  95. package/models/sequelize.js +16 -16
  96. package/models/userModel.js +45 -45
  97. package/package.json +72 -72
  98. package/releaseNotes.json +1093 -1073
  99. package/test/connector/proxy/engine.test.js +126 -93
  100. package/test/connector/proxy/index.test.js +279 -279
  101. package/test/connector/proxy/sample.json +161 -161
  102. package/test/connector/registry.test.js +415 -415
  103. package/test/handlers/admin.test.js +616 -616
  104. package/test/handlers/auth.test.js +1018 -1015
  105. package/test/handlers/contact.test.js +1014 -1014
  106. package/test/handlers/log.test.js +1298 -1160
  107. package/test/handlers/managedAuth.test.js +458 -458
  108. package/test/handlers/plugin.test.js +380 -380
  109. package/test/index.test.js +105 -105
  110. package/test/lib/cacheCleanup.test.js +42 -0
  111. package/test/lib/callLogComposer.test.js +1231 -1231
  112. package/test/lib/debugTracer.test.js +328 -328
  113. package/test/lib/jwt.test.js +176 -176
  114. package/test/lib/logger.test.js +206 -206
  115. package/test/lib/oauth.test.js +359 -359
  116. package/test/lib/ringcentral.test.js +467 -467
  117. package/test/lib/sharedSMSComposer.test.js +1084 -1084
  118. package/test/lib/util.test.js +329 -329
  119. package/test/mcp/tools/checkAuthStatus.test.js +83 -82
  120. package/test/mcp/tools/createCallLog.test.js +436 -436
  121. package/test/mcp/tools/createContact.test.js +58 -58
  122. package/test/mcp/tools/createMessageLog.test.js +595 -595
  123. package/test/mcp/tools/doAuth.test.js +113 -113
  124. package/test/mcp/tools/findContactByName.test.js +275 -275
  125. package/test/mcp/tools/findContactByPhone.test.js +296 -296
  126. package/test/mcp/tools/getCallLog.test.js +298 -298
  127. package/test/mcp/tools/getGoogleFilePicker.test.js +281 -281
  128. package/test/mcp/tools/getPublicConnectors.test.js +107 -107
  129. package/test/mcp/tools/getSessionInfo.test.js +127 -127
  130. package/test/mcp/tools/logout.test.js +233 -233
  131. package/test/mcp/tools/rcGetCallLogs.test.js +56 -56
  132. package/test/mcp/tools/updateCallLog.test.js +360 -360
  133. package/test/models/accountDataModel.test.js +98 -98
  134. package/test/models/dynamo/connectorSchema.test.js +189 -189
  135. package/test/models/models.test.js +568 -539
  136. package/test/routes/managedAuthRoutes.test.js +104 -129
  137. package/test/setup.js +178 -178
@@ -1,458 +1,458 @@
1
- // Use in-memory SQLite for isolated model tests
2
- jest.mock('../../models/sequelize', () => {
3
- const { Sequelize } = require('sequelize');
4
- return {
5
- sequelize: new Sequelize({
6
- dialect: 'sqlite',
7
- storage: ':memory:',
8
- logging: false,
9
- }),
10
- };
11
- });
12
-
13
- jest.mock('../../connector/registry');
14
- jest.mock('../../connector/developerPortal', () => ({
15
- getConnectorManifest: jest.fn()
16
- }));
17
-
18
- const managedAuthHandler = require('../../handlers/managedAuth');
19
- const connectorRegistry = require('../../connector/registry');
20
- const developerPortal = require('../../connector/developerPortal');
21
- const { AccountDataModel } = require('../../models/accountDataModel');
22
- const { sequelize } = require('../../models/sequelize');
23
-
24
- describe('Managed Auth Handler', () => {
25
- beforeAll(async () => {
26
- process.env.APP_SERVER_SECRET_KEY = 'test-app-server-secret-key-123456';
27
- await AccountDataModel.sync({ force: true });
28
- });
29
-
30
- afterEach(async () => {
31
- await AccountDataModel.destroy({ where: {} });
32
- jest.clearAllMocks();
33
- });
34
-
35
- afterAll(async () => {
36
- await sequelize.close();
37
- });
38
-
39
- test('getManagedAuthState reports all required fields satisfied when shared values exist', async () => {
40
- connectorRegistry.getManifest.mockReturnValue({
41
- platforms: {
42
- testCRM: {
43
- auth: {
44
- type: 'apiKey',
45
- apiKey: {
46
- page: {
47
- content: [
48
- { const: 'tenantId', required: true, managed: true, managedScope: 'account' },
49
- { const: 'apiKey', required: true, managed: true, managedScope: 'user' }
50
- ]
51
- }
52
- }
53
- }
54
- }
55
- }
56
- });
57
-
58
- await managedAuthHandler.upsertOrgManagedAuthValues({
59
- rcAccountId: 'acc-1',
60
- platform: 'testCRM',
61
- values: { tenantId: 'tenant-1' }
62
- });
63
- await managedAuthHandler.upsertUserManagedAuthValues({
64
- rcAccountId: 'acc-1',
65
- platform: 'testCRM',
66
- rcExtensionId: '101',
67
- rcUserName: 'Agent 101',
68
- values: { apiKey: 'user-api-key' }
69
- });
70
-
71
- const state = await managedAuthHandler.getManagedAuthState({
72
- platform: 'testCRM',
73
- rcAccountId: 'acc-1',
74
- rcExtensionId: '101'
75
- });
76
-
77
- expect(state.hasManagedAuth).toBe(true);
78
- expect(state.allRequiredFieldsSatisfied).toBe(true);
79
- expect(state.visibleFieldConsts).toEqual([]);
80
- });
81
-
82
- test('getManagedAuthAdminSettings returns configured field values and keeps user records separate', async () => {
83
- connectorRegistry.getManifest.mockReturnValue({
84
- platforms: {
85
- testCRM: {
86
- auth: {
87
- type: 'apiKey',
88
- apiKey: {
89
- page: {
90
- content: [
91
- { const: 'tenantId', managed: true, managedScope: 'account' },
92
- { const: 'apiKey', managed: true, managedScope: 'user' }
93
- ]
94
- }
95
- }
96
- }
97
- }
98
- }
99
- });
100
-
101
- await managedAuthHandler.upsertOrgManagedAuthValues({
102
- rcAccountId: 'acc-2',
103
- platform: 'testCRM',
104
- values: { tenantId: 'tenant-secret' }
105
- });
106
- await managedAuthHandler.upsertUserManagedAuthValues({
107
- rcAccountId: 'acc-2',
108
- platform: 'testCRM',
109
- rcExtensionId: '102',
110
- rcUserName: 'Agent 102',
111
- values: { apiKey: 'user-key' }
112
- });
113
-
114
- const settings = await managedAuthHandler.getManagedAuthAdminSettings({
115
- platform: 'testCRM',
116
- rcAccountId: 'acc-2'
117
- });
118
-
119
- expect(settings.orgValues.tenantId.hasValue).toBe(true);
120
- expect(settings.orgValues.tenantId.value).toBe('tenant-secret');
121
- expect(settings.userValues[0].rcExtensionId).toBe('102');
122
- expect(settings.userValues[0].fields.apiKey.value).toBe('user-key');
123
- });
124
-
125
- test('upsertUserManagedAuthValues stores one row per extension with scoped dataKey', async () => {
126
- await managedAuthHandler.upsertUserManagedAuthValues({
127
- rcAccountId: 'acc-scope',
128
- platform: 'testCRM',
129
- rcExtensionId: '201',
130
- rcUserName: 'Agent 201',
131
- values: { apiKey: 'key-201' }
132
- });
133
- await managedAuthHandler.upsertUserManagedAuthValues({
134
- rcAccountId: 'acc-scope',
135
- platform: 'testCRM',
136
- rcExtensionId: '202',
137
- rcUserName: 'Agent 202',
138
- values: { apiKey: 'key-202' }
139
- });
140
-
141
- const records = await AccountDataModel.findAll({
142
- where: {
143
- rcAccountId: 'acc-scope',
144
- platformName: 'testCRM'
145
- }
146
- });
147
- const dataKeys = records.map(r => r.dataKey).sort();
148
-
149
- expect(dataKeys).toEqual(['managed-auth-user:201', 'managed-auth-user:202']);
150
- expect(records).toHaveLength(2);
151
- });
152
-
153
- test('getManagedAuthState loads field definitions from Developer Portal when connectorId is provided', async () => {
154
- developerPortal.getConnectorManifest.mockResolvedValue({
155
- platforms: {
156
- testCRM: {
157
- auth: {
158
- type: 'apiKey',
159
- apiKey: {
160
- page: {
161
- content: [
162
- { const: 'orgToken', required: true, managed: true, managedScope: 'account' }
163
- ]
164
- }
165
- }
166
- }
167
- }
168
- }
169
- });
170
-
171
- await managedAuthHandler.upsertOrgManagedAuthValues({
172
- rcAccountId: 'acc-3',
173
- platform: 'testCRM',
174
- values: { orgToken: 'portal-token' }
175
- });
176
-
177
- const state = await managedAuthHandler.getManagedAuthState({
178
- platform: 'testCRM',
179
- connectorId: 'connector-123',
180
- rcAccountId: 'acc-3'
181
- });
182
-
183
- expect(developerPortal.getConnectorManifest).toHaveBeenCalledWith({ connectorId: 'connector-123', isPrivate: false });
184
- expect(state.hasManagedAuth).toBe(true);
185
- expect(state.allRequiredFieldsSatisfied).toBe(true);
186
- expect(state.visibleFieldConsts).toEqual([]);
187
- });
188
-
189
- test('getManagedAuthState surfaces missing required fields for unshared and missing shared values', async () => {
190
- connectorRegistry.getManifest.mockReturnValue({
191
- platforms: {
192
- testCRM: {
193
- auth: {
194
- type: 'apiKey',
195
- apiKey: {
196
- page: {
197
- content: [
198
- { const: 'tenantId', required: true, managed: true, managedScope: 'account' },
199
- { const: 'userToken', required: true, managed: true, managedScope: 'user' },
200
- { const: 'apiSecret', required: true }
201
- ]
202
- }
203
- }
204
- }
205
- }
206
- }
207
- });
208
-
209
- await managedAuthHandler.upsertOrgManagedAuthValues({
210
- rcAccountId: 'acc-4',
211
- platform: 'testCRM',
212
- values: { tenantId: 'tenant-4' }
213
- });
214
-
215
- const state = await managedAuthHandler.getManagedAuthState({
216
- platform: 'testCRM',
217
- rcAccountId: 'acc-4',
218
- rcExtensionId: '404'
219
- });
220
-
221
- expect(state.hasManagedAuth).toBe(true);
222
- expect(state.allRequiredFieldsSatisfied).toBe(false);
223
- expect(state.visibleFieldConsts).toEqual(['userToken', 'apiSecret']);
224
- expect(state.missingRequiredFieldConsts).toEqual(['userToken', 'apiSecret']);
225
- });
226
-
227
- test('getManagedAuthState returns full-form behavior when connector has no shared fields', async () => {
228
- connectorRegistry.getManifest.mockReturnValue({
229
- platforms: {
230
- testCRM: {
231
- auth: {
232
- type: 'apiKey',
233
- apiKey: {
234
- page: {
235
- content: [
236
- { const: 'apiKey', required: true },
237
- { const: 'tenantId', required: true },
238
- { const: 'region', required: false }
239
- ]
240
- }
241
- }
242
- }
243
- }
244
- }
245
- });
246
-
247
- const state = await managedAuthHandler.getManagedAuthState({
248
- platform: 'testCRM',
249
- rcAccountId: 'acc-plain',
250
- rcExtensionId: '100'
251
- });
252
-
253
- expect(state.hasManagedAuth).toBe(false);
254
- expect(state.allRequiredFieldsSatisfied).toBe(false);
255
- expect(state.visibleFieldConsts).toBeNull();
256
- expect(state.missingRequiredFieldConsts).toEqual(['apiKey', 'tenantId']);
257
- });
258
-
259
- test('getManagedAuthState falls back to the full auth form after managed auto-login fails', async () => {
260
- connectorRegistry.getManifest.mockReturnValue({
261
- platforms: {
262
- testCRM: {
263
- auth: {
264
- type: 'apiKey',
265
- apiKey: {
266
- page: {
267
- content: [
268
- { const: 'tenantId', required: true, managed: true, managedScope: 'account' },
269
- { const: 'apiKey', required: true, managed: true, managedScope: 'user' },
270
- { const: 'region', required: false }
271
- ]
272
- }
273
- }
274
- }
275
- }
276
- }
277
- });
278
-
279
- await managedAuthHandler.upsertOrgManagedAuthValues({
280
- rcAccountId: 'acc-fallback',
281
- platform: 'testCRM',
282
- values: { tenantId: 'tenant-1' }
283
- });
284
- await managedAuthHandler.upsertUserManagedAuthValues({
285
- rcAccountId: 'acc-fallback',
286
- platform: 'testCRM',
287
- rcExtensionId: '501',
288
- rcUserName: 'Agent 501',
289
- values: { apiKey: 'bad-key' }
290
- });
291
- await managedAuthHandler.markManagedAuthLoginFailure({
292
- rcAccountId: 'acc-fallback',
293
- platform: 'testCRM',
294
- rcExtensionId: '501'
295
- });
296
-
297
- const state = await managedAuthHandler.getManagedAuthState({
298
- platform: 'testCRM',
299
- rcAccountId: 'acc-fallback',
300
- rcExtensionId: '501'
301
- });
302
-
303
- expect(state.hasManagedAuth).toBe(true);
304
- expect(state.allRequiredFieldsSatisfied).toBe(false);
305
- expect(state.visibleFieldConsts).toBeNull();
306
- expect(state.missingRequiredFieldConsts).toEqual(['tenantId', 'apiKey']);
307
- expect(state.fallbackToManualAuth).toBe(true);
308
- });
309
-
310
- test('resolveApiKeyLoginFields keeps submitted shared values when managed values are missing', async () => {
311
- connectorRegistry.getManifest.mockReturnValue({
312
- platforms: {
313
- testCRM: {
314
- auth: {
315
- type: 'apiKey',
316
- apiKey: {
317
- page: {
318
- content: [
319
- { const: 'companyId', required: true, managed: true, managedScope: 'account' },
320
- { const: 'userToken', required: true, managed: true, managedScope: 'user' },
321
- { const: 'region', required: false, managed: true, managedScope: 'account' }
322
- ]
323
- }
324
- }
325
- }
326
- }
327
- }
328
- });
329
-
330
- const result = await managedAuthHandler.resolveApiKeyLoginFields({
331
- platform: 'testCRM',
332
- rcAccountId: 'acc-shared-fallback',
333
- rcExtensionId: '201',
334
- additionalInfo: {
335
- companyId: 'company-123',
336
- userToken: 'user-token-123',
337
- region: 'us'
338
- }
339
- });
340
-
341
- expect(result.resolvedAdditionalInfo).toEqual({
342
- companyId: 'company-123',
343
- userToken: 'user-token-123',
344
- region: 'us'
345
- });
346
- expect(result.missingRequiredFieldConsts).toEqual([]);
347
- });
348
-
349
- test('resolveApiKeyLoginFields prefers submitted managed values during manual fallback', async () => {
350
- connectorRegistry.getManifest.mockReturnValue({
351
- platforms: {
352
- testCRM: {
353
- auth: {
354
- type: 'apiKey',
355
- apiKey: {
356
- page: {
357
- content: [
358
- { const: 'companyId', required: true, managed: true, managedScope: 'account' },
359
- { const: 'apiKey', required: true, managed: true, managedScope: 'user' }
360
- ]
361
- }
362
- }
363
- }
364
- }
365
- }
366
- });
367
-
368
- await managedAuthHandler.upsertOrgManagedAuthValues({
369
- rcAccountId: 'acc-override',
370
- platform: 'testCRM',
371
- values: { companyId: 'stored-company' }
372
- });
373
- await managedAuthHandler.upsertUserManagedAuthValues({
374
- rcAccountId: 'acc-override',
375
- platform: 'testCRM',
376
- rcExtensionId: '777',
377
- rcUserName: 'Agent 777',
378
- values: { apiKey: 'stored-key' }
379
- });
380
-
381
- const result = await managedAuthHandler.resolveApiKeyLoginFields({
382
- platform: 'testCRM',
383
- rcAccountId: 'acc-override',
384
- rcExtensionId: '777',
385
- additionalInfo: {
386
- companyId: 'manual-company',
387
- apiKey: 'manual-key'
388
- },
389
- preferSubmittedValuesForManagedFields: true
390
- });
391
-
392
- expect(result.resolvedAdditionalInfo).toEqual({
393
- companyId: 'manual-company',
394
- apiKey: 'manual-key'
395
- });
396
- expect(result.resolvedApiKey).toBe('manual-key');
397
- expect(result.missingRequiredFieldConsts).toEqual([]);
398
- });
399
-
400
- test('upsertUserManagedAuthValues throws when rcExtensionId is missing', async () => {
401
- await expect(managedAuthHandler.upsertUserManagedAuthValues({
402
- rcAccountId: 'acc-5',
403
- platform: 'testCRM',
404
- values: { apiKey: 'x' }
405
- })).rejects.toThrow('rcExtensionId is required for user managed auth values');
406
- });
407
-
408
- test('upsertOrgManagedAuthValues removes specified fields', async () => {
409
- connectorRegistry.getManifest.mockReturnValue({
410
- platforms: {
411
- testCRM: {
412
- auth: {
413
- type: 'apiKey',
414
- apiKey: {
415
- page: {
416
- content: [
417
- { const: 'tenantId', managed: true, managedScope: 'account' },
418
- { const: 'region', managed: true, managedScope: 'account' }
419
- ]
420
- }
421
- }
422
- }
423
- }
424
- }
425
- });
426
-
427
- await managedAuthHandler.upsertOrgManagedAuthValues({
428
- rcAccountId: 'acc-6',
429
- platform: 'testCRM',
430
- values: { tenantId: 'tenant-6', region: 'us' }
431
- });
432
-
433
- await managedAuthHandler.upsertOrgManagedAuthValues({
434
- rcAccountId: 'acc-6',
435
- platform: 'testCRM',
436
- values: {},
437
- fieldsToRemove: ['tenantId']
438
- });
439
-
440
- const settings = await managedAuthHandler.getManagedAuthAdminSettings({
441
- platform: 'testCRM',
442
- rcAccountId: 'acc-6'
443
- });
444
- expect(settings.orgValues.tenantId.hasValue).toBe(false);
445
- expect(settings.orgValues.region.value).toBe('us');
446
-
447
- const record = await AccountDataModel.findOne({
448
- where: {
449
- rcAccountId: 'acc-6',
450
- platformName: 'testCRM',
451
- dataKey: 'managed-auth-org'
452
- }
453
- });
454
- expect(record.data.fields.tenantId).toBeUndefined();
455
- expect(record.data.fields.region).toBeDefined();
456
- });
457
- });
458
-
1
+ // Use in-memory SQLite for isolated model tests
2
+ jest.mock('../../models/sequelize', () => {
3
+ const { Sequelize } = require('sequelize');
4
+ return {
5
+ sequelize: new Sequelize({
6
+ dialect: 'sqlite',
7
+ storage: ':memory:',
8
+ logging: false,
9
+ }),
10
+ };
11
+ });
12
+
13
+ jest.mock('../../connector/registry');
14
+ jest.mock('../../connector/developerPortal', () => ({
15
+ getConnectorManifest: jest.fn()
16
+ }));
17
+
18
+ const managedAuthHandler = require('../../handlers/managedAuth');
19
+ const connectorRegistry = require('../../connector/registry');
20
+ const developerPortal = require('../../connector/developerPortal');
21
+ const { AccountDataModel } = require('../../models/accountDataModel');
22
+ const { sequelize } = require('../../models/sequelize');
23
+
24
+ describe('Managed Auth Handler', () => {
25
+ beforeAll(async () => {
26
+ process.env.APP_SERVER_SECRET_KEY = 'test-app-server-secret-key-123456';
27
+ await AccountDataModel.sync({ force: true });
28
+ });
29
+
30
+ afterEach(async () => {
31
+ await AccountDataModel.destroy({ where: {} });
32
+ jest.clearAllMocks();
33
+ });
34
+
35
+ afterAll(async () => {
36
+ await sequelize.close();
37
+ });
38
+
39
+ test('getManagedAuthState reports all required fields satisfied when shared values exist', async () => {
40
+ connectorRegistry.getManifest.mockReturnValue({
41
+ platforms: {
42
+ testCRM: {
43
+ auth: {
44
+ type: 'apiKey',
45
+ apiKey: {
46
+ page: {
47
+ content: [
48
+ { const: 'tenantId', required: true, managed: true, managedScope: 'account' },
49
+ { const: 'apiKey', required: true, managed: true, managedScope: 'user' }
50
+ ]
51
+ }
52
+ }
53
+ }
54
+ }
55
+ }
56
+ });
57
+
58
+ await managedAuthHandler.upsertOrgManagedAuthValues({
59
+ rcAccountId: 'acc-1',
60
+ platform: 'testCRM',
61
+ values: { tenantId: 'tenant-1' }
62
+ });
63
+ await managedAuthHandler.upsertUserManagedAuthValues({
64
+ rcAccountId: 'acc-1',
65
+ platform: 'testCRM',
66
+ rcExtensionId: '101',
67
+ rcUserName: 'Agent 101',
68
+ values: { apiKey: 'user-api-key' }
69
+ });
70
+
71
+ const state = await managedAuthHandler.getManagedAuthState({
72
+ platform: 'testCRM',
73
+ rcAccountId: 'acc-1',
74
+ rcExtensionId: '101'
75
+ });
76
+
77
+ expect(state.hasManagedAuth).toBe(true);
78
+ expect(state.allRequiredFieldsSatisfied).toBe(true);
79
+ expect(state.visibleFieldConsts).toEqual([]);
80
+ });
81
+
82
+ test('getManagedAuthAdminSettings returns configured field values and keeps user records separate', async () => {
83
+ connectorRegistry.getManifest.mockReturnValue({
84
+ platforms: {
85
+ testCRM: {
86
+ auth: {
87
+ type: 'apiKey',
88
+ apiKey: {
89
+ page: {
90
+ content: [
91
+ { const: 'tenantId', managed: true, managedScope: 'account' },
92
+ { const: 'apiKey', managed: true, managedScope: 'user' }
93
+ ]
94
+ }
95
+ }
96
+ }
97
+ }
98
+ }
99
+ });
100
+
101
+ await managedAuthHandler.upsertOrgManagedAuthValues({
102
+ rcAccountId: 'acc-2',
103
+ platform: 'testCRM',
104
+ values: { tenantId: 'tenant-secret' }
105
+ });
106
+ await managedAuthHandler.upsertUserManagedAuthValues({
107
+ rcAccountId: 'acc-2',
108
+ platform: 'testCRM',
109
+ rcExtensionId: '102',
110
+ rcUserName: 'Agent 102',
111
+ values: { apiKey: 'user-key' }
112
+ });
113
+
114
+ const settings = await managedAuthHandler.getManagedAuthAdminSettings({
115
+ platform: 'testCRM',
116
+ rcAccountId: 'acc-2'
117
+ });
118
+
119
+ expect(settings.orgValues.tenantId.hasValue).toBe(true);
120
+ expect(settings.orgValues.tenantId.value).toBe('tenant-secret');
121
+ expect(settings.userValues[0].rcExtensionId).toBe('102');
122
+ expect(settings.userValues[0].fields.apiKey.value).toBe('user-key');
123
+ });
124
+
125
+ test('upsertUserManagedAuthValues stores one row per extension with scoped dataKey', async () => {
126
+ await managedAuthHandler.upsertUserManagedAuthValues({
127
+ rcAccountId: 'acc-scope',
128
+ platform: 'testCRM',
129
+ rcExtensionId: '201',
130
+ rcUserName: 'Agent 201',
131
+ values: { apiKey: 'key-201' }
132
+ });
133
+ await managedAuthHandler.upsertUserManagedAuthValues({
134
+ rcAccountId: 'acc-scope',
135
+ platform: 'testCRM',
136
+ rcExtensionId: '202',
137
+ rcUserName: 'Agent 202',
138
+ values: { apiKey: 'key-202' }
139
+ });
140
+
141
+ const records = await AccountDataModel.findAll({
142
+ where: {
143
+ rcAccountId: 'acc-scope',
144
+ platformName: 'testCRM'
145
+ }
146
+ });
147
+ const dataKeys = records.map(r => r.dataKey).sort();
148
+
149
+ expect(dataKeys).toEqual(['managed-auth-user:201', 'managed-auth-user:202']);
150
+ expect(records).toHaveLength(2);
151
+ });
152
+
153
+ test('getManagedAuthState loads field definitions from Developer Portal when connectorId is provided', async () => {
154
+ developerPortal.getConnectorManifest.mockResolvedValue({
155
+ platforms: {
156
+ testCRM: {
157
+ auth: {
158
+ type: 'apiKey',
159
+ apiKey: {
160
+ page: {
161
+ content: [
162
+ { const: 'orgToken', required: true, managed: true, managedScope: 'account' }
163
+ ]
164
+ }
165
+ }
166
+ }
167
+ }
168
+ }
169
+ });
170
+
171
+ await managedAuthHandler.upsertOrgManagedAuthValues({
172
+ rcAccountId: 'acc-3',
173
+ platform: 'testCRM',
174
+ values: { orgToken: 'portal-token' }
175
+ });
176
+
177
+ const state = await managedAuthHandler.getManagedAuthState({
178
+ platform: 'testCRM',
179
+ connectorId: 'connector-123',
180
+ rcAccountId: 'acc-3'
181
+ });
182
+
183
+ expect(developerPortal.getConnectorManifest).toHaveBeenCalledWith({ rcAccountId: 'acc-3', connectorId: 'connector-123', isPrivate: false });
184
+ expect(state.hasManagedAuth).toBe(true);
185
+ expect(state.allRequiredFieldsSatisfied).toBe(true);
186
+ expect(state.visibleFieldConsts).toEqual([]);
187
+ });
188
+
189
+ test('getManagedAuthState surfaces missing required fields for unshared and missing shared values', async () => {
190
+ connectorRegistry.getManifest.mockReturnValue({
191
+ platforms: {
192
+ testCRM: {
193
+ auth: {
194
+ type: 'apiKey',
195
+ apiKey: {
196
+ page: {
197
+ content: [
198
+ { const: 'tenantId', required: true, managed: true, managedScope: 'account' },
199
+ { const: 'userToken', required: true, managed: true, managedScope: 'user' },
200
+ { const: 'apiSecret', required: true }
201
+ ]
202
+ }
203
+ }
204
+ }
205
+ }
206
+ }
207
+ });
208
+
209
+ await managedAuthHandler.upsertOrgManagedAuthValues({
210
+ rcAccountId: 'acc-4',
211
+ platform: 'testCRM',
212
+ values: { tenantId: 'tenant-4' }
213
+ });
214
+
215
+ const state = await managedAuthHandler.getManagedAuthState({
216
+ platform: 'testCRM',
217
+ rcAccountId: 'acc-4',
218
+ rcExtensionId: '404'
219
+ });
220
+
221
+ expect(state.hasManagedAuth).toBe(true);
222
+ expect(state.allRequiredFieldsSatisfied).toBe(false);
223
+ expect(state.visibleFieldConsts).toEqual(['userToken', 'apiSecret']);
224
+ expect(state.missingRequiredFieldConsts).toEqual(['userToken', 'apiSecret']);
225
+ });
226
+
227
+ test('getManagedAuthState returns full-form behavior when connector has no shared fields', async () => {
228
+ connectorRegistry.getManifest.mockReturnValue({
229
+ platforms: {
230
+ testCRM: {
231
+ auth: {
232
+ type: 'apiKey',
233
+ apiKey: {
234
+ page: {
235
+ content: [
236
+ { const: 'apiKey', required: true },
237
+ { const: 'tenantId', required: true },
238
+ { const: 'region', required: false }
239
+ ]
240
+ }
241
+ }
242
+ }
243
+ }
244
+ }
245
+ });
246
+
247
+ const state = await managedAuthHandler.getManagedAuthState({
248
+ platform: 'testCRM',
249
+ rcAccountId: 'acc-plain',
250
+ rcExtensionId: '100'
251
+ });
252
+
253
+ expect(state.hasManagedAuth).toBe(false);
254
+ expect(state.allRequiredFieldsSatisfied).toBe(false);
255
+ expect(state.visibleFieldConsts).toBeNull();
256
+ expect(state.missingRequiredFieldConsts).toEqual(['apiKey', 'tenantId']);
257
+ });
258
+
259
+ test('getManagedAuthState falls back to the full auth form after managed auto-login fails', async () => {
260
+ connectorRegistry.getManifest.mockReturnValue({
261
+ platforms: {
262
+ testCRM: {
263
+ auth: {
264
+ type: 'apiKey',
265
+ apiKey: {
266
+ page: {
267
+ content: [
268
+ { const: 'tenantId', required: true, managed: true, managedScope: 'account' },
269
+ { const: 'apiKey', required: true, managed: true, managedScope: 'user' },
270
+ { const: 'region', required: false }
271
+ ]
272
+ }
273
+ }
274
+ }
275
+ }
276
+ }
277
+ });
278
+
279
+ await managedAuthHandler.upsertOrgManagedAuthValues({
280
+ rcAccountId: 'acc-fallback',
281
+ platform: 'testCRM',
282
+ values: { tenantId: 'tenant-1' }
283
+ });
284
+ await managedAuthHandler.upsertUserManagedAuthValues({
285
+ rcAccountId: 'acc-fallback',
286
+ platform: 'testCRM',
287
+ rcExtensionId: '501',
288
+ rcUserName: 'Agent 501',
289
+ values: { apiKey: 'bad-key' }
290
+ });
291
+ await managedAuthHandler.markManagedAuthLoginFailure({
292
+ rcAccountId: 'acc-fallback',
293
+ platform: 'testCRM',
294
+ rcExtensionId: '501'
295
+ });
296
+
297
+ const state = await managedAuthHandler.getManagedAuthState({
298
+ platform: 'testCRM',
299
+ rcAccountId: 'acc-fallback',
300
+ rcExtensionId: '501'
301
+ });
302
+
303
+ expect(state.hasManagedAuth).toBe(true);
304
+ expect(state.allRequiredFieldsSatisfied).toBe(false);
305
+ expect(state.visibleFieldConsts).toBeNull();
306
+ expect(state.missingRequiredFieldConsts).toEqual(['tenantId', 'apiKey']);
307
+ expect(state.fallbackToManualAuth).toBe(true);
308
+ });
309
+
310
+ test('resolveApiKeyLoginFields keeps submitted shared values when managed values are missing', async () => {
311
+ connectorRegistry.getManifest.mockReturnValue({
312
+ platforms: {
313
+ testCRM: {
314
+ auth: {
315
+ type: 'apiKey',
316
+ apiKey: {
317
+ page: {
318
+ content: [
319
+ { const: 'companyId', required: true, managed: true, managedScope: 'account' },
320
+ { const: 'userToken', required: true, managed: true, managedScope: 'user' },
321
+ { const: 'region', required: false, managed: true, managedScope: 'account' }
322
+ ]
323
+ }
324
+ }
325
+ }
326
+ }
327
+ }
328
+ });
329
+
330
+ const result = await managedAuthHandler.resolveApiKeyLoginFields({
331
+ platform: 'testCRM',
332
+ rcAccountId: 'acc-shared-fallback',
333
+ rcExtensionId: '201',
334
+ additionalInfo: {
335
+ companyId: 'company-123',
336
+ userToken: 'user-token-123',
337
+ region: 'us'
338
+ }
339
+ });
340
+
341
+ expect(result.resolvedAdditionalInfo).toEqual({
342
+ companyId: 'company-123',
343
+ userToken: 'user-token-123',
344
+ region: 'us'
345
+ });
346
+ expect(result.missingRequiredFieldConsts).toEqual([]);
347
+ });
348
+
349
+ test('resolveApiKeyLoginFields prefers submitted managed values during manual fallback', async () => {
350
+ connectorRegistry.getManifest.mockReturnValue({
351
+ platforms: {
352
+ testCRM: {
353
+ auth: {
354
+ type: 'apiKey',
355
+ apiKey: {
356
+ page: {
357
+ content: [
358
+ { const: 'companyId', required: true, managed: true, managedScope: 'account' },
359
+ { const: 'apiKey', required: true, managed: true, managedScope: 'user' }
360
+ ]
361
+ }
362
+ }
363
+ }
364
+ }
365
+ }
366
+ });
367
+
368
+ await managedAuthHandler.upsertOrgManagedAuthValues({
369
+ rcAccountId: 'acc-override',
370
+ platform: 'testCRM',
371
+ values: { companyId: 'stored-company' }
372
+ });
373
+ await managedAuthHandler.upsertUserManagedAuthValues({
374
+ rcAccountId: 'acc-override',
375
+ platform: 'testCRM',
376
+ rcExtensionId: '777',
377
+ rcUserName: 'Agent 777',
378
+ values: { apiKey: 'stored-key' }
379
+ });
380
+
381
+ const result = await managedAuthHandler.resolveApiKeyLoginFields({
382
+ platform: 'testCRM',
383
+ rcAccountId: 'acc-override',
384
+ rcExtensionId: '777',
385
+ additionalInfo: {
386
+ companyId: 'manual-company',
387
+ apiKey: 'manual-key'
388
+ },
389
+ preferSubmittedValuesForManagedFields: true
390
+ });
391
+
392
+ expect(result.resolvedAdditionalInfo).toEqual({
393
+ companyId: 'manual-company',
394
+ apiKey: 'manual-key'
395
+ });
396
+ expect(result.resolvedApiKey).toBe('manual-key');
397
+ expect(result.missingRequiredFieldConsts).toEqual([]);
398
+ });
399
+
400
+ test('upsertUserManagedAuthValues throws when rcExtensionId is missing', async () => {
401
+ await expect(managedAuthHandler.upsertUserManagedAuthValues({
402
+ rcAccountId: 'acc-5',
403
+ platform: 'testCRM',
404
+ values: { apiKey: 'x' }
405
+ })).rejects.toThrow('rcExtensionId is required for user managed auth values');
406
+ });
407
+
408
+ test('upsertOrgManagedAuthValues removes specified fields', async () => {
409
+ connectorRegistry.getManifest.mockReturnValue({
410
+ platforms: {
411
+ testCRM: {
412
+ auth: {
413
+ type: 'apiKey',
414
+ apiKey: {
415
+ page: {
416
+ content: [
417
+ { const: 'tenantId', managed: true, managedScope: 'account' },
418
+ { const: 'region', managed: true, managedScope: 'account' }
419
+ ]
420
+ }
421
+ }
422
+ }
423
+ }
424
+ }
425
+ });
426
+
427
+ await managedAuthHandler.upsertOrgManagedAuthValues({
428
+ rcAccountId: 'acc-6',
429
+ platform: 'testCRM',
430
+ values: { tenantId: 'tenant-6', region: 'us' }
431
+ });
432
+
433
+ await managedAuthHandler.upsertOrgManagedAuthValues({
434
+ rcAccountId: 'acc-6',
435
+ platform: 'testCRM',
436
+ values: {},
437
+ fieldsToRemove: ['tenantId']
438
+ });
439
+
440
+ const settings = await managedAuthHandler.getManagedAuthAdminSettings({
441
+ platform: 'testCRM',
442
+ rcAccountId: 'acc-6'
443
+ });
444
+ expect(settings.orgValues.tenantId.hasValue).toBe(false);
445
+ expect(settings.orgValues.region.value).toBe('us');
446
+
447
+ const record = await AccountDataModel.findOne({
448
+ where: {
449
+ rcAccountId: 'acc-6',
450
+ platformName: 'testCRM',
451
+ dataKey: 'managed-auth-org'
452
+ }
453
+ });
454
+ expect(record.data.fields.tenantId).toBeUndefined();
455
+ expect(record.data.fields.region).toBeDefined();
456
+ });
457
+ });
458
+