@app-connect/core 1.7.24 → 1.7.26
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.env.test +5 -5
- package/README.md +441 -441
- package/connector/developerPortal.js +31 -42
- package/connector/mock.js +84 -77
- package/connector/proxy/engine.js +164 -163
- package/connector/proxy/index.js +500 -500
- package/connector/registry.js +252 -252
- package/docs/README.md +50 -50
- package/docs/architecture.md +93 -93
- package/docs/connectors.md +116 -117
- package/docs/handlers.md +125 -125
- package/docs/libraries.md +101 -101
- package/docs/models.md +144 -144
- package/docs/routes.md +115 -115
- package/docs/tests.md +73 -73
- package/handlers/admin.js +523 -523
- package/handlers/appointment.js +193 -0
- package/handlers/auth.js +296 -296
- package/handlers/calldown.js +99 -99
- package/handlers/contact.js +280 -280
- package/handlers/disposition.js +82 -80
- package/handlers/log.js +984 -973
- package/handlers/managedAuth.js +446 -446
- package/handlers/plugin.js +208 -208
- package/handlers/user.js +142 -142
- package/index.js +3140 -2652
- package/jest.config.js +56 -56
- package/lib/analytics.js +54 -54
- package/lib/authSession.js +109 -109
- package/lib/cacheCleanup.js +21 -0
- package/lib/callLogComposer.js +898 -898
- package/lib/callLogLookup.js +34 -0
- package/lib/constants.js +8 -8
- package/lib/debugTracer.js +177 -177
- package/lib/encode.js +30 -30
- package/lib/errorHandler.js +218 -206
- package/lib/generalErrorMessage.js +41 -41
- package/lib/jwt.js +18 -18
- package/lib/logger.js +190 -190
- package/lib/migrateCallLogsSchema.js +116 -0
- package/lib/ringcentral.js +266 -266
- package/lib/s3ErrorLogReport.js +65 -65
- package/lib/sharedSMSComposer.js +471 -471
- package/lib/util.js +67 -67
- package/mcp/README.md +412 -395
- package/mcp/lib/validator.js +91 -91
- package/mcp/mcpHandler.js +425 -425
- package/mcp/tools/cancelAppointment.js +101 -0
- package/mcp/tools/checkAuthStatus.js +105 -105
- package/mcp/tools/confirmAppointment.js +101 -0
- package/mcp/tools/createAppointment.js +157 -0
- package/mcp/tools/createCallLog.js +327 -316
- package/mcp/tools/createContact.js +117 -117
- package/mcp/tools/createMessageLog.js +287 -287
- package/mcp/tools/doAuth.js +60 -60
- package/mcp/tools/findContactByName.js +93 -93
- package/mcp/tools/findContactByPhone.js +101 -101
- package/mcp/tools/getCallLog.js +111 -102
- package/mcp/tools/getGoogleFilePicker.js +99 -99
- package/mcp/tools/getHelp.js +43 -43
- package/mcp/tools/getPublicConnectors.js +94 -94
- package/mcp/tools/getSessionInfo.js +90 -90
- package/mcp/tools/index.js +51 -41
- package/mcp/tools/listAppointments.js +163 -0
- package/mcp/tools/logout.js +96 -96
- package/mcp/tools/rcGetCallLogs.js +65 -65
- package/mcp/tools/updateAppointment.js +154 -0
- package/mcp/tools/updateCallLog.js +130 -126
- package/mcp/ui/App/App.tsx +358 -358
- package/mcp/ui/App/components/AuthInfoForm.tsx +113 -113
- package/mcp/ui/App/components/AuthSuccess.tsx +22 -22
- package/mcp/ui/App/components/ConnectorList.tsx +82 -82
- package/mcp/ui/App/components/DebugPanel.tsx +43 -43
- package/mcp/ui/App/components/OAuthConnect.tsx +270 -270
- package/mcp/ui/App/lib/callTool.ts +130 -130
- package/mcp/ui/App/lib/debugLog.ts +41 -41
- package/mcp/ui/App/lib/developerPortal.ts +111 -111
- package/mcp/ui/App/main.css +5 -5
- package/mcp/ui/App/root.tsx +13 -13
- package/mcp/ui/index.html +13 -13
- package/mcp/ui/package-lock.json +6356 -6356
- package/mcp/ui/package.json +25 -25
- package/mcp/ui/tsconfig.json +26 -26
- package/mcp/ui/vite.config.ts +16 -16
- package/models/accountDataModel.js +33 -33
- package/models/adminConfigModel.js +35 -35
- package/models/cacheModel.js +30 -26
- package/models/callDownListModel.js +34 -34
- package/models/callLogModel.js +33 -27
- package/models/dynamo/connectorSchema.js +146 -146
- package/models/dynamo/lockSchema.js +24 -24
- package/models/dynamo/noteCacheSchema.js +29 -29
- package/models/llmSessionModel.js +17 -17
- package/models/messageLogModel.js +25 -25
- package/models/sequelize.js +16 -16
- package/models/userModel.js +45 -45
- package/package.json +72 -72
- package/releaseNotes.json +1093 -1073
- package/test/connector/proxy/engine.test.js +126 -93
- package/test/connector/proxy/index.test.js +279 -279
- package/test/connector/proxy/sample.json +161 -161
- package/test/connector/registry.test.js +415 -415
- package/test/handlers/admin.test.js +616 -616
- package/test/handlers/auth.test.js +1018 -1015
- package/test/handlers/contact.test.js +1014 -1014
- package/test/handlers/log.test.js +1298 -1160
- package/test/handlers/managedAuth.test.js +458 -458
- package/test/handlers/plugin.test.js +380 -380
- package/test/index.test.js +105 -105
- package/test/lib/cacheCleanup.test.js +42 -0
- package/test/lib/callLogComposer.test.js +1231 -1231
- package/test/lib/debugTracer.test.js +328 -328
- package/test/lib/jwt.test.js +176 -176
- package/test/lib/logger.test.js +206 -206
- package/test/lib/oauth.test.js +359 -359
- package/test/lib/ringcentral.test.js +467 -467
- package/test/lib/sharedSMSComposer.test.js +1084 -1084
- package/test/lib/util.test.js +329 -329
- package/test/mcp/tools/checkAuthStatus.test.js +83 -82
- package/test/mcp/tools/createCallLog.test.js +436 -436
- package/test/mcp/tools/createContact.test.js +58 -58
- package/test/mcp/tools/createMessageLog.test.js +595 -595
- package/test/mcp/tools/doAuth.test.js +113 -113
- package/test/mcp/tools/findContactByName.test.js +275 -275
- package/test/mcp/tools/findContactByPhone.test.js +296 -296
- package/test/mcp/tools/getCallLog.test.js +298 -298
- package/test/mcp/tools/getGoogleFilePicker.test.js +281 -281
- package/test/mcp/tools/getPublicConnectors.test.js +107 -107
- package/test/mcp/tools/getSessionInfo.test.js +127 -127
- package/test/mcp/tools/logout.test.js +233 -233
- package/test/mcp/tools/rcGetCallLogs.test.js +56 -56
- package/test/mcp/tools/updateCallLog.test.js +360 -360
- package/test/models/accountDataModel.test.js +98 -98
- package/test/models/dynamo/connectorSchema.test.js +189 -189
- package/test/models/models.test.js +568 -539
- package/test/routes/managedAuthRoutes.test.js +104 -129
- package/test/setup.js +178 -178
|
@@ -1,458 +1,458 @@
|
|
|
1
|
-
// Use in-memory SQLite for isolated model tests
|
|
2
|
-
jest.mock('../../models/sequelize', () => {
|
|
3
|
-
const { Sequelize } = require('sequelize');
|
|
4
|
-
return {
|
|
5
|
-
sequelize: new Sequelize({
|
|
6
|
-
dialect: 'sqlite',
|
|
7
|
-
storage: ':memory:',
|
|
8
|
-
logging: false,
|
|
9
|
-
}),
|
|
10
|
-
};
|
|
11
|
-
});
|
|
12
|
-
|
|
13
|
-
jest.mock('../../connector/registry');
|
|
14
|
-
jest.mock('../../connector/developerPortal', () => ({
|
|
15
|
-
getConnectorManifest: jest.fn()
|
|
16
|
-
}));
|
|
17
|
-
|
|
18
|
-
const managedAuthHandler = require('../../handlers/managedAuth');
|
|
19
|
-
const connectorRegistry = require('../../connector/registry');
|
|
20
|
-
const developerPortal = require('../../connector/developerPortal');
|
|
21
|
-
const { AccountDataModel } = require('../../models/accountDataModel');
|
|
22
|
-
const { sequelize } = require('../../models/sequelize');
|
|
23
|
-
|
|
24
|
-
describe('Managed Auth Handler', () => {
|
|
25
|
-
beforeAll(async () => {
|
|
26
|
-
process.env.APP_SERVER_SECRET_KEY = 'test-app-server-secret-key-123456';
|
|
27
|
-
await AccountDataModel.sync({ force: true });
|
|
28
|
-
});
|
|
29
|
-
|
|
30
|
-
afterEach(async () => {
|
|
31
|
-
await AccountDataModel.destroy({ where: {} });
|
|
32
|
-
jest.clearAllMocks();
|
|
33
|
-
});
|
|
34
|
-
|
|
35
|
-
afterAll(async () => {
|
|
36
|
-
await sequelize.close();
|
|
37
|
-
});
|
|
38
|
-
|
|
39
|
-
test('getManagedAuthState reports all required fields satisfied when shared values exist', async () => {
|
|
40
|
-
connectorRegistry.getManifest.mockReturnValue({
|
|
41
|
-
platforms: {
|
|
42
|
-
testCRM: {
|
|
43
|
-
auth: {
|
|
44
|
-
type: 'apiKey',
|
|
45
|
-
apiKey: {
|
|
46
|
-
page: {
|
|
47
|
-
content: [
|
|
48
|
-
{ const: 'tenantId', required: true, managed: true, managedScope: 'account' },
|
|
49
|
-
{ const: 'apiKey', required: true, managed: true, managedScope: 'user' }
|
|
50
|
-
]
|
|
51
|
-
}
|
|
52
|
-
}
|
|
53
|
-
}
|
|
54
|
-
}
|
|
55
|
-
}
|
|
56
|
-
});
|
|
57
|
-
|
|
58
|
-
await managedAuthHandler.upsertOrgManagedAuthValues({
|
|
59
|
-
rcAccountId: 'acc-1',
|
|
60
|
-
platform: 'testCRM',
|
|
61
|
-
values: { tenantId: 'tenant-1' }
|
|
62
|
-
});
|
|
63
|
-
await managedAuthHandler.upsertUserManagedAuthValues({
|
|
64
|
-
rcAccountId: 'acc-1',
|
|
65
|
-
platform: 'testCRM',
|
|
66
|
-
rcExtensionId: '101',
|
|
67
|
-
rcUserName: 'Agent 101',
|
|
68
|
-
values: { apiKey: 'user-api-key' }
|
|
69
|
-
});
|
|
70
|
-
|
|
71
|
-
const state = await managedAuthHandler.getManagedAuthState({
|
|
72
|
-
platform: 'testCRM',
|
|
73
|
-
rcAccountId: 'acc-1',
|
|
74
|
-
rcExtensionId: '101'
|
|
75
|
-
});
|
|
76
|
-
|
|
77
|
-
expect(state.hasManagedAuth).toBe(true);
|
|
78
|
-
expect(state.allRequiredFieldsSatisfied).toBe(true);
|
|
79
|
-
expect(state.visibleFieldConsts).toEqual([]);
|
|
80
|
-
});
|
|
81
|
-
|
|
82
|
-
test('getManagedAuthAdminSettings returns configured field values and keeps user records separate', async () => {
|
|
83
|
-
connectorRegistry.getManifest.mockReturnValue({
|
|
84
|
-
platforms: {
|
|
85
|
-
testCRM: {
|
|
86
|
-
auth: {
|
|
87
|
-
type: 'apiKey',
|
|
88
|
-
apiKey: {
|
|
89
|
-
page: {
|
|
90
|
-
content: [
|
|
91
|
-
{ const: 'tenantId', managed: true, managedScope: 'account' },
|
|
92
|
-
{ const: 'apiKey', managed: true, managedScope: 'user' }
|
|
93
|
-
]
|
|
94
|
-
}
|
|
95
|
-
}
|
|
96
|
-
}
|
|
97
|
-
}
|
|
98
|
-
}
|
|
99
|
-
});
|
|
100
|
-
|
|
101
|
-
await managedAuthHandler.upsertOrgManagedAuthValues({
|
|
102
|
-
rcAccountId: 'acc-2',
|
|
103
|
-
platform: 'testCRM',
|
|
104
|
-
values: { tenantId: 'tenant-secret' }
|
|
105
|
-
});
|
|
106
|
-
await managedAuthHandler.upsertUserManagedAuthValues({
|
|
107
|
-
rcAccountId: 'acc-2',
|
|
108
|
-
platform: 'testCRM',
|
|
109
|
-
rcExtensionId: '102',
|
|
110
|
-
rcUserName: 'Agent 102',
|
|
111
|
-
values: { apiKey: 'user-key' }
|
|
112
|
-
});
|
|
113
|
-
|
|
114
|
-
const settings = await managedAuthHandler.getManagedAuthAdminSettings({
|
|
115
|
-
platform: 'testCRM',
|
|
116
|
-
rcAccountId: 'acc-2'
|
|
117
|
-
});
|
|
118
|
-
|
|
119
|
-
expect(settings.orgValues.tenantId.hasValue).toBe(true);
|
|
120
|
-
expect(settings.orgValues.tenantId.value).toBe('tenant-secret');
|
|
121
|
-
expect(settings.userValues[0].rcExtensionId).toBe('102');
|
|
122
|
-
expect(settings.userValues[0].fields.apiKey.value).toBe('user-key');
|
|
123
|
-
});
|
|
124
|
-
|
|
125
|
-
test('upsertUserManagedAuthValues stores one row per extension with scoped dataKey', async () => {
|
|
126
|
-
await managedAuthHandler.upsertUserManagedAuthValues({
|
|
127
|
-
rcAccountId: 'acc-scope',
|
|
128
|
-
platform: 'testCRM',
|
|
129
|
-
rcExtensionId: '201',
|
|
130
|
-
rcUserName: 'Agent 201',
|
|
131
|
-
values: { apiKey: 'key-201' }
|
|
132
|
-
});
|
|
133
|
-
await managedAuthHandler.upsertUserManagedAuthValues({
|
|
134
|
-
rcAccountId: 'acc-scope',
|
|
135
|
-
platform: 'testCRM',
|
|
136
|
-
rcExtensionId: '202',
|
|
137
|
-
rcUserName: 'Agent 202',
|
|
138
|
-
values: { apiKey: 'key-202' }
|
|
139
|
-
});
|
|
140
|
-
|
|
141
|
-
const records = await AccountDataModel.findAll({
|
|
142
|
-
where: {
|
|
143
|
-
rcAccountId: 'acc-scope',
|
|
144
|
-
platformName: 'testCRM'
|
|
145
|
-
}
|
|
146
|
-
});
|
|
147
|
-
const dataKeys = records.map(r => r.dataKey).sort();
|
|
148
|
-
|
|
149
|
-
expect(dataKeys).toEqual(['managed-auth-user:201', 'managed-auth-user:202']);
|
|
150
|
-
expect(records).toHaveLength(2);
|
|
151
|
-
});
|
|
152
|
-
|
|
153
|
-
test('getManagedAuthState loads field definitions from Developer Portal when connectorId is provided', async () => {
|
|
154
|
-
developerPortal.getConnectorManifest.mockResolvedValue({
|
|
155
|
-
platforms: {
|
|
156
|
-
testCRM: {
|
|
157
|
-
auth: {
|
|
158
|
-
type: 'apiKey',
|
|
159
|
-
apiKey: {
|
|
160
|
-
page: {
|
|
161
|
-
content: [
|
|
162
|
-
{ const: 'orgToken', required: true, managed: true, managedScope: 'account' }
|
|
163
|
-
]
|
|
164
|
-
}
|
|
165
|
-
}
|
|
166
|
-
}
|
|
167
|
-
}
|
|
168
|
-
}
|
|
169
|
-
});
|
|
170
|
-
|
|
171
|
-
await managedAuthHandler.upsertOrgManagedAuthValues({
|
|
172
|
-
rcAccountId: 'acc-3',
|
|
173
|
-
platform: 'testCRM',
|
|
174
|
-
values: { orgToken: 'portal-token' }
|
|
175
|
-
});
|
|
176
|
-
|
|
177
|
-
const state = await managedAuthHandler.getManagedAuthState({
|
|
178
|
-
platform: 'testCRM',
|
|
179
|
-
connectorId: 'connector-123',
|
|
180
|
-
rcAccountId: 'acc-3'
|
|
181
|
-
});
|
|
182
|
-
|
|
183
|
-
expect(developerPortal.getConnectorManifest).toHaveBeenCalledWith({ connectorId: 'connector-123', isPrivate: false });
|
|
184
|
-
expect(state.hasManagedAuth).toBe(true);
|
|
185
|
-
expect(state.allRequiredFieldsSatisfied).toBe(true);
|
|
186
|
-
expect(state.visibleFieldConsts).toEqual([]);
|
|
187
|
-
});
|
|
188
|
-
|
|
189
|
-
test('getManagedAuthState surfaces missing required fields for unshared and missing shared values', async () => {
|
|
190
|
-
connectorRegistry.getManifest.mockReturnValue({
|
|
191
|
-
platforms: {
|
|
192
|
-
testCRM: {
|
|
193
|
-
auth: {
|
|
194
|
-
type: 'apiKey',
|
|
195
|
-
apiKey: {
|
|
196
|
-
page: {
|
|
197
|
-
content: [
|
|
198
|
-
{ const: 'tenantId', required: true, managed: true, managedScope: 'account' },
|
|
199
|
-
{ const: 'userToken', required: true, managed: true, managedScope: 'user' },
|
|
200
|
-
{ const: 'apiSecret', required: true }
|
|
201
|
-
]
|
|
202
|
-
}
|
|
203
|
-
}
|
|
204
|
-
}
|
|
205
|
-
}
|
|
206
|
-
}
|
|
207
|
-
});
|
|
208
|
-
|
|
209
|
-
await managedAuthHandler.upsertOrgManagedAuthValues({
|
|
210
|
-
rcAccountId: 'acc-4',
|
|
211
|
-
platform: 'testCRM',
|
|
212
|
-
values: { tenantId: 'tenant-4' }
|
|
213
|
-
});
|
|
214
|
-
|
|
215
|
-
const state = await managedAuthHandler.getManagedAuthState({
|
|
216
|
-
platform: 'testCRM',
|
|
217
|
-
rcAccountId: 'acc-4',
|
|
218
|
-
rcExtensionId: '404'
|
|
219
|
-
});
|
|
220
|
-
|
|
221
|
-
expect(state.hasManagedAuth).toBe(true);
|
|
222
|
-
expect(state.allRequiredFieldsSatisfied).toBe(false);
|
|
223
|
-
expect(state.visibleFieldConsts).toEqual(['userToken', 'apiSecret']);
|
|
224
|
-
expect(state.missingRequiredFieldConsts).toEqual(['userToken', 'apiSecret']);
|
|
225
|
-
});
|
|
226
|
-
|
|
227
|
-
test('getManagedAuthState returns full-form behavior when connector has no shared fields', async () => {
|
|
228
|
-
connectorRegistry.getManifest.mockReturnValue({
|
|
229
|
-
platforms: {
|
|
230
|
-
testCRM: {
|
|
231
|
-
auth: {
|
|
232
|
-
type: 'apiKey',
|
|
233
|
-
apiKey: {
|
|
234
|
-
page: {
|
|
235
|
-
content: [
|
|
236
|
-
{ const: 'apiKey', required: true },
|
|
237
|
-
{ const: 'tenantId', required: true },
|
|
238
|
-
{ const: 'region', required: false }
|
|
239
|
-
]
|
|
240
|
-
}
|
|
241
|
-
}
|
|
242
|
-
}
|
|
243
|
-
}
|
|
244
|
-
}
|
|
245
|
-
});
|
|
246
|
-
|
|
247
|
-
const state = await managedAuthHandler.getManagedAuthState({
|
|
248
|
-
platform: 'testCRM',
|
|
249
|
-
rcAccountId: 'acc-plain',
|
|
250
|
-
rcExtensionId: '100'
|
|
251
|
-
});
|
|
252
|
-
|
|
253
|
-
expect(state.hasManagedAuth).toBe(false);
|
|
254
|
-
expect(state.allRequiredFieldsSatisfied).toBe(false);
|
|
255
|
-
expect(state.visibleFieldConsts).toBeNull();
|
|
256
|
-
expect(state.missingRequiredFieldConsts).toEqual(['apiKey', 'tenantId']);
|
|
257
|
-
});
|
|
258
|
-
|
|
259
|
-
test('getManagedAuthState falls back to the full auth form after managed auto-login fails', async () => {
|
|
260
|
-
connectorRegistry.getManifest.mockReturnValue({
|
|
261
|
-
platforms: {
|
|
262
|
-
testCRM: {
|
|
263
|
-
auth: {
|
|
264
|
-
type: 'apiKey',
|
|
265
|
-
apiKey: {
|
|
266
|
-
page: {
|
|
267
|
-
content: [
|
|
268
|
-
{ const: 'tenantId', required: true, managed: true, managedScope: 'account' },
|
|
269
|
-
{ const: 'apiKey', required: true, managed: true, managedScope: 'user' },
|
|
270
|
-
{ const: 'region', required: false }
|
|
271
|
-
]
|
|
272
|
-
}
|
|
273
|
-
}
|
|
274
|
-
}
|
|
275
|
-
}
|
|
276
|
-
}
|
|
277
|
-
});
|
|
278
|
-
|
|
279
|
-
await managedAuthHandler.upsertOrgManagedAuthValues({
|
|
280
|
-
rcAccountId: 'acc-fallback',
|
|
281
|
-
platform: 'testCRM',
|
|
282
|
-
values: { tenantId: 'tenant-1' }
|
|
283
|
-
});
|
|
284
|
-
await managedAuthHandler.upsertUserManagedAuthValues({
|
|
285
|
-
rcAccountId: 'acc-fallback',
|
|
286
|
-
platform: 'testCRM',
|
|
287
|
-
rcExtensionId: '501',
|
|
288
|
-
rcUserName: 'Agent 501',
|
|
289
|
-
values: { apiKey: 'bad-key' }
|
|
290
|
-
});
|
|
291
|
-
await managedAuthHandler.markManagedAuthLoginFailure({
|
|
292
|
-
rcAccountId: 'acc-fallback',
|
|
293
|
-
platform: 'testCRM',
|
|
294
|
-
rcExtensionId: '501'
|
|
295
|
-
});
|
|
296
|
-
|
|
297
|
-
const state = await managedAuthHandler.getManagedAuthState({
|
|
298
|
-
platform: 'testCRM',
|
|
299
|
-
rcAccountId: 'acc-fallback',
|
|
300
|
-
rcExtensionId: '501'
|
|
301
|
-
});
|
|
302
|
-
|
|
303
|
-
expect(state.hasManagedAuth).toBe(true);
|
|
304
|
-
expect(state.allRequiredFieldsSatisfied).toBe(false);
|
|
305
|
-
expect(state.visibleFieldConsts).toBeNull();
|
|
306
|
-
expect(state.missingRequiredFieldConsts).toEqual(['tenantId', 'apiKey']);
|
|
307
|
-
expect(state.fallbackToManualAuth).toBe(true);
|
|
308
|
-
});
|
|
309
|
-
|
|
310
|
-
test('resolveApiKeyLoginFields keeps submitted shared values when managed values are missing', async () => {
|
|
311
|
-
connectorRegistry.getManifest.mockReturnValue({
|
|
312
|
-
platforms: {
|
|
313
|
-
testCRM: {
|
|
314
|
-
auth: {
|
|
315
|
-
type: 'apiKey',
|
|
316
|
-
apiKey: {
|
|
317
|
-
page: {
|
|
318
|
-
content: [
|
|
319
|
-
{ const: 'companyId', required: true, managed: true, managedScope: 'account' },
|
|
320
|
-
{ const: 'userToken', required: true, managed: true, managedScope: 'user' },
|
|
321
|
-
{ const: 'region', required: false, managed: true, managedScope: 'account' }
|
|
322
|
-
]
|
|
323
|
-
}
|
|
324
|
-
}
|
|
325
|
-
}
|
|
326
|
-
}
|
|
327
|
-
}
|
|
328
|
-
});
|
|
329
|
-
|
|
330
|
-
const result = await managedAuthHandler.resolveApiKeyLoginFields({
|
|
331
|
-
platform: 'testCRM',
|
|
332
|
-
rcAccountId: 'acc-shared-fallback',
|
|
333
|
-
rcExtensionId: '201',
|
|
334
|
-
additionalInfo: {
|
|
335
|
-
companyId: 'company-123',
|
|
336
|
-
userToken: 'user-token-123',
|
|
337
|
-
region: 'us'
|
|
338
|
-
}
|
|
339
|
-
});
|
|
340
|
-
|
|
341
|
-
expect(result.resolvedAdditionalInfo).toEqual({
|
|
342
|
-
companyId: 'company-123',
|
|
343
|
-
userToken: 'user-token-123',
|
|
344
|
-
region: 'us'
|
|
345
|
-
});
|
|
346
|
-
expect(result.missingRequiredFieldConsts).toEqual([]);
|
|
347
|
-
});
|
|
348
|
-
|
|
349
|
-
test('resolveApiKeyLoginFields prefers submitted managed values during manual fallback', async () => {
|
|
350
|
-
connectorRegistry.getManifest.mockReturnValue({
|
|
351
|
-
platforms: {
|
|
352
|
-
testCRM: {
|
|
353
|
-
auth: {
|
|
354
|
-
type: 'apiKey',
|
|
355
|
-
apiKey: {
|
|
356
|
-
page: {
|
|
357
|
-
content: [
|
|
358
|
-
{ const: 'companyId', required: true, managed: true, managedScope: 'account' },
|
|
359
|
-
{ const: 'apiKey', required: true, managed: true, managedScope: 'user' }
|
|
360
|
-
]
|
|
361
|
-
}
|
|
362
|
-
}
|
|
363
|
-
}
|
|
364
|
-
}
|
|
365
|
-
}
|
|
366
|
-
});
|
|
367
|
-
|
|
368
|
-
await managedAuthHandler.upsertOrgManagedAuthValues({
|
|
369
|
-
rcAccountId: 'acc-override',
|
|
370
|
-
platform: 'testCRM',
|
|
371
|
-
values: { companyId: 'stored-company' }
|
|
372
|
-
});
|
|
373
|
-
await managedAuthHandler.upsertUserManagedAuthValues({
|
|
374
|
-
rcAccountId: 'acc-override',
|
|
375
|
-
platform: 'testCRM',
|
|
376
|
-
rcExtensionId: '777',
|
|
377
|
-
rcUserName: 'Agent 777',
|
|
378
|
-
values: { apiKey: 'stored-key' }
|
|
379
|
-
});
|
|
380
|
-
|
|
381
|
-
const result = await managedAuthHandler.resolveApiKeyLoginFields({
|
|
382
|
-
platform: 'testCRM',
|
|
383
|
-
rcAccountId: 'acc-override',
|
|
384
|
-
rcExtensionId: '777',
|
|
385
|
-
additionalInfo: {
|
|
386
|
-
companyId: 'manual-company',
|
|
387
|
-
apiKey: 'manual-key'
|
|
388
|
-
},
|
|
389
|
-
preferSubmittedValuesForManagedFields: true
|
|
390
|
-
});
|
|
391
|
-
|
|
392
|
-
expect(result.resolvedAdditionalInfo).toEqual({
|
|
393
|
-
companyId: 'manual-company',
|
|
394
|
-
apiKey: 'manual-key'
|
|
395
|
-
});
|
|
396
|
-
expect(result.resolvedApiKey).toBe('manual-key');
|
|
397
|
-
expect(result.missingRequiredFieldConsts).toEqual([]);
|
|
398
|
-
});
|
|
399
|
-
|
|
400
|
-
test('upsertUserManagedAuthValues throws when rcExtensionId is missing', async () => {
|
|
401
|
-
await expect(managedAuthHandler.upsertUserManagedAuthValues({
|
|
402
|
-
rcAccountId: 'acc-5',
|
|
403
|
-
platform: 'testCRM',
|
|
404
|
-
values: { apiKey: 'x' }
|
|
405
|
-
})).rejects.toThrow('rcExtensionId is required for user managed auth values');
|
|
406
|
-
});
|
|
407
|
-
|
|
408
|
-
test('upsertOrgManagedAuthValues removes specified fields', async () => {
|
|
409
|
-
connectorRegistry.getManifest.mockReturnValue({
|
|
410
|
-
platforms: {
|
|
411
|
-
testCRM: {
|
|
412
|
-
auth: {
|
|
413
|
-
type: 'apiKey',
|
|
414
|
-
apiKey: {
|
|
415
|
-
page: {
|
|
416
|
-
content: [
|
|
417
|
-
{ const: 'tenantId', managed: true, managedScope: 'account' },
|
|
418
|
-
{ const: 'region', managed: true, managedScope: 'account' }
|
|
419
|
-
]
|
|
420
|
-
}
|
|
421
|
-
}
|
|
422
|
-
}
|
|
423
|
-
}
|
|
424
|
-
}
|
|
425
|
-
});
|
|
426
|
-
|
|
427
|
-
await managedAuthHandler.upsertOrgManagedAuthValues({
|
|
428
|
-
rcAccountId: 'acc-6',
|
|
429
|
-
platform: 'testCRM',
|
|
430
|
-
values: { tenantId: 'tenant-6', region: 'us' }
|
|
431
|
-
});
|
|
432
|
-
|
|
433
|
-
await managedAuthHandler.upsertOrgManagedAuthValues({
|
|
434
|
-
rcAccountId: 'acc-6',
|
|
435
|
-
platform: 'testCRM',
|
|
436
|
-
values: {},
|
|
437
|
-
fieldsToRemove: ['tenantId']
|
|
438
|
-
});
|
|
439
|
-
|
|
440
|
-
const settings = await managedAuthHandler.getManagedAuthAdminSettings({
|
|
441
|
-
platform: 'testCRM',
|
|
442
|
-
rcAccountId: 'acc-6'
|
|
443
|
-
});
|
|
444
|
-
expect(settings.orgValues.tenantId.hasValue).toBe(false);
|
|
445
|
-
expect(settings.orgValues.region.value).toBe('us');
|
|
446
|
-
|
|
447
|
-
const record = await AccountDataModel.findOne({
|
|
448
|
-
where: {
|
|
449
|
-
rcAccountId: 'acc-6',
|
|
450
|
-
platformName: 'testCRM',
|
|
451
|
-
dataKey: 'managed-auth-org'
|
|
452
|
-
}
|
|
453
|
-
});
|
|
454
|
-
expect(record.data.fields.tenantId).toBeUndefined();
|
|
455
|
-
expect(record.data.fields.region).toBeDefined();
|
|
456
|
-
});
|
|
457
|
-
});
|
|
458
|
-
|
|
1
|
+
// Use in-memory SQLite for isolated model tests
|
|
2
|
+
jest.mock('../../models/sequelize', () => {
|
|
3
|
+
const { Sequelize } = require('sequelize');
|
|
4
|
+
return {
|
|
5
|
+
sequelize: new Sequelize({
|
|
6
|
+
dialect: 'sqlite',
|
|
7
|
+
storage: ':memory:',
|
|
8
|
+
logging: false,
|
|
9
|
+
}),
|
|
10
|
+
};
|
|
11
|
+
});
|
|
12
|
+
|
|
13
|
+
jest.mock('../../connector/registry');
|
|
14
|
+
jest.mock('../../connector/developerPortal', () => ({
|
|
15
|
+
getConnectorManifest: jest.fn()
|
|
16
|
+
}));
|
|
17
|
+
|
|
18
|
+
const managedAuthHandler = require('../../handlers/managedAuth');
|
|
19
|
+
const connectorRegistry = require('../../connector/registry');
|
|
20
|
+
const developerPortal = require('../../connector/developerPortal');
|
|
21
|
+
const { AccountDataModel } = require('../../models/accountDataModel');
|
|
22
|
+
const { sequelize } = require('../../models/sequelize');
|
|
23
|
+
|
|
24
|
+
describe('Managed Auth Handler', () => {
|
|
25
|
+
beforeAll(async () => {
|
|
26
|
+
process.env.APP_SERVER_SECRET_KEY = 'test-app-server-secret-key-123456';
|
|
27
|
+
await AccountDataModel.sync({ force: true });
|
|
28
|
+
});
|
|
29
|
+
|
|
30
|
+
afterEach(async () => {
|
|
31
|
+
await AccountDataModel.destroy({ where: {} });
|
|
32
|
+
jest.clearAllMocks();
|
|
33
|
+
});
|
|
34
|
+
|
|
35
|
+
afterAll(async () => {
|
|
36
|
+
await sequelize.close();
|
|
37
|
+
});
|
|
38
|
+
|
|
39
|
+
test('getManagedAuthState reports all required fields satisfied when shared values exist', async () => {
|
|
40
|
+
connectorRegistry.getManifest.mockReturnValue({
|
|
41
|
+
platforms: {
|
|
42
|
+
testCRM: {
|
|
43
|
+
auth: {
|
|
44
|
+
type: 'apiKey',
|
|
45
|
+
apiKey: {
|
|
46
|
+
page: {
|
|
47
|
+
content: [
|
|
48
|
+
{ const: 'tenantId', required: true, managed: true, managedScope: 'account' },
|
|
49
|
+
{ const: 'apiKey', required: true, managed: true, managedScope: 'user' }
|
|
50
|
+
]
|
|
51
|
+
}
|
|
52
|
+
}
|
|
53
|
+
}
|
|
54
|
+
}
|
|
55
|
+
}
|
|
56
|
+
});
|
|
57
|
+
|
|
58
|
+
await managedAuthHandler.upsertOrgManagedAuthValues({
|
|
59
|
+
rcAccountId: 'acc-1',
|
|
60
|
+
platform: 'testCRM',
|
|
61
|
+
values: { tenantId: 'tenant-1' }
|
|
62
|
+
});
|
|
63
|
+
await managedAuthHandler.upsertUserManagedAuthValues({
|
|
64
|
+
rcAccountId: 'acc-1',
|
|
65
|
+
platform: 'testCRM',
|
|
66
|
+
rcExtensionId: '101',
|
|
67
|
+
rcUserName: 'Agent 101',
|
|
68
|
+
values: { apiKey: 'user-api-key' }
|
|
69
|
+
});
|
|
70
|
+
|
|
71
|
+
const state = await managedAuthHandler.getManagedAuthState({
|
|
72
|
+
platform: 'testCRM',
|
|
73
|
+
rcAccountId: 'acc-1',
|
|
74
|
+
rcExtensionId: '101'
|
|
75
|
+
});
|
|
76
|
+
|
|
77
|
+
expect(state.hasManagedAuth).toBe(true);
|
|
78
|
+
expect(state.allRequiredFieldsSatisfied).toBe(true);
|
|
79
|
+
expect(state.visibleFieldConsts).toEqual([]);
|
|
80
|
+
});
|
|
81
|
+
|
|
82
|
+
test('getManagedAuthAdminSettings returns configured field values and keeps user records separate', async () => {
|
|
83
|
+
connectorRegistry.getManifest.mockReturnValue({
|
|
84
|
+
platforms: {
|
|
85
|
+
testCRM: {
|
|
86
|
+
auth: {
|
|
87
|
+
type: 'apiKey',
|
|
88
|
+
apiKey: {
|
|
89
|
+
page: {
|
|
90
|
+
content: [
|
|
91
|
+
{ const: 'tenantId', managed: true, managedScope: 'account' },
|
|
92
|
+
{ const: 'apiKey', managed: true, managedScope: 'user' }
|
|
93
|
+
]
|
|
94
|
+
}
|
|
95
|
+
}
|
|
96
|
+
}
|
|
97
|
+
}
|
|
98
|
+
}
|
|
99
|
+
});
|
|
100
|
+
|
|
101
|
+
await managedAuthHandler.upsertOrgManagedAuthValues({
|
|
102
|
+
rcAccountId: 'acc-2',
|
|
103
|
+
platform: 'testCRM',
|
|
104
|
+
values: { tenantId: 'tenant-secret' }
|
|
105
|
+
});
|
|
106
|
+
await managedAuthHandler.upsertUserManagedAuthValues({
|
|
107
|
+
rcAccountId: 'acc-2',
|
|
108
|
+
platform: 'testCRM',
|
|
109
|
+
rcExtensionId: '102',
|
|
110
|
+
rcUserName: 'Agent 102',
|
|
111
|
+
values: { apiKey: 'user-key' }
|
|
112
|
+
});
|
|
113
|
+
|
|
114
|
+
const settings = await managedAuthHandler.getManagedAuthAdminSettings({
|
|
115
|
+
platform: 'testCRM',
|
|
116
|
+
rcAccountId: 'acc-2'
|
|
117
|
+
});
|
|
118
|
+
|
|
119
|
+
expect(settings.orgValues.tenantId.hasValue).toBe(true);
|
|
120
|
+
expect(settings.orgValues.tenantId.value).toBe('tenant-secret');
|
|
121
|
+
expect(settings.userValues[0].rcExtensionId).toBe('102');
|
|
122
|
+
expect(settings.userValues[0].fields.apiKey.value).toBe('user-key');
|
|
123
|
+
});
|
|
124
|
+
|
|
125
|
+
test('upsertUserManagedAuthValues stores one row per extension with scoped dataKey', async () => {
|
|
126
|
+
await managedAuthHandler.upsertUserManagedAuthValues({
|
|
127
|
+
rcAccountId: 'acc-scope',
|
|
128
|
+
platform: 'testCRM',
|
|
129
|
+
rcExtensionId: '201',
|
|
130
|
+
rcUserName: 'Agent 201',
|
|
131
|
+
values: { apiKey: 'key-201' }
|
|
132
|
+
});
|
|
133
|
+
await managedAuthHandler.upsertUserManagedAuthValues({
|
|
134
|
+
rcAccountId: 'acc-scope',
|
|
135
|
+
platform: 'testCRM',
|
|
136
|
+
rcExtensionId: '202',
|
|
137
|
+
rcUserName: 'Agent 202',
|
|
138
|
+
values: { apiKey: 'key-202' }
|
|
139
|
+
});
|
|
140
|
+
|
|
141
|
+
const records = await AccountDataModel.findAll({
|
|
142
|
+
where: {
|
|
143
|
+
rcAccountId: 'acc-scope',
|
|
144
|
+
platformName: 'testCRM'
|
|
145
|
+
}
|
|
146
|
+
});
|
|
147
|
+
const dataKeys = records.map(r => r.dataKey).sort();
|
|
148
|
+
|
|
149
|
+
expect(dataKeys).toEqual(['managed-auth-user:201', 'managed-auth-user:202']);
|
|
150
|
+
expect(records).toHaveLength(2);
|
|
151
|
+
});
|
|
152
|
+
|
|
153
|
+
test('getManagedAuthState loads field definitions from Developer Portal when connectorId is provided', async () => {
|
|
154
|
+
developerPortal.getConnectorManifest.mockResolvedValue({
|
|
155
|
+
platforms: {
|
|
156
|
+
testCRM: {
|
|
157
|
+
auth: {
|
|
158
|
+
type: 'apiKey',
|
|
159
|
+
apiKey: {
|
|
160
|
+
page: {
|
|
161
|
+
content: [
|
|
162
|
+
{ const: 'orgToken', required: true, managed: true, managedScope: 'account' }
|
|
163
|
+
]
|
|
164
|
+
}
|
|
165
|
+
}
|
|
166
|
+
}
|
|
167
|
+
}
|
|
168
|
+
}
|
|
169
|
+
});
|
|
170
|
+
|
|
171
|
+
await managedAuthHandler.upsertOrgManagedAuthValues({
|
|
172
|
+
rcAccountId: 'acc-3',
|
|
173
|
+
platform: 'testCRM',
|
|
174
|
+
values: { orgToken: 'portal-token' }
|
|
175
|
+
});
|
|
176
|
+
|
|
177
|
+
const state = await managedAuthHandler.getManagedAuthState({
|
|
178
|
+
platform: 'testCRM',
|
|
179
|
+
connectorId: 'connector-123',
|
|
180
|
+
rcAccountId: 'acc-3'
|
|
181
|
+
});
|
|
182
|
+
|
|
183
|
+
expect(developerPortal.getConnectorManifest).toHaveBeenCalledWith({ rcAccountId: 'acc-3', connectorId: 'connector-123', isPrivate: false });
|
|
184
|
+
expect(state.hasManagedAuth).toBe(true);
|
|
185
|
+
expect(state.allRequiredFieldsSatisfied).toBe(true);
|
|
186
|
+
expect(state.visibleFieldConsts).toEqual([]);
|
|
187
|
+
});
|
|
188
|
+
|
|
189
|
+
test('getManagedAuthState surfaces missing required fields for unshared and missing shared values', async () => {
|
|
190
|
+
connectorRegistry.getManifest.mockReturnValue({
|
|
191
|
+
platforms: {
|
|
192
|
+
testCRM: {
|
|
193
|
+
auth: {
|
|
194
|
+
type: 'apiKey',
|
|
195
|
+
apiKey: {
|
|
196
|
+
page: {
|
|
197
|
+
content: [
|
|
198
|
+
{ const: 'tenantId', required: true, managed: true, managedScope: 'account' },
|
|
199
|
+
{ const: 'userToken', required: true, managed: true, managedScope: 'user' },
|
|
200
|
+
{ const: 'apiSecret', required: true }
|
|
201
|
+
]
|
|
202
|
+
}
|
|
203
|
+
}
|
|
204
|
+
}
|
|
205
|
+
}
|
|
206
|
+
}
|
|
207
|
+
});
|
|
208
|
+
|
|
209
|
+
await managedAuthHandler.upsertOrgManagedAuthValues({
|
|
210
|
+
rcAccountId: 'acc-4',
|
|
211
|
+
platform: 'testCRM',
|
|
212
|
+
values: { tenantId: 'tenant-4' }
|
|
213
|
+
});
|
|
214
|
+
|
|
215
|
+
const state = await managedAuthHandler.getManagedAuthState({
|
|
216
|
+
platform: 'testCRM',
|
|
217
|
+
rcAccountId: 'acc-4',
|
|
218
|
+
rcExtensionId: '404'
|
|
219
|
+
});
|
|
220
|
+
|
|
221
|
+
expect(state.hasManagedAuth).toBe(true);
|
|
222
|
+
expect(state.allRequiredFieldsSatisfied).toBe(false);
|
|
223
|
+
expect(state.visibleFieldConsts).toEqual(['userToken', 'apiSecret']);
|
|
224
|
+
expect(state.missingRequiredFieldConsts).toEqual(['userToken', 'apiSecret']);
|
|
225
|
+
});
|
|
226
|
+
|
|
227
|
+
test('getManagedAuthState returns full-form behavior when connector has no shared fields', async () => {
|
|
228
|
+
connectorRegistry.getManifest.mockReturnValue({
|
|
229
|
+
platforms: {
|
|
230
|
+
testCRM: {
|
|
231
|
+
auth: {
|
|
232
|
+
type: 'apiKey',
|
|
233
|
+
apiKey: {
|
|
234
|
+
page: {
|
|
235
|
+
content: [
|
|
236
|
+
{ const: 'apiKey', required: true },
|
|
237
|
+
{ const: 'tenantId', required: true },
|
|
238
|
+
{ const: 'region', required: false }
|
|
239
|
+
]
|
|
240
|
+
}
|
|
241
|
+
}
|
|
242
|
+
}
|
|
243
|
+
}
|
|
244
|
+
}
|
|
245
|
+
});
|
|
246
|
+
|
|
247
|
+
const state = await managedAuthHandler.getManagedAuthState({
|
|
248
|
+
platform: 'testCRM',
|
|
249
|
+
rcAccountId: 'acc-plain',
|
|
250
|
+
rcExtensionId: '100'
|
|
251
|
+
});
|
|
252
|
+
|
|
253
|
+
expect(state.hasManagedAuth).toBe(false);
|
|
254
|
+
expect(state.allRequiredFieldsSatisfied).toBe(false);
|
|
255
|
+
expect(state.visibleFieldConsts).toBeNull();
|
|
256
|
+
expect(state.missingRequiredFieldConsts).toEqual(['apiKey', 'tenantId']);
|
|
257
|
+
});
|
|
258
|
+
|
|
259
|
+
test('getManagedAuthState falls back to the full auth form after managed auto-login fails', async () => {
|
|
260
|
+
connectorRegistry.getManifest.mockReturnValue({
|
|
261
|
+
platforms: {
|
|
262
|
+
testCRM: {
|
|
263
|
+
auth: {
|
|
264
|
+
type: 'apiKey',
|
|
265
|
+
apiKey: {
|
|
266
|
+
page: {
|
|
267
|
+
content: [
|
|
268
|
+
{ const: 'tenantId', required: true, managed: true, managedScope: 'account' },
|
|
269
|
+
{ const: 'apiKey', required: true, managed: true, managedScope: 'user' },
|
|
270
|
+
{ const: 'region', required: false }
|
|
271
|
+
]
|
|
272
|
+
}
|
|
273
|
+
}
|
|
274
|
+
}
|
|
275
|
+
}
|
|
276
|
+
}
|
|
277
|
+
});
|
|
278
|
+
|
|
279
|
+
await managedAuthHandler.upsertOrgManagedAuthValues({
|
|
280
|
+
rcAccountId: 'acc-fallback',
|
|
281
|
+
platform: 'testCRM',
|
|
282
|
+
values: { tenantId: 'tenant-1' }
|
|
283
|
+
});
|
|
284
|
+
await managedAuthHandler.upsertUserManagedAuthValues({
|
|
285
|
+
rcAccountId: 'acc-fallback',
|
|
286
|
+
platform: 'testCRM',
|
|
287
|
+
rcExtensionId: '501',
|
|
288
|
+
rcUserName: 'Agent 501',
|
|
289
|
+
values: { apiKey: 'bad-key' }
|
|
290
|
+
});
|
|
291
|
+
await managedAuthHandler.markManagedAuthLoginFailure({
|
|
292
|
+
rcAccountId: 'acc-fallback',
|
|
293
|
+
platform: 'testCRM',
|
|
294
|
+
rcExtensionId: '501'
|
|
295
|
+
});
|
|
296
|
+
|
|
297
|
+
const state = await managedAuthHandler.getManagedAuthState({
|
|
298
|
+
platform: 'testCRM',
|
|
299
|
+
rcAccountId: 'acc-fallback',
|
|
300
|
+
rcExtensionId: '501'
|
|
301
|
+
});
|
|
302
|
+
|
|
303
|
+
expect(state.hasManagedAuth).toBe(true);
|
|
304
|
+
expect(state.allRequiredFieldsSatisfied).toBe(false);
|
|
305
|
+
expect(state.visibleFieldConsts).toBeNull();
|
|
306
|
+
expect(state.missingRequiredFieldConsts).toEqual(['tenantId', 'apiKey']);
|
|
307
|
+
expect(state.fallbackToManualAuth).toBe(true);
|
|
308
|
+
});
|
|
309
|
+
|
|
310
|
+
test('resolveApiKeyLoginFields keeps submitted shared values when managed values are missing', async () => {
|
|
311
|
+
connectorRegistry.getManifest.mockReturnValue({
|
|
312
|
+
platforms: {
|
|
313
|
+
testCRM: {
|
|
314
|
+
auth: {
|
|
315
|
+
type: 'apiKey',
|
|
316
|
+
apiKey: {
|
|
317
|
+
page: {
|
|
318
|
+
content: [
|
|
319
|
+
{ const: 'companyId', required: true, managed: true, managedScope: 'account' },
|
|
320
|
+
{ const: 'userToken', required: true, managed: true, managedScope: 'user' },
|
|
321
|
+
{ const: 'region', required: false, managed: true, managedScope: 'account' }
|
|
322
|
+
]
|
|
323
|
+
}
|
|
324
|
+
}
|
|
325
|
+
}
|
|
326
|
+
}
|
|
327
|
+
}
|
|
328
|
+
});
|
|
329
|
+
|
|
330
|
+
const result = await managedAuthHandler.resolveApiKeyLoginFields({
|
|
331
|
+
platform: 'testCRM',
|
|
332
|
+
rcAccountId: 'acc-shared-fallback',
|
|
333
|
+
rcExtensionId: '201',
|
|
334
|
+
additionalInfo: {
|
|
335
|
+
companyId: 'company-123',
|
|
336
|
+
userToken: 'user-token-123',
|
|
337
|
+
region: 'us'
|
|
338
|
+
}
|
|
339
|
+
});
|
|
340
|
+
|
|
341
|
+
expect(result.resolvedAdditionalInfo).toEqual({
|
|
342
|
+
companyId: 'company-123',
|
|
343
|
+
userToken: 'user-token-123',
|
|
344
|
+
region: 'us'
|
|
345
|
+
});
|
|
346
|
+
expect(result.missingRequiredFieldConsts).toEqual([]);
|
|
347
|
+
});
|
|
348
|
+
|
|
349
|
+
test('resolveApiKeyLoginFields prefers submitted managed values during manual fallback', async () => {
|
|
350
|
+
connectorRegistry.getManifest.mockReturnValue({
|
|
351
|
+
platforms: {
|
|
352
|
+
testCRM: {
|
|
353
|
+
auth: {
|
|
354
|
+
type: 'apiKey',
|
|
355
|
+
apiKey: {
|
|
356
|
+
page: {
|
|
357
|
+
content: [
|
|
358
|
+
{ const: 'companyId', required: true, managed: true, managedScope: 'account' },
|
|
359
|
+
{ const: 'apiKey', required: true, managed: true, managedScope: 'user' }
|
|
360
|
+
]
|
|
361
|
+
}
|
|
362
|
+
}
|
|
363
|
+
}
|
|
364
|
+
}
|
|
365
|
+
}
|
|
366
|
+
});
|
|
367
|
+
|
|
368
|
+
await managedAuthHandler.upsertOrgManagedAuthValues({
|
|
369
|
+
rcAccountId: 'acc-override',
|
|
370
|
+
platform: 'testCRM',
|
|
371
|
+
values: { companyId: 'stored-company' }
|
|
372
|
+
});
|
|
373
|
+
await managedAuthHandler.upsertUserManagedAuthValues({
|
|
374
|
+
rcAccountId: 'acc-override',
|
|
375
|
+
platform: 'testCRM',
|
|
376
|
+
rcExtensionId: '777',
|
|
377
|
+
rcUserName: 'Agent 777',
|
|
378
|
+
values: { apiKey: 'stored-key' }
|
|
379
|
+
});
|
|
380
|
+
|
|
381
|
+
const result = await managedAuthHandler.resolveApiKeyLoginFields({
|
|
382
|
+
platform: 'testCRM',
|
|
383
|
+
rcAccountId: 'acc-override',
|
|
384
|
+
rcExtensionId: '777',
|
|
385
|
+
additionalInfo: {
|
|
386
|
+
companyId: 'manual-company',
|
|
387
|
+
apiKey: 'manual-key'
|
|
388
|
+
},
|
|
389
|
+
preferSubmittedValuesForManagedFields: true
|
|
390
|
+
});
|
|
391
|
+
|
|
392
|
+
expect(result.resolvedAdditionalInfo).toEqual({
|
|
393
|
+
companyId: 'manual-company',
|
|
394
|
+
apiKey: 'manual-key'
|
|
395
|
+
});
|
|
396
|
+
expect(result.resolvedApiKey).toBe('manual-key');
|
|
397
|
+
expect(result.missingRequiredFieldConsts).toEqual([]);
|
|
398
|
+
});
|
|
399
|
+
|
|
400
|
+
test('upsertUserManagedAuthValues throws when rcExtensionId is missing', async () => {
|
|
401
|
+
await expect(managedAuthHandler.upsertUserManagedAuthValues({
|
|
402
|
+
rcAccountId: 'acc-5',
|
|
403
|
+
platform: 'testCRM',
|
|
404
|
+
values: { apiKey: 'x' }
|
|
405
|
+
})).rejects.toThrow('rcExtensionId is required for user managed auth values');
|
|
406
|
+
});
|
|
407
|
+
|
|
408
|
+
test('upsertOrgManagedAuthValues removes specified fields', async () => {
|
|
409
|
+
connectorRegistry.getManifest.mockReturnValue({
|
|
410
|
+
platforms: {
|
|
411
|
+
testCRM: {
|
|
412
|
+
auth: {
|
|
413
|
+
type: 'apiKey',
|
|
414
|
+
apiKey: {
|
|
415
|
+
page: {
|
|
416
|
+
content: [
|
|
417
|
+
{ const: 'tenantId', managed: true, managedScope: 'account' },
|
|
418
|
+
{ const: 'region', managed: true, managedScope: 'account' }
|
|
419
|
+
]
|
|
420
|
+
}
|
|
421
|
+
}
|
|
422
|
+
}
|
|
423
|
+
}
|
|
424
|
+
}
|
|
425
|
+
});
|
|
426
|
+
|
|
427
|
+
await managedAuthHandler.upsertOrgManagedAuthValues({
|
|
428
|
+
rcAccountId: 'acc-6',
|
|
429
|
+
platform: 'testCRM',
|
|
430
|
+
values: { tenantId: 'tenant-6', region: 'us' }
|
|
431
|
+
});
|
|
432
|
+
|
|
433
|
+
await managedAuthHandler.upsertOrgManagedAuthValues({
|
|
434
|
+
rcAccountId: 'acc-6',
|
|
435
|
+
platform: 'testCRM',
|
|
436
|
+
values: {},
|
|
437
|
+
fieldsToRemove: ['tenantId']
|
|
438
|
+
});
|
|
439
|
+
|
|
440
|
+
const settings = await managedAuthHandler.getManagedAuthAdminSettings({
|
|
441
|
+
platform: 'testCRM',
|
|
442
|
+
rcAccountId: 'acc-6'
|
|
443
|
+
});
|
|
444
|
+
expect(settings.orgValues.tenantId.hasValue).toBe(false);
|
|
445
|
+
expect(settings.orgValues.region.value).toBe('us');
|
|
446
|
+
|
|
447
|
+
const record = await AccountDataModel.findOne({
|
|
448
|
+
where: {
|
|
449
|
+
rcAccountId: 'acc-6',
|
|
450
|
+
platformName: 'testCRM',
|
|
451
|
+
dataKey: 'managed-auth-org'
|
|
452
|
+
}
|
|
453
|
+
});
|
|
454
|
+
expect(record.data.fields.tenantId).toBeUndefined();
|
|
455
|
+
expect(record.data.fields.region).toBeDefined();
|
|
456
|
+
});
|
|
457
|
+
});
|
|
458
|
+
|