@tellescope/sdk 1.71.0 → 1.71.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -82,7 +82,7 @@ var __importDefault = (this && this.__importDefault) || function (mod) {
82
82
  return (mod && mod.__esModule) ? mod : { "default": mod };
83
83
  };
84
84
  Object.defineProperty(exports, "__esModule", { value: true });
85
- exports.alternate_phones_tests = exports.ticket_queue_tests = exports.no_chained_triggers_tests = exports.role_based_access_permissions_tests = exports.self_serve_appointment_booking_tests = exports.filter_by_date_tests = exports.databases_tests = exports.calendar_event_RSVPs_tests = exports.managed_content_records_tests = exports.meetings_tests = exports.automationSameJourneyTests = exports.formsSubmittedNoUnsubmittedTest = exports.formsUnsubmittedTest = exports.formsUnsubmittedCancelConditionTest = exports.formUnsubmittedCancelConditionTest = void 0;
85
+ exports.form_conditional_logic_tests = exports.alternate_phones_tests = exports.ticket_queue_tests = exports.no_chained_triggers_tests = exports.role_based_access_permissions_tests = exports.self_serve_appointment_booking_tests = exports.filter_by_date_tests = exports.databases_tests = exports.calendar_event_RSVPs_tests = exports.managed_content_records_tests = exports.meetings_tests = exports.automationSameJourneyTests = exports.formsSubmittedNoUnsubmittedTest = exports.formsUnsubmittedTest = exports.formsUnsubmittedCancelConditionTest = exports.formUnsubmittedCancelConditionTest = void 0;
86
86
  require('source-map-support').install();
87
87
  var axios_1 = __importDefault(require("axios"));
88
88
  var crypto_1 = __importDefault(require("crypto"));
@@ -7058,13 +7058,14 @@ var test_weighted_round_robin = function () { return __awaiter(void 0, void 0, v
7058
7058
  });
7059
7059
  }); };
7060
7060
  var enduser_access_tags_tests = function () { return __awaiter(void 0, void 0, void 0, function () {
7061
- var matchTag, dontMatchTag, matchEnduser, matchMultiTagEnduser, dontMatchEnduser, matchTicket, dontMatchTicket;
7061
+ var matchTag, dontMatchTag, ticketTitle, matchEnduser, matchMultiTagEnduser, dontMatchEnduser, matchTicket, dontMatchTicket;
7062
7062
  return __generator(this, function (_a) {
7063
7063
  switch (_a.label) {
7064
7064
  case 0:
7065
7065
  (0, testing_1.log_header)("enduser_access_tags_tests");
7066
7066
  matchTag = 'Access';
7067
7067
  dontMatchTag = 'No Access';
7068
+ ticketTitle = 'ticket';
7068
7069
  return [4 /*yield*/, sdk.api.endusers.createOne({ accessTags: [matchTag] })];
7069
7070
  case 1:
7070
7071
  matchEnduser = _a.sent();
@@ -7074,10 +7075,10 @@ var enduser_access_tags_tests = function () { return __awaiter(void 0, void 0, v
7074
7075
  return [4 /*yield*/, sdk.api.endusers.createOne({ accessTags: [dontMatchTag] })];
7075
7076
  case 3:
7076
7077
  dontMatchEnduser = _a.sent();
7077
- return [4 /*yield*/, sdk.api.tickets.createOne({ enduserId: matchEnduser.id, title: 'ticket' })];
7078
+ return [4 /*yield*/, sdk.api.tickets.createOne({ enduserId: matchEnduser.id, title: ticketTitle })];
7078
7079
  case 4:
7079
7080
  matchTicket = _a.sent();
7080
- return [4 /*yield*/, sdk.api.tickets.createOne({ enduserId: dontMatchEnduser.id, title: 'ticket' })
7081
+ return [4 /*yield*/, sdk.api.tickets.createOne({ enduserId: dontMatchEnduser.id, title: ticketTitle })
7081
7082
  // start with disabled setting an no tags on non-admin
7082
7083
  ];
7083
7084
  case 5:
@@ -7107,179 +7108,191 @@ var enduser_access_tags_tests = function () { return __awaiter(void 0, void 0, v
7107
7108
  return [4 /*yield*/, (0, testing_1.async_test)("Setting disabled, no tags, tickets", sdkNonAdmin.api.tickets.getSome, { onResult: function (r) { return r.length === 0; } })];
7108
7109
  case 12:
7109
7110
  _a.sent();
7110
- return [4 /*yield*/, (0, testing_1.async_test)("Setting disabled, matchEnduser ticket", function () { return sdkNonAdmin.api.tickets.getOne(matchTicket.id); }, handleAnyError)];
7111
+ return [4 /*yield*/, (0, testing_1.async_test)("Setting disabled, no tags, tickets search", function () { return sdkNonAdmin.api.tickets.getSome({ search: { query: ticketTitle } }); }, { onResult: function (r) { return r.length === 0; } })];
7111
7112
  case 13:
7112
7113
  _a.sent();
7113
- return [4 /*yield*/, (0, testing_1.async_test)("Setting disabled, dontMatchEnduser ticket", function () { return sdkNonAdmin.api.tickets.getOne(dontMatchTicket.id); }, handleAnyError)];
7114
+ return [4 /*yield*/, (0, testing_1.async_test)("Setting disabled, matchEnduser ticket", function () { return sdkNonAdmin.api.tickets.getOne(matchTicket.id); }, handleAnyError)];
7114
7115
  case 14:
7116
+ _a.sent();
7117
+ return [4 /*yield*/, (0, testing_1.async_test)("Setting disabled, dontMatchEnduser ticket", function () { return sdkNonAdmin.api.tickets.getOne(dontMatchTicket.id); }, handleAnyError)];
7118
+ case 15:
7115
7119
  _a.sent();
7116
7120
  return [4 /*yield*/, (0, testing_1.async_test)("tickets filter enduser valid", function () { return sdkNonAdmin.api.tickets.getSome({ filter: { enduserId: matchEnduser.id } }); }, {
7117
7121
  onResult: function (r) { return r.length === 0; }
7118
7122
  })];
7119
- case 15:
7123
+ case 16:
7120
7124
  _a.sent();
7121
7125
  return [4 /*yield*/, (0, testing_1.async_test)("tickets filter enduser invalid", function () { return sdkNonAdmin.api.tickets.getSome({ filter: { enduserId: dontMatchEnduser.id } }); }, {
7122
7126
  onResult: function (r) { return r.length === 0; }
7123
7127
  })
7124
7128
  // enable setting, disable tags
7125
7129
  ];
7126
- case 16:
7130
+ case 17:
7127
7131
  _a.sent();
7128
7132
  // enable setting, disable tags
7129
7133
  return [4 /*yield*/, sdk.api.organizations.updateOne(sdkNonAdmin.userInfo.businessId, {
7130
7134
  settings: { endusers: { enableAccessTags: true } }
7131
7135
  })];
7132
- case 17:
7136
+ case 18:
7133
7137
  // enable setting, disable tags
7134
7138
  _a.sent();
7135
7139
  return [4 /*yield*/, sdkNonAdmin.authenticate(nonAdminEmail, nonAdminPassword)]; // ensure enableAccessTags setting stored correctly on jwt
7136
- case 18:
7140
+ case 19:
7137
7141
  _a.sent(); // ensure enableAccessTags setting stored correctly on jwt
7138
7142
  return [4 /*yield*/, (0, testing_1.async_test)("enable setting, disable tags", sdkNonAdmin.api.endusers.getSome, { onResult: function (r) { return r.length === 0; } })];
7139
- case 19:
7143
+ case 20:
7140
7144
  _a.sent();
7141
7145
  return [4 /*yield*/, (0, testing_1.async_test)("enable setting, matchEnduser", function () { return sdkNonAdmin.api.endusers.getOne(matchEnduser.id); }, handleAnyError)];
7142
- case 20:
7146
+ case 21:
7143
7147
  _a.sent();
7144
7148
  return [4 /*yield*/, (0, testing_1.async_test)("enable setting, dontMatchEnduser", function () { return sdkNonAdmin.api.endusers.getOne(dontMatchEnduser.id); }, handleAnyError)];
7145
- case 21:
7149
+ case 22:
7146
7150
  _a.sent();
7147
7151
  return [4 /*yield*/, (0, testing_1.async_test)("enable setting, no tags, tickets", sdkNonAdmin.api.tickets.getSome, { onResult: function (r) { return r.length === 0; } })];
7148
- case 22:
7152
+ case 23:
7153
+ _a.sent();
7154
+ return [4 /*yield*/, (0, testing_1.async_test)("enable setting, no tags, tickets search", function () { return sdkNonAdmin.api.tickets.getSome({ search: { query: ticketTitle } }); }, { onResult: function (r) { return r.length === 0; } })];
7155
+ case 24:
7149
7156
  _a.sent();
7150
7157
  return [4 /*yield*/, (0, testing_1.async_test)("enable setting, matchEnduser ticket", function () { return sdkNonAdmin.api.tickets.getOne(matchTicket.id); }, handleAnyError)];
7151
- case 23:
7158
+ case 25:
7152
7159
  _a.sent();
7153
7160
  return [4 /*yield*/, (0, testing_1.async_test)("enable setting, dontMatchEnduser ticket", function () { return sdkNonAdmin.api.tickets.getOne(dontMatchTicket.id); }, handleAnyError)];
7154
- case 24:
7161
+ case 26:
7155
7162
  _a.sent();
7156
7163
  return [4 /*yield*/, (0, testing_1.async_test)("tickets filter enduser valid", function () { return sdkNonAdmin.api.tickets.getSome({ filter: { enduserId: matchEnduser.id } }); }, {
7157
7164
  onResult: function (r) { return r.length === 0; }
7158
7165
  })];
7159
- case 25:
7166
+ case 27:
7160
7167
  _a.sent();
7161
7168
  return [4 /*yield*/, (0, testing_1.async_test)("tickets filter enduser invalid", function () { return sdkNonAdmin.api.tickets.getSome({ filter: { enduserId: dontMatchEnduser.id } }); }, {
7162
7169
  onResult: function (r) { return r.length === 0; }
7163
7170
  })
7164
7171
  // disable setting, enable tags
7165
7172
  ];
7166
- case 26:
7173
+ case 28:
7167
7174
  _a.sent();
7168
7175
  // disable setting, enable tags
7169
7176
  return [4 /*yield*/, sdk.api.users.updateOne(sdkNonAdmin.userInfo.id, { tags: [matchTag] }, { replaceObjectFields: true })];
7170
- case 27:
7177
+ case 29:
7171
7178
  // disable setting, enable tags
7172
7179
  _a.sent();
7173
7180
  return [4 /*yield*/, sdk.api.organizations.updateOne(sdkNonAdmin.userInfo.businessId, {
7174
7181
  settings: { endusers: { enableAccessTags: false } }
7175
7182
  })];
7176
- case 28:
7183
+ case 30:
7177
7184
  _a.sent();
7178
7185
  return [4 /*yield*/, sdkNonAdmin.authenticate(nonAdminEmail, nonAdminPassword)]; // ensure enableAccessTags setting stored correctly on jwt
7179
- case 29:
7186
+ case 31:
7180
7187
  _a.sent(); // ensure enableAccessTags setting stored correctly on jwt
7181
7188
  return [4 /*yield*/, (0, testing_1.async_test)("disable setting, enable tags", sdkNonAdmin.api.endusers.getSome, { onResult: function (r) { return r.length === 0; } })];
7182
- case 30:
7189
+ case 32:
7183
7190
  _a.sent();
7184
7191
  return [4 /*yield*/, (0, testing_1.async_test)("disable setting, matchEnduser", function () { return sdkNonAdmin.api.endusers.getOne(matchEnduser.id); }, handleAnyError)];
7185
- case 31:
7192
+ case 33:
7186
7193
  _a.sent();
7187
7194
  return [4 /*yield*/, (0, testing_1.async_test)("disable setting, dontMatchEnduser", function () { return sdkNonAdmin.api.endusers.getOne(dontMatchEnduser.id); }, handleAnyError)];
7188
- case 32:
7195
+ case 34:
7189
7196
  _a.sent();
7190
7197
  return [4 /*yield*/, (0, testing_1.async_test)("disable setting, enable tags, tickets", sdkNonAdmin.api.tickets.getSome, { onResult: function (r) { return r.length === 0; } })];
7191
- case 33:
7198
+ case 35:
7199
+ _a.sent();
7200
+ return [4 /*yield*/, (0, testing_1.async_test)("disable setting, no tags, tickets search", function () { return sdkNonAdmin.api.tickets.getSome({ search: { query: ticketTitle } }); }, { onResult: function (r) { return r.length === 0; } })];
7201
+ case 36:
7192
7202
  _a.sent();
7193
7203
  return [4 /*yield*/, (0, testing_1.async_test)("disable setting, matchEnduser ticket", function () { return sdkNonAdmin.api.tickets.getOne(matchTicket.id); }, handleAnyError)];
7194
- case 34:
7204
+ case 37:
7195
7205
  _a.sent();
7196
7206
  return [4 /*yield*/, (0, testing_1.async_test)("disable setting, dontMatchEnduser ticket", function () { return sdkNonAdmin.api.tickets.getOne(dontMatchTicket.id); }, handleAnyError)];
7197
- case 35:
7207
+ case 38:
7198
7208
  _a.sent();
7199
7209
  return [4 /*yield*/, (0, testing_1.async_test)("tickets filter enduser valid", function () { return sdkNonAdmin.api.tickets.getSome({ filter: { enduserId: matchEnduser.id } }); }, {
7200
7210
  onResult: function (r) { return r.length === 0; }
7201
7211
  })];
7202
- case 36:
7212
+ case 39:
7203
7213
  _a.sent();
7204
7214
  return [4 /*yield*/, (0, testing_1.async_test)("tickets filter enduser invalid", function () { return sdkNonAdmin.api.tickets.getSome({ filter: { enduserId: dontMatchEnduser.id } }); }, {
7205
7215
  onResult: function (r) { return r.length === 0; }
7206
7216
  })
7207
7217
  // enabled setting AND tags (keeps tags enabled)
7208
7218
  ];
7209
- case 37:
7219
+ case 40:
7210
7220
  _a.sent();
7211
7221
  // enabled setting AND tags (keeps tags enabled)
7212
7222
  return [4 /*yield*/, sdk.api.organizations.updateOne(sdkNonAdmin.userInfo.businessId, {
7213
7223
  settings: { endusers: { enableAccessTags: true } }
7214
7224
  })];
7215
- case 38:
7225
+ case 41:
7216
7226
  // enabled setting AND tags (keeps tags enabled)
7217
7227
  _a.sent();
7218
7228
  return [4 /*yield*/, sdkNonAdmin.authenticate(nonAdminEmail, nonAdminPassword)]; // ensure enableAccessTags setting stored correctly on jwt
7219
- case 39:
7229
+ case 42:
7220
7230
  _a.sent(); // ensure enableAccessTags setting stored correctly on jwt
7221
7231
  return [4 /*yield*/, (0, testing_1.async_test)("Access by tag with setting works", sdkNonAdmin.api.endusers.getSome, {
7222
7232
  onResult: function (r) { return r.length === 2 && !r.find(function (e) { return e.id === dontMatchEnduser.id; }); }
7223
7233
  })];
7224
- case 40:
7234
+ case 43:
7225
7235
  _a.sent();
7226
7236
  return [4 /*yield*/, (0, testing_1.async_test)("access matchEnduser", function () { return sdkNonAdmin.api.endusers.getOne(matchEnduser.id); }, passOnAnyResult)];
7227
- case 41:
7237
+ case 44:
7228
7238
  _a.sent();
7229
7239
  return [4 /*yield*/, (0, testing_1.async_test)("access dontMatchEnduser bad", function () { return sdkNonAdmin.api.endusers.getOne(dontMatchEnduser.id); }, handleAnyError)];
7230
- case 42:
7240
+ case 45:
7231
7241
  _a.sent();
7232
- return [4 /*yield*/, (0, testing_1.async_test)("access setting, no tags, tickets", sdkNonAdmin.api.tickets.getSome, {
7242
+ return [4 /*yield*/, (0, testing_1.async_test)("access setting, tickets", sdkNonAdmin.api.tickets.getSome, {
7233
7243
  onResult: function (r) { return r.length === 1 && !r.find(function (t) { return t.id === dontMatchTicket.id; }); }
7234
7244
  })];
7235
- case 43:
7245
+ case 46:
7246
+ _a.sent();
7247
+ return [4 /*yield*/, (0, testing_1.async_test)("access setting tickets search", function () { return sdkNonAdmin.api.tickets.getSome({ search: { query: ticketTitle } }); }, { onResult: function (r) { return r.length === 1; } })];
7248
+ case 47:
7236
7249
  _a.sent();
7237
7250
  return [4 /*yield*/, (0, testing_1.async_test)("access, matchEnduser ticket", function () { return sdkNonAdmin.api.tickets.getOne(matchTicket.id); }, passOnAnyResult)];
7238
- case 44:
7251
+ case 48:
7239
7252
  _a.sent();
7240
7253
  return [4 /*yield*/, (0, testing_1.async_test)("access, dontMatchEnduser ticket", function () { return sdkNonAdmin.api.tickets.getOne(dontMatchTicket.id); }, handleAnyError)];
7241
- case 45:
7254
+ case 49:
7242
7255
  _a.sent();
7243
7256
  return [4 /*yield*/, (0, testing_1.async_test)("tickets filter enduser valid", function () { return sdkNonAdmin.api.tickets.getSome({ filter: { enduserId: matchEnduser.id } }); }, {
7244
7257
  onResult: function (r) { return r.length === 1; }
7245
7258
  })];
7246
- case 46:
7259
+ case 50:
7247
7260
  _a.sent();
7248
7261
  return [4 /*yield*/, (0, testing_1.async_test)("tickets filter enduser invalid", function () { return sdkNonAdmin.api.tickets.getSome({ filter: { enduserId: dontMatchEnduser.id } }); }, {
7249
7262
  onResult: function (r) { return r.length === 0; }
7250
7263
  })];
7251
- case 47:
7264
+ case 51:
7252
7265
  _a.sent();
7253
7266
  return [4 /*yield*/, (0, testing_1.async_test)("Non-admin can't update tags", function () { return sdkNonAdmin.api.users.updateOne(sdkNonAdmin.userInfo.id, { tags: ['new tag'] }); }, handleAnyError)];
7254
- case 48:
7267
+ case 52:
7255
7268
  _a.sent();
7256
7269
  return [4 /*yield*/, (0, testing_1.async_test)("Non-admin can't update tags (with other updates)", function () { return sdkNonAdmin.api.users.updateOne(sdkNonAdmin.userInfo.id, { tags: ['new tag'], bio: '' }); }, handleAnyError)];
7257
- case 49:
7270
+ case 53:
7258
7271
  _a.sent();
7259
7272
  return [4 /*yield*/, (0, testing_1.async_test)("Non-admin can update other fields", function () { return sdkNonAdmin.api.users.updateOne(sdkNonAdmin.userInfo.id, { bio: '' }); }, passOnAnyResult)
7260
7273
  // cleanup
7261
7274
  ];
7262
- case 50:
7275
+ case 54:
7263
7276
  _a.sent();
7264
7277
  // cleanup
7265
7278
  return [4 /*yield*/, sdk.api.organizations.updateOne(sdkNonAdmin.userInfo.businessId, {
7266
7279
  settings: { endusers: { enableAccessTags: false } }
7267
7280
  })];
7268
- case 51:
7281
+ case 55:
7269
7282
  // cleanup
7270
7283
  _a.sent();
7271
7284
  return [4 /*yield*/, sdk.api.users.updateOne(sdkNonAdmin.userInfo.id, { tags: [] }, { replaceObjectFields: true })];
7272
- case 52:
7285
+ case 56:
7273
7286
  _a.sent();
7274
7287
  return [4 /*yield*/, sdkNonAdmin.refresh_session()];
7275
- case 53:
7288
+ case 57:
7276
7289
  _a.sent();
7277
7290
  return [4 /*yield*/, Promise.all([
7278
7291
  sdk.api.endusers.deleteOne(matchEnduser.id),
7279
7292
  sdk.api.endusers.deleteOne(matchMultiTagEnduser.id),
7280
7293
  sdk.api.endusers.deleteOne(dontMatchEnduser.id),
7281
7294
  ])];
7282
- case 54:
7295
+ case 58:
7283
7296
  _a.sent();
7284
7297
  return [2 /*return*/];
7285
7298
  }
@@ -7362,6 +7375,75 @@ var marketing_email_unsubscribe_tests = function () { return __awaiter(void 0, v
7362
7375
  }
7363
7376
  });
7364
7377
  }); };
7378
+ var form_conditional_logic_tests = function () { return __awaiter(void 0, void 0, void 0, function () {
7379
+ var responses, i, run_conditional_form_test;
7380
+ var _a, _b, _c;
7381
+ return __generator(this, function (_d) {
7382
+ (0, testing_1.log_header)("Form Conditional Logic Tests");
7383
+ responses = [
7384
+ {
7385
+ fieldId: "0",
7386
+ answer: { type: 'string', value: 'hello' },
7387
+ fieldTitle: '',
7388
+ },
7389
+ {
7390
+ fieldId: "0list",
7391
+ answer: { type: 'multiple_choice', value: ['hello'] },
7392
+ fieldTitle: '',
7393
+ },
7394
+ {
7395
+ fieldId: "1",
7396
+ answer: { type: 'string', value: '' },
7397
+ fieldTitle: '',
7398
+ },
7399
+ {
7400
+ fieldId: "2",
7401
+ answer: { type: 'multiple_choice', value: [''] },
7402
+ fieldTitle: '',
7403
+ },
7404
+ {
7405
+ fieldId: "3",
7406
+ answer: { type: 'number', value: 73 },
7407
+ fieldTitle: '',
7408
+ computedValueKey: 'Height',
7409
+ },
7410
+ {
7411
+ fieldId: "4",
7412
+ answer: { type: 'number', value: 190 },
7413
+ fieldTitle: '',
7414
+ computedValueKey: 'Weight',
7415
+ },
7416
+ ];
7417
+ i = 0;
7418
+ run_conditional_form_test = function (conditions, expected, title) {
7419
+ if (title === void 0) { title = "Test ".concat(++i); }
7420
+ (0, testing_1.assert)((0, utilities_1.responses_satisfy_conditions)(responses, conditions) === expected, "Failed condition:\n".concat(JSON.stringify(conditions, null, 2)), title);
7421
+ };
7422
+ run_conditional_form_test({ $and: [{ condition: { '0': { $contains: 'hel' } } }] }, true);
7423
+ run_conditional_form_test({ $and: [{ condition: { '0': { $contains: 'hello' } } }] }, true);
7424
+ run_conditional_form_test({ $and: [{ condition: { '0': { $contains: 'hllo' } } }] }, false);
7425
+ run_conditional_form_test({ $and: [{ condition: { '0list': { $contains: 'hel' } } }] }, true);
7426
+ run_conditional_form_test({ $and: [{ condition: { '0list': { $contains: 'hello' } } }] }, true);
7427
+ run_conditional_form_test({ $and: [{ condition: { '0list': { $contains: 'hllo' } } }] }, false);
7428
+ run_conditional_form_test({ $and: [{ condition: { '1': '' } }] }, true);
7429
+ run_conditional_form_test({ $and: [{ condition: { '1': { $exists: true } } }] }, false);
7430
+ run_conditional_form_test({ $and: [{ condition: { '1': { $exists: false } } }] }, true);
7431
+ run_conditional_form_test({ $and: [{ condition: { '2': '' } }] }, true);
7432
+ run_conditional_form_test({ $and: [{ condition: { '2': { $exists: true } } }] }, true);
7433
+ run_conditional_form_test({ $and: [{ condition: { '2': { $exists: false } } }] }, false);
7434
+ run_conditional_form_test({ $and: [{ condition: { '3': { $gt: 72 } } }] }, true);
7435
+ run_conditional_form_test({ $and: [{ condition: { '3': { $gt: 73 } } }] }, false);
7436
+ run_conditional_form_test({ $and: [{ condition: { '3': { $gt: 74 } } }] }, false);
7437
+ run_conditional_form_test({ $and: [{ condition: { '3': { $lt: 72 } } }] }, false);
7438
+ run_conditional_form_test({ $and: [{ condition: { '3': { $lt: 73 } } }] }, false);
7439
+ run_conditional_form_test({ $and: [{ condition: { '3': { $lt: 74 } } }] }, true);
7440
+ run_conditional_form_test({ $and: [{ condition: (_a = {}, _a[utilities_1.FORM_LOGIC_CALCULATED_FIELDS[0]] = { $exists: true }, _a) }] }, true);
7441
+ run_conditional_form_test({ $and: [{ condition: (_b = {}, _b[utilities_1.FORM_LOGIC_CALCULATED_FIELDS[0]] = { $gt: 25 }, _b) }] }, true);
7442
+ run_conditional_form_test({ $and: [{ condition: (_c = {}, _c[utilities_1.FORM_LOGIC_CALCULATED_FIELDS[0]] = { $lt: 25 }, _c) }] }, false);
7443
+ return [2 /*return*/];
7444
+ });
7445
+ }); };
7446
+ exports.form_conditional_logic_tests = form_conditional_logic_tests;
7365
7447
  (function () { return __awaiter(void 0, void 0, void 0, function () {
7366
7448
  var err_1, n, _a, _b, _c, _i, returnValidation, t, _d, _e, _f, _g, err_2;
7367
7449
  var _h, _j;
@@ -7375,6 +7457,7 @@ var marketing_email_unsubscribe_tests = function () { return __awaiter(void 0, v
7375
7457
  _k.label = 2;
7376
7458
  case 2:
7377
7459
  _k.trys.push([2, 43, , 44]);
7460
+ (0, exports.form_conditional_logic_tests)();
7378
7461
  return [4 /*yield*/, test_weighted_round_robin()];
7379
7462
  case 3:
7380
7463
  _k.sent();
@@ -7411,13 +7494,13 @@ var marketing_email_unsubscribe_tests = function () { return __awaiter(void 0, v
7411
7494
  return [4 /*yield*/, multi_tenant_tests()]; // should come right after setup tests
7412
7495
  case 10:
7413
7496
  _k.sent(); // should come right after setup tests
7414
- return [4 /*yield*/, marketing_email_unsubscribe_tests()];
7497
+ return [4 /*yield*/, enduser_access_tags_tests()];
7415
7498
  case 11:
7416
7499
  _k.sent();
7417
- return [4 /*yield*/, unique_strings_tests()];
7500
+ return [4 /*yield*/, marketing_email_unsubscribe_tests()];
7418
7501
  case 12:
7419
7502
  _k.sent();
7420
- return [4 /*yield*/, enduser_access_tags_tests()];
7503
+ return [4 /*yield*/, unique_strings_tests()];
7421
7504
  case 13:
7422
7505
  _k.sent();
7423
7506
  return [4 /*yield*/, (0, exports.self_serve_appointment_booking_tests)()];