@tellescope/sdk 1.71.0 → 1.71.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -60,7 +60,7 @@ import crypto from "crypto";
60
60
  import * as buffer from "buffer"; // only node >=15.7.0
61
61
  import { fieldsToValidationOld, mongoIdStringRequired, } from "@tellescope/validation";
62
62
  import { Session, EnduserSession } from "../sdk";
63
- import { weighted_round_robin } from "@tellescope/utilities";
63
+ import { FORM_LOGIC_CALCULATED_FIELDS, responses_satisfy_conditions, weighted_round_robin } from "@tellescope/utilities";
64
64
  import { DEFAULT_OPERATIONS, PLACEHOLDER_ID } from "@tellescope/constants";
65
65
  import { schema, } from "@tellescope/schema";
66
66
  import { assert, async_test, log_header, wait, } from "@tellescope/testing";
@@ -7014,13 +7014,14 @@ var test_weighted_round_robin = function () { return __awaiter(void 0, void 0, v
7014
7014
  });
7015
7015
  }); };
7016
7016
  var enduser_access_tags_tests = function () { return __awaiter(void 0, void 0, void 0, function () {
7017
- var matchTag, dontMatchTag, matchEnduser, matchMultiTagEnduser, dontMatchEnduser, matchTicket, dontMatchTicket;
7017
+ var matchTag, dontMatchTag, ticketTitle, matchEnduser, matchMultiTagEnduser, dontMatchEnduser, matchTicket, dontMatchTicket;
7018
7018
  return __generator(this, function (_a) {
7019
7019
  switch (_a.label) {
7020
7020
  case 0:
7021
7021
  log_header("enduser_access_tags_tests");
7022
7022
  matchTag = 'Access';
7023
7023
  dontMatchTag = 'No Access';
7024
+ ticketTitle = 'ticket';
7024
7025
  return [4 /*yield*/, sdk.api.endusers.createOne({ accessTags: [matchTag] })];
7025
7026
  case 1:
7026
7027
  matchEnduser = _a.sent();
@@ -7030,10 +7031,10 @@ var enduser_access_tags_tests = function () { return __awaiter(void 0, void 0, v
7030
7031
  return [4 /*yield*/, sdk.api.endusers.createOne({ accessTags: [dontMatchTag] })];
7031
7032
  case 3:
7032
7033
  dontMatchEnduser = _a.sent();
7033
- return [4 /*yield*/, sdk.api.tickets.createOne({ enduserId: matchEnduser.id, title: 'ticket' })];
7034
+ return [4 /*yield*/, sdk.api.tickets.createOne({ enduserId: matchEnduser.id, title: ticketTitle })];
7034
7035
  case 4:
7035
7036
  matchTicket = _a.sent();
7036
- return [4 /*yield*/, sdk.api.tickets.createOne({ enduserId: dontMatchEnduser.id, title: 'ticket' })
7037
+ return [4 /*yield*/, sdk.api.tickets.createOne({ enduserId: dontMatchEnduser.id, title: ticketTitle })
7037
7038
  // start with disabled setting an no tags on non-admin
7038
7039
  ];
7039
7040
  case 5:
@@ -7063,179 +7064,191 @@ var enduser_access_tags_tests = function () { return __awaiter(void 0, void 0, v
7063
7064
  return [4 /*yield*/, async_test("Setting disabled, no tags, tickets", sdkNonAdmin.api.tickets.getSome, { onResult: function (r) { return r.length === 0; } })];
7064
7065
  case 12:
7065
7066
  _a.sent();
7066
- return [4 /*yield*/, async_test("Setting disabled, matchEnduser ticket", function () { return sdkNonAdmin.api.tickets.getOne(matchTicket.id); }, handleAnyError)];
7067
+ return [4 /*yield*/, async_test("Setting disabled, no tags, tickets search", function () { return sdkNonAdmin.api.tickets.getSome({ search: { query: ticketTitle } }); }, { onResult: function (r) { return r.length === 0; } })];
7067
7068
  case 13:
7068
7069
  _a.sent();
7069
- return [4 /*yield*/, async_test("Setting disabled, dontMatchEnduser ticket", function () { return sdkNonAdmin.api.tickets.getOne(dontMatchTicket.id); }, handleAnyError)];
7070
+ return [4 /*yield*/, async_test("Setting disabled, matchEnduser ticket", function () { return sdkNonAdmin.api.tickets.getOne(matchTicket.id); }, handleAnyError)];
7070
7071
  case 14:
7072
+ _a.sent();
7073
+ return [4 /*yield*/, async_test("Setting disabled, dontMatchEnduser ticket", function () { return sdkNonAdmin.api.tickets.getOne(dontMatchTicket.id); }, handleAnyError)];
7074
+ case 15:
7071
7075
  _a.sent();
7072
7076
  return [4 /*yield*/, async_test("tickets filter enduser valid", function () { return sdkNonAdmin.api.tickets.getSome({ filter: { enduserId: matchEnduser.id } }); }, {
7073
7077
  onResult: function (r) { return r.length === 0; }
7074
7078
  })];
7075
- case 15:
7079
+ case 16:
7076
7080
  _a.sent();
7077
7081
  return [4 /*yield*/, async_test("tickets filter enduser invalid", function () { return sdkNonAdmin.api.tickets.getSome({ filter: { enduserId: dontMatchEnduser.id } }); }, {
7078
7082
  onResult: function (r) { return r.length === 0; }
7079
7083
  })
7080
7084
  // enable setting, disable tags
7081
7085
  ];
7082
- case 16:
7086
+ case 17:
7083
7087
  _a.sent();
7084
7088
  // enable setting, disable tags
7085
7089
  return [4 /*yield*/, sdk.api.organizations.updateOne(sdkNonAdmin.userInfo.businessId, {
7086
7090
  settings: { endusers: { enableAccessTags: true } }
7087
7091
  })];
7088
- case 17:
7092
+ case 18:
7089
7093
  // enable setting, disable tags
7090
7094
  _a.sent();
7091
7095
  return [4 /*yield*/, sdkNonAdmin.authenticate(nonAdminEmail, nonAdminPassword)]; // ensure enableAccessTags setting stored correctly on jwt
7092
- case 18:
7096
+ case 19:
7093
7097
  _a.sent(); // ensure enableAccessTags setting stored correctly on jwt
7094
7098
  return [4 /*yield*/, async_test("enable setting, disable tags", sdkNonAdmin.api.endusers.getSome, { onResult: function (r) { return r.length === 0; } })];
7095
- case 19:
7099
+ case 20:
7096
7100
  _a.sent();
7097
7101
  return [4 /*yield*/, async_test("enable setting, matchEnduser", function () { return sdkNonAdmin.api.endusers.getOne(matchEnduser.id); }, handleAnyError)];
7098
- case 20:
7102
+ case 21:
7099
7103
  _a.sent();
7100
7104
  return [4 /*yield*/, async_test("enable setting, dontMatchEnduser", function () { return sdkNonAdmin.api.endusers.getOne(dontMatchEnduser.id); }, handleAnyError)];
7101
- case 21:
7105
+ case 22:
7102
7106
  _a.sent();
7103
7107
  return [4 /*yield*/, async_test("enable setting, no tags, tickets", sdkNonAdmin.api.tickets.getSome, { onResult: function (r) { return r.length === 0; } })];
7104
- case 22:
7108
+ case 23:
7109
+ _a.sent();
7110
+ return [4 /*yield*/, async_test("enable setting, no tags, tickets search", function () { return sdkNonAdmin.api.tickets.getSome({ search: { query: ticketTitle } }); }, { onResult: function (r) { return r.length === 0; } })];
7111
+ case 24:
7105
7112
  _a.sent();
7106
7113
  return [4 /*yield*/, async_test("enable setting, matchEnduser ticket", function () { return sdkNonAdmin.api.tickets.getOne(matchTicket.id); }, handleAnyError)];
7107
- case 23:
7114
+ case 25:
7108
7115
  _a.sent();
7109
7116
  return [4 /*yield*/, async_test("enable setting, dontMatchEnduser ticket", function () { return sdkNonAdmin.api.tickets.getOne(dontMatchTicket.id); }, handleAnyError)];
7110
- case 24:
7117
+ case 26:
7111
7118
  _a.sent();
7112
7119
  return [4 /*yield*/, async_test("tickets filter enduser valid", function () { return sdkNonAdmin.api.tickets.getSome({ filter: { enduserId: matchEnduser.id } }); }, {
7113
7120
  onResult: function (r) { return r.length === 0; }
7114
7121
  })];
7115
- case 25:
7122
+ case 27:
7116
7123
  _a.sent();
7117
7124
  return [4 /*yield*/, async_test("tickets filter enduser invalid", function () { return sdkNonAdmin.api.tickets.getSome({ filter: { enduserId: dontMatchEnduser.id } }); }, {
7118
7125
  onResult: function (r) { return r.length === 0; }
7119
7126
  })
7120
7127
  // disable setting, enable tags
7121
7128
  ];
7122
- case 26:
7129
+ case 28:
7123
7130
  _a.sent();
7124
7131
  // disable setting, enable tags
7125
7132
  return [4 /*yield*/, sdk.api.users.updateOne(sdkNonAdmin.userInfo.id, { tags: [matchTag] }, { replaceObjectFields: true })];
7126
- case 27:
7133
+ case 29:
7127
7134
  // disable setting, enable tags
7128
7135
  _a.sent();
7129
7136
  return [4 /*yield*/, sdk.api.organizations.updateOne(sdkNonAdmin.userInfo.businessId, {
7130
7137
  settings: { endusers: { enableAccessTags: false } }
7131
7138
  })];
7132
- case 28:
7139
+ case 30:
7133
7140
  _a.sent();
7134
7141
  return [4 /*yield*/, sdkNonAdmin.authenticate(nonAdminEmail, nonAdminPassword)]; // ensure enableAccessTags setting stored correctly on jwt
7135
- case 29:
7142
+ case 31:
7136
7143
  _a.sent(); // ensure enableAccessTags setting stored correctly on jwt
7137
7144
  return [4 /*yield*/, async_test("disable setting, enable tags", sdkNonAdmin.api.endusers.getSome, { onResult: function (r) { return r.length === 0; } })];
7138
- case 30:
7145
+ case 32:
7139
7146
  _a.sent();
7140
7147
  return [4 /*yield*/, async_test("disable setting, matchEnduser", function () { return sdkNonAdmin.api.endusers.getOne(matchEnduser.id); }, handleAnyError)];
7141
- case 31:
7148
+ case 33:
7142
7149
  _a.sent();
7143
7150
  return [4 /*yield*/, async_test("disable setting, dontMatchEnduser", function () { return sdkNonAdmin.api.endusers.getOne(dontMatchEnduser.id); }, handleAnyError)];
7144
- case 32:
7151
+ case 34:
7145
7152
  _a.sent();
7146
7153
  return [4 /*yield*/, async_test("disable setting, enable tags, tickets", sdkNonAdmin.api.tickets.getSome, { onResult: function (r) { return r.length === 0; } })];
7147
- case 33:
7154
+ case 35:
7155
+ _a.sent();
7156
+ return [4 /*yield*/, async_test("disable setting, no tags, tickets search", function () { return sdkNonAdmin.api.tickets.getSome({ search: { query: ticketTitle } }); }, { onResult: function (r) { return r.length === 0; } })];
7157
+ case 36:
7148
7158
  _a.sent();
7149
7159
  return [4 /*yield*/, async_test("disable setting, matchEnduser ticket", function () { return sdkNonAdmin.api.tickets.getOne(matchTicket.id); }, handleAnyError)];
7150
- case 34:
7160
+ case 37:
7151
7161
  _a.sent();
7152
7162
  return [4 /*yield*/, async_test("disable setting, dontMatchEnduser ticket", function () { return sdkNonAdmin.api.tickets.getOne(dontMatchTicket.id); }, handleAnyError)];
7153
- case 35:
7163
+ case 38:
7154
7164
  _a.sent();
7155
7165
  return [4 /*yield*/, async_test("tickets filter enduser valid", function () { return sdkNonAdmin.api.tickets.getSome({ filter: { enduserId: matchEnduser.id } }); }, {
7156
7166
  onResult: function (r) { return r.length === 0; }
7157
7167
  })];
7158
- case 36:
7168
+ case 39:
7159
7169
  _a.sent();
7160
7170
  return [4 /*yield*/, async_test("tickets filter enduser invalid", function () { return sdkNonAdmin.api.tickets.getSome({ filter: { enduserId: dontMatchEnduser.id } }); }, {
7161
7171
  onResult: function (r) { return r.length === 0; }
7162
7172
  })
7163
7173
  // enabled setting AND tags (keeps tags enabled)
7164
7174
  ];
7165
- case 37:
7175
+ case 40:
7166
7176
  _a.sent();
7167
7177
  // enabled setting AND tags (keeps tags enabled)
7168
7178
  return [4 /*yield*/, sdk.api.organizations.updateOne(sdkNonAdmin.userInfo.businessId, {
7169
7179
  settings: { endusers: { enableAccessTags: true } }
7170
7180
  })];
7171
- case 38:
7181
+ case 41:
7172
7182
  // enabled setting AND tags (keeps tags enabled)
7173
7183
  _a.sent();
7174
7184
  return [4 /*yield*/, sdkNonAdmin.authenticate(nonAdminEmail, nonAdminPassword)]; // ensure enableAccessTags setting stored correctly on jwt
7175
- case 39:
7185
+ case 42:
7176
7186
  _a.sent(); // ensure enableAccessTags setting stored correctly on jwt
7177
7187
  return [4 /*yield*/, async_test("Access by tag with setting works", sdkNonAdmin.api.endusers.getSome, {
7178
7188
  onResult: function (r) { return r.length === 2 && !r.find(function (e) { return e.id === dontMatchEnduser.id; }); }
7179
7189
  })];
7180
- case 40:
7190
+ case 43:
7181
7191
  _a.sent();
7182
7192
  return [4 /*yield*/, async_test("access matchEnduser", function () { return sdkNonAdmin.api.endusers.getOne(matchEnduser.id); }, passOnAnyResult)];
7183
- case 41:
7193
+ case 44:
7184
7194
  _a.sent();
7185
7195
  return [4 /*yield*/, async_test("access dontMatchEnduser bad", function () { return sdkNonAdmin.api.endusers.getOne(dontMatchEnduser.id); }, handleAnyError)];
7186
- case 42:
7196
+ case 45:
7187
7197
  _a.sent();
7188
- return [4 /*yield*/, async_test("access setting, no tags, tickets", sdkNonAdmin.api.tickets.getSome, {
7198
+ return [4 /*yield*/, async_test("access setting, tickets", sdkNonAdmin.api.tickets.getSome, {
7189
7199
  onResult: function (r) { return r.length === 1 && !r.find(function (t) { return t.id === dontMatchTicket.id; }); }
7190
7200
  })];
7191
- case 43:
7201
+ case 46:
7202
+ _a.sent();
7203
+ return [4 /*yield*/, async_test("access setting tickets search", function () { return sdkNonAdmin.api.tickets.getSome({ search: { query: ticketTitle } }); }, { onResult: function (r) { return r.length === 1; } })];
7204
+ case 47:
7192
7205
  _a.sent();
7193
7206
  return [4 /*yield*/, async_test("access, matchEnduser ticket", function () { return sdkNonAdmin.api.tickets.getOne(matchTicket.id); }, passOnAnyResult)];
7194
- case 44:
7207
+ case 48:
7195
7208
  _a.sent();
7196
7209
  return [4 /*yield*/, async_test("access, dontMatchEnduser ticket", function () { return sdkNonAdmin.api.tickets.getOne(dontMatchTicket.id); }, handleAnyError)];
7197
- case 45:
7210
+ case 49:
7198
7211
  _a.sent();
7199
7212
  return [4 /*yield*/, async_test("tickets filter enduser valid", function () { return sdkNonAdmin.api.tickets.getSome({ filter: { enduserId: matchEnduser.id } }); }, {
7200
7213
  onResult: function (r) { return r.length === 1; }
7201
7214
  })];
7202
- case 46:
7215
+ case 50:
7203
7216
  _a.sent();
7204
7217
  return [4 /*yield*/, async_test("tickets filter enduser invalid", function () { return sdkNonAdmin.api.tickets.getSome({ filter: { enduserId: dontMatchEnduser.id } }); }, {
7205
7218
  onResult: function (r) { return r.length === 0; }
7206
7219
  })];
7207
- case 47:
7220
+ case 51:
7208
7221
  _a.sent();
7209
7222
  return [4 /*yield*/, async_test("Non-admin can't update tags", function () { return sdkNonAdmin.api.users.updateOne(sdkNonAdmin.userInfo.id, { tags: ['new tag'] }); }, handleAnyError)];
7210
- case 48:
7223
+ case 52:
7211
7224
  _a.sent();
7212
7225
  return [4 /*yield*/, async_test("Non-admin can't update tags (with other updates)", function () { return sdkNonAdmin.api.users.updateOne(sdkNonAdmin.userInfo.id, { tags: ['new tag'], bio: '' }); }, handleAnyError)];
7213
- case 49:
7226
+ case 53:
7214
7227
  _a.sent();
7215
7228
  return [4 /*yield*/, async_test("Non-admin can update other fields", function () { return sdkNonAdmin.api.users.updateOne(sdkNonAdmin.userInfo.id, { bio: '' }); }, passOnAnyResult)
7216
7229
  // cleanup
7217
7230
  ];
7218
- case 50:
7231
+ case 54:
7219
7232
  _a.sent();
7220
7233
  // cleanup
7221
7234
  return [4 /*yield*/, sdk.api.organizations.updateOne(sdkNonAdmin.userInfo.businessId, {
7222
7235
  settings: { endusers: { enableAccessTags: false } }
7223
7236
  })];
7224
- case 51:
7237
+ case 55:
7225
7238
  // cleanup
7226
7239
  _a.sent();
7227
7240
  return [4 /*yield*/, sdk.api.users.updateOne(sdkNonAdmin.userInfo.id, { tags: [] }, { replaceObjectFields: true })];
7228
- case 52:
7241
+ case 56:
7229
7242
  _a.sent();
7230
7243
  return [4 /*yield*/, sdkNonAdmin.refresh_session()];
7231
- case 53:
7244
+ case 57:
7232
7245
  _a.sent();
7233
7246
  return [4 /*yield*/, Promise.all([
7234
7247
  sdk.api.endusers.deleteOne(matchEnduser.id),
7235
7248
  sdk.api.endusers.deleteOne(matchMultiTagEnduser.id),
7236
7249
  sdk.api.endusers.deleteOne(dontMatchEnduser.id),
7237
7250
  ])];
7238
- case 54:
7251
+ case 58:
7239
7252
  _a.sent();
7240
7253
  return [2 /*return*/];
7241
7254
  }
@@ -7318,6 +7331,74 @@ var marketing_email_unsubscribe_tests = function () { return __awaiter(void 0, v
7318
7331
  }
7319
7332
  });
7320
7333
  }); };
7334
+ export var form_conditional_logic_tests = function () { return __awaiter(void 0, void 0, void 0, function () {
7335
+ var responses, i, run_conditional_form_test;
7336
+ var _a, _b, _c;
7337
+ return __generator(this, function (_d) {
7338
+ log_header("Form Conditional Logic Tests");
7339
+ responses = [
7340
+ {
7341
+ fieldId: "0",
7342
+ answer: { type: 'string', value: 'hello' },
7343
+ fieldTitle: '',
7344
+ },
7345
+ {
7346
+ fieldId: "0list",
7347
+ answer: { type: 'multiple_choice', value: ['hello'] },
7348
+ fieldTitle: '',
7349
+ },
7350
+ {
7351
+ fieldId: "1",
7352
+ answer: { type: 'string', value: '' },
7353
+ fieldTitle: '',
7354
+ },
7355
+ {
7356
+ fieldId: "2",
7357
+ answer: { type: 'multiple_choice', value: [''] },
7358
+ fieldTitle: '',
7359
+ },
7360
+ {
7361
+ fieldId: "3",
7362
+ answer: { type: 'number', value: 73 },
7363
+ fieldTitle: '',
7364
+ computedValueKey: 'Height',
7365
+ },
7366
+ {
7367
+ fieldId: "4",
7368
+ answer: { type: 'number', value: 190 },
7369
+ fieldTitle: '',
7370
+ computedValueKey: 'Weight',
7371
+ },
7372
+ ];
7373
+ i = 0;
7374
+ run_conditional_form_test = function (conditions, expected, title) {
7375
+ if (title === void 0) { title = "Test ".concat(++i); }
7376
+ assert(responses_satisfy_conditions(responses, conditions) === expected, "Failed condition:\n".concat(JSON.stringify(conditions, null, 2)), title);
7377
+ };
7378
+ run_conditional_form_test({ $and: [{ condition: { '0': { $contains: 'hel' } } }] }, true);
7379
+ run_conditional_form_test({ $and: [{ condition: { '0': { $contains: 'hello' } } }] }, true);
7380
+ run_conditional_form_test({ $and: [{ condition: { '0': { $contains: 'hllo' } } }] }, false);
7381
+ run_conditional_form_test({ $and: [{ condition: { '0list': { $contains: 'hel' } } }] }, true);
7382
+ run_conditional_form_test({ $and: [{ condition: { '0list': { $contains: 'hello' } } }] }, true);
7383
+ run_conditional_form_test({ $and: [{ condition: { '0list': { $contains: 'hllo' } } }] }, false);
7384
+ run_conditional_form_test({ $and: [{ condition: { '1': '' } }] }, true);
7385
+ run_conditional_form_test({ $and: [{ condition: { '1': { $exists: true } } }] }, false);
7386
+ run_conditional_form_test({ $and: [{ condition: { '1': { $exists: false } } }] }, true);
7387
+ run_conditional_form_test({ $and: [{ condition: { '2': '' } }] }, true);
7388
+ run_conditional_form_test({ $and: [{ condition: { '2': { $exists: true } } }] }, true);
7389
+ run_conditional_form_test({ $and: [{ condition: { '2': { $exists: false } } }] }, false);
7390
+ run_conditional_form_test({ $and: [{ condition: { '3': { $gt: 72 } } }] }, true);
7391
+ run_conditional_form_test({ $and: [{ condition: { '3': { $gt: 73 } } }] }, false);
7392
+ run_conditional_form_test({ $and: [{ condition: { '3': { $gt: 74 } } }] }, false);
7393
+ run_conditional_form_test({ $and: [{ condition: { '3': { $lt: 72 } } }] }, false);
7394
+ run_conditional_form_test({ $and: [{ condition: { '3': { $lt: 73 } } }] }, false);
7395
+ run_conditional_form_test({ $and: [{ condition: { '3': { $lt: 74 } } }] }, true);
7396
+ run_conditional_form_test({ $and: [{ condition: (_a = {}, _a[FORM_LOGIC_CALCULATED_FIELDS[0]] = { $exists: true }, _a) }] }, true);
7397
+ run_conditional_form_test({ $and: [{ condition: (_b = {}, _b[FORM_LOGIC_CALCULATED_FIELDS[0]] = { $gt: 25 }, _b) }] }, true);
7398
+ run_conditional_form_test({ $and: [{ condition: (_c = {}, _c[FORM_LOGIC_CALCULATED_FIELDS[0]] = { $lt: 25 }, _c) }] }, false);
7399
+ return [2 /*return*/];
7400
+ });
7401
+ }); };
7321
7402
  (function () { return __awaiter(void 0, void 0, void 0, function () {
7322
7403
  var err_1, n, _a, _b, _c, _i, returnValidation, t, _d, _e, _f, _g, err_2;
7323
7404
  var _h, _j;
@@ -7331,6 +7412,7 @@ var marketing_email_unsubscribe_tests = function () { return __awaiter(void 0, v
7331
7412
  _k.label = 2;
7332
7413
  case 2:
7333
7414
  _k.trys.push([2, 43, , 44]);
7415
+ form_conditional_logic_tests();
7334
7416
  return [4 /*yield*/, test_weighted_round_robin()];
7335
7417
  case 3:
7336
7418
  _k.sent();
@@ -7367,13 +7449,13 @@ var marketing_email_unsubscribe_tests = function () { return __awaiter(void 0, v
7367
7449
  return [4 /*yield*/, multi_tenant_tests()]; // should come right after setup tests
7368
7450
  case 10:
7369
7451
  _k.sent(); // should come right after setup tests
7370
- return [4 /*yield*/, marketing_email_unsubscribe_tests()];
7452
+ return [4 /*yield*/, enduser_access_tags_tests()];
7371
7453
  case 11:
7372
7454
  _k.sent();
7373
- return [4 /*yield*/, unique_strings_tests()];
7455
+ return [4 /*yield*/, marketing_email_unsubscribe_tests()];
7374
7456
  case 12:
7375
7457
  _k.sent();
7376
- return [4 /*yield*/, enduser_access_tags_tests()];
7458
+ return [4 /*yield*/, unique_strings_tests()];
7377
7459
  case 13:
7378
7460
  _k.sent();
7379
7461
  return [4 /*yield*/, self_serve_appointment_booking_tests()];