@tellescope/sdk 1.71.0 → 1.71.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/cjs/sdk.d.ts +1 -0
- package/lib/cjs/sdk.d.ts.map +1 -1
- package/lib/cjs/sdk.js +3 -3
- package/lib/cjs/sdk.js.map +1 -1
- package/lib/cjs/tests/tests.d.ts +1 -0
- package/lib/cjs/tests/tests.d.ts.map +1 -1
- package/lib/cjs/tests/tests.js +133 -50
- package/lib/cjs/tests/tests.js.map +1 -1
- package/lib/esm/sdk.d.ts +3 -2
- package/lib/esm/sdk.d.ts.map +1 -1
- package/lib/esm/sdk.js +3 -3
- package/lib/esm/sdk.js.map +1 -1
- package/lib/esm/session.d.ts +1 -0
- package/lib/esm/session.d.ts.map +1 -1
- package/lib/esm/tests/tests.d.ts +1 -0
- package/lib/esm/tests/tests.d.ts.map +1 -1
- package/lib/esm/tests/tests.js +132 -50
- package/lib/esm/tests/tests.js.map +1 -1
- package/lib/tsconfig.tsbuildinfo +1 -1
- package/package.json +8 -8
- package/src/sdk.ts +3 -3
- package/src/tests/tests.ts +96 -5
- package/test_generated.pdf +0 -0
package/lib/esm/tests/tests.js
CHANGED
|
@@ -60,7 +60,7 @@ import crypto from "crypto";
|
|
|
60
60
|
import * as buffer from "buffer"; // only node >=15.7.0
|
|
61
61
|
import { fieldsToValidationOld, mongoIdStringRequired, } from "@tellescope/validation";
|
|
62
62
|
import { Session, EnduserSession } from "../sdk";
|
|
63
|
-
import { weighted_round_robin } from "@tellescope/utilities";
|
|
63
|
+
import { FORM_LOGIC_CALCULATED_FIELDS, responses_satisfy_conditions, weighted_round_robin } from "@tellescope/utilities";
|
|
64
64
|
import { DEFAULT_OPERATIONS, PLACEHOLDER_ID } from "@tellescope/constants";
|
|
65
65
|
import { schema, } from "@tellescope/schema";
|
|
66
66
|
import { assert, async_test, log_header, wait, } from "@tellescope/testing";
|
|
@@ -7014,13 +7014,14 @@ var test_weighted_round_robin = function () { return __awaiter(void 0, void 0, v
|
|
|
7014
7014
|
});
|
|
7015
7015
|
}); };
|
|
7016
7016
|
var enduser_access_tags_tests = function () { return __awaiter(void 0, void 0, void 0, function () {
|
|
7017
|
-
var matchTag, dontMatchTag, matchEnduser, matchMultiTagEnduser, dontMatchEnduser, matchTicket, dontMatchTicket;
|
|
7017
|
+
var matchTag, dontMatchTag, ticketTitle, matchEnduser, matchMultiTagEnduser, dontMatchEnduser, matchTicket, dontMatchTicket;
|
|
7018
7018
|
return __generator(this, function (_a) {
|
|
7019
7019
|
switch (_a.label) {
|
|
7020
7020
|
case 0:
|
|
7021
7021
|
log_header("enduser_access_tags_tests");
|
|
7022
7022
|
matchTag = 'Access';
|
|
7023
7023
|
dontMatchTag = 'No Access';
|
|
7024
|
+
ticketTitle = 'ticket';
|
|
7024
7025
|
return [4 /*yield*/, sdk.api.endusers.createOne({ accessTags: [matchTag] })];
|
|
7025
7026
|
case 1:
|
|
7026
7027
|
matchEnduser = _a.sent();
|
|
@@ -7030,10 +7031,10 @@ var enduser_access_tags_tests = function () { return __awaiter(void 0, void 0, v
|
|
|
7030
7031
|
return [4 /*yield*/, sdk.api.endusers.createOne({ accessTags: [dontMatchTag] })];
|
|
7031
7032
|
case 3:
|
|
7032
7033
|
dontMatchEnduser = _a.sent();
|
|
7033
|
-
return [4 /*yield*/, sdk.api.tickets.createOne({ enduserId: matchEnduser.id, title:
|
|
7034
|
+
return [4 /*yield*/, sdk.api.tickets.createOne({ enduserId: matchEnduser.id, title: ticketTitle })];
|
|
7034
7035
|
case 4:
|
|
7035
7036
|
matchTicket = _a.sent();
|
|
7036
|
-
return [4 /*yield*/, sdk.api.tickets.createOne({ enduserId: dontMatchEnduser.id, title:
|
|
7037
|
+
return [4 /*yield*/, sdk.api.tickets.createOne({ enduserId: dontMatchEnduser.id, title: ticketTitle })
|
|
7037
7038
|
// start with disabled setting an no tags on non-admin
|
|
7038
7039
|
];
|
|
7039
7040
|
case 5:
|
|
@@ -7063,179 +7064,191 @@ var enduser_access_tags_tests = function () { return __awaiter(void 0, void 0, v
|
|
|
7063
7064
|
return [4 /*yield*/, async_test("Setting disabled, no tags, tickets", sdkNonAdmin.api.tickets.getSome, { onResult: function (r) { return r.length === 0; } })];
|
|
7064
7065
|
case 12:
|
|
7065
7066
|
_a.sent();
|
|
7066
|
-
return [4 /*yield*/, async_test("Setting disabled,
|
|
7067
|
+
return [4 /*yield*/, async_test("Setting disabled, no tags, tickets search", function () { return sdkNonAdmin.api.tickets.getSome({ search: { query: ticketTitle } }); }, { onResult: function (r) { return r.length === 0; } })];
|
|
7067
7068
|
case 13:
|
|
7068
7069
|
_a.sent();
|
|
7069
|
-
return [4 /*yield*/, async_test("Setting disabled,
|
|
7070
|
+
return [4 /*yield*/, async_test("Setting disabled, matchEnduser ticket", function () { return sdkNonAdmin.api.tickets.getOne(matchTicket.id); }, handleAnyError)];
|
|
7070
7071
|
case 14:
|
|
7072
|
+
_a.sent();
|
|
7073
|
+
return [4 /*yield*/, async_test("Setting disabled, dontMatchEnduser ticket", function () { return sdkNonAdmin.api.tickets.getOne(dontMatchTicket.id); }, handleAnyError)];
|
|
7074
|
+
case 15:
|
|
7071
7075
|
_a.sent();
|
|
7072
7076
|
return [4 /*yield*/, async_test("tickets filter enduser valid", function () { return sdkNonAdmin.api.tickets.getSome({ filter: { enduserId: matchEnduser.id } }); }, {
|
|
7073
7077
|
onResult: function (r) { return r.length === 0; }
|
|
7074
7078
|
})];
|
|
7075
|
-
case
|
|
7079
|
+
case 16:
|
|
7076
7080
|
_a.sent();
|
|
7077
7081
|
return [4 /*yield*/, async_test("tickets filter enduser invalid", function () { return sdkNonAdmin.api.tickets.getSome({ filter: { enduserId: dontMatchEnduser.id } }); }, {
|
|
7078
7082
|
onResult: function (r) { return r.length === 0; }
|
|
7079
7083
|
})
|
|
7080
7084
|
// enable setting, disable tags
|
|
7081
7085
|
];
|
|
7082
|
-
case
|
|
7086
|
+
case 17:
|
|
7083
7087
|
_a.sent();
|
|
7084
7088
|
// enable setting, disable tags
|
|
7085
7089
|
return [4 /*yield*/, sdk.api.organizations.updateOne(sdkNonAdmin.userInfo.businessId, {
|
|
7086
7090
|
settings: { endusers: { enableAccessTags: true } }
|
|
7087
7091
|
})];
|
|
7088
|
-
case
|
|
7092
|
+
case 18:
|
|
7089
7093
|
// enable setting, disable tags
|
|
7090
7094
|
_a.sent();
|
|
7091
7095
|
return [4 /*yield*/, sdkNonAdmin.authenticate(nonAdminEmail, nonAdminPassword)]; // ensure enableAccessTags setting stored correctly on jwt
|
|
7092
|
-
case
|
|
7096
|
+
case 19:
|
|
7093
7097
|
_a.sent(); // ensure enableAccessTags setting stored correctly on jwt
|
|
7094
7098
|
return [4 /*yield*/, async_test("enable setting, disable tags", sdkNonAdmin.api.endusers.getSome, { onResult: function (r) { return r.length === 0; } })];
|
|
7095
|
-
case
|
|
7099
|
+
case 20:
|
|
7096
7100
|
_a.sent();
|
|
7097
7101
|
return [4 /*yield*/, async_test("enable setting, matchEnduser", function () { return sdkNonAdmin.api.endusers.getOne(matchEnduser.id); }, handleAnyError)];
|
|
7098
|
-
case
|
|
7102
|
+
case 21:
|
|
7099
7103
|
_a.sent();
|
|
7100
7104
|
return [4 /*yield*/, async_test("enable setting, dontMatchEnduser", function () { return sdkNonAdmin.api.endusers.getOne(dontMatchEnduser.id); }, handleAnyError)];
|
|
7101
|
-
case
|
|
7105
|
+
case 22:
|
|
7102
7106
|
_a.sent();
|
|
7103
7107
|
return [4 /*yield*/, async_test("enable setting, no tags, tickets", sdkNonAdmin.api.tickets.getSome, { onResult: function (r) { return r.length === 0; } })];
|
|
7104
|
-
case
|
|
7108
|
+
case 23:
|
|
7109
|
+
_a.sent();
|
|
7110
|
+
return [4 /*yield*/, async_test("enable setting, no tags, tickets search", function () { return sdkNonAdmin.api.tickets.getSome({ search: { query: ticketTitle } }); }, { onResult: function (r) { return r.length === 0; } })];
|
|
7111
|
+
case 24:
|
|
7105
7112
|
_a.sent();
|
|
7106
7113
|
return [4 /*yield*/, async_test("enable setting, matchEnduser ticket", function () { return sdkNonAdmin.api.tickets.getOne(matchTicket.id); }, handleAnyError)];
|
|
7107
|
-
case
|
|
7114
|
+
case 25:
|
|
7108
7115
|
_a.sent();
|
|
7109
7116
|
return [4 /*yield*/, async_test("enable setting, dontMatchEnduser ticket", function () { return sdkNonAdmin.api.tickets.getOne(dontMatchTicket.id); }, handleAnyError)];
|
|
7110
|
-
case
|
|
7117
|
+
case 26:
|
|
7111
7118
|
_a.sent();
|
|
7112
7119
|
return [4 /*yield*/, async_test("tickets filter enduser valid", function () { return sdkNonAdmin.api.tickets.getSome({ filter: { enduserId: matchEnduser.id } }); }, {
|
|
7113
7120
|
onResult: function (r) { return r.length === 0; }
|
|
7114
7121
|
})];
|
|
7115
|
-
case
|
|
7122
|
+
case 27:
|
|
7116
7123
|
_a.sent();
|
|
7117
7124
|
return [4 /*yield*/, async_test("tickets filter enduser invalid", function () { return sdkNonAdmin.api.tickets.getSome({ filter: { enduserId: dontMatchEnduser.id } }); }, {
|
|
7118
7125
|
onResult: function (r) { return r.length === 0; }
|
|
7119
7126
|
})
|
|
7120
7127
|
// disable setting, enable tags
|
|
7121
7128
|
];
|
|
7122
|
-
case
|
|
7129
|
+
case 28:
|
|
7123
7130
|
_a.sent();
|
|
7124
7131
|
// disable setting, enable tags
|
|
7125
7132
|
return [4 /*yield*/, sdk.api.users.updateOne(sdkNonAdmin.userInfo.id, { tags: [matchTag] }, { replaceObjectFields: true })];
|
|
7126
|
-
case
|
|
7133
|
+
case 29:
|
|
7127
7134
|
// disable setting, enable tags
|
|
7128
7135
|
_a.sent();
|
|
7129
7136
|
return [4 /*yield*/, sdk.api.organizations.updateOne(sdkNonAdmin.userInfo.businessId, {
|
|
7130
7137
|
settings: { endusers: { enableAccessTags: false } }
|
|
7131
7138
|
})];
|
|
7132
|
-
case
|
|
7139
|
+
case 30:
|
|
7133
7140
|
_a.sent();
|
|
7134
7141
|
return [4 /*yield*/, sdkNonAdmin.authenticate(nonAdminEmail, nonAdminPassword)]; // ensure enableAccessTags setting stored correctly on jwt
|
|
7135
|
-
case
|
|
7142
|
+
case 31:
|
|
7136
7143
|
_a.sent(); // ensure enableAccessTags setting stored correctly on jwt
|
|
7137
7144
|
return [4 /*yield*/, async_test("disable setting, enable tags", sdkNonAdmin.api.endusers.getSome, { onResult: function (r) { return r.length === 0; } })];
|
|
7138
|
-
case
|
|
7145
|
+
case 32:
|
|
7139
7146
|
_a.sent();
|
|
7140
7147
|
return [4 /*yield*/, async_test("disable setting, matchEnduser", function () { return sdkNonAdmin.api.endusers.getOne(matchEnduser.id); }, handleAnyError)];
|
|
7141
|
-
case
|
|
7148
|
+
case 33:
|
|
7142
7149
|
_a.sent();
|
|
7143
7150
|
return [4 /*yield*/, async_test("disable setting, dontMatchEnduser", function () { return sdkNonAdmin.api.endusers.getOne(dontMatchEnduser.id); }, handleAnyError)];
|
|
7144
|
-
case
|
|
7151
|
+
case 34:
|
|
7145
7152
|
_a.sent();
|
|
7146
7153
|
return [4 /*yield*/, async_test("disable setting, enable tags, tickets", sdkNonAdmin.api.tickets.getSome, { onResult: function (r) { return r.length === 0; } })];
|
|
7147
|
-
case
|
|
7154
|
+
case 35:
|
|
7155
|
+
_a.sent();
|
|
7156
|
+
return [4 /*yield*/, async_test("disable setting, no tags, tickets search", function () { return sdkNonAdmin.api.tickets.getSome({ search: { query: ticketTitle } }); }, { onResult: function (r) { return r.length === 0; } })];
|
|
7157
|
+
case 36:
|
|
7148
7158
|
_a.sent();
|
|
7149
7159
|
return [4 /*yield*/, async_test("disable setting, matchEnduser ticket", function () { return sdkNonAdmin.api.tickets.getOne(matchTicket.id); }, handleAnyError)];
|
|
7150
|
-
case
|
|
7160
|
+
case 37:
|
|
7151
7161
|
_a.sent();
|
|
7152
7162
|
return [4 /*yield*/, async_test("disable setting, dontMatchEnduser ticket", function () { return sdkNonAdmin.api.tickets.getOne(dontMatchTicket.id); }, handleAnyError)];
|
|
7153
|
-
case
|
|
7163
|
+
case 38:
|
|
7154
7164
|
_a.sent();
|
|
7155
7165
|
return [4 /*yield*/, async_test("tickets filter enduser valid", function () { return sdkNonAdmin.api.tickets.getSome({ filter: { enduserId: matchEnduser.id } }); }, {
|
|
7156
7166
|
onResult: function (r) { return r.length === 0; }
|
|
7157
7167
|
})];
|
|
7158
|
-
case
|
|
7168
|
+
case 39:
|
|
7159
7169
|
_a.sent();
|
|
7160
7170
|
return [4 /*yield*/, async_test("tickets filter enduser invalid", function () { return sdkNonAdmin.api.tickets.getSome({ filter: { enduserId: dontMatchEnduser.id } }); }, {
|
|
7161
7171
|
onResult: function (r) { return r.length === 0; }
|
|
7162
7172
|
})
|
|
7163
7173
|
// enabled setting AND tags (keeps tags enabled)
|
|
7164
7174
|
];
|
|
7165
|
-
case
|
|
7175
|
+
case 40:
|
|
7166
7176
|
_a.sent();
|
|
7167
7177
|
// enabled setting AND tags (keeps tags enabled)
|
|
7168
7178
|
return [4 /*yield*/, sdk.api.organizations.updateOne(sdkNonAdmin.userInfo.businessId, {
|
|
7169
7179
|
settings: { endusers: { enableAccessTags: true } }
|
|
7170
7180
|
})];
|
|
7171
|
-
case
|
|
7181
|
+
case 41:
|
|
7172
7182
|
// enabled setting AND tags (keeps tags enabled)
|
|
7173
7183
|
_a.sent();
|
|
7174
7184
|
return [4 /*yield*/, sdkNonAdmin.authenticate(nonAdminEmail, nonAdminPassword)]; // ensure enableAccessTags setting stored correctly on jwt
|
|
7175
|
-
case
|
|
7185
|
+
case 42:
|
|
7176
7186
|
_a.sent(); // ensure enableAccessTags setting stored correctly on jwt
|
|
7177
7187
|
return [4 /*yield*/, async_test("Access by tag with setting works", sdkNonAdmin.api.endusers.getSome, {
|
|
7178
7188
|
onResult: function (r) { return r.length === 2 && !r.find(function (e) { return e.id === dontMatchEnduser.id; }); }
|
|
7179
7189
|
})];
|
|
7180
|
-
case
|
|
7190
|
+
case 43:
|
|
7181
7191
|
_a.sent();
|
|
7182
7192
|
return [4 /*yield*/, async_test("access matchEnduser", function () { return sdkNonAdmin.api.endusers.getOne(matchEnduser.id); }, passOnAnyResult)];
|
|
7183
|
-
case
|
|
7193
|
+
case 44:
|
|
7184
7194
|
_a.sent();
|
|
7185
7195
|
return [4 /*yield*/, async_test("access dontMatchEnduser bad", function () { return sdkNonAdmin.api.endusers.getOne(dontMatchEnduser.id); }, handleAnyError)];
|
|
7186
|
-
case
|
|
7196
|
+
case 45:
|
|
7187
7197
|
_a.sent();
|
|
7188
|
-
return [4 /*yield*/, async_test("access setting,
|
|
7198
|
+
return [4 /*yield*/, async_test("access setting, tickets", sdkNonAdmin.api.tickets.getSome, {
|
|
7189
7199
|
onResult: function (r) { return r.length === 1 && !r.find(function (t) { return t.id === dontMatchTicket.id; }); }
|
|
7190
7200
|
})];
|
|
7191
|
-
case
|
|
7201
|
+
case 46:
|
|
7202
|
+
_a.sent();
|
|
7203
|
+
return [4 /*yield*/, async_test("access setting tickets search", function () { return sdkNonAdmin.api.tickets.getSome({ search: { query: ticketTitle } }); }, { onResult: function (r) { return r.length === 1; } })];
|
|
7204
|
+
case 47:
|
|
7192
7205
|
_a.sent();
|
|
7193
7206
|
return [4 /*yield*/, async_test("access, matchEnduser ticket", function () { return sdkNonAdmin.api.tickets.getOne(matchTicket.id); }, passOnAnyResult)];
|
|
7194
|
-
case
|
|
7207
|
+
case 48:
|
|
7195
7208
|
_a.sent();
|
|
7196
7209
|
return [4 /*yield*/, async_test("access, dontMatchEnduser ticket", function () { return sdkNonAdmin.api.tickets.getOne(dontMatchTicket.id); }, handleAnyError)];
|
|
7197
|
-
case
|
|
7210
|
+
case 49:
|
|
7198
7211
|
_a.sent();
|
|
7199
7212
|
return [4 /*yield*/, async_test("tickets filter enduser valid", function () { return sdkNonAdmin.api.tickets.getSome({ filter: { enduserId: matchEnduser.id } }); }, {
|
|
7200
7213
|
onResult: function (r) { return r.length === 1; }
|
|
7201
7214
|
})];
|
|
7202
|
-
case
|
|
7215
|
+
case 50:
|
|
7203
7216
|
_a.sent();
|
|
7204
7217
|
return [4 /*yield*/, async_test("tickets filter enduser invalid", function () { return sdkNonAdmin.api.tickets.getSome({ filter: { enduserId: dontMatchEnduser.id } }); }, {
|
|
7205
7218
|
onResult: function (r) { return r.length === 0; }
|
|
7206
7219
|
})];
|
|
7207
|
-
case
|
|
7220
|
+
case 51:
|
|
7208
7221
|
_a.sent();
|
|
7209
7222
|
return [4 /*yield*/, async_test("Non-admin can't update tags", function () { return sdkNonAdmin.api.users.updateOne(sdkNonAdmin.userInfo.id, { tags: ['new tag'] }); }, handleAnyError)];
|
|
7210
|
-
case
|
|
7223
|
+
case 52:
|
|
7211
7224
|
_a.sent();
|
|
7212
7225
|
return [4 /*yield*/, async_test("Non-admin can't update tags (with other updates)", function () { return sdkNonAdmin.api.users.updateOne(sdkNonAdmin.userInfo.id, { tags: ['new tag'], bio: '' }); }, handleAnyError)];
|
|
7213
|
-
case
|
|
7226
|
+
case 53:
|
|
7214
7227
|
_a.sent();
|
|
7215
7228
|
return [4 /*yield*/, async_test("Non-admin can update other fields", function () { return sdkNonAdmin.api.users.updateOne(sdkNonAdmin.userInfo.id, { bio: '' }); }, passOnAnyResult)
|
|
7216
7229
|
// cleanup
|
|
7217
7230
|
];
|
|
7218
|
-
case
|
|
7231
|
+
case 54:
|
|
7219
7232
|
_a.sent();
|
|
7220
7233
|
// cleanup
|
|
7221
7234
|
return [4 /*yield*/, sdk.api.organizations.updateOne(sdkNonAdmin.userInfo.businessId, {
|
|
7222
7235
|
settings: { endusers: { enableAccessTags: false } }
|
|
7223
7236
|
})];
|
|
7224
|
-
case
|
|
7237
|
+
case 55:
|
|
7225
7238
|
// cleanup
|
|
7226
7239
|
_a.sent();
|
|
7227
7240
|
return [4 /*yield*/, sdk.api.users.updateOne(sdkNonAdmin.userInfo.id, { tags: [] }, { replaceObjectFields: true })];
|
|
7228
|
-
case
|
|
7241
|
+
case 56:
|
|
7229
7242
|
_a.sent();
|
|
7230
7243
|
return [4 /*yield*/, sdkNonAdmin.refresh_session()];
|
|
7231
|
-
case
|
|
7244
|
+
case 57:
|
|
7232
7245
|
_a.sent();
|
|
7233
7246
|
return [4 /*yield*/, Promise.all([
|
|
7234
7247
|
sdk.api.endusers.deleteOne(matchEnduser.id),
|
|
7235
7248
|
sdk.api.endusers.deleteOne(matchMultiTagEnduser.id),
|
|
7236
7249
|
sdk.api.endusers.deleteOne(dontMatchEnduser.id),
|
|
7237
7250
|
])];
|
|
7238
|
-
case
|
|
7251
|
+
case 58:
|
|
7239
7252
|
_a.sent();
|
|
7240
7253
|
return [2 /*return*/];
|
|
7241
7254
|
}
|
|
@@ -7318,6 +7331,74 @@ var marketing_email_unsubscribe_tests = function () { return __awaiter(void 0, v
|
|
|
7318
7331
|
}
|
|
7319
7332
|
});
|
|
7320
7333
|
}); };
|
|
7334
|
+
export var form_conditional_logic_tests = function () { return __awaiter(void 0, void 0, void 0, function () {
|
|
7335
|
+
var responses, i, run_conditional_form_test;
|
|
7336
|
+
var _a, _b, _c;
|
|
7337
|
+
return __generator(this, function (_d) {
|
|
7338
|
+
log_header("Form Conditional Logic Tests");
|
|
7339
|
+
responses = [
|
|
7340
|
+
{
|
|
7341
|
+
fieldId: "0",
|
|
7342
|
+
answer: { type: 'string', value: 'hello' },
|
|
7343
|
+
fieldTitle: '',
|
|
7344
|
+
},
|
|
7345
|
+
{
|
|
7346
|
+
fieldId: "0list",
|
|
7347
|
+
answer: { type: 'multiple_choice', value: ['hello'] },
|
|
7348
|
+
fieldTitle: '',
|
|
7349
|
+
},
|
|
7350
|
+
{
|
|
7351
|
+
fieldId: "1",
|
|
7352
|
+
answer: { type: 'string', value: '' },
|
|
7353
|
+
fieldTitle: '',
|
|
7354
|
+
},
|
|
7355
|
+
{
|
|
7356
|
+
fieldId: "2",
|
|
7357
|
+
answer: { type: 'multiple_choice', value: [''] },
|
|
7358
|
+
fieldTitle: '',
|
|
7359
|
+
},
|
|
7360
|
+
{
|
|
7361
|
+
fieldId: "3",
|
|
7362
|
+
answer: { type: 'number', value: 73 },
|
|
7363
|
+
fieldTitle: '',
|
|
7364
|
+
computedValueKey: 'Height',
|
|
7365
|
+
},
|
|
7366
|
+
{
|
|
7367
|
+
fieldId: "4",
|
|
7368
|
+
answer: { type: 'number', value: 190 },
|
|
7369
|
+
fieldTitle: '',
|
|
7370
|
+
computedValueKey: 'Weight',
|
|
7371
|
+
},
|
|
7372
|
+
];
|
|
7373
|
+
i = 0;
|
|
7374
|
+
run_conditional_form_test = function (conditions, expected, title) {
|
|
7375
|
+
if (title === void 0) { title = "Test ".concat(++i); }
|
|
7376
|
+
assert(responses_satisfy_conditions(responses, conditions) === expected, "Failed condition:\n".concat(JSON.stringify(conditions, null, 2)), title);
|
|
7377
|
+
};
|
|
7378
|
+
run_conditional_form_test({ $and: [{ condition: { '0': { $contains: 'hel' } } }] }, true);
|
|
7379
|
+
run_conditional_form_test({ $and: [{ condition: { '0': { $contains: 'hello' } } }] }, true);
|
|
7380
|
+
run_conditional_form_test({ $and: [{ condition: { '0': { $contains: 'hllo' } } }] }, false);
|
|
7381
|
+
run_conditional_form_test({ $and: [{ condition: { '0list': { $contains: 'hel' } } }] }, true);
|
|
7382
|
+
run_conditional_form_test({ $and: [{ condition: { '0list': { $contains: 'hello' } } }] }, true);
|
|
7383
|
+
run_conditional_form_test({ $and: [{ condition: { '0list': { $contains: 'hllo' } } }] }, false);
|
|
7384
|
+
run_conditional_form_test({ $and: [{ condition: { '1': '' } }] }, true);
|
|
7385
|
+
run_conditional_form_test({ $and: [{ condition: { '1': { $exists: true } } }] }, false);
|
|
7386
|
+
run_conditional_form_test({ $and: [{ condition: { '1': { $exists: false } } }] }, true);
|
|
7387
|
+
run_conditional_form_test({ $and: [{ condition: { '2': '' } }] }, true);
|
|
7388
|
+
run_conditional_form_test({ $and: [{ condition: { '2': { $exists: true } } }] }, true);
|
|
7389
|
+
run_conditional_form_test({ $and: [{ condition: { '2': { $exists: false } } }] }, false);
|
|
7390
|
+
run_conditional_form_test({ $and: [{ condition: { '3': { $gt: 72 } } }] }, true);
|
|
7391
|
+
run_conditional_form_test({ $and: [{ condition: { '3': { $gt: 73 } } }] }, false);
|
|
7392
|
+
run_conditional_form_test({ $and: [{ condition: { '3': { $gt: 74 } } }] }, false);
|
|
7393
|
+
run_conditional_form_test({ $and: [{ condition: { '3': { $lt: 72 } } }] }, false);
|
|
7394
|
+
run_conditional_form_test({ $and: [{ condition: { '3': { $lt: 73 } } }] }, false);
|
|
7395
|
+
run_conditional_form_test({ $and: [{ condition: { '3': { $lt: 74 } } }] }, true);
|
|
7396
|
+
run_conditional_form_test({ $and: [{ condition: (_a = {}, _a[FORM_LOGIC_CALCULATED_FIELDS[0]] = { $exists: true }, _a) }] }, true);
|
|
7397
|
+
run_conditional_form_test({ $and: [{ condition: (_b = {}, _b[FORM_LOGIC_CALCULATED_FIELDS[0]] = { $gt: 25 }, _b) }] }, true);
|
|
7398
|
+
run_conditional_form_test({ $and: [{ condition: (_c = {}, _c[FORM_LOGIC_CALCULATED_FIELDS[0]] = { $lt: 25 }, _c) }] }, false);
|
|
7399
|
+
return [2 /*return*/];
|
|
7400
|
+
});
|
|
7401
|
+
}); };
|
|
7321
7402
|
(function () { return __awaiter(void 0, void 0, void 0, function () {
|
|
7322
7403
|
var err_1, n, _a, _b, _c, _i, returnValidation, t, _d, _e, _f, _g, err_2;
|
|
7323
7404
|
var _h, _j;
|
|
@@ -7331,6 +7412,7 @@ var marketing_email_unsubscribe_tests = function () { return __awaiter(void 0, v
|
|
|
7331
7412
|
_k.label = 2;
|
|
7332
7413
|
case 2:
|
|
7333
7414
|
_k.trys.push([2, 43, , 44]);
|
|
7415
|
+
form_conditional_logic_tests();
|
|
7334
7416
|
return [4 /*yield*/, test_weighted_round_robin()];
|
|
7335
7417
|
case 3:
|
|
7336
7418
|
_k.sent();
|
|
@@ -7367,13 +7449,13 @@ var marketing_email_unsubscribe_tests = function () { return __awaiter(void 0, v
|
|
|
7367
7449
|
return [4 /*yield*/, multi_tenant_tests()]; // should come right after setup tests
|
|
7368
7450
|
case 10:
|
|
7369
7451
|
_k.sent(); // should come right after setup tests
|
|
7370
|
-
return [4 /*yield*/,
|
|
7452
|
+
return [4 /*yield*/, enduser_access_tags_tests()];
|
|
7371
7453
|
case 11:
|
|
7372
7454
|
_k.sent();
|
|
7373
|
-
return [4 /*yield*/,
|
|
7455
|
+
return [4 /*yield*/, marketing_email_unsubscribe_tests()];
|
|
7374
7456
|
case 12:
|
|
7375
7457
|
_k.sent();
|
|
7376
|
-
return [4 /*yield*/,
|
|
7458
|
+
return [4 /*yield*/, unique_strings_tests()];
|
|
7377
7459
|
case 13:
|
|
7378
7460
|
_k.sent();
|
|
7379
7461
|
return [4 /*yield*/, self_serve_appointment_booking_tests()];
|