From intercom-pack
Configure CI/CD pipelines for Intercom integrations with GitHub Actions. Use when setting up automated testing, configuring CI with Intercom secrets, or integrating Intercom API tests into your build process. Trigger with phrases like "intercom CI", "intercom GitHub Actions", "intercom automated tests", "CI intercom", "intercom pipeline".
npx claudepluginhub flight505/skill-forge --plugin intercom-packThis skill is limited to using the following tools:
Set up CI/CD pipelines for Intercom integrations with GitHub Actions, including unit tests with mocked SDK, integration tests against a dev workspace, and secret management.
Guides Next.js Cache Components and Partial Prerendering (PPR): 'use cache' directives, cacheLife(), cacheTag(), revalidateTag() for caching, invalidation, static/dynamic optimization. Auto-activates on cacheComponents: true.
Guides building MCP servers enabling LLMs to interact with external services via tools. Covers best practices, TypeScript/Node (MCP SDK), Python (FastMCP).
Share bugs, ideas, or general feedback.
Set up CI/CD pipelines for Intercom integrations with GitHub Actions, including unit tests with mocked SDK, integration tests against a dev workspace, and secret management.
intercom-client installed# .github/workflows/intercom-ci.yml
name: Intercom Integration CI
on:
push:
branches: [main]
pull_request:
branches: [main]
jobs:
unit-tests:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: actions/setup-node@v4
with:
node-version: "20"
cache: "npm"
- run: npm ci
- run: npm run typecheck
- run: npm test -- --coverage
- uses: actions/upload-artifact@v4
with:
name: coverage
path: coverage/
integration-tests:
runs-on: ubuntu-latest
if: github.event_name == 'push' && github.ref == 'refs/heads/main'
env:
INTERCOM_ACCESS_TOKEN: ${{ secrets.INTERCOM_DEV_TOKEN }}
steps:
- uses: actions/checkout@v4
- uses: actions/setup-node@v4
with:
node-version: "20"
cache: "npm"
- run: npm ci
- name: Verify Intercom connectivity
run: |
STATUS=$(curl -s -o /dev/null -w "%{http_code}" \
-H "Authorization: Bearer $INTERCOM_ACCESS_TOKEN" \
https://api.intercom.io/me)
if [ "$STATUS" != "200" ]; then
echo "Intercom auth failed: $STATUS"
exit 1
fi
- name: Run integration tests
run: npm run test:integration
timeout-minutes: 5
# Store dev workspace token (never production!)
gh secret set INTERCOM_DEV_TOKEN --body "dG9rOmRldl90b2tlbl9oZXJl"
# If using webhooks in CI, store the signing secret
gh secret set INTERCOM_WEBHOOK_SECRET --body "your-webhook-secret"
# Verify secrets are set
gh secret list
// tests/unit/intercom-service.test.ts
import { describe, it, expect, vi, beforeEach } from "vitest";
import { IntercomError } from "intercom-client";
// Mock the entire module
vi.mock("intercom-client", () => ({
IntercomClient: vi.fn().mockImplementation(() => mockClient),
IntercomError: class extends Error {
statusCode: number;
constructor(message: string, statusCode: number) {
super(message);
this.statusCode = statusCode;
}
},
}));
const mockClient = {
contacts: {
create: vi.fn(),
find: vi.fn(),
search: vi.fn(),
list: vi.fn(),
},
conversations: {
create: vi.fn(),
reply: vi.fn(),
find: vi.fn(),
},
admins: {
list: vi.fn().mockResolvedValue({
admins: [{ id: "admin-1", name: "CI Admin" }],
}),
},
};
describe("Contact sync service", () => {
beforeEach(() => vi.clearAllMocks());
it("should create a contact with correct attributes", async () => {
mockClient.contacts.create.mockResolvedValue({
type: "contact",
id: "test-id",
role: "user",
email: "test@example.com",
});
const result = await mockClient.contacts.create({
role: "user",
email: "test@example.com",
externalId: "usr-1",
});
expect(result.id).toBe("test-id");
expect(mockClient.contacts.create).toHaveBeenCalledWith({
role: "user",
email: "test@example.com",
externalId: "usr-1",
});
});
it("should handle 409 conflict on duplicate contact", async () => {
mockClient.contacts.create.mockRejectedValue(
new IntercomError("A contact matching those details already exists", 409)
);
await expect(
mockClient.contacts.create({ role: "user", email: "dupe@example.com" })
).rejects.toThrow("already exists");
});
});
// tests/integration/contacts.integration.test.ts
import { describe, it, expect, afterAll } from "vitest";
import { IntercomClient } from "intercom-client";
const token = process.env.INTERCOM_ACCESS_TOKEN;
const client = token ? new IntercomClient({ token }) : null;
// Track created resources for cleanup
const createdContactIds: string[] = [];
afterAll(async () => {
if (!client) return;
for (const id of createdContactIds) {
try { await client.contacts.delete({ contactId: id }); } catch {}
}
});
describe.skipIf(!token)("Intercom API Integration", () => {
it("should authenticate and list admins", async () => {
const admins = await client!.admins.list();
expect(admins.admins.length).toBeGreaterThan(0);
});
it("should create and retrieve a contact", async () => {
const contact = await client!.contacts.create({
role: "lead",
name: `CI Test ${Date.now()}`,
});
createdContactIds.push(contact.id);
expect(contact.role).toBe("lead");
const found = await client!.contacts.find({ contactId: contact.id });
expect(found.id).toBe(contact.id);
});
it("should search contacts", async () => {
const results = await client!.contacts.search({
query: { field: "role", operator: "=", value: "user" },
pagination: { per_page: 5 },
});
expect(results.data).toBeDefined();
});
});
import { describe, it, expect } from "vitest";
import crypto from "crypto";
function verifySignature(payload: string, signature: string, secret: string): boolean {
const expected = "sha1=" + crypto
.createHmac("sha1", secret)
.update(payload)
.digest("hex");
return crypto.timingSafeEqual(Buffer.from(signature), Buffer.from(expected));
}
describe("Webhook signature verification", () => {
const secret = "test-webhook-secret";
const payload = '{"type":"notification_event","topic":"conversation.user.created"}';
it("should verify valid signature", () => {
const signature = "sha1=" + crypto.createHmac("sha1", secret).update(payload).digest("hex");
expect(verifySignature(payload, signature, secret)).toBe(true);
});
it("should reject invalid signature", () => {
expect(verifySignature(payload, "sha1=invalid", secret)).toBe(false);
});
});
| CI Issue | Cause | Solution |
|---|---|---|
INTERCOM_DEV_TOKEN not found | Secret not configured | gh secret set INTERCOM_DEV_TOKEN |
| Integration tests timeout | Rate limited or slow API | Increase timeout, add delays |
| 401 in CI | Token expired or rotated | Update secret with new token |
| Flaky tests | Shared dev workspace state | Use unique names, clean up after |
For deployment patterns, see intercom-deploy-integration.