@@ -24,7 +24,6 @@ import { expect } from "chai";
24
24
import { clearParams , defineSecret } from "../../src/params" ;
25
25
26
26
import * as functions from "../../src/v1" ;
27
- import { ResetValue } from "../../src/common/options" ;
28
27
29
28
describe ( "FunctionBuilder" , ( ) => {
30
29
before ( ( ) => {
@@ -41,6 +40,7 @@ describe("FunctionBuilder", () => {
41
40
. auth . user ( )
42
41
. onCreate ( ( user ) => user ) ;
43
42
43
+ expect ( fn . __trigger . regions ) . to . deep . equal ( [ "us-east1" ] ) ;
44
44
expect ( fn . __endpoint . region ) . to . deep . equal ( [ "us-east1" ] ) ;
45
45
} ) ;
46
46
@@ -50,6 +50,7 @@ describe("FunctionBuilder", () => {
50
50
. auth . user ( )
51
51
. onCreate ( ( user ) => user ) ;
52
52
53
+ expect ( fn . __trigger . regions ) . to . deep . equal ( [ "us-east1" , "us-central1" ] ) ;
53
54
expect ( fn . __endpoint . region ) . to . deep . equal ( [ "us-east1" , "us-central1" ] ) ;
54
55
} ) ;
55
56
@@ -68,6 +69,17 @@ describe("FunctionBuilder", () => {
68
69
. auth . user ( )
69
70
. onCreate ( ( user ) => user ) ;
70
71
72
+ expect ( fn . __trigger . regions ) . to . deep . equal ( [
73
+ "us-central1" ,
74
+ "us-east1" ,
75
+ "us-east4" ,
76
+ "europe-west1" ,
77
+ "europe-west2" ,
78
+ "europe-west3" ,
79
+ "asia-east2" ,
80
+ "asia-northeast1" ,
81
+ ] ) ;
82
+
71
83
expect ( fn . __endpoint . region ) . to . deep . equal ( [
72
84
"us-central1" ,
73
85
"us-east1" ,
@@ -93,6 +105,8 @@ describe("FunctionBuilder", () => {
93
105
expect ( fn . __endpoint . availableMemoryMb ) . to . deep . equal ( 256 ) ;
94
106
expect ( fn . __endpoint . timeoutSeconds ) . to . deep . equal ( 90 ) ;
95
107
expect ( fn . __endpoint . eventTrigger . retry ) . to . deep . equal ( true ) ;
108
+ expect ( fn . __trigger . availableMemoryMb ) . to . deep . equal ( 256 ) ;
109
+ expect ( fn . __trigger . timeout ) . to . deep . equal ( "90s" ) ;
96
110
} ) ;
97
111
98
112
it ( "should allow SecretParams in the secrets array and convert them" , ( ) => {
@@ -104,6 +118,11 @@ describe("FunctionBuilder", () => {
104
118
. auth . user ( )
105
119
. onCreate ( ( user ) => user ) ;
106
120
121
+ expect ( fn . __trigger . secrets ) . to . deep . equal ( [
122
+ {
123
+ name : "API_KEY" ,
124
+ } ,
125
+ ] ) ;
107
126
expect ( fn . __endpoint . secretEnvironmentVariables ) . to . deep . equal ( [
108
127
{
109
128
key : "API_KEY" ,
@@ -136,6 +155,9 @@ describe("FunctionBuilder", () => {
136
155
. auth . user ( )
137
156
. onCreate ( ( user ) => user ) ;
138
157
158
+ expect ( fn . __trigger . regions ) . to . deep . equal ( [ "europe-west2" ] ) ;
159
+ expect ( fn . __trigger . availableMemoryMb ) . to . deep . equal ( 256 ) ;
160
+ expect ( fn . __trigger . timeout ) . to . deep . equal ( "90s" ) ;
139
161
expect ( fn . __endpoint . region ) . to . deep . equal ( [ "europe-west2" ] ) ;
140
162
expect ( fn . __endpoint . availableMemoryMb ) . to . deep . equal ( 256 ) ;
141
163
expect ( fn . __endpoint . timeoutSeconds ) . to . deep . equal ( 90 ) ;
@@ -151,6 +173,9 @@ describe("FunctionBuilder", () => {
151
173
. auth . user ( )
152
174
. onCreate ( ( user ) => user ) ;
153
175
176
+ expect ( fn . __trigger . regions ) . to . deep . equal ( [ "europe-west1" ] ) ;
177
+ expect ( fn . __trigger . availableMemoryMb ) . to . deep . equal ( 256 ) ;
178
+ expect ( fn . __trigger . timeout ) . to . deep . equal ( "90s" ) ;
154
179
expect ( fn . __endpoint . region ) . to . deep . equal ( [ "europe-west1" ] ) ;
155
180
expect ( fn . __endpoint . availableMemoryMb ) . to . deep . equal ( 256 ) ;
156
181
expect ( fn . __endpoint . timeoutSeconds ) . to . deep . equal ( 90 ) ;
@@ -223,6 +248,7 @@ describe("FunctionBuilder", () => {
223
248
. runWith ( { ingressSettings : "ALLOW_INTERNAL_ONLY" } )
224
249
. https . onRequest ( ( ) => undefined ) ;
225
250
251
+ expect ( fn . __trigger . ingressSettings ) . to . equal ( "ALLOW_INTERNAL_ONLY" ) ;
226
252
expect ( fn . __endpoint . ingressSettings ) . to . equal ( "ALLOW_INTERNAL_ONLY" ) ;
227
253
} ) ;
228
254
@@ -245,11 +271,8 @@ describe("FunctionBuilder", () => {
245
271
. auth . user ( )
246
272
. onCreate ( ( user ) => user ) ;
247
273
248
- if ( ! ( fn . __endpoint . vpc instanceof ResetValue ) ) {
249
- expect ( fn . __endpoint . vpc . connector ) . to . equal ( "test-connector" ) ;
250
- } else {
251
- expect . fail ( "__endpoint.vpc unexpectedly set to RESET_VALUE" ) ;
252
- }
274
+ expect ( fn . __trigger . vpcConnector ) . to . equal ( "test-connector" ) ;
275
+ expect ( fn . __endpoint . vpc ) . to . deep . equal ( { connector : "test-connector" } ) ;
253
276
} ) ;
254
277
255
278
it ( "should allow a vpcConnectorEgressSettings to be set" , ( ) => {
@@ -261,11 +284,11 @@ describe("FunctionBuilder", () => {
261
284
. auth . user ( )
262
285
. onCreate ( ( user ) => user ) ;
263
286
264
- if ( ! ( fn . __endpoint . vpc instanceof ResetValue ) ) {
265
- expect ( fn . __endpoint . vpc . egressSettings ) . to . equal ( "PRIVATE_RANGES_ONLY" ) ;
266
- } else {
267
- expect . fail ( "__endpoint.vpc unexpectedly set to RESET_VALUE" ) ;
268
- }
287
+ expect ( fn . __trigger . vpcConnectorEgressSettings ) . to . equal ( "PRIVATE_RANGES_ONLY" ) ;
288
+ expect ( fn . __endpoint . vpc ) . to . deep . equal ( {
289
+ connector : "test-connector" ,
290
+ egressSettings : "PRIVATE_RANGES_ONLY" ,
291
+ } ) ;
269
292
} ) ;
270
293
271
294
it ( "should throw an error if user chooses an invalid vpcConnectorEgressSettings" , ( ) => {
@@ -292,17 +315,22 @@ describe("FunctionBuilder", () => {
292
315
. onCreate ( ( user ) => user ) ;
293
316
294
317
expect ( fn . __endpoint . serviceAccountEmail ) . to . equal ( serviceAccount ) ;
318
+ expect ( fn . __trigger . serviceAccountEmail ) . to . equal ( serviceAccount ) ;
295
319
} ) ;
296
320
297
321
it ( "should allow a serviceAccount to be set with generated service account email" , ( ) => {
298
322
const serviceAccount = "test-service-account@" ;
323
+ const projectId = process . env . GCLOUD_PROJECT ;
299
324
const fn = functions
300
325
. runWith ( {
301
326
serviceAccount,
302
327
} )
303
328
. auth . user ( )
304
329
. onCreate ( ( user ) => user ) ;
305
330
331
+ expect ( fn . __trigger . serviceAccountEmail ) . to . equal (
332
+ `test-service-account@${ projectId } .iam.gserviceaccount.com`
333
+ ) ;
306
334
expect ( fn . __endpoint . serviceAccountEmail ) . to . equal ( `test-service-account@` ) ;
307
335
} ) ;
308
336
@@ -315,7 +343,8 @@ describe("FunctionBuilder", () => {
315
343
. auth . user ( )
316
344
. onCreate ( ( user ) => user ) ;
317
345
318
- expect ( fn . __endpoint . serviceAccountEmail ) . to . equal ( "default" ) ;
346
+ expect ( fn . __trigger . serviceAccountEmail ) . to . be . null ;
347
+ expect ( fn . __endpoint . serviceAccountEmail ) . to . equal ( serviceAccount ) ;
319
348
} ) ;
320
349
321
350
it ( "should throw an error if serviceAccount is set to an invalid value" , ( ) => {
@@ -337,6 +366,7 @@ describe("FunctionBuilder", () => {
337
366
. onCreate ( ( user ) => user ) ;
338
367
339
368
expect ( fn . __endpoint . availableMemoryMb ) . to . deep . equal ( 4096 ) ;
369
+ expect ( fn . __trigger . availableMemoryMb ) . to . deep . equal ( 4096 ) ;
340
370
} ) ;
341
371
342
372
it ( "should allow labels to be set" , ( ) => {
@@ -349,6 +379,9 @@ describe("FunctionBuilder", () => {
349
379
. auth . user ( )
350
380
. onCreate ( ( user ) => user ) ;
351
381
382
+ expect ( fn . __trigger . labels ) . to . deep . equal ( {
383
+ "valid-key" : "valid-value" ,
384
+ } ) ;
352
385
expect ( fn . __endpoint . labels ) . to . deep . equal ( {
353
386
"valid-key" : "valid-value" ,
354
387
} ) ;
@@ -504,22 +537,20 @@ describe("FunctionBuilder", () => {
504
537
. auth . user ( )
505
538
. onCreate ( ( user ) => user ) ;
506
539
507
- expect ( fn . __endpoint . secretEnvironmentVariables ) . to . deep . equal ( [
508
- {
509
- key : "API_KEY" ,
510
- } ,
511
- ] ) ;
540
+ expect ( fn . __trigger . secrets ) . to . deep . equal ( secrets ) ;
541
+ expect ( fn . __endpoint . secretEnvironmentVariables ) . to . deep . equal ( [ { key : secrets [ 0 ] } ] ) ;
512
542
} ) ;
513
543
514
544
it ( "should throw error given secrets expressed with full resource name" , ( ) => {
515
- const sp = defineSecret ( "projects/my-project/secrets/API_KEY" ) ;
516
-
517
545
expect ( ( ) =>
518
546
functions . runWith ( {
519
547
secrets : [ "projects/my-project/secrets/API_KEY" ] ,
520
548
} )
521
549
) . to . throw ( ) ;
550
+ } ) ;
522
551
552
+ it ( "should throw error given invalid secret config" , ( ) => {
553
+ const sp = defineSecret ( "projects/my-project/secrets/API_KEY" ) ;
523
554
expect ( ( ) =>
524
555
functions . runWith ( {
525
556
secrets : [ sp ] ,
0 commit comments