2632 lines
97 KiB
JavaScript

'use strict';
const AWS = require('aws-sdk');
const fse = require('fs-extra');
const fsp = require('fs').promises;
const _ = require('lodash');
const path = require('path');
const chai = require('chai');
const sinon = require('sinon');
const AwsProvider = require('../../../../../../../lib/plugins/aws/provider');
const AwsCompileFunctions = require('../../../../../../../lib/plugins/aws/package/compile/functions');
const Serverless = require('../../../../../../../lib/serverless');
const runServerless = require('../../../../../../utils/run-serverless');
const fixtures = require('../../../../../../fixtures/programmatic');
const getHashForFilePath = require('../../../../../../../lib/plugins/aws/package/lib/get-hash-for-file-path');
const { getTmpDirPath, createTmpFile } = require('../../../../../../utils/fs');
chai.use(require('chai-as-promised'));
chai.use(require('sinon-chai'));
const expect = chai.expect;
describe('AwsCompileFunctions', () => {
let serverless;
let awsProvider;
let awsCompileFunctions;
const functionName = 'test';
const compiledFunctionName = 'TestLambdaFunction';
beforeEach(() => {
const options = {
stage: 'dev',
region: 'us-east-1',
commands: [],
options: {},
};
serverless = new Serverless(options);
awsProvider = new AwsProvider(serverless, options);
serverless.setProvider('aws', awsProvider);
serverless.service.provider.name = 'aws';
serverless.cli = new serverless.classes.CLI();
awsCompileFunctions = new AwsCompileFunctions(serverless, options);
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate = {
Resources: {},
Outputs: {},
};
const serviceArtifact = 'new-service.zip';
const individualArtifact = 'test.zip';
awsCompileFunctions.packagePath = getTmpDirPath();
// The contents of the test artifacts need to be predictable so the hashes stay the same
serverless.utils.writeFileSync(
path.join(awsCompileFunctions.packagePath, serviceArtifact),
'foobar'
);
serverless.utils.writeFileSync(
path.join(awsCompileFunctions.packagePath, individualArtifact),
'barbaz'
);
awsCompileFunctions.serverless.service.service = 'new-service';
awsCompileFunctions.serverless.service.package.artifactDirectoryName = 'somedir';
awsCompileFunctions.serverless.service.package.artifact = path.join(
awsCompileFunctions.packagePath,
serviceArtifact
);
awsCompileFunctions.serverless.service.functions = {};
awsCompileFunctions.serverless.service.functions[functionName] = {
name: 'test',
package: {
artifact: path.join(awsCompileFunctions.packagePath, individualArtifact),
},
handler: 'handler.hello',
};
});
describe('#downloadPackageArtifacts()', () => {
let requestStub;
let testFilePath;
const s3BucketName = 'test-bucket';
const s3ArtifactName = 's3-hosted-artifact.zip';
beforeEach(() => {
testFilePath = createTmpFile('dummy-artifact');
requestStub = sinon.stub(AWS, 'S3').returns({
getObject: () => ({
createReadStream() {
return fse.createReadStream(testFilePath);
},
}),
});
});
afterEach(() => {
AWS.S3.restore();
});
it('should download the file and replace the artifact path for function packages', () => {
awsCompileFunctions.serverless.service.package.individually = true;
awsCompileFunctions.serverless.service.functions[
functionName
].package.artifact = `https://s3.amazonaws.com/${s3BucketName}/${s3ArtifactName}`;
return expect(awsCompileFunctions.downloadPackageArtifacts()).to.be.fulfilled.then(() => {
const artifactFileName = awsCompileFunctions.serverless.service.functions[
functionName
].package.artifact
.split(path.sep)
.pop();
expect(requestStub.callCount).to.equal(1);
expect(artifactFileName).to.equal(s3ArtifactName);
});
});
it('should download the file and replace the artifact path for service-wide packages', () => {
awsCompileFunctions.serverless.service.package.individually = false;
awsCompileFunctions.serverless.service.functions[functionName].package.artifact = false;
awsCompileFunctions.serverless.service.package.artifact = `https://s3.amazonaws.com/${s3BucketName}/${s3ArtifactName}`;
return expect(awsCompileFunctions.downloadPackageArtifacts()).to.be.fulfilled.then(() => {
const artifactFileName = awsCompileFunctions.serverless.service.package.artifact
.split(path.sep)
.pop();
expect(requestStub.callCount).to.equal(1);
expect(artifactFileName).to.equal(s3ArtifactName);
});
});
it('should not access AWS.S3 if URL is not an S3 URl', () => {
AWS.S3.restore();
const myRequestStub = sinon.stub(AWS, 'S3').returns({
getObject: () => {
throw new Error('should not be invoked');
},
});
awsCompileFunctions.serverless.service.functions[functionName].package.artifact =
'https://s33amazonaws.com/this/that';
return expect(awsCompileFunctions.downloadPackageArtifacts()).to.be.fulfilled.then(() => {
expect(myRequestStub.callCount).to.equal(1);
});
});
});
describe('#compileFunctions()', () => {
it('should use function artifact if individually', () => {
awsCompileFunctions.serverless.service.package.individually = true;
return expect(awsCompileFunctions.compileFunctions()).to.be.fulfilled.then(() => {
const functionResource =
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate.Resources[
compiledFunctionName
];
const s3Folder = awsCompileFunctions.serverless.service.package.artifactDirectoryName;
const s3FileName = awsCompileFunctions.serverless.service.functions[
functionName
].package.artifact
.split(path.sep)
.pop();
expect(functionResource.Properties.Code.S3Key).to.deep.equal(`${s3Folder}/${s3FileName}`);
});
});
it('should add an ARN function role', () => {
awsCompileFunctions.serverless.service.provider.name = 'aws';
awsCompileFunctions.serverless.service.functions = {
func: {
handler: 'func.function.handler',
name: 'new-service-dev-func',
role: 'arn:aws:xxx:*:*',
},
};
return expect(awsCompileFunctions.compileFunctions()).to.be.fulfilled.then(() => {
expect(
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate.Resources
.FuncLambdaFunction.DependsOn
).to.deep.equal(['FuncLogGroup']);
expect(
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate.Resources
.FuncLambdaFunction.Properties.Role
).to.deep.equal(awsCompileFunctions.serverless.service.functions.func.role);
});
});
it('should honour provider.iam.role option when set', async () => {
const { cfTemplate } = await runServerless({
fixture: 'function',
configExt: {
disabledDeprecations: ['PROVIDER_IAM_SETTINGS_V3'],
provider: {
role: 'role-a',
iam: { role: 'role-b' },
},
},
command: 'package',
});
expect(cfTemplate.Resources.BasicLambdaFunction.Properties.Role).to.eql({
'Fn::GetAtt': ['role-b', 'Arn'],
});
});
it('should add a logical role name function role', () => {
awsCompileFunctions.serverless.service.provider.name = 'aws';
awsCompileFunctions.serverless.service.functions = {
func: {
handler: 'func.function.handler',
name: 'new-service-dev-func',
role: 'LogicalRoleName',
},
};
return expect(awsCompileFunctions.compileFunctions()).to.be.fulfilled.then(() => {
expect(
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate.Resources
.FuncLambdaFunction.DependsOn
).to.deep.equal(['FuncLogGroup', 'LogicalRoleName']);
expect(
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate.Resources
.FuncLambdaFunction.Properties.Role
).to.deep.equal({
'Fn::GetAtt': [awsCompileFunctions.serverless.service.functions.func.role, 'Arn'],
});
});
});
it('should add a "Fn::GetAtt" Object function role', () => {
awsCompileFunctions.serverless.service.provider.name = 'aws';
awsCompileFunctions.serverless.service.functions = {
func: {
handler: 'func.function.handler',
name: 'new-service-dev-func',
role: {
'Fn::GetAtt': ['LogicalRoleName', 'Arn'],
},
},
};
return expect(awsCompileFunctions.compileFunctions()).to.be.fulfilled.then(() => {
expect(
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate.Resources
.FuncLambdaFunction.DependsOn
).to.deep.equal(['FuncLogGroup', 'LogicalRoleName']);
expect(
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate.Resources
.FuncLambdaFunction.Properties.Role
).to.deep.equal(awsCompileFunctions.serverless.service.functions.func.role);
});
});
it('should add a "Fn::ImportValue" Object function role', () => {
awsCompileFunctions.serverless.service.provider.name = 'aws';
awsCompileFunctions.serverless.service.functions = {
func: {
handler: 'func.function.handler',
name: 'new-service-dev-func',
role: {
'Fn::ImportValue': 'Foo',
},
},
};
return expect(awsCompileFunctions.compileFunctions()).to.be.fulfilled.then(() => {
expect(
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate.Resources
.FuncLambdaFunction.DependsOn
).to.deep.equal(['FuncLogGroup']);
expect(
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate.Resources
.FuncLambdaFunction.Properties.Role
).to.deep.equal(awsCompileFunctions.serverless.service.functions.func.role);
});
});
it('should add function declared roles', () => {
awsCompileFunctions.serverless.service.provider.name = 'aws';
awsCompileFunctions.serverless.service.functions = {
func0: {
handler: 'func.function.handler',
name: 'new-service-dev-func0',
role: 'arn:aws:xx0:*:*',
},
func1: {
handler: 'func.function.handler',
name: 'new-service-dev-func1',
role: 'arn:aws:xx1:*:*',
},
};
return expect(awsCompileFunctions.compileFunctions()).to.be.fulfilled.then(() => {
expect(
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate.Resources
.Func0LambdaFunction.DependsOn
).to.deep.equal(['Func0LogGroup']);
expect(
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate.Resources
.Func0LambdaFunction.Properties.Role
).to.deep.equal(awsCompileFunctions.serverless.service.functions.func0.role);
expect(
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate.Resources
.Func1LambdaFunction.DependsOn
).to.deep.equal(['Func1LogGroup']);
expect(
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate.Resources
.Func1LambdaFunction.Properties.Role
).to.deep.equal(awsCompileFunctions.serverless.service.functions.func1.role);
});
});
it('should create a simple function resource', () => {
const s3Folder = awsCompileFunctions.serverless.service.package.artifactDirectoryName;
const s3FileName = awsCompileFunctions.serverless.service.package.artifact
.split(path.sep)
.pop();
awsCompileFunctions.serverless.service.functions = {
func: {
handler: 'func.function.handler',
name: 'new-service-dev-func',
},
};
const compiledFunction = {
Type: 'AWS::Lambda::Function',
DependsOn: ['FuncLogGroup'],
Properties: {
Code: {
S3Key: `${s3Folder}/${s3FileName}`,
S3Bucket: { Ref: 'ServerlessDeploymentBucket' },
},
FunctionName: 'new-service-dev-func',
Handler: 'func.function.handler',
MemorySize: 1024,
Role: { 'Fn::GetAtt': ['IamRoleLambdaExecution', 'Arn'] },
Runtime: 'nodejs14.x',
Timeout: 6,
},
};
return expect(awsCompileFunctions.compileFunctions()).to.be.fulfilled.then(() => {
expect(
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate.Resources
.FuncLambdaFunction
).to.deep.equal(compiledFunction);
});
});
describe('when using onError config', () => {
let s3Folder;
let s3FileName;
beforeEach(() => {
s3Folder = awsCompileFunctions.serverless.service.package.artifactDirectoryName;
s3FileName = awsCompileFunctions.serverless.service.package.artifact.split(path.sep).pop();
});
describe('when IamRoleLambdaExecution is used', () => {
beforeEach(() => {
// pretend that the IamRoleLambdaExecution is used
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate.Resources.IamRoleLambdaExecution =
{
Properties: {
Policies: [
{
PolicyDocument: {
Statement: [],
},
},
],
},
};
});
it('should create necessary resources if a SNS arn is provided', () => {
awsCompileFunctions.serverless.service.functions = {
func: {
handler: 'func.function.handler',
name: 'new-service-dev-func',
onError: 'arn:aws:sns:region:accountid:foo',
},
};
const compiledFunction = {
Type: 'AWS::Lambda::Function',
DependsOn: ['FuncLogGroup'],
Properties: {
Code: {
S3Key: `${s3Folder}/${s3FileName}`,
S3Bucket: { Ref: 'ServerlessDeploymentBucket' },
},
FunctionName: 'new-service-dev-func',
Handler: 'func.function.handler',
MemorySize: 1024,
Role: { 'Fn::GetAtt': ['IamRoleLambdaExecution', 'Arn'] },
Runtime: 'nodejs14.x',
Timeout: 6,
DeadLetterConfig: {
TargetArn: 'arn:aws:sns:region:accountid:foo',
},
},
};
const compiledDlqStatement = {
Effect: 'Allow',
Action: ['sns:Publish'],
Resource: ['arn:aws:sns:region:accountid:foo'],
};
return expect(awsCompileFunctions.compileFunctions()).to.be.fulfilled.then(() => {
const compiledCfTemplate =
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate;
const functionResource = compiledCfTemplate.Resources.FuncLambdaFunction;
const dlqStatement =
compiledCfTemplate.Resources.IamRoleLambdaExecution.Properties.Policies[0]
.PolicyDocument.Statement[0];
expect(functionResource).to.deep.equal(compiledFunction);
expect(dlqStatement).to.deep.equal(compiledDlqStatement);
});
});
it('should create necessary resources if a Ref is provided', () => {
awsCompileFunctions.serverless.service.functions = {
func: {
handler: 'func.function.handler',
name: 'new-service-dev-func',
onError: {
Ref: 'DLQ',
},
},
};
const compiledFunction = {
Type: 'AWS::Lambda::Function',
DependsOn: ['FuncLogGroup'],
Properties: {
Code: {
S3Key: `${s3Folder}/${s3FileName}`,
S3Bucket: { Ref: 'ServerlessDeploymentBucket' },
},
FunctionName: 'new-service-dev-func',
Handler: 'func.function.handler',
MemorySize: 1024,
Role: { 'Fn::GetAtt': ['IamRoleLambdaExecution', 'Arn'] },
Runtime: 'nodejs14.x',
Timeout: 6,
DeadLetterConfig: {
TargetArn: {
Ref: 'DLQ',
},
},
},
};
return expect(awsCompileFunctions.compileFunctions()).to.be.fulfilled.then(() => {
const compiledCfTemplate =
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate;
const functionResource = compiledCfTemplate.Resources.FuncLambdaFunction;
expect(functionResource).to.deep.equal(compiledFunction);
});
});
it('should create necessary resources if a Fn::ImportValue is provided', () => {
awsCompileFunctions.serverless.service.functions = {
func: {
handler: 'func.function.handler',
name: 'new-service-dev-func',
onError: {
'Fn::ImportValue': 'DLQ',
},
},
};
const compiledFunction = {
Type: 'AWS::Lambda::Function',
DependsOn: ['FuncLogGroup'],
Properties: {
Code: {
S3Key: `${s3Folder}/${s3FileName}`,
S3Bucket: { Ref: 'ServerlessDeploymentBucket' },
},
FunctionName: 'new-service-dev-func',
Handler: 'func.function.handler',
MemorySize: 1024,
Role: { 'Fn::GetAtt': ['IamRoleLambdaExecution', 'Arn'] },
Runtime: 'nodejs14.x',
Timeout: 6,
DeadLetterConfig: {
TargetArn: {
'Fn::ImportValue': 'DLQ',
},
},
},
};
return expect(awsCompileFunctions.compileFunctions()).to.be.fulfilled.then(() => {
const compiledCfTemplate =
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate;
const functionResource = compiledCfTemplate.Resources.FuncLambdaFunction;
expect(functionResource).to.deep.equal(compiledFunction);
});
});
it('should create necessary resources if a Fn::GetAtt is provided', () => {
awsCompileFunctions.serverless.service.functions = {
func: {
handler: 'func.function.handler',
name: 'new-service-dev-func',
onError: {
'Fn::GetAtt': ['DLQ', 'Arn'],
},
},
};
const compiledFunction = {
Type: 'AWS::Lambda::Function',
DependsOn: ['FuncLogGroup'],
Properties: {
Code: {
S3Key: `${s3Folder}/${s3FileName}`,
S3Bucket: { Ref: 'ServerlessDeploymentBucket' },
},
FunctionName: 'new-service-dev-func',
Handler: 'func.function.handler',
MemorySize: 1024,
Role: { 'Fn::GetAtt': ['IamRoleLambdaExecution', 'Arn'] },
Runtime: 'nodejs14.x',
Timeout: 6,
DeadLetterConfig: {
TargetArn: {
'Fn::GetAtt': ['DLQ', 'Arn'],
},
},
},
};
return expect(awsCompileFunctions.compileFunctions()).to.be.fulfilled.then(() => {
const compiledCfTemplate =
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate;
const functionResource = compiledCfTemplate.Resources.FuncLambdaFunction;
expect(functionResource).to.deep.equal(compiledFunction);
});
});
});
describe('when IamRoleLambdaExecution is not used', () => {
it('should create necessary function resources if a SNS arn is provided', () => {
awsCompileFunctions.serverless.service.functions = {
func: {
handler: 'func.function.handler',
name: 'new-service-dev-func',
onError: 'arn:aws:sns:region:accountid:foo',
},
};
const compiledFunction = {
Type: 'AWS::Lambda::Function',
DependsOn: ['FuncLogGroup'],
Properties: {
Code: {
S3Key: `${s3Folder}/${s3FileName}`,
S3Bucket: { Ref: 'ServerlessDeploymentBucket' },
},
FunctionName: 'new-service-dev-func',
Handler: 'func.function.handler',
MemorySize: 1024,
Role: { 'Fn::GetAtt': ['IamRoleLambdaExecution', 'Arn'] },
Runtime: 'nodejs14.x',
Timeout: 6,
DeadLetterConfig: {
TargetArn: 'arn:aws:sns:region:accountid:foo',
},
},
};
return expect(awsCompileFunctions.compileFunctions()).to.be.fulfilled.then(() => {
const compiledCfTemplate =
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate;
const functionResource = compiledCfTemplate.Resources.FuncLambdaFunction;
expect(functionResource).to.deep.equal(compiledFunction);
});
});
});
});
describe('when using tracing config', () => {
let s3Folder;
let s3FileName;
beforeEach(() => {
s3Folder = awsCompileFunctions.serverless.service.package.artifactDirectoryName;
s3FileName = awsCompileFunctions.serverless.service.package.artifact.split(path.sep).pop();
});
describe('when IamRoleLambdaExecution is used', () => {
beforeEach(() => {
// pretend that the IamRoleLambdaExecution is used
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate.Resources.IamRoleLambdaExecution =
{
Properties: {
Policies: [
{
PolicyDocument: {
Statement: [],
},
},
],
},
};
});
it('should create necessary resources if a tracing config is provided', () => {
awsCompileFunctions.serverless.service.functions = {
func: {
handler: 'func.function.handler',
name: 'new-service-dev-func',
tracing: 'Active',
},
};
const compiledFunction = {
Type: 'AWS::Lambda::Function',
DependsOn: ['FuncLogGroup'],
Properties: {
Code: {
S3Key: `${s3Folder}/${s3FileName}`,
S3Bucket: { Ref: 'ServerlessDeploymentBucket' },
},
FunctionName: 'new-service-dev-func',
Handler: 'func.function.handler',
MemorySize: 1024,
Role: { 'Fn::GetAtt': ['IamRoleLambdaExecution', 'Arn'] },
Runtime: 'nodejs14.x',
Timeout: 6,
TracingConfig: {
Mode: 'Active',
},
},
};
const compiledXrayStatement = {
Effect: 'Allow',
Action: ['xray:PutTraceSegments', 'xray:PutTelemetryRecords'],
Resource: ['*'],
};
return expect(awsCompileFunctions.compileFunctions()).to.be.fulfilled.then(() => {
const compiledCfTemplate =
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate;
const functionResource = compiledCfTemplate.Resources.FuncLambdaFunction;
const xrayStatement =
compiledCfTemplate.Resources.IamRoleLambdaExecution.Properties.Policies[0]
.PolicyDocument.Statement[0];
expect(functionResource).to.deep.equal(compiledFunction);
expect(xrayStatement).to.deep.equal(compiledXrayStatement);
});
});
});
});
it('should create a function resource with function level environment config', () => {
const s3Folder = awsCompileFunctions.serverless.service.package.artifactDirectoryName;
const s3FileName = awsCompileFunctions.serverless.service.package.artifact
.split(path.sep)
.pop();
awsCompileFunctions.serverless.service.functions = {
func: {
handler: 'func.function.handler',
name: 'new-service-dev-func',
environment: {
test1: 'test1',
},
},
};
const compiledFunction = {
Type: 'AWS::Lambda::Function',
DependsOn: ['FuncLogGroup'],
Properties: {
Code: {
S3Key: `${s3Folder}/${s3FileName}`,
S3Bucket: { Ref: 'ServerlessDeploymentBucket' },
},
FunctionName: 'new-service-dev-func',
Handler: 'func.function.handler',
MemorySize: 1024,
Role: { 'Fn::GetAtt': ['IamRoleLambdaExecution', 'Arn'] },
Runtime: 'nodejs14.x',
Timeout: 6,
Environment: {
Variables: {
test1: 'test1',
},
},
},
};
return expect(awsCompileFunctions.compileFunctions()).to.be.fulfilled.then(() => {
expect(
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate.Resources
.FuncLambdaFunction
).to.deep.equal(compiledFunction);
});
});
it('should accept an environment variable with CF ref and functions', () => {
awsCompileFunctions.serverless.service.functions = {
func: {
handler: 'func.function.handler',
name: 'new-service-dev-func',
environment: {
counter: {
Ref: 'TestVariable',
},
list: {
'Fn::Join:': [', ', ['a', 'b', 'c']],
},
},
},
};
return expect(awsCompileFunctions.compileFunctions()).to.be.fulfilled.then(() => {
expect(
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate.Resources
.FuncLambdaFunction.Properties.Environment.Variables.counter
).to.eql({ Ref: 'TestVariable' });
});
});
it('should consider function based config when creating a function resource', () => {
const s3Folder = awsCompileFunctions.serverless.service.package.artifactDirectoryName;
const s3FileName = awsCompileFunctions.serverless.service.package.artifact
.split(path.sep)
.pop();
awsCompileFunctions.serverless.service.functions = {
func: {
name: 'customized-func-function',
handler: 'func.function.handler',
memorySize: 128,
timeout: 10,
},
};
const compiledFunction = {
Type: 'AWS::Lambda::Function',
DependsOn: ['FuncLogGroup'],
Properties: {
Code: {
S3Key: `${s3Folder}/${s3FileName}`,
S3Bucket: { Ref: 'ServerlessDeploymentBucket' },
},
FunctionName: 'customized-func-function',
Handler: 'func.function.handler',
MemorySize: 128,
Role: { 'Fn::GetAtt': ['IamRoleLambdaExecution', 'Arn'] },
Runtime: 'nodejs14.x',
Timeout: 10,
},
};
return expect(awsCompileFunctions.compileFunctions()).to.be.fulfilled.then(() => {
expect(
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate.Resources
.FuncLambdaFunction
).to.deep.equal(compiledFunction);
});
});
it('should include description if specified', () => {
awsCompileFunctions.serverless.service.functions = {
func: {
handler: 'func.function.handler',
description: 'Lambda function description',
},
};
return expect(awsCompileFunctions.compileFunctions()).to.be.fulfilled.then(() => {
expect(
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate.Resources
.FuncLambdaFunction.Properties.Description
).to.equal('Lambda function description');
});
});
it('should create corresponding function output and version objects', () => {
awsCompileFunctions.serverless.service.functions = {
func: {
handler: 'func.function.handler',
},
anotherFunc: {
handler: 'anotherFunc.function.handler',
},
};
return expect(awsCompileFunctions.compileFunctions()).to.be.fulfilled.then(() => {
expect(
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate.Outputs
.FuncLambdaFunctionQualifiedArn
).to.exist;
expect(
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate.Outputs
.AnotherFuncLambdaFunctionQualifiedArn
).to.exist;
});
});
it('should include description under version too if function is specified', () => {
const lambdaDescription = 'Lambda function description';
awsCompileFunctions.serverless.service.functions = {
func: {
handler: 'func.function.handler',
description: lambdaDescription,
},
};
return expect(awsCompileFunctions.compileFunctions()).to.be.fulfilled.then(() => {
let versionDescription;
for (const [key, value] of _.entries(
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate.Resources
)) {
if (key.startsWith('FuncLambdaVersion')) {
versionDescription = value.Properties.Description;
break;
}
}
return expect(versionDescription).to.equal(lambdaDescription);
});
});
it('should set function declared reserved concurrency limit', () => {
const s3Folder = awsCompileFunctions.serverless.service.package.artifactDirectoryName;
const s3FileName = awsCompileFunctions.serverless.service.package.artifact
.split(path.sep)
.pop();
awsCompileFunctions.serverless.service.functions = {
func: {
handler: 'func.function.handler',
name: 'new-service-dev-func',
reservedConcurrency: 5,
},
};
const compiledFunction = {
Type: 'AWS::Lambda::Function',
DependsOn: ['FuncLogGroup'],
Properties: {
Code: {
S3Key: `${s3Folder}/${s3FileName}`,
S3Bucket: { Ref: 'ServerlessDeploymentBucket' },
},
FunctionName: 'new-service-dev-func',
Handler: 'func.function.handler',
MemorySize: 1024,
ReservedConcurrentExecutions: 5,
Role: { 'Fn::GetAtt': ['IamRoleLambdaExecution', 'Arn'] },
Runtime: 'nodejs14.x',
Timeout: 6,
},
};
return expect(awsCompileFunctions.compileFunctions()).to.be.fulfilled.then(() => {
expect(
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate.Resources
.FuncLambdaFunction
).to.deep.equal(compiledFunction);
});
});
it('should set function declared provisioned concurrency limit', () => {
awsCompileFunctions.serverless.service.functions = {
func: {
handler: 'func.function.handler',
name: 'new-service-dev-func',
provisionedConcurrency: 5,
versionFunction: false,
},
};
return expect(awsCompileFunctions.compileFunctions()).to.be.fulfilled.then(() => {
expect(
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate.Resources
.FuncProvConcLambdaAlias.Properties.ProvisionedConcurrencyConfig
).to.deep.equal({ ProvisionedConcurrentExecutions: 5 });
});
});
it('should set function declared reserved concurrency limit even if it is zero', () => {
const s3Folder = awsCompileFunctions.serverless.service.package.artifactDirectoryName;
const s3FileName = awsCompileFunctions.serverless.service.package.artifact
.split(path.sep)
.pop();
awsCompileFunctions.serverless.service.functions = {
func: {
handler: 'func.function.handler',
name: 'new-service-dev-func',
reservedConcurrency: 0,
},
};
const compiledFunction = {
Type: 'AWS::Lambda::Function',
DependsOn: ['FuncLogGroup'],
Properties: {
Code: {
S3Key: `${s3Folder}/${s3FileName}`,
S3Bucket: { Ref: 'ServerlessDeploymentBucket' },
},
FunctionName: 'new-service-dev-func',
Handler: 'func.function.handler',
MemorySize: 1024,
ReservedConcurrentExecutions: 0,
Role: { 'Fn::GetAtt': ['IamRoleLambdaExecution', 'Arn'] },
Runtime: 'nodejs14.x',
Timeout: 6,
},
};
return expect(awsCompileFunctions.compileFunctions()).to.be.fulfilled.then(() => {
expect(
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate.Resources
.FuncLambdaFunction
).to.deep.equal(compiledFunction);
});
});
});
describe('#compileRole()', () => {
it('should not set unset properties when not specified in yml (layers, vpc, etc)', () => {
const s3Folder = awsCompileFunctions.serverless.service.package.artifactDirectoryName;
const s3FileName = awsCompileFunctions.serverless.service.package.artifact
.split(path.sep)
.pop();
awsCompileFunctions.serverless.service.functions = {
func: {
handler: 'func.function.handler',
name: 'new-service-dev-func',
},
};
const compiledFunction = {
Type: 'AWS::Lambda::Function',
DependsOn: ['FuncLogGroup'],
Properties: {
Code: {
S3Key: `${s3Folder}/${s3FileName}`,
S3Bucket: { Ref: 'ServerlessDeploymentBucket' },
},
FunctionName: 'new-service-dev-func',
Handler: 'func.function.handler',
MemorySize: 1024,
Role: { 'Fn::GetAtt': ['IamRoleLambdaExecution', 'Arn'] },
Runtime: 'nodejs14.x',
Timeout: 6,
},
};
return expect(awsCompileFunctions.compileFunctions()).to.be.fulfilled.then(() => {
expect(
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate.Resources
.FuncLambdaFunction
).to.deep.equal(compiledFunction);
});
});
it('should set Layers when specified', () => {
const s3Folder = awsCompileFunctions.serverless.service.package.artifactDirectoryName;
const s3FileName = awsCompileFunctions.serverless.service.package.artifact
.split(path.sep)
.pop();
awsCompileFunctions.serverless.service.functions = {
func: {
handler: 'func.function.handler',
name: 'new-service-dev-func',
layers: ['arn:aws:xxx:*:*'],
},
};
const compiledFunction = {
Type: 'AWS::Lambda::Function',
DependsOn: ['FuncLogGroup'],
Properties: {
Code: {
S3Key: `${s3Folder}/${s3FileName}`,
S3Bucket: { Ref: 'ServerlessDeploymentBucket' },
},
FunctionName: 'new-service-dev-func',
Handler: 'func.function.handler',
MemorySize: 1024,
Role: { 'Fn::GetAtt': ['IamRoleLambdaExecution', 'Arn'] },
Runtime: 'nodejs14.x',
Timeout: 6,
Layers: ['arn:aws:xxx:*:*'],
},
};
return expect(awsCompileFunctions.compileFunctions()).to.be.fulfilled.then(() => {
expect(
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate.Resources
.FuncLambdaFunction
).to.deep.equal(compiledFunction);
});
});
it('should set Condition when specified', () => {
awsCompileFunctions.serverless.service.functions = {
func: {
handler: 'func.function.handler',
name: 'new-service-dev-func',
condition: 'IsE2eTest',
},
};
return expect(awsCompileFunctions.compileFunctions()).to.be.fulfilled.then(() => {
expect(
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate.Resources
.FuncLambdaFunction.Condition
).to.equal('IsE2eTest');
});
});
it('should include DependsOn when specified', () => {
awsCompileFunctions.serverless.service.functions = {
func: {
handler: 'func.function.handler',
name: 'new-service-dev-func',
dependsOn: ['MyThing', 'MyOtherThing'],
},
};
return expect(awsCompileFunctions.compileFunctions()).to.be.fulfilled.then(() => {
expect(
awsCompileFunctions.serverless.service.provider.compiledCloudFormationTemplate.Resources
.FuncLambdaFunction.DependsOn
).to.deep.equal(['FuncLogGroup', 'MyThing', 'MyOtherThing']);
});
});
});
});
describe('lib/plugins/aws/package/compile/functions/index.test.js', () => {
describe('Provider properties', () => {
let cfResources;
let cfOutputs;
let naming;
let serviceConfig;
let iamRolePolicyStatements;
before(async () => {
const imageSha = '6bb600b4d6e1d7cf521097177dd0c4e9ea373edb91984a505333be8ac9455d38';
const imageWithSha = `000000000000.dkr.ecr.sa-east-1.amazonaws.com/test-lambda-docker@sha256:${imageSha}`;
const { awsNaming, cfTemplate, fixtureData } = await runServerless({
fixture: 'package-artifact',
command: 'package',
configExt: {
provider: {
kmsKeyArn: 'arn:aws:kms:region:accountid:pro/vider',
vpc: {
subnetIds: ['subnet-01010101'],
securityGroupIds: ['sg-0a0a0a0a'],
},
tags: {
'providerTagA': 'providerTagAValue',
'providerTagB': 'providerTagBValue',
'provider:tagC': 'providerTagCValue',
'provider:tag-D': 'providerTagDValue',
},
tracing: {
lambda: 'Active',
},
environment: {
providerEnvVarA: 'providerEnvVarAValue',
providerEnvVarB: 'providerEnvVarBValue',
sharedEnvVar: 'valueFromProvider',
providerCfIfEnvVar: { 'Fn::If': ['cond', 'first', 'second'] },
},
memorySize: 4096,
runtime: 'nodejs14.x',
deploymentBucket: 'com.serverless.deploys',
versionFunctions: false,
},
functions: {
fnImage: { image: imageWithSha },
foo: {
vpc: {
subnetIds: ['subnet-02020202', { 'Fn::If': ['cond', 'first', 'second'] }],
securityGroupIds: ['sg-1b1b1b1b', { 'Fn::If': ['cond', 'first', 'second'] }],
},
kmsKeyArn: 'arn:aws:kms:region:accountid:fun/ction',
tracing: 'PassThrough',
environment: {
funcEnvVarA: 'funcEnvVarAValue',
funcEnvVarB: 'funcEnvVarBValue',
sharedEnvVar: 'valueFromFunction',
},
memorySize: 2048,
runtime: 'nodejs12.x',
versionFunction: true,
},
fnFileSystemConfig: {
handler: 'index.handler',
fileSystemConfig: {
localMountPath: '/mnt/path',
arn: 'arn:aws:elasticfilesystem:us-east-1:111111111111:access-point/fsap-a1a1a1a1a1a1a1a1a',
},
},
vpcNullify: {
vpc: null,
handler: 'index.handler',
},
},
},
});
cfResources = cfTemplate.Resources;
cfOutputs = cfTemplate.Outputs;
naming = awsNaming;
serviceConfig = fixtureData.serviceConfig;
iamRolePolicyStatements =
cfResources.IamRoleLambdaExecution.Properties.Policies[0].PolicyDocument.Statement;
});
it('should support `package.artifact`', async () => {
const {
Code: { S3Key },
} = cfResources[naming.getLambdaLogicalId('foo')].Properties;
expect(S3Key.endsWith('artifact.zip')).to.be.true;
});
it('should prefer `functions[].package.artifact` over service.package.artifact', () => {
const {
Code: { S3Key },
} = cfResources[naming.getLambdaLogicalId('other')].Properties;
expect(S3Key.endsWith('artifact-function.zip')).to.be.true;
});
it('should support `provider.vpc`', () => {
const providerConfig = serviceConfig.provider;
const { VpcConfig } = cfResources[naming.getLambdaLogicalId('other')].Properties;
expect(VpcConfig.SecurityGroupIds).to.deep.equal(providerConfig.vpc.securityGroupIds);
expect(VpcConfig.SubnetIds).to.deep.equal(providerConfig.vpc.subnetIds);
});
it('should prefer `functions[].vpc` over `provider.vpc`', () => {
const fooFunctionConfig = serviceConfig.functions.foo;
const { VpcConfig } = cfResources[naming.getLambdaLogicalId('foo')].Properties;
expect(VpcConfig.SecurityGroupIds).to.deep.equal(fooFunctionConfig.vpc.securityGroupIds);
expect(VpcConfig.SubnetIds).to.deep.equal(fooFunctionConfig.vpc.subnetIds);
});
it('should allow `functions[].vpc` to specify no vpc', () => {
const Properties = cfResources[naming.getLambdaLogicalId('vpcNullify')].Properties;
expect(Properties.VpcConfig).to.be.undefined;
});
it('should support `provider.tags`', () => {
const providerConfig = serviceConfig.provider;
const expectedTags = Object.entries(providerConfig.tags).map(([Key, Value]) => ({
Key,
Value,
}));
const { Tags } = cfResources[naming.getLambdaLogicalId('other')].Properties;
expect(Tags).to.deep.include.members(expectedTags);
});
it('should support both `provider.tags and `function[].tags`', () => {
const providerConfig = serviceConfig.provider;
const fooFunctionConfig = serviceConfig.functions.foo;
const expectedTags = Object.entries({
...providerConfig.tags,
...fooFunctionConfig.tags,
}).map(([Key, Value]) => ({ Key, Value }));
const { Tags } = cfResources[naming.getLambdaLogicalId('other')].Properties;
expect(Tags).to.deep.include.members(expectedTags);
});
it('should support `provider.kmsKeyArn`', () => {
const { KmsKeyArn } = cfResources[naming.getLambdaLogicalId('other')].Properties;
expect(KmsKeyArn).to.equal(serviceConfig.provider.kmsKeyArn);
expect(iamRolePolicyStatements).to.deep.include({
Effect: 'Allow',
Action: ['kms:Decrypt'],
Resource: [serviceConfig.provider.kmsKeyArn],
});
});
it('should prefer `functions[].kmsKeyArn` over `provider.kmsKeyArn`', () => {
const fooFunctionConfig = serviceConfig.functions.foo;
const { KmsKeyArn } = cfResources[naming.getLambdaLogicalId('foo')].Properties;
expect(KmsKeyArn).to.equal(fooFunctionConfig.kmsKeyArn);
expect(iamRolePolicyStatements).to.deep.include({
Effect: 'Allow',
Action: ['kms:Decrypt'],
Resource: [fooFunctionConfig.kmsKeyArn],
});
});
it('should support `provider.tracing.lambda`', () => {
const providerConfig = serviceConfig.provider;
const { TracingConfig } = cfResources[naming.getLambdaLogicalId('other')].Properties;
expect(TracingConfig).to.deep.equal({ Mode: providerConfig.tracing.lambda });
expect(iamRolePolicyStatements).to.deep.include({
Effect: 'Allow',
Action: ['xray:PutTraceSegments', 'xray:PutTelemetryRecords'],
Resource: ['*'],
});
});
it('should prefer `functions[].tracing` over `provider.tracing.lambda`', () => {
const fooFunctionConfig = serviceConfig.functions.foo;
const { TracingConfig } = cfResources[naming.getLambdaLogicalId('foo')].Properties;
expect(TracingConfig).to.deep.equal({ Mode: fooFunctionConfig.tracing });
expect(iamRolePolicyStatements).to.deep.include({
Effect: 'Allow',
Action: ['xray:PutTraceSegments', 'xray:PutTelemetryRecords'],
Resource: ['*'],
});
});
it('should support `provider.environment`', () => {
const providerConfig = serviceConfig.provider;
const {
Environment: { Variables },
} = cfResources[naming.getLambdaLogicalId('other')].Properties;
expect(Variables).to.deep.equal(providerConfig.environment);
});
it('should prefer `functions[].environment` over `provider.environment`', () => {
const providerConfig = serviceConfig.provider;
const fooFunctionConfig = serviceConfig.functions.foo;
const {
Environment: { Variables },
} = cfResources[naming.getLambdaLogicalId('foo')].Properties;
const expectedVariables = {
...providerConfig.environment,
...fooFunctionConfig.environment,
};
expect(Variables).to.deep.equal(expectedVariables);
});
it('should support `provider.memorySize`', () => {
const providerConfig = serviceConfig.provider;
const { MemorySize } = cfResources[naming.getLambdaLogicalId('other')].Properties;
expect(MemorySize).to.equal(providerConfig.memorySize);
});
it('should prefer `functions[].memorySize` over `provider.memorySize`', () => {
const fooFunctionConfig = serviceConfig.functions.foo;
const { MemorySize } = cfResources[naming.getLambdaLogicalId('foo')].Properties;
expect(MemorySize).to.equal(fooFunctionConfig.memorySize);
});
it('should support `provider.runtime`', () => {
const providerConfig = serviceConfig.provider;
const { Runtime } = cfResources[naming.getLambdaLogicalId('other')].Properties;
expect(Runtime).to.equal(providerConfig.runtime);
});
it('should prefer `functions[].runtime` over `provider.runtime`', () => {
const fooFunctionConfig = serviceConfig.functions.foo;
const { Runtime } = cfResources[naming.getLambdaLogicalId('foo')].Properties;
expect(Runtime).to.equal(fooFunctionConfig.runtime);
});
it('should support `provider.versionFunctions: false`', () => {
expect(cfOutputs).to.not.have.property(naming.getLambdaVersionOutputLogicalId('other'));
});
it('should prefer `functions[].versionFunction` over `provider.versionFunctions`', () => {
expect(cfOutputs).to.have.property(naming.getLambdaVersionOutputLogicalId('foo'));
});
it('should support `provider.deploymentBucket`', () => {
const providerConfig = serviceConfig.provider;
const {
Code: { S3Bucket },
} = cfResources[naming.getLambdaLogicalId('foo')].Properties;
expect(S3Bucket).to.deep.equal(providerConfig.deploymentBucket);
});
it('should support `functions[].fileSystemConfig` with vpc configured on provider', () => {
const functionServiceConfig = serviceConfig.functions.fnFileSystemConfig;
const fileSystemCfConfig =
cfResources[naming.getLambdaLogicalId('fnFileSystemConfig')].Properties;
const { arn, localMountPath } = functionServiceConfig.fileSystemConfig;
expect(arn).to.match(/^arn/);
expect(localMountPath).to.be.a('string');
expect(fileSystemCfConfig.FileSystemConfigs).to.deep.equal([
{ Arn: arn, LocalMountPath: localMountPath },
]);
expect(iamRolePolicyStatements).to.deep.include({
Effect: 'Allow',
Action: ['elasticfilesystem:ClientMount', 'elasticfilesystem:ClientWrite'],
Resource: [arn],
});
});
it('should support `provider.architecture`', async () => {
const imageSha = '6bb600b4d6e1d7cf521097177dd0c4e9ea373edb91984a505333be8ac9455d38';
const imageWithSha = `000000000000.dkr.ecr.sa-east-1.amazonaws.com/test-lambda-docker@sha256:${imageSha}`;
const {
awsNaming: localNaming,
cfTemplate: { Resources: localResources },
} = await runServerless({
fixture: 'function',
command: 'package',
configExt: {
functions: { fnImage: { image: imageWithSha } },
provider: { architecture: 'arm64' },
},
});
expect(
localResources[localNaming.getLambdaLogicalId('basic')].Properties.Architectures
).to.deep.equal(['arm64']);
expect(
localResources[localNaming.getLambdaLogicalId('fnImage')].Properties.Architectures
).to.deep.equal(['arm64']);
expect(cfResources[naming.getLambdaLogicalId('fnImage')].Properties).to.not.have.property(
'Architectures'
);
expect(cfResources[naming.getLambdaLogicalId('foo')].Properties).to.not.have.property(
'Architectures'
);
});
it('should support `vpc` defined with `Fn::Split`', async () => {
const { awsNaming, cfTemplate, fixtureData } = await runServerless({
fixture: 'function',
command: 'package',
configExt: {
provider: {
vpc: {
subnetIds: {
'Fn::Split': [',', 'subnet-01010101,subnet-21212121'],
},
securityGroupIds: {
'Fn::Split': [',', 'sg-0a0a0a0a,sg-0b0b0b0b'],
},
},
},
},
});
const providerConfig = fixtureData.serviceConfig.provider;
const { VpcConfig } = cfTemplate.Resources[awsNaming.getLambdaLogicalId('basic')].Properties;
expect(VpcConfig.SecurityGroupIds).to.deep.equal(providerConfig.vpc.securityGroupIds);
expect(VpcConfig.SubnetIds).to.deep.equal(providerConfig.vpc.subnetIds);
});
describe('when custom IAM role is used', () => {
let customRoleServiceConfig;
let basicFunctionRole;
let otherFunctionRole;
before(async () => {
const { awsNaming, cfTemplate, fixtureData } = await runServerless({
fixture: 'function',
command: 'package',
configExt: {
provider: {
iam: {
role: 'arn:aws:iam::123456789012:role/fromProvider',
},
},
functions: {
basic: {
role: 'arn:aws:iam::123456789012:role/fromFunction',
},
},
},
});
basicFunctionRole =
cfTemplate.Resources[awsNaming.getLambdaLogicalId('basic')].Properties.Role;
otherFunctionRole =
cfTemplate.Resources[awsNaming.getLambdaLogicalId('other')].Properties.Role;
customRoleServiceConfig = fixtureData.serviceConfig;
});
it('should support `provider.iam.role` as arn string', async () => {
const providerConfig = customRoleServiceConfig.provider;
expect(otherFunctionRole).to.equal(providerConfig.iam.role);
});
it('should prefer `functions[].role` over `provider.iam.role`', () => {
const basicFunctionConfig = customRoleServiceConfig.functions.basic;
expect(basicFunctionRole).to.equal(basicFunctionConfig.role);
});
it('should support `provider.iam.role` defined as CF function', async () => {
const { awsNaming, cfTemplate, fixtureData } = await runServerless({
fixture: 'function',
command: 'package',
configExt: {
provider: {
iam: {
role: {
'Fn::Sub': 'arn:aws:iam::${AWS::AccountId}:role/fromFunction',
},
},
},
},
});
const functionRole =
cfTemplate.Resources[awsNaming.getLambdaLogicalId('basic')].Properties.Role;
expect(functionRole).to.deep.equal(fixtureData.serviceConfig.provider.iam.role);
});
});
});
describe('`provider.role` variants', () => {
it('should support resource name', async () => {
const { awsNaming, cfTemplate, fixtureData } = await runServerless({
fixture: 'function',
configExt: {
provider: {
iam: {
role: 'LogicalNameRole',
},
},
},
command: 'package',
});
const funcResource = cfTemplate.Resources[awsNaming.getLambdaLogicalId('basic')];
expect(funcResource.DependsOn).to.deep.equal(['BasicLogGroup', 'LogicalNameRole']);
expect(funcResource.Properties.Role).to.deep.equal({
'Fn::GetAtt': [fixtureData.serviceConfig.provider.iam.role, 'Arn'],
});
});
it('should support Fn::GetAtt function', async () => {
const { awsNaming, cfTemplate, fixtureData } = await runServerless({
fixture: 'function',
configExt: {
provider: {
iam: {
role: {
'Fn::GetAtt': ['LogicalNameRole', 'Arn'],
},
},
},
},
command: 'package',
});
const funcResource = cfTemplate.Resources[awsNaming.getLambdaLogicalId('basic')];
expect(funcResource.DependsOn).to.deep.equal(['BasicLogGroup', 'LogicalNameRole']);
expect(funcResource.Properties.Role).to.deep.equal(
fixtureData.serviceConfig.provider.iam.role
);
});
});
describe('`provider.lambdaHashingVersion` support', () => {
it('CodeSha256 for functions should be the same for default hashing and for 20200924 version', async () => {
const { servicePath: serviceDir, updateConfig } = await fixtures.setup('function', {
configExt: {
provider: {
versionFunctions: true,
},
},
});
const { cfTemplate: originalTemplate, awsNaming } = await runServerless({
cwd: serviceDir,
command: 'package',
});
const functionCfLogicalId = awsNaming.getLambdaLogicalId('basic');
const originalVersionCfConfig = Object.values(originalTemplate.Resources).find(
(resource) =>
resource.Type === 'AWS::Lambda::Version' &&
resource.Properties.FunctionName.Ref === functionCfLogicalId
).Properties;
await updateConfig({
disabledDeprecations: ['LAMBDA_HASHING_VERSION_PROPERTY'],
provider: {
lambdaHashingVersion: '20200924',
},
});
const { cfTemplate: updatedTemplate } = await runServerless({
cwd: serviceDir,
command: 'package',
});
const updatedVersionCfConfig = Object.values(updatedTemplate.Resources).find(
(resource) =>
resource.Type === 'AWS::Lambda::Version' &&
resource.Properties.FunctionName.Ref === functionCfLogicalId
).Properties;
expect(originalVersionCfConfig.CodeSha256).to.deep.equal(updatedVersionCfConfig.CodeSha256);
});
});
describe('Function properties', () => {
let cfResources;
let cfOutputs;
let naming;
let serverless;
let serviceConfig;
let iamRolePolicyStatements;
const imageSha = '6bb600b4d6e1d7cf521097177dd0c4e9ea373edb91984a505333be8ac9455d38';
const imageWithSha = `000000000000.dkr.ecr.sa-east-1.amazonaws.com/test-lambda-docker@sha256:${imageSha}`;
before(async () => {
const {
awsNaming,
cfTemplate,
serverless: serverlessInstance,
fixtureData,
} = await runServerless({
fixture: 'function',
command: 'package',
configExt: {
functions: {
target: {
handler: 'target.handler',
},
trigger: {
handler: 'trigger.handler',
destinations: { onSuccess: 'target' },
},
fnArch: {
handler: 'target.handler',
architecture: 'arm64',
},
fnTargetFailure: {
handler: 'target.handler',
},
fnDestinationsOnFailure: {
handler: 'trigger.handler',
destinations: { onFailure: 'fnTargetFailure' },
},
fnDestinationsArn: {
handler: 'trigger.handler',
destinations: { onSuccess: 'arn:aws:lambda:us-east-1:12313231:function:external' },
},
fnDestinationsRefSns: {
handler: 'trigger.handler',
destinations: {
onSuccess: { type: 'sns', arn: { Ref: 'SomeSNSArn' } },
},
},
fnDestinationsRefSqs: {
handler: 'trigger.handler',
destinations: {
onSuccess: { type: 'sqs', arn: { Ref: 'SomeSQSArn' } },
},
},
fnDestinationsRefEventBus: {
handler: 'trigger.handler',
destinations: {
onSuccess: { type: 'eventBus', arn: { Ref: 'SomeEventBusArn' } },
},
},
fnDestinationsRefFunction: {
handler: 'trigger.handler',
destinations: {
onSuccess: { type: 'function', arn: { Ref: 'SomeFunctionArn' } },
},
},
fnDestinationsRefOnFailure: {
handler: 'trigger.handler',
destinations: {
onFailure: { type: 'sns', arn: { Ref: 'SomeSNSArn' } },
},
},
fnDisabledLogs: { handler: 'trigger.handler', disableLogs: true },
fnMaximumEventAge: { handler: 'trigger.handler', maximumEventAge: 3600 },
fnMaximumRetryAttempts: { handler: 'trigger.handler', maximumRetryAttempts: 0 },
fnFileSystemConfig: {
handler: 'trigger.handler',
vpc: {
subnetIds: ['subnet-01010101'],
securityGroupIds: ['sg-0a0a0a0a'],
},
fileSystemConfig: {
localMountPath: '/mnt/path',
arn: 'arn:aws:elasticfilesystem:us-east-1:111111111111:access-point/fsap-a1a1a1a1a1a1a1a1a',
},
},
fnImage: {
image: imageWithSha,
},
fnImageArch: {
image: imageWithSha,
architecture: 'arm64',
},
fnImageWithConfig: {
image: {
uri: imageWithSha,
workingDirectory: './workdir',
entryPoint: ['executable', 'param1'],
command: ['anotherexecutable'],
},
},
fnExternalLayer: {
handler: 'target.handler',
layers: [{ Ref: 'ExternalLambdaLayer' }],
},
fnProvisioned: {
handler: 'trigger.handler',
maximumRetryAttempts: 0,
provisionedConcurrency: 1,
},
fnEphemeralStorage: {
handler: 'index.handler',
ephemeralStorageSize: 1024,
},
fnUrl: {
handler: 'target.handler',
url: true,
},
fnUrlWithAuthAndCors: {
handler: 'target.handler',
url: {
authorizer: 'aws_iam',
cors: {
maxAge: 3600,
},
},
},
fnUrlNullifyDefaultCorsValue: {
handler: 'target.handler',
url: {
authorizer: 'aws_iam',
cors: {
allowedHeaders: null,
},
},
},
fnUrlWithProvisioned: {
handler: 'target.handler',
url: true,
provisionedConcurrency: 1,
},
},
resources: {
Resources: {
ExternalLambdaLayer: {
Type: 'AWS::Lambda::LayerVersion',
Properties: {
CompatibleRuntimes: ['nodejs12.x'],
Content: {
S3Bucket: 'bucket',
S3Key: 'key',
},
LayerName: 'externalLayer',
},
},
},
},
},
});
cfResources = cfTemplate.Resources;
cfOutputs = cfTemplate.Outputs;
naming = awsNaming;
serverless = serverlessInstance;
serviceConfig = fixtureData.serviceConfig;
iamRolePolicyStatements =
cfResources.IamRoleLambdaExecution.Properties.Policies[0].PolicyDocument.Statement;
});
it.skip('TODO: should support `functions[].package.artifact`, referencing local file', () => {
// Replacement for
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L170-L188
});
it.skip('TODO: should generate expected function resource', () => {
// Replacement for
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L482-L516
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L2288-L2323
//
// With basic configuration confirm on generated function resource properties:
// Code, FunctionName, Handler, MemorySize, Role, Runtime, Timeout
// Confirm also that all optional properties are not set on resource
});
it.skip('TODO: should support `functions[].role`, expressed via arn', () => {
// Replacement for
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L283-L303
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L400-L434
});
it.skip('TODO: should support `functions[].role`, expressed via resource name', () => {
// Replacement for
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L305-L327
});
it.skip('TODO: should support `functions[].role`, expressed via Fn::GetAtt', () => {
// Replacement for
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L329-L351
});
it.skip('TODO: should support `functions[].role`, expressed via Fn::ImportValue', () => {
// Replacement for
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L353-L375
});
it.skip('TODO: should support `functions[].vpc`', () => {
// Replacement for
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L563-L605
});
it.skip('TODO: should support `function[].tags`', () => {
// Replacement for
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L653-L696
});
it.skip('TODO: should support `functions[].tracing`', () => {
// Replacement for
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L1457-L1504
//
// Confirm on TracingConfig property
// Confirm also on needed IAM policies
});
it.skip('TODO: should support `functions[].onError` as arn', () => {
// Replacement for
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L774-L821
//
// Confirm on Function `DeadLetterConfig` property and on IAM policy statement being added
});
it.skip('TODO: should support `functions[].onError` as Ref', () => {
// Replacement for
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L823-L863
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L951-L988
//
// Also rely on custom IAM role (simply to confirm that logic doesn't stumble)
});
it.skip('TODO: should support `functions[].onError` as Fn::ImportValue', () => {
// Replacement for
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L865-L905
});
it.skip('TODO: should support `functions[].onError` as Fn::GetAtt', () => {
// Replacement for
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L907-L948
});
it.skip('TODO: should support `functions[].kmsKeyArn` as Fn::GetAtt', () => {});
it.skip('TODO: should support `functions[].kmsKeyArn` as Ref', () => {});
it.skip('TODO: should support `functions[].kmsKeyArn` as Fn::ImportValue', () => {});
it.skip('TODO: should support `functions[].environment`', () => {
// Replacement for
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L1601-L1644
});
it.skip('TODO: should support `functions[].environment` as CF intrinsic function', () => {
// Replacement for
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L1760-L1782
});
it.skip('TODO: should support `functions[].name`', () => {
// Partial replacement for
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L1784-L1820
});
it.skip('TODO: should support `functions[].memorySize`', () => {
// Partial replacement for
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L1784-L1820
});
it.skip('TODO: should support `functions[].timeout`', () => {
// Partial replacement for
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L1784-L1820
});
it('should default to "nodejs14.x" runtime`', () => {
const funcResource = cfResources[naming.getLambdaLogicalId('target')];
expect(funcResource.Properties.Runtime).to.equal('nodejs14.x');
});
it.skip('TODO: should support `functions[].runtime`', () => {
// Partial replacement for
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L1784-L1820
});
it.skip('TODO: should support `functions[].description`', () => {
// Replacement for
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L1984-L1998
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L2059-L2080
//
// Ensure it's also at version resource
});
it.skip('TODO: should create lambda version resource and the output', () => {
// Replacement for
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L2000-L2020
});
it.skip('TODO: should support `functions[].versionFunction`', () => {
// Replacement for
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L2196-L2218
//
// Confirm that "functions[].versionFunction: true" makes function versioned if
// `provider.versionFunctions: false`
});
it.skip('TODO: should support `functions[].reservedConcurrency`', () => {
// Replacement for
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L2102-L2138
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L2158-L2194
//
// Confirm also that `0` is supported
});
it.skip('TODO: should support `functions[].provisionedConcurrency`', () => {
// Replacement for
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L2140-L2156
});
it.skip('TODO: should support `functions[].layers`', () => {
// Replacement for
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L2325-L2362
});
it('should support `Ref` references to external layers (not defined as a part of `layers` top-level property in configuration)', async () => {
expect(
cfResources[naming.getLambdaLogicalId('fnExternalLayer')].Properties.Layers
).to.deep.equal([{ Ref: 'ExternalLambdaLayer' }]);
});
it.skip('TODO: should support `functions[].conditions`', () => {
// Replacement for
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L2364-L2379
});
it.skip('TODO: should support `functions[].dependsOn`', () => {
// Replacement for
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L2381-L2397
});
it('should support `functions[].url` set to `true`', () => {
expect(cfResources[naming.getLambdaFunctionUrlLogicalId('fnUrl')].Properties).to.deep.equal({
AuthType: 'NONE',
TargetFunctionArn: {
'Fn::GetAtt': [naming.getLambdaLogicalId('fnUrl'), 'Arn'],
},
});
expect(cfOutputs[naming.getLambdaFunctionUrlLogicalId('fnUrl')].Value).to.deep.equal({
'Fn::GetAtt': [naming.getLambdaFunctionUrlOutputLogicalId('fnUrl'), 'FunctionUrl'],
});
expect(
cfResources[naming.getLambdaFnUrlPermissionLogicalId('fnUrl')].Properties
).to.deep.equal({
Action: 'lambda:InvokeFunctionUrl',
FunctionName: {
'Fn::GetAtt': ['FnUrlLambdaFunction', 'Arn'],
},
FunctionUrlAuthType: 'NONE',
Principal: '*',
});
});
it('should support `functions[].url` set to `true` with provisionedConcurrency set', () => {
expect(
cfResources[naming.getLambdaFunctionUrlLogicalId('fnUrlWithProvisioned')].Properties
).to.deep.equal({
AuthType: 'NONE',
TargetFunctionArn: {
'Fn::Join': [
':',
[
{
'Fn::GetAtt': ['FnUrlWithProvisionedLambdaFunction', 'Arn'],
},
'provisioned',
],
],
},
});
expect(
cfResources[naming.getLambdaFunctionUrlLogicalId('fnUrlWithProvisioned')].DependsOn
).to.equal('FnUrlWithProvisionedProvConcLambdaAlias');
expect(
cfResources[naming.getLambdaFnUrlPermissionLogicalId('fnUrl')].Properties
).to.deep.equal({
Action: 'lambda:InvokeFunctionUrl',
FunctionName: {
'Fn::GetAtt': ['FnUrlLambdaFunction', 'Arn'],
},
FunctionUrlAuthType: 'NONE',
Principal: '*',
});
expect(
cfResources[naming.getLambdaFnUrlPermissionLogicalId('fnUrlWithProvisioned')].DependsOn
).to.equal('FnUrlWithProvisionedProvConcLambdaAlias');
});
it('should support `functions[].url` set to an object with authorizer and cors', () => {
expect(
cfResources[naming.getLambdaFunctionUrlLogicalId('fnUrlWithAuthAndCors')].Properties
).to.deep.equal({
AuthType: 'AWS_IAM',
TargetFunctionArn: {
'Fn::GetAtt': [naming.getLambdaLogicalId('fnUrlWithAuthAndCors'), 'Arn'],
},
Cors: {
AllowMethods: ['*'],
AllowOrigins: ['*'],
AllowHeaders: [
'Content-Type',
'X-Amz-Date',
'Authorization',
'X-Api-Key',
'X-Amz-Security-Token',
],
MaxAge: 3600,
AllowCredentials: undefined,
ExposeHeaders: undefined,
},
});
expect(
cfOutputs[naming.getLambdaFunctionUrlLogicalId('fnUrlWithAuthAndCors')].Value
).to.deep.equal({
'Fn::GetAtt': [
naming.getLambdaFunctionUrlOutputLogicalId('fnUrlWithAuthAndCors'),
'FunctionUrl',
],
});
});
it('should support nullifying default cors value with `null` for `functions[].url`', () => {
expect(
cfResources[naming.getLambdaFunctionUrlLogicalId('fnUrlNullifyDefaultCorsValue')].Properties
).to.deep.equal({
AuthType: 'AWS_IAM',
TargetFunctionArn: {
'Fn::GetAtt': [naming.getLambdaLogicalId('fnUrlNullifyDefaultCorsValue'), 'Arn'],
},
Cors: {
AllowMethods: ['*'],
AllowOrigins: ['*'],
AllowHeaders: undefined,
MaxAge: undefined,
AllowCredentials: undefined,
ExposeHeaders: undefined,
},
});
expect(
cfOutputs[naming.getLambdaFunctionUrlLogicalId('fnUrlNullifyDefaultCorsValue')].Value
).to.deep.equal({
'Fn::GetAtt': [
naming.getLambdaFunctionUrlOutputLogicalId('fnUrlNullifyDefaultCorsValue'),
'FunctionUrl',
],
});
});
it('should support `functions[].architecture`', () => {
expect(
cfResources[naming.getLambdaLogicalId('fnArch')].Properties.Architectures
).to.deep.equal(['arm64']);
expect(
cfResources[naming.getLambdaLogicalId('fnImageArch')].Properties.Architectures
).to.deep.equal(['arm64']);
expect(cfResources[naming.getLambdaLogicalId('fnImage')].Properties).to.not.have.property(
'Architectures'
);
expect(cfResources[naming.getLambdaLogicalId('target')].Properties).to.not.have.property(
'Architectures'
);
});
it('should support `functions[].destinations.onSuccess` referencing function in same stack', () => {
const destinationConfig =
cfResources[naming.getLambdaEventConfigLogicalId('trigger')].Properties.DestinationConfig;
expect(destinationConfig).to.deep.equal({
OnSuccess: {
Destination: { 'Fn::GetAtt': [naming.getLambdaLogicalId('target'), 'Arn'] },
},
});
expect(destinationConfig).to.not.have.property('OnFailure');
expect(iamRolePolicyStatements).to.deep.include({
Effect: 'Allow',
Action: 'lambda:InvokeFunction',
Resource: {
'Fn::Sub': `arn:\${AWS::Partition}:lambda:\${AWS::Region}:\${AWS::AccountId}:function:${
serverless.service.getFunction('target').name
}`,
},
});
});
it('should support `functions[].destinations.onFailure` referencing function in same stack', () => {
const destinationConfig =
cfResources[naming.getLambdaEventConfigLogicalId('fnDestinationsOnFailure')].Properties
.DestinationConfig;
expect(destinationConfig).to.not.have.property('OnSuccess');
expect(destinationConfig).to.deep.equal({
OnFailure: {
Destination: { 'Fn::GetAtt': [naming.getLambdaLogicalId('fnTargetFailure'), 'Arn'] },
},
});
expect(iamRolePolicyStatements).to.deep.include({
Effect: 'Allow',
Action: 'lambda:InvokeFunction',
Resource: {
'Fn::Sub': `arn:\${AWS::Partition}:lambda:\${AWS::Region}:\${AWS::AccountId}:function:${
serverless.service.getFunction('fnTargetFailure').name
}`,
},
});
});
it('should support `functions[].destinations.onSuccess` referencing arn', () => {
const destinationConfig =
cfResources[naming.getLambdaEventConfigLogicalId('fnDestinationsArn')].Properties
.DestinationConfig;
const arn = serviceConfig.functions.fnDestinationsArn.destinations.onSuccess;
expect(arn).to.match(/^arn/);
expect(destinationConfig).to.deep.equal({
OnSuccess: { Destination: arn },
});
expect(iamRolePolicyStatements).to.deep.include({
Effect: 'Allow',
Action: 'lambda:InvokeFunction',
Resource: arn,
});
});
it('should support `functions[].destinations.onSuccess` as `Ref` for `sns`', () => {
const destinationConfig =
cfResources[naming.getLambdaEventConfigLogicalId('fnDestinationsRefSns')].Properties
.DestinationConfig;
const property = serviceConfig.functions.fnDestinationsRefSns.destinations.onSuccess;
expect(destinationConfig).to.deep.equal({
OnSuccess: { Destination: property.arn },
});
expect(iamRolePolicyStatements).to.deep.include({
Effect: 'Allow',
Action: 'sns:Publish',
Resource: property.arn,
});
});
it('should support `functions[].destinations.onSuccess` as `Ref` for `sqs`', () => {
const destinationConfig =
cfResources[naming.getLambdaEventConfigLogicalId('fnDestinationsRefSqs')].Properties
.DestinationConfig;
const property = serviceConfig.functions.fnDestinationsRefSqs.destinations.onSuccess;
expect(destinationConfig).to.deep.equal({
OnSuccess: { Destination: property.arn },
});
expect(iamRolePolicyStatements).to.deep.include({
Effect: 'Allow',
Action: 'sqs:SendMessage',
Resource: property.arn,
});
});
it('should support `functions[].destinations.onSuccess` as `Ref` for `eventBus`', () => {
const destinationConfig =
cfResources[naming.getLambdaEventConfigLogicalId('fnDestinationsRefEventBus')].Properties
.DestinationConfig;
const property = serviceConfig.functions.fnDestinationsRefEventBus.destinations.onSuccess;
expect(destinationConfig).to.deep.equal({
OnSuccess: { Destination: property.arn },
});
expect(iamRolePolicyStatements).to.deep.include({
Effect: 'Allow',
Action: 'events:PutEvents',
Resource: property.arn,
});
});
it('should support `functions[].destinations.onSuccess` as `Ref` for `function`', () => {
const destinationConfig =
cfResources[naming.getLambdaEventConfigLogicalId('fnDestinationsRefFunction')].Properties
.DestinationConfig;
const property = serviceConfig.functions.fnDestinationsRefFunction.destinations.onSuccess;
expect(destinationConfig).to.deep.equal({
OnSuccess: { Destination: property.arn },
});
expect(iamRolePolicyStatements).to.deep.include({
Effect: 'Allow',
Action: 'lambda:InvokeFunction',
Resource: property.arn,
});
});
it('should support `functions[].destinations.onFailure` as `Ref`', () => {
const destinationConfig =
cfResources[naming.getLambdaEventConfigLogicalId('fnDestinationsRefOnFailure')].Properties
.DestinationConfig;
const property = serviceConfig.functions.fnDestinationsRefOnFailure.destinations.onFailure;
expect(destinationConfig).to.deep.equal({
OnFailure: { Destination: property.arn },
});
expect(iamRolePolicyStatements).to.deep.include({
Effect: 'Allow',
Action: 'sns:Publish',
Resource: property.arn,
});
});
it('should support `functions[].disableLogs`', () => {
expect(cfResources[naming.getLambdaLogicalId('fnDisabledLogs')]).to.not.have.property(
'DependsOn'
);
});
it('should support `functions[].maximumEventAge`', () => {
const maximumEventAge = serviceConfig.functions.fnMaximumEventAge.maximumEventAge;
expect(maximumEventAge).to.be.a('number');
expect(
cfResources[naming.getLambdaEventConfigLogicalId('fnMaximumEventAge')].Properties
.MaximumEventAgeInSeconds
).to.equal(maximumEventAge);
});
it('should support `functions[].maximumRetryAttempts`', () => {
const maximumRetryAttempts =
serviceConfig.functions.fnMaximumRetryAttempts.maximumRetryAttempts;
expect(maximumRetryAttempts).to.be.a('number');
expect(
cfResources[naming.getLambdaEventConfigLogicalId('fnMaximumRetryAttempts')].Properties
.MaximumRetryAttempts
).to.equal(maximumRetryAttempts);
expect(cfResources[naming.getLambdaEventConfigLogicalId('fnProvisioned')].DependsOn).to.equal(
naming.getLambdaProvisionedConcurrencyAliasLogicalId('fnProvisioned')
);
});
it('should support `functions[].ephemeralStorageSize`', () => {
const ephemeralStorageSize = serviceConfig.functions.fnEphemeralStorage.ephemeralStorageSize;
expect(ephemeralStorageSize).to.be.a('number');
expect(
cfResources[naming.getLambdaLogicalId('fnEphemeralStorage')].Properties.EphemeralStorage
).to.deep.equal({ Size: ephemeralStorageSize });
});
it('should support `functions[].fileSystemConfig` (with vpc configured on function)', () => {
const functionServiceConfig = serviceConfig.functions.fnFileSystemConfig;
const fileSystemCfConfig =
cfResources[naming.getLambdaLogicalId('fnFileSystemConfig')].Properties;
const { arn, localMountPath } = functionServiceConfig.fileSystemConfig;
expect(arn).to.match(/^arn/);
expect(localMountPath).to.be.a('string');
expect(fileSystemCfConfig.FileSystemConfigs).to.deep.equal([
{ Arn: arn, LocalMountPath: localMountPath },
]);
expect(iamRolePolicyStatements).to.deep.include({
Effect: 'Allow',
Action: ['elasticfilesystem:ClientMount', 'elasticfilesystem:ClientWrite'],
Resource: [arn],
});
});
// This is just a happy-path test of images support. Due to sharing code from `provider.js`
// all further configurations are tested as a part of `test/unit/lib/plugins/aws/provider.test.js`
it('should support `functions[].image` with sha', () => {
const functionServiceConfig = serviceConfig.functions.fnImage;
const functionCfLogicalId = naming.getLambdaLogicalId('fnImage');
const functionCfConfig = cfResources[functionCfLogicalId].Properties;
expect(functionCfConfig.Code).to.deep.equal({ ImageUri: functionServiceConfig.image });
expect(functionCfConfig).to.not.have.property('Handler');
expect(functionCfConfig).to.not.have.property('Runtime');
const imageDigest = functionServiceConfig.image.slice(
functionServiceConfig.image.lastIndexOf('@') + 1
);
expect(imageDigest).to.match(/^sha256:[a-f0-9]{64}$/);
const imageDigestSha = imageDigest.slice('sha256:'.length);
const versionCfConfig = Object.values(cfResources).find(
(resource) =>
resource.Type === 'AWS::Lambda::Version' &&
resource.Properties.FunctionName.Ref === functionCfLogicalId
).Properties;
expect(versionCfConfig.CodeSha256).to.equal(imageDigestSha);
});
it('should support `functions[].image` with image config properties', () => {
const functionCfLogicalId = naming.getLambdaLogicalId('fnImageWithConfig');
const functionCfConfig = cfResources[functionCfLogicalId].Properties;
expect(functionCfConfig.ImageConfig).to.deep.equal({
Command: ['anotherexecutable'],
EntryPoint: ['executable', 'param1'],
WorkingDirectory: './workdir',
});
});
});
describe('Validation', () => {
it('should throw error when `functions[].fileSystemConfig` is configured with no vpc', () => {
return runServerless({
fixture: 'function',
configExt: {
functions: {
basic: {
fileSystemConfig: {
localMountPath: '/mnt/path',
arn: 'arn:aws:elasticfilesystem:us-east-1:111111111111:access-point/fsap-a1a1a1a1a1a1a1a1a',
},
},
},
},
command: 'package',
}).catch((error) => {
expect(error).to.have.property('code', 'LAMBDA_FILE_SYSTEM_CONFIG_MISSING_VPC');
});
});
});
describe('Version hash resolution', () => {
const testLambdaHashingVersion = (lambdaHashingVersion) => {
const configExt = lambdaHashingVersion
? {
provider: { lambdaHashingVersion },
disabledDeprecations: ['LAMBDA_HASHING_VERSION_PROPERTY'],
}
: {};
it('should create a different version if configuration changed', async () => {
const { servicePath: serviceDir, updateConfig } = await fixtures.setup('function', {
configExt,
});
const { cfTemplate: originalTemplate } = await runServerless({
cwd: serviceDir,
command: 'package',
});
const originalVersionArn =
originalTemplate.Outputs.BasicLambdaFunctionQualifiedArn.Value.Ref;
await updateConfig({
functions: {
basic: {
environment: {
MY_ENV_VAR: 'myvalue',
},
},
},
});
const { cfTemplate: updatedTemplate } = await runServerless({
cwd: serviceDir,
command: 'package',
});
const updatedVersionArn = updatedTemplate.Outputs.BasicLambdaFunctionQualifiedArn.Value.Ref;
expect(
updatedTemplate.Resources.BasicLambdaFunction.Properties.Environment.Variables.MY_ENV_VAR
).to.equal('myvalue');
expect(originalVersionArn).to.not.equal(updatedVersionArn);
});
it('should not create a different version if only function-wide configuration changed', async () => {
const { servicePath: serviceDir, updateConfig } = await fixtures.setup('function', {
configExt,
});
const { cfTemplate: originalTemplate } = await runServerless({
cwd: serviceDir,
command: 'package',
});
const originalVersionArn =
originalTemplate.Outputs.BasicLambdaFunctionQualifiedArn.Value.Ref;
await updateConfig({
functions: {
basic: {
tags: {
basic: 'bar',
},
reservedConcurrency: 1,
},
},
});
const { cfTemplate: updatedTemplate } = await runServerless({
cwd: serviceDir,
command: 'package',
});
const updatedVersionArn = updatedTemplate.Outputs.BasicLambdaFunctionQualifiedArn.Value.Ref;
expect(
updatedTemplate.Resources.BasicLambdaFunction.Properties.ReservedConcurrentExecutions
).to.equal(1);
expect(originalVersionArn).to.equal(updatedVersionArn);
});
describe('with layers', () => {
let firstCfTemplate;
let serviceDir;
let updateConfig;
const mockDescribeStackResponse = {
CloudFormation: {
describeStacks: { Stacks: [{ Outputs: [{ OutputKey: 'test' }] }] },
},
};
beforeEach(async () => {
const serviceData = await fixtures.setup('function-layers', { configExt });
({ servicePath: serviceDir, updateConfig } = serviceData);
const data = await runServerless({
cwd: serviceDir,
command: 'package',
awsRequestStubMap: mockDescribeStackResponse,
});
firstCfTemplate = data.cfTemplate;
});
it('should create different version ids for identical lambdas with and without layers', () => {
expect(
firstCfTemplate.Outputs.LayerFuncLambdaFunctionQualifiedArn.Value.Ref
).to.not.equal(firstCfTemplate.Outputs.NoLayerFuncLambdaFunctionQualifiedArn.Value.Ref);
});
it('should generate different lambda version id when lambda layer properties are different', async () => {
const firstVersionId =
firstCfTemplate.Outputs.LayerFuncLambdaFunctionQualifiedArn.Value.Ref;
await updateConfig({
layers: { testLayer: { path: 'test-layer', description: 'Different description' } },
});
const data = await runServerless({
cwd: serviceDir,
command: 'package',
awsRequestStubMap: mockDescribeStackResponse,
});
expect(firstVersionId).to.not.equal(
data.cfTemplate.Outputs.LayerFuncLambdaFunctionQualifiedArn.Value.Ref
);
});
it('should ignore changing character of S3Key paths when generating layer version id', async () => {
// the S3Key path is timestamped and so changes on every deployment regardless of layer changes, and should
// therefore not be included in the version id digest
const firstVersionId =
firstCfTemplate.Outputs.LayerFuncLambdaFunctionQualifiedArn.Value.Ref;
const firstS3Key =
firstCfTemplate.Resources.TestLayerLambdaLayer.Properties.Content.S3Key;
const data = await runServerless({
cwd: serviceDir,
command: 'package',
awsRequestStubMap: mockDescribeStackResponse,
});
expect(firstS3Key).to.not.equal(
data.cfTemplate.Resources.TestLayerLambdaLayer.Properties.Content.S3Key
);
expect(firstVersionId).to.equal(
data.cfTemplate.Outputs.LayerFuncLambdaFunctionQualifiedArn.Value.Ref
);
});
it('should ignore properties order when generating layer version id', async () => {
const firstVersionId =
firstCfTemplate.Outputs.LayerFuncLambdaFunctionQualifiedArn.Value.Ref;
await updateConfig({
functions: {
layerFunc: { layers: [{ Ref: 'TestLayerLambdaLayer' }], handler: 'index.handler' },
},
});
const data = await runServerless({
cwd: serviceDir,
command: 'package',
awsRequestStubMap: mockDescribeStackResponse,
});
expect(firstVersionId).to.equal(
data.cfTemplate.Outputs.LayerFuncLambdaFunctionQualifiedArn.Value.Ref
);
});
it('should create different lambda version id for different property keys (but no different values)', async () => {
const firstVersionId =
firstCfTemplate.Outputs.LayerFuncWithConfigLambdaFunctionQualifiedArn.Value.Ref;
await updateConfig({
functions: {
layerFuncWithConfig: { handler: 'index.handler', timeout: 128 },
},
});
const data = await runServerless({
cwd: serviceDir,
command: 'package',
awsRequestStubMap: mockDescribeStackResponse,
});
expect(firstVersionId).to.not.equal(
data.cfTemplate.Outputs.LayerFuncWithConfigLambdaFunctionQualifiedArn.Value.Ref
);
});
it('should create same version id when layer source and config are unchanged', async () => {
const firstVersionId =
firstCfTemplate.Outputs.LayerFuncLambdaFunctionQualifiedArn.Value.Ref;
const data = await runServerless({
cwd: serviceDir,
command: 'package',
awsRequestStubMap: mockDescribeStackResponse,
});
expect(firstVersionId).to.equal(
data.cfTemplate.Outputs.LayerFuncLambdaFunctionQualifiedArn.Value.Ref
);
});
it('should generate different lambda version id when lambda layer arns are different', async () => {
const firstVersionId =
firstCfTemplate.Outputs.ArnLayerFuncLambdaFunctionQualifiedArn.Value.Ref;
await updateConfig({
functions: {
arnLayerFunc: {
handler: 'index.handler',
layers: ['arn:aws:lambda:us-east-2:123456789012:layer:my-layer:2'],
},
},
});
const data = await runServerless({
cwd: serviceDir,
command: 'package',
awsRequestStubMap: mockDescribeStackResponse,
});
expect(firstVersionId).to.not.equal(
data.cfTemplate.Outputs.ArnLayerFuncLambdaFunctionQualifiedArn.Value.Ref
);
});
describe('when layer content is changed', () => {
let originalLayer;
let sourceChangeLayer;
let backupLayer;
beforeEach(async () => {
originalLayer = path.join(serviceDir, 'test-layer');
sourceChangeLayer = path.join(serviceDir, 'extra-layers', 'test-layer-source-change');
backupLayer = path.join(serviceDir, 'extra-layers', 'test-layer-backup');
await fsp.rename(originalLayer, backupLayer);
await fsp.rename(sourceChangeLayer, originalLayer);
getHashForFilePath.clear();
});
afterEach(async () => {
await fsp.rename(originalLayer, sourceChangeLayer);
await fsp.rename(backupLayer, originalLayer);
});
it('should create different lambda version id', async () => {
const firstVersionId =
firstCfTemplate.Outputs.LayerFuncLambdaFunctionQualifiedArn.Value.Ref;
const data = await runServerless({
cwd: serviceDir,
command: 'package',
awsRequestStubMap: mockDescribeStackResponse,
});
expect(firstVersionId).to.not.equal(
data.cfTemplate.Outputs.LayerFuncLambdaFunctionQualifiedArn.Value.Ref
);
});
});
});
};
describe('default hashing version', () => {
testLambdaHashingVersion();
});
describe('lambdaHashingVersion: 20200924', () => {
testLambdaHashingVersion('20200924');
});
describe('lambdaHashingVersion migration', () => {
it('should enforce new description configuration and version with `--enforce-hash-update` flag', async () => {
const { servicePath: serviceDir } = await fixtures.setup('function', {
configExt: {
disabledDeprecations: ['LAMBDA_HASHING_VERSION_V2'],
provider: {
lambdaHashingVersion: null,
},
},
});
const { cfTemplate: originalTemplate, awsNaming } = await runServerless({
cwd: serviceDir,
command: 'package',
});
const originalVersionArn =
originalTemplate.Outputs.BasicLambdaFunctionQualifiedArn.Value.Ref;
const { cfTemplate: updatedTemplate } = await runServerless({
cwd: serviceDir,
command: 'deploy',
lastLifecycleHookName: 'before:deploy:deploy',
options: {
'enforce-hash-update': true,
},
});
const updatedVersionArn = updatedTemplate.Outputs.BasicLambdaFunctionQualifiedArn.Value.Ref;
expect(originalVersionArn).not.to.equal(updatedVersionArn);
expect(
updatedTemplate.Resources[awsNaming.getLambdaLogicalId('basic')].Properties.Description
).to.equal('temporary-description-to-enforce-hash-update');
});
});
});
describe.skip('TODO: Download package artifact from S3 bucket', () => {
before(async () => {
await runServerless({
fixture: 'package-artifact',
command: 'deploy',
configExt: {
package: { artifact: 'some s3 url' },
functions: { basic: { package: { individually: true, artifact: 'other s3 url' } } },
},
});
});
it('should support `package.artifact`', () => {
// Replacement for:
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L118-L131
//
// Through `awsRequestStubMap` mock:
// 1. S3.getObject to return some string stream here:
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.js#L95-L98
// 2. S3.upload with a spy here:
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/deploy/lib/uploadArtifacts.js#L78
// On which we would confirm that
// - It's generated string that's being send
// - Corresponding url is configured in CF template
// Test with "deploy" command, and configure `lastLifecycleHookName` to 'aws:deploy:deploy:uploadArtifact'
// It'll demand stubbing few other AWS calls for that follow this stub:
// https://github.com/serverless/dashboard-plugin/blob/cdd53df45dfad18d8bdd79969194a61cb8178671/lib/deployment/parse.test.js#L1585-L1627
// Confirm same artifact is used for all functions
});
it('should support `functions[].package.artifact', () => {
// Replacement for
// https://github.com/serverless/serverless/blob/d8527d8b57e7e5f0b94ba704d9f53adb34298d99/lib/plugins/aws/package/compile/functions/index.test.js#L100-L116
//
// Same as above just confirm on individual function (and confirm it's the only function that gets that)
});
});
});