wrangler 2.9.0 → 2.10.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +3 -3
- package/miniflare-dist/index.mjs +2 -15
- package/package.json +9 -9
- package/src/__tests__/configuration.test.ts +70 -0
- package/src/__tests__/d1/d1.test.ts +3 -6
- package/src/__tests__/d1/execute.test.ts +64 -0
- package/src/__tests__/d1/migrate.test.ts +107 -0
- package/src/__tests__/deployments.test.ts +40 -16
- package/src/__tests__/dev.test.tsx +3 -3
- package/src/__tests__/generate.test.ts +1 -1
- package/src/__tests__/helpers/end-event-loop.ts +6 -0
- package/src/__tests__/helpers/mock-get-pages-upload-token.ts +25 -0
- package/src/__tests__/helpers/mock-set-timeout.ts +16 -0
- package/src/__tests__/helpers/msw/handlers/deployments.ts +40 -16
- package/src/__tests__/helpers/string-dynamic-values-matcher.ts +28 -0
- package/src/__tests__/index.test.ts +3 -4
- package/src/__tests__/init.test.ts +1 -1
- package/src/__tests__/kv.test.ts +8 -8
- package/src/__tests__/middleware.test.ts +65 -0
- package/src/__tests__/mtls-certificates.test.ts +585 -0
- package/src/__tests__/pages/deployment-list.test.ts +78 -0
- package/src/__tests__/pages/functions-build.test.ts +402 -0
- package/src/__tests__/pages/pages.test.ts +81 -0
- package/src/__tests__/pages/project-create.test.ts +63 -0
- package/src/__tests__/pages/project-list.test.ts +108 -0
- package/src/__tests__/pages/project-upload.test.ts +481 -0
- package/src/__tests__/pages/publish.test.ts +2745 -0
- package/src/__tests__/publish.test.ts +58 -27
- package/src/__tests__/queues.test.ts +2 -2
- package/src/__tests__/secret.test.ts +4 -4
- package/src/__tests__/tsconfig.tsbuildinfo +1 -1
- package/src/__tests__/user.test.ts +1 -1
- package/src/__tests__/whoami.test.tsx +1 -1
- package/src/__tests__/worker-namespace.test.ts +1 -1
- package/src/api/index.ts +8 -0
- package/src/api/mtls-certificate.ts +148 -0
- package/src/api/pages/create-worker-bundle-contents.ts +75 -0
- package/src/api/pages/publish.tsx +52 -8
- package/src/bundle.ts +6 -5
- package/src/config/config.ts +7 -7
- package/src/config/environment.ts +9 -2
- package/src/config/index.ts +13 -0
- package/src/config/validation.ts +50 -3
- package/src/create-worker-upload-form.ts +9 -0
- package/src/d1/execute.tsx +124 -91
- package/src/d1/migrations/apply.tsx +36 -29
- package/src/d1/migrations/create.tsx +10 -8
- package/src/d1/migrations/helpers.ts +63 -38
- package/src/d1/migrations/list.tsx +31 -20
- package/src/d1/migrations/options.ts +6 -1
- package/src/d1/types.ts +1 -0
- package/src/d1/utils.ts +2 -1
- package/src/deployments.ts +62 -39
- package/src/dev/dev.tsx +1 -15
- package/src/dev/remote.tsx +2 -2
- package/src/dev.tsx +9 -6
- package/src/generate/index.ts +1 -1
- package/src/index.ts +15 -5
- package/src/miniflare-cli/assets.ts +1 -1
- package/src/miniflare-cli/tsconfig.tsbuildinfo +1 -1
- package/src/mtls-certificate/cli.ts +155 -0
- package/src/pages/build.ts +103 -23
- package/src/pages/buildFunctions.ts +32 -31
- package/src/pages/dev.ts +4 -2
- package/src/pages/functions/tsconfig.tsbuildinfo +1 -1
- package/src/pages/publish.tsx +12 -1
- package/src/pages/utils.ts +1 -1
- package/src/publish/publish.ts +3 -2
- package/src/secret/index.ts +1 -0
- package/src/sites.ts +1 -1
- package/src/tail/filters.ts +1 -1
- package/src/user/user.ts +4 -3
- package/src/worker.ts +6 -0
- package/templates/format-dev-errors.ts +1 -0
- package/templates/new-worker.ts +3 -0
- package/templates/serve-static-assets.ts +1 -0
- package/templates/service-bindings-module-facade.js +1 -0
- package/templates/tsconfig.init.json +1 -1
- package/templates/tsconfig.tsbuildinfo +1 -1
- package/wrangler-dist/cli.d.ts +82 -2
- package/wrangler-dist/cli.js +1726 -1616
- package/src/__tests__/pages.test.ts +0 -2905
|
@@ -0,0 +1,585 @@
|
|
|
1
|
+
import { writeFileSync } from "fs";
|
|
2
|
+
import { rest } from "msw";
|
|
3
|
+
import {
|
|
4
|
+
uploadMTlsCertificateFromFs,
|
|
5
|
+
uploadMTlsCertificate,
|
|
6
|
+
listMTlsCertificates,
|
|
7
|
+
deleteMTlsCertificate,
|
|
8
|
+
getMTlsCertificate,
|
|
9
|
+
getMTlsCertificateByName,
|
|
10
|
+
} from "../api";
|
|
11
|
+
import { mockAccountId, mockApiToken } from "./helpers/mock-account-id";
|
|
12
|
+
import { mockConsoleMethods } from "./helpers/mock-console";
|
|
13
|
+
import { mockConfirm } from "./helpers/mock-dialogs";
|
|
14
|
+
import { useMockIsTTY } from "./helpers/mock-istty";
|
|
15
|
+
import { msw } from "./helpers/msw";
|
|
16
|
+
import { runInTempDir } from "./helpers/run-in-tmp";
|
|
17
|
+
import { runWrangler } from "./helpers/run-wrangler";
|
|
18
|
+
import type { MTlsCertificateResponse } from "../api/mtls-certificate";
|
|
19
|
+
|
|
20
|
+
describe("wrangler", () => {
|
|
21
|
+
const accountId = "1a2b3c4d";
|
|
22
|
+
mockAccountId();
|
|
23
|
+
mockApiToken();
|
|
24
|
+
runInTempDir();
|
|
25
|
+
const { setIsTTY } = useMockIsTTY();
|
|
26
|
+
const std = mockConsoleMethods();
|
|
27
|
+
|
|
28
|
+
beforeEach(() => {
|
|
29
|
+
setIsTTY(true);
|
|
30
|
+
});
|
|
31
|
+
|
|
32
|
+
function mockPostMTlsCertificate(
|
|
33
|
+
resp: Partial<MTlsCertificateResponse> = {}
|
|
34
|
+
) {
|
|
35
|
+
const config = { calls: 0 };
|
|
36
|
+
msw.use(
|
|
37
|
+
rest.post(
|
|
38
|
+
"*/accounts/:accountId/mtls_certificates",
|
|
39
|
+
async (request, response, context) => {
|
|
40
|
+
config.calls++;
|
|
41
|
+
|
|
42
|
+
const body = await request.json();
|
|
43
|
+
return response.once(
|
|
44
|
+
context.json({
|
|
45
|
+
success: true,
|
|
46
|
+
errors: [],
|
|
47
|
+
messages: [],
|
|
48
|
+
result: {
|
|
49
|
+
id: "1234",
|
|
50
|
+
name: body.name,
|
|
51
|
+
certificates: body.certificates,
|
|
52
|
+
issuer: "example.com...",
|
|
53
|
+
uploaded_on: now.toISOString(),
|
|
54
|
+
expires_on: oneYearLater.toISOString(),
|
|
55
|
+
...resp,
|
|
56
|
+
},
|
|
57
|
+
})
|
|
58
|
+
);
|
|
59
|
+
}
|
|
60
|
+
)
|
|
61
|
+
);
|
|
62
|
+
return config;
|
|
63
|
+
}
|
|
64
|
+
|
|
65
|
+
function mockGetMTlsCertificates(
|
|
66
|
+
certs: Partial<MTlsCertificateResponse>[] | undefined = undefined
|
|
67
|
+
) {
|
|
68
|
+
const config = { calls: 0 };
|
|
69
|
+
msw.use(
|
|
70
|
+
rest.get(
|
|
71
|
+
"*/accounts/:accountId/mtls_certificates",
|
|
72
|
+
async (request, response, context) => {
|
|
73
|
+
config.calls++;
|
|
74
|
+
|
|
75
|
+
return response.once(
|
|
76
|
+
context.json({
|
|
77
|
+
success: true,
|
|
78
|
+
errors: [],
|
|
79
|
+
messages: [],
|
|
80
|
+
result:
|
|
81
|
+
typeof certs === "undefined"
|
|
82
|
+
? [
|
|
83
|
+
{
|
|
84
|
+
id: "1234",
|
|
85
|
+
name: "cert one",
|
|
86
|
+
certificates: "BEGIN CERTIFICATE...",
|
|
87
|
+
issuer: "example.com...",
|
|
88
|
+
uploaded_on: now.toISOString(),
|
|
89
|
+
expires_on: oneYearLater.toISOString(),
|
|
90
|
+
},
|
|
91
|
+
{
|
|
92
|
+
id: "5678",
|
|
93
|
+
name: "cert two",
|
|
94
|
+
certificates: "BEGIN CERTIFICATE...",
|
|
95
|
+
issuer: "example.com...",
|
|
96
|
+
uploaded_on: now.toISOString(),
|
|
97
|
+
expires_on: oneYearLater.toISOString(),
|
|
98
|
+
},
|
|
99
|
+
]
|
|
100
|
+
: certs,
|
|
101
|
+
})
|
|
102
|
+
);
|
|
103
|
+
}
|
|
104
|
+
)
|
|
105
|
+
);
|
|
106
|
+
return config;
|
|
107
|
+
}
|
|
108
|
+
|
|
109
|
+
function mockGetMTlsCertificate(resp: Partial<MTlsCertificateResponse> = {}) {
|
|
110
|
+
const config = { calls: 0 };
|
|
111
|
+
msw.use(
|
|
112
|
+
rest.get(
|
|
113
|
+
"*/accounts/:accountId/mtls_certificates/:certId",
|
|
114
|
+
async (request, response, context) => {
|
|
115
|
+
config.calls++;
|
|
116
|
+
|
|
117
|
+
return response.once(
|
|
118
|
+
context.json({
|
|
119
|
+
success: true,
|
|
120
|
+
errors: [],
|
|
121
|
+
messages: [],
|
|
122
|
+
result: {
|
|
123
|
+
id: "1234",
|
|
124
|
+
certificates: "BEGIN CERTIFICATE...",
|
|
125
|
+
issuer: "example.com...",
|
|
126
|
+
uploaded_on: now.toISOString(),
|
|
127
|
+
expires_on: oneYearLater.toISOString(),
|
|
128
|
+
...resp,
|
|
129
|
+
},
|
|
130
|
+
})
|
|
131
|
+
);
|
|
132
|
+
}
|
|
133
|
+
)
|
|
134
|
+
);
|
|
135
|
+
return config;
|
|
136
|
+
}
|
|
137
|
+
|
|
138
|
+
function mockDeleteMTlsCertificate() {
|
|
139
|
+
const config = { calls: 0 };
|
|
140
|
+
msw.use(
|
|
141
|
+
rest.delete(
|
|
142
|
+
"*/accounts/:accountId/mtls_certificates/:certId",
|
|
143
|
+
async (request, response, context) => {
|
|
144
|
+
config.calls++;
|
|
145
|
+
|
|
146
|
+
return response.once(
|
|
147
|
+
context.json({
|
|
148
|
+
success: true,
|
|
149
|
+
errors: [],
|
|
150
|
+
messages: [],
|
|
151
|
+
result: null,
|
|
152
|
+
})
|
|
153
|
+
);
|
|
154
|
+
}
|
|
155
|
+
)
|
|
156
|
+
);
|
|
157
|
+
return config;
|
|
158
|
+
}
|
|
159
|
+
|
|
160
|
+
const now = new Date();
|
|
161
|
+
const oneYearLater = new Date(now);
|
|
162
|
+
oneYearLater.setFullYear(now.getFullYear() + 1);
|
|
163
|
+
|
|
164
|
+
describe("mtls-certificates", () => {
|
|
165
|
+
describe("api", () => {
|
|
166
|
+
describe("uploadMTlsCertificate", () => {
|
|
167
|
+
it("should call mtls_certificates upload endpoint", async () => {
|
|
168
|
+
const mock = mockPostMTlsCertificate({
|
|
169
|
+
id: "1234",
|
|
170
|
+
issuer: "example.com...",
|
|
171
|
+
uploaded_on: now.toISOString(),
|
|
172
|
+
expires_on: oneYearLater.toISOString(),
|
|
173
|
+
});
|
|
174
|
+
|
|
175
|
+
const cert = await uploadMTlsCertificate(accountId, {
|
|
176
|
+
certificateChain: "BEGIN CERTIFICATE...",
|
|
177
|
+
privateKey: "BEGIN PRIVATE KEY...",
|
|
178
|
+
name: "my_cert",
|
|
179
|
+
});
|
|
180
|
+
|
|
181
|
+
expect(cert.id).toEqual("1234");
|
|
182
|
+
expect(cert.issuer).toEqual("example.com...");
|
|
183
|
+
expect(cert.expires_on).toEqual(oneYearLater.toISOString());
|
|
184
|
+
|
|
185
|
+
expect(mock.calls).toEqual(1);
|
|
186
|
+
});
|
|
187
|
+
});
|
|
188
|
+
|
|
189
|
+
describe("uploadMTlsCertificateFromFs", () => {
|
|
190
|
+
it("should fail to read cert and key files when missing", async () => {
|
|
191
|
+
await expect(
|
|
192
|
+
uploadMTlsCertificateFromFs(accountId, {
|
|
193
|
+
certificateChainFilename: "cert.pem",
|
|
194
|
+
privateKeyFilename: "key.pem",
|
|
195
|
+
name: "my_cert",
|
|
196
|
+
})
|
|
197
|
+
).rejects.toMatchInlineSnapshot(
|
|
198
|
+
`[ParseError: Could not read file: cert.pem]`
|
|
199
|
+
);
|
|
200
|
+
});
|
|
201
|
+
|
|
202
|
+
it("should read cert and key from disk and call mtls_certificates upload endpoint", async () => {
|
|
203
|
+
const mock = mockPostMTlsCertificate({
|
|
204
|
+
id: "1234",
|
|
205
|
+
issuer: "example.com...",
|
|
206
|
+
});
|
|
207
|
+
|
|
208
|
+
writeFileSync("cert.pem", "BEGIN CERTIFICATE...");
|
|
209
|
+
writeFileSync("key.pem", "BEGIN PRIVATE KEY...");
|
|
210
|
+
|
|
211
|
+
const cert = await uploadMTlsCertificateFromFs(accountId, {
|
|
212
|
+
certificateChainFilename: "cert.pem",
|
|
213
|
+
privateKeyFilename: "key.pem",
|
|
214
|
+
name: "my_cert",
|
|
215
|
+
});
|
|
216
|
+
|
|
217
|
+
expect(cert.id).toEqual("1234");
|
|
218
|
+
expect(cert.issuer).toEqual("example.com...");
|
|
219
|
+
expect(cert.expires_on).toEqual(oneYearLater.toISOString());
|
|
220
|
+
|
|
221
|
+
expect(mock.calls).toEqual(1);
|
|
222
|
+
});
|
|
223
|
+
});
|
|
224
|
+
|
|
225
|
+
describe("listMTlsCertificates", () => {
|
|
226
|
+
it("should call mtls_certificates list endpoint", async () => {
|
|
227
|
+
const mock = mockGetMTlsCertificates([
|
|
228
|
+
{
|
|
229
|
+
id: "1234",
|
|
230
|
+
name: "cert one",
|
|
231
|
+
certificates: "BEGIN CERTIFICATE...",
|
|
232
|
+
issuer: "example.com...",
|
|
233
|
+
uploaded_on: now.toISOString(),
|
|
234
|
+
expires_on: oneYearLater.toISOString(),
|
|
235
|
+
},
|
|
236
|
+
{
|
|
237
|
+
id: "5678",
|
|
238
|
+
name: "cert two",
|
|
239
|
+
certificates: "BEGIN CERTIFICATE...",
|
|
240
|
+
issuer: "example.com...",
|
|
241
|
+
uploaded_on: now.toISOString(),
|
|
242
|
+
expires_on: oneYearLater.toISOString(),
|
|
243
|
+
},
|
|
244
|
+
]);
|
|
245
|
+
|
|
246
|
+
const certs = await listMTlsCertificates(accountId, {});
|
|
247
|
+
|
|
248
|
+
expect(certs).toHaveLength(2);
|
|
249
|
+
|
|
250
|
+
expect(certs[0].id).toEqual("1234");
|
|
251
|
+
expect(certs[0].name).toEqual("cert one");
|
|
252
|
+
|
|
253
|
+
expect(certs[1].id).toEqual("5678");
|
|
254
|
+
expect(certs[1].name).toEqual("cert two");
|
|
255
|
+
|
|
256
|
+
expect(mock.calls).toEqual(1);
|
|
257
|
+
});
|
|
258
|
+
});
|
|
259
|
+
|
|
260
|
+
describe("getMTlsCertificate", () => {
|
|
261
|
+
it("calls get mtls_certificates endpoint", async () => {
|
|
262
|
+
const mock = mockGetMTlsCertificate({
|
|
263
|
+
id: "1234",
|
|
264
|
+
name: "cert one",
|
|
265
|
+
certificates: "BEGIN CERTIFICATE...",
|
|
266
|
+
issuer: "example.com...",
|
|
267
|
+
uploaded_on: now.toISOString(),
|
|
268
|
+
expires_on: oneYearLater.toISOString(),
|
|
269
|
+
});
|
|
270
|
+
|
|
271
|
+
const cert = await getMTlsCertificate(accountId, "1234");
|
|
272
|
+
|
|
273
|
+
expect(cert.id).toEqual("1234");
|
|
274
|
+
expect(cert.issuer).toEqual("example.com...");
|
|
275
|
+
expect(cert.expires_on).toEqual(oneYearLater.toISOString());
|
|
276
|
+
|
|
277
|
+
expect(mock.calls).toEqual(1);
|
|
278
|
+
});
|
|
279
|
+
});
|
|
280
|
+
|
|
281
|
+
describe("getMTlsCertificateByName", () => {
|
|
282
|
+
it("calls list mtls_certificates endpoint with name", async () => {
|
|
283
|
+
const mock = mockGetMTlsCertificates([
|
|
284
|
+
{
|
|
285
|
+
id: "1234",
|
|
286
|
+
name: "cert one",
|
|
287
|
+
certificates: "BEGIN CERTIFICATE...",
|
|
288
|
+
issuer: "example.com...",
|
|
289
|
+
uploaded_on: now.toISOString(),
|
|
290
|
+
expires_on: oneYearLater.toISOString(),
|
|
291
|
+
},
|
|
292
|
+
]);
|
|
293
|
+
|
|
294
|
+
const cert = await getMTlsCertificateByName(accountId, "cert one");
|
|
295
|
+
|
|
296
|
+
expect(cert.id).toEqual("1234");
|
|
297
|
+
expect(cert.issuer).toEqual("example.com...");
|
|
298
|
+
expect(cert.expires_on).toEqual(oneYearLater.toISOString());
|
|
299
|
+
|
|
300
|
+
expect(mock.calls).toEqual(1);
|
|
301
|
+
});
|
|
302
|
+
|
|
303
|
+
it("errors when a certificate cannot be found", async () => {
|
|
304
|
+
const mock = mockGetMTlsCertificates([]);
|
|
305
|
+
|
|
306
|
+
await expect(
|
|
307
|
+
getMTlsCertificateByName(accountId, "cert one")
|
|
308
|
+
).rejects.toMatchInlineSnapshot(
|
|
309
|
+
`[Error: certificate not found with name "cert one"]`
|
|
310
|
+
);
|
|
311
|
+
|
|
312
|
+
expect(mock.calls).toEqual(1);
|
|
313
|
+
});
|
|
314
|
+
|
|
315
|
+
it("errors when multiple certificates are found", async () => {
|
|
316
|
+
const mock = mockGetMTlsCertificates([
|
|
317
|
+
{
|
|
318
|
+
id: "1234",
|
|
319
|
+
name: "cert one",
|
|
320
|
+
certificates: "BEGIN CERTIFICATE...",
|
|
321
|
+
issuer: "example.com...",
|
|
322
|
+
uploaded_on: now.toISOString(),
|
|
323
|
+
expires_on: oneYearLater.toISOString(),
|
|
324
|
+
},
|
|
325
|
+
{
|
|
326
|
+
id: "5678",
|
|
327
|
+
name: "cert one",
|
|
328
|
+
certificates: "BEGIN CERTIFICATE...",
|
|
329
|
+
issuer: "example.com...",
|
|
330
|
+
uploaded_on: now.toISOString(),
|
|
331
|
+
expires_on: oneYearLater.toISOString(),
|
|
332
|
+
},
|
|
333
|
+
]);
|
|
334
|
+
|
|
335
|
+
await expect(
|
|
336
|
+
getMTlsCertificateByName(accountId, "cert one")
|
|
337
|
+
).rejects.toMatchInlineSnapshot(
|
|
338
|
+
`[Error: multiple certificates found with name "cert one"]`
|
|
339
|
+
);
|
|
340
|
+
|
|
341
|
+
expect(mock.calls).toEqual(1);
|
|
342
|
+
});
|
|
343
|
+
});
|
|
344
|
+
|
|
345
|
+
describe("deleteMTlsCertificate", () => {
|
|
346
|
+
test("calls delete mts_certificates endpoint", async () => {
|
|
347
|
+
const mock = mockDeleteMTlsCertificate();
|
|
348
|
+
|
|
349
|
+
await deleteMTlsCertificate(accountId, "1234");
|
|
350
|
+
|
|
351
|
+
expect(mock.calls).toEqual(1);
|
|
352
|
+
});
|
|
353
|
+
});
|
|
354
|
+
});
|
|
355
|
+
|
|
356
|
+
describe("commands", () => {
|
|
357
|
+
describe("help", () => {
|
|
358
|
+
it("should show the correct help text", async () => {
|
|
359
|
+
await runWrangler("mtls-certifiate --help");
|
|
360
|
+
expect(std.err).toMatchInlineSnapshot(`""`);
|
|
361
|
+
expect(std.out).toMatchInlineSnapshot(`
|
|
362
|
+
"wrangler
|
|
363
|
+
|
|
364
|
+
Commands:
|
|
365
|
+
wrangler docs [command] 📚 Open wrangler's docs in your browser
|
|
366
|
+
wrangler init [name] 📥 Initialize a basic Worker project, including a wrangler.toml file
|
|
367
|
+
wrangler generate [name] [template] ✨ Generate a new Worker project from an existing Worker template. See https://github.com/cloudflare/templates
|
|
368
|
+
wrangler dev [script] 👂 Start a local server for developing your worker
|
|
369
|
+
wrangler publish [script] 🆙 Publish your Worker to Cloudflare.
|
|
370
|
+
wrangler delete [script] 🗑 Delete your Worker from Cloudflare.
|
|
371
|
+
wrangler tail [worker] 🦚 Starts a log tailing session for a published Worker.
|
|
372
|
+
wrangler secret 🤫 Generate a secret that can be referenced in a Worker
|
|
373
|
+
wrangler secret:bulk <json> 🗄️ Bulk upload secrets for a Worker
|
|
374
|
+
wrangler kv:namespace 🗂️ Interact with your Workers KV Namespaces
|
|
375
|
+
wrangler kv:key 🔑 Individually manage Workers KV key-value pairs
|
|
376
|
+
wrangler kv:bulk 💪 Interact with multiple Workers KV key-value pairs at once
|
|
377
|
+
wrangler pages ⚡️ Configure Cloudflare Pages
|
|
378
|
+
wrangler queues 🇶 Configure Workers Queues
|
|
379
|
+
wrangler r2 📦 Interact with an R2 store
|
|
380
|
+
wrangler dispatch-namespace 📦 Interact with a dispatch namespace
|
|
381
|
+
wrangler d1 🗄 Interact with a D1 database
|
|
382
|
+
wrangler pubsub 📮 Interact and manage Pub/Sub Brokers
|
|
383
|
+
wrangler mtls-certificate 🪪 Manage certificates used for mTLS connections
|
|
384
|
+
wrangler login 🔓 Login to Cloudflare
|
|
385
|
+
wrangler logout 🚪 Logout from Cloudflare
|
|
386
|
+
wrangler whoami 🕵️ Retrieve your user info and test your auth config
|
|
387
|
+
wrangler types 📝 Generate types from bindings & module rules in config
|
|
388
|
+
wrangler deployments 🚢 Displays the 10 most recent deployments for a worker
|
|
389
|
+
|
|
390
|
+
Flags:
|
|
391
|
+
-j, --experimental-json-config Experimental: Support wrangler.json [boolean]
|
|
392
|
+
-c, --config Path to .toml configuration file [string]
|
|
393
|
+
-e, --env Environment to use for operations and .env files [string]
|
|
394
|
+
-h, --help Show help [boolean]
|
|
395
|
+
-v, --version Show version number [boolean]"
|
|
396
|
+
`);
|
|
397
|
+
});
|
|
398
|
+
});
|
|
399
|
+
|
|
400
|
+
describe("upload", () => {
|
|
401
|
+
test("uploads certificate and key from file", async () => {
|
|
402
|
+
writeFileSync("cert.pem", "BEGIN CERTIFICATE...");
|
|
403
|
+
writeFileSync("key.pem", "BEGIN PRIVATE KEY...");
|
|
404
|
+
|
|
405
|
+
mockPostMTlsCertificate();
|
|
406
|
+
|
|
407
|
+
await runWrangler(
|
|
408
|
+
"mtls-certificate upload --cert cert.pem --key key.pem"
|
|
409
|
+
);
|
|
410
|
+
|
|
411
|
+
expect(std.err).toMatchInlineSnapshot(`""`);
|
|
412
|
+
expect(std.out).toEqual(
|
|
413
|
+
`Uploading mTLS Certificate...
|
|
414
|
+
Success! Uploaded mTLS Certificate
|
|
415
|
+
ID: 1234
|
|
416
|
+
Issuer: example.com...
|
|
417
|
+
Expires on ${oneYearLater.toLocaleDateString()}`
|
|
418
|
+
);
|
|
419
|
+
});
|
|
420
|
+
|
|
421
|
+
test("uploads certificate and key from file with name", async () => {
|
|
422
|
+
writeFileSync("cert.pem", "BEGIN CERTIFICATE...");
|
|
423
|
+
writeFileSync("key.pem", "BEGIN PRIVATE KEY...");
|
|
424
|
+
|
|
425
|
+
mockPostMTlsCertificate();
|
|
426
|
+
|
|
427
|
+
await runWrangler(
|
|
428
|
+
"mtls-certificate upload --cert cert.pem --key key.pem --name my-cert"
|
|
429
|
+
);
|
|
430
|
+
|
|
431
|
+
expect(std.err).toMatchInlineSnapshot(`""`);
|
|
432
|
+
expect(std.out).toEqual(
|
|
433
|
+
`Uploading mTLS Certificate my-cert...
|
|
434
|
+
Success! Uploaded mTLS Certificate my-cert
|
|
435
|
+
ID: 1234
|
|
436
|
+
Issuer: example.com...
|
|
437
|
+
Expires on ${oneYearLater.toLocaleDateString()}`
|
|
438
|
+
);
|
|
439
|
+
});
|
|
440
|
+
});
|
|
441
|
+
|
|
442
|
+
describe("list", () => {
|
|
443
|
+
it("should list certificates", async () => {
|
|
444
|
+
mockGetMTlsCertificates();
|
|
445
|
+
|
|
446
|
+
await runWrangler("mtls-certificate list");
|
|
447
|
+
|
|
448
|
+
expect(std.err).toMatchInlineSnapshot(`""`);
|
|
449
|
+
expect(std.out).toEqual(
|
|
450
|
+
`ID: 1234
|
|
451
|
+
Name: cert one
|
|
452
|
+
Issuer: example.com...
|
|
453
|
+
Created on: ${now.toLocaleDateString()}
|
|
454
|
+
Expires on: ${oneYearLater.toLocaleDateString()}
|
|
455
|
+
|
|
456
|
+
|
|
457
|
+
ID: 5678
|
|
458
|
+
Name: cert two
|
|
459
|
+
Issuer: example.com...
|
|
460
|
+
Created on: ${now.toLocaleDateString()}
|
|
461
|
+
Expires on: ${oneYearLater.toLocaleDateString()}
|
|
462
|
+
|
|
463
|
+
`
|
|
464
|
+
);
|
|
465
|
+
});
|
|
466
|
+
});
|
|
467
|
+
|
|
468
|
+
describe("delete", () => {
|
|
469
|
+
it("should require --id or --name", async () => {
|
|
470
|
+
await runWrangler("mtls-certificate delete");
|
|
471
|
+
|
|
472
|
+
expect(std.err).toMatchInlineSnapshot(`
|
|
473
|
+
"[31mX [41;31m[[41;97mERROR[41;31m][0m [1mError: must provide --id or --name.[0m
|
|
474
|
+
|
|
475
|
+
"
|
|
476
|
+
`);
|
|
477
|
+
expect(std.out).toMatchInlineSnapshot(`""`);
|
|
478
|
+
});
|
|
479
|
+
|
|
480
|
+
it("should require not providing --id and --name", async () => {
|
|
481
|
+
await runWrangler("mtls-certificate delete --id 1234 --name mycert");
|
|
482
|
+
|
|
483
|
+
expect(std.err).toMatchInlineSnapshot(`
|
|
484
|
+
"[31mX [41;31m[[41;97mERROR[41;31m][0m [1mError: can't provide both --id and --name.[0m
|
|
485
|
+
|
|
486
|
+
"
|
|
487
|
+
`);
|
|
488
|
+
expect(std.out).toMatchInlineSnapshot(`""`);
|
|
489
|
+
});
|
|
490
|
+
|
|
491
|
+
it("should delete certificate by id", async () => {
|
|
492
|
+
mockGetMTlsCertificate({ name: "my-cert" });
|
|
493
|
+
mockDeleteMTlsCertificate();
|
|
494
|
+
|
|
495
|
+
mockConfirm({
|
|
496
|
+
text: `Are you sure you want to delete certificate 1234 (my-cert)?`,
|
|
497
|
+
result: true,
|
|
498
|
+
});
|
|
499
|
+
|
|
500
|
+
await runWrangler("mtls-certificate delete --id 1234");
|
|
501
|
+
|
|
502
|
+
expect(std.err).toMatchInlineSnapshot(`""`);
|
|
503
|
+
expect(std.out).toMatchInlineSnapshot(
|
|
504
|
+
`"Deleted certificate 1234 (my-cert) successfully"`
|
|
505
|
+
);
|
|
506
|
+
});
|
|
507
|
+
|
|
508
|
+
it("should delete certificate by name", async () => {
|
|
509
|
+
mockGetMTlsCertificates([{ id: "1234", name: "my-cert" }]);
|
|
510
|
+
mockDeleteMTlsCertificate();
|
|
511
|
+
|
|
512
|
+
mockConfirm({
|
|
513
|
+
text: `Are you sure you want to delete certificate 1234 (my-cert)?`,
|
|
514
|
+
result: true,
|
|
515
|
+
});
|
|
516
|
+
|
|
517
|
+
await runWrangler("mtls-certificate delete --name my-cert");
|
|
518
|
+
|
|
519
|
+
expect(std.err).toMatchInlineSnapshot(`""`);
|
|
520
|
+
expect(std.out).toMatchInlineSnapshot(
|
|
521
|
+
`"Deleted certificate 1234 (my-cert) successfully"`
|
|
522
|
+
);
|
|
523
|
+
});
|
|
524
|
+
|
|
525
|
+
it("should not delete when certificate cannot be found by name", async () => {
|
|
526
|
+
mockGetMTlsCertificates([]);
|
|
527
|
+
|
|
528
|
+
await expect(
|
|
529
|
+
runWrangler("mtls-certificate delete --name my-cert")
|
|
530
|
+
).rejects.toMatchInlineSnapshot(
|
|
531
|
+
`[Error: certificate not found with name "my-cert"]`
|
|
532
|
+
);
|
|
533
|
+
expect(std.out).toMatchInlineSnapshot(`
|
|
534
|
+
"
|
|
535
|
+
[32mIf you think this is a bug then please create an issue at https://github.com/cloudflare/workers-sdk/issues/new/choose[0m"
|
|
536
|
+
`);
|
|
537
|
+
});
|
|
538
|
+
|
|
539
|
+
it("should not delete when many certificates are found by name", async () => {
|
|
540
|
+
mockGetMTlsCertificates([
|
|
541
|
+
{
|
|
542
|
+
id: "1234",
|
|
543
|
+
name: "cert one",
|
|
544
|
+
certificates: "BEGIN CERTIFICATE...",
|
|
545
|
+
issuer: "example.com...",
|
|
546
|
+
uploaded_on: now.toISOString(),
|
|
547
|
+
expires_on: oneYearLater.toISOString(),
|
|
548
|
+
},
|
|
549
|
+
{
|
|
550
|
+
id: "5678",
|
|
551
|
+
name: "cert one",
|
|
552
|
+
certificates: "BEGIN CERTIFICATE...",
|
|
553
|
+
issuer: "example.com...",
|
|
554
|
+
uploaded_on: now.toISOString(),
|
|
555
|
+
expires_on: oneYearLater.toISOString(),
|
|
556
|
+
},
|
|
557
|
+
]);
|
|
558
|
+
|
|
559
|
+
await expect(
|
|
560
|
+
runWrangler("mtls-certificate delete --name my-cert")
|
|
561
|
+
).rejects.toMatchInlineSnapshot(
|
|
562
|
+
`[Error: multiple certificates found with name "my-cert"]`
|
|
563
|
+
);
|
|
564
|
+
expect(std.out).toMatchInlineSnapshot(`
|
|
565
|
+
"
|
|
566
|
+
[32mIf you think this is a bug then please create an issue at https://github.com/cloudflare/workers-sdk/issues/new/choose[0m"
|
|
567
|
+
`);
|
|
568
|
+
});
|
|
569
|
+
|
|
570
|
+
it("should not delete when confirmation fails", async () => {
|
|
571
|
+
mockGetMTlsCertificate({ id: "1234" });
|
|
572
|
+
|
|
573
|
+
mockConfirm({
|
|
574
|
+
text: `Are you sure you want to delete certificate 1234?`,
|
|
575
|
+
result: false,
|
|
576
|
+
});
|
|
577
|
+
|
|
578
|
+
await runWrangler("mtls-certificate delete --id 1234");
|
|
579
|
+
expect(std.err).toMatchInlineSnapshot(`""`);
|
|
580
|
+
expect(std.out).toMatchInlineSnapshot(`"Not deleting"`);
|
|
581
|
+
});
|
|
582
|
+
});
|
|
583
|
+
});
|
|
584
|
+
});
|
|
585
|
+
});
|
|
@@ -0,0 +1,78 @@
|
|
|
1
|
+
import { rest } from "msw";
|
|
2
|
+
import { endEventLoop } from "../helpers/end-event-loop";
|
|
3
|
+
import { mockAccountId, mockApiToken } from "./../helpers/mock-account-id";
|
|
4
|
+
import { msw } from "./../helpers/msw";
|
|
5
|
+
import { runInTempDir } from "./../helpers/run-in-tmp";
|
|
6
|
+
import { runWrangler } from "./../helpers/run-wrangler";
|
|
7
|
+
import type { Deployment } from "./../../pages/types";
|
|
8
|
+
|
|
9
|
+
describe("deployment list", () => {
|
|
10
|
+
runInTempDir();
|
|
11
|
+
mockAccountId();
|
|
12
|
+
mockApiToken();
|
|
13
|
+
|
|
14
|
+
afterEach(async () => {
|
|
15
|
+
// Force a tick to ensure that all promises resolve
|
|
16
|
+
await endEventLoop();
|
|
17
|
+
// Reset MSW after tick to ensure that all requests have been handled
|
|
18
|
+
msw.resetHandlers();
|
|
19
|
+
msw.restoreHandlers();
|
|
20
|
+
});
|
|
21
|
+
|
|
22
|
+
it("should make request to list deployments", async () => {
|
|
23
|
+
const deployments: Deployment[] = [
|
|
24
|
+
{
|
|
25
|
+
id: "87bbc8fe-16be-45cd-81e0-63d722e82cdf",
|
|
26
|
+
url: "https://87bbc8fe.images.pages.dev",
|
|
27
|
+
environment: "preview",
|
|
28
|
+
created_on: "2021-11-17T14:52:26.133835Z",
|
|
29
|
+
latest_stage: {
|
|
30
|
+
ended_on: "2021-11-17T14:52:26.133835Z",
|
|
31
|
+
status: "success",
|
|
32
|
+
},
|
|
33
|
+
deployment_trigger: {
|
|
34
|
+
metadata: {
|
|
35
|
+
branch: "main",
|
|
36
|
+
commit_hash: "c7649364c4cb32ad4f65b530b9424e8be5bec9d6",
|
|
37
|
+
},
|
|
38
|
+
},
|
|
39
|
+
project_name: "images",
|
|
40
|
+
},
|
|
41
|
+
];
|
|
42
|
+
|
|
43
|
+
const requests = mockDeploymentListRequest(deployments);
|
|
44
|
+
await runWrangler("pages deployment list --project-name=images");
|
|
45
|
+
|
|
46
|
+
expect(requests.count).toBe(1);
|
|
47
|
+
});
|
|
48
|
+
});
|
|
49
|
+
|
|
50
|
+
/* -------------------------------------------------- */
|
|
51
|
+
/* Helper Functions */
|
|
52
|
+
/* -------------------------------------------------- */
|
|
53
|
+
|
|
54
|
+
function mockDeploymentListRequest(deployments: unknown[]) {
|
|
55
|
+
const requests = { count: 0 };
|
|
56
|
+
msw.use(
|
|
57
|
+
rest.get(
|
|
58
|
+
"*/accounts/:accountId/pages/projects/:project/deployments",
|
|
59
|
+
(req, res, ctx) => {
|
|
60
|
+
requests.count++;
|
|
61
|
+
|
|
62
|
+
expect(req.params.project).toEqual("images");
|
|
63
|
+
expect(req.params.accountId).toEqual("some-account-id");
|
|
64
|
+
|
|
65
|
+
return res.once(
|
|
66
|
+
ctx.status(200),
|
|
67
|
+
ctx.json({
|
|
68
|
+
success: true,
|
|
69
|
+
errors: [],
|
|
70
|
+
messages: [],
|
|
71
|
+
result: deployments,
|
|
72
|
+
})
|
|
73
|
+
);
|
|
74
|
+
}
|
|
75
|
+
)
|
|
76
|
+
);
|
|
77
|
+
return requests;
|
|
78
|
+
}
|