Compare commits
	
		
			144 Commits
		
	
	
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
|   | 465a07811f | ||
|   | 360b4b5fef | ||
|   | c156700b23 | ||
|   | f605cf145e | ||
|   | 2a93a3eddb | ||
|   | 422e90f610 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | bc8c4d08b4 | ||
|   | 052c2c4268 | ||
|   | beabccd65a | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | b56ed1c88d | ||
|   | a13e198944 | ||
|   | 1b469c82ee | ||
|   | 83e260592e | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 6ba7f31490 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 5447726540 | ||
|   | 40891eba8c | ||
|   | dcd1f1fe0a | ||
|   | 713d7298f6 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | a7ae18608a | ||
|   | 65b78e6e13 | ||
|   | 219c305e1c | ||
|   | eb81c74b31 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | eb7654ec33 | ||
|   | ec9cdf07d5 | ||
|   | d01f5a4fd6 | ||
|   | af023e8f62 | ||
|   | 3da7dc6e2b | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 07119058a1 | ||
|   | bc135a1993 | ||
|   | f8374000f2 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 9d3e51f876 | ||
|   | 9ec69b27e2 | ||
|   | 7f58925139 | ||
|   | 980c90b31a | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | add9f8d32e | ||
|   | f75d088332 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | b161681273 | ||
|   | f4ef78c080 | ||
|   | 9ad4ce3929 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 884eadd4f8 | ||
|   | a266232f5c | ||
|   | f97efcfbf9 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 5ae789beac | ||
|   | 71c23b5b34 | ||
|   | 6401d70aab | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 67e8909cc6 | ||
|   | 21f251affc | ||
|   | 07cad18854 | ||
|   | be010b4293 | ||
|   | f719196635 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 9607a71381 | ||
|   | d398f07826 | ||
|   | 31aab9fb7e | ||
|   | 49ed152c8e | ||
|   | b61a9ce7bd | ||
|   | 3a136a8631 | ||
|   | b312880b69 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 795794e081 | ||
|   | 1edf6180e0 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 8e66ad4089 | ||
|   | 7c79b598ea | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 24a38e0d6d | ||
|   | 70e1ff84cb | ||
|   | 0828e0e718 | ||
|   | 56f72fcef0 | ||
|   | f169e16aaa | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | fa178e4710 | ||
|   | a4bf4e934e | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 2bbd6e81e1 | ||
|   | f6d32ad023 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | b4595c8bf9 | ||
|   | dd4fa0671b | ||
|   | 4e3538592e | ||
|   | bb984efc56 | ||
|   | 722888132b | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 17780b56b7 | ||
|   | 39857b3b45 | ||
|   | 5fcc728422 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 9fb8721eb9 | ||
|   | 4e3c9375bb | ||
|   | 4b59a429db | ||
|   | 6af3c118c8 | ||
|   | caca3368ce | ||
|   | 17f28ab24d | ||
|   | a875dd0e21 | ||
|   | 7948fffc49 | ||
|   | 5fcefb941d | ||
|   | 3bb2d084df | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 242fb9a356 | ||
|   | fa72313bc3 | ||
|   | 088f62a4f2 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 7929ac7647 | ||
|   | 42d299face | ||
|   | 4858b0b5ea | ||
|   | 1d7d8649e7 | ||
|   | 58855695bb | ||
|   | d9927c4142 | ||
|   | b9a4d91ee5 | ||
|   | b20b9f5e31 | ||
|   | cb21399f71 | ||
|   | faae4d6665 | ||
|   | 4d84a3c20f | ||
|   | 6f7ca8828b | ||
|   | b776a64ec0 | ||
|   | f6476db6e9 | ||
|   | 46ab6d5c3c | ||
|   | 1cce1654e0 | ||
|   | 9537342dee | ||
|   | 7f47463f56 | ||
|   | 8807319764 | ||
|   | ebac4bd30d | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 499663a42c | ||
|   | 70b0f7898e | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 885923496b | ||
|   | ab92432d0b | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 1828bf2d51 | ||
|   | 25c0ca8bab | ||
|   | f11d2ba650 | ||
|   | 3f83d7b89c | ||
|   | c9c0083563 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | f694e84504 | ||
|   | b30d77254f | ||
|   | 95778bc566 | ||
|   | 2c6df6a22f | ||
|   | c41c9a5c65 | ||
|   | fc6fe565d2 | ||
|   | 10428f39dc | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 1b4cf55146 | ||
|   | 5bcefc987c | ||
|   | 169057673d | ||
|   | 5d62c58fc3 | ||
|   | 73cda5dad9 | ||
|   | 5ffec3343b | ||
|   | 305d960cac | ||
|   | 9a9ae26c89 | ||
|   | 48af9f2a97 | ||
|   | c08e3a84a9 | ||
|   | f12fe5c78d | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | b566635cc9 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | b8e54a5ea5 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | d64238b93b | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 763661a124 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 41fba5a8c6 | ||
|   | 9376d24995 | 
							
								
								
									
										23
									
								
								.eslintrc.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										23
									
								
								.eslintrc.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,23 @@ | |||||||
|  | { | ||||||
|  |   "env": { | ||||||
|  |     "node": true, | ||||||
|  |     "es2021": true, | ||||||
|  |     "jest": true | ||||||
|  |   }, | ||||||
|  |   "extends": [ | ||||||
|  |     "eslint:recommended", | ||||||
|  |     "plugin:@typescript-eslint/recommended", | ||||||
|  |     "plugin:jest/recommended", | ||||||
|  |     "plugin:prettier/recommended" | ||||||
|  |   ], | ||||||
|  |   "parser": "@typescript-eslint/parser", | ||||||
|  |   "parserOptions": { | ||||||
|  |     "ecmaVersion": "latest", | ||||||
|  |     "sourceType": "module" | ||||||
|  |   }, | ||||||
|  |   "plugins": [ | ||||||
|  |     "@typescript-eslint", | ||||||
|  |     "jest", | ||||||
|  |     "prettier" | ||||||
|  |   ] | ||||||
|  | } | ||||||
							
								
								
									
										8
									
								
								.github/dependabot.yml
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										8
									
								
								.github/dependabot.yml
									
									
									
									
										vendored
									
									
								
							| @@ -5,8 +5,8 @@ updates: | |||||||
|     schedule: |     schedule: | ||||||
|       interval: "daily" |       interval: "daily" | ||||||
|     labels: |     labels: | ||||||
|       - ":game_die: dependencies" |       - "dependencies" | ||||||
|       - ":robot: bot" |       - "bot" | ||||||
|   - package-ecosystem: "npm" |   - package-ecosystem: "npm" | ||||||
|     directory: "/" |     directory: "/" | ||||||
|     schedule: |     schedule: | ||||||
| @@ -14,5 +14,5 @@ updates: | |||||||
|     allow: |     allow: | ||||||
|       - dependency-type: "production" |       - dependency-type: "production" | ||||||
|     labels: |     labels: | ||||||
|       - ":game_die: dependencies" |       - "dependencies" | ||||||
|       - ":robot: bot" |       - "bot" | ||||||
|   | |||||||
							
								
								
									
										
											BIN
										
									
								
								.github/ghcr-manage-actions-access.gif
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										
											BIN
										
									
								
								.github/ghcr-manage-actions-access.gif
									
									
									
									
										vendored
									
									
								
							
										
											Binary file not shown.
										
									
								
							| Before Width: | Height: | Size: 99 KiB | 
							
								
								
									
										133
									
								
								.github/workflows/ci.yml
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										133
									
								
								.github/workflows/ci.yml
									
									
									
									
										vendored
									
									
								
							| @@ -3,7 +3,7 @@ name: ci | |||||||
| on: | on: | ||||||
|   workflow_dispatch: |   workflow_dispatch: | ||||||
|   schedule: |   schedule: | ||||||
|     - cron: '0 10 * * *' # everyday at 10am |     - cron: '0 10 * * *' | ||||||
|   push: |   push: | ||||||
|     branches: |     branches: | ||||||
|       - 'master' |       - 'master' | ||||||
| @@ -15,7 +15,7 @@ jobs: | |||||||
|     steps: |     steps: | ||||||
|       - |       - | ||||||
|         name: Checkout |         name: Checkout | ||||||
|         uses: actions/checkout@v2 |         uses: actions/checkout@v3 | ||||||
|       - |       - | ||||||
|         name: Stop docker |         name: Stop docker | ||||||
|         run: | |         run: | | ||||||
| @@ -25,7 +25,7 @@ jobs: | |||||||
|         uses: ./ |         uses: ./ | ||||||
|         with: |         with: | ||||||
|           registry: ghcr.io |           registry: ghcr.io | ||||||
|           username: ${{ github.repository_owner }} |           username: ${{ github.actor }} | ||||||
|           password: ${{ secrets.GITHUB_TOKEN }} |           password: ${{ secrets.GITHUB_TOKEN }} | ||||||
|  |  | ||||||
|   logout: |   logout: | ||||||
| @@ -39,13 +39,13 @@ jobs: | |||||||
|     steps: |     steps: | ||||||
|       - |       - | ||||||
|         name: Checkout |         name: Checkout | ||||||
|         uses: actions/checkout@v2 |         uses: actions/checkout@v3 | ||||||
|       - |       - | ||||||
|         name: Login to GitHub Container Registry |         name: Login to GitHub Container Registry | ||||||
|         uses: ./ |         uses: ./ | ||||||
|         with: |         with: | ||||||
|           registry: ghcr.io |           registry: ghcr.io | ||||||
|           username: ${{ github.repository_owner }} |           username: ${{ github.actor }} | ||||||
|           password: ${{ secrets.GITHUB_TOKEN }} |           password: ${{ secrets.GITHUB_TOKEN }} | ||||||
|           logout: ${{ matrix.logout }} |           logout: ${{ matrix.logout }} | ||||||
|  |  | ||||||
| @@ -56,7 +56,7 @@ jobs: | |||||||
|     steps: |     steps: | ||||||
|       - |       - | ||||||
|         name: Checkout |         name: Checkout | ||||||
|         uses: actions/checkout@v2 |         uses: actions/checkout@v3 | ||||||
|       - |       - | ||||||
|         name: Login to GitHub Container Registry |         name: Login to GitHub Container Registry | ||||||
|         uses: ./ |         uses: ./ | ||||||
| @@ -76,19 +76,32 @@ jobs: | |||||||
|           docker image prune -a -f >/dev/null 2>&1 |           docker image prune -a -f >/dev/null 2>&1 | ||||||
|           docker pull ghcr.io/docker-ghactiontest/test |           docker pull ghcr.io/docker-ghactiontest/test | ||||||
|  |  | ||||||
|  |   acr: | ||||||
|  |     runs-on: ubuntu-latest | ||||||
|  |     steps: | ||||||
|  |       - | ||||||
|  |         name: Checkout | ||||||
|  |         uses: actions/checkout@v3 | ||||||
|  |       - | ||||||
|  |         name: Login to ACR | ||||||
|  |         uses: ./ | ||||||
|  |         with: | ||||||
|  |           registry: ${{ secrets.AZURE_REGISTRY_NAME }}.azurecr.io | ||||||
|  |           username: ${{ secrets.AZURE_CLIENT_ID }} | ||||||
|  |           password: ${{ secrets.AZURE_CLIENT_SECRET }} | ||||||
|  |  | ||||||
|   dockerhub: |   dockerhub: | ||||||
|     runs-on: ${{ matrix.os }} |     runs-on: ${{ matrix.os }} | ||||||
|     strategy: |     strategy: | ||||||
|       fail-fast: false |       fail-fast: false | ||||||
|       matrix: |       matrix: | ||||||
|         os: |         os: | ||||||
|           - ubuntu-20.04 |           - ubuntu-latest | ||||||
|           - ubuntu-18.04 |           - windows-latest | ||||||
|           - ubuntu-16.04 |  | ||||||
|     steps: |     steps: | ||||||
|       - |       - | ||||||
|         name: Checkout |         name: Checkout | ||||||
|         uses: actions/checkout@v2 |         uses: actions/checkout@v3 | ||||||
|       - |       - | ||||||
|         name: Login to Docker Hub |         name: Login to Docker Hub | ||||||
|         uses: ./ |         uses: ./ | ||||||
| @@ -102,18 +115,17 @@ jobs: | |||||||
|       fail-fast: false |       fail-fast: false | ||||||
|       matrix: |       matrix: | ||||||
|         os: |         os: | ||||||
|           - ubuntu-20.04 |           - ubuntu-latest | ||||||
|           - ubuntu-18.04 |           - windows-latest | ||||||
|           - ubuntu-16.04 |  | ||||||
|     steps: |     steps: | ||||||
|       - |       - | ||||||
|         name: Checkout |         name: Checkout | ||||||
|         uses: actions/checkout@v2 |         uses: actions/checkout@v3 | ||||||
|       - |       - | ||||||
|         name: Login to ECR |         name: Login to ECR | ||||||
|         uses: ./ |         uses: ./ | ||||||
|         with: |         with: | ||||||
|           registry: ${{ secrets.AWS_ACCOUNT_NUMBER }}.dkr.ecr.${{ secrets.AWS_REGION }}.amazonaws.com |           registry: ${{ secrets.AWS_ACCOUNT_NUMBER }}.dkr.ecr.us-east-1.amazonaws.com | ||||||
|           username: ${{ secrets.AWS_ACCESS_KEY_ID }} |           username: ${{ secrets.AWS_ACCESS_KEY_ID }} | ||||||
|           password: ${{ secrets.AWS_SECRET_ACCESS_KEY }} |           password: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | ||||||
|  |  | ||||||
| @@ -123,25 +135,24 @@ jobs: | |||||||
|       fail-fast: false |       fail-fast: false | ||||||
|       matrix: |       matrix: | ||||||
|         os: |         os: | ||||||
|           - ubuntu-20.04 |           - ubuntu-latest | ||||||
|           - ubuntu-18.04 |           - windows-latest | ||||||
|           - ubuntu-16.04 |  | ||||||
|     steps: |     steps: | ||||||
|       - |       - | ||||||
|         name: Checkout |         name: Checkout | ||||||
|         uses: actions/checkout@v2 |         uses: actions/checkout@v3 | ||||||
|       - |       - | ||||||
|         name: Configure AWS Credentials |         name: Configure AWS Credentials | ||||||
|         uses: aws-actions/configure-aws-credentials@v1 |         uses: aws-actions/configure-aws-credentials@v2 | ||||||
|         with: |         with: | ||||||
|           aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }} |           aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }} | ||||||
|           aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }} |           aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | ||||||
|           aws-region: ${{ secrets.AWS_REGION }} |           aws-region: us-east-1 | ||||||
|       - |       - | ||||||
|         name: Login to ECR |         name: Login to ECR | ||||||
|         uses: ./ |         uses: ./ | ||||||
|         with: |         with: | ||||||
|           registry: ${{ secrets.AWS_ACCOUNT_NUMBER }}.dkr.ecr.${{ secrets.AWS_REGION }}.amazonaws.com |           registry: ${{ secrets.AWS_ACCOUNT_NUMBER }}.dkr.ecr.us-east-1.amazonaws.com | ||||||
|  |  | ||||||
|   ecr-public: |   ecr-public: | ||||||
|     runs-on: ${{ matrix.os }} |     runs-on: ${{ matrix.os }} | ||||||
| @@ -149,13 +160,12 @@ jobs: | |||||||
|       fail-fast: false |       fail-fast: false | ||||||
|       matrix: |       matrix: | ||||||
|         os: |         os: | ||||||
|           - ubuntu-20.04 |           - ubuntu-latest | ||||||
|           - ubuntu-18.04 |           - windows-latest | ||||||
|           - ubuntu-16.04 |  | ||||||
|     steps: |     steps: | ||||||
|       - |       - | ||||||
|         name: Checkout |         name: Checkout | ||||||
|         uses: actions/checkout@v2 |         uses: actions/checkout@v3 | ||||||
|       - |       - | ||||||
|         name: Login to Public ECR |         name: Login to Public ECR | ||||||
|         uses: ./ |         uses: ./ | ||||||
| @@ -163,27 +173,66 @@ jobs: | |||||||
|           registry: public.ecr.aws |           registry: public.ecr.aws | ||||||
|           username: ${{ secrets.AWS_ACCESS_KEY_ID }} |           username: ${{ secrets.AWS_ACCESS_KEY_ID }} | ||||||
|           password: ${{ secrets.AWS_SECRET_ACCESS_KEY }} |           password: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | ||||||
|  |         env: | ||||||
|  |           AWS_REGION: us-east-1 | ||||||
|  |  | ||||||
|   github-container: |   ecr-public-aws-creds: | ||||||
|     runs-on: ubuntu-latest |     runs-on: ${{ matrix.os }} | ||||||
|  |     strategy: | ||||||
|  |       fail-fast: false | ||||||
|  |       matrix: | ||||||
|  |         os: | ||||||
|  |           - ubuntu-latest | ||||||
|  |           - windows-latest | ||||||
|     steps: |     steps: | ||||||
|       - |       - | ||||||
|         name: Checkout |         name: Checkout | ||||||
|         uses: actions/checkout@v2 |         uses: actions/checkout@v3 | ||||||
|  |       - | ||||||
|  |         name: Configure AWS Credentials | ||||||
|  |         uses: aws-actions/configure-aws-credentials@v2 | ||||||
|  |         with: | ||||||
|  |           aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }} | ||||||
|  |           aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | ||||||
|  |           aws-region: us-east-1 | ||||||
|  |       - | ||||||
|  |         name: Login to ECR | ||||||
|  |         uses: ./ | ||||||
|  |         with: | ||||||
|  |           registry: public.ecr.aws | ||||||
|  |  | ||||||
|  |   github-container: | ||||||
|  |     runs-on: ${{ matrix.os }} | ||||||
|  |     strategy: | ||||||
|  |       fail-fast: false | ||||||
|  |       matrix: | ||||||
|  |         os: | ||||||
|  |           - ubuntu-latest | ||||||
|  |           - windows-latest | ||||||
|  |     steps: | ||||||
|  |       - | ||||||
|  |         name: Checkout | ||||||
|  |         uses: actions/checkout@v3 | ||||||
|       - |       - | ||||||
|         name: Login to GitHub Container Registry |         name: Login to GitHub Container Registry | ||||||
|         uses: ./ |         uses: ./ | ||||||
|         with: |         with: | ||||||
|           registry: ghcr.io |           registry: ghcr.io | ||||||
|           username: ${{ github.repository_owner }} |           username: ${{ github.actor }} | ||||||
|           password: ${{ secrets.GITHUB_TOKEN }} |           password: ${{ secrets.GITHUB_TOKEN }} | ||||||
|  |  | ||||||
|   gitlab: |   gitlab: | ||||||
|     runs-on: ubuntu-latest |     runs-on: ${{ matrix.os }} | ||||||
|  |     strategy: | ||||||
|  |       fail-fast: false | ||||||
|  |       matrix: | ||||||
|  |         os: | ||||||
|  |           - ubuntu-latest | ||||||
|  |           - windows-latest | ||||||
|     steps: |     steps: | ||||||
|       - |       - | ||||||
|         name: Checkout |         name: Checkout | ||||||
|         uses: actions/checkout@v2 |         uses: actions/checkout@v3 | ||||||
|       - |       - | ||||||
|         name: Login to GitLab |         name: Login to GitLab | ||||||
|         uses: ./ |         uses: ./ | ||||||
| @@ -193,11 +242,17 @@ jobs: | |||||||
|           password: ${{ secrets.GITLAB_TOKEN }} |           password: ${{ secrets.GITLAB_TOKEN }} | ||||||
|  |  | ||||||
|   google-artifact: |   google-artifact: | ||||||
|     runs-on: ubuntu-latest |     runs-on: ${{ matrix.os }} | ||||||
|  |     strategy: | ||||||
|  |       fail-fast: false | ||||||
|  |       matrix: | ||||||
|  |         os: | ||||||
|  |           - ubuntu-latest | ||||||
|  |           - windows-latest | ||||||
|     steps: |     steps: | ||||||
|       - |       - | ||||||
|         name: Checkout |         name: Checkout | ||||||
|         uses: actions/checkout@v2 |         uses: actions/checkout@v3 | ||||||
|       - |       - | ||||||
|         name: Login to Google Artifact Registry |         name: Login to Google Artifact Registry | ||||||
|         uses: ./ |         uses: ./ | ||||||
| @@ -207,11 +262,17 @@ jobs: | |||||||
|           password: ${{ secrets.GAR_JSON_KEY }} |           password: ${{ secrets.GAR_JSON_KEY }} | ||||||
|  |  | ||||||
|   google-container: |   google-container: | ||||||
|     runs-on: ubuntu-latest |     runs-on: ${{ matrix.os }} | ||||||
|  |     strategy: | ||||||
|  |       fail-fast: false | ||||||
|  |       matrix: | ||||||
|  |         os: | ||||||
|  |           - ubuntu-latest | ||||||
|  |           - windows-latest | ||||||
|     steps: |     steps: | ||||||
|       - |       - | ||||||
|         name: Checkout |         name: Checkout | ||||||
|         uses: actions/checkout@v2 |         uses: actions/checkout@v3 | ||||||
|       - |       - | ||||||
|         name: Login to Google Container Registry |         name: Login to Google Container Registry | ||||||
|         uses: ./ |         uses: ./ | ||||||
|   | |||||||
							
								
								
									
										14
									
								
								.github/workflows/test.yml
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										14
									
								
								.github/workflows/test.yml
									
									
									
									
										vendored
									
									
								
							| @@ -6,9 +6,6 @@ on: | |||||||
|       - 'master' |       - 'master' | ||||||
|       - 'releases/v*' |       - 'releases/v*' | ||||||
|   pull_request: |   pull_request: | ||||||
|     branches: |  | ||||||
|       - 'master' |  | ||||||
|       - 'releases/v*' |  | ||||||
|  |  | ||||||
| jobs: | jobs: | ||||||
|   test: |   test: | ||||||
| @@ -16,19 +13,14 @@ jobs: | |||||||
|     steps: |     steps: | ||||||
|       - |       - | ||||||
|         name: Checkout |         name: Checkout | ||||||
|         uses: actions/checkout@v2 |         uses: actions/checkout@v3 | ||||||
|       - |  | ||||||
|         name: Validate |  | ||||||
|         uses: docker/bake-action@v1 |  | ||||||
|         with: |  | ||||||
|           targets: validate |  | ||||||
|       - |       - | ||||||
|         name: Test |         name: Test | ||||||
|         uses: docker/bake-action@v1 |         uses: docker/bake-action@v3 | ||||||
|         with: |         with: | ||||||
|           targets: test |           targets: test | ||||||
|       - |       - | ||||||
|         name: Upload coverage |         name: Upload coverage | ||||||
|         uses: codecov/codecov-action@v1 |         uses: codecov/codecov-action@v3 | ||||||
|         with: |         with: | ||||||
|           file: ./coverage/clover.xml |           file: ./coverage/clover.xml | ||||||
|   | |||||||
							
								
								
									
										41
									
								
								.github/workflows/validate.yml
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										41
									
								
								.github/workflows/validate.yml
									
									
									
									
										vendored
									
									
										Normal file
									
								
							| @@ -0,0 +1,41 @@ | |||||||
|  | name: validate | ||||||
|  |  | ||||||
|  | on: | ||||||
|  |   push: | ||||||
|  |     branches: | ||||||
|  |       - 'master' | ||||||
|  |       - 'releases/v*' | ||||||
|  |   pull_request: | ||||||
|  |  | ||||||
|  | jobs: | ||||||
|  |   prepare: | ||||||
|  |     runs-on: ubuntu-latest | ||||||
|  |     outputs: | ||||||
|  |       targets: ${{ steps.targets.outputs.matrix }} | ||||||
|  |     steps: | ||||||
|  |       - | ||||||
|  |         name: Checkout | ||||||
|  |         uses: actions/checkout@v3 | ||||||
|  |       - | ||||||
|  |         name: Targets matrix | ||||||
|  |         id: targets | ||||||
|  |         run: | | ||||||
|  |           echo "matrix=$(docker buildx bake validate --print | jq -cr '.group.validate.targets')" >> $GITHUB_OUTPUT | ||||||
|  |  | ||||||
|  |   validate: | ||||||
|  |     runs-on: ubuntu-latest | ||||||
|  |     needs: | ||||||
|  |       - prepare | ||||||
|  |     strategy: | ||||||
|  |       fail-fast: false | ||||||
|  |       matrix: | ||||||
|  |         target: ${{ fromJson(needs.prepare.outputs.targets) }} | ||||||
|  |     steps: | ||||||
|  |       - | ||||||
|  |         name: Checkout | ||||||
|  |         uses: actions/checkout@v3 | ||||||
|  |       - | ||||||
|  |         name: Validate | ||||||
|  |         uses: docker/bake-action@v3 | ||||||
|  |         with: | ||||||
|  |           targets: ${{ matrix.target }} | ||||||
							
								
								
									
										5
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										5
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							| @@ -1,11 +1,6 @@ | |||||||
| /.dev |  | ||||||
| node_modules/ | node_modules/ | ||||||
| lib | lib | ||||||
|  |  | ||||||
| # Jetbrains |  | ||||||
| /.idea |  | ||||||
| /*.iml |  | ||||||
|  |  | ||||||
| # Rest of the file pulled from https://github.com/github/gitignore/blob/master/Node.gitignore | # Rest of the file pulled from https://github.com/github/gitignore/blob/master/Node.gitignore | ||||||
| # Logs | # Logs | ||||||
| logs | logs | ||||||
|   | |||||||
| @@ -1,5 +1,5 @@ | |||||||
| { | { | ||||||
|   "printWidth": 120, |   "printWidth": 240, | ||||||
|   "tabWidth": 2, |   "tabWidth": 2, | ||||||
|   "useTabs": false, |   "useTabs": false, | ||||||
|   "semi": true, |   "semi": true, | ||||||
|   | |||||||
							
								
								
									
										165
									
								
								README.md
									
									
									
									
									
								
							
							
						
						
									
										165
									
								
								README.md
									
									
									
									
									
								
							| @@ -1,7 +1,7 @@ | |||||||
| [](https://github.com/docker/login-action/releases/latest) | [](https://github.com/docker/login-action/releases/latest) | ||||||
| [](https://github.com/marketplace/actions/docker-login) | [](https://github.com/marketplace/actions/docker-login) | ||||||
| [](https://github.com/docker/login-action/actions?workflow=ci) | [](https://github.com/docker/login-action/actions?workflow=ci) | ||||||
| [](https://github.com/docker/login-action/actions?workflow=test) | [](https://github.com/docker/login-action/actions?workflow=test) | ||||||
| [](https://codecov.io/gh/docker/login-action) | [](https://codecov.io/gh/docker/login-action) | ||||||
|  |  | ||||||
| ## About | ## About | ||||||
| @@ -39,7 +39,7 @@ name: ci | |||||||
|  |  | ||||||
| on: | on: | ||||||
|   push: |   push: | ||||||
|     branches: master |     branches: main | ||||||
|  |  | ||||||
| jobs: | jobs: | ||||||
|   login: |   login: | ||||||
| @@ -47,7 +47,7 @@ jobs: | |||||||
|     steps: |     steps: | ||||||
|       - |       - | ||||||
|         name: Login to Docker Hub |         name: Login to Docker Hub | ||||||
|         uses: docker/login-action@v1 |         uses: docker/login-action@v2 | ||||||
|         with: |         with: | ||||||
|           username: ${{ secrets.DOCKERHUB_USERNAME }} |           username: ${{ secrets.DOCKERHUB_USERNAME }} | ||||||
|           password: ${{ secrets.DOCKERHUB_TOKEN }} |           password: ${{ secrets.DOCKERHUB_TOKEN }} | ||||||
| @@ -55,10 +55,7 @@ jobs: | |||||||
|  |  | ||||||
| ### GitHub Container Registry | ### GitHub Container Registry | ||||||
|  |  | ||||||
| To use the [GitHub Container Registry](https://docs.github.com/en/packages/getting-started-with-github-container-registry), | To authenticate against the [GitHub Container Registry](https://docs.github.com/en/packages/working-with-a-github-packages-registry/working-with-the-container-registry), | ||||||
| you need to [enable this feature for your personal or organization account](https://docs.github.com/en/packages/guides/enabling-improved-container-support). |  | ||||||
|  |  | ||||||
| To [authenticate against it](https://docs.github.com/en/packages/guides/migrating-to-github-container-registry-for-docker-images#authenticating-with-the-container-registry), |  | ||||||
| use the [`GITHUB_TOKEN`](https://docs.github.com/en/actions/reference/authentication-in-a-workflow) for the best | use the [`GITHUB_TOKEN`](https://docs.github.com/en/actions/reference/authentication-in-a-workflow) for the best | ||||||
| security and experience. | security and experience. | ||||||
|  |  | ||||||
| @@ -67,7 +64,7 @@ name: ci | |||||||
|  |  | ||||||
| on: | on: | ||||||
|   push: |   push: | ||||||
|     branches: master |     branches: main | ||||||
|  |  | ||||||
| jobs: | jobs: | ||||||
|   login: |   login: | ||||||
| @@ -75,16 +72,15 @@ jobs: | |||||||
|     steps: |     steps: | ||||||
|       - |       - | ||||||
|         name: Login to GitHub Container Registry |         name: Login to GitHub Container Registry | ||||||
|         uses: docker/login-action@v1 |         uses: docker/login-action@v2 | ||||||
|         with: |         with: | ||||||
|           registry: ghcr.io |           registry: ghcr.io | ||||||
|           username: ${{ github.repository_owner }} |           username: ${{ github.actor }} | ||||||
|           password: ${{ secrets.GITHUB_TOKEN }} |           password: ${{ secrets.GITHUB_TOKEN }} | ||||||
| ``` | ``` | ||||||
|  |  | ||||||
| You may need to manage write and read access of GitHub Actions for repositories in the container settings: | You may need to [manage write and read access of GitHub Actions](https://docs.github.com/en/packages/managing-github-packages-using-github-actions-workflows/publishing-and-installing-a-package-with-github-actions#upgrading-a-workflow-that-accesses-ghcrio) | ||||||
|  | for repositories in the container settings. | ||||||
|  |  | ||||||
|  |  | ||||||
| You can also use a [personal access token (PAT)](https://docs.github.com/en/github/authenticating-to-github/creating-a-personal-access-token) | You can also use a [personal access token (PAT)](https://docs.github.com/en/github/authenticating-to-github/creating-a-personal-access-token) | ||||||
| with the [appropriate scopes](https://docs.github.com/en/packages/getting-started-with-github-container-registry/migrating-to-github-container-registry-for-docker-images#authenticating-with-the-container-registry). | with the [appropriate scopes](https://docs.github.com/en/packages/getting-started-with-github-container-registry/migrating-to-github-container-registry-for-docker-images#authenticating-with-the-container-registry). | ||||||
| @@ -96,7 +92,7 @@ name: ci | |||||||
|  |  | ||||||
| on: | on: | ||||||
|   push: |   push: | ||||||
|     branches: master |     branches: main | ||||||
|  |  | ||||||
| jobs: | jobs: | ||||||
|   login: |   login: | ||||||
| @@ -104,13 +100,15 @@ jobs: | |||||||
|     steps: |     steps: | ||||||
|       - |       - | ||||||
|         name: Login to GitLab |         name: Login to GitLab | ||||||
|         uses: docker/login-action@v1 |         uses: docker/login-action@v2 | ||||||
|         with: |         with: | ||||||
|           registry: registry.gitlab.com |           registry: registry.gitlab.com | ||||||
|           username: ${{ secrets.GITLAB_USERNAME }} |           username: ${{ secrets.GITLAB_USERNAME }} | ||||||
|           password: ${{ secrets.GITLAB_PASSWORD }} |           password: ${{ secrets.GITLAB_PASSWORD }} | ||||||
| ``` | ``` | ||||||
|  |  | ||||||
|  | If you have [Two-Factor Authentication](https://gitlab.com/help/user/profile/account/two_factor_authentication) enabled, use a [Personal Access Token](https://gitlab.com/help/user/profile/personal_access_tokens) instead of a password. | ||||||
|  |  | ||||||
| ### Azure Container Registry (ACR) | ### Azure Container Registry (ACR) | ||||||
|  |  | ||||||
| [Create a service principal](https://docs.microsoft.com/en-us/azure/container-registry/container-registry-auth-service-principal#create-a-service-principal) | [Create a service principal](https://docs.microsoft.com/en-us/azure/container-registry/container-registry-auth-service-principal#create-a-service-principal) | ||||||
| @@ -122,7 +120,7 @@ name: ci | |||||||
|  |  | ||||||
| on: | on: | ||||||
|   push: |   push: | ||||||
|     branches: master |     branches: main | ||||||
|  |  | ||||||
| jobs: | jobs: | ||||||
|   login: |   login: | ||||||
| @@ -130,7 +128,7 @@ jobs: | |||||||
|     steps: |     steps: | ||||||
|       - |       - | ||||||
|         name: Login to ACR |         name: Login to ACR | ||||||
|         uses: docker/login-action@v1 |         uses: docker/login-action@v2 | ||||||
|         with: |         with: | ||||||
|           registry: <registry-name>.azurecr.io |           registry: <registry-name>.azurecr.io | ||||||
|           username: ${{ secrets.AZURE_CLIENT_ID }} |           username: ${{ secrets.AZURE_CLIENT_ID }} | ||||||
| @@ -146,17 +144,57 @@ jobs: | |||||||
| > Google Container Registry, use the information [on this page](https://cloud.google.com/artifact-registry/docs/transition/transition-from-gcr) | > Google Container Registry, use the information [on this page](https://cloud.google.com/artifact-registry/docs/transition/transition-from-gcr) | ||||||
| > to learn about transitioning to Google Artifact Registry.  | > to learn about transitioning to Google Artifact Registry.  | ||||||
|  |  | ||||||
| Use a service account with the ability to push to GCR and [configure access control](https://cloud.google.com/container-registry/docs/access-control). | You can use either workload identity federation based keyless authentication or service account based authentication. | ||||||
| Then create and download the JSON key for this service account and save content of `.json` file |  | ||||||
| [as a secret](https://docs.github.com/en/actions/configuring-and-managing-workflows/creating-and-storing-encrypted-secrets#creating-encrypted-secrets-for-a-repository) | #### Workload identity federation based authentication | ||||||
| called `GCR_JSON_KEY` in your GitHub repo. Ensure you set the username to `_json_key`. |  | ||||||
|  | Configure the workload identity federation for github actions in gcloud (for steps, [refer here](https://github.com/google-github-actions/auth#setting-up-workload-identity-federation)). In the steps, your service account should the ability to push to GCR. Then use google-github-actions/auth action for authentication using workload identity like below: | ||||||
|  |  | ||||||
| ```yaml | ```yaml | ||||||
| name: ci | name: ci | ||||||
|  |  | ||||||
| on: | on: | ||||||
|   push: |   push: | ||||||
|     branches: master |     branches: main | ||||||
|  |  | ||||||
|  | jobs: | ||||||
|  |   login: | ||||||
|  |     runs-on: ubuntu-latest | ||||||
|  |     steps: | ||||||
|  |     - id: 'auth' | ||||||
|  |       name: 'Authenticate to Google Cloud' | ||||||
|  |       uses: 'google-github-actions/auth@v0' | ||||||
|  |       with: | ||||||
|  |         token_format: 'access_token' | ||||||
|  |         workload_identity_provider: '<workload_identity_provider>' | ||||||
|  |         service_account: '<service_account>' | ||||||
|  |  | ||||||
|  |     - name: Login to GCR | ||||||
|  |       uses: docker/login-action@v2 | ||||||
|  |       with: | ||||||
|  |         registry: gcr.io | ||||||
|  |         username: oauth2accesstoken | ||||||
|  |         password: ${{ steps.auth.outputs.access_token }} | ||||||
|  | ``` | ||||||
|  |  | ||||||
|  | > Replace `<workload_identity_provider>` with configured workload identity provider. For steps to configure, [refer here](https://github.com/google-github-actions/auth#setting-up-workload-identity-federation). | ||||||
|  |  | ||||||
|  | > Replace `<service_account>` with configured service account in workload identity provider which has access to push to GCR | ||||||
|  |  | ||||||
|  | #### Service account based authentication | ||||||
|  |  | ||||||
|  | Use a service account with the ability to push to GCR and [configure access control](https://cloud.google.com/container-registry/docs/access-control). | ||||||
|  | Then create and download the JSON key for this service account and save content of `.json` file | ||||||
|  | [as a secret](https://docs.github.com/en/actions/configuring-and-managing-workflows/creating-and-storing-encrypted-secrets#creating-encrypted-secrets-for-a-repository) | ||||||
|  | called `GCR_JSON_KEY` in your GitHub repo. Ensure you set the username to `_json_key`, | ||||||
|  | or `_json_key_base64` if you use a base64-encoded key. | ||||||
|  |  | ||||||
|  | ```yaml | ||||||
|  | name: ci | ||||||
|  |  | ||||||
|  | on: | ||||||
|  |   push: | ||||||
|  |     branches: main | ||||||
|  |  | ||||||
| jobs: | jobs: | ||||||
|   login: |   login: | ||||||
| @@ -164,7 +202,7 @@ jobs: | |||||||
|     steps: |     steps: | ||||||
|       - |       - | ||||||
|         name: Login to GCR |         name: Login to GCR | ||||||
|         uses: docker/login-action@v1 |         uses: docker/login-action@v2 | ||||||
|         with: |         with: | ||||||
|           registry: gcr.io |           registry: gcr.io | ||||||
|           username: _json_key |           username: _json_key | ||||||
| @@ -173,17 +211,59 @@ jobs: | |||||||
|  |  | ||||||
| ### Google Artifact Registry (GAR) | ### Google Artifact Registry (GAR) | ||||||
|  |  | ||||||
| Use a service account with the ability to push to GAR and [configure access control](https://cloud.google.com/artifact-registry/docs/access-control). | You can use either workload identity federation based keyless authentication or  service account based authentication. | ||||||
| Then create and download the JSON key for this service account and save content of `.json` file |  | ||||||
| [as a secret](https://docs.github.com/en/actions/configuring-and-managing-workflows/creating-and-storing-encrypted-secrets#creating-encrypted-secrets-for-a-repository) | #### Workload identity federation based authentication | ||||||
| called `GAR_JSON_KEY` in your GitHub repo. Ensure you set the username to `_json_key`. |  | ||||||
|  | Configure the workload identity federation for github actions in gcloud (for steps, [refer here](https://github.com/google-github-actions/auth#setting-up-workload-identity-federation)). In the steps, your service account should the ability to push to GAR. Then use google-github-actions/auth action for authentication using workload identity like below: | ||||||
|  |  | ||||||
| ```yaml | ```yaml | ||||||
| name: ci | name: ci | ||||||
|  |  | ||||||
| on: | on: | ||||||
|   push: |   push: | ||||||
|     branches: master |     branches: main | ||||||
|  |  | ||||||
|  | jobs: | ||||||
|  |   login: | ||||||
|  |     runs-on: ubuntu-latest | ||||||
|  |     steps: | ||||||
|  |       - id: 'auth' | ||||||
|  |         name: 'Authenticate to Google Cloud' | ||||||
|  |         uses: 'google-github-actions/auth@v0' | ||||||
|  |         with: | ||||||
|  |           token_format: 'access_token' | ||||||
|  |           workload_identity_provider: '<workload_identity_provider>' | ||||||
|  |           service_account: '<service_account>' | ||||||
|  |        | ||||||
|  |       - name: Login to GAR | ||||||
|  |         uses: docker/login-action@v2 | ||||||
|  |         with: | ||||||
|  |           registry: <location>-docker.pkg.dev | ||||||
|  |           username: oauth2accesstoken | ||||||
|  |           password: ${{ steps.auth.outputs.access_token }} | ||||||
|  | ``` | ||||||
|  | > Replace `<workload_identity_provider>` with configured workload identity provider | ||||||
|  |  | ||||||
|  | > Replace `<service_account>` with configured service account in workload identity provider which has access to push to GCR | ||||||
|  |  | ||||||
|  | > Replace `<location>` with the regional or multi-regional [location](https://cloud.google.com/artifact-registry/docs/repo-organize#locations) | ||||||
|  | > of the repository where the image is stored. | ||||||
|  |  | ||||||
|  | #### Service account based authentication | ||||||
|  |  | ||||||
|  | Use a service account with the ability to push to GAR and [configure access control](https://cloud.google.com/artifact-registry/docs/access-control). | ||||||
|  | Then create and download the JSON key for this service account and save content of `.json` file | ||||||
|  | [as a secret](https://docs.github.com/en/actions/configuring-and-managing-workflows/creating-and-storing-encrypted-secrets#creating-encrypted-secrets-for-a-repository) | ||||||
|  | called `GAR_JSON_KEY` in your GitHub repo. Ensure you set the username to `_json_key`, | ||||||
|  | or `_json_key_base64` if you use a base64-encoded key. | ||||||
|  |  | ||||||
|  | ```yaml | ||||||
|  | name: ci | ||||||
|  |  | ||||||
|  | on: | ||||||
|  |   push: | ||||||
|  |     branches: main | ||||||
|  |  | ||||||
| jobs: | jobs: | ||||||
|   login: |   login: | ||||||
| @@ -191,7 +271,7 @@ jobs: | |||||||
|     steps: |     steps: | ||||||
|       - |       - | ||||||
|         name: Login to GAR |         name: Login to GAR | ||||||
|         uses: docker/login-action@v1 |         uses: docker/login-action@v2 | ||||||
|         with: |         with: | ||||||
|           registry: <location>-docker.pkg.dev |           registry: <location>-docker.pkg.dev | ||||||
|           username: _json_key |           username: _json_key | ||||||
| @@ -212,7 +292,7 @@ name: ci | |||||||
|  |  | ||||||
| on: | on: | ||||||
|   push: |   push: | ||||||
|     branches: master |     branches: main | ||||||
|  |  | ||||||
| jobs: | jobs: | ||||||
|   login: |   login: | ||||||
| @@ -220,7 +300,7 @@ jobs: | |||||||
|     steps: |     steps: | ||||||
|       - |       - | ||||||
|         name: Login to ECR |         name: Login to ECR | ||||||
|         uses: docker/login-action@v1 |         uses: docker/login-action@v2 | ||||||
|         with: |         with: | ||||||
|           registry: <aws-account-number>.dkr.ecr.<region>.amazonaws.com |           registry: <aws-account-number>.dkr.ecr.<region>.amazonaws.com | ||||||
|           username: ${{ secrets.AWS_ACCESS_KEY_ID }} |           username: ${{ secrets.AWS_ACCESS_KEY_ID }} | ||||||
| @@ -235,7 +315,7 @@ name: ci | |||||||
|  |  | ||||||
| on: | on: | ||||||
|   push: |   push: | ||||||
|     branches: master |     branches: main | ||||||
|  |  | ||||||
| jobs: | jobs: | ||||||
|   login: |   login: | ||||||
| @@ -243,7 +323,7 @@ jobs: | |||||||
|     steps: |     steps: | ||||||
|       - |       - | ||||||
|         name: Login to ECR |         name: Login to ECR | ||||||
|         uses: docker/login-action@v1 |         uses: docker/login-action@v2 | ||||||
|         with: |         with: | ||||||
|           registry: <aws-account-number>.dkr.ecr.<region>.amazonaws.com |           registry: <aws-account-number>.dkr.ecr.<region>.amazonaws.com | ||||||
|           username: ${{ secrets.AWS_ACCESS_KEY_ID }} |           username: ${{ secrets.AWS_ACCESS_KEY_ID }} | ||||||
| @@ -262,7 +342,7 @@ name: ci | |||||||
|  |  | ||||||
| on: | on: | ||||||
|   push: |   push: | ||||||
|     branches: master |     branches: main | ||||||
|  |  | ||||||
| jobs: | jobs: | ||||||
|   login: |   login: | ||||||
| @@ -277,7 +357,7 @@ jobs: | |||||||
|           aws-region: <region> |           aws-region: <region> | ||||||
|       - |       - | ||||||
|         name: Login to ECR |         name: Login to ECR | ||||||
|         uses: docker/login-action@v1 |         uses: docker/login-action@v2 | ||||||
|         with: |         with: | ||||||
|           registry: <aws-account-number>.dkr.ecr.<region>.amazonaws.com |           registry: <aws-account-number>.dkr.ecr.<region>.amazonaws.com | ||||||
| ``` | ``` | ||||||
| @@ -295,7 +375,7 @@ name: ci | |||||||
|  |  | ||||||
| on: | on: | ||||||
|   push: |   push: | ||||||
|     branches: master |     branches: main | ||||||
|  |  | ||||||
| jobs: | jobs: | ||||||
|   login: |   login: | ||||||
| @@ -303,7 +383,7 @@ jobs: | |||||||
|     steps: |     steps: | ||||||
|       - |       - | ||||||
|         name: Login to Public ECR |         name: Login to Public ECR | ||||||
|         uses: docker/login-action@v1 |         uses: docker/login-action@v2 | ||||||
|         with: |         with: | ||||||
|           registry: public.ecr.aws |           registry: public.ecr.aws | ||||||
|           username: ${{ secrets.AWS_ACCESS_KEY_ID }} |           username: ${{ secrets.AWS_ACCESS_KEY_ID }} | ||||||
| @@ -329,7 +409,7 @@ name: ci | |||||||
|  |  | ||||||
| on: | on: | ||||||
|   push: |   push: | ||||||
|     branches: master |     branches: main | ||||||
|  |  | ||||||
| jobs: | jobs: | ||||||
|   login: |   login: | ||||||
| @@ -337,7 +417,7 @@ jobs: | |||||||
|     steps: |     steps: | ||||||
|       - |       - | ||||||
|         name: Login to OCIR |         name: Login to OCIR | ||||||
|         uses: docker/login-action@v1 |         uses: docker/login-action@v2 | ||||||
|         with: |         with: | ||||||
|           registry: <region>.ocir.io |           registry: <region>.ocir.io | ||||||
|           username: ${{ secrets.OCI_USERNAME }} |           username: ${{ secrets.OCI_USERNAME }} | ||||||
| @@ -355,7 +435,7 @@ name: ci | |||||||
|  |  | ||||||
| on: | on: | ||||||
|   push: |   push: | ||||||
|     branches: master |     branches: main | ||||||
|  |  | ||||||
| jobs: | jobs: | ||||||
|   login: |   login: | ||||||
| @@ -363,7 +443,7 @@ jobs: | |||||||
|     steps: |     steps: | ||||||
|       - |       - | ||||||
|         name: Login to Quay.io |         name: Login to Quay.io | ||||||
|         uses: docker/login-action@v1 |         uses: docker/login-action@v2 | ||||||
|         with: |         with: | ||||||
|           registry: quay.io |           registry: quay.io | ||||||
|           username: ${{ secrets.QUAY_USERNAME }} |           username: ${{ secrets.QUAY_USERNAME }} | ||||||
| @@ -381,6 +461,7 @@ Following inputs can be used as `step.with` keys | |||||||
| | `registry`       | String  |                             | Server address of Docker registry. If not set then will default to Docker Hub | | | `registry`       | String  |                             | Server address of Docker registry. If not set then will default to Docker Hub | | ||||||
| | `username`       | String  |                             | Username used to log against the Docker registry | | | `username`       | String  |                             | Username used to log against the Docker registry | | ||||||
| | `password`       | String  |                             | Password or personal access token used to log against the Docker registry | | | `password`       | String  |                             | Password or personal access token used to log against the Docker registry | | ||||||
|  | | `ecr`            | String  | `auto`                      | Specifies whether the given registry is ECR (`auto`, `true` or `false`) | | ||||||
| | `logout`         | Bool    | `true`                      | Log out from the Docker registry at the end of a job | | | `logout`         | Bool    | `true`                      | Log out from the Docker registry at the end of a job | | ||||||
|  |  | ||||||
| ## Keep up-to-date with GitHub Dependabot | ## Keep up-to-date with GitHub Dependabot | ||||||
|   | |||||||
| @@ -1,4 +1,5 @@ | |||||||
| import * as semver from 'semver'; | import {beforeEach, describe, expect, jest, test} from '@jest/globals'; | ||||||
|  | import {AuthorizationData} from '@aws-sdk/client-ecr'; | ||||||
| import * as aws from '../src/aws'; | import * as aws from '../src/aws'; | ||||||
|  |  | ||||||
| describe('isECR', () => { | describe('isECR', () => { | ||||||
| @@ -10,7 +11,7 @@ describe('isECR', () => { | |||||||
|     ['390948362332.dkr.ecr.cn-northwest-1.amazonaws.com.cn', true], |     ['390948362332.dkr.ecr.cn-northwest-1.amazonaws.com.cn', true], | ||||||
|     ['public.ecr.aws', true] |     ['public.ecr.aws', true] | ||||||
|   ])('given registry %p', async (registry, expected) => { |   ])('given registry %p', async (registry, expected) => { | ||||||
|     expect(await aws.isECR(registry)).toEqual(expected); |     expect(aws.isECR(registry)).toEqual(expected); | ||||||
|   }); |   }); | ||||||
| }); | }); | ||||||
|  |  | ||||||
| @@ -23,40 +24,7 @@ describe('isPubECR', () => { | |||||||
|     ['390948362332.dkr.ecr.cn-northwest-1.amazonaws.com.cn', false], |     ['390948362332.dkr.ecr.cn-northwest-1.amazonaws.com.cn', false], | ||||||
|     ['public.ecr.aws', true] |     ['public.ecr.aws', true] | ||||||
|   ])('given registry %p', async (registry, expected) => { |   ])('given registry %p', async (registry, expected) => { | ||||||
|     expect(await aws.isPubECR(registry)).toEqual(expected); |     expect(aws.isPubECR(registry)).toEqual(expected); | ||||||
|   }); |  | ||||||
| }); |  | ||||||
|  |  | ||||||
| describe('getCLI', () => { |  | ||||||
|   it('exists', async () => { |  | ||||||
|     const awsPath = await aws.getCLI(); |  | ||||||
|     console.log(`awsPath: ${awsPath}`); |  | ||||||
|     expect(awsPath).not.toEqual(''); |  | ||||||
|   }); |  | ||||||
| }); |  | ||||||
|  |  | ||||||
| describe('execCLI', () => { |  | ||||||
|   it('--version not empty', async () => { |  | ||||||
|     const cliCmdOutput = await aws.execCLI(['--version']); |  | ||||||
|     console.log(`cliCmdOutput: ${cliCmdOutput}`); |  | ||||||
|     expect(cliCmdOutput).not.toEqual(''); |  | ||||||
|   }, 100000); |  | ||||||
| }); |  | ||||||
|  |  | ||||||
| describe('getCLIVersion', () => { |  | ||||||
|   it('valid', async () => { |  | ||||||
|     const cliVersion = await aws.getCLIVersion(); |  | ||||||
|     console.log(`cliVersion: ${cliVersion}`); |  | ||||||
|     expect(semver.valid(cliVersion)).not.toBeNull(); |  | ||||||
|   }, 100000); |  | ||||||
| }); |  | ||||||
|  |  | ||||||
| describe('parseCLIVersion', () => { |  | ||||||
|   test.each([ |  | ||||||
|     ['v1', 'aws-cli/1.18.120 Python/2.7.17 Linux/5.3.0-1034-azure botocore/1.17.43', '1.18.120'], |  | ||||||
|     ['v2', 'aws-cli/2.0.41 Python/3.7.3 Linux/4.19.104-microsoft-standard exe/x86_64.ubuntu.18', '2.0.41'] |  | ||||||
|   ])('given aws %p', async (version, stdout, expected) => { |  | ||||||
|     expect(await aws.parseCLIVersion(stdout)).toEqual(expected); |  | ||||||
|   }); |   }); | ||||||
| }); | }); | ||||||
|  |  | ||||||
| @@ -67,33 +35,122 @@ describe('getRegion', () => { | |||||||
|     ['390948362332.dkr.ecr.cn-northwest-1.amazonaws.com.cn', 'cn-northwest-1'], |     ['390948362332.dkr.ecr.cn-northwest-1.amazonaws.com.cn', 'cn-northwest-1'], | ||||||
|     ['public.ecr.aws', 'us-east-1'] |     ['public.ecr.aws', 'us-east-1'] | ||||||
|   ])('given registry %p', async (registry, expected) => { |   ])('given registry %p', async (registry, expected) => { | ||||||
|     expect(await aws.getRegion(registry)).toEqual(expected); |     expect(aws.getRegion(registry)).toEqual(expected); | ||||||
|   }); |   }); | ||||||
| }); | }); | ||||||
|  |  | ||||||
| describe('getAccountIDs', () => { | describe('getAccountIDs', () => { | ||||||
|   test.each([ |   test.each([ | ||||||
|     ['012345678901.dkr.ecr.eu-west-3.amazonaws.com', undefined, ['012345678901']], |     ['012345678901.dkr.ecr.eu-west-3.amazonaws.com', undefined, ['012345678901']], | ||||||
|     [ |     ['012345678901.dkr.ecr.eu-west-3.amazonaws.com', '012345678910,023456789012', ['012345678901', '012345678910', '023456789012']], | ||||||
|       '012345678901.dkr.ecr.eu-west-3.amazonaws.com', |     ['012345678901.dkr.ecr.eu-west-3.amazonaws.com', '012345678901,012345678910,023456789012', ['012345678901', '012345678910', '023456789012']], | ||||||
|       '012345678910,023456789012', |     ['390948362332.dkr.ecr.cn-northwest-1.amazonaws.com.cn', '012345678910,023456789012', ['390948362332', '012345678910', '023456789012']], | ||||||
|       ['012345678901', '012345678910', '023456789012'] |  | ||||||
|     ], |  | ||||||
|     [ |  | ||||||
|       '012345678901.dkr.ecr.eu-west-3.amazonaws.com', |  | ||||||
|       '012345678901,012345678910,023456789012', |  | ||||||
|       ['012345678901', '012345678910', '023456789012'] |  | ||||||
|     ], |  | ||||||
|     [ |  | ||||||
|       '390948362332.dkr.ecr.cn-northwest-1.amazonaws.com.cn', |  | ||||||
|       '012345678910,023456789012', |  | ||||||
|       ['390948362332', '012345678910', '023456789012'] |  | ||||||
|     ], |  | ||||||
|     ['public.ecr.aws', undefined, []] |     ['public.ecr.aws', undefined, []] | ||||||
|   ])('given registry %p', async (registry, accountIDsEnv, expected) => { |   ])('given registry %p', async (registry, accountIDsEnv, expected) => { | ||||||
|     if (accountIDsEnv) { |     if (accountIDsEnv) { | ||||||
|       process.env.AWS_ACCOUNT_IDS = accountIDsEnv; |       process.env.AWS_ACCOUNT_IDS = accountIDsEnv; | ||||||
|     } |     } | ||||||
|     expect(await aws.getAccountIDs(registry)).toEqual(expected); |     expect(aws.getAccountIDs(registry)).toEqual(expected); | ||||||
|  |   }); | ||||||
|  | }); | ||||||
|  |  | ||||||
|  | const mockEcrGetAuthToken = jest.fn(); | ||||||
|  | const mockEcrPublicGetAuthToken = jest.fn(); | ||||||
|  | jest.mock('@aws-sdk/client-ecr', () => { | ||||||
|  |   return { | ||||||
|  |     ECR: jest.fn(() => ({ | ||||||
|  |       getAuthorizationToken: mockEcrGetAuthToken | ||||||
|  |     })) | ||||||
|  |   }; | ||||||
|  | }); | ||||||
|  | jest.mock('@aws-sdk/client-ecr-public', () => { | ||||||
|  |   return { | ||||||
|  |     ECRPUBLIC: jest.fn(() => ({ | ||||||
|  |       getAuthorizationToken: mockEcrPublicGetAuthToken | ||||||
|  |     })) | ||||||
|  |   }; | ||||||
|  | }); | ||||||
|  |  | ||||||
|  | describe('getRegistriesData', () => { | ||||||
|  |   beforeEach(() => { | ||||||
|  |     jest.clearAllMocks(); | ||||||
|  |     delete process.env.AWS_ACCOUNT_IDS; | ||||||
|  |   }); | ||||||
|  |   // prettier-ignore | ||||||
|  |   test.each([ | ||||||
|  |     [ | ||||||
|  |       '012345678901.dkr.ecr.aws-region-1.amazonaws.com', | ||||||
|  |       'dkr.ecr.aws-region-1.amazonaws.com', undefined, | ||||||
|  |       [ | ||||||
|  |         { | ||||||
|  |           registry: '012345678901.dkr.ecr.aws-region-1.amazonaws.com', | ||||||
|  |           username: '012345678901', | ||||||
|  |           password: 'world' | ||||||
|  |         } | ||||||
|  |       ] | ||||||
|  |     ], | ||||||
|  |     [ | ||||||
|  |       '012345678901.dkr.ecr.eu-west-3.amazonaws.com', | ||||||
|  |       'dkr.ecr.eu-west-3.amazonaws.com', | ||||||
|  |       '012345678910,023456789012', | ||||||
|  |       [ | ||||||
|  |         { | ||||||
|  |           registry: '012345678901.dkr.ecr.eu-west-3.amazonaws.com', | ||||||
|  |           username: '012345678901', | ||||||
|  |           password: 'world' | ||||||
|  |         }, | ||||||
|  |         { | ||||||
|  |           registry: '012345678910.dkr.ecr.eu-west-3.amazonaws.com', | ||||||
|  |           username: '012345678910', | ||||||
|  |           password: 'world' | ||||||
|  |         }, | ||||||
|  |         { | ||||||
|  |           registry: '023456789012.dkr.ecr.eu-west-3.amazonaws.com', | ||||||
|  |           username: '023456789012', | ||||||
|  |           password: 'world' | ||||||
|  |         } | ||||||
|  |       ] | ||||||
|  |     ], | ||||||
|  |     [ | ||||||
|  |       'public.ecr.aws', | ||||||
|  |       undefined, | ||||||
|  |       undefined, | ||||||
|  |       [ | ||||||
|  |         { | ||||||
|  |           registry: 'public.ecr.aws', | ||||||
|  |           username: 'AWS', | ||||||
|  |           password: 'world' | ||||||
|  |         } | ||||||
|  |       ] | ||||||
|  |     ] | ||||||
|  |   ])('given registry %p', async (registry, fqdn, accountIDsEnv, expected: aws.RegistryData[]) => { | ||||||
|  |     if (accountIDsEnv) { | ||||||
|  |       process.env.AWS_ACCOUNT_IDS = accountIDsEnv; | ||||||
|  |     } | ||||||
|  |     const accountIDs = aws.getAccountIDs(registry); | ||||||
|  |     const authData: AuthorizationData[] = []; | ||||||
|  |     if (accountIDs.length == 0) { | ||||||
|  |       mockEcrPublicGetAuthToken.mockImplementation(() => { | ||||||
|  |         return Promise.resolve({ | ||||||
|  |           authorizationData: { | ||||||
|  |             authorizationToken: Buffer.from(`AWS:world`).toString('base64'), | ||||||
|  |           } | ||||||
|  |         }); | ||||||
|  |       }); | ||||||
|  |     } else { | ||||||
|  |       aws.getAccountIDs(registry).forEach(accountID => { | ||||||
|  |         authData.push({ | ||||||
|  |           authorizationToken: Buffer.from(`${accountID}:world`).toString('base64'), | ||||||
|  |           proxyEndpoint: `${accountID}.${fqdn}` | ||||||
|  |         }); | ||||||
|  |       }); | ||||||
|  |       mockEcrGetAuthToken.mockImplementation(() => { | ||||||
|  |         return Promise.resolve({ | ||||||
|  |           authorizationData: authData | ||||||
|  |         }); | ||||||
|  |       }); | ||||||
|  |     } | ||||||
|  |     const regData = await aws.getRegistriesData(registry); | ||||||
|  |     expect(regData).toEqual(expected); | ||||||
|   }); |   }); | ||||||
| }); | }); | ||||||
|   | |||||||
| @@ -1,5 +1,4 @@ | |||||||
| import osm = require('os'); | import {expect, test} from '@jest/globals'; | ||||||
|  |  | ||||||
| import {getInputs} from '../src/context'; | import {getInputs} from '../src/context'; | ||||||
|  |  | ||||||
| test('with password and username getInputs does not throw error', async () => { | test('with password and username getInputs does not throw error', async () => { | ||||||
| @@ -8,5 +7,5 @@ test('with password and username getInputs does not throw error', async () => { | |||||||
|   process.env['INPUT_LOGOUT'] = 'true'; |   process.env['INPUT_LOGOUT'] = 'true'; | ||||||
|   expect(() => { |   expect(() => { | ||||||
|     getInputs(); |     getInputs(); | ||||||
|   }).not.toThrowError(); |   }).not.toThrow(); | ||||||
| }); | }); | ||||||
|   | |||||||
| @@ -1,24 +1,24 @@ | |||||||
|  | import {expect, jest, test} from '@jest/globals'; | ||||||
| import {loginStandard, logout} from '../src/docker'; | import {loginStandard, logout} from '../src/docker'; | ||||||
|  |  | ||||||
| import * as path from 'path'; | import * as path from 'path'; | ||||||
|  |  | ||||||
| import * as exec from '@actions/exec'; | import * as exec from '@actions/exec'; | ||||||
|  |  | ||||||
| process.env['RUNNER_TEMP'] = path.join(__dirname, 'runner'); | process.env['RUNNER_TEMP'] = path.join(__dirname, 'runner'); | ||||||
|  |  | ||||||
| test('loginStandard calls exec', async () => { | test('loginStandard calls exec', async () => { | ||||||
|   const execSpy: jest.SpyInstance = jest.spyOn(exec, 'getExecOutput'); |   // eslint-disable-next-line @typescript-eslint/ban-ts-comment | ||||||
|   execSpy.mockImplementation(() => |   // @ts-ignore | ||||||
|     Promise.resolve({ |   const execSpy = jest.spyOn(exec, 'getExecOutput').mockImplementation(async () => { | ||||||
|  |     return { | ||||||
|       exitCode: expect.any(Number), |       exitCode: expect.any(Number), | ||||||
|       stdout: expect.any(Function), |       stdout: expect.any(Function), | ||||||
|       stderr: expect.any(Function) |       stderr: expect.any(Function) | ||||||
|     }) |     }; | ||||||
|   ); |   }); | ||||||
|  |  | ||||||
|   const username: string = 'dbowie'; |   const username = 'dbowie'; | ||||||
|   const password: string = 'groundcontrol'; |   const password = 'groundcontrol'; | ||||||
|   const registry: string = 'https://ghcr.io'; |   const registry = 'https://ghcr.io'; | ||||||
|  |  | ||||||
|   await loginStandard(registry, username, password); |   await loginStandard(registry, username, password); | ||||||
|  |  | ||||||
| @@ -30,16 +30,17 @@ test('loginStandard calls exec', async () => { | |||||||
| }); | }); | ||||||
|  |  | ||||||
| test('logout calls exec', async () => { | test('logout calls exec', async () => { | ||||||
|   const execSpy: jest.SpyInstance = jest.spyOn(exec, 'getExecOutput'); |   // eslint-disable-next-line @typescript-eslint/ban-ts-comment | ||||||
|   execSpy.mockImplementation(() => |   // @ts-ignore | ||||||
|     Promise.resolve({ |   const execSpy = jest.spyOn(exec, 'getExecOutput').mockImplementation(async () => { | ||||||
|  |     return { | ||||||
|       exitCode: expect.any(Number), |       exitCode: expect.any(Number), | ||||||
|       stdout: expect.any(Function), |       stdout: expect.any(Function), | ||||||
|       stderr: expect.any(Function) |       stderr: expect.any(Function) | ||||||
|     }) |     }; | ||||||
|   ); |   }); | ||||||
|  |  | ||||||
|   const registry: string = 'https://ghcr.io'; |   const registry = 'https://ghcr.io'; | ||||||
|  |  | ||||||
|   await logout(registry); |   await logout(registry); | ||||||
|  |  | ||||||
|   | |||||||
| @@ -1,73 +1,65 @@ | |||||||
|  | import {expect, jest, test} from '@jest/globals'; | ||||||
| import osm = require('os'); | import osm = require('os'); | ||||||
|  |  | ||||||
| import {run} from '../src/main'; | import {main} from '../src/main'; | ||||||
| import * as docker from '../src/docker'; | import * as docker from '../src/docker'; | ||||||
| import * as stateHelper from '../src/state-helper'; | import * as stateHelper from '../src/state-helper'; | ||||||
|  |  | ||||||
| import * as core from '@actions/core'; |  | ||||||
|  |  | ||||||
| test('errors without username and password', async () => { | test('errors without username and password', async () => { | ||||||
|   const platSpy = jest.spyOn(osm, 'platform'); |   jest.spyOn(osm, 'platform').mockImplementation(() => 'linux'); | ||||||
|   platSpy.mockImplementation(() => 'linux'); |  | ||||||
|  |  | ||||||
|   process.env['INPUT_LOGOUT'] = 'true'; // default value |   process.env['INPUT_LOGOUT'] = 'true'; // default value | ||||||
|  |   await expect(main()).rejects.toThrow(new Error('Username and password required')); | ||||||
|   const coreSpy: jest.SpyInstance = jest.spyOn(core, 'setFailed'); |  | ||||||
|  |  | ||||||
|   await run(); |  | ||||||
|  |  | ||||||
|   expect(coreSpy).toHaveBeenCalledWith('Username and password required'); |  | ||||||
| }); | }); | ||||||
|  |  | ||||||
| test('successful with username and password', async () => { | test('successful with username and password', async () => { | ||||||
|   const platSpy = jest.spyOn(osm, 'platform'); |   jest.spyOn(osm, 'platform').mockImplementation(() => 'linux'); | ||||||
|   platSpy.mockImplementation(() => 'linux'); |   const setRegistrySpy = jest.spyOn(stateHelper, 'setRegistry'); | ||||||
|  |   const setLogoutSpy = jest.spyOn(stateHelper, 'setLogout'); | ||||||
|  |   const dockerSpy = jest.spyOn(docker, 'login').mockImplementation(() => Promise.resolve()); | ||||||
|  |  | ||||||
|   const setRegistrySpy: jest.SpyInstance = jest.spyOn(stateHelper, 'setRegistry'); |   const username = 'dbowie'; | ||||||
|   const setLogoutSpy: jest.SpyInstance = jest.spyOn(stateHelper, 'setLogout'); |  | ||||||
|   const dockerSpy: jest.SpyInstance = jest.spyOn(docker, 'login'); |  | ||||||
|   dockerSpy.mockImplementation(() => {}); |  | ||||||
|  |  | ||||||
|   const username: string = 'dbowie'; |  | ||||||
|   process.env[`INPUT_USERNAME`] = username; |   process.env[`INPUT_USERNAME`] = username; | ||||||
|  |  | ||||||
|   const password: string = 'groundcontrol'; |   const password = 'groundcontrol'; | ||||||
|   process.env[`INPUT_PASSWORD`] = password; |   process.env[`INPUT_PASSWORD`] = password; | ||||||
|  |  | ||||||
|   const logout: boolean = false; |   const ecr = 'auto'; | ||||||
|  |   process.env['INPUT_ECR'] = ecr; | ||||||
|  |  | ||||||
|  |   const logout = false; | ||||||
|   process.env['INPUT_LOGOUT'] = String(logout); |   process.env['INPUT_LOGOUT'] = String(logout); | ||||||
|  |  | ||||||
|   await run(); |   await main(); | ||||||
|  |  | ||||||
|   expect(setRegistrySpy).toHaveBeenCalledWith(''); |   expect(setRegistrySpy).toHaveBeenCalledWith(''); | ||||||
|   expect(setLogoutSpy).toHaveBeenCalledWith(logout); |   expect(setLogoutSpy).toHaveBeenCalledWith(logout); | ||||||
|   expect(dockerSpy).toHaveBeenCalledWith('', username, password); |   expect(dockerSpy).toHaveBeenCalledWith('', username, password, ecr); | ||||||
| }); | }); | ||||||
|  |  | ||||||
| test('calls docker login', async () => { | test('calls docker login', async () => { | ||||||
|   const platSpy = jest.spyOn(osm, 'platform'); |   jest.spyOn(osm, 'platform').mockImplementation(() => 'linux'); | ||||||
|   platSpy.mockImplementation(() => 'linux'); |   const setRegistrySpy = jest.spyOn(stateHelper, 'setRegistry'); | ||||||
|  |   const setLogoutSpy = jest.spyOn(stateHelper, 'setLogout'); | ||||||
|  |   const dockerSpy = jest.spyOn(docker, 'login').mockImplementation(() => Promise.resolve()); | ||||||
|  |  | ||||||
|   const setRegistrySpy: jest.SpyInstance = jest.spyOn(stateHelper, 'setRegistry'); |   const username = 'dbowie'; | ||||||
|   const setLogoutSpy: jest.SpyInstance = jest.spyOn(stateHelper, 'setLogout'); |  | ||||||
|   const dockerSpy: jest.SpyInstance = jest.spyOn(docker, 'login'); |  | ||||||
|   dockerSpy.mockImplementation(() => {}); |  | ||||||
|  |  | ||||||
|   const username: string = 'dbowie'; |  | ||||||
|   process.env[`INPUT_USERNAME`] = username; |   process.env[`INPUT_USERNAME`] = username; | ||||||
|  |  | ||||||
|   const password: string = 'groundcontrol'; |   const password = 'groundcontrol'; | ||||||
|   process.env[`INPUT_PASSWORD`] = password; |   process.env[`INPUT_PASSWORD`] = password; | ||||||
|  |  | ||||||
|   const registry: string = 'ghcr.io'; |   const registry = 'ghcr.io'; | ||||||
|   process.env[`INPUT_REGISTRY`] = registry; |   process.env[`INPUT_REGISTRY`] = registry; | ||||||
|  |  | ||||||
|   const logout: boolean = true; |   const ecr = 'auto'; | ||||||
|  |   process.env['INPUT_ECR'] = ecr; | ||||||
|  |  | ||||||
|  |   const logout = true; | ||||||
|   process.env['INPUT_LOGOUT'] = String(logout); |   process.env['INPUT_LOGOUT'] = String(logout); | ||||||
|  |  | ||||||
|   await run(); |   await main(); | ||||||
|  |  | ||||||
|   expect(setRegistrySpy).toHaveBeenCalledWith(registry); |   expect(setRegistrySpy).toHaveBeenCalledWith(registry); | ||||||
|   expect(setLogoutSpy).toHaveBeenCalledWith(logout); |   expect(setLogoutSpy).toHaveBeenCalledWith(logout); | ||||||
|   expect(dockerSpy).toHaveBeenCalledWith(registry, username, password); |   expect(dockerSpy).toHaveBeenCalledWith(registry, username, password, ecr); | ||||||
| }); | }); | ||||||
|   | |||||||
| @@ -16,12 +16,16 @@ inputs: | |||||||
|   password: |   password: | ||||||
|     description: 'Password or personal access token used to log against the Docker registry' |     description: 'Password or personal access token used to log against the Docker registry' | ||||||
|     required: false |     required: false | ||||||
|  |   ecr: | ||||||
|  |     description: 'Specifies whether the given registry is ECR (auto, true or false)' | ||||||
|  |     default: 'auto' | ||||||
|  |     required: false | ||||||
|   logout: |   logout: | ||||||
|     description: 'Log out from the Docker registry at the end of a job' |     description: 'Log out from the Docker registry at the end of a job' | ||||||
|     default: 'true' |     default: 'true' | ||||||
|     required: false |     required: false | ||||||
|  |  | ||||||
| runs: | runs: | ||||||
|   using: 'node12' |   using: 'node16' | ||||||
|   main: 'dist/index.js' |   main: 'dist/index.js' | ||||||
|   post: 'dist/index.js' |   post: 'dist/index.js' | ||||||
|   | |||||||
							
								
								
									
										3
									
								
								codecov.yml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										3
									
								
								codecov.yml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,3 @@ | |||||||
|  | comment: false | ||||||
|  | github_checks: | ||||||
|  |   annotations: false | ||||||
							
								
								
									
										78
									
								
								dev.Dockerfile
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										78
									
								
								dev.Dockerfile
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,78 @@ | |||||||
|  | # syntax=docker/dockerfile:1 | ||||||
|  |  | ||||||
|  | ARG NODE_VERSION=16 | ||||||
|  | ARG DOCKER_VERSION=20.10.13 | ||||||
|  | ARG BUILDX_VERSION=0.8.1 | ||||||
|  |  | ||||||
|  | FROM node:${NODE_VERSION}-alpine AS base | ||||||
|  | RUN apk add --no-cache cpio findutils git | ||||||
|  | WORKDIR /src | ||||||
|  |  | ||||||
|  | FROM base AS deps | ||||||
|  | RUN --mount=type=bind,target=.,rw \ | ||||||
|  |   --mount=type=cache,target=/src/node_modules \ | ||||||
|  |   yarn install && mkdir /vendor && cp yarn.lock /vendor | ||||||
|  |  | ||||||
|  | FROM scratch AS vendor-update | ||||||
|  | COPY --from=deps /vendor / | ||||||
|  |  | ||||||
|  | FROM deps AS vendor-validate | ||||||
|  | RUN --mount=type=bind,target=.,rw <<EOT | ||||||
|  | set -e | ||||||
|  | git add -A | ||||||
|  | cp -rf /vendor/* . | ||||||
|  | if [ -n "$(git status --porcelain -- yarn.lock)" ]; then | ||||||
|  |   echo >&2 'ERROR: Vendor result differs. Please vendor your package with "docker buildx bake vendor-update"' | ||||||
|  |   git status --porcelain -- yarn.lock | ||||||
|  |   exit 1 | ||||||
|  | fi | ||||||
|  | EOT | ||||||
|  |  | ||||||
|  | FROM deps AS build | ||||||
|  | RUN --mount=type=bind,target=.,rw \ | ||||||
|  |   --mount=type=cache,target=/src/node_modules \ | ||||||
|  |   yarn run build && mkdir /out && cp -Rf dist /out/ | ||||||
|  |  | ||||||
|  | FROM scratch AS build-update | ||||||
|  | COPY --from=build /out / | ||||||
|  |  | ||||||
|  | FROM build AS build-validate | ||||||
|  | RUN --mount=type=bind,target=.,rw <<EOT | ||||||
|  | set -e | ||||||
|  | git add -A | ||||||
|  | cp -rf /out/* . | ||||||
|  | if [ -n "$(git status --porcelain -- dist)" ]; then | ||||||
|  |   echo >&2 'ERROR: Build result differs. Please build first with "docker buildx bake build"' | ||||||
|  |   git status --porcelain -- dist | ||||||
|  |   exit 1 | ||||||
|  | fi | ||||||
|  | EOT | ||||||
|  |  | ||||||
|  | FROM deps AS format | ||||||
|  | RUN --mount=type=bind,target=.,rw \ | ||||||
|  |   --mount=type=cache,target=/src/node_modules \ | ||||||
|  |   yarn run format \ | ||||||
|  |   && mkdir /out && find . -name '*.ts' -not -path './node_modules/*' | cpio -pdm /out | ||||||
|  |  | ||||||
|  | FROM scratch AS format-update | ||||||
|  | COPY --from=format /out / | ||||||
|  |  | ||||||
|  | FROM deps AS lint | ||||||
|  | RUN --mount=type=bind,target=.,rw \ | ||||||
|  |   --mount=type=cache,target=/src/node_modules \ | ||||||
|  |   yarn run lint | ||||||
|  |  | ||||||
|  | FROM docker:${DOCKER_VERSION} as docker | ||||||
|  | FROM docker/buildx-bin:${BUILDX_VERSION} as buildx | ||||||
|  |  | ||||||
|  | FROM deps AS test | ||||||
|  | ENV RUNNER_TEMP=/tmp/github_runner | ||||||
|  | ENV RUNNER_TOOL_CACHE=/tmp/github_tool_cache | ||||||
|  | RUN --mount=type=bind,target=.,rw \ | ||||||
|  |   --mount=type=cache,target=/src/node_modules \ | ||||||
|  |   --mount=type=bind,from=docker,source=/usr/local/bin/docker,target=/usr/bin/docker \ | ||||||
|  |   --mount=type=bind,from=buildx,source=/buildx,target=/usr/libexec/docker/cli-plugins/docker-buildx \ | ||||||
|  |   yarn run test --coverageDirectory=/tmp/coverage | ||||||
|  |  | ||||||
|  | FROM scratch AS test-coverage | ||||||
|  | COPY --from=test /tmp/coverage / | ||||||
							
								
								
									
										5350
									
								
								dist/index.js
									
									
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										5350
									
								
								dist/index.js
									
									
									
										generated
									
									
										vendored
									
									
								
							
										
											
												File diff suppressed because one or more lines are too long
											
										
									
								
							
							
								
								
									
										1
									
								
								dist/index.js.map
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										1
									
								
								dist/index.js.map
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							
										
											
												File diff suppressed because one or more lines are too long
											
										
									
								
							
							
								
								
									
										12128
									
								
								dist/licenses.txt
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										12128
									
								
								dist/licenses.txt
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										1
									
								
								dist/sourcemap-register.js
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										1
									
								
								dist/sourcemap-register.js
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							
										
											
												File diff suppressed because one or more lines are too long
											
										
									
								
							| @@ -1,13 +1,3 @@ | |||||||
| variable "NODE_VERSION" { |  | ||||||
|   default = "12" |  | ||||||
| } |  | ||||||
|  |  | ||||||
| target "node-version" { |  | ||||||
|   args = { |  | ||||||
|     NODE_VERSION = NODE_VERSION |  | ||||||
|   } |  | ||||||
| } |  | ||||||
|  |  | ||||||
| group "default" { | group "default" { | ||||||
|   targets = ["build"] |   targets = ["build"] | ||||||
| } | } | ||||||
| @@ -17,51 +7,47 @@ group "pre-checkin" { | |||||||
| } | } | ||||||
|  |  | ||||||
| group "validate" { | group "validate" { | ||||||
|   targets = ["format-validate", "build-validate", "vendor-validate"] |   targets = ["lint", "build-validate", "vendor-validate"] | ||||||
| } | } | ||||||
|  |  | ||||||
| target "build" { | target "build" { | ||||||
|   inherits = ["node-version"] |   dockerfile = "dev.Dockerfile" | ||||||
|   dockerfile = "./hack/build.Dockerfile" |  | ||||||
|   target = "build-update" |   target = "build-update" | ||||||
|   output = ["."] |   output = ["."] | ||||||
| } | } | ||||||
|  |  | ||||||
| target "build-validate" { | target "build-validate" { | ||||||
|   inherits = ["node-version"] |   dockerfile = "dev.Dockerfile" | ||||||
|   dockerfile = "./hack/build.Dockerfile" |  | ||||||
|   target = "build-validate" |   target = "build-validate" | ||||||
|  |   output = ["type=cacheonly"] | ||||||
| } | } | ||||||
|  |  | ||||||
| target "format" { | target "format" { | ||||||
|   inherits = ["node-version"] |   dockerfile = "dev.Dockerfile" | ||||||
|   dockerfile = "./hack/build.Dockerfile" |  | ||||||
|   target = "format-update" |   target = "format-update" | ||||||
|   output = ["."] |   output = ["."] | ||||||
| } | } | ||||||
|  |  | ||||||
| target "format-validate" { | target "lint" { | ||||||
|   inherits = ["node-version"] |   dockerfile = "dev.Dockerfile" | ||||||
|   dockerfile = "./hack/build.Dockerfile" |   target = "lint" | ||||||
|   target = "format-validate" |   output = ["type=cacheonly"] | ||||||
| } | } | ||||||
|  |  | ||||||
| target "vendor-update" { | target "vendor-update" { | ||||||
|   inherits = ["node-version"] |   dockerfile = "dev.Dockerfile" | ||||||
|   dockerfile = "./hack/vendor.Dockerfile" |   target = "vendor-update" | ||||||
|   target = "update" |  | ||||||
|   output = ["."] |   output = ["."] | ||||||
| } | } | ||||||
|  |  | ||||||
| target "vendor-validate" { | target "vendor-validate" { | ||||||
|   inherits = ["node-version"] |   dockerfile = "dev.Dockerfile" | ||||||
|   dockerfile = "./hack/vendor.Dockerfile" |   target = "vendor-validate" | ||||||
|   target = "validate" |   output = ["type=cacheonly"] | ||||||
| } | } | ||||||
|  |  | ||||||
| target "test" { | target "test" { | ||||||
|   inherits = ["node-version"] |   dockerfile = "dev.Dockerfile" | ||||||
|   dockerfile = "./hack/test.Dockerfile" |  | ||||||
|   target = "test-coverage" |   target = "test-coverage" | ||||||
|   output = ["./coverage"] |   output = ["./coverage"] | ||||||
| } | } | ||||||
|   | |||||||
| @@ -1,42 +0,0 @@ | |||||||
| # syntax=docker/dockerfile:1.2 |  | ||||||
| ARG NODE_VERSION |  | ||||||
|  |  | ||||||
| FROM node:${NODE_VERSION}-alpine AS base |  | ||||||
| RUN apk add --no-cache cpio findutils git |  | ||||||
| WORKDIR /src |  | ||||||
|  |  | ||||||
| FROM base AS deps |  | ||||||
| RUN --mount=type=bind,target=.,rw \ |  | ||||||
|   --mount=type=cache,target=/src/node_modules \ |  | ||||||
|   yarn install |  | ||||||
|  |  | ||||||
| FROM deps AS build |  | ||||||
| RUN --mount=type=bind,target=.,rw \ |  | ||||||
|   --mount=type=cache,target=/src/node_modules \ |  | ||||||
|   yarn run build && mkdir /out && cp -Rf dist /out/ |  | ||||||
|  |  | ||||||
| FROM scratch AS build-update |  | ||||||
| COPY --from=build /out / |  | ||||||
|  |  | ||||||
| FROM build AS build-validate |  | ||||||
| RUN --mount=type=bind,target=.,rw \ |  | ||||||
|   git add -A && cp -rf /out/* .; \ |  | ||||||
|   if [ -n "$(git status --porcelain -- dist)" ]; then \ |  | ||||||
|     echo >&2 'ERROR: Build result differs. Please build first with "docker buildx bake build"'; \ |  | ||||||
|     git status --porcelain -- dist; \ |  | ||||||
|     exit 1; \ |  | ||||||
|   fi |  | ||||||
|  |  | ||||||
| FROM deps AS format |  | ||||||
| RUN --mount=type=bind,target=.,rw \ |  | ||||||
|   --mount=type=cache,target=/src/node_modules \ |  | ||||||
|   yarn run format \ |  | ||||||
|   && mkdir /out && find . -name '*.ts' -not -path './node_modules/*' | cpio -pdm /out |  | ||||||
|  |  | ||||||
| FROM scratch AS format-update |  | ||||||
| COPY --from=format /out / |  | ||||||
|  |  | ||||||
| FROM deps AS format-validate |  | ||||||
| RUN --mount=type=bind,target=.,rw \ |  | ||||||
|   --mount=type=cache,target=/src/node_modules \ |  | ||||||
|   yarn run format-check \ |  | ||||||
| @@ -1,34 +0,0 @@ | |||||||
| # syntax=docker/dockerfile:1.2 |  | ||||||
| ARG NODE_VERSION |  | ||||||
|  |  | ||||||
| FROM node:${NODE_VERSION}-alpine AS base |  | ||||||
| RUN apk add --no-cache binutils curl git unzip |  | ||||||
| ENV GLIBC_VER=2.31-r0 |  | ||||||
| RUN curl -sL "https://alpine-pkgs.sgerrand.com/sgerrand.rsa.pub" -o "/etc/apk/keys/sgerrand.rsa.pub" \ |  | ||||||
|   && curl -sLO "https://github.com/sgerrand/alpine-pkg-glibc/releases/download/${GLIBC_VER}/glibc-${GLIBC_VER}.apk" \ |  | ||||||
|   && curl -sLO "https://github.com/sgerrand/alpine-pkg-glibc/releases/download/${GLIBC_VER}/glibc-bin-${GLIBC_VER}.apk" \ |  | ||||||
|   && apk add --no-cache \ |  | ||||||
|     glibc-${GLIBC_VER}.apk \ |  | ||||||
|     glibc-bin-${GLIBC_VER}.apk \ |  | ||||||
|   && curl -sL "https://awscli.amazonaws.com/awscli-exe-linux-x86_64.zip" -o "awscliv2.zip" \ |  | ||||||
|   && unzip -qq "awscliv2.zip" \ |  | ||||||
|   && ./aws/install \ |  | ||||||
|   && aws --version |  | ||||||
| WORKDIR /src |  | ||||||
|  |  | ||||||
| FROM base AS deps |  | ||||||
| RUN --mount=type=bind,target=.,rw \ |  | ||||||
|   --mount=type=cache,target=/src/node_modules \ |  | ||||||
|   yarn install |  | ||||||
|  |  | ||||||
| FROM deps AS test |  | ||||||
| ENV RUNNER_TEMP=/tmp/github_runner |  | ||||||
| ENV RUNNER_TOOL_CACHE=/tmp/github_tool_cache |  | ||||||
| RUN --mount=type=bind,target=.,rw \ |  | ||||||
|   --mount=type=cache,target=/src/node_modules \ |  | ||||||
|   --mount=type=bind,from=crazymax/docker,source=/usr/libexec/docker/cli-plugins/docker-buildx,target=/usr/libexec/docker/cli-plugins/docker-buildx \ |  | ||||||
|   --mount=type=bind,from=crazymax/docker,source=/usr/local/bin/docker,target=/usr/bin/docker \ |  | ||||||
|   yarn run test --coverageDirectory=/tmp/coverage |  | ||||||
|  |  | ||||||
| FROM scratch AS test-coverage |  | ||||||
| COPY --from=test /tmp/coverage / |  | ||||||
| @@ -1,23 +0,0 @@ | |||||||
| # syntax=docker/dockerfile:1.2 |  | ||||||
| ARG NODE_VERSION |  | ||||||
|  |  | ||||||
| FROM node:${NODE_VERSION}-alpine AS base |  | ||||||
| RUN apk add --no-cache git |  | ||||||
| WORKDIR /src |  | ||||||
|  |  | ||||||
| FROM base AS vendored |  | ||||||
| RUN --mount=type=bind,target=.,rw \ |  | ||||||
|   --mount=type=cache,target=/src/node_modules \ |  | ||||||
|   yarn install && mkdir /out && cp yarn.lock /out |  | ||||||
|  |  | ||||||
| FROM scratch AS update |  | ||||||
| COPY --from=vendored /out / |  | ||||||
|  |  | ||||||
| FROM vendored AS validate |  | ||||||
| RUN --mount=type=bind,target=.,rw \ |  | ||||||
|   git add -A && cp -rf /out/* .; \ |  | ||||||
|   if [ -n "$(git status --porcelain -- yarn.lock)" ]; then \ |  | ||||||
|     echo >&2 'ERROR: Vendor result differs. Please vendor your package with "docker buildx bake vendor-update"'; \ |  | ||||||
|     git status --porcelain -- yarn.lock; \ |  | ||||||
|     exit 1; \ |  | ||||||
|   fi |  | ||||||
| @@ -1,12 +0,0 @@ | |||||||
| module.exports = { |  | ||||||
|   clearMocks: true, |  | ||||||
|   moduleFileExtensions: ['js', 'ts'], |  | ||||||
|   setupFiles: ["dotenv/config"], |  | ||||||
|   testEnvironment: 'node', |  | ||||||
|   testMatch: ['**/*.test.ts'], |  | ||||||
|   testRunner: 'jest-circus/runner', |  | ||||||
|   transform: { |  | ||||||
|     '^.+\\.ts$': 'ts-jest' |  | ||||||
|   }, |  | ||||||
|   verbose: false |  | ||||||
| } |  | ||||||
							
								
								
									
										29
									
								
								jest.config.ts
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										29
									
								
								jest.config.ts
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,29 @@ | |||||||
|  | import fs from 'fs'; | ||||||
|  | import os from 'os'; | ||||||
|  | import path from 'path'; | ||||||
|  |  | ||||||
|  | const tmpDir = fs.mkdtempSync(path.join(os.tmpdir(), 'docker-login-action-')).split(path.sep).join(path.posix.sep); | ||||||
|  |  | ||||||
|  | process.env = Object.assign({}, process.env, { | ||||||
|  |   TEMP: tmpDir, | ||||||
|  |   GITHUB_REPOSITORY: 'docker/login-action', | ||||||
|  |   RUNNER_TEMP: path.join(tmpDir, 'runner-temp').split(path.sep).join(path.posix.sep), | ||||||
|  |   RUNNER_TOOL_CACHE: path.join(tmpDir, 'runner-tool-cache').split(path.sep).join(path.posix.sep) | ||||||
|  | }) as { | ||||||
|  |   [key: string]: string; | ||||||
|  | }; | ||||||
|  |  | ||||||
|  | module.exports = { | ||||||
|  |   clearMocks: true, | ||||||
|  |   moduleFileExtensions: ['js', 'ts'], | ||||||
|  |   testMatch: ['**/*.test.ts'], | ||||||
|  |   transform: { | ||||||
|  |     '^.+\\.ts$': 'ts-jest' | ||||||
|  |   }, | ||||||
|  |   moduleNameMapper: { | ||||||
|  |     '^csv-parse/sync': '<rootDir>/node_modules/csv-parse/dist/cjs/sync.cjs' | ||||||
|  |   }, | ||||||
|  |   collectCoverageFrom: ['src/**/{!(main.ts),}.ts'], | ||||||
|  |   coveragePathIgnorePatterns: ['lib/', 'node_modules/', '__tests__/'], | ||||||
|  |   verbose: true | ||||||
|  | }; | ||||||
							
								
								
									
										42
									
								
								package.json
									
									
									
									
									
								
							
							
						
						
									
										42
									
								
								package.json
									
									
									
									
									
								
							| @@ -3,11 +3,11 @@ | |||||||
|   "description": "GitHub Action to login against a Docker registry", |   "description": "GitHub Action to login against a Docker registry", | ||||||
|   "main": "lib/main.js", |   "main": "lib/main.js", | ||||||
|   "scripts": { |   "scripts": { | ||||||
|     "build": "tsc && ncc build", |     "build": "ncc build src/main.ts --source-map --minify --license licenses.txt", | ||||||
|     "format": "prettier --write **/*.ts", |     "lint": "eslint src/**/*.ts __tests__/**/*.ts", | ||||||
|     "format-check": "prettier --check **/*.ts", |     "format": "eslint --fix src/**/*.ts __tests__/**/*.ts", | ||||||
|     "test": "jest --coverage", |     "test": "jest --coverage", | ||||||
|     "pre-checkin": "yarn run format && yarn run build" |     "all": "yarn run build && yarn run format && yarn test" | ||||||
|   }, |   }, | ||||||
|   "repository": { |   "repository": { | ||||||
|     "type": "git", |     "type": "git", | ||||||
| @@ -27,22 +27,26 @@ | |||||||
|   ], |   ], | ||||||
|   "license": "MIT", |   "license": "MIT", | ||||||
|   "dependencies": { |   "dependencies": { | ||||||
|     "@actions/core": "^1.4.0", |     "@actions/core": "^1.10.0", | ||||||
|     "@actions/exec": "^1.1.0", |     "@aws-sdk/client-ecr": "^3.347.1", | ||||||
|     "@actions/io": "^1.1.1", |     "@aws-sdk/client-ecr-public": "^3.347.1", | ||||||
|     "semver": "^7.3.5" |     "@docker/actions-toolkit": "^0.2.0", | ||||||
|  |     "http-proxy-agent": "^7.0.0", | ||||||
|  |     "https-proxy-agent": "^7.0.0" | ||||||
|   }, |   }, | ||||||
|   "devDependencies": { |   "devDependencies": { | ||||||
|     "@types/jest": "^26.0.3", |     "@types/node": "^16.18.21", | ||||||
|     "@types/node": "^14.0.14", |     "@typescript-eslint/eslint-plugin": "^5.56.0", | ||||||
|     "@vercel/ncc": "^0.23.0", |     "@typescript-eslint/parser": "^5.56.0", | ||||||
|     "dotenv": "^8.2.0", |     "@vercel/ncc": "^0.36.1", | ||||||
|     "jest": "^26.1.0", |     "eslint": "^8.36.0", | ||||||
|     "jest-circus": "^26.1.0", |     "eslint-config-prettier": "^8.8.0", | ||||||
|     "jest-runtime": "^26.1.0", |     "eslint-plugin-jest": "^27.2.1", | ||||||
|     "prettier": "^2.0.5", |     "eslint-plugin-prettier": "^4.2.1", | ||||||
|     "ts-jest": "^26.1.1", |     "jest": "^29.5.0", | ||||||
|     "typescript": "^3.9.5", |     "prettier": "^2.8.7", | ||||||
|     "typescript-formatter": "^7.2.2" |     "ts-jest": "^29.0.5", | ||||||
|  |     "ts-node": "^10.9.1", | ||||||
|  |     "typescript": "^4.9.5" | ||||||
|   } |   } | ||||||
| } | } | ||||||
|   | |||||||
							
								
								
									
										151
									
								
								src/aws.ts
									
									
									
									
									
								
							
							
						
						
									
										151
									
								
								src/aws.ts
									
									
									
									
									
								
							| @@ -1,6 +1,9 @@ | |||||||
| import * as semver from 'semver'; | import * as core from '@actions/core'; | ||||||
| import * as exec from '@actions/exec'; | import {ECR} from '@aws-sdk/client-ecr'; | ||||||
| import * as io from '@actions/io'; | import {ECRPUBLIC} from '@aws-sdk/client-ecr-public'; | ||||||
|  | import {NodeHttpHandler} from '@aws-sdk/node-http-handler'; | ||||||
|  | import {HttpProxyAgent} from 'http-proxy-agent'; | ||||||
|  | import {HttpsProxyAgent} from 'https-proxy-agent'; | ||||||
|  |  | ||||||
| const ecrRegistryRegex = /^(([0-9]{12})\.dkr\.ecr\.(.+)\.amazonaws\.com(.cn)?)(\/([^:]+)(:.+)?)?$/; | const ecrRegistryRegex = /^(([0-9]{12})\.dkr\.ecr\.(.+)\.amazonaws\.com(.cn)?)(\/([^:]+)(:.+)?)?$/; | ||||||
|  |  | ||||||
| @@ -31,68 +34,104 @@ export const getAccountIDs = (registry: string): string[] => { | |||||||
|   if (!matches) { |   if (!matches) { | ||||||
|     return []; |     return []; | ||||||
|   } |   } | ||||||
|   let accountIDs: Array<string> = [matches[2]]; |   const accountIDs: Array<string> = [matches[2]]; | ||||||
|   if (process.env.AWS_ACCOUNT_IDS) { |   if (process.env.AWS_ACCOUNT_IDS) { | ||||||
|     accountIDs.push(...process.env.AWS_ACCOUNT_IDS.split(',')); |     accountIDs.push(...process.env.AWS_ACCOUNT_IDS.split(',')); | ||||||
|   } |   } | ||||||
|   return accountIDs.filter((item, index) => accountIDs.indexOf(item) === index); |   return accountIDs.filter((item, index) => accountIDs.indexOf(item) === index); | ||||||
| }; | }; | ||||||
|  |  | ||||||
| export const getCLI = async (): Promise<string> => { | export interface RegistryData { | ||||||
|   return io.which('aws', true); |   registry: string; | ||||||
| }; |   username: string; | ||||||
|  |   password: string; | ||||||
|  | } | ||||||
|  |  | ||||||
| export const execCLI = async (args: string[]): Promise<string> => { | export const getRegistriesData = async (registry: string, username?: string, password?: string): Promise<RegistryData[]> => { | ||||||
|   return exec |   const region = getRegion(registry); | ||||||
|     .getExecOutput(await getCLI(), args, { |   const accountIDs = getAccountIDs(registry); | ||||||
|       ignoreReturnCode: true, |  | ||||||
|       silent: true |   const authTokenRequest = {}; | ||||||
|     }) |   if (accountIDs.length > 0) { | ||||||
|     .then(res => { |     core.debug(`Requesting AWS ECR auth token for ${accountIDs.join(', ')}`); | ||||||
|       if (res.stderr.length > 0 && res.exitCode != 0) { |     authTokenRequest['registryIds'] = accountIDs; | ||||||
|         throw new Error(res.stderr.trim()); |   } | ||||||
|       } else if (res.stderr.length > 0) { |  | ||||||
|         return res.stderr.trim(); |   let httpProxyAgent; | ||||||
|       } else { |   const httpProxy = process.env.http_proxy || process.env.HTTP_PROXY || ''; | ||||||
|         return res.stdout.trim(); |   if (httpProxy) { | ||||||
|  |     core.debug(`Using http proxy ${httpProxy}`); | ||||||
|  |     httpProxyAgent = new HttpProxyAgent(httpProxy); | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   let httpsProxyAgent; | ||||||
|  |   const httpsProxy = process.env.https_proxy || process.env.HTTPS_PROXY || ''; | ||||||
|  |   if (httpsProxy) { | ||||||
|  |     core.debug(`Using https proxy ${httpsProxy}`); | ||||||
|  |     httpsProxyAgent = new HttpsProxyAgent(httpsProxy); | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   const credentials = | ||||||
|  |     username && password | ||||||
|  |       ? { | ||||||
|  |           accessKeyId: username, | ||||||
|  |           secretAccessKey: password | ||||||
|  |         } | ||||||
|  |       : undefined; | ||||||
|  |  | ||||||
|  |   if (isPubECR(registry)) { | ||||||
|  |     core.info(`AWS Public ECR detected with ${region} region`); | ||||||
|  |     const ecrPublic = new ECRPUBLIC({ | ||||||
|  |       customUserAgent: 'docker-login-action', | ||||||
|  |       credentials, | ||||||
|  |       region: region, | ||||||
|  |       requestHandler: new NodeHttpHandler({ | ||||||
|  |         httpAgent: httpProxyAgent, | ||||||
|  |         httpsAgent: httpsProxyAgent | ||||||
|  |       }) | ||||||
|  |     }); | ||||||
|  |     const authTokenResponse = await ecrPublic.getAuthorizationToken(authTokenRequest); | ||||||
|  |     if (!authTokenResponse.authorizationData || !authTokenResponse.authorizationData.authorizationToken) { | ||||||
|  |       throw new Error('Could not retrieve an authorization token from AWS Public ECR'); | ||||||
|  |     } | ||||||
|  |     const authToken = Buffer.from(authTokenResponse.authorizationData.authorizationToken, 'base64').toString('utf-8'); | ||||||
|  |     const creds = authToken.split(':', 2); | ||||||
|  |     core.setSecret(creds[0]); // redacted in workflow logs | ||||||
|  |     core.setSecret(creds[1]); // redacted in workflow logs | ||||||
|  |     return [ | ||||||
|  |       { | ||||||
|  |         registry: 'public.ecr.aws', | ||||||
|  |         username: creds[0], | ||||||
|  |         password: creds[1] | ||||||
|       } |       } | ||||||
|     }); |     ]; | ||||||
| }; |  | ||||||
|  |  | ||||||
| export const getCLIVersion = async (): Promise<string> => { |  | ||||||
|   return parseCLIVersion(await execCLI(['--version'])); |  | ||||||
| }; |  | ||||||
|  |  | ||||||
| export const parseCLIVersion = async (stdout: string): Promise<string> => { |  | ||||||
|   const matches = /aws-cli\/([0-9.]+)/.exec(stdout); |  | ||||||
|   if (!matches) { |  | ||||||
|     throw new Error(`Cannot parse AWS CLI version`); |  | ||||||
|   } |  | ||||||
|   return semver.clean(matches[1]); |  | ||||||
| }; |  | ||||||
|  |  | ||||||
| export const getDockerLoginCmds = async ( |  | ||||||
|   cliVersion: string, |  | ||||||
|   registry: string, |  | ||||||
|   region: string, |  | ||||||
|   accountIDs: string[] |  | ||||||
| ): Promise<string[]> => { |  | ||||||
|   let ecrCmd = (await isPubECR(registry)) ? 'ecr-public' : 'ecr'; |  | ||||||
|   if (semver.satisfies(cliVersion, '>=2.0.0') || (await isPubECR(registry))) { |  | ||||||
|     return execCLI([ecrCmd, 'get-login-password', '--region', region]).then(pwd => { |  | ||||||
|       return [`docker login --username AWS --password ${pwd} ${registry}`]; |  | ||||||
|     }); |  | ||||||
|   } else { |   } else { | ||||||
|     return execCLI([ |     core.info(`AWS ECR detected with ${region} region`); | ||||||
|       ecrCmd, |     const ecr = new ECR({ | ||||||
|       'get-login', |       customUserAgent: 'docker-login-action', | ||||||
|       '--region', |       credentials, | ||||||
|       region, |       region: region, | ||||||
|       '--registry-ids', |       requestHandler: new NodeHttpHandler({ | ||||||
|       accountIDs.join(' '), |         httpAgent: httpProxyAgent, | ||||||
|       '--no-include-email' |         httpsAgent: httpsProxyAgent | ||||||
|     ]).then(dockerLoginCmds => { |       }) | ||||||
|       return dockerLoginCmds.trim().split(`\n`); |  | ||||||
|     }); |     }); | ||||||
|  |     const authTokenResponse = await ecr.getAuthorizationToken(authTokenRequest); | ||||||
|  |     if (!Array.isArray(authTokenResponse.authorizationData) || !authTokenResponse.authorizationData.length) { | ||||||
|  |       throw new Error('Could not retrieve an authorization token from AWS ECR'); | ||||||
|  |     } | ||||||
|  |     const regDatas: RegistryData[] = []; | ||||||
|  |     for (const authData of authTokenResponse.authorizationData) { | ||||||
|  |       const authToken = Buffer.from(authData.authorizationToken || '', 'base64').toString('utf-8'); | ||||||
|  |       const creds = authToken.split(':', 2); | ||||||
|  |       core.setSecret(creds[0]); // redacted in workflow logs | ||||||
|  |       core.setSecret(creds[1]); // redacted in workflow logs | ||||||
|  |       regDatas.push({ | ||||||
|  |         registry: authData.proxyEndpoint || '', | ||||||
|  |         username: creds[0], | ||||||
|  |         password: creds[1] | ||||||
|  |       }); | ||||||
|  |     } | ||||||
|  |     return regDatas; | ||||||
|   } |   } | ||||||
| }; | }; | ||||||
|   | |||||||
| @@ -4,6 +4,7 @@ export interface Inputs { | |||||||
|   registry: string; |   registry: string; | ||||||
|   username: string; |   username: string; | ||||||
|   password: string; |   password: string; | ||||||
|  |   ecr: string; | ||||||
|   logout: boolean; |   logout: boolean; | ||||||
| } | } | ||||||
|  |  | ||||||
| @@ -12,6 +13,7 @@ export function getInputs(): Inputs { | |||||||
|     registry: core.getInput('registry'), |     registry: core.getInput('registry'), | ||||||
|     username: core.getInput('username'), |     username: core.getInput('username'), | ||||||
|     password: core.getInput('password'), |     password: core.getInput('password'), | ||||||
|  |     ecr: core.getInput('ecr'), | ||||||
|     logout: core.getBooleanInput('logout') |     logout: core.getBooleanInput('logout') | ||||||
|   }; |   }; | ||||||
| } | } | ||||||
|   | |||||||
| @@ -1,9 +1,9 @@ | |||||||
| import * as aws from './aws'; | import * as aws from './aws'; | ||||||
| import * as core from '@actions/core'; | import * as core from '@actions/core'; | ||||||
| import * as exec from '@actions/exec'; | import {Exec} from '@docker/actions-toolkit/lib/exec'; | ||||||
|  |  | ||||||
| export async function login(registry: string, username: string, password: string): Promise<void> { | export async function login(registry: string, username: string, password: string, ecr: string): Promise<void> { | ||||||
|   if (await aws.isECR(registry)) { |   if (/true/i.test(ecr) || (ecr == 'auto' && aws.isECR(registry))) { | ||||||
|     await loginECR(registry, username, password); |     await loginECR(registry, username, password); | ||||||
|   } else { |   } else { | ||||||
|     await loginStandard(registry, username, password); |     await loginStandard(registry, username, password); | ||||||
| @@ -11,15 +11,13 @@ export async function login(registry: string, username: string, password: string | |||||||
| } | } | ||||||
|  |  | ||||||
| export async function logout(registry: string): Promise<void> { | export async function logout(registry: string): Promise<void> { | ||||||
|   await exec |   await Exec.getExecOutput('docker', ['logout', registry], { | ||||||
|     .getExecOutput('docker', ['logout', registry], { |     ignoreReturnCode: true | ||||||
|       ignoreReturnCode: true |   }).then(res => { | ||||||
|     }) |     if (res.stderr.length > 0 && res.exitCode != 0) { | ||||||
|     .then(res => { |       core.warning(res.stderr.trim()); | ||||||
|       if (res.stderr.length > 0 && res.exitCode != 0) { |     } | ||||||
|         core.warning(res.stderr.trim()); |   }); | ||||||
|       } |  | ||||||
|     }); |  | ||||||
| } | } | ||||||
|  |  | ||||||
| export async function loginStandard(registry: string, username: string, password: string): Promise<void> { | export async function loginStandard(registry: string, username: string, password: string): Promise<void> { | ||||||
| @@ -27,7 +25,7 @@ export async function loginStandard(registry: string, username: string, password | |||||||
|     throw new Error('Username and password required'); |     throw new Error('Username and password required'); | ||||||
|   } |   } | ||||||
|  |  | ||||||
|   let loginArgs: Array<string> = ['login', '--password-stdin']; |   const loginArgs: Array<string> = ['login', '--password-stdin']; | ||||||
|   loginArgs.push('--username', username); |   loginArgs.push('--username', username); | ||||||
|   loginArgs.push(registry); |   loginArgs.push(registry); | ||||||
|  |  | ||||||
| @@ -36,54 +34,32 @@ export async function loginStandard(registry: string, username: string, password | |||||||
|   } else { |   } else { | ||||||
|     core.info(`Logging into Docker Hub...`); |     core.info(`Logging into Docker Hub...`); | ||||||
|   } |   } | ||||||
|   await exec |   await Exec.getExecOutput('docker', loginArgs, { | ||||||
|     .getExecOutput('docker', loginArgs, { |     ignoreReturnCode: true, | ||||||
|       ignoreReturnCode: true, |     silent: true, | ||||||
|       silent: true, |     input: Buffer.from(password) | ||||||
|       input: Buffer.from(password) |   }).then(res => { | ||||||
|     }) |     if (res.stderr.length > 0 && res.exitCode != 0) { | ||||||
|     .then(res => { |       throw new Error(res.stderr.trim()); | ||||||
|       if (res.stderr.length > 0 && res.exitCode != 0) { |     } | ||||||
|         throw new Error(res.stderr.trim()); |     core.info(`Login Succeeded!`); | ||||||
|       } |   }); | ||||||
|       core.info(`Login Succeeded!`); |  | ||||||
|     }); |  | ||||||
| } | } | ||||||
|  |  | ||||||
| export async function loginECR(registry: string, username: string, password: string): Promise<void> { | export async function loginECR(registry: string, username: string, password: string): Promise<void> { | ||||||
|   const cliPath = await aws.getCLI(); |   core.info(`Retrieving registries data through AWS SDK...`); | ||||||
|   const cliVersion = await aws.getCLIVersion(); |   const regDatas = await aws.getRegistriesData(registry, username, password); | ||||||
|   const region = await aws.getRegion(registry); |   for (const regData of regDatas) { | ||||||
|   const accountIDs = await aws.getAccountIDs(registry); |     core.info(`Logging into ${regData.registry}...`); | ||||||
|  |     await Exec.getExecOutput('docker', ['login', '--password-stdin', '--username', regData.username, regData.registry], { | ||||||
|   if (await aws.isPubECR(registry)) { |       ignoreReturnCode: true, | ||||||
|     core.info(`AWS Public ECR detected with ${region} region`); |       silent: true, | ||||||
|   } else { |       input: Buffer.from(regData.password) | ||||||
|     core.info(`AWS ECR detected with ${region} region`); |     }).then(res => { | ||||||
|  |       if (res.stderr.length > 0 && res.exitCode != 0) { | ||||||
|  |         throw new Error(res.stderr.trim()); | ||||||
|  |       } | ||||||
|  |       core.info('Login Succeeded!'); | ||||||
|  |     }); | ||||||
|   } |   } | ||||||
|  |  | ||||||
|   process.env.AWS_ACCESS_KEY_ID = username || process.env.AWS_ACCESS_KEY_ID; |  | ||||||
|   process.env.AWS_SECRET_ACCESS_KEY = password || process.env.AWS_SECRET_ACCESS_KEY; |  | ||||||
|  |  | ||||||
|   core.info(`Retrieving docker login command through AWS CLI ${cliVersion} (${cliPath})...`); |  | ||||||
|   const loginCmds = await aws.getDockerLoginCmds(cliVersion, registry, region, accountIDs); |  | ||||||
|  |  | ||||||
|   core.info(`Logging into ${registry}...`); |  | ||||||
|   loginCmds.forEach((loginCmd, index) => { |  | ||||||
|     exec |  | ||||||
|       .getExecOutput(loginCmd, [], { |  | ||||||
|         ignoreReturnCode: true, |  | ||||||
|         silent: true |  | ||||||
|       }) |  | ||||||
|       .then(res => { |  | ||||||
|         if (res.stderr.length > 0 && res.exitCode != 0) { |  | ||||||
|           throw new Error(res.stderr.trim()); |  | ||||||
|         } |  | ||||||
|         if (loginCmds.length > 1) { |  | ||||||
|           core.info(`Login Succeeded! (${index}/${loginCmds.length})`); |  | ||||||
|         } else { |  | ||||||
|           core.info('Login Succeeded!'); |  | ||||||
|         } |  | ||||||
|       }); |  | ||||||
|   }); |  | ||||||
| } | } | ||||||
|   | |||||||
							
								
								
									
										25
									
								
								src/main.ts
									
									
									
									
									
								
							
							
						
						
									
										25
									
								
								src/main.ts
									
									
									
									
									
								
							| @@ -1,28 +1,21 @@ | |||||||
| import * as core from '@actions/core'; | import * as actionsToolkit from '@docker/actions-toolkit'; | ||||||
|  |  | ||||||
| import * as context from './context'; | import * as context from './context'; | ||||||
| import * as docker from './docker'; | import * as docker from './docker'; | ||||||
| import * as stateHelper from './state-helper'; | import * as stateHelper from './state-helper'; | ||||||
|  |  | ||||||
| export async function run(): Promise<void> { | export async function main(): Promise<void> { | ||||||
|   try { |   const input: context.Inputs = context.getInputs(); | ||||||
|     const {registry, username, password, logout} = context.getInputs(); |   stateHelper.setRegistry(input.registry); | ||||||
|     stateHelper.setRegistry(registry); |   stateHelper.setLogout(input.logout); | ||||||
|     stateHelper.setLogout(logout); |   await docker.login(input.registry, input.username, input.password, input.ecr); | ||||||
|     await docker.login(registry, username, password); |  | ||||||
|   } catch (error) { |  | ||||||
|     core.setFailed(error.message); |  | ||||||
|   } |  | ||||||
| } | } | ||||||
|  |  | ||||||
| async function logout(): Promise<void> { | async function post(): Promise<void> { | ||||||
|   if (!stateHelper.logout) { |   if (!stateHelper.logout) { | ||||||
|     return; |     return; | ||||||
|   } |   } | ||||||
|   await docker.logout(stateHelper.registry); |   await docker.logout(stateHelper.registry); | ||||||
| } | } | ||||||
|  |  | ||||||
| if (!stateHelper.IsPost) { | actionsToolkit.run(main, post); | ||||||
|   run(); |  | ||||||
| } else { |  | ||||||
|   logout(); |  | ||||||
| } |  | ||||||
|   | |||||||
| @@ -1,6 +1,5 @@ | |||||||
| import * as core from '@actions/core'; | import * as core from '@actions/core'; | ||||||
|  |  | ||||||
| export const IsPost = !!process.env['STATE_isPost']; |  | ||||||
| export const registry = process.env['STATE_registry'] || ''; | export const registry = process.env['STATE_registry'] || ''; | ||||||
| export const logout = /true/i.test(process.env['STATE_logout'] || ''); | export const logout = /true/i.test(process.env['STATE_logout'] || ''); | ||||||
|  |  | ||||||
| @@ -11,7 +10,3 @@ export function setRegistry(registry: string) { | |||||||
| export function setLogout(logout: boolean) { | export function setLogout(logout: boolean) { | ||||||
|   core.saveState('logout', logout); |   core.saveState('logout', logout); | ||||||
| } | } | ||||||
|  |  | ||||||
| if (!IsPost) { |  | ||||||
|   core.saveState('isPost', 'true'); |  | ||||||
| } |  | ||||||
|   | |||||||
| @@ -1,18 +1,21 @@ | |||||||
| { | { | ||||||
|   "compilerOptions": { |   "compilerOptions": { | ||||||
|  |     "esModuleInterop": true, | ||||||
|     "target": "es6", |     "target": "es6", | ||||||
|     "module": "commonjs", |     "module": "commonjs", | ||||||
|     "lib": [ |     "strict": true, | ||||||
|       "es6", |  | ||||||
|       "dom" |  | ||||||
|     ], |  | ||||||
|     "newLine": "lf", |     "newLine": "lf", | ||||||
|     "outDir": "./lib", |     "outDir": "./lib", | ||||||
|     "rootDir": "./src", |     "rootDir": "./src", | ||||||
|     "strict": true, |     "forceConsistentCasingInFileNames": true, | ||||||
|     "noImplicitAny": false, |     "noImplicitAny": false, | ||||||
|     "esModuleInterop": true, |     "resolveJsonModule": true, | ||||||
|     "sourceMap": true |     "useUnknownInCatchVariables": false, | ||||||
|   }, |   }, | ||||||
|   "exclude": ["node_modules", "**/*.test.ts"] |   "exclude": [ | ||||||
|  |     "./__tests__/**/*", | ||||||
|  |     "./lib/**/*", | ||||||
|  |     "node_modules", | ||||||
|  |     "jest.config.ts" | ||||||
|  |   ] | ||||||
| } | } | ||||||
|   | |||||||
		Reference in New Issue
	
	Block a user