Compare commits
	
		
			124 Commits
		
	
	
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
|   | 42d299face | ||
|   | 4858b0b5ea | ||
|   | 1d7d8649e7 | ||
|   | 58855695bb | ||
|   | d9927c4142 | ||
|   | b9a4d91ee5 | ||
|   | b20b9f5e31 | ||
|   | cb21399f71 | ||
|   | faae4d6665 | ||
|   | 4d84a3c20f | ||
|   | 6f7ca8828b | ||
|   | b776a64ec0 | ||
|   | f6476db6e9 | ||
|   | 46ab6d5c3c | ||
|   | 1cce1654e0 | ||
|   | 9537342dee | ||
|   | 7f47463f56 | ||
|   | 8807319764 | ||
|   | ebac4bd30d | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 499663a42c | ||
|   | 70b0f7898e | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 885923496b | ||
|   | ab92432d0b | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 1828bf2d51 | ||
|   | 25c0ca8bab | ||
|   | f11d2ba650 | ||
|   | 3f83d7b89c | ||
|   | c9c0083563 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | f694e84504 | ||
|   | b30d77254f | ||
|   | 95778bc566 | ||
|   | 2c6df6a22f | ||
|   | c41c9a5c65 | ||
|   | fc6fe565d2 | ||
|   | 10428f39dc | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 1b4cf55146 | ||
|   | 5bcefc987c | ||
|   | 169057673d | ||
|   | 5d62c58fc3 | ||
|   | 73cda5dad9 | ||
|   | 5ffec3343b | ||
|   | 305d960cac | ||
|   | 9a9ae26c89 | ||
|   | 48af9f2a97 | ||
|   | c08e3a84a9 | ||
|   | f12fe5c78d | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | b566635cc9 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | b8e54a5ea5 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | d64238b93b | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 763661a124 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 41fba5a8c6 | ||
|   | f054a8b539 | ||
|   | 0644d98afe | ||
|   | 9e433e18cf | ||
|   | 39efbd2c12 | ||
|   | 4608add020 | ||
|   | 4fd5d8ead6 | ||
|   | e2346b6971 | ||
|   | 2051808c83 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 7c220e1b8d | ||
|   | f4cae19820 | ||
|   | e5ad366574 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 45bc0ebd6b | ||
|   | 79068f5240 | ||
|   | 8e670da7a1 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 76901a9025 | ||
|   | 31f1bb4610 | ||
|   | 28eb30dcb6 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 03b00fbeba | ||
|   | 5934fe3407 | ||
|   | 3cba154eb7 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 986a54f35b | ||
|   | fdb725ed4b | ||
|   | bab7dcbf29 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | c0d23108f7 | ||
|   | c902ecc709 | ||
|   | b612a76a31 | ||
|   | 28218f9b04 | ||
|   | 7439f8b467 | ||
|   | 4b206288bd | ||
|   | 4abf7e9de3 | ||
|   | 175e20ba61 | ||
|   | 92a2593650 | ||
|   | 957a8f0d4a | ||
|   | 971b76aea9 | ||
|   | 5b092cf2f7 | ||
|   | ab81ae06bb | ||
|   | f4a3bbc2c6 | ||
|   | e2302b10cc | ||
|   | c2c723b5d1 | ||
|   | ab80d026d4 | ||
|   | 13fa0663e1 | ||
|   | 75e7be0db4 | ||
|   | d6f5c68835 | ||
|   | f3364599c6 | ||
|   | 24646ef465 | ||
|   | 9f189206e8 | ||
|   | aed1d0c0c1 | ||
|   | 31722002f5 | ||
|   | 2a481b4109 | ||
|   | 9bed62818a | ||
|   | c718c795e7 | ||
|   | 7b79d7e834 | ||
|   | f53ca527f7 | ||
|   | d3160f671f | ||
|   | 3b14bab101 | ||
|   | 1e75de0e0e | ||
|   | 7c9afe235c | ||
|   | 7dc3c3a70e | ||
|   | b17cf6ab8f | ||
|   | 27c3146301 | ||
|   | 12fd63324c | ||
|   | a3de3de177 | ||
|   | 9cbd4f95c4 | ||
|   | ad9eb3b250 | ||
|   | 71b3c789fa | ||
|   | 5e0bc83b38 | ||
|   | 1f68ce02d7 | ||
|   | 767b2f4b7b | ||
|   | ddf06e1fed | ||
|   | a5aa81adc8 | ||
|   | 3b9e1f51cd | ||
|   | adb73476b6 | ||
|   | 5df5104555 | 
							
								
								
									
										2
									
								
								.dockerignore
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										2
									
								
								.dockerignore
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,2 @@ | ||||
| /coverage | ||||
| /node_modules | ||||
							
								
								
									
										20
									
								
								.github/CONTRIBUTING.md
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										20
									
								
								.github/CONTRIBUTING.md
									
									
									
									
										vendored
									
									
								
							| @@ -2,20 +2,24 @@ | ||||
|  | ||||
| Hi there! We're thrilled that you'd like to contribute to this project. Your help is essential for keeping it great. | ||||
|  | ||||
| Contributions to this project are [released](https://help.github.com/articles/github-terms-of-service/#6-contributions-under-repository-license) to the public under the [project's open source license](LICENSE). | ||||
| Contributions to this project are [released](https://docs.github.com/en/github/site-policy/github-terms-of-service#6-contributions-under-repository-license) | ||||
| to the public under the [project's open source license](LICENSE). | ||||
|  | ||||
| ## Submitting a pull request | ||||
|  | ||||
| 1. [Fork](https://github.com/docker/login-action/fork) and clone the repository | ||||
| 2. Configure and install the dependencies: `yarn install` | ||||
| 4. Create a new branch: `git checkout -b my-branch-name` | ||||
| 5. Make your change | ||||
| 6. Run pre-checkin: `yarn run pre-checkin` | ||||
| 7. Push to your fork and [submit a pull request](https://github.com/docker/login-action/compare) | ||||
| 8. Pat your self on the back and wait for your pull request to be reviewed and merged. | ||||
| 3. Create a new branch: `git checkout -b my-branch-name` | ||||
| 4. Make your changes | ||||
| 5. Make sure the tests pass: `docker buildx bake test` | ||||
| 6. Format code and build javascript artifacts: `docker buildx bake pre-checkin` | ||||
| 7. Validate all code has correctly formatted and built: `docker buildx bake validate` | ||||
| 8. Push to your fork and [submit a pull request](https://github.com/docker/login-action/compare) | ||||
| 9. Pat your self on the back and wait for your pull request to be reviewed and merged. | ||||
|  | ||||
| Here are a few things you can do that will increase the likelihood of your pull request being accepted: | ||||
|  | ||||
| - Write tests. | ||||
| - Make sure the `README.md` and any other relevant **documentation are kept up-to-date**. | ||||
| - We try to follow [SemVer v2.0.0](https://semver.org/). Randomly breaking public APIs is not an option. | ||||
| - Keep your change as focused as possible. If there are multiple changes you would like to make that are not dependent upon each other, consider submitting them as **separate pull requests**. | ||||
| @@ -24,5 +28,5 @@ Here are a few things you can do that will increase the likelihood of your pull | ||||
| ## Resources | ||||
|  | ||||
| - [How to Contribute to Open Source](https://opensource.guide/how-to-contribute/) | ||||
| - [Using Pull Requests](https://help.github.com/articles/about-pull-requests/) | ||||
| - [GitHub Help](https://help.github.com) | ||||
| - [Using Pull Requests](https://docs.github.com/en/github/collaborating-with-issues-and-pull-requests/about-pull-requests) | ||||
| - [GitHub Help](https://docs.github.com/en) | ||||
|   | ||||
							
								
								
									
										3
									
								
								.github/ISSUE_TEMPLATE/bug_report.md
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										3
									
								
								.github/ISSUE_TEMPLATE/bug_report.md
									
									
									
									
										vendored
									
									
								
							| @@ -30,4 +30,5 @@ about: Create a report to help us improve | ||||
|  | ||||
| ### Logs | ||||
|  | ||||
| > Download the [log file of your build](https://help.github.com/en/actions/configuring-and-managing-workflows/managing-a-workflow-run#downloading-logs) and [attach it](https://help.github.com/en/github/managing-your-work-on-github/file-attachments-on-issues-and-pull-requests) to this issue. | ||||
| > Download the [log file of your build](https://docs.github.com/en/actions/managing-workflow-runs/using-workflow-run-logs#downloading-logs) | ||||
| > and [attach it](https://docs.github.com/en/github/managing-your-work-on-github/file-attachments-on-issues-and-pull-requests) to this issue. | ||||
|   | ||||
							
								
								
									
										12
									
								
								.github/dependabot.yml
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										12
									
								
								.github/dependabot.yml
									
									
									
									
										vendored
									
									
								
							| @@ -4,19 +4,15 @@ updates: | ||||
|     directory: "/" | ||||
|     schedule: | ||||
|       interval: "daily" | ||||
|       time: "06:00" | ||||
|       timezone: "Europe/Paris" | ||||
|     labels: | ||||
|       - ":game_die: dependencies" | ||||
|       - ":robot: bot" | ||||
|       - "dependencies" | ||||
|       - "bot" | ||||
|   - package-ecosystem: "npm" | ||||
|     directory: "/" | ||||
|     schedule: | ||||
|       interval: "daily" | ||||
|       time: "06:00" | ||||
|       timezone: "Europe/Paris" | ||||
|     allow: | ||||
|       - dependency-type: "production" | ||||
|     labels: | ||||
|       - ":game_die: dependencies" | ||||
|       - ":robot: bot" | ||||
|       - "dependencies" | ||||
|       - "bot" | ||||
|   | ||||
							
								
								
									
										
											BIN
										
									
								
								.github/docker-login.png
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										
											BIN
										
									
								
								.github/docker-login.png
									
									
									
									
										vendored
									
									
								
							
										
											Binary file not shown.
										
									
								
							| Before Width: | Height: | Size: 5.0 KiB After Width: | Height: | Size: 4.3 KiB | 
							
								
								
									
										77
									
								
								.github/labels.yml
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										77
									
								
								.github/labels.yml
									
									
									
									
										vendored
									
									
								
							| @@ -1,77 +0,0 @@ | ||||
| ## more info https://github.com/crazy-max/ghaction-github-labeler | ||||
| - # automerge | ||||
|   name: ":bell: automerge" | ||||
|   color: "8f4fbc" | ||||
|   description: "" | ||||
| - # bot | ||||
|   name: ":robot: bot" | ||||
|   color: "69cde9" | ||||
|   description: "" | ||||
| - # bug | ||||
|   name: ":bug: bug" | ||||
|   color: "b60205" | ||||
|   description: "" | ||||
| - # dependencies | ||||
|   name: ":game_die: dependencies" | ||||
|   color: "0366d6" | ||||
|   description: "" | ||||
| - # documentation | ||||
|   name: ":memo: documentation" | ||||
|   color: "c5def5" | ||||
|   description: "" | ||||
| - # duplicate | ||||
|   name: ":busts_in_silhouette: duplicate" | ||||
|   color: "cccccc" | ||||
|   description: "" | ||||
| - # enhancement | ||||
|   name: ":sparkles: enhancement" | ||||
|   color: "0054ca" | ||||
|   description: "" | ||||
| - # feature request | ||||
|   name: ":bulb: feature request" | ||||
|   color: "0e8a16" | ||||
|   description: "" | ||||
| - # feedback | ||||
|   name: ":mega: feedback" | ||||
|   color: "03a9f4" | ||||
|   description: "" | ||||
| - # future maybe | ||||
|   name: ":rocket: future maybe" | ||||
|   color: "fef2c0" | ||||
|   description: "" | ||||
| - # good first issue | ||||
|   name: ":hatching_chick: good first issue" | ||||
|   color: "7057ff" | ||||
|   description: "" | ||||
| - # help wanted | ||||
|   name: ":pray: help wanted" | ||||
|   color: "4caf50" | ||||
|   description: "" | ||||
| - # hold | ||||
|   name: ":hand: hold" | ||||
|   color: "24292f" | ||||
|   description: "" | ||||
| - # invalid | ||||
|   name: ":no_entry_sign: invalid" | ||||
|   color: "e6e6e6" | ||||
|   description: "" | ||||
| - # maybe bug | ||||
|   name: ":interrobang: maybe bug" | ||||
|   color: "ff5722" | ||||
|   description: "" | ||||
| - # needs more info | ||||
|   name: ":thinking: needs more info" | ||||
|   color: "795548" | ||||
|   description: "" | ||||
| - # question | ||||
|   name: ":question: question" | ||||
|   color: "3f51b5" | ||||
|   description: "" | ||||
| - # upstream | ||||
|   name: ":eyes: upstream" | ||||
|   color: "fbca04" | ||||
|   description: "" | ||||
| - # wontfix | ||||
|   name: ":coffin: wontfix" | ||||
|   color: "ffffff" | ||||
|   description: "" | ||||
							
								
								
									
										341
									
								
								.github/workflows/ci.yml
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										341
									
								
								.github/workflows/ci.yml
									
									
									
									
										vendored
									
									
								
							| @@ -1,119 +1,268 @@ | ||||
| name: ci | ||||
|  | ||||
| on: | ||||
|   workflow_dispatch: | ||||
|   schedule: | ||||
|     - cron: '0 10 * * *' | ||||
|   push: | ||||
|     branches: | ||||
|       - master | ||||
|       - releases/v* | ||||
|       - 'master' | ||||
|       - 'releases/v*' | ||||
|  | ||||
| jobs: | ||||
| #  dockerhub: | ||||
| #    runs-on: ${{ matrix.os }} | ||||
| #    strategy: | ||||
| #      fail-fast: false | ||||
| #      matrix: | ||||
| #        os: | ||||
| #          - ubuntu-20.04 | ||||
| #          - ubuntu-18.04 | ||||
| #          - ubuntu-16.04 | ||||
| #        logout: | ||||
| #          - true | ||||
| #          - false | ||||
| #    steps: | ||||
| #      - | ||||
| #        name: Checkout | ||||
| #        uses: actions/checkout@v2.3.2 | ||||
| #      - | ||||
| #        name: Login to DockerHub | ||||
| #        uses: ./ | ||||
| #        with: | ||||
| #          username: ${{ secrets.DOCKERHUB_USERNAME_TEST }} | ||||
| #          password: ${{ secrets.DOCKERHUB_PASSWORD_TEST }} | ||||
| #          logout: ${{ matrix.logout }} | ||||
| #      - | ||||
| #        name: Clear | ||||
| #        if: always() | ||||
| #        run: | | ||||
| #          rm -f ${HOME}/.docker/config.json | ||||
|   stop-docker: | ||||
|     runs-on: ubuntu-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v2 | ||||
|       - | ||||
|         name: Stop docker | ||||
|         run: | | ||||
|           sudo systemctl stop docker | ||||
|       - | ||||
|         name: Login to GitHub Container Registry | ||||
|         uses: ./ | ||||
|         with: | ||||
|           registry: ghcr.io | ||||
|           username: ${{ github.actor }} | ||||
|           password: ${{ secrets.GITHUB_TOKEN }} | ||||
|  | ||||
|   gpr: | ||||
|   logout: | ||||
|     runs-on: ubuntu-latest | ||||
|     strategy: | ||||
|       fail-fast: false | ||||
|       matrix: | ||||
|         logout: | ||||
|           - true | ||||
|           - false | ||||
|           - true | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v2.3.2 | ||||
|         uses: actions/checkout@v2 | ||||
|       - | ||||
|         name: Login to GitHub Package Registry | ||||
|         name: Login to GitHub Container Registry | ||||
|         uses: ./ | ||||
|         with: | ||||
|           registry: docker.pkg.github.com | ||||
|           username: ${{ github.repository_owner }} | ||||
|           registry: ghcr.io | ||||
|           username: ${{ github.actor }} | ||||
|           password: ${{ secrets.GITHUB_TOKEN }} | ||||
|           logout: ${{ matrix.logout }} | ||||
|       - | ||||
|         name: Clear | ||||
|         if: always() | ||||
|         run: | | ||||
|           rm -f ${HOME}/.docker/config.json | ||||
|  | ||||
| #  gitlab: | ||||
| #    runs-on: ubuntu-latest | ||||
| #    strategy: | ||||
| #      fail-fast: false | ||||
| #      matrix: | ||||
| #        logout: | ||||
| #          - true | ||||
| #          - false | ||||
| #    steps: | ||||
| #      - | ||||
| #        name: Checkout | ||||
| #        uses: actions/checkout@v2.3.2 | ||||
| #      - | ||||
| #        name: Login to GitLab | ||||
| #        uses: ./ | ||||
| #        with: | ||||
| #          registry: registry.gitlab.com | ||||
| #          username: ${{ secrets.GITLAB_USERNAME_TEST }} | ||||
| #          password: ${{ secrets.GITLAB_PASSWORD_TEST }} | ||||
| #          logout: ${{ matrix.logout }} | ||||
| #      - | ||||
| #        name: Clear | ||||
| #        if: always() | ||||
| #        run: | | ||||
| #          rm -f ${HOME}/.docker/config.json | ||||
| # | ||||
| #  ecr: | ||||
| #    runs-on: ${{ matrix.os }} | ||||
| #    strategy: | ||||
| #      fail-fast: false | ||||
| #      matrix: | ||||
| #        os: | ||||
| #          - ubuntu-20.04 | ||||
| #          - ubuntu-18.04 | ||||
| #          - ubuntu-16.04 | ||||
| #        logout: | ||||
| #          - true | ||||
| #          - false | ||||
| #    steps: | ||||
| #      - | ||||
| #        name: Checkout | ||||
| #        uses: actions/checkout@v2.3.1 | ||||
| #      - | ||||
| #        name: Login to ECR | ||||
| #        uses: ./ | ||||
| #        with: | ||||
| #          registry: ${{ secrets.AWS_ACCOUNT_NUMBER }}.dkr.ecr.${{ secrets.AWS_REGION }}.amazonaws.com | ||||
| #          username: ${{ secrets.AWS_ACCESS_KEY_ID }} | ||||
| #          password: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | ||||
| #          logout: ${{ matrix.logout }} | ||||
| #      - | ||||
| #        name: Clear | ||||
| #        if: always() | ||||
| #        run: | | ||||
| #          rm -f ${HOME}/.docker/config.json | ||||
|   dind: | ||||
|     runs-on: ubuntu-latest | ||||
|     env: | ||||
|       DOCKER_CONFIG: $HOME/.docker | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v2 | ||||
|       - | ||||
|         name: Login to GitHub Container Registry | ||||
|         uses: ./ | ||||
|         with: | ||||
|           registry: ghcr.io | ||||
|           username: ${{ secrets.GHCR_USERNAME }} | ||||
|           password: ${{ secrets.GHCR_PAT }} | ||||
|       - | ||||
|         name: DinD | ||||
|         uses: docker://docker | ||||
|         with: | ||||
|           entrypoint: docker | ||||
|           args: pull ghcr.io/docker-ghactiontest/test | ||||
|       - | ||||
|         name: Pull private image | ||||
|         run: | | ||||
|           docker image prune -a -f >/dev/null 2>&1 | ||||
|           docker pull ghcr.io/docker-ghactiontest/test | ||||
|  | ||||
|   dockerhub: | ||||
|     runs-on: ${{ matrix.os }} | ||||
|     strategy: | ||||
|       fail-fast: false | ||||
|       matrix: | ||||
|         os: | ||||
|           - ubuntu-latest | ||||
|           - windows-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v2 | ||||
|       - | ||||
|         name: Login to Docker Hub | ||||
|         uses: ./ | ||||
|         with: | ||||
|           username: ${{ secrets.DOCKERHUB_USERNAME }} | ||||
|           password: ${{ secrets.DOCKERHUB_TOKEN }} | ||||
|  | ||||
|   ecr: | ||||
|     runs-on: ${{ matrix.os }} | ||||
|     strategy: | ||||
|       fail-fast: false | ||||
|       matrix: | ||||
|         os: | ||||
|           - ubuntu-latest | ||||
|           - windows-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v2 | ||||
|       - | ||||
|         name: Login to ECR | ||||
|         uses: ./ | ||||
|         with: | ||||
|           registry: ${{ secrets.AWS_ACCOUNT_NUMBER }}.dkr.ecr.us-east-1.amazonaws.com | ||||
|           username: ${{ secrets.AWS_ACCESS_KEY_ID }} | ||||
|           password: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | ||||
|  | ||||
|   ecr-aws-creds: | ||||
|     runs-on: ${{ matrix.os }} | ||||
|     strategy: | ||||
|       fail-fast: false | ||||
|       matrix: | ||||
|         os: | ||||
|           - ubuntu-latest | ||||
|           - windows-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v2 | ||||
|       - | ||||
|         name: Configure AWS Credentials | ||||
|         uses: aws-actions/configure-aws-credentials@v1 | ||||
|         with: | ||||
|           aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }} | ||||
|           aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | ||||
|           aws-region: us-east-1 | ||||
|       - | ||||
|         name: Login to ECR | ||||
|         uses: ./ | ||||
|         with: | ||||
|           registry: ${{ secrets.AWS_ACCOUNT_NUMBER }}.dkr.ecr.us-east-1.amazonaws.com | ||||
|  | ||||
|   ecr-public: | ||||
|     runs-on: ${{ matrix.os }} | ||||
|     strategy: | ||||
|       fail-fast: false | ||||
|       matrix: | ||||
|         os: | ||||
|           - ubuntu-latest | ||||
|           - windows-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v2 | ||||
|       - | ||||
|         name: Login to Public ECR | ||||
|         uses: ./ | ||||
|         with: | ||||
|           registry: public.ecr.aws | ||||
|           username: ${{ secrets.AWS_ACCESS_KEY_ID }} | ||||
|           password: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | ||||
|         env: | ||||
|           AWS_REGION: us-east-1 | ||||
|  | ||||
|   ecr-public-aws-creds: | ||||
|     runs-on: ${{ matrix.os }} | ||||
|     strategy: | ||||
|       fail-fast: false | ||||
|       matrix: | ||||
|         os: | ||||
|           - ubuntu-latest | ||||
|           - windows-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v2 | ||||
|       - | ||||
|         name: Configure AWS Credentials | ||||
|         uses: aws-actions/configure-aws-credentials@v1 | ||||
|         with: | ||||
|           aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }} | ||||
|           aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | ||||
|           aws-region: us-east-1 | ||||
|       - | ||||
|         name: Login to ECR | ||||
|         uses: ./ | ||||
|         with: | ||||
|           registry: public.ecr.aws | ||||
|  | ||||
|   github-container: | ||||
|     runs-on: ${{ matrix.os }} | ||||
|     strategy: | ||||
|       fail-fast: false | ||||
|       matrix: | ||||
|         os: | ||||
|           - ubuntu-latest | ||||
|           - windows-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v2 | ||||
|       - | ||||
|         name: Login to GitHub Container Registry | ||||
|         uses: ./ | ||||
|         with: | ||||
|           registry: ghcr.io | ||||
|           username: ${{ github.actor }} | ||||
|           password: ${{ secrets.GITHUB_TOKEN }} | ||||
|  | ||||
|   gitlab: | ||||
|     runs-on: ${{ matrix.os }} | ||||
|     strategy: | ||||
|       fail-fast: false | ||||
|       matrix: | ||||
|         os: | ||||
|           - ubuntu-latest | ||||
|           - windows-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v2 | ||||
|       - | ||||
|         name: Login to GitLab | ||||
|         uses: ./ | ||||
|         with: | ||||
|           registry: registry.gitlab.com | ||||
|           username: ${{ secrets.GITLAB_USERNAME }} | ||||
|           password: ${{ secrets.GITLAB_TOKEN }} | ||||
|  | ||||
|   google-artifact: | ||||
|     runs-on: ${{ matrix.os }} | ||||
|     strategy: | ||||
|       fail-fast: false | ||||
|       matrix: | ||||
|         os: | ||||
|           - ubuntu-latest | ||||
|           - windows-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v2 | ||||
|       - | ||||
|         name: Login to Google Artifact Registry | ||||
|         uses: ./ | ||||
|         with: | ||||
|           registry: ${{ secrets.GAR_LOCATION }}-docker.pkg.dev | ||||
|           username: _json_key | ||||
|           password: ${{ secrets.GAR_JSON_KEY }} | ||||
|  | ||||
|   google-container: | ||||
|     runs-on: ${{ matrix.os }} | ||||
|     strategy: | ||||
|       fail-fast: false | ||||
|       matrix: | ||||
|         os: | ||||
|           - ubuntu-latest | ||||
|           - windows-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v2 | ||||
|       - | ||||
|         name: Login to Google Container Registry | ||||
|         uses: ./ | ||||
|         with: | ||||
|           registry: gcr.io | ||||
|           username: _json_key | ||||
|           password: ${{ secrets.GCR_JSON_KEY }} | ||||
|   | ||||
							
								
								
									
										20
									
								
								.github/workflows/labels.yml
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										20
									
								
								.github/workflows/labels.yml
									
									
									
									
										vendored
									
									
								
							| @@ -1,20 +0,0 @@ | ||||
| name: labels | ||||
|  | ||||
| on: | ||||
|   push: | ||||
|     branches: | ||||
|       - 'master' | ||||
|     paths: | ||||
|       - '.github/labels.yml' | ||||
|       - '.github/workflows/labels.yml' | ||||
|  | ||||
| jobs: | ||||
|   labeler: | ||||
|     runs-on: ubuntu-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v2.3.2 | ||||
|       - | ||||
|         name: Run Labeler | ||||
|         uses: crazy-max/ghaction-github-labeler@v3.0.0 | ||||
							
								
								
									
										36
									
								
								.github/workflows/test.yml
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										36
									
								
								.github/workflows/test.yml
									
									
									
									
										vendored
									
									
								
							| @@ -3,38 +3,32 @@ name: test | ||||
| on: | ||||
|   push: | ||||
|     branches: | ||||
|       - master | ||||
|       - releases/v* | ||||
|     paths-ignore: | ||||
|       - '**.md' | ||||
|       - 'master' | ||||
|       - 'releases/v*' | ||||
|   pull_request: | ||||
|     paths-ignore: | ||||
|       - '**.md' | ||||
|     branches: | ||||
|       - 'master' | ||||
|       - 'releases/v*' | ||||
|  | ||||
| jobs: | ||||
|   test: | ||||
|     runs-on: ${{ matrix.os }} | ||||
|     strategy: | ||||
|       fail-fast: false | ||||
|       matrix: | ||||
|         os: | ||||
|           - ubuntu-20.04 | ||||
|           - ubuntu-18.04 | ||||
|           - ubuntu-16.04 | ||||
|     runs-on: ubuntu-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v2.3.2 | ||||
|         uses: actions/checkout@v2 | ||||
|       - | ||||
|         name: Install | ||||
|         run: yarn install | ||||
|         name: Validate | ||||
|         uses: docker/bake-action@v1 | ||||
|         with: | ||||
|           targets: validate | ||||
|       - | ||||
|         name: Test | ||||
|         run: yarn run test | ||||
|         uses: docker/bake-action@v1 | ||||
|         with: | ||||
|           targets: test | ||||
|       - | ||||
|         name: Upload coverage | ||||
|         uses: codecov/codecov-action@v1.0.13 | ||||
|         if: success() | ||||
|         uses: codecov/codecov-action@v2 | ||||
|         with: | ||||
|           token: ${{ secrets.CODECOV_TOKEN }} | ||||
|           file: ./coverage/clover.xml | ||||
|   | ||||
| @@ -1,5 +1,5 @@ | ||||
| { | ||||
|   "printWidth": 120, | ||||
|   "printWidth": 240, | ||||
|   "tabWidth": 2, | ||||
|   "useTabs": false, | ||||
|   "semi": true, | ||||
|   | ||||
							
								
								
									
										252
									
								
								README.md
									
									
									
									
									
								
							
							
						
						
									
										252
									
								
								README.md
									
									
									
									
									
								
							| @@ -1,6 +1,6 @@ | ||||
| [](https://github.com/docker/login-action/releases/latest) | ||||
| [](https://github.com/marketplace/actions/docker-login) | ||||
| [](https://github.com/docker/login-action/actions?workflow=ci) | ||||
| [](https://github.com/docker/login-action/actions?workflow=ci) | ||||
| [](https://github.com/docker/login-action/actions?workflow=test) | ||||
| [](https://codecov.io/gh/docker/login-action) | ||||
|  | ||||
| @@ -8,33 +8,30 @@ | ||||
|  | ||||
| GitHub Action to login against a Docker registry. | ||||
|  | ||||
| > :bulb: See also: | ||||
| > * [setup-buildx](https://github.com/docker/setup-buildx-action) action | ||||
| > * [setup-qemu](https://github.com/docker/setup-qemu-action) action | ||||
| > * [build-push](https://github.com/docker/build-push-action) action | ||||
|  | ||||
|  | ||||
|  | ||||
| ___ | ||||
|  | ||||
| * [Usage](#usage) | ||||
|   * [DockerHub](#dockerhub) | ||||
|   * [GitHub Packages Docker Registry](#github-packages-docker-registry) | ||||
|   * [Docker Hub](#docker-hub) | ||||
|   * [GitHub Container Registry](#github-container-registry) | ||||
|   * [GitLab](#gitlab) | ||||
|   * [Azure Container Registry (ACR)](#azure-container-registry-acr) | ||||
|   * [Google Container Registry (GCR)](#google-container-registry-gcr) | ||||
|   * [Google Artifact Registry (GAR)](#google-artifact-registry-gar) | ||||
|   * [AWS Elastic Container Registry (ECR)](#aws-elastic-container-registry-ecr) | ||||
|   * [AWS Public Elastic Container Registry (ECR)](#aws-public-elastic-container-registry-ecr) | ||||
|   * [OCI Oracle Cloud Infrastructure Registry (OCIR)](#oci-oracle-cloud-infrastructure-registry-ocir) | ||||
|   * [Quay.io](#quayio) | ||||
| * [Customizing](#customizing) | ||||
|   * [inputs](#inputs) | ||||
| * [Keep up-to-date with GitHub Dependabot](#keep-up-to-date-with-github-dependabot) | ||||
| * [Limitation](#limitation) | ||||
|  | ||||
| ## Usage | ||||
|  | ||||
| ### DockerHub | ||||
| ### Docker Hub | ||||
|  | ||||
| To authenticate against [DockerHub](https://hub.docker.com) it's strongly recommended to create a | ||||
| To authenticate against [Docker Hub](https://hub.docker.com) it's strongly recommended to create a | ||||
| [personal access token](https://docs.docker.com/docker-hub/access-tokens/) as an alternative to your password. | ||||
|  | ||||
| ```yaml | ||||
| @@ -49,46 +46,18 @@ jobs: | ||||
|     runs-on: ubuntu-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Login to DockerHub | ||||
|         name: Login to Docker Hub | ||||
|         uses: docker/login-action@v1 | ||||
|         with: | ||||
|           username: ${{ secrets.DOCKERHUB_USERNAME }} | ||||
|           password: ${{ secrets.DOCKERHUB_TOKEN }} | ||||
| ``` | ||||
|  | ||||
| ### GitHub Packages Docker Registry | ||||
|  | ||||
| > :warning: GitHub Packages Docker Registry (aka `docker.pkg.github.com`) **is deprecated** and will sunset early next | ||||
| > year. It's strongly advised to [migrate to GitHub Container Registry](https://docs.github.com/en/packages/getting-started-with-github-container-registry/migrating-to-github-container-registry-for-docker-images) | ||||
| > instead. | ||||
|  | ||||
| You can configure the Docker client to use [GitHub Packages to publish and retrieve docker images](https://docs.github.com/en/packages/using-github-packages-with-your-projects-ecosystem/configuring-docker-for-use-with-github-packages). | ||||
|  | ||||
| ```yaml | ||||
| name: ci | ||||
|  | ||||
| on: | ||||
|   push: | ||||
|     branches: master | ||||
|  | ||||
| jobs: | ||||
|   login: | ||||
|     runs-on: ubuntu-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Login to GitHub Packages Docker Registry | ||||
|         uses: docker/login-action@v1 | ||||
|         with: | ||||
|           registry: docker.pkg.github.com | ||||
|           username: ${{ github.repository_owner }} | ||||
|           password: ${{ secrets.GITHUB_TOKEN }} | ||||
| ``` | ||||
|  | ||||
| ### GitHub Container Registry | ||||
|  | ||||
| To authenticate against the [GitHub Container Registry](https://docs.github.com/en/packages/getting-started-with-github-container-registry), | ||||
| you will need to create a new [personal access token (PAT)](https://docs.github.com/en/github/authenticating-to-github/creating-a-personal-access-token) | ||||
| with the [appropriate scopes](https://docs.github.com/en/packages/getting-started-with-github-container-registry/migrating-to-github-container-registry-for-docker-images#authenticating-with-the-container-registry). | ||||
| To authenticate against the [GitHub Container Registry](https://docs.github.com/en/packages/working-with-a-github-packages-registry/working-with-the-container-registry), | ||||
| use the [`GITHUB_TOKEN`](https://docs.github.com/en/actions/reference/authentication-in-a-workflow) for the best | ||||
| security and experience. | ||||
|  | ||||
| ```yaml | ||||
| name: ci | ||||
| @@ -106,10 +75,16 @@ jobs: | ||||
|         uses: docker/login-action@v1 | ||||
|         with: | ||||
|           registry: ghcr.io | ||||
|           username: ${{ github.repository_owner }} | ||||
|           password: ${{ secrets.CR_PAT }} | ||||
|           username: ${{ github.actor }} | ||||
|           password: ${{ secrets.GITHUB_TOKEN }} | ||||
| ``` | ||||
|  | ||||
| You may need to [manage write and read access of GitHub Actions](https://docs.github.com/en/packages/managing-github-packages-using-github-actions-workflows/publishing-and-installing-a-package-with-github-actions#upgrading-a-workflow-that-accesses-ghcrio) | ||||
| for repositories in the container settings. | ||||
|  | ||||
| You can also use a [personal access token (PAT)](https://docs.github.com/en/github/authenticating-to-github/creating-a-personal-access-token) | ||||
| with the [appropriate scopes](https://docs.github.com/en/packages/getting-started-with-github-container-registry/migrating-to-github-container-registry-for-docker-images#authenticating-with-the-container-registry). | ||||
|  | ||||
| ### GitLab | ||||
|  | ||||
| ```yaml | ||||
| @@ -162,10 +137,16 @@ jobs: | ||||
|  | ||||
| ### Google Container Registry (GCR) | ||||
|  | ||||
| > [Google Artifact Registry](#google-artifact-registry-gar) is the evolution of Google Container Registry. As a | ||||
| > fully-managed service with support for both container images and non-container artifacts. If you currently use | ||||
| > Google Container Registry, use the information [on this page](https://cloud.google.com/artifact-registry/docs/transition/transition-from-gcr) | ||||
| > to learn about transitioning to Google Artifact Registry.  | ||||
|  | ||||
| Use a service account with the ability to push to GCR and [configure access control](https://cloud.google.com/container-registry/docs/access-control). | ||||
| Then create and download the JSON key for this service account and save content of `.json` file | ||||
| [as a secret](https://docs.github.com/en/actions/configuring-and-managing-workflows/creating-and-storing-encrypted-secrets#creating-encrypted-secrets-for-a-repository) | ||||
| called `GCR_JSON_KEY` in your GitHub repo. Ensure you set the username to `_json_key`. | ||||
| called `GCR_JSON_KEY` in your GitHub repo. Ensure you set the username to `_json_key`, | ||||
| or `_json_key_base64` if you use a base64-encoded key. | ||||
|  | ||||
| ```yaml | ||||
| name: ci | ||||
| @@ -187,9 +168,40 @@ jobs: | ||||
|           password: ${{ secrets.GCR_JSON_KEY }} | ||||
| ``` | ||||
|  | ||||
| ### Google Artifact Registry (GAR) | ||||
|  | ||||
| Use a service account with the ability to push to GAR and [configure access control](https://cloud.google.com/artifact-registry/docs/access-control). | ||||
| Then create and download the JSON key for this service account and save content of `.json` file | ||||
| [as a secret](https://docs.github.com/en/actions/configuring-and-managing-workflows/creating-and-storing-encrypted-secrets#creating-encrypted-secrets-for-a-repository) | ||||
| called `GAR_JSON_KEY` in your GitHub repo. Ensure you set the username to `_json_key`, | ||||
| or `_json_key_base64` if you use a base64-encoded key. | ||||
|  | ||||
| ```yaml | ||||
| name: ci | ||||
|  | ||||
| on: | ||||
|   push: | ||||
|     branches: master | ||||
|  | ||||
| jobs: | ||||
|   login: | ||||
|     runs-on: ubuntu-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Login to GAR | ||||
|         uses: docker/login-action@v1 | ||||
|         with: | ||||
|           registry: <location>-docker.pkg.dev | ||||
|           username: _json_key | ||||
|           password: ${{ secrets.GAR_JSON_KEY }} | ||||
| ``` | ||||
|  | ||||
| > Replace `<location>` with the regional or multi-regional [location](https://cloud.google.com/artifact-registry/docs/repo-organize#locations) | ||||
| > of the repository where the image is stored. | ||||
|  | ||||
| ### AWS Elastic Container Registry (ECR) | ||||
|  | ||||
| Use an IAM user with the [ability to push to ECR](https://docs.aws.amazon.com/AmazonECR/latest/userguide/ecr_managed_policies.html). | ||||
| Use an IAM user with the ability to [push to ECR with `AmazonEC2ContainerRegistryPowerUser` managed policy for example](https://docs.aws.amazon.com/AmazonECR/latest/userguide/ecr_managed_policies.html#AmazonEC2ContainerRegistryPowerUser). | ||||
| Then create and download access keys and save `AWS_ACCESS_KEY_ID` and `AWS_SECRET_ACCESS_KEY` [as secrets](https://docs.github.com/en/actions/configuring-and-managing-workflows/creating-and-storing-encrypted-secrets#creating-encrypted-secrets-for-a-repository) | ||||
| in your GitHub repo. | ||||
|  | ||||
| @@ -213,8 +225,149 @@ jobs: | ||||
|           password: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | ||||
| ``` | ||||
|  | ||||
| If you need to log in to Amazon ECR registries associated with other accounts, you can use the `AWS_ACCOUNT_IDS` | ||||
| environment variable: | ||||
|  | ||||
| ```yaml | ||||
| name: ci | ||||
|  | ||||
| on: | ||||
|   push: | ||||
|     branches: master | ||||
|  | ||||
| jobs: | ||||
|   login: | ||||
|     runs-on: ubuntu-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Login to ECR | ||||
|         uses: docker/login-action@v1 | ||||
|         with: | ||||
|           registry: <aws-account-number>.dkr.ecr.<region>.amazonaws.com | ||||
|           username: ${{ secrets.AWS_ACCESS_KEY_ID }} | ||||
|           password: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | ||||
|         env: | ||||
|           AWS_ACCOUNT_IDS: 012345678910,023456789012 | ||||
| ``` | ||||
|  | ||||
| > Only available with [AWS CLI version 1](https://docs.aws.amazon.com/cli/latest/reference/ecr/get-login.html) | ||||
|  | ||||
| You can also use the [Configure AWS Credentials](https://github.com/aws-actions/configure-aws-credentials) action in | ||||
| combination with this action: | ||||
|  | ||||
| ```yaml | ||||
| name: ci | ||||
|  | ||||
| on: | ||||
|   push: | ||||
|     branches: master | ||||
|  | ||||
| jobs: | ||||
|   login: | ||||
|     runs-on: ubuntu-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Configure AWS Credentials | ||||
|         uses: aws-actions/configure-aws-credentials@v1 | ||||
|         with: | ||||
|           aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }} | ||||
|           aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | ||||
|           aws-region: <region> | ||||
|       - | ||||
|         name: Login to ECR | ||||
|         uses: docker/login-action@v1 | ||||
|         with: | ||||
|           registry: <aws-account-number>.dkr.ecr.<region>.amazonaws.com | ||||
| ``` | ||||
|  | ||||
| > Replace `<aws-account-number>` and `<region>` with their respective values. | ||||
|  | ||||
| ### AWS Public Elastic Container Registry (ECR) | ||||
|  | ||||
| Use an IAM user with the ability to [push to ECR Public with `AmazonElasticContainerRegistryPublicPowerUser` managed policy for example](https://docs.aws.amazon.com/AmazonECR/latest/public/public-ecr-managed-policies.html#AmazonElasticContainerRegistryPublicPowerUser). | ||||
| Then create and download access keys and save `AWS_ACCESS_KEY_ID` and `AWS_SECRET_ACCESS_KEY` [as secrets](https://docs.github.com/en/actions/configuring-and-managing-workflows/creating-and-storing-encrypted-secrets#creating-encrypted-secrets-for-a-repository) | ||||
| in your GitHub repo. | ||||
|  | ||||
| ```yaml | ||||
| name: ci | ||||
|  | ||||
| on: | ||||
|   push: | ||||
|     branches: master | ||||
|  | ||||
| jobs: | ||||
|   login: | ||||
|     runs-on: ubuntu-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Login to Public ECR | ||||
|         uses: docker/login-action@v1 | ||||
|         with: | ||||
|           registry: public.ecr.aws | ||||
|           username: ${{ secrets.AWS_ACCESS_KEY_ID }} | ||||
|           password: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | ||||
|         env: | ||||
|           AWS_REGION: <region> | ||||
| ``` | ||||
|  | ||||
| > Replace `<region>` with its respective value (default `us-east-1`). | ||||
|  | ||||
| ### OCI Oracle Cloud Infrastructure Registry (OCIR) | ||||
|  | ||||
| To push into OCIR in specific tenancy the [username](https://www.oracle.com/webfolder/technetwork/tutorials/obe/oci/registry/index.html#LogintoOracleCloudInfrastructureRegistryfromtheDockerCLI) | ||||
| must be placed in format `<tenancy>/<username>` (in case of federated tenancy use the format | ||||
| `<tenancy-namespace>/oracleidentitycloudservice/<username>`). | ||||
|  | ||||
| For password [create an auth token](https://www.oracle.com/webfolder/technetwork/tutorials/obe/oci/registry/index.html#GetanAuthToken). | ||||
| Save username and token [as a secrets](https://docs.github.com/en/actions/configuring-and-managing-workflows/creating-and-storing-encrypted-secrets#creating-encrypted-secrets-for-a-repository) | ||||
| in your GitHub repo.  | ||||
|  | ||||
| ```yaml | ||||
| name: ci | ||||
|  | ||||
| on: | ||||
|   push: | ||||
|     branches: master | ||||
|  | ||||
| jobs: | ||||
|   login: | ||||
|     runs-on: ubuntu-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Login to OCIR | ||||
|         uses: docker/login-action@v1 | ||||
|         with: | ||||
|           registry: <region>.ocir.io | ||||
|           username: ${{ secrets.OCI_USERNAME }} | ||||
|           password: ${{ secrets.OCI_TOKEN }} | ||||
| ``` | ||||
|  | ||||
| > Replace `<region>` with their respective values from [availability regions](https://docs.cloud.oracle.com/iaas/Content/Registry/Concepts/registryprerequisites.htm#Availab) | ||||
|  | ||||
| ### Quay.io | ||||
|  | ||||
| Use a [Robot account](https://docs.quay.io/glossary/robot-accounts.html) with the ability to push to a public/private Quay.io repository. | ||||
|  | ||||
| ```yaml | ||||
| name: ci | ||||
|  | ||||
| on: | ||||
|   push: | ||||
|     branches: master | ||||
|  | ||||
| jobs: | ||||
|   login: | ||||
|     runs-on: ubuntu-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Login to Quay.io | ||||
|         uses: docker/login-action@v1 | ||||
|         with: | ||||
|           registry: quay.io | ||||
|           username: ${{ secrets.QUAY_USERNAME }} | ||||
|           password: ${{ secrets.QUAY_ROBOT_TOKEN }} | ||||
| ``` | ||||
|  | ||||
| ## Customizing | ||||
|  | ||||
| ### inputs | ||||
| @@ -226,6 +379,7 @@ Following inputs can be used as `step.with` keys | ||||
| | `registry`       | String  |                             | Server address of Docker registry. If not set then will default to Docker Hub | | ||||
| | `username`       | String  |                             | Username used to log against the Docker registry | | ||||
| | `password`       | String  |                             | Password or personal access token used to log against the Docker registry | | ||||
| | `ecr`            | String  | `auto`                      | Specifies whether the given registry is ECR (`auto`, `true` or `false`) | | ||||
| | `logout`         | Bool    | `true`                      | Log out from the Docker registry at the end of a job | | ||||
|  | ||||
| ## Keep up-to-date with GitHub Dependabot | ||||
| @@ -243,7 +397,3 @@ updates: | ||||
|     schedule: | ||||
|       interval: "daily" | ||||
| ``` | ||||
|  | ||||
| ## Limitation | ||||
|  | ||||
| This action is only available for Linux [virtual environments](https://help.github.com/en/articles/virtual-environments-for-github-actions#supported-virtual-environments-and-hardware-resources). | ||||
|   | ||||
| @@ -1,54 +1,155 @@ | ||||
| import * as semver from 'semver'; | ||||
| import {AuthorizationData} from '@aws-sdk/client-ecr'; | ||||
| import * as aws from '../src/aws'; | ||||
|  | ||||
| describe('isECR', () => { | ||||
|   test.each([ | ||||
|     ['registry.gitlab.com', false], | ||||
|     ['gcr.io', false], | ||||
|     ['012345678901.dkr.ecr.eu-west-3.amazonaws.com', true] | ||||
|     ['012345678901.dkr.ecr.eu-west-3.amazonaws.com', true], | ||||
|     ['876820548815.dkr.ecr.cn-north-1.amazonaws.com.cn', true], | ||||
|     ['390948362332.dkr.ecr.cn-northwest-1.amazonaws.com.cn', true], | ||||
|     ['public.ecr.aws', true] | ||||
|   ])('given registry %p', async (registry, expected) => { | ||||
|     expect(await aws.isECR(registry)).toEqual(expected); | ||||
|     expect(aws.isECR(registry)).toEqual(expected); | ||||
|   }); | ||||
| }); | ||||
|  | ||||
| describe('getCLI', () => { | ||||
|   it('exists', async () => { | ||||
|     const awsPath = await aws.getCLI(); | ||||
|     console.log(`awsPath: ${awsPath}`); | ||||
|     expect(awsPath).not.toEqual(''); | ||||
|   }); | ||||
| }); | ||||
|  | ||||
| describe('execCLI', () => { | ||||
|   it('--version not empty', async () => { | ||||
|     const cliCmdOutput = await aws.execCLI(['--version']); | ||||
|     console.log(`cliCmdOutput: ${cliCmdOutput}`); | ||||
|     expect(cliCmdOutput).not.toEqual(''); | ||||
|   }, 100000); | ||||
| }); | ||||
|  | ||||
| describe('getCLIVersion', () => { | ||||
|   it('valid', async () => { | ||||
|     const cliVersion = await aws.getCLIVersion(); | ||||
|     console.log(`cliVersion: ${cliVersion}`); | ||||
|     expect(semver.valid(cliVersion)).not.toBeNull(); | ||||
|   }, 100000); | ||||
| }); | ||||
|  | ||||
| describe('parseCLIVersion', () => { | ||||
| describe('isPubECR', () => { | ||||
|   test.each([ | ||||
|     ['v1', 'aws-cli/1.18.120 Python/2.7.17 Linux/5.3.0-1034-azure botocore/1.17.43', '1.18.120'], | ||||
|     ['v2', 'aws-cli/2.0.41 Python/3.7.3 Linux/4.19.104-microsoft-standard exe/x86_64.ubuntu.18', '2.0.41'] | ||||
|   ])('given aws %p', async (version, stdout, expected) => { | ||||
|     expect(await aws.parseCLIVersion(stdout)).toEqual(expected); | ||||
|     ['registry.gitlab.com', false], | ||||
|     ['gcr.io', false], | ||||
|     ['012345678901.dkr.ecr.eu-west-3.amazonaws.com', false], | ||||
|     ['876820548815.dkr.ecr.cn-north-1.amazonaws.com.cn', false], | ||||
|     ['390948362332.dkr.ecr.cn-northwest-1.amazonaws.com.cn', false], | ||||
|     ['public.ecr.aws', true] | ||||
|   ])('given registry %p', async (registry, expected) => { | ||||
|     expect(aws.isPubECR(registry)).toEqual(expected); | ||||
|   }); | ||||
| }); | ||||
|  | ||||
| describe('getRegion', () => { | ||||
|   test.each([['012345678901.dkr.ecr.eu-west-3.amazonaws.com', 'eu-west-3']])( | ||||
|     'given registry %p', | ||||
|     async (registry, expected) => { | ||||
|       expect(await aws.getRegion(registry)).toEqual(expected); | ||||
|     } | ||||
|   ); | ||||
|   test.each([ | ||||
|     ['012345678901.dkr.ecr.eu-west-3.amazonaws.com', 'eu-west-3'], | ||||
|     ['876820548815.dkr.ecr.cn-north-1.amazonaws.com.cn', 'cn-north-1'], | ||||
|     ['390948362332.dkr.ecr.cn-northwest-1.amazonaws.com.cn', 'cn-northwest-1'], | ||||
|     ['public.ecr.aws', 'us-east-1'] | ||||
|   ])('given registry %p', async (registry, expected) => { | ||||
|     expect(aws.getRegion(registry)).toEqual(expected); | ||||
|   }); | ||||
| }); | ||||
|  | ||||
| describe('getAccountIDs', () => { | ||||
|   test.each([ | ||||
|     ['012345678901.dkr.ecr.eu-west-3.amazonaws.com', undefined, ['012345678901']], | ||||
|     ['012345678901.dkr.ecr.eu-west-3.amazonaws.com', '012345678910,023456789012', ['012345678901', '012345678910', '023456789012']], | ||||
|     ['012345678901.dkr.ecr.eu-west-3.amazonaws.com', '012345678901,012345678910,023456789012', ['012345678901', '012345678910', '023456789012']], | ||||
|     ['390948362332.dkr.ecr.cn-northwest-1.amazonaws.com.cn', '012345678910,023456789012', ['390948362332', '012345678910', '023456789012']], | ||||
|     ['public.ecr.aws', undefined, []] | ||||
|   ])('given registry %p', async (registry, accountIDsEnv, expected) => { | ||||
|     if (accountIDsEnv) { | ||||
|       process.env.AWS_ACCOUNT_IDS = accountIDsEnv; | ||||
|     } | ||||
|     expect(aws.getAccountIDs(registry)).toEqual(expected); | ||||
|   }); | ||||
| }); | ||||
|  | ||||
| const mockEcrGetAuthToken = jest.fn(); | ||||
| const mockEcrPublicGetAuthToken = jest.fn(); | ||||
| jest.mock('@aws-sdk/client-ecr', () => { | ||||
|   return { | ||||
|     ECR: jest.fn(() => ({ | ||||
|       getAuthorizationToken: mockEcrGetAuthToken | ||||
|     })) | ||||
|   }; | ||||
| }); | ||||
| jest.mock('@aws-sdk/client-ecr-public', () => { | ||||
|   return { | ||||
|     ECRPUBLIC: jest.fn(() => ({ | ||||
|       getAuthorizationToken: mockEcrPublicGetAuthToken | ||||
|     })) | ||||
|   }; | ||||
| }); | ||||
|  | ||||
| describe('getRegistriesData', () => { | ||||
|   beforeEach(() => { | ||||
|     jest.clearAllMocks(); | ||||
|     delete process.env.AWS_ACCOUNT_IDS; | ||||
|   }); | ||||
|   // prettier-ignore | ||||
|   test.each([ | ||||
|     [ | ||||
|       '012345678901.dkr.ecr.aws-region-1.amazonaws.com', | ||||
|       'dkr.ecr.aws-region-1.amazonaws.com', undefined, | ||||
|       [ | ||||
|         { | ||||
|           registry: '012345678901.dkr.ecr.aws-region-1.amazonaws.com', | ||||
|           username: '012345678901', | ||||
|           password: 'world' | ||||
|         } | ||||
|       ] | ||||
|     ], | ||||
|     [ | ||||
|       '012345678901.dkr.ecr.eu-west-3.amazonaws.com', | ||||
|       'dkr.ecr.eu-west-3.amazonaws.com', | ||||
|       '012345678910,023456789012', | ||||
|       [ | ||||
|         { | ||||
|           registry: '012345678901.dkr.ecr.eu-west-3.amazonaws.com', | ||||
|           username: '012345678901', | ||||
|           password: 'world' | ||||
|         }, | ||||
|         { | ||||
|           registry: '012345678910.dkr.ecr.eu-west-3.amazonaws.com', | ||||
|           username: '012345678910', | ||||
|           password: 'world' | ||||
|         }, | ||||
|         { | ||||
|           registry: '023456789012.dkr.ecr.eu-west-3.amazonaws.com', | ||||
|           username: '023456789012', | ||||
|           password: 'world' | ||||
|         } | ||||
|       ] | ||||
|     ], | ||||
|     [ | ||||
|       'public.ecr.aws', | ||||
|       undefined, | ||||
|       undefined, | ||||
|       [ | ||||
|         { | ||||
|           registry: 'public.ecr.aws', | ||||
|           username: 'AWS', | ||||
|           password: 'world' | ||||
|         } | ||||
|       ] | ||||
|     ] | ||||
|   ])('given registry %p', async (registry, fqdn, accountIDsEnv, expected: aws.RegistryData[]) => { | ||||
|     if (accountIDsEnv) { | ||||
|       process.env.AWS_ACCOUNT_IDS = accountIDsEnv; | ||||
|     } | ||||
|     const accountIDs = aws.getAccountIDs(registry); | ||||
|     const authData: AuthorizationData[] = []; | ||||
|     if (accountIDs.length == 0) { | ||||
|       mockEcrPublicGetAuthToken.mockImplementation(() => { | ||||
|         return Promise.resolve({ | ||||
|           authorizationData: { | ||||
|             authorizationToken: Buffer.from(`AWS:world`).toString('base64'), | ||||
|           } | ||||
|         }); | ||||
|       }); | ||||
|     } else { | ||||
|       aws.getAccountIDs(registry).forEach(accountID => { | ||||
|         authData.push({ | ||||
|           authorizationToken: Buffer.from(`${accountID}:world`).toString('base64'), | ||||
|           proxyEndpoint: `${accountID}.${fqdn}` | ||||
|         }); | ||||
|       }); | ||||
|       mockEcrGetAuthToken.mockImplementation(() => { | ||||
|         return Promise.resolve({ | ||||
|           authorizationData: authData | ||||
|         }); | ||||
|       }); | ||||
|     } | ||||
|     const regData = await aws.getRegistriesData(registry); | ||||
|     expect(regData).toEqual(expected); | ||||
|   }); | ||||
| }); | ||||
|   | ||||
| @@ -1,23 +1,9 @@ | ||||
| import osm = require('os'); | ||||
|  | ||||
| import {getInputs} from '../src/context'; | ||||
|  | ||||
| test('without username getInputs throws errors', async () => { | ||||
|   expect(() => { | ||||
|     getInputs(); | ||||
|   }).toThrowError('Input required and not supplied: username'); | ||||
| }); | ||||
|  | ||||
| test('without password getInputs throws errors', async () => { | ||||
|   process.env['INPUT_USERNAME'] = 'dbowie'; | ||||
|   expect(() => { | ||||
|     getInputs(); | ||||
|   }).toThrowError('Input required and not supplied: password'); | ||||
| }); | ||||
|  | ||||
| test('with password and username getInputs does not error', async () => { | ||||
| test('with password and username getInputs does not throw error', async () => { | ||||
|   process.env['INPUT_USERNAME'] = 'dbowie'; | ||||
|   process.env['INPUT_PASSWORD'] = 'groundcontrol'; | ||||
|   process.env['INPUT_LOGOUT'] = 'true'; | ||||
|   expect(() => { | ||||
|     getInputs(); | ||||
|   }).not.toThrowError(); | ||||
|   | ||||
| @@ -7,9 +7,14 @@ import * as exec from '@actions/exec'; | ||||
| process.env['RUNNER_TEMP'] = path.join(__dirname, 'runner'); | ||||
|  | ||||
| test('loginStandard calls exec', async () => { | ||||
|   const execSpy: jest.SpyInstance = jest.spyOn(exec, 'exec'); | ||||
|   // don't let exec try to actually run the commands | ||||
|   execSpy.mockImplementation(() => {}); | ||||
|   const execSpy: jest.SpyInstance = jest.spyOn(exec, 'getExecOutput'); | ||||
|   execSpy.mockImplementation(() => | ||||
|     Promise.resolve({ | ||||
|       exitCode: expect.any(Number), | ||||
|       stdout: expect.any(Function), | ||||
|       stderr: expect.any(Function) | ||||
|     }) | ||||
|   ); | ||||
|  | ||||
|   const username: string = 'dbowie'; | ||||
|   const password: string = 'groundcontrol'; | ||||
| @@ -20,30 +25,25 @@ test('loginStandard calls exec', async () => { | ||||
|   expect(execSpy).toHaveBeenCalledWith(`docker`, ['login', '--password-stdin', '--username', username, registry], { | ||||
|     input: Buffer.from(password), | ||||
|     silent: true, | ||||
|     ignoreReturnCode: true, | ||||
|     listeners: expect.objectContaining({ | ||||
|       stdout: expect.any(Function), | ||||
|       stderr: expect.any(Function) | ||||
|     }) | ||||
|     ignoreReturnCode: true | ||||
|   }); | ||||
| }); | ||||
|  | ||||
| test('logout calls exec', async () => { | ||||
|   const execSpy: jest.SpyInstance = jest.spyOn(exec, 'exec'); | ||||
|   // don't let exec try to actually run the commands | ||||
|   execSpy.mockImplementation(() => {}); | ||||
|   const execSpy: jest.SpyInstance = jest.spyOn(exec, 'getExecOutput'); | ||||
|   execSpy.mockImplementation(() => | ||||
|     Promise.resolve({ | ||||
|       exitCode: expect.any(Number), | ||||
|       stdout: expect.any(Function), | ||||
|       stderr: expect.any(Function) | ||||
|     }) | ||||
|   ); | ||||
|  | ||||
|   const registry: string = 'https://ghcr.io'; | ||||
|  | ||||
|   await logout(registry); | ||||
|  | ||||
|   expect(execSpy).toHaveBeenCalledWith(`docker`, ['logout', registry], { | ||||
|     silent: false, | ||||
|     ignoreReturnCode: true, | ||||
|     input: Buffer.from(''), | ||||
|     listeners: expect.objectContaining({ | ||||
|       stdout: expect.any(Function), | ||||
|       stderr: expect.any(Function) | ||||
|     }) | ||||
|     ignoreReturnCode: true | ||||
|   }); | ||||
| }); | ||||
|   | ||||
| @@ -6,40 +6,17 @@ import * as stateHelper from '../src/state-helper'; | ||||
|  | ||||
| import * as core from '@actions/core'; | ||||
|  | ||||
| test('errors when not run on linux platform', async () => { | ||||
|   const platSpy = jest.spyOn(osm, 'platform'); | ||||
|   platSpy.mockImplementation(() => 'netbsd'); | ||||
|  | ||||
|   const coreSpy: jest.SpyInstance = jest.spyOn(core, 'setFailed'); | ||||
|  | ||||
|   await run(); | ||||
|  | ||||
|   expect(coreSpy).toHaveBeenCalledWith('Only supported on linux platform'); | ||||
| }); | ||||
|  | ||||
| test('errors without username', async () => { | ||||
| test('errors without username and password', async () => { | ||||
|   const platSpy = jest.spyOn(osm, 'platform'); | ||||
|   platSpy.mockImplementation(() => 'linux'); | ||||
|  | ||||
|   process.env['INPUT_LOGOUT'] = 'true'; // default value | ||||
|  | ||||
|   const coreSpy: jest.SpyInstance = jest.spyOn(core, 'setFailed'); | ||||
|  | ||||
|   await run(); | ||||
|  | ||||
|   expect(coreSpy).toHaveBeenCalledWith('Input required and not supplied: username'); | ||||
| }); | ||||
|  | ||||
| test('errors without password', async () => { | ||||
|   const platSpy = jest.spyOn(osm, 'platform'); | ||||
|   platSpy.mockImplementation(() => 'linux'); | ||||
|  | ||||
|   const coreSpy: jest.SpyInstance = jest.spyOn(core, 'setFailed'); | ||||
|  | ||||
|   const username: string = 'dbowie'; | ||||
|   process.env[`INPUT_USERNAME`] = username; | ||||
|  | ||||
|   await run(); | ||||
|  | ||||
|   expect(coreSpy).toHaveBeenCalledWith('Input required and not supplied: password'); | ||||
|   expect(coreSpy).toHaveBeenCalledWith('Username and password required'); | ||||
| }); | ||||
|  | ||||
| test('successful with username and password', async () => { | ||||
| @@ -57,11 +34,17 @@ test('successful with username and password', async () => { | ||||
|   const password: string = 'groundcontrol'; | ||||
|   process.env[`INPUT_PASSWORD`] = password; | ||||
|  | ||||
|   const ecr: string = 'auto'; | ||||
|   process.env['INPUT_ECR'] = ecr; | ||||
|  | ||||
|   const logout: boolean = false; | ||||
|   process.env['INPUT_LOGOUT'] = String(logout); | ||||
|  | ||||
|   await run(); | ||||
|  | ||||
|   expect(setRegistrySpy).toHaveBeenCalledWith(''); | ||||
|   expect(setLogoutSpy).toHaveBeenCalledWith(''); | ||||
|   expect(dockerSpy).toHaveBeenCalledWith('', username, password); | ||||
|   expect(setLogoutSpy).toHaveBeenCalledWith(logout); | ||||
|   expect(dockerSpy).toHaveBeenCalledWith('', username, password, ecr); | ||||
| }); | ||||
|  | ||||
| test('calls docker login', async () => { | ||||
| @@ -79,15 +62,18 @@ test('calls docker login', async () => { | ||||
|   const password: string = 'groundcontrol'; | ||||
|   process.env[`INPUT_PASSWORD`] = password; | ||||
|  | ||||
|   const registry: string = 'https://ghcr.io'; | ||||
|   const registry: string = 'ghcr.io'; | ||||
|   process.env[`INPUT_REGISTRY`] = registry; | ||||
|  | ||||
|   const logout: string = 'true'; | ||||
|   process.env['INPUT_LOGOUT'] = logout; | ||||
|   const ecr: string = 'auto'; | ||||
|   process.env['INPUT_ECR'] = ecr; | ||||
|  | ||||
|   const logout: boolean = true; | ||||
|   process.env['INPUT_LOGOUT'] = String(logout); | ||||
|  | ||||
|   await run(); | ||||
|  | ||||
|   expect(setRegistrySpy).toHaveBeenCalledWith(registry); | ||||
|   expect(setLogoutSpy).toHaveBeenCalledWith(logout); | ||||
|   expect(dockerSpy).toHaveBeenCalledWith(registry, username, password); | ||||
|   expect(dockerSpy).toHaveBeenCalledWith(registry, username, password, ecr); | ||||
| }); | ||||
|   | ||||
| @@ -12,10 +12,14 @@ inputs: | ||||
|     required: false | ||||
|   username: | ||||
|     description: 'Username used to log against the Docker registry' | ||||
|     required: true | ||||
|     required: false | ||||
|   password: | ||||
|     description: 'Password or personal access token used to log against the Docker registry' | ||||
|     required: true | ||||
|     required: false | ||||
|   ecr: | ||||
|     description: 'Specifies whether the given registry is ECR (auto, true or false)' | ||||
|     default: 'auto' | ||||
|     required: false | ||||
|   logout: | ||||
|     description: 'Log out from the Docker registry at the end of a job' | ||||
|     default: 'true' | ||||
|   | ||||
							
								
								
									
										3
									
								
								codecov.yml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										3
									
								
								codecov.yml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,3 @@ | ||||
| comment: false | ||||
| github_checks: | ||||
|   annotations: false | ||||
							
								
								
									
										33723
									
								
								dist/index.js
									
									
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										33723
									
								
								dist/index.js
									
									
									
										generated
									
									
										vendored
									
									
								
							
										
											
												File diff suppressed because one or more lines are too long
											
										
									
								
							
							
								
								
									
										70
									
								
								docker-bake.hcl
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										70
									
								
								docker-bake.hcl
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,70 @@ | ||||
| variable "NODE_VERSION" { | ||||
|   default = "12" | ||||
| } | ||||
|  | ||||
| target "node-version" { | ||||
|   args = { | ||||
|     NODE_VERSION = NODE_VERSION | ||||
|   } | ||||
| } | ||||
|  | ||||
| group "default" { | ||||
|   targets = ["build"] | ||||
| } | ||||
|  | ||||
| group "pre-checkin" { | ||||
|   targets = ["vendor-update", "format", "build"] | ||||
| } | ||||
|  | ||||
| group "validate" { | ||||
|   targets = ["format-validate", "build-validate", "vendor-validate"] | ||||
| } | ||||
|  | ||||
| target "build" { | ||||
|   inherits = ["node-version"] | ||||
|   dockerfile = "./hack/build.Dockerfile" | ||||
|   target = "build-update" | ||||
|   output = ["."] | ||||
| } | ||||
|  | ||||
| target "build-validate" { | ||||
|   inherits = ["node-version"] | ||||
|   dockerfile = "./hack/build.Dockerfile" | ||||
|   target = "build-validate" | ||||
|   output = ["type=cacheonly"] | ||||
| } | ||||
|  | ||||
| target "format" { | ||||
|   inherits = ["node-version"] | ||||
|   dockerfile = "./hack/build.Dockerfile" | ||||
|   target = "format-update" | ||||
|   output = ["."] | ||||
| } | ||||
|  | ||||
| target "format-validate" { | ||||
|   inherits = ["node-version"] | ||||
|   dockerfile = "./hack/build.Dockerfile" | ||||
|   target = "format-validate" | ||||
|   output = ["type=cacheonly"] | ||||
| } | ||||
|  | ||||
| target "vendor-update" { | ||||
|   inherits = ["node-version"] | ||||
|   dockerfile = "./hack/build.Dockerfile" | ||||
|   target = "vendor-update" | ||||
|   output = ["."] | ||||
| } | ||||
|  | ||||
| target "vendor-validate" { | ||||
|   inherits = ["node-version"] | ||||
|   dockerfile = "./hack/build.Dockerfile" | ||||
|   target = "vendor-validate" | ||||
|   output = ["type=cacheonly"] | ||||
| } | ||||
|  | ||||
| target "test" { | ||||
|   inherits = ["node-version"] | ||||
|   dockerfile = "./hack/build.Dockerfile" | ||||
|   target = "test-coverage" | ||||
|   output = ["./coverage"] | ||||
| } | ||||
							
								
								
									
										78
									
								
								hack/build.Dockerfile
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										78
									
								
								hack/build.Dockerfile
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,78 @@ | ||||
| # syntax=docker/dockerfile:1.3-labs | ||||
|  | ||||
| ARG NODE_VERSION | ||||
| ARG DOCKER_VERSION=20.10.10 | ||||
| ARG BUILDX_VERSION=0.7.0 | ||||
|  | ||||
| FROM node:${NODE_VERSION}-alpine AS base | ||||
| RUN apk add --no-cache cpio findutils git | ||||
| WORKDIR /src | ||||
|  | ||||
| FROM base AS deps | ||||
| RUN --mount=type=bind,target=.,rw \ | ||||
|   --mount=type=cache,target=/src/node_modules \ | ||||
|   yarn install && mkdir /vendor && cp yarn.lock /vendor | ||||
|  | ||||
| FROM scratch AS vendor-update | ||||
| COPY --from=deps /vendor / | ||||
|  | ||||
| FROM deps AS vendor-validate | ||||
| RUN --mount=type=bind,target=.,rw <<EOT | ||||
| set -e | ||||
| git add -A | ||||
| cp -rf /vendor/* . | ||||
| if [ -n "$(git status --porcelain -- yarn.lock)" ]; then | ||||
|   echo >&2 'ERROR: Vendor result differs. Please vendor your package with "docker buildx bake vendor-update"' | ||||
|   git status --porcelain -- yarn.lock | ||||
|   exit 1 | ||||
| fi | ||||
| EOT | ||||
|  | ||||
| FROM deps AS build | ||||
| RUN --mount=type=bind,target=.,rw \ | ||||
|   --mount=type=cache,target=/src/node_modules \ | ||||
|   yarn run build && mkdir /out && cp -Rf dist /out/ | ||||
|  | ||||
| FROM scratch AS build-update | ||||
| COPY --from=build /out / | ||||
|  | ||||
| FROM build AS build-validate | ||||
| RUN --mount=type=bind,target=.,rw <<EOT | ||||
| set -e | ||||
| git add -A | ||||
| cp -rf /out/* . | ||||
| if [ -n "$(git status --porcelain -- dist)" ]; then | ||||
|   echo >&2 'ERROR: Build result differs. Please build first with "docker buildx bake build"' | ||||
|   git status --porcelain -- dist | ||||
|   exit 1 | ||||
| fi | ||||
| EOT | ||||
|  | ||||
| FROM deps AS format | ||||
| RUN --mount=type=bind,target=.,rw \ | ||||
|   --mount=type=cache,target=/src/node_modules \ | ||||
|   yarn run format \ | ||||
|   && mkdir /out && find . -name '*.ts' -not -path './node_modules/*' | cpio -pdm /out | ||||
|  | ||||
| FROM scratch AS format-update | ||||
| COPY --from=format /out / | ||||
|  | ||||
| FROM deps AS format-validate | ||||
| RUN --mount=type=bind,target=.,rw \ | ||||
|   --mount=type=cache,target=/src/node_modules \ | ||||
|   yarn run format-check | ||||
|  | ||||
| FROM docker:${DOCKER_VERSION} as docker | ||||
| FROM docker/buildx-bin:${BUILDX_VERSION} as buildx | ||||
|  | ||||
| FROM deps AS test | ||||
| ENV RUNNER_TEMP=/tmp/github_runner | ||||
| ENV RUNNER_TOOL_CACHE=/tmp/github_tool_cache | ||||
| RUN --mount=type=bind,target=.,rw \ | ||||
|   --mount=type=cache,target=/src/node_modules \ | ||||
|   --mount=type=bind,from=docker,source=/usr/local/bin/docker,target=/usr/bin/docker \ | ||||
|   --mount=type=bind,from=buildx,source=/buildx,target=/usr/libexec/docker/cli-plugins/docker-buildx \ | ||||
|   yarn run test --coverageDirectory=/tmp/coverage | ||||
|  | ||||
| FROM scratch AS test-coverage | ||||
| COPY --from=test /tmp/coverage / | ||||
							
								
								
									
										29
									
								
								package.json
									
									
									
									
									
								
							
							
						
						
									
										29
									
								
								package.json
									
									
									
									
									
								
							| @@ -27,22 +27,23 @@ | ||||
|   ], | ||||
|   "license": "MIT", | ||||
|   "dependencies": { | ||||
|     "@actions/core": "^1.2.6", | ||||
|     "@actions/exec": "^1.0.4", | ||||
|     "@actions/io": "^1.0.2", | ||||
|     "semver": "^7.3.2" | ||||
|     "@actions/core": "^1.6.0", | ||||
|     "@actions/exec": "^1.1.0", | ||||
|     "@actions/io": "^1.1.1", | ||||
|     "@aws-sdk/client-ecr": "^3.44.0", | ||||
|     "@aws-sdk/client-ecr-public": "^3.43.0" | ||||
|   }, | ||||
|   "devDependencies": { | ||||
|     "@types/jest": "^26.0.3", | ||||
|     "@types/node": "^14.0.14", | ||||
|     "@vercel/ncc": "^0.23.0", | ||||
|     "dotenv": "^8.2.0", | ||||
|     "jest": "^26.1.0", | ||||
|     "jest-circus": "^26.1.0", | ||||
|     "jest-runtime": "^26.1.0", | ||||
|     "prettier": "^2.0.5", | ||||
|     "ts-jest": "^26.1.1", | ||||
|     "typescript": "^3.9.5", | ||||
|     "@types/jest": "^26.0.23", | ||||
|     "@types/node": "^14.17.4", | ||||
|     "@vercel/ncc": "^0.28.6", | ||||
|     "dotenv": "^8.6.0", | ||||
|     "jest": "^26.6.3", | ||||
|     "jest-circus": "^26.6.3", | ||||
|     "jest-runtime": "^26.6.3", | ||||
|     "prettier": "^2.3.2", | ||||
|     "ts-jest": "^26.5.6", | ||||
|     "typescript": "^3.9.10", | ||||
|     "typescript-formatter": "^7.2.2" | ||||
|   } | ||||
| } | ||||
|   | ||||
							
								
								
									
										131
									
								
								src/aws.ts
									
									
									
									
									
								
							
							
						
						
									
										131
									
								
								src/aws.ts
									
									
									
									
									
								
							| @@ -1,51 +1,108 @@ | ||||
| import * as semver from 'semver'; | ||||
| import * as io from '@actions/io'; | ||||
| import * as execm from './exec'; | ||||
| import * as core from '@actions/core'; | ||||
| import {ECR} from '@aws-sdk/client-ecr'; | ||||
| import {ECRPUBLIC} from '@aws-sdk/client-ecr-public'; | ||||
|  | ||||
| export const isECR = async (registry: string): Promise<boolean> => { | ||||
|   return registry.includes('amazonaws'); | ||||
| const ecrRegistryRegex = /^(([0-9]{12})\.dkr\.ecr\.(.+)\.amazonaws\.com(.cn)?)(\/([^:]+)(:.+)?)?$/; | ||||
|  | ||||
| export const isECR = (registry: string): boolean => { | ||||
|   return ecrRegistryRegex.test(registry) || isPubECR(registry); | ||||
| }; | ||||
|  | ||||
| export const getRegion = async (registry: string): Promise<string> => { | ||||
|   return registry.substring(registry.indexOf('ecr.') + 4, registry.indexOf('.amazonaws')); | ||||
| export const isPubECR = (registry: string): boolean => { | ||||
|   return registry === 'public.ecr.aws'; | ||||
| }; | ||||
|  | ||||
| export const getCLI = async (): Promise<string> => { | ||||
|   return io.which('aws', true); | ||||
| }; | ||||
|  | ||||
| export const execCLI = async (args: string[]): Promise<string> => { | ||||
|   return execm.exec(await getCLI(), args, true).then(res => { | ||||
|     if (res.stderr != '' && !res.success) { | ||||
|       throw new Error(res.stderr); | ||||
|     } else if (res.stderr != '') { | ||||
|       return res.stderr.trim(); | ||||
|     } else { | ||||
|       return res.stdout.trim(); | ||||
|     } | ||||
|   }); | ||||
| }; | ||||
|  | ||||
| export const getCLIVersion = async (): Promise<string> => { | ||||
|   return parseCLIVersion(await execCLI(['--version'])); | ||||
| }; | ||||
|  | ||||
| export const parseCLIVersion = async (stdout: string): Promise<string> => { | ||||
|   const matches = /aws-cli\/([0-9.]+)/.exec(stdout); | ||||
| export const getRegion = (registry: string): string => { | ||||
|   if (isPubECR(registry)) { | ||||
|     return process.env.AWS_REGION || process.env.AWS_DEFAULT_REGION || 'us-east-1'; | ||||
|   } | ||||
|   const matches = registry.match(ecrRegistryRegex); | ||||
|   if (!matches) { | ||||
|     throw new Error(`Cannot parse AWS CLI version`); | ||||
|     return ''; | ||||
|   } | ||||
|   return semver.clean(matches[1]); | ||||
|   return matches[3]; | ||||
| }; | ||||
|  | ||||
| export const getDockerLoginCmd = async (cliVersion: string, registry: string, region: string): Promise<string> => { | ||||
|   if (semver.satisfies(cliVersion, '>=2.0.0')) { | ||||
|     return execCLI(['ecr', 'get-login-password', '--region', region]).then(pwd => { | ||||
|       return `docker login --username AWS --password ${pwd} ${registry}`; | ||||
| export const getAccountIDs = (registry: string): string[] => { | ||||
|   if (isPubECR(registry)) { | ||||
|     return []; | ||||
|   } | ||||
|   const matches = registry.match(ecrRegistryRegex); | ||||
|   if (!matches) { | ||||
|     return []; | ||||
|   } | ||||
|   let accountIDs: Array<string> = [matches[2]]; | ||||
|   if (process.env.AWS_ACCOUNT_IDS) { | ||||
|     accountIDs.push(...process.env.AWS_ACCOUNT_IDS.split(',')); | ||||
|   } | ||||
|   return accountIDs.filter((item, index) => accountIDs.indexOf(item) === index); | ||||
| }; | ||||
|  | ||||
| export interface RegistryData { | ||||
|   registry: string; | ||||
|   username: string; | ||||
|   password: string; | ||||
| } | ||||
|  | ||||
| export const getRegistriesData = async (registry: string, username?: string, password?: string): Promise<RegistryData[]> => { | ||||
|   const region = getRegion(registry); | ||||
|   const accountIDs = getAccountIDs(registry); | ||||
|  | ||||
|   const authTokenRequest = {}; | ||||
|   if (accountIDs.length > 0) { | ||||
|     core.debug(`Requesting AWS ECR auth token for ${accountIDs.join(', ')}`); | ||||
|     authTokenRequest['registryIds'] = accountIDs; | ||||
|   } | ||||
|  | ||||
|   const credentials = | ||||
|     username && password | ||||
|       ? { | ||||
|           accessKeyId: username, | ||||
|           secretAccessKey: password | ||||
|         } | ||||
|       : undefined; | ||||
|  | ||||
|   if (isPubECR(registry)) { | ||||
|     core.info(`AWS Public ECR detected with ${region} region`); | ||||
|     const ecrPublic = new ECRPUBLIC({ | ||||
|       customUserAgent: 'docker-login-action', | ||||
|       credentials, | ||||
|       region: region | ||||
|     }); | ||||
|     const authTokenResponse = await ecrPublic.getAuthorizationToken(authTokenRequest); | ||||
|     if (!authTokenResponse.authorizationData || !authTokenResponse.authorizationData.authorizationToken) { | ||||
|       throw new Error('Could not retrieve an authorization token from AWS Public ECR'); | ||||
|     } | ||||
|     const authToken = Buffer.from(authTokenResponse.authorizationData.authorizationToken, 'base64').toString('utf-8'); | ||||
|     const creds = authToken.split(':', 2); | ||||
|     return [ | ||||
|       { | ||||
|         registry: 'public.ecr.aws', | ||||
|         username: creds[0], | ||||
|         password: creds[1] | ||||
|       } | ||||
|     ]; | ||||
|   } else { | ||||
|     return execCLI(['ecr', 'get-login', '--region', region, '--no-include-email']).then(dockerLoginCmd => { | ||||
|       return dockerLoginCmd; | ||||
|     core.info(`AWS ECR detected with ${region} region`); | ||||
|     const ecr = new ECR({ | ||||
|       customUserAgent: 'docker-login-action', | ||||
|       credentials, | ||||
|       region: region | ||||
|     }); | ||||
|     const authTokenResponse = await ecr.getAuthorizationToken(authTokenRequest); | ||||
|     if (!Array.isArray(authTokenResponse.authorizationData) || !authTokenResponse.authorizationData.length) { | ||||
|       throw new Error('Could not retrieve an authorization token from AWS ECR'); | ||||
|     } | ||||
|     const regDatas: RegistryData[] = []; | ||||
|     for (const authData of authTokenResponse.authorizationData) { | ||||
|       const authToken = Buffer.from(authData.authorizationToken || '', 'base64').toString('utf-8'); | ||||
|       const creds = authToken.split(':', 2); | ||||
|       regDatas.push({ | ||||
|         registry: authData.proxyEndpoint || '', | ||||
|         username: creds[0], | ||||
|         password: creds[1] | ||||
|       }); | ||||
|     } | ||||
|     return regDatas; | ||||
|   } | ||||
| }; | ||||
|   | ||||
| @@ -4,14 +4,16 @@ export interface Inputs { | ||||
|   registry: string; | ||||
|   username: string; | ||||
|   password: string; | ||||
|   logout: string; | ||||
|   ecr: string; | ||||
|   logout: boolean; | ||||
| } | ||||
|  | ||||
| export function getInputs(): Inputs { | ||||
|   return { | ||||
|     registry: core.getInput('registry'), | ||||
|     username: core.getInput('username', {required: true}), | ||||
|     password: core.getInput('password', {required: true}), | ||||
|     logout: core.getInput('logout') | ||||
|     username: core.getInput('username'), | ||||
|     password: core.getInput('password'), | ||||
|     ecr: core.getInput('ecr'), | ||||
|     logout: core.getBooleanInput('logout') | ||||
|   }; | ||||
| } | ||||
|   | ||||
| @@ -1,9 +1,9 @@ | ||||
| import * as core from '@actions/core'; | ||||
| import * as aws from './aws'; | ||||
| import * as execm from './exec'; | ||||
| import * as core from '@actions/core'; | ||||
| import * as exec from '@actions/exec'; | ||||
|  | ||||
| export async function login(registry: string, username: string, password: string): Promise<void> { | ||||
|   if (await aws.isECR(registry)) { | ||||
| export async function login(registry: string, username: string, password: string, ecr: string): Promise<void> { | ||||
|   if (/true/i.test(ecr) || (ecr == 'auto' && aws.isECR(registry))) { | ||||
|     await loginECR(registry, username, password); | ||||
|   } else { | ||||
|     await loginStandard(registry, username, password); | ||||
| @@ -11,50 +11,61 @@ export async function login(registry: string, username: string, password: string | ||||
| } | ||||
|  | ||||
| export async function logout(registry: string): Promise<void> { | ||||
|   await execm.exec('docker', ['logout', registry], false).then(res => { | ||||
|     if (res.stderr != '' && !res.success) { | ||||
|       core.warning(res.stderr); | ||||
|     } | ||||
|   }); | ||||
|   await exec | ||||
|     .getExecOutput('docker', ['logout', registry], { | ||||
|       ignoreReturnCode: true | ||||
|     }) | ||||
|     .then(res => { | ||||
|       if (res.stderr.length > 0 && res.exitCode != 0) { | ||||
|         core.warning(res.stderr.trim()); | ||||
|       } | ||||
|     }); | ||||
| } | ||||
|  | ||||
| export async function loginStandard(registry: string, username: string, password: string): Promise<void> { | ||||
|   let loginArgs: Array<string> = ['login', '--password-stdin']; | ||||
|   if (username) { | ||||
|     loginArgs.push('--username', username); | ||||
|   if (!username || !password) { | ||||
|     throw new Error('Username and password required'); | ||||
|   } | ||||
|  | ||||
|   let loginArgs: Array<string> = ['login', '--password-stdin']; | ||||
|   loginArgs.push('--username', username); | ||||
|   loginArgs.push(registry); | ||||
|  | ||||
|   if (registry) { | ||||
|     core.info(`🔑 Logging into ${registry}...`); | ||||
|     core.info(`Logging into ${registry}...`); | ||||
|   } else { | ||||
|     core.info(`🔑 Logging into DockerHub...`); | ||||
|     core.info(`Logging into Docker Hub...`); | ||||
|   } | ||||
|   await execm.exec('docker', loginArgs, true, password).then(res => { | ||||
|     if (res.stderr != '' && !res.success) { | ||||
|       throw new Error(res.stderr); | ||||
|     } | ||||
|     core.info('🎉 Login Succeeded!'); | ||||
|   }); | ||||
|   await exec | ||||
|     .getExecOutput('docker', loginArgs, { | ||||
|       ignoreReturnCode: true, | ||||
|       silent: true, | ||||
|       input: Buffer.from(password) | ||||
|     }) | ||||
|     .then(res => { | ||||
|       if (res.stderr.length > 0 && res.exitCode != 0) { | ||||
|         throw new Error(res.stderr.trim()); | ||||
|       } | ||||
|       core.info(`Login Succeeded!`); | ||||
|     }); | ||||
| } | ||||
|  | ||||
| export async function loginECR(registry: string, username: string, password: string): Promise<void> { | ||||
|   const cliPath = await aws.getCLI(); | ||||
|   const cliVersion = await aws.getCLIVersion(); | ||||
|   const region = await aws.getRegion(registry); | ||||
|   core.info(`💡 AWS ECR detected with ${region} region`); | ||||
|  | ||||
|   process.env.AWS_ACCESS_KEY_ID = username; | ||||
|   process.env.AWS_SECRET_ACCESS_KEY = password; | ||||
|  | ||||
|   core.info(`⬇️ Retrieving docker login command through AWS CLI ${cliVersion} (${cliPath})...`); | ||||
|   const loginCmd = await aws.getDockerLoginCmd(cliVersion, registry, region); | ||||
|  | ||||
|   core.info(`🔑 Logging into ${registry}...`); | ||||
|   execm.exec(loginCmd, [], true).then(res => { | ||||
|     if (res.stderr != '' && !res.success) { | ||||
|       throw new Error(res.stderr); | ||||
|     } | ||||
|     core.info('🎉 Login Succeeded!'); | ||||
|   }); | ||||
|   core.info(`Retrieving registries data through AWS SDK...`); | ||||
|   const regDatas = await aws.getRegistriesData(registry, username, password); | ||||
|   for (const regData of regDatas) { | ||||
|     core.info(`Logging into ${regData.registry}...`); | ||||
|     await exec | ||||
|       .getExecOutput('docker', ['login', '--password-stdin', '--username', regData.username, regData.registry], { | ||||
|         ignoreReturnCode: true, | ||||
|         silent: true, | ||||
|         input: Buffer.from(regData.password) | ||||
|       }) | ||||
|       .then(res => { | ||||
|         if (res.stderr.length > 0 && res.exitCode != 0) { | ||||
|           throw new Error(res.stderr.trim()); | ||||
|         } | ||||
|         core.info('Login Succeeded!'); | ||||
|       }); | ||||
|   } | ||||
| } | ||||
|   | ||||
							
								
								
									
										40
									
								
								src/exec.ts
									
									
									
									
									
								
							
							
						
						
									
										40
									
								
								src/exec.ts
									
									
									
									
									
								
							| @@ -1,40 +0,0 @@ | ||||
| import * as actionsExec from '@actions/exec'; | ||||
| import {ExecOptions} from '@actions/exec'; | ||||
|  | ||||
| export interface ExecResult { | ||||
|   success: boolean; | ||||
|   stdout: string; | ||||
|   stderr: string; | ||||
| } | ||||
|  | ||||
| export const exec = async ( | ||||
|   command: string, | ||||
|   args: string[] = [], | ||||
|   silent: boolean, | ||||
|   stdin?: string | ||||
| ): Promise<ExecResult> => { | ||||
|   let stdout: string = ''; | ||||
|   let stderr: string = ''; | ||||
|  | ||||
|   const options: ExecOptions = { | ||||
|     silent: silent, | ||||
|     ignoreReturnCode: true, | ||||
|     input: Buffer.from(stdin || '') | ||||
|   }; | ||||
|   options.listeners = { | ||||
|     stdout: (data: Buffer) => { | ||||
|       stdout += data.toString(); | ||||
|     }, | ||||
|     stderr: (data: Buffer) => { | ||||
|       stderr += data.toString(); | ||||
|     } | ||||
|   }; | ||||
|  | ||||
|   const returnCode: number = await actionsExec.exec(command, args, options); | ||||
|  | ||||
|   return { | ||||
|     success: returnCode === 0, | ||||
|     stdout: stdout.trim(), | ||||
|     stderr: stderr.trim() | ||||
|   }; | ||||
| }; | ||||
							
								
								
									
										15
									
								
								src/main.ts
									
									
									
									
									
								
							
							
						
						
									
										15
									
								
								src/main.ts
									
									
									
									
									
								
							| @@ -1,19 +1,14 @@ | ||||
| import * as os from 'os'; | ||||
| import * as core from '@actions/core'; | ||||
| import {getInputs, Inputs} from './context'; | ||||
| import * as context from './context'; | ||||
| import * as docker from './docker'; | ||||
| import * as stateHelper from './state-helper'; | ||||
|  | ||||
| export async function run(): Promise<void> { | ||||
|   try { | ||||
|     if (os.platform() !== 'linux') { | ||||
|       throw new Error('Only supported on linux platform'); | ||||
|     } | ||||
|  | ||||
|     const {registry, username, password, logout} = getInputs(); | ||||
|     stateHelper.setRegistry(registry); | ||||
|     stateHelper.setLogout(logout); | ||||
|     await docker.login(registry, username, password); | ||||
|     const input: context.Inputs = context.getInputs(); | ||||
|     stateHelper.setRegistry(input.registry); | ||||
|     stateHelper.setLogout(input.logout); | ||||
|     await docker.login(input.registry, input.username, input.password, input.ecr); | ||||
|   } catch (error) { | ||||
|     core.setFailed(error.message); | ||||
|   } | ||||
|   | ||||
| @@ -8,7 +8,7 @@ export function setRegistry(registry: string) { | ||||
|   core.saveState('registry', registry); | ||||
| } | ||||
|  | ||||
| export function setLogout(logout: string) { | ||||
| export function setLogout(logout: boolean) { | ||||
|   core.saveState('logout', logout); | ||||
| } | ||||
|  | ||||
|   | ||||
		Reference in New Issue
	
	Block a user