Compare commits
	
		
			307 Commits
		
	
	
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
|   | e92390c5fb | ||
|   | 1e752e2293 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 51c60978b0 | ||
|   | 8f079fbb6c | ||
|   | 16fa7681c3 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 46d1619226 | ||
|   | 8c291c5677 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | ec726f409d | ||
|   | 5139682d94 | ||
|   | 6d4e2ba5df | ||
|   | 583cbb6dfd | ||
|   | 566711b9b9 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | f1ee1338e0 | ||
|   | 83a00bc1ab | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | f405860ca0 | ||
|   | 3d58c274f1 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | a3484d8199 | ||
|   | 1f401f745b | ||
|   | adb236cb13 | ||
|   | 1220aa36aa | ||
|   | 21a24919f5 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | df0d2135ce | ||
|   | 9ed9eb7c45 | ||
|   | e4302a2b09 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | a174191dfd | ||
|   | b5b3868f21 | ||
|   | 7137ecbd58 | ||
|   | 6452b9a4db | ||
|   | 495b903b08 | ||
|   | b96c2c0282 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 3055c413af | ||
|   | b4bedf8053 | ||
|   | be2bd2e073 | ||
|   | b1ee45f5c7 | ||
|   | 601e14e667 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 194e6ce729 | ||
|   | ba38666a08 | ||
|   | eb1ca82ebd | ||
|   | 343f7c4344 | ||
|   | aad0f974f2 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 2e0cd39144 | ||
|   | 203bc9c4ef | ||
|   | 2199648fc8 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | b489376173 | ||
|   | 7c309e74e6 | ||
|   | 0ccf222961 | ||
|   | 56d703e106 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 24d3b3519e | ||
|   | e7ebaec3b4 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 357a886c44 | ||
|   | d76f68242b | ||
|   | 98faccfdb6 | ||
|   | 5a4d18a7d0 | ||
|   | 0e7803459f | ||
|   | a64852414f | ||
|   | 9b251271cc | ||
|   | 94f6005b3f | ||
|   | 3c2fe176ab | ||
|   | a5609cb39f | ||
|   | e67ee94f2c | ||
|   | 98341b6c68 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 69b57c9b4d | ||
|   | cf8514a651 | ||
|   | 721f0dbb33 | ||
|   | 4690724d0f | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 6938c21f0b | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 3fcfd2761a | ||
|   | 553b6f090f | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 7d6435bfdc | ||
|   | 6d5b470689 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | ab756cbbaa | ||
|   | 3e7d5660ba | ||
|   | f244684852 | ||
|   | 413775f4e3 | ||
|   | 6f98ce7512 | ||
|   | a979406458 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 60b7f106cc | ||
|   | ba3ca1d0ac | ||
|   | 039d2a5a8d | ||
|   | cccd53a808 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 9338656050 | ||
|   | cc693296f2 | ||
|   | 939ed8cac4 | ||
|   | 0b2ed364aa | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 315bd6c458 | ||
|   | 243b4ca640 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 1c5e4f407b | ||
|   | 7124cda302 | ||
|   | 0a5a6d545f | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | e6f576c226 | ||
|   | 465a07811f | ||
|   | 360b4b5fef | ||
|   | c156700b23 | ||
|   | f605cf145e | ||
|   | 2a93a3eddb | ||
|   | 422e90f610 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | bc8c4d08b4 | ||
|   | 052c2c4268 | ||
|   | beabccd65a | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | b56ed1c88d | ||
|   | a13e198944 | ||
|   | 1b469c82ee | ||
|   | 83e260592e | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 6ba7f31490 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 5447726540 | ||
|   | 40891eba8c | ||
|   | dcd1f1fe0a | ||
|   | 713d7298f6 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | a7ae18608a | ||
|   | 65b78e6e13 | ||
|   | 219c305e1c | ||
|   | eb81c74b31 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | eb7654ec33 | ||
|   | ec9cdf07d5 | ||
|   | d01f5a4fd6 | ||
|   | af023e8f62 | ||
|   | 3da7dc6e2b | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 07119058a1 | ||
|   | bc135a1993 | ||
|   | f8374000f2 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 9d3e51f876 | ||
|   | 9ec69b27e2 | ||
|   | 7f58925139 | ||
|   | 980c90b31a | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | add9f8d32e | ||
|   | f75d088332 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | b161681273 | ||
|   | f4ef78c080 | ||
|   | 9ad4ce3929 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 884eadd4f8 | ||
|   | a266232f5c | ||
|   | f97efcfbf9 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 5ae789beac | ||
|   | 71c23b5b34 | ||
|   | 6401d70aab | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 67e8909cc6 | ||
|   | 21f251affc | ||
|   | 07cad18854 | ||
|   | be010b4293 | ||
|   | f719196635 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 9607a71381 | ||
|   | d398f07826 | ||
|   | 31aab9fb7e | ||
|   | 49ed152c8e | ||
|   | b61a9ce7bd | ||
|   | 3a136a8631 | ||
|   | b312880b69 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 795794e081 | ||
|   | 1edf6180e0 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 8e66ad4089 | ||
|   | 7c79b598ea | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 24a38e0d6d | ||
|   | 70e1ff84cb | ||
|   | 0828e0e718 | ||
|   | 56f72fcef0 | ||
|   | f169e16aaa | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | fa178e4710 | ||
|   | a4bf4e934e | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 2bbd6e81e1 | ||
|   | f6d32ad023 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | b4595c8bf9 | ||
|   | dd4fa0671b | ||
|   | 4e3538592e | ||
|   | bb984efc56 | ||
|   | 722888132b | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 17780b56b7 | ||
|   | 39857b3b45 | ||
|   | 5fcc728422 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 9fb8721eb9 | ||
|   | 4e3c9375bb | ||
|   | 4b59a429db | ||
|   | 6af3c118c8 | ||
|   | caca3368ce | ||
|   | 17f28ab24d | ||
|   | a875dd0e21 | ||
|   | 7948fffc49 | ||
|   | 5fcefb941d | ||
|   | 3bb2d084df | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 242fb9a356 | ||
|   | fa72313bc3 | ||
|   | 088f62a4f2 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 7929ac7647 | ||
|   | 42d299face | ||
|   | 4858b0b5ea | ||
|   | 1d7d8649e7 | ||
|   | 58855695bb | ||
|   | d9927c4142 | ||
|   | b9a4d91ee5 | ||
|   | b20b9f5e31 | ||
|   | cb21399f71 | ||
|   | faae4d6665 | ||
|   | 4d84a3c20f | ||
|   | 6f7ca8828b | ||
|   | b776a64ec0 | ||
|   | f6476db6e9 | ||
|   | 46ab6d5c3c | ||
|   | 1cce1654e0 | ||
|   | 9537342dee | ||
|   | 7f47463f56 | ||
|   | 8807319764 | ||
|   | ebac4bd30d | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 499663a42c | ||
|   | 70b0f7898e | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 885923496b | ||
|   | ab92432d0b | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 1828bf2d51 | ||
|   | 25c0ca8bab | ||
|   | f11d2ba650 | ||
|   | 3f83d7b89c | ||
|   | c9c0083563 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | f694e84504 | ||
|   | b30d77254f | ||
|   | 95778bc566 | ||
|   | 2c6df6a22f | ||
|   | c41c9a5c65 | ||
|   | fc6fe565d2 | ||
|   | 10428f39dc | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 1b4cf55146 | ||
|   | 5bcefc987c | ||
|   | 169057673d | ||
|   | 5d62c58fc3 | ||
|   | 73cda5dad9 | ||
|   | 5ffec3343b | ||
|   | 305d960cac | ||
|   | 9a9ae26c89 | ||
|   | 48af9f2a97 | ||
|   | c08e3a84a9 | ||
|   | f12fe5c78d | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | b566635cc9 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | b8e54a5ea5 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | d64238b93b | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 763661a124 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 41fba5a8c6 | ||
|   | f054a8b539 | ||
|   | 0644d98afe | ||
|   | 9e433e18cf | ||
|   | 39efbd2c12 | ||
|   | 4608add020 | ||
|   | 4fd5d8ead6 | ||
|   | e2346b6971 | ||
|   | 2051808c83 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 7c220e1b8d | ||
|   | f4cae19820 | ||
|   | e5ad366574 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 45bc0ebd6b | ||
|   | 79068f5240 | ||
|   | 8e670da7a1 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 76901a9025 | ||
|   | 31f1bb4610 | ||
|   | 28eb30dcb6 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 03b00fbeba | ||
|   | 5934fe3407 | ||
|   | 3cba154eb7 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | 986a54f35b | ||
|   | fdb725ed4b | ||
|   | bab7dcbf29 | ||
| ![dependabot[bot]](/assets/img/avatar_default.png)  | c0d23108f7 | ||
|   | c902ecc709 | ||
|   | b612a76a31 | ||
|   | 28218f9b04 | ||
|   | 7439f8b467 | ||
|   | 4b206288bd | ||
|   | 4abf7e9de3 | ||
|   | 175e20ba61 | ||
|   | 92a2593650 | ||
|   | 957a8f0d4a | ||
|   | 971b76aea9 | ||
|   | 5b092cf2f7 | ||
|   | ab81ae06bb | ||
|   | f4a3bbc2c6 | ||
|   | e2302b10cc | ||
|   | c2c723b5d1 | ||
|   | ab80d026d4 | ||
|   | 9376d24995 | ||
|   | 13fa0663e1 | ||
|   | 75e7be0db4 | ||
|   | d6f5c68835 | ||
|   | f3364599c6 | ||
|   | 24646ef465 | ||
|   | 9f189206e8 | ||
|   | aed1d0c0c1 | ||
|   | 31722002f5 | ||
|   | 2a481b4109 | ||
|   | 9bed62818a | ||
|   | c718c795e7 | ||
|   | 7b79d7e834 | ||
|   | f53ca527f7 | ||
|   | d3160f671f | ||
|   | 3b14bab101 | ||
|   | 1e75de0e0e | ||
|   | 7c9afe235c | ||
|   | 7dc3c3a70e | ||
|   | b17cf6ab8f | ||
|   | 27c3146301 | ||
|   | 12fd63324c | ||
|   | a3de3de177 | ||
|   | 9cbd4f95c4 | ||
|   | ad9eb3b250 | ||
|   | 71b3c789fa | ||
|   | 5e0bc83b38 | ||
|   | 1f68ce02d7 | ||
|   | 767b2f4b7b | ||
|   | ddf06e1fed | ||
|   | a5aa81adc8 | ||
|   | 3b9e1f51cd | ||
|   | adb73476b6 | ||
|   | 5df5104555 | 
							
								
								
									
										2
									
								
								.dockerignore
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										2
									
								
								.dockerignore
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,2 @@ | ||||
| /coverage | ||||
| /node_modules | ||||
							
								
								
									
										3
									
								
								.eslintignore
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										3
									
								
								.eslintignore
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,3 @@ | ||||
| /dist/** | ||||
| /coverage/** | ||||
| /node_modules/** | ||||
							
								
								
									
										24
									
								
								.eslintrc.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										24
									
								
								.eslintrc.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,24 @@ | ||||
| { | ||||
|   "env": { | ||||
|     "node": true, | ||||
|     "es6": true, | ||||
|     "jest": true | ||||
|   }, | ||||
|   "extends": [ | ||||
|     "eslint:recommended", | ||||
|     "plugin:@typescript-eslint/eslint-recommended", | ||||
|     "plugin:@typescript-eslint/recommended", | ||||
|     "plugin:jest/recommended", | ||||
|     "plugin:prettier/recommended" | ||||
|   ], | ||||
|   "parser": "@typescript-eslint/parser", | ||||
|   "parserOptions": { | ||||
|     "ecmaVersion": "latest", | ||||
|     "sourceType": "module" | ||||
|   }, | ||||
|   "plugins": [ | ||||
|     "@typescript-eslint", | ||||
|     "jest", | ||||
|     "prettier" | ||||
|   ] | ||||
| } | ||||
							
								
								
									
										1
									
								
								.github/CODEOWNERS
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										1
									
								
								.github/CODEOWNERS
									
									
									
									
										vendored
									
									
								
							| @@ -1 +0,0 @@ | ||||
| *	@crazy-max | ||||
							
								
								
									
										3
									
								
								.github/CODE_OF_CONDUCT.md
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										3
									
								
								.github/CODE_OF_CONDUCT.md
									
									
									
									
										vendored
									
									
										Normal file
									
								
							| @@ -0,0 +1,3 @@ | ||||
| # Code of conduct | ||||
|  | ||||
| - [Moby community guidelines](https://github.com/moby/moby/blob/master/CONTRIBUTING.md#moby-community-guidelines) | ||||
							
								
								
									
										20
									
								
								.github/CONTRIBUTING.md
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										20
									
								
								.github/CONTRIBUTING.md
									
									
									
									
										vendored
									
									
								
							| @@ -2,20 +2,24 @@ | ||||
|  | ||||
| Hi there! We're thrilled that you'd like to contribute to this project. Your help is essential for keeping it great. | ||||
|  | ||||
| Contributions to this project are [released](https://help.github.com/articles/github-terms-of-service/#6-contributions-under-repository-license) to the public under the [project's open source license](LICENSE). | ||||
| Contributions to this project are [released](https://docs.github.com/en/github/site-policy/github-terms-of-service#6-contributions-under-repository-license) | ||||
| to the public under the [project's open source license](LICENSE). | ||||
|  | ||||
| ## Submitting a pull request | ||||
|  | ||||
| 1. [Fork](https://github.com/docker/login-action/fork) and clone the repository | ||||
| 2. Configure and install the dependencies: `yarn install` | ||||
| 4. Create a new branch: `git checkout -b my-branch-name` | ||||
| 5. Make your change | ||||
| 6. Run pre-checkin: `yarn run pre-checkin` | ||||
| 7. Push to your fork and [submit a pull request](https://github.com/docker/login-action/compare) | ||||
| 8. Pat your self on the back and wait for your pull request to be reviewed and merged. | ||||
| 3. Create a new branch: `git checkout -b my-branch-name` | ||||
| 4. Make your changes | ||||
| 5. Make sure the tests pass: `docker buildx bake test` | ||||
| 6. Format code and build javascript artifacts: `docker buildx bake pre-checkin` | ||||
| 7. Validate all code has correctly formatted and built: `docker buildx bake validate` | ||||
| 8. Push to your fork and [submit a pull request](https://github.com/docker/login-action/compare) | ||||
| 9. Pat your self on the back and wait for your pull request to be reviewed and merged. | ||||
|  | ||||
| Here are a few things you can do that will increase the likelihood of your pull request being accepted: | ||||
|  | ||||
| - Write tests. | ||||
| - Make sure the `README.md` and any other relevant **documentation are kept up-to-date**. | ||||
| - We try to follow [SemVer v2.0.0](https://semver.org/). Randomly breaking public APIs is not an option. | ||||
| - Keep your change as focused as possible. If there are multiple changes you would like to make that are not dependent upon each other, consider submitting them as **separate pull requests**. | ||||
| @@ -24,5 +28,5 @@ Here are a few things you can do that will increase the likelihood of your pull | ||||
| ## Resources | ||||
|  | ||||
| - [How to Contribute to Open Source](https://opensource.guide/how-to-contribute/) | ||||
| - [Using Pull Requests](https://help.github.com/articles/about-pull-requests/) | ||||
| - [GitHub Help](https://help.github.com) | ||||
| - [Using Pull Requests](https://docs.github.com/en/github/collaborating-with-issues-and-pull-requests/about-pull-requests) | ||||
| - [GitHub Help](https://docs.github.com/en) | ||||
|   | ||||
							
								
								
									
										101
									
								
								.github/ISSUE_TEMPLATE/bug.yml
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										101
									
								
								.github/ISSUE_TEMPLATE/bug.yml
									
									
									
									
										vendored
									
									
										Normal file
									
								
							| @@ -0,0 +1,101 @@ | ||||
| # https://docs.github.com/en/communities/using-templates-to-encourage-useful-issues-and-pull-requests/syntax-for-githubs-form-schema | ||||
| name: Bug Report | ||||
| description: Report a bug | ||||
| labels: | ||||
|   - status/triage | ||||
|  | ||||
| body: | ||||
|   - type: markdown | ||||
|     attributes: | ||||
|       value: | | ||||
|         Thank you for taking the time to report a bug! | ||||
|         If this is a security issue please report it to the [Docker Security team](mailto:security@docker.com). | ||||
|  | ||||
|   - type: checkboxes | ||||
|     attributes: | ||||
|       label: Contributing guidelines | ||||
|       description: > | ||||
|         Make sure you've read the contributing guidelines before proceeding. | ||||
|       options: | ||||
|         - label: I've read the [contributing guidelines](https://github.com/docker/login-action/blob/master/.github/CONTRIBUTING.md) and wholeheartedly agree | ||||
|           required: true | ||||
|  | ||||
|   - type: checkboxes | ||||
|     attributes: | ||||
|       label: "I've found a bug, and:" | ||||
|       description: | | ||||
|         Make sure that your request fulfills all of the following requirements. | ||||
|         If one requirement cannot be satisfied, explain in detail why. | ||||
|       options: | ||||
|         - label: The documentation does not mention anything about my problem | ||||
|         - label: There are no open or closed issues that are related to my problem | ||||
|  | ||||
|   - type: textarea | ||||
|     attributes: | ||||
|       label: Description | ||||
|       description: > | ||||
|         Provide a brief description of the bug in 1-2 sentences. | ||||
|     validations: | ||||
|       required: true | ||||
|  | ||||
|   - type: textarea | ||||
|     attributes: | ||||
|       label: Expected behaviour | ||||
|       description: > | ||||
|         Describe precisely what you'd expect to happen. | ||||
|     validations: | ||||
|       required: true | ||||
|  | ||||
|   - type: textarea | ||||
|     attributes: | ||||
|       label: Actual behaviour | ||||
|       description: > | ||||
|         Describe precisely what is actually happening. | ||||
|     validations: | ||||
|       required: true | ||||
|  | ||||
|   - type: input | ||||
|     attributes: | ||||
|       label: Repository URL | ||||
|       description: > | ||||
|         Enter the URL of the repository where you are experiencing the | ||||
|         issue. If your repository is private, provide a link to a minimal | ||||
|         repository that reproduces the issue. | ||||
|  | ||||
|   - type: input | ||||
|     attributes: | ||||
|       label: Workflow run URL | ||||
|       description: > | ||||
|         Enter the URL of the GitHub Action workflow run if public (e.g. | ||||
|         `https://github.com/<user>/<repo>/actions/runs/<id>`) | ||||
|  | ||||
|   - type: textarea | ||||
|     attributes: | ||||
|       label: YAML workflow | ||||
|       description: | | ||||
|         Provide the YAML of the workflow that's causing the issue. | ||||
|         Make sure to remove any sensitive information. | ||||
|       render: yaml | ||||
|     validations: | ||||
|       required: true | ||||
|  | ||||
|   - type: textarea | ||||
|     attributes: | ||||
|       label: Workflow logs | ||||
|       description: > | ||||
|         [Attach](https://docs.github.com/en/get-started/writing-on-github/working-with-advanced-formatting/attaching-files) | ||||
|         the [log file of your workflow run](https://docs.github.com/en/actions/managing-workflow-runs/using-workflow-run-logs#downloading-logs) | ||||
|         and make sure to remove any sensitive information. | ||||
|  | ||||
|   - type: textarea | ||||
|     attributes: | ||||
|       label: BuildKit logs | ||||
|       description: > | ||||
|         If applicable, provide the [BuildKit container logs](https://docs.docker.com/build/ci/github-actions/configure-builder/#buildkit-container-logs) | ||||
|       render: text | ||||
|  | ||||
|   - type: textarea | ||||
|     attributes: | ||||
|       label: Additional info | ||||
|       description: | | ||||
|         Provide any additional information that could be useful. | ||||
							
								
								
									
										33
									
								
								.github/ISSUE_TEMPLATE/bug_report.md
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										33
									
								
								.github/ISSUE_TEMPLATE/bug_report.md
									
									
									
									
										vendored
									
									
								
							| @@ -1,33 +0,0 @@ | ||||
| --- | ||||
| name: Bug report | ||||
| about: Create a report to help us improve | ||||
| --- | ||||
|  | ||||
| ### Behaviour | ||||
|  | ||||
| #### Steps to reproduce this issue | ||||
|  | ||||
| 1. | ||||
| 2. | ||||
| 3. | ||||
|  | ||||
| #### Expected behaviour | ||||
|  | ||||
| > Tell us what should happen | ||||
|  | ||||
| #### Actual behaviour | ||||
|  | ||||
| > Tell us what happens instead | ||||
|  | ||||
| ### Configuration | ||||
|  | ||||
| * Repository URL (if public):  | ||||
| * Build URL (if public):  | ||||
|  | ||||
| ```yml | ||||
| # paste your YAML workflow file here and remove sensitive data | ||||
| ``` | ||||
|  | ||||
| ### Logs | ||||
|  | ||||
| > Download the [log file of your build](https://help.github.com/en/actions/configuring-and-managing-workflows/managing-a-workflow-run#downloading-logs) and [attach it](https://help.github.com/en/github/managing-your-work-on-github/file-attachments-on-issues-and-pull-requests) to this issue. | ||||
							
								
								
									
										9
									
								
								.github/ISSUE_TEMPLATE/config.yml
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										9
									
								
								.github/ISSUE_TEMPLATE/config.yml
									
									
									
									
										vendored
									
									
										Normal file
									
								
							| @@ -0,0 +1,9 @@ | ||||
| # https://docs.github.com/en/communities/using-templates-to-encourage-useful-issues-and-pull-requests/configuring-issue-templates-for-your-repository#configuring-the-template-chooser | ||||
| blank_issues_enabled: true | ||||
| contact_links: | ||||
|   - name: Questions and Discussions | ||||
|     url: https://github.com/docker/login-action/discussions/new | ||||
|     about: Use Github Discussions to ask questions and/or open discussion topics. | ||||
|   - name: Documentation | ||||
|     url: https://docs.docker.com/build/ci/github-actions/ | ||||
|     about: Read the documentation. | ||||
							
								
								
									
										15
									
								
								.github/ISSUE_TEMPLATE/feature.yml
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										15
									
								
								.github/ISSUE_TEMPLATE/feature.yml
									
									
									
									
										vendored
									
									
										Normal file
									
								
							| @@ -0,0 +1,15 @@ | ||||
| # https://docs.github.com/en/communities/using-templates-to-encourage-useful-issues-and-pull-requests/syntax-for-githubs-form-schema | ||||
| name: Feature request | ||||
| description: Missing functionality? Come tell us about it! | ||||
| labels: | ||||
|   - kind/enhancement | ||||
|   - status/triage | ||||
|  | ||||
| body: | ||||
|   - type: textarea | ||||
|     id: description | ||||
|     attributes: | ||||
|       label: Description | ||||
|       description: What is the feature you want to see? | ||||
|     validations: | ||||
|       required: true | ||||
							
								
								
									
										12
									
								
								.github/SECURITY.md
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										12
									
								
								.github/SECURITY.md
									
									
									
									
										vendored
									
									
										Normal file
									
								
							| @@ -0,0 +1,12 @@ | ||||
| # Reporting security issues | ||||
|  | ||||
| The project maintainers take security seriously. If you discover a security | ||||
| issue, please bring it to their attention right away! | ||||
|  | ||||
| **Please _DO NOT_ file a public issue**, instead send your report privately to | ||||
| [security@docker.com](mailto:security@docker.com). | ||||
|  | ||||
| Security reports are greatly appreciated, and we will publicly thank you for it. | ||||
| We also like to send gifts—if you'd like Docker swag, make sure to let | ||||
| us know. We currently do not offer a paid security bounty program, but are not | ||||
| ruling it out in the future. | ||||
							
								
								
									
										29
									
								
								.github/SUPPORT.md
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										29
									
								
								.github/SUPPORT.md
									
									
									
									
										vendored
									
									
								
							| @@ -1,29 +0,0 @@ | ||||
| # Support [](https://isitmaintained.com/project/docker/login-action) | ||||
|  | ||||
| ## Reporting an issue | ||||
|  | ||||
| Please do a search in [open issues](https://github.com/docker/login-action/issues?utf8=%E2%9C%93&q=) to see if the issue or feature request has already been filed. | ||||
|  | ||||
| If you find your issue already exists, make relevant comments and add your [reaction](https://github.com/blog/2119-add-reactions-to-pull-requests-issues-and-comments). Use a reaction in place of a "+1" comment. | ||||
|  | ||||
| :+1: - upvote | ||||
|  | ||||
| :-1: - downvote | ||||
|  | ||||
| If you cannot find an existing issue that describes your bug or feature, submit an issue using the guidelines below. | ||||
|  | ||||
| ## Writing good bug reports and feature requests | ||||
|  | ||||
| File a single issue per problem and feature request. | ||||
|  | ||||
| * Do not enumerate multiple bugs or feature requests in the same issue. | ||||
| * Do not add your issue as a comment to an existing issue unless it's for the identical input. Many issues look similar, but have different causes. | ||||
|  | ||||
| The more information you can provide, the more likely someone will be successful reproducing the issue and finding a fix. | ||||
|  | ||||
| You are now ready to [create a new issue](https://github.com/docker/login-action/issues/new/choose)! | ||||
|  | ||||
| ## Closure policy | ||||
|  | ||||
| * Issues that don't have the information requested above (when applicable) will be closed immediately and the poster directed to the support guidelines. | ||||
| * Issues that go a week without a response from original poster are subject to closure at our discretion. | ||||
							
								
								
									
										20
									
								
								.github/dependabot.yml
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										20
									
								
								.github/dependabot.yml
									
									
									
									
										vendored
									
									
								
							| @@ -4,19 +4,23 @@ updates: | ||||
|     directory: "/" | ||||
|     schedule: | ||||
|       interval: "daily" | ||||
|       time: "06:00" | ||||
|       timezone: "Europe/Paris" | ||||
|     labels: | ||||
|       - ":game_die: dependencies" | ||||
|       - ":robot: bot" | ||||
|       - "dependencies" | ||||
|       - "bot" | ||||
|   - package-ecosystem: "npm" | ||||
|     directory: "/" | ||||
|     schedule: | ||||
|       interval: "daily" | ||||
|       time: "06:00" | ||||
|       timezone: "Europe/Paris" | ||||
|     versioning-strategy: "increase" | ||||
|     groups: | ||||
|       aws-sdk-dependencies: | ||||
|         patterns: | ||||
|           - "*aws-sdk*" | ||||
|       proxy-agent-dependencies: | ||||
|         patterns: | ||||
|           - "*-proxy-agent" | ||||
|     allow: | ||||
|       - dependency-type: "production" | ||||
|     labels: | ||||
|       - ":game_die: dependencies" | ||||
|       - ":robot: bot" | ||||
|       - "dependencies" | ||||
|       - "bot" | ||||
|   | ||||
							
								
								
									
										
											BIN
										
									
								
								.github/docker-login.png
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										
											BIN
										
									
								
								.github/docker-login.png
									
									
									
									
										vendored
									
									
								
							
										
											Binary file not shown.
										
									
								
							| Before Width: | Height: | Size: 5.0 KiB After Width: | Height: | Size: 4.3 KiB | 
							
								
								
									
										77
									
								
								.github/labels.yml
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										77
									
								
								.github/labels.yml
									
									
									
									
										vendored
									
									
								
							| @@ -1,77 +0,0 @@ | ||||
| ## more info https://github.com/crazy-max/ghaction-github-labeler | ||||
| - # automerge | ||||
|   name: ":bell: automerge" | ||||
|   color: "8f4fbc" | ||||
|   description: "" | ||||
| - # bot | ||||
|   name: ":robot: bot" | ||||
|   color: "69cde9" | ||||
|   description: "" | ||||
| - # bug | ||||
|   name: ":bug: bug" | ||||
|   color: "b60205" | ||||
|   description: "" | ||||
| - # dependencies | ||||
|   name: ":game_die: dependencies" | ||||
|   color: "0366d6" | ||||
|   description: "" | ||||
| - # documentation | ||||
|   name: ":memo: documentation" | ||||
|   color: "c5def5" | ||||
|   description: "" | ||||
| - # duplicate | ||||
|   name: ":busts_in_silhouette: duplicate" | ||||
|   color: "cccccc" | ||||
|   description: "" | ||||
| - # enhancement | ||||
|   name: ":sparkles: enhancement" | ||||
|   color: "0054ca" | ||||
|   description: "" | ||||
| - # feature request | ||||
|   name: ":bulb: feature request" | ||||
|   color: "0e8a16" | ||||
|   description: "" | ||||
| - # feedback | ||||
|   name: ":mega: feedback" | ||||
|   color: "03a9f4" | ||||
|   description: "" | ||||
| - # future maybe | ||||
|   name: ":rocket: future maybe" | ||||
|   color: "fef2c0" | ||||
|   description: "" | ||||
| - # good first issue | ||||
|   name: ":hatching_chick: good first issue" | ||||
|   color: "7057ff" | ||||
|   description: "" | ||||
| - # help wanted | ||||
|   name: ":pray: help wanted" | ||||
|   color: "4caf50" | ||||
|   description: "" | ||||
| - # hold | ||||
|   name: ":hand: hold" | ||||
|   color: "24292f" | ||||
|   description: "" | ||||
| - # invalid | ||||
|   name: ":no_entry_sign: invalid" | ||||
|   color: "e6e6e6" | ||||
|   description: "" | ||||
| - # maybe bug | ||||
|   name: ":interrobang: maybe bug" | ||||
|   color: "ff5722" | ||||
|   description: "" | ||||
| - # needs more info | ||||
|   name: ":thinking: needs more info" | ||||
|   color: "795548" | ||||
|   description: "" | ||||
| - # question | ||||
|   name: ":question: question" | ||||
|   color: "3f51b5" | ||||
|   description: "" | ||||
| - # upstream | ||||
|   name: ":eyes: upstream" | ||||
|   color: "fbca04" | ||||
|   description: "" | ||||
| - # wontfix | ||||
|   name: ":coffin: wontfix" | ||||
|   color: "ffffff" | ||||
|   description: "" | ||||
							
								
								
									
										361
									
								
								.github/workflows/ci.yml
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										361
									
								
								.github/workflows/ci.yml
									
									
									
									
										vendored
									
									
								
							| @@ -1,119 +1,288 @@ | ||||
| name: ci | ||||
|  | ||||
| concurrency: | ||||
|   group: ${{ github.workflow }}-${{ github.ref }} | ||||
|   cancel-in-progress: true | ||||
|  | ||||
| on: | ||||
|   workflow_dispatch: | ||||
|   schedule: | ||||
|     - cron: '0 10 * * *' | ||||
|   push: | ||||
|     branches: | ||||
|       - master | ||||
|       - releases/v* | ||||
|       - 'master' | ||||
|       - 'releases/v*' | ||||
|  | ||||
| jobs: | ||||
| #  dockerhub: | ||||
| #    runs-on: ${{ matrix.os }} | ||||
| #    strategy: | ||||
| #      fail-fast: false | ||||
| #      matrix: | ||||
| #        os: | ||||
| #          - ubuntu-20.04 | ||||
| #          - ubuntu-18.04 | ||||
| #          - ubuntu-16.04 | ||||
| #        logout: | ||||
| #          - true | ||||
| #          - false | ||||
| #    steps: | ||||
| #      - | ||||
| #        name: Checkout | ||||
| #        uses: actions/checkout@v2.3.2 | ||||
| #      - | ||||
| #        name: Login to DockerHub | ||||
| #        uses: ./ | ||||
| #        with: | ||||
| #          username: ${{ secrets.DOCKERHUB_USERNAME_TEST }} | ||||
| #          password: ${{ secrets.DOCKERHUB_PASSWORD_TEST }} | ||||
| #          logout: ${{ matrix.logout }} | ||||
| #      - | ||||
| #        name: Clear | ||||
| #        if: always() | ||||
| #        run: | | ||||
| #          rm -f ${HOME}/.docker/config.json | ||||
|   stop-docker: | ||||
|     runs-on: ubuntu-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v4 | ||||
|       - | ||||
|         name: Stop docker | ||||
|         run: | | ||||
|           sudo systemctl stop docker | ||||
|       - | ||||
|         name: Login to GitHub Container Registry | ||||
|         uses: ./ | ||||
|         with: | ||||
|           registry: ghcr.io | ||||
|           username: ${{ github.actor }} | ||||
|           password: ${{ secrets.GITHUB_TOKEN }} | ||||
|  | ||||
|   gpr: | ||||
|   logout: | ||||
|     runs-on: ubuntu-latest | ||||
|     strategy: | ||||
|       fail-fast: false | ||||
|       matrix: | ||||
|         logout: | ||||
|           - true | ||||
|           - false | ||||
|           - true | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v2.3.2 | ||||
|         uses: actions/checkout@v4 | ||||
|       - | ||||
|         name: Login to GitHub Package Registry | ||||
|         name: Login to GitHub Container Registry | ||||
|         uses: ./ | ||||
|         with: | ||||
|           registry: docker.pkg.github.com | ||||
|           username: ${{ github.repository_owner }} | ||||
|           registry: ghcr.io | ||||
|           username: ${{ github.actor }} | ||||
|           password: ${{ secrets.GITHUB_TOKEN }} | ||||
|           logout: ${{ matrix.logout }} | ||||
|       - | ||||
|         name: Clear | ||||
|         if: always() | ||||
|         run: | | ||||
|           rm -f ${HOME}/.docker/config.json | ||||
|  | ||||
| #  gitlab: | ||||
| #    runs-on: ubuntu-latest | ||||
| #    strategy: | ||||
| #      fail-fast: false | ||||
| #      matrix: | ||||
| #        logout: | ||||
| #          - true | ||||
| #          - false | ||||
| #    steps: | ||||
| #      - | ||||
| #        name: Checkout | ||||
| #        uses: actions/checkout@v2.3.2 | ||||
| #      - | ||||
| #        name: Login to GitLab | ||||
| #        uses: ./ | ||||
| #        with: | ||||
| #          registry: registry.gitlab.com | ||||
| #          username: ${{ secrets.GITLAB_USERNAME_TEST }} | ||||
| #          password: ${{ secrets.GITLAB_PASSWORD_TEST }} | ||||
| #          logout: ${{ matrix.logout }} | ||||
| #      - | ||||
| #        name: Clear | ||||
| #        if: always() | ||||
| #        run: | | ||||
| #          rm -f ${HOME}/.docker/config.json | ||||
| # | ||||
| #  ecr: | ||||
| #    runs-on: ${{ matrix.os }} | ||||
| #    strategy: | ||||
| #      fail-fast: false | ||||
| #      matrix: | ||||
| #        os: | ||||
| #          - ubuntu-20.04 | ||||
| #          - ubuntu-18.04 | ||||
| #          - ubuntu-16.04 | ||||
| #        logout: | ||||
| #          - true | ||||
| #          - false | ||||
| #    steps: | ||||
| #      - | ||||
| #        name: Checkout | ||||
| #        uses: actions/checkout@v2.3.1 | ||||
| #      - | ||||
| #        name: Login to ECR | ||||
| #        uses: ./ | ||||
| #        with: | ||||
| #          registry: ${{ secrets.AWS_ACCOUNT_NUMBER }}.dkr.ecr.${{ secrets.AWS_REGION }}.amazonaws.com | ||||
| #          username: ${{ secrets.AWS_ACCESS_KEY_ID }} | ||||
| #          password: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | ||||
| #          logout: ${{ matrix.logout }} | ||||
| #      - | ||||
| #        name: Clear | ||||
| #        if: always() | ||||
| #        run: | | ||||
| #          rm -f ${HOME}/.docker/config.json | ||||
|   dind: | ||||
|     runs-on: ubuntu-latest | ||||
|     env: | ||||
|       DOCKER_CONFIG: $HOME/.docker | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v4 | ||||
|       - | ||||
|         name: Login to GitHub Container Registry | ||||
|         uses: ./ | ||||
|         with: | ||||
|           registry: ghcr.io | ||||
|           username: ${{ secrets.GHCR_USERNAME }} | ||||
|           password: ${{ secrets.GHCR_PAT }} | ||||
|       - | ||||
|         name: DinD | ||||
|         uses: docker://docker | ||||
|         with: | ||||
|           entrypoint: docker | ||||
|           args: pull ghcr.io/docker-ghactiontest/test | ||||
|       - | ||||
|         name: Pull private image | ||||
|         run: | | ||||
|           docker image prune -a -f >/dev/null 2>&1 | ||||
|           docker pull ghcr.io/docker-ghactiontest/test | ||||
|  | ||||
|   acr: | ||||
|     runs-on: ubuntu-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v4 | ||||
|       - | ||||
|         name: Login to ACR | ||||
|         uses: ./ | ||||
|         with: | ||||
|           registry: ${{ secrets.AZURE_REGISTRY_NAME }}.azurecr.io | ||||
|           username: ${{ secrets.AZURE_CLIENT_ID }} | ||||
|           password: ${{ secrets.AZURE_CLIENT_SECRET }} | ||||
|  | ||||
|   dockerhub: | ||||
|     runs-on: ${{ matrix.os }} | ||||
|     strategy: | ||||
|       fail-fast: false | ||||
|       matrix: | ||||
|         os: | ||||
|           - ubuntu-latest | ||||
|           - windows-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v4 | ||||
|       - | ||||
|         name: Login to Docker Hub | ||||
|         uses: ./ | ||||
|         with: | ||||
|           username: ${{ secrets.DOCKERHUB_USERNAME }} | ||||
|           password: ${{ secrets.DOCKERHUB_TOKEN }} | ||||
|  | ||||
|   ecr: | ||||
|     runs-on: ${{ matrix.os }} | ||||
|     strategy: | ||||
|       fail-fast: false | ||||
|       matrix: | ||||
|         os: | ||||
|           - ubuntu-latest | ||||
|           - windows-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v4 | ||||
|       - | ||||
|         name: Login to ECR | ||||
|         uses: ./ | ||||
|         with: | ||||
|           registry: ${{ secrets.AWS_ACCOUNT_NUMBER }}.dkr.ecr.us-east-1.amazonaws.com | ||||
|           username: ${{ secrets.AWS_ACCESS_KEY_ID }} | ||||
|           password: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | ||||
|  | ||||
|   ecr-aws-creds: | ||||
|     runs-on: ${{ matrix.os }} | ||||
|     strategy: | ||||
|       fail-fast: false | ||||
|       matrix: | ||||
|         os: | ||||
|           - ubuntu-latest | ||||
|           - windows-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v4 | ||||
|       - | ||||
|         name: Configure AWS Credentials | ||||
|         uses: aws-actions/configure-aws-credentials@v4 | ||||
|         with: | ||||
|           aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }} | ||||
|           aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | ||||
|           aws-region: us-east-1 | ||||
|       - | ||||
|         name: Login to ECR | ||||
|         uses: ./ | ||||
|         with: | ||||
|           registry: ${{ secrets.AWS_ACCOUNT_NUMBER }}.dkr.ecr.us-east-1.amazonaws.com | ||||
|  | ||||
|   ecr-public: | ||||
|     runs-on: ${{ matrix.os }} | ||||
|     strategy: | ||||
|       fail-fast: false | ||||
|       matrix: | ||||
|         os: | ||||
|           - ubuntu-latest | ||||
|           - windows-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v4 | ||||
|       - | ||||
|         name: Login to Public ECR | ||||
|         continue-on-error: ${{ matrix.os == 'windows-latest' }} | ||||
|         uses: ./ | ||||
|         with: | ||||
|           registry: public.ecr.aws | ||||
|           username: ${{ secrets.AWS_ACCESS_KEY_ID }} | ||||
|           password: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | ||||
|         env: | ||||
|           AWS_REGION: us-east-1 | ||||
|  | ||||
|   ecr-public-aws-creds: | ||||
|     runs-on: ${{ matrix.os }} | ||||
|     strategy: | ||||
|       fail-fast: false | ||||
|       matrix: | ||||
|         os: | ||||
|           - ubuntu-latest | ||||
|           - windows-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v4 | ||||
|       - | ||||
|         name: Configure AWS Credentials | ||||
|         uses: aws-actions/configure-aws-credentials@v4 | ||||
|         with: | ||||
|           aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }} | ||||
|           aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | ||||
|           aws-region: us-east-1 | ||||
|       - | ||||
|         name: Login to Public ECR | ||||
|         continue-on-error: ${{ matrix.os == 'windows-latest' }} | ||||
|         uses: ./ | ||||
|         with: | ||||
|           registry: public.ecr.aws | ||||
|  | ||||
|   github-container: | ||||
|     runs-on: ${{ matrix.os }} | ||||
|     strategy: | ||||
|       fail-fast: false | ||||
|       matrix: | ||||
|         os: | ||||
|           - ubuntu-latest | ||||
|           - windows-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v4 | ||||
|       - | ||||
|         name: Login to GitHub Container Registry | ||||
|         uses: ./ | ||||
|         with: | ||||
|           registry: ghcr.io | ||||
|           username: ${{ github.actor }} | ||||
|           password: ${{ secrets.GITHUB_TOKEN }} | ||||
|  | ||||
|   gitlab: | ||||
|     runs-on: ${{ matrix.os }} | ||||
|     strategy: | ||||
|       fail-fast: false | ||||
|       matrix: | ||||
|         os: | ||||
|           - ubuntu-latest | ||||
|           - windows-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v4 | ||||
|       - | ||||
|         name: Login to GitLab | ||||
|         uses: ./ | ||||
|         with: | ||||
|           registry: registry.gitlab.com | ||||
|           username: ${{ secrets.GITLAB_USERNAME }} | ||||
|           password: ${{ secrets.GITLAB_TOKEN }} | ||||
|  | ||||
|   google-artifact: | ||||
|     runs-on: ${{ matrix.os }} | ||||
|     strategy: | ||||
|       fail-fast: false | ||||
|       matrix: | ||||
|         os: | ||||
|           - ubuntu-latest | ||||
|           - windows-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v4 | ||||
|       - | ||||
|         name: Login to Google Artifact Registry | ||||
|         uses: ./ | ||||
|         with: | ||||
|           registry: ${{ secrets.GAR_LOCATION }}-docker.pkg.dev | ||||
|           username: _json_key | ||||
|           password: ${{ secrets.GAR_JSON_KEY }} | ||||
|  | ||||
|   google-container: | ||||
|     runs-on: ${{ matrix.os }} | ||||
|     strategy: | ||||
|       fail-fast: false | ||||
|       matrix: | ||||
|         os: | ||||
|           - ubuntu-latest | ||||
|           - windows-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v4 | ||||
|       - | ||||
|         name: Login to Google Container Registry | ||||
|         uses: ./ | ||||
|         with: | ||||
|           registry: gcr.io | ||||
|           username: _json_key | ||||
|           password: ${{ secrets.GCR_JSON_KEY }} | ||||
|   | ||||
							
								
								
									
										50
									
								
								.github/workflows/codeql.yml
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										50
									
								
								.github/workflows/codeql.yml
									
									
									
									
										vendored
									
									
										Normal file
									
								
							| @@ -0,0 +1,50 @@ | ||||
| name: codeql | ||||
|  | ||||
| on: | ||||
|   push: | ||||
|     branches: | ||||
|       - 'master' | ||||
|       - 'releases/v*' | ||||
|     paths: | ||||
|       - '.github/workflows/codeql.yml' | ||||
|       - 'dist/**' | ||||
|       - 'src/**' | ||||
|   pull_request: | ||||
|     paths: | ||||
|       - '.github/workflows/codeql.yml' | ||||
|       - 'dist/**' | ||||
|       - 'src/**' | ||||
|  | ||||
| permissions: | ||||
|   actions: read | ||||
|   contents: read | ||||
|   security-events: write | ||||
|  | ||||
| jobs: | ||||
|   analyze: | ||||
|     runs-on: ubuntu-latest | ||||
|     strategy: | ||||
|       fail-fast: false | ||||
|       matrix: | ||||
|         language: | ||||
|           - javascript-typescript | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v4 | ||||
|       - | ||||
|         name: Initialize CodeQL | ||||
|         uses: github/codeql-action/init@v3 | ||||
|         with: | ||||
|           languages: ${{ matrix.language }} | ||||
|           config: | | ||||
|             paths: | ||||
|               - src | ||||
|       - | ||||
|         name: Autobuild | ||||
|         uses: github/codeql-action/autobuild@v3 | ||||
|       - | ||||
|         name: Perform CodeQL Analysis | ||||
|         uses: github/codeql-action/analyze@v3 | ||||
|         with: | ||||
|           category: "/language:${{matrix.language}}" | ||||
							
								
								
									
										20
									
								
								.github/workflows/labels.yml
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										20
									
								
								.github/workflows/labels.yml
									
									
									
									
										vendored
									
									
								
							| @@ -1,20 +0,0 @@ | ||||
| name: labels | ||||
|  | ||||
| on: | ||||
|   push: | ||||
|     branches: | ||||
|       - 'master' | ||||
|     paths: | ||||
|       - '.github/labels.yml' | ||||
|       - '.github/workflows/labels.yml' | ||||
|  | ||||
| jobs: | ||||
|   labeler: | ||||
|     runs-on: ubuntu-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v2.3.2 | ||||
|       - | ||||
|         name: Run Labeler | ||||
|         uses: crazy-max/ghaction-github-labeler@v3.0.0 | ||||
							
								
								
									
										35
									
								
								.github/workflows/test.yml
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										35
									
								
								.github/workflows/test.yml
									
									
									
									
										vendored
									
									
								
							| @@ -1,40 +1,31 @@ | ||||
| name: test | ||||
|  | ||||
| concurrency: | ||||
|   group: ${{ github.workflow }}-${{ github.ref }} | ||||
|   cancel-in-progress: true | ||||
|  | ||||
| on: | ||||
|   push: | ||||
|     branches: | ||||
|       - master | ||||
|       - releases/v* | ||||
|     paths-ignore: | ||||
|       - '**.md' | ||||
|       - 'master' | ||||
|       - 'releases/v*' | ||||
|   pull_request: | ||||
|     paths-ignore: | ||||
|       - '**.md' | ||||
|  | ||||
| jobs: | ||||
|   test: | ||||
|     runs-on: ${{ matrix.os }} | ||||
|     strategy: | ||||
|       fail-fast: false | ||||
|       matrix: | ||||
|         os: | ||||
|           - ubuntu-20.04 | ||||
|           - ubuntu-18.04 | ||||
|           - ubuntu-16.04 | ||||
|     runs-on: ubuntu-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v2.3.2 | ||||
|       - | ||||
|         name: Install | ||||
|         run: yarn install | ||||
|         uses: actions/checkout@v4 | ||||
|       - | ||||
|         name: Test | ||||
|         run: yarn run test | ||||
|         uses: docker/bake-action@v4 | ||||
|         with: | ||||
|           targets: test | ||||
|       - | ||||
|         name: Upload coverage | ||||
|         uses: codecov/codecov-action@v1.0.13 | ||||
|         if: success() | ||||
|         uses: codecov/codecov-action@v4 | ||||
|         with: | ||||
|           token: ${{ secrets.CODECOV_TOKEN }} | ||||
|           file: ./coverage/clover.xml | ||||
|           token: ${{ secrets.CODECOV_TOKEN }} | ||||
|   | ||||
							
								
								
									
										45
									
								
								.github/workflows/validate.yml
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										45
									
								
								.github/workflows/validate.yml
									
									
									
									
										vendored
									
									
										Normal file
									
								
							| @@ -0,0 +1,45 @@ | ||||
| name: validate | ||||
|  | ||||
| concurrency: | ||||
|   group: ${{ github.workflow }}-${{ github.ref }} | ||||
|   cancel-in-progress: true | ||||
|  | ||||
| on: | ||||
|   push: | ||||
|     branches: | ||||
|       - 'master' | ||||
|       - 'releases/v*' | ||||
|   pull_request: | ||||
|  | ||||
| jobs: | ||||
|   prepare: | ||||
|     runs-on: ubuntu-latest | ||||
|     outputs: | ||||
|       targets: ${{ steps.targets.outputs.matrix }} | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v4 | ||||
|       - | ||||
|         name: Targets matrix | ||||
|         id: targets | ||||
|         run: | | ||||
|           echo "matrix=$(docker buildx bake validate --print | jq -cr '.group.validate.targets')" >> $GITHUB_OUTPUT | ||||
|  | ||||
|   validate: | ||||
|     runs-on: ubuntu-latest | ||||
|     needs: | ||||
|       - prepare | ||||
|     strategy: | ||||
|       fail-fast: false | ||||
|       matrix: | ||||
|         target: ${{ fromJson(needs.prepare.outputs.targets) }} | ||||
|     steps: | ||||
|       - | ||||
|         name: Checkout | ||||
|         uses: actions/checkout@v4 | ||||
|       - | ||||
|         name: Validate | ||||
|         uses: docker/bake-action@v4 | ||||
|         with: | ||||
|           targets: ${{ matrix.target }} | ||||
							
								
								
									
										5
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										5
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							| @@ -1,11 +1,6 @@ | ||||
| /.dev | ||||
| node_modules/ | ||||
| lib | ||||
|  | ||||
| # Jetbrains | ||||
| /.idea | ||||
| /*.iml | ||||
|  | ||||
| # Rest of the file pulled from https://github.com/github/gitignore/blob/master/Node.gitignore | ||||
| # Logs | ||||
| logs | ||||
|   | ||||
| @@ -1,5 +1,5 @@ | ||||
| { | ||||
|   "printWidth": 120, | ||||
|   "printWidth": 240, | ||||
|   "tabWidth": 2, | ||||
|   "useTabs": false, | ||||
|   "semi": true, | ||||
|   | ||||
							
								
								
									
										407
									
								
								README.md
									
									
									
									
									
								
							
							
						
						
									
										407
									
								
								README.md
									
									
									
									
									
								
							| @@ -1,101 +1,71 @@ | ||||
| [](https://github.com/docker/login-action/releases/latest) | ||||
| [](https://github.com/marketplace/actions/docker-login) | ||||
| [](https://github.com/docker/login-action/actions?workflow=ci) | ||||
| [](https://github.com/docker/login-action/actions?workflow=test) | ||||
| [](https://github.com/docker/login-action/actions?workflow=ci) | ||||
| [](https://github.com/docker/login-action/actions?workflow=test) | ||||
| [](https://codecov.io/gh/docker/login-action) | ||||
|  | ||||
| ## About | ||||
|  | ||||
| GitHub Action to login against a Docker registry. | ||||
|  | ||||
| > :bulb: See also: | ||||
| > * [setup-buildx](https://github.com/docker/setup-buildx-action) action | ||||
| > * [setup-qemu](https://github.com/docker/setup-qemu-action) action | ||||
| > * [build-push](https://github.com/docker/build-push-action) action | ||||
|  | ||||
|  | ||||
|  | ||||
| ___ | ||||
|  | ||||
| * [Usage](#usage) | ||||
|   * [DockerHub](#dockerhub) | ||||
|   * [GitHub Packages Docker Registry](#github-packages-docker-registry) | ||||
|   * [Docker Hub](#docker-hub) | ||||
|   * [GitHub Container Registry](#github-container-registry) | ||||
|   * [GitLab](#gitlab) | ||||
|   * [Azure Container Registry (ACR)](#azure-container-registry-acr) | ||||
|   * [Google Container Registry (GCR)](#google-container-registry-gcr) | ||||
|   * [Google Artifact Registry (GAR)](#google-artifact-registry-gar) | ||||
|   * [AWS Elastic Container Registry (ECR)](#aws-elastic-container-registry-ecr) | ||||
|   * [AWS Public Elastic Container Registry (ECR)](#aws-public-elastic-container-registry-ecr) | ||||
|   * [OCI Oracle Cloud Infrastructure Registry (OCIR)](#oci-oracle-cloud-infrastructure-registry-ocir) | ||||
|   * [Quay.io](#quayio) | ||||
| * [Customizing](#customizing) | ||||
|   * [inputs](#inputs) | ||||
| * [Keep up-to-date with GitHub Dependabot](#keep-up-to-date-with-github-dependabot) | ||||
| * [Limitation](#limitation) | ||||
|  | ||||
| ## Usage | ||||
|  | ||||
| ### DockerHub | ||||
| ### Docker Hub | ||||
|  | ||||
| To authenticate against [DockerHub](https://hub.docker.com) it's strongly recommended to create a | ||||
| [personal access token](https://docs.docker.com/docker-hub/access-tokens/) as an alternative to your password. | ||||
| When authenticating to [Docker Hub](https://hub.docker.com) with GitHub Actions, | ||||
| use a [personal access token](https://docs.docker.com/docker-hub/access-tokens/). | ||||
| Don't use your account password. | ||||
|  | ||||
| ```yaml | ||||
| name: ci | ||||
|  | ||||
| on: | ||||
|   push: | ||||
|     branches: master | ||||
|     branches: main | ||||
|  | ||||
| jobs: | ||||
|   login: | ||||
|     runs-on: ubuntu-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Login to DockerHub | ||||
|         uses: docker/login-action@v1 | ||||
|         name: Login to Docker Hub | ||||
|         uses: docker/login-action@v3 | ||||
|         with: | ||||
|           username: ${{ secrets.DOCKERHUB_USERNAME }} | ||||
|           password: ${{ secrets.DOCKERHUB_TOKEN }} | ||||
| ``` | ||||
|  | ||||
| ### GitHub Packages Docker Registry | ||||
|  | ||||
| > :warning: GitHub Packages Docker Registry (aka `docker.pkg.github.com`) **is deprecated** and will sunset early next | ||||
| > year. It's strongly advised to [migrate to GitHub Container Registry](https://docs.github.com/en/packages/getting-started-with-github-container-registry/migrating-to-github-container-registry-for-docker-images) | ||||
| > instead. | ||||
|  | ||||
| You can configure the Docker client to use [GitHub Packages to publish and retrieve docker images](https://docs.github.com/en/packages/using-github-packages-with-your-projects-ecosystem/configuring-docker-for-use-with-github-packages). | ||||
|  | ||||
| ```yaml | ||||
| name: ci | ||||
|  | ||||
| on: | ||||
|   push: | ||||
|     branches: master | ||||
|  | ||||
| jobs: | ||||
|   login: | ||||
|     runs-on: ubuntu-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Login to GitHub Packages Docker Registry | ||||
|         uses: docker/login-action@v1 | ||||
|         with: | ||||
|           registry: docker.pkg.github.com | ||||
|           username: ${{ github.repository_owner }} | ||||
|           password: ${{ secrets.GITHUB_TOKEN }} | ||||
| ``` | ||||
|  | ||||
| ### GitHub Container Registry | ||||
|  | ||||
| To authenticate against the [GitHub Container Registry](https://docs.github.com/en/packages/getting-started-with-github-container-registry), | ||||
| you will need to create a new [personal access token (PAT)](https://docs.github.com/en/github/authenticating-to-github/creating-a-personal-access-token) | ||||
| with the [appropriate scopes](https://docs.github.com/en/packages/getting-started-with-github-container-registry/migrating-to-github-container-registry-for-docker-images#authenticating-with-the-container-registry). | ||||
| To authenticate to the [GitHub Container Registry](https://docs.github.com/en/packages/working-with-a-github-packages-registry/working-with-the-container-registry), | ||||
| use the [`GITHUB_TOKEN`](https://docs.github.com/en/actions/reference/authentication-in-a-workflow) | ||||
| secret. | ||||
|  | ||||
| ```yaml | ||||
| name: ci | ||||
|  | ||||
| on: | ||||
|   push: | ||||
|     branches: master | ||||
|     branches: main | ||||
|  | ||||
| jobs: | ||||
|   login: | ||||
| @@ -103,13 +73,19 @@ jobs: | ||||
|     steps: | ||||
|       - | ||||
|         name: Login to GitHub Container Registry | ||||
|         uses: docker/login-action@v1 | ||||
|         uses: docker/login-action@v3 | ||||
|         with: | ||||
|           registry: ghcr.io | ||||
|           username: ${{ github.repository_owner }} | ||||
|           password: ${{ secrets.CR_PAT }} | ||||
|           username: ${{ github.actor }} | ||||
|           password: ${{ secrets.GITHUB_TOKEN }} | ||||
| ``` | ||||
|  | ||||
| You may need to [manage write and read access of GitHub Actions](https://docs.github.com/en/packages/managing-github-packages-using-github-actions-workflows/publishing-and-installing-a-package-with-github-actions#upgrading-a-workflow-that-accesses-ghcrio) | ||||
| for repositories in the container settings. | ||||
|  | ||||
| You can also use a [personal access token (PAT)](https://docs.github.com/en/github/authenticating-to-github/creating-a-personal-access-token) | ||||
| with the [appropriate scopes](https://docs.github.com/en/packages/getting-started-with-github-container-registry/migrating-to-github-container-registry-for-docker-images#authenticating-with-the-container-registry). | ||||
|  | ||||
| ### GitLab | ||||
|  | ||||
| ```yaml | ||||
| @@ -117,7 +93,7 @@ name: ci | ||||
|  | ||||
| on: | ||||
|   push: | ||||
|     branches: master | ||||
|     branches: main | ||||
|  | ||||
| jobs: | ||||
|   login: | ||||
| @@ -125,25 +101,30 @@ jobs: | ||||
|     steps: | ||||
|       - | ||||
|         name: Login to GitLab | ||||
|         uses: docker/login-action@v1 | ||||
|         uses: docker/login-action@v3 | ||||
|         with: | ||||
|           registry: registry.gitlab.com | ||||
|           username: ${{ secrets.GITLAB_USERNAME }} | ||||
|           password: ${{ secrets.GITLAB_PASSWORD }} | ||||
| ``` | ||||
|  | ||||
| If you have [Two-Factor Authentication](https://gitlab.com/help/user/profile/account/two_factor_authentication) | ||||
| enabled, use a [Personal Access Token](https://gitlab.com/help/user/profile/personal_access_tokens) | ||||
| instead of a password. | ||||
|  | ||||
| ### Azure Container Registry (ACR) | ||||
|  | ||||
| [Create a service principal](https://docs.microsoft.com/en-us/azure/container-registry/container-registry-auth-service-principal#create-a-service-principal) | ||||
| with access to your container registry through the [Azure CLI](https://docs.microsoft.com/en-us/cli/azure/install-azure-cli) | ||||
| and take note of the generated service principal's ID (also called _client ID_) and password (also called _client secret_). | ||||
| and take note of the generated service principal's ID (also called _client ID_) | ||||
| and password (also called _client secret_). | ||||
|  | ||||
| ```yaml | ||||
| name: ci | ||||
|  | ||||
| on: | ||||
|   push: | ||||
|     branches: master | ||||
|     branches: main | ||||
|  | ||||
| jobs: | ||||
|   login: | ||||
| @@ -151,7 +132,7 @@ jobs: | ||||
|     steps: | ||||
|       - | ||||
|         name: Login to ACR | ||||
|         uses: docker/login-action@v1 | ||||
|         uses: docker/login-action@v3 | ||||
|         with: | ||||
|           registry: <registry-name>.azurecr.io | ||||
|           username: ${{ secrets.AZURE_CLIENT_ID }} | ||||
| @@ -162,17 +143,70 @@ jobs: | ||||
|  | ||||
| ### Google Container Registry (GCR) | ||||
|  | ||||
| Use a service account with the ability to push to GCR and [configure access control](https://cloud.google.com/container-registry/docs/access-control). | ||||
| Then create and download the JSON key for this service account and save content of `.json` file | ||||
| [as a secret](https://docs.github.com/en/actions/configuring-and-managing-workflows/creating-and-storing-encrypted-secrets#creating-encrypted-secrets-for-a-repository) | ||||
| called `GCR_JSON_KEY` in your GitHub repo. Ensure you set the username to `_json_key`. | ||||
| > [Google Artifact Registry](#google-artifact-registry-gar) is the evolution of | ||||
| > Google Container Registry. As a fully-managed service with support for both | ||||
| > container images and non-container artifacts. If you currently use Google | ||||
| > Container Registry, use the information [on this page](https://cloud.google.com/artifact-registry/docs/transition/transition-from-gcr) | ||||
| > to learn about transitioning to Google Artifact Registry.  | ||||
|  | ||||
| You can authenticate with workload identity federation or a service account. | ||||
|  | ||||
| #### Workload identity federation | ||||
|  | ||||
| Configure the workload identity federation for GitHub Actions in Google Cloud, | ||||
| [see here](https://github.com/google-github-actions/auth#setting-up-workload-identity-federation). | ||||
| Your service account must have permission to push to GCR. Use the | ||||
| `google-github-actions/auth` action to authenticate using workload identity as | ||||
| shown in the following example: | ||||
|  | ||||
| ```yaml | ||||
| name: ci | ||||
|  | ||||
| on: | ||||
|   push: | ||||
|     branches: master | ||||
|     branches: main | ||||
|  | ||||
| jobs: | ||||
|   login: | ||||
|     runs-on: ubuntu-latest | ||||
|     steps: | ||||
|     - | ||||
|       name: Authenticate to Google Cloud | ||||
|       id: auth | ||||
|       uses: google-github-actions/auth@v1 | ||||
|       with: | ||||
|         token_format: access_token | ||||
|         workload_identity_provider: <workload_identity_provider> | ||||
|         service_account: <service_account> | ||||
|     - | ||||
|       name: Login to GCR | ||||
|       uses: docker/login-action@v3 | ||||
|       with: | ||||
|         registry: gcr.io | ||||
|         username: oauth2accesstoken | ||||
|         password: ${{ steps.auth.outputs.access_token }} | ||||
| ``` | ||||
|  | ||||
| > Replace `<workload_identity_provider>` with configured workload identity | ||||
| > provider. For steps to configure, [see here](https://github.com/google-github-actions/auth#setting-up-workload-identity-federation). | ||||
|  | ||||
| > Replace `<service_account>` with configured service account in workload | ||||
| > identity provider which has access to push to GCR | ||||
|  | ||||
| #### Service account based authentication | ||||
|  | ||||
| Use a service account with permission to push to GCR and [configure access control](https://cloud.google.com/container-registry/docs/access-control). | ||||
| Download the key for the service account as a JSON file. Save the contents of | ||||
| the file [as a secret](https://docs.github.com/en/actions/configuring-and-managing-workflows/creating-and-storing-encrypted-secrets#creating-encrypted-secrets-for-a-repository) | ||||
| named `GCR_JSON_KEY` in your GitHub repository. Set the username to `_json_key`, | ||||
| or `_json_key_base64` if you use a base64-encoded key. | ||||
|  | ||||
| ```yaml | ||||
| name: ci | ||||
|  | ||||
| on: | ||||
|   push: | ||||
|     branches: main | ||||
|  | ||||
| jobs: | ||||
|   login: | ||||
| @@ -180,17 +214,96 @@ jobs: | ||||
|     steps: | ||||
|       - | ||||
|         name: Login to GCR | ||||
|         uses: docker/login-action@v1 | ||||
|         uses: docker/login-action@v3 | ||||
|         with: | ||||
|           registry: gcr.io | ||||
|           username: _json_key | ||||
|           password: ${{ secrets.GCR_JSON_KEY }} | ||||
| ``` | ||||
|  | ||||
| ### Google Artifact Registry (GAR) | ||||
|  | ||||
| You can authenticate with workload identity federation or a service account. | ||||
|  | ||||
| #### Workload identity federation | ||||
|  | ||||
| Download the key for the service account as a JSON file. Save the contents of | ||||
| the file [as a secret](https://docs.github.com/en/actions/configuring-and-managing-workflows/creating-and-storing-encrypted-secrets#creating-encrypted-secrets-for-a-repository) | ||||
| named `GCR_JSON_KEY` in your GitHub repository. Set the username to `_json_key`, | ||||
| or `_json_key_base64` if you use a base64-encoded key. | ||||
|  | ||||
| ```yaml | ||||
| name: ci | ||||
|  | ||||
| on: | ||||
|   push: | ||||
|     branches: main | ||||
|  | ||||
| jobs: | ||||
|   login: | ||||
|     runs-on: ubuntu-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Authenticate to Google Cloud | ||||
|         id: auth | ||||
|         uses: google-github-actions/auth@v1 | ||||
|         with: | ||||
|           token_format: access_token | ||||
|           workload_identity_provider: <workload_identity_provider> | ||||
|           service_account: <service_account> | ||||
|       - | ||||
|         name: Login to GAR | ||||
|         uses: docker/login-action@v3 | ||||
|         with: | ||||
|           registry: <location>-docker.pkg.dev | ||||
|           username: oauth2accesstoken | ||||
|           password: ${{ steps.auth.outputs.access_token }} | ||||
| ``` | ||||
|  | ||||
| > Replace `<workload_identity_provider>` with configured workload identity | ||||
| > provider | ||||
|  | ||||
| > Replace `<service_account>` with configured service account in workload | ||||
| > identity provider which has access to push to GCR | ||||
|  | ||||
| > Replace `<location>` with the regional or multi-regional [location](https://cloud.google.com/artifact-registry/docs/repo-organize#locations) | ||||
| > of the repository where the image is stored. | ||||
|  | ||||
| #### Service account based authentication | ||||
|  | ||||
| Use a service account with permission to push to GAR and [configure access control](https://cloud.google.com/artifact-registry/docs/access-control). | ||||
| Download the key for the service account as a JSON file. Save the contents of | ||||
| the file [as a secret](https://docs.github.com/en/actions/configuring-and-managing-workflows/creating-and-storing-encrypted-secrets#creating-encrypted-secrets-for-a-repository) | ||||
| named `GCR_JSON_KEY` in your GitHub repository. Set the username to `_json_key`, | ||||
| or `_json_key_base64` if you use a base64-encoded key. | ||||
|  | ||||
| ```yaml | ||||
| name: ci | ||||
|  | ||||
| on: | ||||
|   push: | ||||
|     branches: main | ||||
|  | ||||
| jobs: | ||||
|   login: | ||||
|     runs-on: ubuntu-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Login to GAR | ||||
|         uses: docker/login-action@v3 | ||||
|         with: | ||||
|           registry: <location>-docker.pkg.dev | ||||
|           username: _json_key | ||||
|           password: ${{ secrets.GAR_JSON_KEY }} | ||||
| ``` | ||||
|  | ||||
| > Replace `<location>` with the regional or multi-regional [location](https://cloud.google.com/artifact-registry/docs/repo-organize#locations) | ||||
| > of the repository where the image is stored. | ||||
|  | ||||
| ### AWS Elastic Container Registry (ECR) | ||||
|  | ||||
| Use an IAM user with the [ability to push to ECR](https://docs.aws.amazon.com/AmazonECR/latest/userguide/ecr_managed_policies.html). | ||||
| Then create and download access keys and save `AWS_ACCESS_KEY_ID` and `AWS_SECRET_ACCESS_KEY` [as secrets](https://docs.github.com/en/actions/configuring-and-managing-workflows/creating-and-storing-encrypted-secrets#creating-encrypted-secrets-for-a-repository) | ||||
| Use an IAM user with the ability to [push to ECR with `AmazonEC2ContainerRegistryPowerUser` managed policy for example](https://docs.aws.amazon.com/AmazonECR/latest/userguide/ecr_managed_policies.html#AmazonEC2ContainerRegistryPowerUser). | ||||
| Download the access keys and save them as `AWS_ACCESS_KEY_ID` and `AWS_SECRET_ACCESS_KEY` [as secrets](https://docs.github.com/en/actions/configuring-and-managing-workflows/creating-and-storing-encrypted-secrets#creating-encrypted-secrets-for-a-repository) | ||||
| in your GitHub repo. | ||||
|  | ||||
| ```yaml | ||||
| @@ -198,7 +311,7 @@ name: ci | ||||
|  | ||||
| on: | ||||
|   push: | ||||
|     branches: master | ||||
|     branches: main | ||||
|  | ||||
| jobs: | ||||
|   login: | ||||
| @@ -206,27 +319,171 @@ jobs: | ||||
|     steps: | ||||
|       - | ||||
|         name: Login to ECR | ||||
|         uses: docker/login-action@v1 | ||||
|         uses: docker/login-action@v3 | ||||
|         with: | ||||
|           registry: <aws-account-number>.dkr.ecr.<region>.amazonaws.com | ||||
|           username: ${{ secrets.AWS_ACCESS_KEY_ID }} | ||||
|           password: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | ||||
| ``` | ||||
|  | ||||
| If you need to log in to Amazon ECR registries associated with other accounts, | ||||
| you can use the `AWS_ACCOUNT_IDS` environment variable: | ||||
|  | ||||
| ```yaml | ||||
| name: ci | ||||
|  | ||||
| on: | ||||
|   push: | ||||
|     branches: main | ||||
|  | ||||
| jobs: | ||||
|   login: | ||||
|     runs-on: ubuntu-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Login to ECR | ||||
|         uses: docker/login-action@v3 | ||||
|         with: | ||||
|           registry: <aws-account-number>.dkr.ecr.<region>.amazonaws.com | ||||
|           username: ${{ secrets.AWS_ACCESS_KEY_ID }} | ||||
|           password: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | ||||
|         env: | ||||
|           AWS_ACCOUNT_IDS: 012345678910,023456789012 | ||||
| ``` | ||||
|  | ||||
| > Only available with [AWS CLI version 1](https://docs.aws.amazon.com/cli/latest/reference/ecr/get-login.html) | ||||
|  | ||||
| You can also use the [Configure AWS Credentials](https://github.com/aws-actions/configure-aws-credentials) | ||||
| action in combination with this action: | ||||
|  | ||||
| ```yaml | ||||
| name: ci | ||||
|  | ||||
| on: | ||||
|   push: | ||||
|     branches: main | ||||
|  | ||||
| jobs: | ||||
|   login: | ||||
|     runs-on: ubuntu-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Configure AWS Credentials | ||||
|         uses: aws-actions/configure-aws-credentials@v4 | ||||
|         with: | ||||
|           aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }} | ||||
|           aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | ||||
|           aws-region: <region> | ||||
|       - | ||||
|         name: Login to ECR | ||||
|         uses: docker/login-action@v3 | ||||
|         with: | ||||
|           registry: <aws-account-number>.dkr.ecr.<region>.amazonaws.com | ||||
| ``` | ||||
|  | ||||
| > Replace `<aws-account-number>` and `<region>` with their respective values. | ||||
|  | ||||
| ### AWS Public Elastic Container Registry (ECR) | ||||
|  | ||||
| Use an IAM user with permission to push to ECR Public, for example using [managed policies](https://docs.aws.amazon.com/AmazonECR/latest/userguide/security-iam-awsmanpol.html#security-iam-awsmanpol-AmazonEC2ContainerRegistryPowerUser). | ||||
| Download the access keys and save them as `AWS_ACCESS_KEY_ID` and | ||||
| `AWS_SECRET_ACCESS_KEY` [secrets](https://docs.github.com/en/actions/configuring-and-managing-workflows/creating-and-storing-encrypted-secrets#creating-encrypted-secrets-for-a-repository) | ||||
| in your GitHub repository. | ||||
|  | ||||
| ```yaml | ||||
| name: ci | ||||
|  | ||||
| on: | ||||
|   push: | ||||
|     branches: main | ||||
|  | ||||
| jobs: | ||||
|   login: | ||||
|     runs-on: ubuntu-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Login to Public ECR | ||||
|         uses: docker/login-action@v3 | ||||
|         with: | ||||
|           registry: public.ecr.aws | ||||
|           username: ${{ secrets.AWS_ACCESS_KEY_ID }} | ||||
|           password: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | ||||
|         env: | ||||
|           AWS_REGION: <region> | ||||
| ``` | ||||
|  | ||||
| > Replace `<region>` with its respective value (default `us-east-1`). | ||||
|  | ||||
| ### OCI Oracle Cloud Infrastructure Registry (OCIR) | ||||
|  | ||||
| To push into OCIR in specific tenancy the [username](https://www.oracle.com/webfolder/technetwork/tutorials/obe/oci/registry/index.html#LogintoOracleCloudInfrastructureRegistryfromtheDockerCLI) | ||||
| must be placed in format `<tenancy>/<username>` (in case of federated tenancy use the format | ||||
| `<tenancy-namespace>/oracleidentitycloudservice/<username>`). | ||||
|  | ||||
| For password [create an auth token](https://www.oracle.com/webfolder/technetwork/tutorials/obe/oci/registry/index.html#GetanAuthToken). | ||||
| Save username and token [as a secrets](https://docs.github.com/en/actions/configuring-and-managing-workflows/creating-and-storing-encrypted-secrets#creating-encrypted-secrets-for-a-repository) | ||||
| in your GitHub repo.  | ||||
|  | ||||
| ```yaml | ||||
| name: ci | ||||
|  | ||||
| on: | ||||
|   push: | ||||
|     branches: main | ||||
|  | ||||
| jobs: | ||||
|   login: | ||||
|     runs-on: ubuntu-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Login to OCIR | ||||
|         uses: docker/login-action@v3 | ||||
|         with: | ||||
|           registry: <region>.ocir.io | ||||
|           username: ${{ secrets.OCI_USERNAME }} | ||||
|           password: ${{ secrets.OCI_TOKEN }} | ||||
| ``` | ||||
|  | ||||
| > Replace `<region>` with their respective values from [availability regions](https://docs.cloud.oracle.com/iaas/Content/Registry/Concepts/registryprerequisites.htm#Availab) | ||||
|  | ||||
| ### Quay.io | ||||
|  | ||||
| Use a [Robot account](https://docs.quay.io/glossary/robot-accounts.html) with | ||||
| permission to push to a Quay.io repository. | ||||
|  | ||||
| ```yaml | ||||
| name: ci | ||||
|  | ||||
| on: | ||||
|   push: | ||||
|     branches: main | ||||
|  | ||||
| jobs: | ||||
|   login: | ||||
|     runs-on: ubuntu-latest | ||||
|     steps: | ||||
|       - | ||||
|         name: Login to Quay.io | ||||
|         uses: docker/login-action@v3 | ||||
|         with: | ||||
|           registry: quay.io | ||||
|           username: ${{ secrets.QUAY_USERNAME }} | ||||
|           password: ${{ secrets.QUAY_ROBOT_TOKEN }} | ||||
| ``` | ||||
|  | ||||
| ## Customizing | ||||
|  | ||||
| ### inputs | ||||
|  | ||||
| Following inputs can be used as `step.with` keys | ||||
| The following inputs can be used as `step.with` keys: | ||||
|  | ||||
| | Name             | Type    | Default                     | Description                        | | ||||
| |------------------|---------|-----------------------------|------------------------------------| | ||||
| | `registry`       | String  |                             | Server address of Docker registry. If not set then will default to Docker Hub | | ||||
| | `username`       | String  |                             | Username used to log against the Docker registry | | ||||
| | `password`       | String  |                             | Password or personal access token used to log against the Docker registry | | ||||
| | `logout`         | Bool    | `true`                      | Log out from the Docker registry at the end of a job | | ||||
| | Name       | Type   | Default | Description                                                                   | | ||||
| |------------|--------|---------|-------------------------------------------------------------------------------| | ||||
| | `registry` | String |         | Server address of Docker registry. If not set then will default to Docker Hub | | ||||
| | `username` | String |         | Username for authenticating to the Docker registry                            | | ||||
| | `password` | String |         | Password or personal access token for authenticating the Docker registry      | | ||||
| | `ecr`      | String | `auto`  | Specifies whether the given registry is ECR (`auto`, `true` or `false`)       | | ||||
| | `logout`   | Bool   | `true`  | Log out from the Docker registry at the end of a job                          | | ||||
|  | ||||
| ## Keep up-to-date with GitHub Dependabot | ||||
|  | ||||
| @@ -243,7 +500,3 @@ updates: | ||||
|     schedule: | ||||
|       interval: "daily" | ||||
| ``` | ||||
|  | ||||
| ## Limitation | ||||
|  | ||||
| This action is only available for Linux [virtual environments](https://help.github.com/en/articles/virtual-environments-for-github-actions#supported-virtual-environments-and-hardware-resources). | ||||
|   | ||||
| @@ -1,54 +1,157 @@ | ||||
| import * as semver from 'semver'; | ||||
| import {beforeEach, describe, expect, jest, test} from '@jest/globals'; | ||||
| import {AuthorizationData} from '@aws-sdk/client-ecr'; | ||||
|  | ||||
| import * as aws from '../src/aws'; | ||||
|  | ||||
| describe('isECR', () => { | ||||
|   test.each([ | ||||
|     ['registry.gitlab.com', false], | ||||
|     ['gcr.io', false], | ||||
|     ['012345678901.dkr.ecr.eu-west-3.amazonaws.com', true] | ||||
|     ['012345678901.dkr.ecr.eu-west-3.amazonaws.com', true], | ||||
|     ['876820548815.dkr.ecr.cn-north-1.amazonaws.com.cn', true], | ||||
|     ['390948362332.dkr.ecr.cn-northwest-1.amazonaws.com.cn', true], | ||||
|     ['public.ecr.aws', true] | ||||
|   ])('given registry %p', async (registry, expected) => { | ||||
|     expect(await aws.isECR(registry)).toEqual(expected); | ||||
|     expect(aws.isECR(registry)).toEqual(expected); | ||||
|   }); | ||||
| }); | ||||
|  | ||||
| describe('getCLI', () => { | ||||
|   it('exists', async () => { | ||||
|     const awsPath = await aws.getCLI(); | ||||
|     console.log(`awsPath: ${awsPath}`); | ||||
|     expect(awsPath).not.toEqual(''); | ||||
|   }); | ||||
| }); | ||||
|  | ||||
| describe('execCLI', () => { | ||||
|   it('--version not empty', async () => { | ||||
|     const cliCmdOutput = await aws.execCLI(['--version']); | ||||
|     console.log(`cliCmdOutput: ${cliCmdOutput}`); | ||||
|     expect(cliCmdOutput).not.toEqual(''); | ||||
|   }, 100000); | ||||
| }); | ||||
|  | ||||
| describe('getCLIVersion', () => { | ||||
|   it('valid', async () => { | ||||
|     const cliVersion = await aws.getCLIVersion(); | ||||
|     console.log(`cliVersion: ${cliVersion}`); | ||||
|     expect(semver.valid(cliVersion)).not.toBeNull(); | ||||
|   }, 100000); | ||||
| }); | ||||
|  | ||||
| describe('parseCLIVersion', () => { | ||||
| describe('isPubECR', () => { | ||||
|   test.each([ | ||||
|     ['v1', 'aws-cli/1.18.120 Python/2.7.17 Linux/5.3.0-1034-azure botocore/1.17.43', '1.18.120'], | ||||
|     ['v2', 'aws-cli/2.0.41 Python/3.7.3 Linux/4.19.104-microsoft-standard exe/x86_64.ubuntu.18', '2.0.41'] | ||||
|   ])('given aws %p', async (version, stdout, expected) => { | ||||
|     expect(await aws.parseCLIVersion(stdout)).toEqual(expected); | ||||
|     ['registry.gitlab.com', false], | ||||
|     ['gcr.io', false], | ||||
|     ['012345678901.dkr.ecr.eu-west-3.amazonaws.com', false], | ||||
|     ['876820548815.dkr.ecr.cn-north-1.amazonaws.com.cn', false], | ||||
|     ['390948362332.dkr.ecr.cn-northwest-1.amazonaws.com.cn', false], | ||||
|     ['public.ecr.aws', true] | ||||
|   ])('given registry %p', async (registry, expected) => { | ||||
|     expect(aws.isPubECR(registry)).toEqual(expected); | ||||
|   }); | ||||
| }); | ||||
|  | ||||
| describe('getRegion', () => { | ||||
|   test.each([['012345678901.dkr.ecr.eu-west-3.amazonaws.com', 'eu-west-3']])( | ||||
|     'given registry %p', | ||||
|     async (registry, expected) => { | ||||
|       expect(await aws.getRegion(registry)).toEqual(expected); | ||||
|     } | ||||
|   ); | ||||
|   test.each([ | ||||
|     ['012345678901.dkr.ecr.eu-west-3.amazonaws.com', 'eu-west-3'], | ||||
|     ['876820548815.dkr.ecr.cn-north-1.amazonaws.com.cn', 'cn-north-1'], | ||||
|     ['390948362332.dkr.ecr.cn-northwest-1.amazonaws.com.cn', 'cn-northwest-1'], | ||||
|     ['public.ecr.aws', 'us-east-1'] | ||||
|   ])('given registry %p', async (registry, expected) => { | ||||
|     expect(aws.getRegion(registry)).toEqual(expected); | ||||
|   }); | ||||
| }); | ||||
|  | ||||
| describe('getAccountIDs', () => { | ||||
|   test.each([ | ||||
|     ['012345678901.dkr.ecr.eu-west-3.amazonaws.com', undefined, ['012345678901']], | ||||
|     ['012345678901.dkr.ecr.eu-west-3.amazonaws.com', '012345678910,023456789012', ['012345678901', '012345678910', '023456789012']], | ||||
|     ['012345678901.dkr.ecr.eu-west-3.amazonaws.com', '012345678901,012345678910,023456789012', ['012345678901', '012345678910', '023456789012']], | ||||
|     ['390948362332.dkr.ecr.cn-northwest-1.amazonaws.com.cn', '012345678910,023456789012', ['390948362332', '012345678910', '023456789012']], | ||||
|     ['public.ecr.aws', undefined, []] | ||||
|   ])('given registry %p', async (registry, accountIDsEnv, expected) => { | ||||
|     if (accountIDsEnv) { | ||||
|       process.env.AWS_ACCOUNT_IDS = accountIDsEnv; | ||||
|     } | ||||
|     expect(aws.getAccountIDs(registry)).toEqual(expected); | ||||
|   }); | ||||
| }); | ||||
|  | ||||
| const mockEcrGetAuthToken = jest.fn(); | ||||
| const mockEcrPublicGetAuthToken = jest.fn(); | ||||
| jest.mock('@aws-sdk/client-ecr', () => { | ||||
|   return { | ||||
|     ECR: jest.fn(() => ({ | ||||
|       getAuthorizationToken: mockEcrGetAuthToken | ||||
|     })) | ||||
|   }; | ||||
| }); | ||||
| jest.mock('@aws-sdk/client-ecr-public', () => { | ||||
|   return { | ||||
|     ECRPUBLIC: jest.fn(() => ({ | ||||
|       getAuthorizationToken: mockEcrPublicGetAuthToken | ||||
|     })) | ||||
|   }; | ||||
| }); | ||||
|  | ||||
| describe('getRegistriesData', () => { | ||||
|   beforeEach(() => { | ||||
|     jest.clearAllMocks(); | ||||
|     delete process.env.AWS_ACCOUNT_IDS; | ||||
|   }); | ||||
|   // prettier-ignore | ||||
|   test.each([ | ||||
|     [ | ||||
|       '012345678901.dkr.ecr.aws-region-1.amazonaws.com', | ||||
|       'dkr.ecr.aws-region-1.amazonaws.com', undefined, | ||||
|       [ | ||||
|         { | ||||
|           registry: '012345678901.dkr.ecr.aws-region-1.amazonaws.com', | ||||
|           username: '012345678901', | ||||
|           password: 'world' | ||||
|         } | ||||
|       ] | ||||
|     ], | ||||
|     [ | ||||
|       '012345678901.dkr.ecr.eu-west-3.amazonaws.com', | ||||
|       'dkr.ecr.eu-west-3.amazonaws.com', | ||||
|       '012345678910,023456789012', | ||||
|       [ | ||||
|         { | ||||
|           registry: '012345678901.dkr.ecr.eu-west-3.amazonaws.com', | ||||
|           username: '012345678901', | ||||
|           password: 'world' | ||||
|         }, | ||||
|         { | ||||
|           registry: '012345678910.dkr.ecr.eu-west-3.amazonaws.com', | ||||
|           username: '012345678910', | ||||
|           password: 'world' | ||||
|         }, | ||||
|         { | ||||
|           registry: '023456789012.dkr.ecr.eu-west-3.amazonaws.com', | ||||
|           username: '023456789012', | ||||
|           password: 'world' | ||||
|         } | ||||
|       ] | ||||
|     ], | ||||
|     [ | ||||
|       'public.ecr.aws', | ||||
|       undefined, | ||||
|       undefined, | ||||
|       [ | ||||
|         { | ||||
|           registry: 'public.ecr.aws', | ||||
|           username: 'AWS', | ||||
|           password: 'world' | ||||
|         } | ||||
|       ] | ||||
|     ] | ||||
|   ])('given registry %p', async (registry, fqdn, accountIDsEnv, expected: aws.RegistryData[]) => { | ||||
|     if (accountIDsEnv) { | ||||
|       process.env.AWS_ACCOUNT_IDS = accountIDsEnv; | ||||
|     } | ||||
|     const accountIDs = aws.getAccountIDs(registry); | ||||
|     const authData: AuthorizationData[] = []; | ||||
|     if (accountIDs.length == 0) { | ||||
|       mockEcrPublicGetAuthToken.mockImplementation(() => { | ||||
|         return Promise.resolve({ | ||||
|           authorizationData: { | ||||
|             authorizationToken: Buffer.from(`AWS:world`).toString('base64'), | ||||
|           } | ||||
|         }); | ||||
|       }); | ||||
|     } else { | ||||
|       aws.getAccountIDs(registry).forEach(accountID => { | ||||
|         authData.push({ | ||||
|           authorizationToken: Buffer.from(`${accountID}:world`).toString('base64'), | ||||
|           proxyEndpoint: `${accountID}.${fqdn}` | ||||
|         }); | ||||
|       }); | ||||
|       mockEcrGetAuthToken.mockImplementation(() => { | ||||
|         return Promise.resolve({ | ||||
|           authorizationData: authData | ||||
|         }); | ||||
|       }); | ||||
|     } | ||||
|     const regData = await aws.getRegistriesData(registry); | ||||
|     expect(regData).toEqual(expected); | ||||
|   }); | ||||
| }); | ||||
|   | ||||
| @@ -1,24 +1,12 @@ | ||||
| import osm = require('os'); | ||||
| import {expect, test} from '@jest/globals'; | ||||
|  | ||||
| import {getInputs} from '../src/context'; | ||||
|  | ||||
| test('without username getInputs throws errors', async () => { | ||||
|   expect(() => { | ||||
|     getInputs(); | ||||
|   }).toThrowError('Input required and not supplied: username'); | ||||
| }); | ||||
|  | ||||
| test('without password getInputs throws errors', async () => { | ||||
|   process.env['INPUT_USERNAME'] = 'dbowie'; | ||||
|   expect(() => { | ||||
|     getInputs(); | ||||
|   }).toThrowError('Input required and not supplied: password'); | ||||
| }); | ||||
|  | ||||
| test('with password and username getInputs does not error', async () => { | ||||
| test('with password and username getInputs does not throw error', async () => { | ||||
|   process.env['INPUT_USERNAME'] = 'dbowie'; | ||||
|   process.env['INPUT_PASSWORD'] = 'groundcontrol'; | ||||
|   process.env['INPUT_LOGOUT'] = 'true'; | ||||
|   expect(() => { | ||||
|     getInputs(); | ||||
|   }).not.toThrowError(); | ||||
|   }).not.toThrow(); | ||||
| }); | ||||
|   | ||||
| @@ -1,49 +1,51 @@ | ||||
| import {loginStandard, logout} from '../src/docker'; | ||||
|  | ||||
| import {expect, jest, test} from '@jest/globals'; | ||||
| import * as path from 'path'; | ||||
|  | ||||
| import * as exec from '@actions/exec'; | ||||
| import {loginStandard, logout} from '../src/docker'; | ||||
| import {Exec} from '@docker/actions-toolkit/lib/exec'; | ||||
|  | ||||
| process.env['RUNNER_TEMP'] = path.join(__dirname, 'runner'); | ||||
|  | ||||
| test('loginStandard calls exec', async () => { | ||||
|   const execSpy: jest.SpyInstance = jest.spyOn(exec, 'exec'); | ||||
|   // don't let exec try to actually run the commands | ||||
|   execSpy.mockImplementation(() => {}); | ||||
|   // eslint-disable-next-line @typescript-eslint/ban-ts-comment | ||||
|   // @ts-ignore | ||||
|   const execSpy = jest.spyOn(Exec, 'getExecOutput').mockImplementation(async () => { | ||||
|     return { | ||||
|       exitCode: expect.any(Number), | ||||
|       stdout: expect.any(Function), | ||||
|       stderr: expect.any(Function) | ||||
|     }; | ||||
|   }); | ||||
|  | ||||
|   const username: string = 'dbowie'; | ||||
|   const password: string = 'groundcontrol'; | ||||
|   const registry: string = 'https://ghcr.io'; | ||||
|   const username = 'dbowie'; | ||||
|   const password = 'groundcontrol'; | ||||
|   const registry = 'https://ghcr.io'; | ||||
|  | ||||
|   await loginStandard(registry, username, password); | ||||
|  | ||||
|   expect(execSpy).toHaveBeenCalledWith(`docker`, ['login', '--password-stdin', '--username', username, registry], { | ||||
|     input: Buffer.from(password), | ||||
|     silent: true, | ||||
|     ignoreReturnCode: true, | ||||
|     listeners: expect.objectContaining({ | ||||
|       stdout: expect.any(Function), | ||||
|       stderr: expect.any(Function) | ||||
|     }) | ||||
|     ignoreReturnCode: true | ||||
|   }); | ||||
| }); | ||||
|  | ||||
| test('logout calls exec', async () => { | ||||
|   const execSpy: jest.SpyInstance = jest.spyOn(exec, 'exec'); | ||||
|   // don't let exec try to actually run the commands | ||||
|   execSpy.mockImplementation(() => {}); | ||||
|   // eslint-disable-next-line @typescript-eslint/ban-ts-comment | ||||
|   // @ts-ignore | ||||
|   const execSpy = jest.spyOn(Exec, 'getExecOutput').mockImplementation(async () => { | ||||
|     return { | ||||
|       exitCode: expect.any(Number), | ||||
|       stdout: expect.any(Function), | ||||
|       stderr: expect.any(Function) | ||||
|     }; | ||||
|   }); | ||||
|  | ||||
|   const registry: string = 'https://ghcr.io'; | ||||
|   const registry = 'https://ghcr.io'; | ||||
|  | ||||
|   await logout(registry); | ||||
|  | ||||
|   expect(execSpy).toHaveBeenCalledWith(`docker`, ['logout', registry], { | ||||
|     silent: false, | ||||
|     ignoreReturnCode: true, | ||||
|     input: Buffer.from(''), | ||||
|     listeners: expect.objectContaining({ | ||||
|       stdout: expect.any(Function), | ||||
|       stderr: expect.any(Function) | ||||
|     }) | ||||
|     ignoreReturnCode: true | ||||
|   }); | ||||
| }); | ||||
|   | ||||
| @@ -1,93 +0,0 @@ | ||||
| import osm = require('os'); | ||||
|  | ||||
| import {run} from '../src/main'; | ||||
| import * as docker from '../src/docker'; | ||||
| import * as stateHelper from '../src/state-helper'; | ||||
|  | ||||
| import * as core from '@actions/core'; | ||||
|  | ||||
| test('errors when not run on linux platform', async () => { | ||||
|   const platSpy = jest.spyOn(osm, 'platform'); | ||||
|   platSpy.mockImplementation(() => 'netbsd'); | ||||
|  | ||||
|   const coreSpy: jest.SpyInstance = jest.spyOn(core, 'setFailed'); | ||||
|  | ||||
|   await run(); | ||||
|  | ||||
|   expect(coreSpy).toHaveBeenCalledWith('Only supported on linux platform'); | ||||
| }); | ||||
|  | ||||
| test('errors without username', async () => { | ||||
|   const platSpy = jest.spyOn(osm, 'platform'); | ||||
|   platSpy.mockImplementation(() => 'linux'); | ||||
|  | ||||
|   const coreSpy: jest.SpyInstance = jest.spyOn(core, 'setFailed'); | ||||
|  | ||||
|   await run(); | ||||
|  | ||||
|   expect(coreSpy).toHaveBeenCalledWith('Input required and not supplied: username'); | ||||
| }); | ||||
|  | ||||
| test('errors without password', async () => { | ||||
|   const platSpy = jest.spyOn(osm, 'platform'); | ||||
|   platSpy.mockImplementation(() => 'linux'); | ||||
|  | ||||
|   const coreSpy: jest.SpyInstance = jest.spyOn(core, 'setFailed'); | ||||
|  | ||||
|   const username: string = 'dbowie'; | ||||
|   process.env[`INPUT_USERNAME`] = username; | ||||
|  | ||||
|   await run(); | ||||
|  | ||||
|   expect(coreSpy).toHaveBeenCalledWith('Input required and not supplied: password'); | ||||
| }); | ||||
|  | ||||
| test('successful with username and password', async () => { | ||||
|   const platSpy = jest.spyOn(osm, 'platform'); | ||||
|   platSpy.mockImplementation(() => 'linux'); | ||||
|  | ||||
|   const setRegistrySpy: jest.SpyInstance = jest.spyOn(stateHelper, 'setRegistry'); | ||||
|   const setLogoutSpy: jest.SpyInstance = jest.spyOn(stateHelper, 'setLogout'); | ||||
|   const dockerSpy: jest.SpyInstance = jest.spyOn(docker, 'login'); | ||||
|   dockerSpy.mockImplementation(() => {}); | ||||
|  | ||||
|   const username: string = 'dbowie'; | ||||
|   process.env[`INPUT_USERNAME`] = username; | ||||
|  | ||||
|   const password: string = 'groundcontrol'; | ||||
|   process.env[`INPUT_PASSWORD`] = password; | ||||
|  | ||||
|   await run(); | ||||
|  | ||||
|   expect(setRegistrySpy).toHaveBeenCalledWith(''); | ||||
|   expect(setLogoutSpy).toHaveBeenCalledWith(''); | ||||
|   expect(dockerSpy).toHaveBeenCalledWith('', username, password); | ||||
| }); | ||||
|  | ||||
| test('calls docker login', async () => { | ||||
|   const platSpy = jest.spyOn(osm, 'platform'); | ||||
|   platSpy.mockImplementation(() => 'linux'); | ||||
|  | ||||
|   const setRegistrySpy: jest.SpyInstance = jest.spyOn(stateHelper, 'setRegistry'); | ||||
|   const setLogoutSpy: jest.SpyInstance = jest.spyOn(stateHelper, 'setLogout'); | ||||
|   const dockerSpy: jest.SpyInstance = jest.spyOn(docker, 'login'); | ||||
|   dockerSpy.mockImplementation(() => {}); | ||||
|  | ||||
|   const username: string = 'dbowie'; | ||||
|   process.env[`INPUT_USERNAME`] = username; | ||||
|  | ||||
|   const password: string = 'groundcontrol'; | ||||
|   process.env[`INPUT_PASSWORD`] = password; | ||||
|  | ||||
|   const registry: string = 'https://ghcr.io'; | ||||
|   process.env[`INPUT_REGISTRY`] = registry; | ||||
|  | ||||
|   const logout: string = 'true'; | ||||
|   process.env['INPUT_LOGOUT'] = logout; | ||||
|  | ||||
|   await run(); | ||||
|  | ||||
|   expect(setRegistrySpy).toHaveBeenCalledWith(registry); | ||||
|   expect(setLogoutSpy).toHaveBeenCalledWith(logout); | ||||
|   expect(dockerSpy).toHaveBeenCalledWith(registry, username, password); | ||||
| }); | ||||
							
								
								
									
										10
									
								
								action.yml
									
									
									
									
									
								
							
							
						
						
									
										10
									
								
								action.yml
									
									
									
									
									
								
							| @@ -12,16 +12,20 @@ inputs: | ||||
|     required: false | ||||
|   username: | ||||
|     description: 'Username used to log against the Docker registry' | ||||
|     required: true | ||||
|     required: false | ||||
|   password: | ||||
|     description: 'Password or personal access token used to log against the Docker registry' | ||||
|     required: true | ||||
|     required: false | ||||
|   ecr: | ||||
|     description: 'Specifies whether the given registry is ECR (auto, true or false)' | ||||
|     default: 'auto' | ||||
|     required: false | ||||
|   logout: | ||||
|     description: 'Log out from the Docker registry at the end of a job' | ||||
|     default: 'true' | ||||
|     required: false | ||||
|  | ||||
| runs: | ||||
|   using: 'node12' | ||||
|   using: 'node20' | ||||
|   main: 'dist/index.js' | ||||
|   post: 'dist/index.js' | ||||
|   | ||||
							
								
								
									
										3
									
								
								codecov.yml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										3
									
								
								codecov.yml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,3 @@ | ||||
| comment: false | ||||
| github_checks: | ||||
|   annotations: false | ||||
							
								
								
									
										71
									
								
								dev.Dockerfile
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										71
									
								
								dev.Dockerfile
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,71 @@ | ||||
| # syntax=docker/dockerfile:1 | ||||
|  | ||||
| ARG NODE_VERSION=20 | ||||
|  | ||||
| FROM node:${NODE_VERSION}-alpine AS base | ||||
| RUN apk add --no-cache cpio findutils git | ||||
| WORKDIR /src | ||||
|  | ||||
| FROM base AS deps | ||||
| RUN --mount=type=bind,target=.,rw \ | ||||
|   --mount=type=cache,target=/src/node_modules \ | ||||
|   yarn install && mkdir /vendor && cp yarn.lock /vendor | ||||
|  | ||||
| FROM scratch AS vendor-update | ||||
| COPY --from=deps /vendor / | ||||
|  | ||||
| FROM deps AS vendor-validate | ||||
| RUN --mount=type=bind,target=.,rw <<EOT | ||||
|   set -e | ||||
|   git add -A | ||||
|   cp -rf /vendor/* . | ||||
|   if [ -n "$(git status --porcelain -- yarn.lock)" ]; then | ||||
|     echo >&2 'ERROR: Vendor result differs. Please vendor your package with "docker buildx bake vendor-update"' | ||||
|     git status --porcelain -- yarn.lock | ||||
|     exit 1 | ||||
|   fi | ||||
| EOT | ||||
|  | ||||
| FROM deps AS build | ||||
| RUN --mount=type=bind,target=.,rw \ | ||||
|   --mount=type=cache,target=/src/node_modules \ | ||||
|   yarn run build && mkdir /out && cp -Rf dist /out/ | ||||
|  | ||||
| FROM scratch AS build-update | ||||
| COPY --from=build /out / | ||||
|  | ||||
| FROM build AS build-validate | ||||
| RUN --mount=type=bind,target=.,rw <<EOT | ||||
|   set -e | ||||
|   git add -A | ||||
|   cp -rf /out/* . | ||||
|   if [ -n "$(git status --porcelain -- dist)" ]; then | ||||
|     echo >&2 'ERROR: Build result differs. Please build first with "docker buildx bake build"' | ||||
|     git status --porcelain -- dist | ||||
|     exit 1 | ||||
|   fi | ||||
| EOT | ||||
|  | ||||
| FROM deps AS format | ||||
| RUN --mount=type=bind,target=.,rw \ | ||||
|   --mount=type=cache,target=/src/node_modules \ | ||||
|   yarn run format \ | ||||
|   && mkdir /out && find . -name '*.ts' -not -path './node_modules/*' | cpio -pdm /out | ||||
|  | ||||
| FROM scratch AS format-update | ||||
| COPY --from=format /out / | ||||
|  | ||||
| FROM deps AS lint | ||||
| RUN --mount=type=bind,target=.,rw \ | ||||
|   --mount=type=cache,target=/src/node_modules \ | ||||
|   yarn run lint | ||||
|  | ||||
| FROM deps AS test | ||||
| ENV RUNNER_TEMP=/tmp/github_runner | ||||
| ENV RUNNER_TOOL_CACHE=/tmp/github_tool_cache | ||||
| RUN --mount=type=bind,target=.,rw \ | ||||
|   --mount=type=cache,target=/src/node_modules \ | ||||
|   yarn run test --coverage --coverageDirectory=/tmp/coverage | ||||
|  | ||||
| FROM scratch AS test-coverage | ||||
| COPY --from=test /tmp/coverage / | ||||
							
								
								
									
										4228
									
								
								dist/index.js
									
									
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										4228
									
								
								dist/index.js
									
									
									
										generated
									
									
										vendored
									
									
								
							
										
											
												File diff suppressed because one or more lines are too long
											
										
									
								
							
							
								
								
									
										1
									
								
								dist/index.js.map
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										1
									
								
								dist/index.js.map
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							
										
											
												File diff suppressed because one or more lines are too long
											
										
									
								
							
							
								
								
									
										12394
									
								
								dist/licenses.txt
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										12394
									
								
								dist/licenses.txt
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										1
									
								
								dist/sourcemap-register.js
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										1
									
								
								dist/sourcemap-register.js
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							
										
											
												File diff suppressed because one or more lines are too long
											
										
									
								
							
							
								
								
									
										53
									
								
								docker-bake.hcl
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										53
									
								
								docker-bake.hcl
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,53 @@ | ||||
| group "default" { | ||||
|   targets = ["build"] | ||||
| } | ||||
|  | ||||
| group "pre-checkin" { | ||||
|   targets = ["vendor-update", "format", "build"] | ||||
| } | ||||
|  | ||||
| group "validate" { | ||||
|   targets = ["lint", "build-validate", "vendor-validate"] | ||||
| } | ||||
|  | ||||
| target "build" { | ||||
|   dockerfile = "dev.Dockerfile" | ||||
|   target = "build-update" | ||||
|   output = ["."] | ||||
| } | ||||
|  | ||||
| target "build-validate" { | ||||
|   dockerfile = "dev.Dockerfile" | ||||
|   target = "build-validate" | ||||
|   output = ["type=cacheonly"] | ||||
| } | ||||
|  | ||||
| target "format" { | ||||
|   dockerfile = "dev.Dockerfile" | ||||
|   target = "format-update" | ||||
|   output = ["."] | ||||
| } | ||||
|  | ||||
| target "lint" { | ||||
|   dockerfile = "dev.Dockerfile" | ||||
|   target = "lint" | ||||
|   output = ["type=cacheonly"] | ||||
| } | ||||
|  | ||||
| target "vendor-update" { | ||||
|   dockerfile = "dev.Dockerfile" | ||||
|   target = "vendor-update" | ||||
|   output = ["."] | ||||
| } | ||||
|  | ||||
| target "vendor-validate" { | ||||
|   dockerfile = "dev.Dockerfile" | ||||
|   target = "vendor-validate" | ||||
|   output = ["type=cacheonly"] | ||||
| } | ||||
|  | ||||
| target "test" { | ||||
|   dockerfile = "dev.Dockerfile" | ||||
|   target = "test-coverage" | ||||
|   output = ["./coverage"] | ||||
| } | ||||
| @@ -1,12 +0,0 @@ | ||||
| module.exports = { | ||||
|   clearMocks: true, | ||||
|   moduleFileExtensions: ['js', 'ts'], | ||||
|   setupFiles: ["dotenv/config"], | ||||
|   testEnvironment: 'node', | ||||
|   testMatch: ['**/*.test.ts'], | ||||
|   testRunner: 'jest-circus/runner', | ||||
|   transform: { | ||||
|     '^.+\\.ts$': 'ts-jest' | ||||
|   }, | ||||
|   verbose: false | ||||
| } | ||||
							
								
								
									
										30
									
								
								jest.config.ts
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										30
									
								
								jest.config.ts
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,30 @@ | ||||
| import fs from 'fs'; | ||||
| import os from 'os'; | ||||
| import path from 'path'; | ||||
|  | ||||
| const tmpDir = fs.mkdtempSync(path.join(os.tmpdir(), 'docker-login-action-')).split(path.sep).join(path.posix.sep); | ||||
|  | ||||
| process.env = Object.assign({}, process.env, { | ||||
|   TEMP: tmpDir, | ||||
|   GITHUB_REPOSITORY: 'docker/login-action', | ||||
|   RUNNER_TEMP: path.join(tmpDir, 'runner-temp').split(path.sep).join(path.posix.sep), | ||||
|   RUNNER_TOOL_CACHE: path.join(tmpDir, 'runner-tool-cache').split(path.sep).join(path.posix.sep) | ||||
| }) as { | ||||
|   [key: string]: string; | ||||
| }; | ||||
|  | ||||
| module.exports = { | ||||
|   clearMocks: true, | ||||
|   testEnvironment: 'node', | ||||
|   moduleFileExtensions: ['js', 'ts'], | ||||
|   testMatch: ['**/*.test.ts'], | ||||
|   transform: { | ||||
|     '^.+\\.ts$': 'ts-jest' | ||||
|   }, | ||||
|   moduleNameMapper: { | ||||
|     '^csv-parse/sync': '<rootDir>/node_modules/csv-parse/dist/cjs/sync.cjs' | ||||
|   }, | ||||
|   collectCoverageFrom: ['src/**/{!(main.ts),}.ts'], | ||||
|   coveragePathIgnorePatterns: ['lib/', 'node_modules/', '__tests__/'], | ||||
|   verbose: true | ||||
| }; | ||||
							
								
								
									
										58
									
								
								package.json
									
									
									
									
									
								
							
							
						
						
									
										58
									
								
								package.json
									
									
									
									
									
								
							| @@ -3,11 +3,15 @@ | ||||
|   "description": "GitHub Action to login against a Docker registry", | ||||
|   "main": "lib/main.js", | ||||
|   "scripts": { | ||||
|     "build": "tsc && ncc build", | ||||
|     "format": "prettier --write **/*.ts", | ||||
|     "format-check": "prettier --check **/*.ts", | ||||
|     "test": "jest --coverage", | ||||
|     "pre-checkin": "yarn run format && yarn run build" | ||||
|     "build": "ncc build src/main.ts --source-map --minify --license licenses.txt", | ||||
|     "lint": "yarn run prettier && yarn run eslint", | ||||
|     "format": "yarn run prettier:fix && yarn run eslint:fix", | ||||
|     "eslint": "eslint --max-warnings=0 .", | ||||
|     "eslint:fix": "eslint --fix .", | ||||
|     "prettier": "prettier --check \"./**/*.ts\"", | ||||
|     "prettier:fix": "prettier --write \"./**/*.ts\"", | ||||
|     "test": "jest", | ||||
|     "all": "yarn run build && yarn run format && yarn test" | ||||
|   }, | ||||
|   "repository": { | ||||
|     "type": "git", | ||||
| @@ -18,31 +22,29 @@ | ||||
|     "docker", | ||||
|     "login" | ||||
|   ], | ||||
|   "author": "Docker", | ||||
|   "contributors": [ | ||||
|     { | ||||
|       "name": "CrazyMax", | ||||
|       "url": "https://crazymax.dev" | ||||
|     } | ||||
|   ], | ||||
|   "license": "MIT", | ||||
|   "author": "Docker Inc.", | ||||
|   "license": "Apache-2.0", | ||||
|   "dependencies": { | ||||
|     "@actions/core": "^1.2.6", | ||||
|     "@actions/exec": "^1.0.4", | ||||
|     "@actions/io": "^1.0.2", | ||||
|     "semver": "^7.3.2" | ||||
|     "@actions/core": "^1.10.1", | ||||
|     "@aws-sdk/client-ecr": "^3.529.1", | ||||
|     "@aws-sdk/client-ecr-public": "^3.529.1", | ||||
|     "@docker/actions-toolkit": "^0.18.0", | ||||
|     "http-proxy-agent": "^7.0.2", | ||||
|     "https-proxy-agent": "^7.0.4" | ||||
|   }, | ||||
|   "devDependencies": { | ||||
|     "@types/jest": "^26.0.3", | ||||
|     "@types/node": "^14.0.14", | ||||
|     "@vercel/ncc": "^0.23.0", | ||||
|     "dotenv": "^8.2.0", | ||||
|     "jest": "^26.1.0", | ||||
|     "jest-circus": "^26.1.0", | ||||
|     "jest-runtime": "^26.1.0", | ||||
|     "prettier": "^2.0.5", | ||||
|     "ts-jest": "^26.1.1", | ||||
|     "typescript": "^3.9.5", | ||||
|     "typescript-formatter": "^7.2.2" | ||||
|     "@types/node": "^20.5.9", | ||||
|     "@typescript-eslint/eslint-plugin": "^6.6.0", | ||||
|     "@typescript-eslint/parser": "^6.6.0", | ||||
|     "@vercel/ncc": "^0.38.0", | ||||
|     "eslint": "^8.48.0", | ||||
|     "eslint-config-prettier": "^9.0.0", | ||||
|     "eslint-plugin-jest": "^27.2.3", | ||||
|     "eslint-plugin-prettier": "^5.0.0", | ||||
|     "jest": "^29.6.4", | ||||
|     "prettier": "^3.0.3", | ||||
|     "ts-jest": "^29.1.1", | ||||
|     "ts-node": "^10.9.1", | ||||
|     "typescript": "^5.2.2" | ||||
|   } | ||||
| } | ||||
|   | ||||
							
								
								
									
										160
									
								
								src/aws.ts
									
									
									
									
									
								
							
							
						
						
									
										160
									
								
								src/aws.ts
									
									
									
									
									
								
							| @@ -1,51 +1,137 @@ | ||||
| import * as semver from 'semver'; | ||||
| import * as io from '@actions/io'; | ||||
| import * as execm from './exec'; | ||||
| import * as core from '@actions/core'; | ||||
| import {ECR} from '@aws-sdk/client-ecr'; | ||||
| import {ECRPUBLIC} from '@aws-sdk/client-ecr-public'; | ||||
| import {NodeHttpHandler} from '@smithy/node-http-handler'; | ||||
| import {HttpProxyAgent} from 'http-proxy-agent'; | ||||
| import {HttpsProxyAgent} from 'https-proxy-agent'; | ||||
|  | ||||
| export const isECR = async (registry: string): Promise<boolean> => { | ||||
|   return registry.includes('amazonaws'); | ||||
| const ecrRegistryRegex = /^(([0-9]{12})\.dkr\.ecr\.(.+)\.amazonaws\.com(.cn)?)(\/([^:]+)(:.+)?)?$/; | ||||
|  | ||||
| export const isECR = (registry: string): boolean => { | ||||
|   return ecrRegistryRegex.test(registry) || isPubECR(registry); | ||||
| }; | ||||
|  | ||||
| export const getRegion = async (registry: string): Promise<string> => { | ||||
|   return registry.substring(registry.indexOf('ecr.') + 4, registry.indexOf('.amazonaws')); | ||||
| export const isPubECR = (registry: string): boolean => { | ||||
|   return registry === 'public.ecr.aws'; | ||||
| }; | ||||
|  | ||||
| export const getCLI = async (): Promise<string> => { | ||||
|   return io.which('aws', true); | ||||
| }; | ||||
|  | ||||
| export const execCLI = async (args: string[]): Promise<string> => { | ||||
|   return execm.exec(await getCLI(), args, true).then(res => { | ||||
|     if (res.stderr != '' && !res.success) { | ||||
|       throw new Error(res.stderr); | ||||
|     } else if (res.stderr != '') { | ||||
|       return res.stderr.trim(); | ||||
|     } else { | ||||
|       return res.stdout.trim(); | ||||
|     } | ||||
|   }); | ||||
| }; | ||||
|  | ||||
| export const getCLIVersion = async (): Promise<string> => { | ||||
|   return parseCLIVersion(await execCLI(['--version'])); | ||||
| }; | ||||
|  | ||||
| export const parseCLIVersion = async (stdout: string): Promise<string> => { | ||||
|   const matches = /aws-cli\/([0-9.]+)/.exec(stdout); | ||||
| export const getRegion = (registry: string): string => { | ||||
|   if (isPubECR(registry)) { | ||||
|     return process.env.AWS_REGION || process.env.AWS_DEFAULT_REGION || 'us-east-1'; | ||||
|   } | ||||
|   const matches = registry.match(ecrRegistryRegex); | ||||
|   if (!matches) { | ||||
|     throw new Error(`Cannot parse AWS CLI version`); | ||||
|     return ''; | ||||
|   } | ||||
|   return semver.clean(matches[1]); | ||||
|   return matches[3]; | ||||
| }; | ||||
|  | ||||
| export const getDockerLoginCmd = async (cliVersion: string, registry: string, region: string): Promise<string> => { | ||||
|   if (semver.satisfies(cliVersion, '>=2.0.0')) { | ||||
|     return execCLI(['ecr', 'get-login-password', '--region', region]).then(pwd => { | ||||
|       return `docker login --username AWS --password ${pwd} ${registry}`; | ||||
| export const getAccountIDs = (registry: string): string[] => { | ||||
|   if (isPubECR(registry)) { | ||||
|     return []; | ||||
|   } | ||||
|   const matches = registry.match(ecrRegistryRegex); | ||||
|   if (!matches) { | ||||
|     return []; | ||||
|   } | ||||
|   const accountIDs: Array<string> = [matches[2]]; | ||||
|   if (process.env.AWS_ACCOUNT_IDS) { | ||||
|     accountIDs.push(...process.env.AWS_ACCOUNT_IDS.split(',')); | ||||
|   } | ||||
|   return accountIDs.filter((item, index) => accountIDs.indexOf(item) === index); | ||||
| }; | ||||
|  | ||||
| export interface RegistryData { | ||||
|   registry: string; | ||||
|   username: string; | ||||
|   password: string; | ||||
| } | ||||
|  | ||||
| export const getRegistriesData = async (registry: string, username?: string, password?: string): Promise<RegistryData[]> => { | ||||
|   const region = getRegion(registry); | ||||
|   const accountIDs = getAccountIDs(registry); | ||||
|  | ||||
|   const authTokenRequest = {}; | ||||
|   if (accountIDs.length > 0) { | ||||
|     core.debug(`Requesting AWS ECR auth token for ${accountIDs.join(', ')}`); | ||||
|     authTokenRequest['registryIds'] = accountIDs; | ||||
|   } | ||||
|  | ||||
|   let httpProxyAgent; | ||||
|   const httpProxy = process.env.http_proxy || process.env.HTTP_PROXY || ''; | ||||
|   if (httpProxy) { | ||||
|     core.debug(`Using http proxy ${httpProxy}`); | ||||
|     httpProxyAgent = new HttpProxyAgent(httpProxy); | ||||
|   } | ||||
|  | ||||
|   let httpsProxyAgent; | ||||
|   const httpsProxy = process.env.https_proxy || process.env.HTTPS_PROXY || ''; | ||||
|   if (httpsProxy) { | ||||
|     core.debug(`Using https proxy ${httpsProxy}`); | ||||
|     httpsProxyAgent = new HttpsProxyAgent(httpsProxy); | ||||
|   } | ||||
|  | ||||
|   const credentials = | ||||
|     username && password | ||||
|       ? { | ||||
|           accessKeyId: username, | ||||
|           secretAccessKey: password | ||||
|         } | ||||
|       : undefined; | ||||
|  | ||||
|   if (isPubECR(registry)) { | ||||
|     core.info(`AWS Public ECR detected with ${region} region`); | ||||
|     const ecrPublic = new ECRPUBLIC({ | ||||
|       customUserAgent: 'docker-login-action', | ||||
|       credentials, | ||||
|       region: region, | ||||
|       requestHandler: new NodeHttpHandler({ | ||||
|         httpAgent: httpProxyAgent, | ||||
|         httpsAgent: httpsProxyAgent | ||||
|       }) | ||||
|     }); | ||||
|     const authTokenResponse = await ecrPublic.getAuthorizationToken(authTokenRequest); | ||||
|     if (!authTokenResponse.authorizationData || !authTokenResponse.authorizationData.authorizationToken) { | ||||
|       throw new Error('Could not retrieve an authorization token from AWS Public ECR'); | ||||
|     } | ||||
|     const authToken = Buffer.from(authTokenResponse.authorizationData.authorizationToken, 'base64').toString('utf-8'); | ||||
|     const creds = authToken.split(':', 2); | ||||
|     core.setSecret(creds[0]); // redacted in workflow logs | ||||
|     core.setSecret(creds[1]); // redacted in workflow logs | ||||
|     return [ | ||||
|       { | ||||
|         registry: 'public.ecr.aws', | ||||
|         username: creds[0], | ||||
|         password: creds[1] | ||||
|       } | ||||
|     ]; | ||||
|   } else { | ||||
|     return execCLI(['ecr', 'get-login', '--region', region, '--no-include-email']).then(dockerLoginCmd => { | ||||
|       return dockerLoginCmd; | ||||
|     core.info(`AWS ECR detected with ${region} region`); | ||||
|     const ecr = new ECR({ | ||||
|       customUserAgent: 'docker-login-action', | ||||
|       credentials, | ||||
|       region: region, | ||||
|       requestHandler: new NodeHttpHandler({ | ||||
|         httpAgent: httpProxyAgent, | ||||
|         httpsAgent: httpsProxyAgent | ||||
|       }) | ||||
|     }); | ||||
|     const authTokenResponse = await ecr.getAuthorizationToken(authTokenRequest); | ||||
|     if (!Array.isArray(authTokenResponse.authorizationData) || !authTokenResponse.authorizationData.length) { | ||||
|       throw new Error('Could not retrieve an authorization token from AWS ECR'); | ||||
|     } | ||||
|     const regDatas: RegistryData[] = []; | ||||
|     for (const authData of authTokenResponse.authorizationData) { | ||||
|       const authToken = Buffer.from(authData.authorizationToken || '', 'base64').toString('utf-8'); | ||||
|       const creds = authToken.split(':', 2); | ||||
|       core.setSecret(creds[0]); // redacted in workflow logs | ||||
|       core.setSecret(creds[1]); // redacted in workflow logs | ||||
|       regDatas.push({ | ||||
|         registry: authData.proxyEndpoint || '', | ||||
|         username: creds[0], | ||||
|         password: creds[1] | ||||
|       }); | ||||
|     } | ||||
|     return regDatas; | ||||
|   } | ||||
| }; | ||||
|   | ||||
| @@ -4,14 +4,16 @@ export interface Inputs { | ||||
|   registry: string; | ||||
|   username: string; | ||||
|   password: string; | ||||
|   logout: string; | ||||
|   ecr: string; | ||||
|   logout: boolean; | ||||
| } | ||||
|  | ||||
| export function getInputs(): Inputs { | ||||
|   return { | ||||
|     registry: core.getInput('registry'), | ||||
|     username: core.getInput('username', {required: true}), | ||||
|     password: core.getInput('password', {required: true}), | ||||
|     logout: core.getInput('logout') | ||||
|     username: core.getInput('username'), | ||||
|     password: core.getInput('password'), | ||||
|     ecr: core.getInput('ecr'), | ||||
|     logout: core.getBooleanInput('logout') | ||||
|   }; | ||||
| } | ||||
|   | ||||
| @@ -1,9 +1,9 @@ | ||||
| import * as core from '@actions/core'; | ||||
| import * as aws from './aws'; | ||||
| import * as execm from './exec'; | ||||
| import * as core from '@actions/core'; | ||||
| import {Exec} from '@docker/actions-toolkit/lib/exec'; | ||||
|  | ||||
| export async function login(registry: string, username: string, password: string): Promise<void> { | ||||
|   if (await aws.isECR(registry)) { | ||||
| export async function login(registry: string, username: string, password: string, ecr: string): Promise<void> { | ||||
|   if (/true/i.test(ecr) || (ecr == 'auto' && aws.isECR(registry))) { | ||||
|     await loginECR(registry, username, password); | ||||
|   } else { | ||||
|     await loginStandard(registry, username, password); | ||||
| @@ -11,50 +11,55 @@ export async function login(registry: string, username: string, password: string | ||||
| } | ||||
|  | ||||
| export async function logout(registry: string): Promise<void> { | ||||
|   await execm.exec('docker', ['logout', registry], false).then(res => { | ||||
|     if (res.stderr != '' && !res.success) { | ||||
|       core.warning(res.stderr); | ||||
|   await Exec.getExecOutput('docker', ['logout', registry], { | ||||
|     ignoreReturnCode: true | ||||
|   }).then(res => { | ||||
|     if (res.stderr.length > 0 && res.exitCode != 0) { | ||||
|       core.warning(res.stderr.trim()); | ||||
|     } | ||||
|   }); | ||||
| } | ||||
|  | ||||
| export async function loginStandard(registry: string, username: string, password: string): Promise<void> { | ||||
|   let loginArgs: Array<string> = ['login', '--password-stdin']; | ||||
|   if (username) { | ||||
|     loginArgs.push('--username', username); | ||||
|   if (!username || !password) { | ||||
|     throw new Error('Username and password required'); | ||||
|   } | ||||
|  | ||||
|   const loginArgs: Array<string> = ['login', '--password-stdin']; | ||||
|   loginArgs.push('--username', username); | ||||
|   loginArgs.push(registry); | ||||
|  | ||||
|   if (registry) { | ||||
|     core.info(`🔑 Logging into ${registry}...`); | ||||
|     core.info(`Logging into ${registry}...`); | ||||
|   } else { | ||||
|     core.info(`🔑 Logging into DockerHub...`); | ||||
|     core.info(`Logging into Docker Hub...`); | ||||
|   } | ||||
|   await execm.exec('docker', loginArgs, true, password).then(res => { | ||||
|     if (res.stderr != '' && !res.success) { | ||||
|       throw new Error(res.stderr); | ||||
|   await Exec.getExecOutput('docker', loginArgs, { | ||||
|     ignoreReturnCode: true, | ||||
|     silent: true, | ||||
|     input: Buffer.from(password) | ||||
|   }).then(res => { | ||||
|     if (res.stderr.length > 0 && res.exitCode != 0) { | ||||
|       throw new Error(res.stderr.trim()); | ||||
|     } | ||||
|     core.info('🎉 Login Succeeded!'); | ||||
|     core.info(`Login Succeeded!`); | ||||
|   }); | ||||
| } | ||||
|  | ||||
| export async function loginECR(registry: string, username: string, password: string): Promise<void> { | ||||
|   const cliPath = await aws.getCLI(); | ||||
|   const cliVersion = await aws.getCLIVersion(); | ||||
|   const region = await aws.getRegion(registry); | ||||
|   core.info(`💡 AWS ECR detected with ${region} region`); | ||||
|  | ||||
|   process.env.AWS_ACCESS_KEY_ID = username; | ||||
|   process.env.AWS_SECRET_ACCESS_KEY = password; | ||||
|  | ||||
|   core.info(`⬇️ Retrieving docker login command through AWS CLI ${cliVersion} (${cliPath})...`); | ||||
|   const loginCmd = await aws.getDockerLoginCmd(cliVersion, registry, region); | ||||
|  | ||||
|   core.info(`🔑 Logging into ${registry}...`); | ||||
|   execm.exec(loginCmd, [], true).then(res => { | ||||
|     if (res.stderr != '' && !res.success) { | ||||
|       throw new Error(res.stderr); | ||||
|     } | ||||
|     core.info('🎉 Login Succeeded!'); | ||||
|   }); | ||||
|   core.info(`Retrieving registries data through AWS SDK...`); | ||||
|   const regDatas = await aws.getRegistriesData(registry, username, password); | ||||
|   for (const regData of regDatas) { | ||||
|     core.info(`Logging into ${regData.registry}...`); | ||||
|     await Exec.getExecOutput('docker', ['login', '--password-stdin', '--username', regData.username, regData.registry], { | ||||
|       ignoreReturnCode: true, | ||||
|       silent: true, | ||||
|       input: Buffer.from(regData.password) | ||||
|     }).then(res => { | ||||
|       if (res.stderr.length > 0 && res.exitCode != 0) { | ||||
|         throw new Error(res.stderr.trim()); | ||||
|       } | ||||
|       core.info('Login Succeeded!'); | ||||
|     }); | ||||
|   } | ||||
| } | ||||
|   | ||||
							
								
								
									
										40
									
								
								src/exec.ts
									
									
									
									
									
								
							
							
						
						
									
										40
									
								
								src/exec.ts
									
									
									
									
									
								
							| @@ -1,40 +0,0 @@ | ||||
| import * as actionsExec from '@actions/exec'; | ||||
| import {ExecOptions} from '@actions/exec'; | ||||
|  | ||||
| export interface ExecResult { | ||||
|   success: boolean; | ||||
|   stdout: string; | ||||
|   stderr: string; | ||||
| } | ||||
|  | ||||
| export const exec = async ( | ||||
|   command: string, | ||||
|   args: string[] = [], | ||||
|   silent: boolean, | ||||
|   stdin?: string | ||||
| ): Promise<ExecResult> => { | ||||
|   let stdout: string = ''; | ||||
|   let stderr: string = ''; | ||||
|  | ||||
|   const options: ExecOptions = { | ||||
|     silent: silent, | ||||
|     ignoreReturnCode: true, | ||||
|     input: Buffer.from(stdin || '') | ||||
|   }; | ||||
|   options.listeners = { | ||||
|     stdout: (data: Buffer) => { | ||||
|       stdout += data.toString(); | ||||
|     }, | ||||
|     stderr: (data: Buffer) => { | ||||
|       stderr += data.toString(); | ||||
|     } | ||||
|   }; | ||||
|  | ||||
|   const returnCode: number = await actionsExec.exec(command, args, options); | ||||
|  | ||||
|   return { | ||||
|     success: returnCode === 0, | ||||
|     stdout: stdout.trim(), | ||||
|     stderr: stderr.trim() | ||||
|   }; | ||||
| }; | ||||
							
								
								
									
										32
									
								
								src/main.ts
									
									
									
									
									
								
							
							
						
						
									
										32
									
								
								src/main.ts
									
									
									
									
									
								
							| @@ -1,33 +1,21 @@ | ||||
| import * as os from 'os'; | ||||
| import * as core from '@actions/core'; | ||||
| import {getInputs, Inputs} from './context'; | ||||
| import * as actionsToolkit from '@docker/actions-toolkit'; | ||||
|  | ||||
| import * as context from './context'; | ||||
| import * as docker from './docker'; | ||||
| import * as stateHelper from './state-helper'; | ||||
|  | ||||
| export async function run(): Promise<void> { | ||||
|   try { | ||||
|     if (os.platform() !== 'linux') { | ||||
|       throw new Error('Only supported on linux platform'); | ||||
|     } | ||||
|  | ||||
|     const {registry, username, password, logout} = getInputs(); | ||||
|     stateHelper.setRegistry(registry); | ||||
|     stateHelper.setLogout(logout); | ||||
|     await docker.login(registry, username, password); | ||||
|   } catch (error) { | ||||
|     core.setFailed(error.message); | ||||
|   } | ||||
| export async function main(): Promise<void> { | ||||
|   const input: context.Inputs = context.getInputs(); | ||||
|   stateHelper.setRegistry(input.registry); | ||||
|   stateHelper.setLogout(input.logout); | ||||
|   await docker.login(input.registry, input.username, input.password, input.ecr); | ||||
| } | ||||
|  | ||||
| async function logout(): Promise<void> { | ||||
| async function post(): Promise<void> { | ||||
|   if (!stateHelper.logout) { | ||||
|     return; | ||||
|   } | ||||
|   await docker.logout(stateHelper.registry); | ||||
| } | ||||
|  | ||||
| if (!stateHelper.IsPost) { | ||||
|   run(); | ||||
| } else { | ||||
|   logout(); | ||||
| } | ||||
| actionsToolkit.run(main, post); | ||||
|   | ||||
| @@ -1,6 +1,5 @@ | ||||
| import * as core from '@actions/core'; | ||||
|  | ||||
| export const IsPost = !!process.env['STATE_isPost']; | ||||
| export const registry = process.env['STATE_registry'] || ''; | ||||
| export const logout = /true/i.test(process.env['STATE_logout'] || ''); | ||||
|  | ||||
| @@ -8,10 +7,6 @@ export function setRegistry(registry: string) { | ||||
|   core.saveState('registry', registry); | ||||
| } | ||||
|  | ||||
| export function setLogout(logout: string) { | ||||
| export function setLogout(logout: boolean) { | ||||
|   core.saveState('logout', logout); | ||||
| } | ||||
|  | ||||
| if (!IsPost) { | ||||
|   core.saveState('isPost', 'true'); | ||||
| } | ||||
|   | ||||
| @@ -1,18 +1,21 @@ | ||||
| { | ||||
|   "compilerOptions": { | ||||
|     "esModuleInterop": true, | ||||
|     "target": "es6", | ||||
|     "module": "commonjs", | ||||
|     "lib": [ | ||||
|       "es6", | ||||
|       "dom" | ||||
|     ], | ||||
|     "strict": true, | ||||
|     "newLine": "lf", | ||||
|     "outDir": "./lib", | ||||
|     "rootDir": "./src", | ||||
|     "strict": true, | ||||
|     "forceConsistentCasingInFileNames": true, | ||||
|     "noImplicitAny": false, | ||||
|     "esModuleInterop": true, | ||||
|     "sourceMap": true | ||||
|     "resolveJsonModule": true, | ||||
|     "useUnknownInCatchVariables": false, | ||||
|   }, | ||||
|   "exclude": ["node_modules", "**/*.test.ts"] | ||||
|   "exclude": [ | ||||
|     "./__tests__/**/*", | ||||
|     "./lib/**/*", | ||||
|     "node_modules", | ||||
|     "jest.config.ts" | ||||
|   ] | ||||
| } | ||||
|   | ||||
		Reference in New Issue
	
	Block a user