mirror of
				https://github.com/docker/login-action.git
				synced 2025-10-31 10:10:09 +08:00 
			
		
		
		
	Merge pull request #40 from crazy-max/registry-ids
Handle Amazon ECR registries associated with other accounts
This commit is contained in:
		
						commit
						f3364599c6
					
				
							
								
								
									
										72
									
								
								README.md
									
									
									
									
									
								
							
							
						
						
									
										72
									
								
								README.md
									
									
									
									
									
								
							| @ -227,7 +227,7 @@ jobs: | |||||||
| 
 | 
 | ||||||
| ### AWS Elastic Container Registry (ECR) | ### AWS Elastic Container Registry (ECR) | ||||||
| 
 | 
 | ||||||
| Use an IAM user with the [ability to push to ECR](https://docs.aws.amazon.com/AmazonECR/latest/userguide/ecr_managed_policies.html). | Use an IAM user with the ability to [push to ECR with `AmazonEC2ContainerRegistryPowerUser` managed policy for example](https://docs.aws.amazon.com/AmazonECR/latest/userguide/ecr_managed_policies.html#AmazonEC2ContainerRegistryPowerUser). | ||||||
| Then create and download access keys and save `AWS_ACCESS_KEY_ID` and `AWS_SECRET_ACCESS_KEY` [as secrets](https://docs.github.com/en/actions/configuring-and-managing-workflows/creating-and-storing-encrypted-secrets#creating-encrypted-secrets-for-a-repository) | Then create and download access keys and save `AWS_ACCESS_KEY_ID` and `AWS_SECRET_ACCESS_KEY` [as secrets](https://docs.github.com/en/actions/configuring-and-managing-workflows/creating-and-storing-encrypted-secrets#creating-encrypted-secrets-for-a-repository) | ||||||
| in your GitHub repo. | in your GitHub repo. | ||||||
| 
 | 
 | ||||||
| @ -251,6 +251,33 @@ jobs: | |||||||
|           password: ${{ secrets.AWS_SECRET_ACCESS_KEY }} |           password: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | ||||||
| ``` | ``` | ||||||
| 
 | 
 | ||||||
|  | If you need to log in to Amazon ECR registries associated with other accounts, you can use the `AWS_ACCOUNT_IDS` | ||||||
|  | environment variable: | ||||||
|  | 
 | ||||||
|  | ```yaml | ||||||
|  | name: ci | ||||||
|  | 
 | ||||||
|  | on: | ||||||
|  |   push: | ||||||
|  |     branches: master | ||||||
|  | 
 | ||||||
|  | jobs: | ||||||
|  |   login: | ||||||
|  |     runs-on: ubuntu-latest | ||||||
|  |     steps: | ||||||
|  |       - | ||||||
|  |         name: Login to ECR | ||||||
|  |         uses: docker/login-action@v1 | ||||||
|  |         with: | ||||||
|  |           registry: <aws-account-number>.dkr.ecr.<region>.amazonaws.com | ||||||
|  |           username: ${{ secrets.AWS_ACCESS_KEY_ID }} | ||||||
|  |           password: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | ||||||
|  |         env: | ||||||
|  |           AWS_ACCOUNT_IDS: 012345678910,023456789012 | ||||||
|  | ``` | ||||||
|  | 
 | ||||||
|  | > Only available with [AWS CLI version 1](https://docs.aws.amazon.com/cli/latest/reference/ecr/get-login.html) | ||||||
|  | 
 | ||||||
| You can also use the [Configure AWS Credentials](https://github.com/aws-actions/configure-aws-credentials) action in | You can also use the [Configure AWS Credentials](https://github.com/aws-actions/configure-aws-credentials) action in | ||||||
| combination with this action: | combination with this action: | ||||||
| 
 | 
 | ||||||
| @ -283,7 +310,7 @@ jobs: | |||||||
| 
 | 
 | ||||||
| ### AWS Public Elastic Container Registry (ECR) | ### AWS Public Elastic Container Registry (ECR) | ||||||
| 
 | 
 | ||||||
| Use an IAM user with the [ability to push to ECR](https://docs.aws.amazon.com/AmazonECR/latest/userguide/ecr_managed_policies.html). | Use an IAM user with the ability to [push to ECR Public with `AmazonElasticContainerRegistryPublicPowerUser` managed policy for example](https://docs.aws.amazon.com/AmazonECR/latest/public/public-ecr-managed-policies.html#AmazonElasticContainerRegistryPublicPowerUser). | ||||||
| Then create and download access keys and save `AWS_ACCESS_KEY_ID` and `AWS_SECRET_ACCESS_KEY` [as secrets](https://docs.github.com/en/actions/configuring-and-managing-workflows/creating-and-storing-encrypted-secrets#creating-encrypted-secrets-for-a-repository) | Then create and download access keys and save `AWS_ACCESS_KEY_ID` and `AWS_SECRET_ACCESS_KEY` [as secrets](https://docs.github.com/en/actions/configuring-and-managing-workflows/creating-and-storing-encrypted-secrets#creating-encrypted-secrets-for-a-repository) | ||||||
| in your GitHub repo. | in your GitHub repo. | ||||||
| 
 | 
 | ||||||
| @ -311,41 +338,15 @@ jobs: | |||||||
| 
 | 
 | ||||||
| > Replace `<region>` with its respective value (default `us-east-1`). | > Replace `<region>` with its respective value (default `us-east-1`). | ||||||
| 
 | 
 | ||||||
| You can also use the [Configure AWS Credentials](https://github.com/aws-actions/configure-aws-credentials) action in |  | ||||||
| combination with this action: |  | ||||||
| 
 |  | ||||||
| ```yaml |  | ||||||
| name: ci |  | ||||||
| 
 |  | ||||||
| on: |  | ||||||
|   push: |  | ||||||
|     branches: master |  | ||||||
| 
 |  | ||||||
| jobs: |  | ||||||
|   login: |  | ||||||
|     runs-on: ubuntu-latest |  | ||||||
|     steps: |  | ||||||
|       - |  | ||||||
|         name: Configure AWS Credentials |  | ||||||
|         uses: aws-actions/configure-aws-credentials@v1 |  | ||||||
|         with: |  | ||||||
|           aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }} |  | ||||||
|           aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }} |  | ||||||
|           aws-region: <region> |  | ||||||
|       - |  | ||||||
|         name: Login to Public ECR |  | ||||||
|         uses: docker/login-action@v1 |  | ||||||
|         with: |  | ||||||
|           registry: public.ecr.aws |  | ||||||
| ``` |  | ||||||
| 
 |  | ||||||
| > Replace `<region>` with its respective value. |  | ||||||
| 
 |  | ||||||
| ### OCI Oracle Cloud Infrastructure Registry (OCIR) | ### OCI Oracle Cloud Infrastructure Registry (OCIR) | ||||||
|  | 
 | ||||||
| To push into OCIR in specific tenancy the [username](https://www.oracle.com/webfolder/technetwork/tutorials/obe/oci/registry/index.html#LogintoOracleCloudInfrastructureRegistryfromtheDockerCLI) | To push into OCIR in specific tenancy the [username](https://www.oracle.com/webfolder/technetwork/tutorials/obe/oci/registry/index.html#LogintoOracleCloudInfrastructureRegistryfromtheDockerCLI) | ||||||
| must be placed in format `<tenancy>/<username>` (in case of federated tenancy use the format `<tenancy-namespace>/oracleidentitycloudservice/<username>`).  | must be placed in format `<tenancy>/<username>` (in case of federated tenancy use the format | ||||||
| For password [create an auth token](https://www.oracle.com/webfolder/technetwork/tutorials/obe/oci/registry/index.html#GetanAuthToken). Save username and token | `<tenancy-namespace>/oracleidentitycloudservice/<username>`). | ||||||
|  [as a secrets](https://docs.github.com/en/actions/configuring-and-managing-workflows/creating-and-storing-encrypted-secrets#creating-encrypted-secrets-for-a-repository) in your GitHub repo.  | 
 | ||||||
|  | For password [create an auth token](https://www.oracle.com/webfolder/technetwork/tutorials/obe/oci/registry/index.html#GetanAuthToken). | ||||||
|  | Save username and token [as a secrets](https://docs.github.com/en/actions/configuring-and-managing-workflows/creating-and-storing-encrypted-secrets#creating-encrypted-secrets-for-a-repository) | ||||||
|  | in your GitHub repo.  | ||||||
| 
 | 
 | ||||||
| ```yaml | ```yaml | ||||||
| name: ci | name: ci | ||||||
| @ -366,6 +367,7 @@ jobs: | |||||||
|           username: ${{ secrets.OCI_USERNAME }} |           username: ${{ secrets.OCI_USERNAME }} | ||||||
|           password: ${{ secrets.OCI_TOKEN }} |           password: ${{ secrets.OCI_TOKEN }} | ||||||
| ``` | ``` | ||||||
|  | 
 | ||||||
| > Replace `<region>` with their respective values from [availability regions](https://docs.cloud.oracle.com/iaas/Content/Registry/Concepts/registryprerequisites.htm#Availab) | > Replace `<region>` with their respective values from [availability regions](https://docs.cloud.oracle.com/iaas/Content/Registry/Concepts/registryprerequisites.htm#Availab) | ||||||
| 
 | 
 | ||||||
| ## Customizing | ## Customizing | ||||||
|  | |||||||
| @ -6,6 +6,8 @@ describe('isECR', () => { | |||||||
|     ['registry.gitlab.com', false], |     ['registry.gitlab.com', false], | ||||||
|     ['gcr.io', false], |     ['gcr.io', false], | ||||||
|     ['012345678901.dkr.ecr.eu-west-3.amazonaws.com', true], |     ['012345678901.dkr.ecr.eu-west-3.amazonaws.com', true], | ||||||
|  |     ['876820548815.dkr.ecr.cn-north-1.amazonaws.com.cn', true], | ||||||
|  |     ['390948362332.dkr.ecr.cn-northwest-1.amazonaws.com.cn', true], | ||||||
|     ['public.ecr.aws', true] |     ['public.ecr.aws', true] | ||||||
|   ])('given registry %p', async (registry, expected) => { |   ])('given registry %p', async (registry, expected) => { | ||||||
|     expect(await aws.isECR(registry)).toEqual(expected); |     expect(await aws.isECR(registry)).toEqual(expected); | ||||||
| @ -17,6 +19,8 @@ describe('isPubECR', () => { | |||||||
|     ['registry.gitlab.com', false], |     ['registry.gitlab.com', false], | ||||||
|     ['gcr.io', false], |     ['gcr.io', false], | ||||||
|     ['012345678901.dkr.ecr.eu-west-3.amazonaws.com', false], |     ['012345678901.dkr.ecr.eu-west-3.amazonaws.com', false], | ||||||
|  |     ['876820548815.dkr.ecr.cn-north-1.amazonaws.com.cn', false], | ||||||
|  |     ['390948362332.dkr.ecr.cn-northwest-1.amazonaws.com.cn', false], | ||||||
|     ['public.ecr.aws', true] |     ['public.ecr.aws', true] | ||||||
|   ])('given registry %p', async (registry, expected) => { |   ])('given registry %p', async (registry, expected) => { | ||||||
|     expect(await aws.isPubECR(registry)).toEqual(expected); |     expect(await aws.isPubECR(registry)).toEqual(expected); | ||||||
| @ -59,8 +63,37 @@ describe('parseCLIVersion', () => { | |||||||
| describe('getRegion', () => { | describe('getRegion', () => { | ||||||
|   test.each([ |   test.each([ | ||||||
|     ['012345678901.dkr.ecr.eu-west-3.amazonaws.com', 'eu-west-3'], |     ['012345678901.dkr.ecr.eu-west-3.amazonaws.com', 'eu-west-3'], | ||||||
|  |     ['876820548815.dkr.ecr.cn-north-1.amazonaws.com.cn', 'cn-north-1'], | ||||||
|  |     ['390948362332.dkr.ecr.cn-northwest-1.amazonaws.com.cn', 'cn-northwest-1'], | ||||||
|     ['public.ecr.aws', 'us-east-1'] |     ['public.ecr.aws', 'us-east-1'] | ||||||
|   ])('given registry %p', async (registry, expected) => { |   ])('given registry %p', async (registry, expected) => { | ||||||
|     expect(await aws.getRegion(registry)).toEqual(expected); |     expect(await aws.getRegion(registry)).toEqual(expected); | ||||||
|   }); |   }); | ||||||
| }); | }); | ||||||
|  | 
 | ||||||
|  | describe('getAccountIDs', () => { | ||||||
|  |   test.each([ | ||||||
|  |     ['012345678901.dkr.ecr.eu-west-3.amazonaws.com', undefined, ['012345678901']], | ||||||
|  |     [ | ||||||
|  |       '012345678901.dkr.ecr.eu-west-3.amazonaws.com', | ||||||
|  |       '012345678910,023456789012', | ||||||
|  |       ['012345678901', '012345678910', '023456789012'] | ||||||
|  |     ], | ||||||
|  |     [ | ||||||
|  |       '012345678901.dkr.ecr.eu-west-3.amazonaws.com', | ||||||
|  |       '012345678901,012345678910,023456789012', | ||||||
|  |       ['012345678901', '012345678910', '023456789012'] | ||||||
|  |     ], | ||||||
|  |     [ | ||||||
|  |       '390948362332.dkr.ecr.cn-northwest-1.amazonaws.com.cn', | ||||||
|  |       '012345678910,023456789012', | ||||||
|  |       ['390948362332', '012345678910', '023456789012'] | ||||||
|  |     ], | ||||||
|  |     ['public.ecr.aws', undefined, []] | ||||||
|  |   ])('given registry %p', async (registry, accountIDsEnv, expected) => { | ||||||
|  |     if (accountIDsEnv) { | ||||||
|  |       process.env.AWS_ACCOUNT_IDS = accountIDsEnv; | ||||||
|  |     } | ||||||
|  |     expect(await aws.getAccountIDs(registry)).toEqual(expected); | ||||||
|  |   }); | ||||||
|  | }); | ||||||
|  | |||||||
							
								
								
									
										75
									
								
								dist/index.js
									
									
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										75
									
								
								dist/index.js
									
									
									
										generated
									
									
										vendored
									
									
								
							| @ -3088,6 +3088,7 @@ function loginECR(registry, username, password) { | |||||||
|         const cliPath = yield aws.getCLI(); |         const cliPath = yield aws.getCLI(); | ||||||
|         const cliVersion = yield aws.getCLIVersion(); |         const cliVersion = yield aws.getCLIVersion(); | ||||||
|         const region = yield aws.getRegion(registry); |         const region = yield aws.getRegion(registry); | ||||||
|  |         const accountIDs = yield aws.getAccountIDs(registry); | ||||||
|         if (yield aws.isPubECR(registry)) { |         if (yield aws.isPubECR(registry)) { | ||||||
|             core.info(`💡 AWS Public ECR detected with ${region} region`); |             core.info(`💡 AWS Public ECR detected with ${region} region`); | ||||||
|         } |         } | ||||||
| @ -3097,13 +3098,20 @@ function loginECR(registry, username, password) { | |||||||
|         process.env.AWS_ACCESS_KEY_ID = username || process.env.AWS_ACCESS_KEY_ID; |         process.env.AWS_ACCESS_KEY_ID = username || process.env.AWS_ACCESS_KEY_ID; | ||||||
|         process.env.AWS_SECRET_ACCESS_KEY = password || process.env.AWS_SECRET_ACCESS_KEY; |         process.env.AWS_SECRET_ACCESS_KEY = password || process.env.AWS_SECRET_ACCESS_KEY; | ||||||
|         core.info(`⬇️ Retrieving docker login command through AWS CLI ${cliVersion} (${cliPath})...`); |         core.info(`⬇️ Retrieving docker login command through AWS CLI ${cliVersion} (${cliPath})...`); | ||||||
|         const loginCmd = yield aws.getDockerLoginCmd(cliVersion, registry, region); |         const loginCmds = yield aws.getDockerLoginCmds(cliVersion, registry, region, accountIDs); | ||||||
|         core.info(`🔑 Logging into ${registry}...`); |         core.info(`🔑 Logging into ${registry}...`); | ||||||
|         execm.exec(loginCmd, [], true).then(res => { |         loginCmds.forEach((loginCmd, index) => { | ||||||
|             if (res.stderr != '' && !res.success) { |             execm.exec(loginCmd, [], true).then(res => { | ||||||
|                 throw new Error(res.stderr); |                 if (res.stderr != '' && !res.success) { | ||||||
|             } |                     throw new Error(res.stderr); | ||||||
|             core.info('🎉 Login Succeeded!'); |                 } | ||||||
|  |                 if (loginCmds.length > 1) { | ||||||
|  |                     core.info(`🎉 Login Succeeded! (${index}/${loginCmds.length})`); | ||||||
|  |                 } | ||||||
|  |                 else { | ||||||
|  |                     core.info('🎉 Login Succeeded!'); | ||||||
|  |                 } | ||||||
|  |             }); | ||||||
|         }); |         }); | ||||||
|     }); |     }); | ||||||
| } | } | ||||||
| @ -4160,22 +4168,41 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge | |||||||
|     }); |     }); | ||||||
| }; | }; | ||||||
| Object.defineProperty(exports, "__esModule", { value: true }); | Object.defineProperty(exports, "__esModule", { value: true }); | ||||||
| exports.getDockerLoginCmd = exports.parseCLIVersion = exports.getCLIVersion = exports.execCLI = exports.getCLI = exports.getRegion = exports.isPubECR = exports.isECR = void 0; | exports.getDockerLoginCmds = exports.parseCLIVersion = exports.getCLIVersion = exports.execCLI = exports.getCLI = exports.getAccountIDs = exports.getRegion = exports.isPubECR = exports.isECR = void 0; | ||||||
| const semver = __importStar(__webpack_require__(383)); | const semver = __importStar(__webpack_require__(383)); | ||||||
| const io = __importStar(__webpack_require__(436)); | const io = __importStar(__webpack_require__(436)); | ||||||
| const execm = __importStar(__webpack_require__(757)); | const execm = __importStar(__webpack_require__(757)); | ||||||
| exports.isECR = (registry) => __awaiter(void 0, void 0, void 0, function* () { | const ecrRegistryRegex = /^(([0-9]{12})\.dkr\.ecr\.(.+)\.amazonaws\.com(.cn)?)(\/([^:]+)(:.+)?)?$/; | ||||||
|     return registry.includes('amazonaws') || (yield exports.isPubECR(registry)); | exports.isECR = (registry) => { | ||||||
| }); |     return ecrRegistryRegex.test(registry) || exports.isPubECR(registry); | ||||||
| exports.isPubECR = (registry) => __awaiter(void 0, void 0, void 0, function* () { | }; | ||||||
|  | exports.isPubECR = (registry) => { | ||||||
|     return registry === 'public.ecr.aws'; |     return registry === 'public.ecr.aws'; | ||||||
| }); | }; | ||||||
| exports.getRegion = (registry) => __awaiter(void 0, void 0, void 0, function* () { | exports.getRegion = (registry) => { | ||||||
|     if (yield exports.isPubECR(registry)) { |     if (exports.isPubECR(registry)) { | ||||||
|         return process.env.AWS_REGION || process.env.AWS_DEFAULT_REGION || 'us-east-1'; |         return process.env.AWS_REGION || process.env.AWS_DEFAULT_REGION || 'us-east-1'; | ||||||
|     } |     } | ||||||
|     return registry.substring(registry.indexOf('ecr.') + 4, registry.indexOf('.amazonaws')); |     const matches = registry.match(ecrRegistryRegex); | ||||||
| }); |     if (!matches) { | ||||||
|  |         return ''; | ||||||
|  |     } | ||||||
|  |     return matches[3]; | ||||||
|  | }; | ||||||
|  | exports.getAccountIDs = (registry) => { | ||||||
|  |     if (exports.isPubECR(registry)) { | ||||||
|  |         return []; | ||||||
|  |     } | ||||||
|  |     const matches = registry.match(ecrRegistryRegex); | ||||||
|  |     if (!matches) { | ||||||
|  |         return []; | ||||||
|  |     } | ||||||
|  |     let accountIDs = [matches[2]]; | ||||||
|  |     if (process.env.AWS_ACCOUNT_IDS) { | ||||||
|  |         accountIDs.push(...process.env.AWS_ACCOUNT_IDS.split(',')); | ||||||
|  |     } | ||||||
|  |     return accountIDs.filter((item, index) => accountIDs.indexOf(item) === index); | ||||||
|  | }; | ||||||
| exports.getCLI = () => __awaiter(void 0, void 0, void 0, function* () { | exports.getCLI = () => __awaiter(void 0, void 0, void 0, function* () { | ||||||
|     return io.which('aws', true); |     return io.which('aws', true); | ||||||
| }); | }); | ||||||
| @ -4202,16 +4229,24 @@ exports.parseCLIVersion = (stdout) => __awaiter(void 0, void 0, void 0, function | |||||||
|     } |     } | ||||||
|     return semver.clean(matches[1]); |     return semver.clean(matches[1]); | ||||||
| }); | }); | ||||||
| exports.getDockerLoginCmd = (cliVersion, registry, region) => __awaiter(void 0, void 0, void 0, function* () { | exports.getDockerLoginCmds = (cliVersion, registry, region, accountIDs) => __awaiter(void 0, void 0, void 0, function* () { | ||||||
|     let ecrCmd = (yield exports.isPubECR(registry)) ? 'ecr-public' : 'ecr'; |     let ecrCmd = (yield exports.isPubECR(registry)) ? 'ecr-public' : 'ecr'; | ||||||
|     if (semver.satisfies(cliVersion, '>=2.0.0') || (yield exports.isPubECR(registry))) { |     if (semver.satisfies(cliVersion, '>=2.0.0') || (yield exports.isPubECR(registry))) { | ||||||
|         return exports.execCLI([ecrCmd, 'get-login-password', '--region', region]).then(pwd => { |         return exports.execCLI([ecrCmd, 'get-login-password', '--region', region]).then(pwd => { | ||||||
|             return `docker login --username AWS --password ${pwd} ${registry}`; |             return [`docker login --username AWS --password ${pwd} ${registry}`]; | ||||||
|         }); |         }); | ||||||
|     } |     } | ||||||
|     else { |     else { | ||||||
|         return exports.execCLI([ecrCmd, 'get-login', '--region', region, '--no-include-email']).then(dockerLoginCmd => { |         return exports.execCLI([ | ||||||
|             return dockerLoginCmd; |             ecrCmd, | ||||||
|  |             'get-login', | ||||||
|  |             '--region', | ||||||
|  |             region, | ||||||
|  |             '--registry-ids', | ||||||
|  |             accountIDs.join(' '), | ||||||
|  |             '--no-include-email' | ||||||
|  |         ]).then(dockerLoginCmds => { | ||||||
|  |             return dockerLoginCmds.trim().split(`\n`); | ||||||
|         }); |         }); | ||||||
|     } |     } | ||||||
| }); | }); | ||||||
|  | |||||||
							
								
								
									
										54
									
								
								src/aws.ts
									
									
									
									
									
								
							
							
						
						
									
										54
									
								
								src/aws.ts
									
									
									
									
									
								
							| @ -2,19 +2,40 @@ import * as semver from 'semver'; | |||||||
| import * as io from '@actions/io'; | import * as io from '@actions/io'; | ||||||
| import * as execm from './exec'; | import * as execm from './exec'; | ||||||
| 
 | 
 | ||||||
| export const isECR = async (registry: string): Promise<boolean> => { | const ecrRegistryRegex = /^(([0-9]{12})\.dkr\.ecr\.(.+)\.amazonaws\.com(.cn)?)(\/([^:]+)(:.+)?)?$/; | ||||||
|   return registry.includes('amazonaws') || (await isPubECR(registry)); | 
 | ||||||
|  | export const isECR = (registry: string): boolean => { | ||||||
|  |   return ecrRegistryRegex.test(registry) || isPubECR(registry); | ||||||
| }; | }; | ||||||
| 
 | 
 | ||||||
| export const isPubECR = async (registry: string): Promise<boolean> => { | export const isPubECR = (registry: string): boolean => { | ||||||
|   return registry === 'public.ecr.aws'; |   return registry === 'public.ecr.aws'; | ||||||
| }; | }; | ||||||
| 
 | 
 | ||||||
| export const getRegion = async (registry: string): Promise<string> => { | export const getRegion = (registry: string): string => { | ||||||
|   if (await isPubECR(registry)) { |   if (isPubECR(registry)) { | ||||||
|     return process.env.AWS_REGION || process.env.AWS_DEFAULT_REGION || 'us-east-1'; |     return process.env.AWS_REGION || process.env.AWS_DEFAULT_REGION || 'us-east-1'; | ||||||
|   } |   } | ||||||
|   return registry.substring(registry.indexOf('ecr.') + 4, registry.indexOf('.amazonaws')); |   const matches = registry.match(ecrRegistryRegex); | ||||||
|  |   if (!matches) { | ||||||
|  |     return ''; | ||||||
|  |   } | ||||||
|  |   return matches[3]; | ||||||
|  | }; | ||||||
|  | 
 | ||||||
|  | export const getAccountIDs = (registry: string): string[] => { | ||||||
|  |   if (isPubECR(registry)) { | ||||||
|  |     return []; | ||||||
|  |   } | ||||||
|  |   const matches = registry.match(ecrRegistryRegex); | ||||||
|  |   if (!matches) { | ||||||
|  |     return []; | ||||||
|  |   } | ||||||
|  |   let accountIDs: Array<string> = [matches[2]]; | ||||||
|  |   if (process.env.AWS_ACCOUNT_IDS) { | ||||||
|  |     accountIDs.push(...process.env.AWS_ACCOUNT_IDS.split(',')); | ||||||
|  |   } | ||||||
|  |   return accountIDs.filter((item, index) => accountIDs.indexOf(item) === index); | ||||||
| }; | }; | ||||||
| 
 | 
 | ||||||
| export const getCLI = async (): Promise<string> => { | export const getCLI = async (): Promise<string> => { | ||||||
| @ -45,15 +66,28 @@ export const parseCLIVersion = async (stdout: string): Promise<string> => { | |||||||
|   return semver.clean(matches[1]); |   return semver.clean(matches[1]); | ||||||
| }; | }; | ||||||
| 
 | 
 | ||||||
| export const getDockerLoginCmd = async (cliVersion: string, registry: string, region: string): Promise<string> => { | export const getDockerLoginCmds = async ( | ||||||
|  |   cliVersion: string, | ||||||
|  |   registry: string, | ||||||
|  |   region: string, | ||||||
|  |   accountIDs: string[] | ||||||
|  | ): Promise<string[]> => { | ||||||
|   let ecrCmd = (await isPubECR(registry)) ? 'ecr-public' : 'ecr'; |   let ecrCmd = (await isPubECR(registry)) ? 'ecr-public' : 'ecr'; | ||||||
|   if (semver.satisfies(cliVersion, '>=2.0.0') || (await isPubECR(registry))) { |   if (semver.satisfies(cliVersion, '>=2.0.0') || (await isPubECR(registry))) { | ||||||
|     return execCLI([ecrCmd, 'get-login-password', '--region', region]).then(pwd => { |     return execCLI([ecrCmd, 'get-login-password', '--region', region]).then(pwd => { | ||||||
|       return `docker login --username AWS --password ${pwd} ${registry}`; |       return [`docker login --username AWS --password ${pwd} ${registry}`]; | ||||||
|     }); |     }); | ||||||
|   } else { |   } else { | ||||||
|     return execCLI([ecrCmd, 'get-login', '--region', region, '--no-include-email']).then(dockerLoginCmd => { |     return execCLI([ | ||||||
|       return dockerLoginCmd; |       ecrCmd, | ||||||
|  |       'get-login', | ||||||
|  |       '--region', | ||||||
|  |       region, | ||||||
|  |       '--registry-ids', | ||||||
|  |       accountIDs.join(' '), | ||||||
|  |       '--no-include-email' | ||||||
|  |     ]).then(dockerLoginCmds => { | ||||||
|  |       return dockerLoginCmds.trim().split(`\n`); | ||||||
|     }); |     }); | ||||||
|   } |   } | ||||||
| }; | }; | ||||||
|  | |||||||
| @ -44,6 +44,7 @@ export async function loginECR(registry: string, username: string, password: str | |||||||
|   const cliPath = await aws.getCLI(); |   const cliPath = await aws.getCLI(); | ||||||
|   const cliVersion = await aws.getCLIVersion(); |   const cliVersion = await aws.getCLIVersion(); | ||||||
|   const region = await aws.getRegion(registry); |   const region = await aws.getRegion(registry); | ||||||
|  |   const accountIDs = await aws.getAccountIDs(registry); | ||||||
| 
 | 
 | ||||||
|   if (await aws.isPubECR(registry)) { |   if (await aws.isPubECR(registry)) { | ||||||
|     core.info(`💡 AWS Public ECR detected with ${region} region`); |     core.info(`💡 AWS Public ECR detected with ${region} region`); | ||||||
| @ -55,13 +56,19 @@ export async function loginECR(registry: string, username: string, password: str | |||||||
|   process.env.AWS_SECRET_ACCESS_KEY = password || process.env.AWS_SECRET_ACCESS_KEY; |   process.env.AWS_SECRET_ACCESS_KEY = password || process.env.AWS_SECRET_ACCESS_KEY; | ||||||
| 
 | 
 | ||||||
|   core.info(`⬇️ Retrieving docker login command through AWS CLI ${cliVersion} (${cliPath})...`); |   core.info(`⬇️ Retrieving docker login command through AWS CLI ${cliVersion} (${cliPath})...`); | ||||||
|   const loginCmd = await aws.getDockerLoginCmd(cliVersion, registry, region); |   const loginCmds = await aws.getDockerLoginCmds(cliVersion, registry, region, accountIDs); | ||||||
| 
 | 
 | ||||||
|   core.info(`🔑 Logging into ${registry}...`); |   core.info(`🔑 Logging into ${registry}...`); | ||||||
|   execm.exec(loginCmd, [], true).then(res => { |   loginCmds.forEach((loginCmd, index) => { | ||||||
|     if (res.stderr != '' && !res.success) { |     execm.exec(loginCmd, [], true).then(res => { | ||||||
|       throw new Error(res.stderr); |       if (res.stderr != '' && !res.success) { | ||||||
|     } |         throw new Error(res.stderr); | ||||||
|     core.info('🎉 Login Succeeded!'); |       } | ||||||
|  |       if (loginCmds.length > 1) { | ||||||
|  |         core.info(`🎉 Login Succeeded! (${index}/${loginCmds.length})`); | ||||||
|  |       } else { | ||||||
|  |         core.info('🎉 Login Succeeded!'); | ||||||
|  |       } | ||||||
|  |     }); | ||||||
|   }); |   }); | ||||||
| } | } | ||||||
|  | |||||||
		Loading…
	
		Reference in New Issue
	
	Block a user
	 CrazyMax
						CrazyMax