From 7277d4d4429c1761163b9daa148ac89ca38d06be Mon Sep 17 00:00:00 2001 From: CrazyMax <1951866+crazy-max@users.noreply.github.com> Date: Tue, 24 Mar 2026 10:28:31 +0100 Subject: [PATCH] fix scoped Docker Hub cleanup path when registry is omitted Signed-off-by: CrazyMax <1951866+crazy-max@users.noreply.github.com> --- __tests__/context.test.ts | 27 +++++++++++++++++++++++++-- __tests__/docker.test.ts | 7 ------- src/context.ts | 10 ++++++---- 3 files changed, 31 insertions(+), 13 deletions(-) diff --git a/__tests__/context.test.ts b/__tests__/context.test.ts index 5af3541..622474f 100644 --- a/__tests__/context.test.ts +++ b/__tests__/context.test.ts @@ -1,6 +1,17 @@ -import {expect, test} from 'vitest'; +import {afterEach, expect, test} from 'vitest'; +import * as path from 'path'; -import {getInputs} from '../src/context.js'; +import {Buildx} from '@docker/actions-toolkit/lib/buildx/buildx.js'; + +import {getAuthList, getInputs} from '../src/context.js'; + +afterEach(() => { + for (const key of Object.keys(process.env)) { + if (key.startsWith('INPUT_')) { + delete process.env[key]; + } + } +}); test('with password and username getInputs does not throw error', async () => { process.env['INPUT_USERNAME'] = 'dbowie'; @@ -10,3 +21,15 @@ test('with password and username getInputs does not throw error', async () => { getInputs(); }).not.toThrow(); }); + +test('getAuthList uses the default Docker Hub registry when computing scoped config dir', async () => { + process.env['INPUT_USERNAME'] = 'dbowie'; + process.env['INPUT_PASSWORD'] = 'groundcontrol'; + process.env['INPUT_SCOPE'] = 'myscope'; + process.env['INPUT_LOGOUT'] = 'false'; + const [auth] = getAuthList(getInputs()); + expect(auth).toMatchObject({ + registry: 'docker.io', + configDir: path.join(Buildx.configDir, 'config', 'registry-1.docker.io', 'myscope') + }); +}); diff --git a/__tests__/docker.test.ts b/__tests__/docker.test.ts index ba836ad..e4d65a7 100644 --- a/__tests__/docker.test.ts +++ b/__tests__/docker.test.ts @@ -1,15 +1,10 @@ import {expect, test, vi} from 'vitest'; -import * as path from 'path'; import {Docker} from '@docker/actions-toolkit/lib/docker/docker.js'; import {loginStandard, logout} from '../src/docker.js'; -process.env['RUNNER_TEMP'] = path.join(__dirname, 'runner'); - test('loginStandard calls exec', async () => { - // eslint-disable-next-line @typescript-eslint/ban-ts-comment - // @ts-ignore const execSpy = vi.spyOn(Docker, 'getExecOutput').mockImplementation(async () => { return { exitCode: expect.any(Number), @@ -38,8 +33,6 @@ test('loginStandard calls exec', async () => { }); test('logout calls exec', async () => { - // eslint-disable-next-line @typescript-eslint/ban-ts-comment - // @ts-ignore const execSpy = vi.spyOn(Docker, 'getExecOutput').mockImplementation(async () => { return { exitCode: expect.any(Number), diff --git a/src/context.ts b/src/context.ts index e9672b0..e2e7bb4 100644 --- a/src/context.ts +++ b/src/context.ts @@ -42,24 +42,26 @@ export function getAuthList(inputs: Inputs): Array { } let auths: Array = []; if (!inputs.registryAuth) { + const registry = inputs.registry || 'docker.io'; auths.push({ - registry: inputs.registry || 'docker.io', + registry, username: inputs.username, password: inputs.password, scope: inputs.scope, ecr: inputs.ecr || 'auto', - configDir: scopeToConfigDir(inputs.registry, inputs.scope) + configDir: scopeToConfigDir(registry, inputs.scope) }); } else { auths = (yaml.load(inputs.registryAuth) as Array).map(auth => { core.setSecret(auth.password); // redacted in workflow logs + const registry = auth.registry || 'docker.io'; return { - registry: auth.registry || 'docker.io', + registry, username: auth.username, password: auth.password, scope: auth.scope, ecr: auth.ecr || 'auto', - configDir: scopeToConfigDir(auth.registry || 'docker.io', auth.scope) + configDir: scopeToConfigDir(registry, auth.scope) }; }); }