mirror of https://github.com/helm/helm.git
Merge pull request #31222 from benoittgt/30987-ghcr-io
Prevent failing `helm push` on ghcr.io using standard GET auth token flow
This commit is contained in:
commit
fc22b6df31
|
@ -137,8 +137,6 @@ func NewClient(options ...ClientOption) (*Client, error) {
|
|||
if client.enableCache {
|
||||
authorizer.Cache = auth.NewCache()
|
||||
}
|
||||
|
||||
authorizer.ForceAttemptOAuth2 = true
|
||||
client.authorizer = &authorizer
|
||||
}
|
||||
|
||||
|
@ -251,6 +249,8 @@ func (c *Client) Login(host string, options ...LoginOption) error {
|
|||
return fmt.Errorf("authenticating to %q: %w", host, err)
|
||||
}
|
||||
}
|
||||
// Always restore to false after probing, to avoid forcing POST to token endpoints like GHCR.
|
||||
c.authorizer.ForceAttemptOAuth2 = false
|
||||
|
||||
key := credentials.ServerAddressFromRegistry(host)
|
||||
key = credentials.ServerAddressFromHostname(key)
|
||||
|
|
|
@ -18,6 +18,10 @@ package registry
|
|||
|
||||
import (
|
||||
"io"
|
||||
"net/http"
|
||||
"net/http/httptest"
|
||||
"path/filepath"
|
||||
"strings"
|
||||
"testing"
|
||||
|
||||
ocispec "github.com/opencontainers/image-spec/specs-go/v1"
|
||||
|
@ -51,3 +55,68 @@ func TestTagManifestTransformsReferences(t *testing.T) {
|
|||
_, err = memStore.Resolve(ctx, refWithPlus)
|
||||
require.Error(t, err, "Should NOT find the reference with the original +")
|
||||
}
|
||||
|
||||
// Verifies that Login always restores ForceAttemptOAuth2 to false on success.
|
||||
func TestLogin_ResetsForceAttemptOAuth2_OnSuccess(t *testing.T) {
|
||||
t.Parallel()
|
||||
|
||||
srv := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
if r.URL.Path == "/v2/" {
|
||||
// Accept either HEAD or GET
|
||||
w.WriteHeader(http.StatusOK)
|
||||
return
|
||||
}
|
||||
http.NotFound(w, r)
|
||||
}))
|
||||
defer srv.Close()
|
||||
|
||||
host := strings.TrimPrefix(srv.URL, "http://")
|
||||
|
||||
credFile := filepath.Join(t.TempDir(), "config.json")
|
||||
c, err := NewClient(
|
||||
ClientOptWriter(io.Discard),
|
||||
ClientOptCredentialsFile(credFile),
|
||||
)
|
||||
if err != nil {
|
||||
t.Fatalf("NewClient error: %v", err)
|
||||
}
|
||||
|
||||
if c.authorizer == nil || c.authorizer.ForceAttemptOAuth2 {
|
||||
t.Fatalf("expected ForceAttemptOAuth2 default to be false")
|
||||
}
|
||||
|
||||
// Call Login with plain HTTP against our test server
|
||||
if err := c.Login(host, LoginOptPlainText(true), LoginOptBasicAuth("u", "p")); err != nil {
|
||||
t.Fatalf("Login error: %v", err)
|
||||
}
|
||||
|
||||
if c.authorizer.ForceAttemptOAuth2 {
|
||||
t.Errorf("ForceAttemptOAuth2 should be false after successful Login")
|
||||
}
|
||||
}
|
||||
|
||||
// Verifies that Login restores ForceAttemptOAuth2 to false even when ping fails.
|
||||
func TestLogin_ResetsForceAttemptOAuth2_OnFailure(t *testing.T) {
|
||||
t.Parallel()
|
||||
|
||||
// Start and immediately close, so connections will fail
|
||||
srv := httptest.NewServer(http.HandlerFunc(func(_ http.ResponseWriter, _ *http.Request) {}))
|
||||
host := strings.TrimPrefix(srv.URL, "http://")
|
||||
srv.Close()
|
||||
|
||||
credFile := filepath.Join(t.TempDir(), "config.json")
|
||||
c, err := NewClient(
|
||||
ClientOptWriter(io.Discard),
|
||||
ClientOptCredentialsFile(credFile),
|
||||
)
|
||||
if err != nil {
|
||||
t.Fatalf("NewClient error: %v", err)
|
||||
}
|
||||
|
||||
// Invoke Login, expect an error but ForceAttemptOAuth2 must end false
|
||||
_ = c.Login(host, LoginOptPlainText(true), LoginOptBasicAuth("u", "p"))
|
||||
|
||||
if c.authorizer.ForceAttemptOAuth2 {
|
||||
t.Errorf("ForceAttemptOAuth2 should be false after failed Login")
|
||||
}
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue