|
116 | 116 | if [[ "$(plugin_read_config PROPAGATE_AWS_AUTH_TOKENS "false")" =~ ^(true|on|1)$ ]] ; then |
117 | 117 | if [[ -n "${AWS_ACCESS_KEY_ID:-}" ]] ; then |
118 | 118 | run_params+=( --env "AWS_ACCESS_KEY_ID" ) |
119 | | - else |
120 | | - echo "🚨 AWS_ACCESS_KEY_ID is not set, not propagating" |
121 | 119 | fi |
122 | 120 | if [[ -n "${AWS_SECRET_ACCESS_KEY:-}" ]] ; then |
123 | 121 | run_params+=( --env "AWS_SECRET_ACCESS_KEY" ) |
124 | | - else |
125 | | - echo "🚨 AWS_SECRET_ACCESS_KEY is not set, not propagating" |
126 | 122 | fi |
127 | 123 | if [[ -n "${AWS_SESSION_TOKEN:-}" ]] ; then |
128 | 124 | run_params+=( --env "AWS_SESSION_TOKEN" ) |
129 | | - else |
130 | | - echo "🚨 AWS_SESSION_TOKEN is not set, not propagating" |
131 | 125 | fi |
132 | 126 | if [[ -n "${AWS_REGION:-}" ]] ; then |
133 | 127 | run_params+=( --env "AWS_REGION" ) |
134 | | - else |
135 | | - echo "🚨 AWS_REGION is not set, not propagating" |
136 | 128 | fi |
137 | 129 | if [[ -n "${AWS_DEFAULT_REGION:-}" ]] ; then |
138 | 130 | run_params+=( --env "AWS_DEFAULT_REGION" ) |
139 | | - else |
140 | | - echo "🚨 AWS_DEFAULT_REGION is not set, not propagating" |
141 | 131 | fi |
142 | 132 | if [[ -n "${AWS_ROLE_ARN:-}" ]] ; then |
143 | 133 | run_params+=( --env "AWS_ROLE_ARN" ) |
144 | | - else |
145 | | - echo "🚨 AWS_ROLE_ARN is not set, not propagating" |
146 | 134 | fi |
147 | 135 | if [[ -n "${AWS_STS_REGIONAL_ENDPOINTS:-}" ]] ; then |
148 | 136 | run_params+=( --env "AWS_STS_REGIONAL_ENDPOINTS" ) |
149 | | - else |
150 | | - echo "🚨 AWS_STS_REGIONAL_ENDPOINTS is not set, not propagating" |
151 | 137 | fi |
152 | 138 | # Pass ECS variables when the agent is running in ECS |
153 | 139 | # https://docs.aws.amazon.com/sdkref/latest/guide/feature-container-credentials.html |
154 | 140 | if [[ -n "${AWS_CONTAINER_CREDENTIALS_FULL_URI:-}" ]] ; then |
155 | 141 | run_params+=( --env "AWS_CONTAINER_CREDENTIALS_FULL_URI" ) |
156 | | - else |
157 | | - echo "🚨 AWS_CONTAINER_CREDENTIALS_FULL_URI is not set, not propagating" |
158 | 142 | fi |
159 | 143 | if [[ -n "${AWS_CONTAINER_CREDENTIALS_RELATIVE_URI:-}" ]] ; then |
160 | 144 | run_params+=( --env "AWS_CONTAINER_CREDENTIALS_RELATIVE_URI" ) |
161 | | - else |
162 | | - echo "🚨 AWS_CONTAINER_CREDENTIALS_RELATIVE_URI is not set, not propagating" |
163 | 145 | fi |
164 | 146 | if [[ -n "${AWS_CONTAINER_AUTHORIZATION_TOKEN:-}" ]] ; then |
165 | 147 | run_params+=( --env "AWS_CONTAINER_AUTHORIZATION_TOKEN" ) |
166 | | - else |
167 | | - echo "🚨 AWS_CONTAINER_AUTHORIZATION_TOKEN is not set, not propagating" |
168 | 148 | fi |
169 | 149 | # Pass EKS variables when the agent is running in EKS |
170 | 150 | # https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts-minimum-sdk.html |
171 | 151 | if [[ -n "${AWS_WEB_IDENTITY_TOKEN_FILE:-}" ]] ; then |
172 | 152 | run_params+=( --env "AWS_WEB_IDENTITY_TOKEN_FILE" ) |
173 | 153 | # Add the token file as a volume |
174 | 154 | run_params+=( --volume "${AWS_WEB_IDENTITY_TOKEN_FILE}:${AWS_WEB_IDENTITY_TOKEN_FILE}" ) |
175 | | - else |
176 | | - echo "🚨 AWS_WEB_IDENTITY_TOKEN_FILE is not set, not propagating" |
177 | 155 | fi |
178 | | -else |
179 | | - echo "🚨 Not propagating AWS credentials to container as PROPAGATE_AWS_AUTH_TOKENS is not set to true" |
180 | 156 | fi |
181 | 157 |
|
182 | 158 | # If requested, propagate a set of env vars as listed in a given env var to the |
|
0 commit comments