Skip to content

Commit 80a280e

Browse files
feat: Add more logs
1 parent 32f040d commit 80a280e

1 file changed

Lines changed: 23 additions & 1 deletion

File tree

commands/run.sh

Lines changed: 23 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,45 +116,67 @@ fi
116116
if [[ "$(plugin_read_config PROPAGATE_AWS_AUTH_TOKENS "false")" =~ ^(true|on|1)$ ]] ; then
117117
if [[ -n "${AWS_ACCESS_KEY_ID:-}" ]] ; then
118118
run_params+=( --env "AWS_ACCESS_KEY_ID" )
119+
else
120+
echo "🚨 AWS_ACCESS_KEY_ID is not set, not propagating"
119121
fi
120122
if [[ -n "${AWS_SECRET_ACCESS_KEY:-}" ]] ; then
121123
run_params+=( --env "AWS_SECRET_ACCESS_KEY" )
124+
else
125+
echo "🚨 AWS_SECRET_ACCESS_KEY is not set, not propagating"
122126
fi
123127
if [[ -n "${AWS_SESSION_TOKEN:-}" ]] ; then
124128
run_params+=( --env "AWS_SESSION_TOKEN" )
129+
else
130+
echo "🚨 AWS_SESSION_TOKEN is not set, not propagating"
125131
fi
126132
if [[ -n "${AWS_REGION:-}" ]] ; then
127133
run_params+=( --env "AWS_REGION" )
134+
else
135+
echo "🚨 AWS_REGION is not set, not propagating"
128136
fi
129137
if [[ -n "${AWS_DEFAULT_REGION:-}" ]] ; then
130138
run_params+=( --env "AWS_DEFAULT_REGION" )
139+
else
140+
echo "🚨 AWS_DEFAULT_REGION is not set, not propagating"
131141
fi
132142
if [[ -n "${AWS_ROLE_ARN:-}" ]] ; then
133143
run_params+=( --env "AWS_ROLE_ARN" )
144+
else
145+
echo "🚨 AWS_ROLE_ARN is not set, not propagating"
134146
fi
135147
if [[ -n "${AWS_STS_REGIONAL_ENDPOINTS:-}" ]] ; then
136148
run_params+=( --env "AWS_STS_REGIONAL_ENDPOINTS" )
149+
else
150+
echo "🚨 AWS_STS_REGIONAL_ENDPOINTS is not set, not propagating"
137151
fi
138152
# Pass ECS variables when the agent is running in ECS
139153
# https://docs.aws.amazon.com/sdkref/latest/guide/feature-container-credentials.html
140154
if [[ -n "${AWS_CONTAINER_CREDENTIALS_FULL_URI:-}" ]] ; then
141155
run_params+=( --env "AWS_CONTAINER_CREDENTIALS_FULL_URI" )
156+
else
157+
echo "🚨 AWS_CONTAINER_CREDENTIALS_FULL_URI is not set, not propagating"
142158
fi
143159
if [[ -n "${AWS_CONTAINER_CREDENTIALS_RELATIVE_URI:-}" ]] ; then
144160
run_params+=( --env "AWS_CONTAINER_CREDENTIALS_RELATIVE_URI" )
161+
else
162+
echo "🚨 AWS_CONTAINER_CREDENTIALS_RELATIVE_URI is not set, not propagating"
145163
fi
146164
if [[ -n "${AWS_CONTAINER_AUTHORIZATION_TOKEN:-}" ]] ; then
147165
run_params+=( --env "AWS_CONTAINER_AUTHORIZATION_TOKEN" )
166+
else
167+
echo "🚨 AWS_CONTAINER_AUTHORIZATION_TOKEN is not set, not propagating"
148168
fi
149169
# Pass EKS variables when the agent is running in EKS
150170
# https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts-minimum-sdk.html
151171
if [[ -n "${AWS_WEB_IDENTITY_TOKEN_FILE:-}" ]] ; then
152172
run_params+=( --env "AWS_WEB_IDENTITY_TOKEN_FILE" )
153173
# Add the token file as a volume
154174
run_params+=( --volume "${AWS_WEB_IDENTITY_TOKEN_FILE}:${AWS_WEB_IDENTITY_TOKEN_FILE}" )
175+
else
176+
echo "🚨 AWS_WEB_IDENTITY_TOKEN_FILE is not set, not propagating"
155177
fi
156178
else
157-
echo -n "🚨 Not propagating aws auth tokens"
179+
echo "🚨 Not propagating AWS credentials to container as PROPAGATE_AWS_AUTH_TOKENS is not set to true"
158180
fi
159181

160182
# If requested, propagate a set of env vars as listed in a given env var to the

0 commit comments

Comments
 (0)