|
116 | 116 | if [[ "$(plugin_read_config PROPAGATE_AWS_AUTH_TOKENS "false")" =~ ^(true|on|1)$ ]] ; then |
117 | 117 | if [[ -n "${AWS_ACCESS_KEY_ID:-}" ]] ; then |
118 | 118 | run_params+=( --env "AWS_ACCESS_KEY_ID" ) |
| 119 | + else |
| 120 | + echo "🚨 AWS_ACCESS_KEY_ID is not set, not propagating" |
119 | 121 | fi |
120 | 122 | if [[ -n "${AWS_SECRET_ACCESS_KEY:-}" ]] ; then |
121 | 123 | run_params+=( --env "AWS_SECRET_ACCESS_KEY" ) |
| 124 | + else |
| 125 | + echo "🚨 AWS_SECRET_ACCESS_KEY is not set, not propagating" |
122 | 126 | fi |
123 | 127 | if [[ -n "${AWS_SESSION_TOKEN:-}" ]] ; then |
124 | 128 | run_params+=( --env "AWS_SESSION_TOKEN" ) |
| 129 | + else |
| 130 | + echo "🚨 AWS_SESSION_TOKEN is not set, not propagating" |
125 | 131 | fi |
126 | 132 | if [[ -n "${AWS_REGION:-}" ]] ; then |
127 | 133 | run_params+=( --env "AWS_REGION" ) |
| 134 | + else |
| 135 | + echo "🚨 AWS_REGION is not set, not propagating" |
128 | 136 | fi |
129 | 137 | if [[ -n "${AWS_DEFAULT_REGION:-}" ]] ; then |
130 | 138 | run_params+=( --env "AWS_DEFAULT_REGION" ) |
| 139 | + else |
| 140 | + echo "🚨 AWS_DEFAULT_REGION is not set, not propagating" |
131 | 141 | fi |
132 | 142 | if [[ -n "${AWS_ROLE_ARN:-}" ]] ; then |
133 | 143 | run_params+=( --env "AWS_ROLE_ARN" ) |
| 144 | + else |
| 145 | + echo "🚨 AWS_ROLE_ARN is not set, not propagating" |
134 | 146 | fi |
135 | 147 | if [[ -n "${AWS_STS_REGIONAL_ENDPOINTS:-}" ]] ; then |
136 | 148 | run_params+=( --env "AWS_STS_REGIONAL_ENDPOINTS" ) |
| 149 | + else |
| 150 | + echo "🚨 AWS_STS_REGIONAL_ENDPOINTS is not set, not propagating" |
137 | 151 | fi |
138 | 152 | # Pass ECS variables when the agent is running in ECS |
139 | 153 | # https://docs.aws.amazon.com/sdkref/latest/guide/feature-container-credentials.html |
140 | 154 | if [[ -n "${AWS_CONTAINER_CREDENTIALS_FULL_URI:-}" ]] ; then |
141 | 155 | run_params+=( --env "AWS_CONTAINER_CREDENTIALS_FULL_URI" ) |
| 156 | + else |
| 157 | + echo "🚨 AWS_CONTAINER_CREDENTIALS_FULL_URI is not set, not propagating" |
142 | 158 | fi |
143 | 159 | if [[ -n "${AWS_CONTAINER_CREDENTIALS_RELATIVE_URI:-}" ]] ; then |
144 | 160 | run_params+=( --env "AWS_CONTAINER_CREDENTIALS_RELATIVE_URI" ) |
| 161 | + else |
| 162 | + echo "🚨 AWS_CONTAINER_CREDENTIALS_RELATIVE_URI is not set, not propagating" |
145 | 163 | fi |
146 | 164 | if [[ -n "${AWS_CONTAINER_AUTHORIZATION_TOKEN:-}" ]] ; then |
147 | 165 | run_params+=( --env "AWS_CONTAINER_AUTHORIZATION_TOKEN" ) |
| 166 | + else |
| 167 | + echo "🚨 AWS_CONTAINER_AUTHORIZATION_TOKEN is not set, not propagating" |
148 | 168 | fi |
149 | 169 | # Pass EKS variables when the agent is running in EKS |
150 | 170 | # https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts-minimum-sdk.html |
151 | 171 | if [[ -n "${AWS_WEB_IDENTITY_TOKEN_FILE:-}" ]] ; then |
152 | 172 | run_params+=( --env "AWS_WEB_IDENTITY_TOKEN_FILE" ) |
153 | 173 | # Add the token file as a volume |
154 | 174 | run_params+=( --volume "${AWS_WEB_IDENTITY_TOKEN_FILE}:${AWS_WEB_IDENTITY_TOKEN_FILE}" ) |
| 175 | + else |
| 176 | + echo "🚨 AWS_WEB_IDENTITY_TOKEN_FILE is not set, not propagating" |
155 | 177 | fi |
156 | 178 | else |
157 | | - echo -n "🚨 Not propagating aws auth tokens" |
| 179 | + echo "🚨 Not propagating AWS credentials to container as PROPAGATE_AWS_AUTH_TOKENS is not set to true" |
158 | 180 | fi |
159 | 181 |
|
160 | 182 | # If requested, propagate a set of env vars as listed in a given env var to the |
|
0 commit comments