sigs.k8s.io/cluster-api-provider-aws@v1.5.5/hack/e2e-aws-janitor.sh (about)

     1  #!/bin/bash
     2  
     3  # Copyright 2019 The Kubernetes Authors.
     4  #
     5  # Licensed under the Apache License, Version 2.0 (the "License");
     6  # you may not use this file except in compliance with the License.
     7  # You may obtain a copy of the License at
     8  #
     9  #     http://www.apache.org/licenses/LICENSE-2.0
    10  #
    11  # Unless required by applicable law or agreed to in writing, software
    12  # distributed under the License is distributed on an "AS IS" BASIS,
    13  # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    14  # See the License for the specific language governing permissions and
    15  # limitations under the License.
    16  
    17  ################################################################################
    18  # usage: e2e-aws-janitor.sh [FLAGS]
    19  #  This program is a wrapper for running the aws-janitor command with a check
    20  #  that prevents disallowed AWS keys from being used.
    21  #
    22  # FLAGS
    23  #  To see a full list of flags supported by this program, run "aws-janitor -h"
    24  ################################################################################
    25  
    26  set -o errexit
    27  set -o nounset
    28  set -o pipefail
    29  
    30  REPO_ROOT=$(dirname "${BASH_SOURCE[0]}")/..
    31  cd "${REPO_ROOT}" || exit 1
    32  
    33  # Require the aws-janitor command.
    34  command -v aws-janitor >/dev/null 2>&1 || \
    35    { echo "aws-janitor not found" 1>&2; exit 1; }
    36  
    37  # Prevent a disallowed AWS key from being used.
    38  if grep -iqF "$(echo "${AWS_ACCESS_KEY_ID-}" | \
    39    { md5sum 2>/dev/null || md5; } | \
    40    awk '{print $1}')" hack/e2e-aws-disallowed.txt; then
    41    echo "The provided AWS key is not allowed" 1>&2
    42    exit 1
    43  fi
    44  
    45  exec aws-janitor -all "${@-}"