sigs.k8s.io/cluster-api-provider-aws@v1.5.5/hack/e2e-aws-janitor.sh (about) 1 #!/bin/bash 2 3 # Copyright 2019 The Kubernetes Authors. 4 # 5 # Licensed under the Apache License, Version 2.0 (the "License"); 6 # you may not use this file except in compliance with the License. 7 # You may obtain a copy of the License at 8 # 9 # http://www.apache.org/licenses/LICENSE-2.0 10 # 11 # Unless required by applicable law or agreed to in writing, software 12 # distributed under the License is distributed on an "AS IS" BASIS, 13 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 14 # See the License for the specific language governing permissions and 15 # limitations under the License. 16 17 ################################################################################ 18 # usage: e2e-aws-janitor.sh [FLAGS] 19 # This program is a wrapper for running the aws-janitor command with a check 20 # that prevents disallowed AWS keys from being used. 21 # 22 # FLAGS 23 # To see a full list of flags supported by this program, run "aws-janitor -h" 24 ################################################################################ 25 26 set -o errexit 27 set -o nounset 28 set -o pipefail 29 30 REPO_ROOT=$(dirname "${BASH_SOURCE[0]}")/.. 31 cd "${REPO_ROOT}" || exit 1 32 33 # Require the aws-janitor command. 34 command -v aws-janitor >/dev/null 2>&1 || \ 35 { echo "aws-janitor not found" 1>&2; exit 1; } 36 37 # Prevent a disallowed AWS key from being used. 38 if grep -iqF "$(echo "${AWS_ACCESS_KEY_ID-}" | \ 39 { md5sum 2>/dev/null || md5; } | \ 40 awk '{print $1}')" hack/e2e-aws-disallowed.txt; then 41 echo "The provided AWS key is not allowed" 1>&2 42 exit 1 43 fi 44 45 exec aws-janitor -all "${@-}"