sigs.k8s.io/cluster-api-provider-aws@v1.5.5/hack/e2e-aws-resources-list.sh (about) 1 #!/bin/bash 2 3 # Copyright 2019 The Kubernetes Authors. 4 # 5 # Licensed under the Apache License, Version 2.0 (the "License"); 6 # you may not use this file except in compliance with the License. 7 # You may obtain a copy of the License at 8 # 9 # http://www.apache.org/licenses/LICENSE-2.0 10 # 11 # Unless required by applicable law or agreed to in writing, software 12 # distributed under the License is distributed on an "AS IS" BASIS, 13 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 14 # See the License for the specific language governing permissions and 15 # limitations under the License. 16 17 set -o errexit 18 set -o nounset 19 set -o pipefail 20 21 ################################################################################ 22 # usage: e2e-aws-resources-list.sh [FLAGS] 23 # This program is a wrapper for running the aws-resources-list command with 24 # a check that prevents disallowed AWS keys from being used. 25 # 26 # FLAGS 27 # To see a full list of flags supported by this program, run 28 # "aws-resources-list -h" 29 ################################################################################ 30 31 REPO_ROOT=$(dirname "${BASH_SOURCE[0]}")/.. 32 cd "${REPO_ROOT}" || exit 1 33 34 # Require the aws-resources-list command. 35 command -v aws-resources-list >/dev/null 2>&1 || \ 36 { echo "aws-resources-list not found" 1>&2; exit 1; } 37 38 # Prevent a disallowed AWS key from being used. 39 if grep -iqF "$(echo "${AWS_ACCESS_KEY_ID-}" | \ 40 { md5sum 2>/dev/null || md5; } | \ 41 awk '{print $1}')" hack/e2e-aws-disallowed.txt; then 42 echo "The provided AWS key is not allowed" 1>&2 43 exit 1 44 fi 45 46 exec aws-resources-list "${@-}"