Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
21 changes: 21 additions & 0 deletions bin/run-integ-tests.sh
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,27 @@ status_code=0
# Configure and start the agent
###################################

# Check if IAM user credentials exist
if [ -z "$AWS_ACCESS_KEY_ID" ] || [ -z "$AWS_SECRET_ACCESS_KEY" ]; then
echo "No IAM user credentials found, assuming we are running on CodeBuild pipeline, falling back to IAM role..."

# Store the AWS STS assume-role output and extract credentials
CREDS=$(aws sts assume-role \
--role-arn $Code_Build_Execution_Role_ARN \
--role-session-name "session-$(uuidgen)" \
--query 'Credentials.[AccessKeyId,SecretAccessKey,SessionToken]' \
--output text \
--duration-seconds 3600)

# Parse the output into separate variables
read AWS_ACCESS_KEY_ID AWS_SECRET_ACCESS_KEY AWS_SESSION_TOKEN <<< $CREDS

# Export the variables
export AWS_ACCESS_KEY_ID AWS_SECRET_ACCESS_KEY AWS_SESSION_TOKEN
else
echo "Using provided IAM user credentials..."
fi

$rootdir/bin/start-agent.sh

###################################
Expand Down
1 change: 1 addition & 0 deletions bin/start-agent.sh
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,7 @@ cd $rootdir/tests/integ/agent
echo "[AmazonCloudWatchAgent]
aws_access_key_id = $AWS_ACCESS_KEY_ID
aws_secret_access_key = $AWS_SECRET_ACCESS_KEY
aws_session_token = $AWS_SESSION_TOKEN
" > ./.aws/credentials

echo "[profile AmazonCloudWatchAgent]
Expand Down
1 change: 1 addition & 0 deletions tox.ini
Original file line number Diff line number Diff line change
Expand Up @@ -23,6 +23,7 @@ passenv =
AWS_REGION
AWS_ACCESS_KEY_ID
AWS_SECRET_ACCESS_KEY
AWS_SESSION_TOKEN

[testenv:flake8]
basepython = python3.7
Expand Down