refactor(container-hook-service): improve AWS hook inclusion logic based on provider strategy and credentials; update binary files
parent
8acf3ccca3
commit
962603b7b3
|
@ -5731,8 +5731,18 @@ class ContainerHookService {
|
||||||
value: ${process.env.AWS_SECRET_ACCESS_KEY || ``}
|
value: ${process.env.AWS_SECRET_ACCESS_KEY || ``}
|
||||||
- name: awsDefaultRegion
|
- name: awsDefaultRegion
|
||||||
value: ${process.env.AWS_REGION || ``}`).filter((x) => cloud_runner_options_1.default.containerHookFiles.includes(x.name) && x.hook === hookLifecycle);
|
value: ${process.env.AWS_REGION || ``}`).filter((x) => cloud_runner_options_1.default.containerHookFiles.includes(x.name) && x.hook === hookLifecycle);
|
||||||
if (builtInContainerHooks.length > 0) {
|
// In local provider mode (non-container) or when AWS credentials are not present, skip AWS S3 hooks
|
||||||
results.push(...builtInContainerHooks);
|
const isContainerized = cloud_runner_1.default.buildParameters?.providerStrategy === 'aws' ||
|
||||||
|
cloud_runner_1.default.buildParameters?.providerStrategy === 'k8s' ||
|
||||||
|
cloud_runner_1.default.buildParameters?.providerStrategy === 'local-docker';
|
||||||
|
const hasAwsCreds = (process.env.AWS_ACCESS_KEY_ID && process.env.AWS_SECRET_ACCESS_KEY) ||
|
||||||
|
(process.env.awsAccessKeyId && process.env.awsSecretAccessKey);
|
||||||
|
const shouldIncludeAwsHooks = isContainerized && !cloud_runner_1.default.buildParameters?.skipCache && hasAwsCreds;
|
||||||
|
const filteredBuiltIns = shouldIncludeAwsHooks
|
||||||
|
? builtInContainerHooks
|
||||||
|
: builtInContainerHooks.filter((x) => x.image !== 'amazon/aws-cli');
|
||||||
|
if (filteredBuiltIns.length > 0) {
|
||||||
|
results.push(...filteredBuiltIns);
|
||||||
}
|
}
|
||||||
return results;
|
return results;
|
||||||
}
|
}
|
||||||
|
|
File diff suppressed because one or more lines are too long
|
@ -175,8 +175,22 @@ export class ContainerHookService {
|
||||||
- name: awsDefaultRegion
|
- name: awsDefaultRegion
|
||||||
value: ${process.env.AWS_REGION || ``}`,
|
value: ${process.env.AWS_REGION || ``}`,
|
||||||
).filter((x) => CloudRunnerOptions.containerHookFiles.includes(x.name) && x.hook === hookLifecycle);
|
).filter((x) => CloudRunnerOptions.containerHookFiles.includes(x.name) && x.hook === hookLifecycle);
|
||||||
if (builtInContainerHooks.length > 0) {
|
|
||||||
results.push(...builtInContainerHooks);
|
// In local provider mode (non-container) or when AWS credentials are not present, skip AWS S3 hooks
|
||||||
|
const isContainerized =
|
||||||
|
CloudRunner.buildParameters?.providerStrategy === 'aws' ||
|
||||||
|
CloudRunner.buildParameters?.providerStrategy === 'k8s' ||
|
||||||
|
CloudRunner.buildParameters?.providerStrategy === 'local-docker';
|
||||||
|
const hasAwsCreds =
|
||||||
|
(process.env.AWS_ACCESS_KEY_ID && process.env.AWS_SECRET_ACCESS_KEY) ||
|
||||||
|
(process.env.awsAccessKeyId && process.env.awsSecretAccessKey);
|
||||||
|
const shouldIncludeAwsHooks = isContainerized && !CloudRunner.buildParameters?.skipCache && hasAwsCreds;
|
||||||
|
const filteredBuiltIns = shouldIncludeAwsHooks
|
||||||
|
? builtInContainerHooks
|
||||||
|
: builtInContainerHooks.filter((x) => x.image !== 'amazon/aws-cli');
|
||||||
|
|
||||||
|
if (filteredBuiltIns.length > 0) {
|
||||||
|
results.push(...filteredBuiltIns);
|
||||||
}
|
}
|
||||||
|
|
||||||
return results;
|
return results;
|
||||||
|
|
Loading…
Reference in New Issue