From e7034945fbdc0e79d3c57f6e299e5c90b0f11469 Mon Sep 17 00:00:00 2001 From: BenWhitehead Date: Wed, 10 Jun 2020 22:24:28 -0400 Subject: [PATCH] chore(nodejs_templates): add script logging to node_library populate-secrets.sh (#618) Co-authored-by: Benjamin E. Coe --- .../node_library/.kokoro/populate-secrets.sh | 12 ++++++++++++ 1 file changed, 12 insertions(+) diff --git a/synthtool/gcp/templates/node_library/.kokoro/populate-secrets.sh b/synthtool/gcp/templates/node_library/.kokoro/populate-secrets.sh index 85801f403..e6ce8200d 100755 --- a/synthtool/gcp/templates/node_library/.kokoro/populate-secrets.sh +++ b/synthtool/gcp/templates/node_library/.kokoro/populate-secrets.sh @@ -15,12 +15,19 @@ set -eo pipefail +function now { date +"%Y-%m-%d %H:%M:%S" | tr -d '\n' ;} +function msg { println "$*" >&2 ;} +function println { printf '%s\n' "$(now) $*" ;} + + # Populates requested secrets set in SECRET_MANAGER_KEYS from service account: # kokoro-trampoline@cloud-devrel-kokoro-resources.iam.gserviceaccount.com SECRET_LOCATION="${KOKORO_GFILE_DIR}/secret_manager" +msg "Creating folder on disk for secrets: ${SECRET_LOCATION}" mkdir -p ${SECRET_LOCATION} for key in $(echo ${SECRET_MANAGER_KEYS} | sed "s/,/ /g") do + msg "Retrieving secret ${key}" docker run --entrypoint=gcloud \ --volume=${KOKORO_GFILE_DIR}:${KOKORO_GFILE_DIR} \ gcr.io/google.com/cloudsdktool/cloud-sdk \ @@ -29,4 +36,9 @@ do --project cloud-devrel-kokoro-resources \ --secret $key > \ "$SECRET_LOCATION/$key" + if [[ $? == 0 ]]; then + msg "Secret written to ${SECRET_LOCATION}/${key}" + else + msg "Error retrieving secret ${key}" + fi done