Skip to content

Commit 0a9e6eb

Browse files
authored
feat: 🔊 add verbose logging when loading Vault secrets as input (#92)
1 parent 17c168f commit 0a9e6eb

File tree

1 file changed

+13
-0
lines changed

1 file changed

+13
-0
lines changed

pkg/execute.go

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -193,11 +193,24 @@ func (e *Executor) execute(repo Repo, vaultClient *vault.Client, dryRun bool) er
193193

194194
if repo.TfVariables.Inputs.Path != "" {
195195
// extract kv pairs from vault for inputs and write them to a file for terraform usage
196+
log.Printf("Loading input secrets from Vault at path: %s", repo.TfVariables.Inputs.Path)
197+
if repo.TfVariables.Inputs.Version != 0 {
198+
log.Printf("Using specific version: %d", repo.TfVariables.Inputs.Version)
199+
} else {
200+
log.Printf("Using latest version")
201+
}
202+
196203
inputSecret, err := vaultutil.GetVaultTfSecret(vaultClient, repo.TfVariables.Inputs, e.mountVersions)
197204
if err != nil {
198205
return err
199206
}
200207

208+
keys := make([]string, 0, len(inputSecret))
209+
for k := range inputSecret {
210+
keys = append(keys, k)
211+
}
212+
log.Printf("Loaded input secret keys: %v", keys)
213+
201214
err = e.generateInputVarsFile(inputSecret, repo)
202215
if err != nil {
203216
return err

0 commit comments

Comments
 (0)