22
33# Start the atlantis server
44if [ " ${ATLANTIS_ENABLED} " == " true" ]; then
5- which atlantis > /dev/null
6- if [ $? -ne 0 ]; then
5+ if ! which atlantis > /dev/null; then
76 echo " Atlantis is not installed"
87 exit 1
98 fi
@@ -42,7 +41,7 @@ if [ "${ATLANTIS_ENABLED}" == "true" ]; then
4241 export ATLANTIS_CHAMBER_SERVICE=${ATLANTIS_CHAMBER_SERVICE:- atlantis}
4342
4443 # Export environment from chamber to shell
45- source <( chamber exec ${ATLANTIS_CHAMBER_SERVICE} -- sh -c " export -p" )
44+ source <( chamber exec " ${ATLANTIS_CHAMBER_SERVICE} " -- sh -c " export -p" )
4645
4746 if [ -n " ${ATLANTIS_IAM_ROLE_ARN} " ]; then
4847 # Map the Atlantis IAM Role ARN to the env we use everywhere in our root modules
@@ -55,11 +54,11 @@ if [ "${ATLANTIS_ENABLED}" == "true" ]; then
5554 export ATLANTIS_HOME=${ATLANTIS_HOME:-/ home/ atlantis}
5655
5756 # create atlantis user & group
58- (getent group ${ATLANTIS_GROUP} || addgroup ${ATLANTIS_GROUP} ) > /dev/null
59- (getent passwd ${ATLANTIS_USER} || adduser -h ${ATLANTIS_HOME} -S -G ${ATLANTIS_GROUP} ${ATLANTIS_USER} ) > /dev/null
57+ (getent group " ${ATLANTIS_GROUP} " || addgroup " ${ATLANTIS_GROUP} " ) > /dev/null
58+ (getent passwd " ${ATLANTIS_USER} " || adduser -h " ${ATLANTIS_HOME} " -S -G " ${ATLANTIS_GROUP} " " ${ATLANTIS_USER} " ) > /dev/null
6059
6160 # Provision terraform cache directory
62- install --directory ${TF_PLUGIN_CACHE_DIR} --owner ${ATLANTIS_USER} --group ${ATLANTIS_GROUP}
61+ install --directory " ${TF_PLUGIN_CACHE_DIR} " --owner " ${ATLANTIS_USER} " --group " ${ATLANTIS_GROUP} "
6362
6463 # Allow atlantis to use /dev/shm
6564 if [ -d /dev/shm ]; then
@@ -69,14 +68,14 @@ if [ "${ATLANTIS_ENABLED}" == "true" ]; then
6968
7069 # Add SSH key to agent, if one is configured so we can pull from private git repos
7170 if [ -n " ${ATLANTIS_SSH_PRIVATE_KEY} " ]; then
72- source <( gosu ${ATLANTIS_USER} ssh-agent -s)
73- ssh-add - <<< ${ATLANTIS_SSH_PRIVATE_KEY}
71+ source <( gosu " ${ATLANTIS_USER} " ssh-agent -s)
72+ ssh-add - <<< " ${ATLANTIS_SSH_PRIVATE_KEY}"
7473 # Sanitize environment
7574 unset ATLANTIS_SSH_PRIVATE_KEY
7675 fi
7776
7877 if [ -n " ${ATLANTIS_ALLOW_PRIVILEGED_PORTS} " ]; then
79- setcap " cap_net_bind_service=+ep" $( which atlantis)
78+ setcap " cap_net_bind_service=+ep" " $( which atlantis) "
8079 fi
8180
8281 # Do not export these as Terraform environment variables
@@ -92,18 +91,18 @@ if [ "${ATLANTIS_ENABLED}" == "true" ]; then
9291 # https://gist.github.com/Kovrinic/ea5e7123ab5c97d451804ea222ecd78a
9392
9493 # The URL "[email protected] :" is used by `git` (e.g. `git clone`) 95- gosu
${ATLANTIS_USER} git config --global url.
" https://github.com/" .insteadOf
" [email protected] :" 94+ gosu
" ${ATLANTIS_USER} " git config --global url.
" https://github.com/" .insteadOf
" [email protected] :" 9695 # The URL "ssh://[email protected] /" is used by Terraform (e.g. `terraform init --from-module=...`) 9796 # NOTE: we use `--add` to append the second URL to the config file
98- gosu
${ATLANTIS_USER} git config --global url.
" https://github.com/" .insteadOf
" ssh://[email protected] /" --add
97+ gosu
" ${ATLANTIS_USER} " git config --global url.
" https://github.com/" .insteadOf
" ssh://[email protected] /" --add
9998
10099 # https://git-scm.com/book/en/v2/Git-Tools-Credential-Storage
101100 # see rootfs/usr/local/bin/git-credential-github
102- gosu ${ATLANTIS_USER} git config --global credential.helper ' github'
101+ gosu " ${ATLANTIS_USER} " git config --global credential.helper ' github'
103102
104103 # Use a primitive init handler to catch signals and handle them properly
105104 # Use gosu to drop privileges
106105 # Use env to setup the shell environment for atlantis
107106 # Then lastly, start the atlantis server
108- exec dumb-init gosu ${ATLANTIS_USER} env BASH_ENV=/etc/direnv/bash atlantis server
107+ exec dumb-init gosu " ${ATLANTIS_USER} " env BASH_ENV=/etc/direnv/bash atlantis server
109108fi
0 commit comments