diff --git a/samcli/lib/pipeline/bootstrap/environment.py b/samcli/lib/pipeline/bootstrap/environment.py index e5f364dded..eac732fee0 100644 --- a/samcli/lib/pipeline/bootstrap/environment.py +++ b/samcli/lib/pipeline/bootstrap/environment.py @@ -297,8 +297,8 @@ def print_resources_summary(self) -> None: "make sure to periodically rotate it:", ) ) - click.secho(self.color.green(f"\tACCESS_KEY_ID: {self.pipeline_user.access_key_id}")) - click.secho(self.color.green(f"\tSECRET_ACCESS_KEY: {self.pipeline_user.secret_access_key}")) + click.secho(self.color.green(f"\tAWS_ACCESS_KEY_ID: {self.pipeline_user.access_key_id}")) + click.secho(self.color.green(f"\tAWS_SECRET_ACCESS_KEY: {self.pipeline_user.secret_access_key}")) def _get_stack_name(self) -> str: sanitized_environment_name: str = re.sub("[^0-9a-zA-Z]+", "-", self.name) diff --git a/tests/unit/lib/pipeline/bootstrap/test_environment.py b/tests/unit/lib/pipeline/bootstrap/test_environment.py index 88c4361382..3915ff0860 100644 --- a/tests/unit/lib/pipeline/bootstrap/test_environment.py +++ b/tests/unit/lib/pipeline/bootstrap/test_environment.py @@ -351,14 +351,14 @@ def test_print_resources_summary_prints_the_credentials_of_the_pipeline_user_iff name=ANY_ENVIRONMENT_NAME, pipeline_user_arn=ANY_PIPELINE_USER_ARN ) environment_with_provided_pipeline_user.print_resources_summary() - self.assert_summary_does_not_have_a_message_like("ACCESS_KEY_ID", click_mock.secho) - self.assert_summary_does_not_have_a_message_like("SECRET_ACCESS_KEY", click_mock.secho) + self.assert_summary_does_not_have_a_message_like("AWS_ACCESS_KEY_ID", click_mock.secho) + self.assert_summary_does_not_have_a_message_like("AWS_SECRET_ACCESS_KEY", click_mock.secho) click_mock.secho.reset_mock() environment_without_provided_pipeline_user: Environment = Environment(name=ANY_ENVIRONMENT_NAME) environment_without_provided_pipeline_user.print_resources_summary() - self.assert_summary_has_a_message_like("ACCESS_KEY_ID", click_mock.secho) - self.assert_summary_has_a_message_like("SECRET_ACCESS_KEY", click_mock.secho) + self.assert_summary_has_a_message_like("AWS_ACCESS_KEY_ID", click_mock.secho) + self.assert_summary_has_a_message_like("AWS_SECRET_ACCESS_KEY", click_mock.secho) def assert_summary_has_a_message_like(self, msg, click_secho_mock): self.assertTrue(