diff --git a/packages/eas-cli/src/commands/env/pull.ts b/packages/eas-cli/src/commands/env/pull.ts index cd9cf8f3bc..8097b5e0e2 100644 --- a/packages/eas-cli/src/commands/env/pull.ts +++ b/packages/eas-cli/src/commands/env/pull.ts @@ -112,22 +112,22 @@ export default class EnvironmentVariablePull extends EasCommand { await fs.writeFile(targetPath, filePrefix + envFileContentLines.join('\n')); + Log.log( + `Pulled environment variables from ${environment.toLowerCase()} environment to ${targetPath}.` + ); + if (overridenSecretVariables.length > 0) { Log.addNewLineIfNone(); Log.log(`Reused local values for following secrets: ${overridenSecretVariables.join('\n')}`); } if (skippedSecretVariables.length > 0) { + Log.addNewLineIfNone(); Log.warn( - `The eas env:pull command tried to pull environment variables with "secret" visibility. The variables with "secret" visibility are not available for reading, therefore thet were marked as "*****" in the generated .env file. Provide values for these manually in ${targetPath} if needed. Skipped variables: ${skippedSecretVariables.join( + `The following variables have the encrypted visibility and can not be read outside of EAS servers. Set their values manually in .env.local: ${skippedSecretVariables.join( '\n' )}` ); - Log.warn(); } - - Log.log( - `Pulled environment variables from ${environment.toLowerCase()} environment to ${targetPath}.` - ); } }