Skip to content

Commit 594f273

Browse files
debug
1 parent 2f08f0d commit 594f273

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

codebuild/py37/decrypt_masterkey_with_js.yml

+7-7
Original file line numberDiff line numberDiff line change
@@ -26,13 +26,13 @@ phases:
2626
pre_build:
2727
commands:
2828
# Assume Role to access non-prod resources
29-
- TMP_ROLE=$(aws sts assume-role --role-arn "arn:aws:iam::370957321024:role/GitHub-CI-Public-ESDK-Python-Role-us-west-2" --role-session-name "CB-TestVectorResources")
30-
- export TMP_ROLE
31-
- export AWS_ACCESS_KEY_ID=$(echo "${TMP_ROLE}" | jq -r '.Credentials.AccessKeyId')
32-
- export AWS_SECRET_ACCESS_KEY=$(echo "${TMP_ROLE}" | jq -r '.Credentials.SecretAccessKey')
33-
- export AWS_SESSION_TOKEN=$(echo "${TMP_ROLE}" | jq -r '.Credentials.SessionToken')
34-
- aws sts get-caller-identity
35-
- cd $CODEBUILD_SRC_DIR
29+
# - TMP_ROLE=$(aws sts assume-role --role-arn "arn:aws:iam::370957321024:role/GitHub-CI-Public-ESDK-Python-Role-us-west-2" --role-session-name "CB-TestVectorResources")
30+
# - export TMP_ROLE
31+
# - export AWS_ACCESS_KEY_ID=$(echo "${TMP_ROLE}" | jq -r '.Credentials.AccessKeyId')
32+
# - export AWS_SECRET_ACCESS_KEY=$(echo "${TMP_ROLE}" | jq -r '.Credentials.SecretAccessKey')
33+
# - export AWS_SESSION_TOKEN=$(echo "${TMP_ROLE}" | jq -r '.Credentials.SessionToken')
34+
# - aws sts get-caller-identity
35+
# - cd $CODEBUILD_SRC_DIR
3636

3737
# Download generated vectors
3838
# TODO rewrite URL

0 commit comments

Comments
 (0)