File tree 1 file changed +7
-7
lines changed
1 file changed +7
-7
lines changed Original file line number Diff line number Diff line change @@ -26,13 +26,13 @@ phases:
26
26
pre_build :
27
27
commands :
28
28
# Assume Role to access non-prod resources
29
- - TMP_ROLE=$(aws sts assume-role --role-arn "arn:aws:iam::370957321024:role/GitHub-CI-Public-ESDK-Python-Role-us-west-2" --role-session-name "CB-TestVectorResources")
30
- - export TMP_ROLE
31
- - export AWS_ACCESS_KEY_ID=$(echo "${TMP_ROLE}" | jq -r '.Credentials.AccessKeyId')
32
- - export AWS_SECRET_ACCESS_KEY=$(echo "${TMP_ROLE}" | jq -r '.Credentials.SecretAccessKey')
33
- - export AWS_SESSION_TOKEN=$(echo "${TMP_ROLE}" | jq -r '.Credentials.SessionToken')
34
- - aws sts get-caller-identity
35
- - cd $CODEBUILD_SRC_DIR
29
+ # - TMP_ROLE=$(aws sts assume-role --role-arn "arn:aws:iam::370957321024:role/GitHub-CI-Public-ESDK-Python-Role-us-west-2" --role-session-name "CB-TestVectorResources")
30
+ # - export TMP_ROLE
31
+ # - export AWS_ACCESS_KEY_ID=$(echo "${TMP_ROLE}" | jq -r '.Credentials.AccessKeyId')
32
+ # - export AWS_SECRET_ACCESS_KEY=$(echo "${TMP_ROLE}" | jq -r '.Credentials.SecretAccessKey')
33
+ # - export AWS_SESSION_TOKEN=$(echo "${TMP_ROLE}" | jq -r '.Credentials.SessionToken')
34
+ # - aws sts get-caller-identity
35
+ # - cd $CODEBUILD_SRC_DIR
36
36
37
37
# Download generated vectors
38
38
# TODO rewrite URL
You can’t perform that action at this time.
0 commit comments