56
56
python -c "from urllib.request import urlretrieve; urlretrieve('${{ env.BUILDER_HOST }}/${{ env.BUILDER_SOURCE }}/${{ env.BUILDER_VERSION }}/builder.pyz?run=${{ env.RUN }}', 'builder.pyz')"
57
57
python builder.pyz build -p ${{ env.PACKAGE_NAME }}
58
58
- name : configure AWS credentials (PubSub)
59
- uses : aws-actions/configure-aws-credentials@v1
59
+ uses : aws-actions/configure-aws-credentials@v2
60
60
with :
61
61
role-to-assume : ${{ env.CI_PUBSUB_ROLE }}
62
62
aws-region : ${{ env.AWS_DEFAULT_REGION }}
@@ -67,15 +67,15 @@ jobs:
67
67
run : |
68
68
python ${{ env.CI_UTILS_FOLDER }}/run_sample_ci.py --file ${{ env.CI_SAMPLES_CFG_FOLDER }}/ci_run_windows_cert_connect_cfg.json
69
69
- name : configure AWS credentials (MQTT5 samples)
70
- uses : aws-actions/configure-aws-credentials@v1
70
+ uses : aws-actions/configure-aws-credentials@v2
71
71
with :
72
72
role-to-assume : ${{ env.CI_MQTT5_ROLE }}
73
73
aws-region : ${{ env.AWS_DEFAULT_REGION }}
74
74
- name : run MQTT5 PubSub sample
75
75
run : |
76
76
python ${{ env.CI_UTILS_FOLDER }}/run_sample_ci.py --file ${{ env.CI_SAMPLES_CFG_FOLDER }}/ci_run_mqtt5_pubsub_cfg.json
77
77
- name : configure AWS credentials (Device Advisor)
78
- uses : aws-actions/configure-aws-credentials@v1
78
+ uses : aws-actions/configure-aws-credentials@v2
79
79
with :
80
80
role-to-assume : ${{ env.CI_DEVICE_ADVISOR }}
81
81
aws-region : ${{ env.AWS_DEFAULT_REGION }}
@@ -106,7 +106,7 @@ jobs:
106
106
run : |
107
107
python3 -m pip install boto3
108
108
- name : configure AWS credentials (PubSub)
109
- uses : aws-actions/configure-aws-credentials@v1
109
+ uses : aws-actions/configure-aws-credentials@v2
110
110
with :
111
111
role-to-assume : ${{ env.CI_PUBSUB_ROLE }}
112
112
aws-region : ${{ env.AWS_DEFAULT_REGION }}
@@ -121,15 +121,15 @@ jobs:
121
121
openssl pkcs12 -export -in /tmp/certificate.pem -inkey /tmp/privatekey.pem -out ./pkcs12-key.p12 -name PubSub_Thing_Alias -password pass:$pkcs12_password
122
122
python3 ${{ env.CI_UTILS_FOLDER }}/run_sample_ci.py --file ${{ env.CI_SAMPLES_CFG_FOLDER }}/ci_run_pkcs12_connect_cfg.json
123
123
- name : configure AWS credentials (MQTT5 samples)
124
- uses : aws-actions/configure-aws-credentials@v1
124
+ uses : aws-actions/configure-aws-credentials@v2
125
125
with :
126
126
role-to-assume : ${{ env.CI_MQTT5_ROLE }}
127
127
aws-region : ${{ env.AWS_DEFAULT_REGION }}
128
128
- name : run MQTT5 PubSub sample
129
129
run : |
130
130
python3 ${{ env.CI_UTILS_FOLDER }}/run_sample_ci.py --file ${{ env.CI_SAMPLES_CFG_FOLDER }}/ci_run_mqtt5_pubsub_cfg.json
131
131
- name : configure AWS credentials (Device Advisor)
132
- uses : aws-actions/configure-aws-credentials@v1
132
+ uses : aws-actions/configure-aws-credentials@v2
133
133
with :
134
134
role-to-assume : ${{ env.CI_DEVICE_ADVISOR }}
135
135
aws-region : ${{ env.AWS_DEFAULT_REGION }}
@@ -160,23 +160,23 @@ jobs:
160
160
run : |
161
161
python3 -m pip install boto3
162
162
- name : configure AWS credentials (PubSub)
163
- uses : aws-actions/configure-aws-credentials@v1
163
+ uses : aws-actions/configure-aws-credentials@v2
164
164
with :
165
165
role-to-assume : ${{ env.CI_PUBSUB_ROLE }}
166
166
aws-region : ${{ env.AWS_DEFAULT_REGION }}
167
167
- name : run PubSub sample
168
168
run : |
169
169
python3 ${{ env.CI_UTILS_FOLDER }}/run_sample_ci.py --file ${{ env.CI_SAMPLES_CFG_FOLDER }}/ci_run_pubsub_cfg.json
170
170
- name : configure AWS credentials (MQTT5 samples)
171
- uses : aws-actions/configure-aws-credentials@v1
171
+ uses : aws-actions/configure-aws-credentials@v2
172
172
with :
173
173
role-to-assume : ${{ env.CI_MQTT5_ROLE }}
174
174
aws-region : ${{ env.AWS_DEFAULT_REGION }}
175
175
- name : run MQTT5 PubSub sample
176
176
run : |
177
177
python3 ${{ env.CI_UTILS_FOLDER }}/run_sample_ci.py --file ${{ env.CI_SAMPLES_CFG_FOLDER }}/ci_run_mqtt5_pubsub_cfg.json
178
178
- name : configure AWS credentials (Device Advisor)
179
- uses : aws-actions/configure-aws-credentials@v1
179
+ uses : aws-actions/configure-aws-credentials@v2
180
180
with :
181
181
role-to-assume : ${{ env.CI_DEVICE_ADVISOR }}
182
182
aws-region : ${{ env.AWS_DEFAULT_REGION }}
@@ -277,7 +277,7 @@ jobs:
277
277
python3 ./test_cases/test_jobs_execution.py --config-file test_cases/mqtt5_jobs_cfg.json
278
278
279
279
- name : configure AWS credentials (Connect and PubSub)
280
- uses : aws-actions/configure-aws-credentials@v1
280
+ uses : aws-actions/configure-aws-credentials@v2
281
281
with :
282
282
role-to-assume : ${{ env.CI_PUBSUB_ROLE }}
283
283
aws-region : ${{ env.AWS_DEFAULT_REGION }}
@@ -297,23 +297,23 @@ jobs:
297
297
echo "directories.tokendir = /tmp/tokens" > /tmp/softhsm2.conf
298
298
python3 ${{ env.CI_UTILS_FOLDER }}/run_sample_ci.py --file ${{ env.CI_SAMPLES_CFG_FOLDER }}/ci_run_pkcs11_connect_cfg.json
299
299
- name : configure AWS credentials (Cognito)
300
- uses : aws-actions/configure-aws-credentials@v1
300
+ uses : aws-actions/configure-aws-credentials@v2
301
301
with :
302
302
role-to-assume : ${{ env.CI_COGNITO_ROLE }}
303
303
aws-region : ${{ env.AWS_DEFAULT_REGION }}
304
304
- name : run Cognito Connect sample
305
305
run : |
306
306
python3 ${{ env.CI_UTILS_FOLDER }}/run_sample_ci.py --file ${{ env.CI_SAMPLES_CFG_FOLDER }}/ci_run_cognito_connect_cfg.json
307
307
- name : configure AWS credentials (X509)
308
- uses : aws-actions/configure-aws-credentials@v1
308
+ uses : aws-actions/configure-aws-credentials@v2
309
309
with :
310
310
role-to-assume : ${{ env.CI_X509_ROLE }}
311
311
aws-region : ${{ env.AWS_DEFAULT_REGION }}
312
312
- name : run X509 sample
313
313
run : |
314
314
python3 ${{ env.CI_UTILS_FOLDER }}/run_sample_ci.py --file ${{ env.CI_SAMPLES_CFG_FOLDER }}/ci_run_x509_connect_cfg.json
315
315
- name : configure AWS credentials (MQTT5 samples)
316
- uses : aws-actions/configure-aws-credentials@v1
316
+ uses : aws-actions/configure-aws-credentials@v2
317
317
with :
318
318
role-to-assume : ${{ env.CI_MQTT5_ROLE }}
319
319
aws-region : ${{ env.AWS_DEFAULT_REGION }}
@@ -336,15 +336,15 @@ jobs:
336
336
run : |
337
337
python3 ${{ env.CI_UTILS_FOLDER }}/run_sample_ci.py --file ${{ env.CI_SAMPLES_CFG_FOLDER }}/ci_run_mqtt5_shared_subscription_cfg.json
338
338
- name : configure AWS credentials (Custom Authorizer)
339
- uses : aws-actions/configure-aws-credentials@v1
339
+ uses : aws-actions/configure-aws-credentials@v2
340
340
with :
341
341
role-to-assume : ${{ env.CI_CUSTOM_AUTHORIZER_ROLE }}
342
342
aws-region : ${{ env.AWS_DEFAULT_REGION }}
343
343
- name : run CustomAuthorizerConnect sample
344
344
run : |
345
345
python3 ${{ env.CI_UTILS_FOLDER }}/run_sample_ci.py --file ${{ env.CI_SAMPLES_CFG_FOLDER }}/ci_run_custom_authorizer_connect_cfg.json
346
346
- name : configure AWS credentials (Shadow)
347
- uses : aws-actions/configure-aws-credentials@v1
347
+ uses : aws-actions/configure-aws-credentials@v2
348
348
with :
349
349
role-to-assume : ${{ env.CI_SHADOW_ROLE }}
350
350
aws-region : ${{ env.AWS_DEFAULT_REGION }}
@@ -355,7 +355,7 @@ jobs:
355
355
run : |
356
356
python3 ${{ env.CI_UTILS_FOLDER }}/run_sample_ci.py --file ${{ env.CI_SAMPLES_CFG_FOLDER }}/ci_run_mqtt5_shadow_cfg.json
357
357
- name : configure AWS credentials (Jobs)
358
- uses : aws-actions/configure-aws-credentials@v1
358
+ uses : aws-actions/configure-aws-credentials@v2
359
359
with :
360
360
role-to-assume : ${{ env.CI_JOBS_ROLE }}
361
361
aws-region : ${{ env.AWS_DEFAULT_REGION }}
@@ -366,7 +366,7 @@ jobs:
366
366
run : |
367
367
python3 ${{ env.CI_UTILS_FOLDER }}/run_sample_ci.py --file ${{ env.CI_SAMPLES_CFG_FOLDER }}/ci_run_mqtt5_jobs_cfg.json
368
368
- name : configure AWS credentials (Fleet provisioning)
369
- uses : aws-actions/configure-aws-credentials@v1
369
+ uses : aws-actions/configure-aws-credentials@v2
370
370
with :
371
371
role-to-assume : ${{ env.CI_FLEET_PROVISIONING_ROLE }}
372
372
aws-region : ${{ env.AWS_DEFAULT_REGION }}
@@ -383,7 +383,7 @@ jobs:
383
383
python3 ${{ env.CI_UTILS_FOLDER }}/run_sample_ci.py --file ${{ env.CI_SAMPLES_CFG_FOLDER }}/ci_run_mqtt5_fleet_provisioning_cfg.json --input_uuid ${Sample_UUID}
384
384
python3 ${{ env.CI_UTILS_FOLDER }}/delete_iot_thing_ci.py --thing_name "Fleet_Thing_${Sample_UUID}" --region "us-east-1"
385
385
- name : configure AWS credentials (Greengrass)
386
- uses : aws-actions/configure-aws-credentials@v1
386
+ uses : aws-actions/configure-aws-credentials@v2
387
387
with :
388
388
role-to-assume : ${{ env.CI_GREENGRASS_ROLE }}
389
389
aws-region : ${{ env.AWS_DEFAULT_REGION }}
0 commit comments