@@ -187,18 +187,18 @@ jobs:
187
187
aws-region : ${{ env.AWS_DEFAULT_REGION }}
188
188
- name : run PubSub sample
189
189
run : |
190
- python ./utils/run_sample_ci .py --file ./.github/workflows/ci_run_pubsub_cfg.json
190
+ python ./utils/run_in_ci .py --file ./.github/workflows/ci_run_pubsub_cfg.json
191
191
- name : run Windows Certificate Connect sample
192
192
run : |
193
- python ./utils/run_sample_ci .py --file ./.github/workflows/ci_run_windows_cert_connect_cfg.json
193
+ python ./utils/run_in_ci .py --file ./.github/workflows/ci_run_windows_cert_connect_cfg.json
194
194
- name : configure AWS credentials (MQTT5)
195
195
uses : aws-actions/configure-aws-credentials@v2
196
196
with :
197
197
role-to-assume : ${{ env.CI_MQTT5_ROLE }}
198
198
aws-region : ${{ env.AWS_DEFAULT_REGION }}
199
199
- name : run MQTT5 PubSub sample
200
200
run : |
201
- python3 ./utils/run_sample_ci .py --file ./.github/workflows/ci_run_mqtt5_pubsub_cfg.json
201
+ python3 ./utils/run_in_ci .py --file ./.github/workflows/ci_run_mqtt5_pubsub_cfg.json
202
202
- name : configure AWS credentials (Device Advisor)
203
203
uses : aws-actions/configure-aws-credentials@v2
204
204
with :
@@ -259,22 +259,22 @@ jobs:
259
259
aws-region : ${{ env.AWS_DEFAULT_REGION }}
260
260
- name : run PubSub sample
261
261
run : |
262
- python3 ./utils/run_sample_ci .py --file ./.github/workflows/ci_run_pubsub_cfg.json
262
+ python3 ./utils/run_in_ci .py --file ./.github/workflows/ci_run_pubsub_cfg.json
263
263
- name : run PKCS12 Connect sample
264
264
run : |
265
265
cert=$(aws secretsmanager get-secret-value --region us-east-1 --secret-id "ci/PubSub/cert" --query "SecretString" | cut -f2 -d":" | cut -f2 -d\") && echo -e "$cert" > /tmp/certificate.pem
266
266
key=$(aws secretsmanager get-secret-value --region us-east-1 --secret-id "ci/PubSub/key" --query "SecretString" | cut -f2 -d":" | cut -f2 -d\") && echo -e "$key" > /tmp/privatekey.pem
267
267
pkcs12_password=$(aws secretsmanager get-secret-value --region us-east-1 --secret-id "ci/PubSub/key_pkcs12_password" --query "SecretString" | cut -f2 -d":" | cut -f2 -d\")
268
268
openssl pkcs12 -export -in /tmp/certificate.pem -inkey /tmp/privatekey.pem -out ./pkcs12-key.p12 -name PubSub_Thing_Alias -password pass:$pkcs12_password
269
- python3 ./utils/run_sample_ci .py --file ./.github/workflows/ci_run_pkcs12_connect_cfg.json
269
+ python3 ./utils/run_in_ci .py --file ./.github/workflows/ci_run_pkcs12_connect_cfg.json
270
270
- name : configure AWS credentials (MQTT5)
271
271
uses : aws-actions/configure-aws-credentials@v2
272
272
with :
273
273
role-to-assume : ${{ env.CI_MQTT5_ROLE }}
274
274
aws-region : ${{ env.AWS_DEFAULT_REGION }}
275
275
- name : run MQTT5 PubSub sample
276
276
run : |
277
- python3 ./utils/run_sample_ci .py --file ./.github/workflows/ci_run_mqtt5_pubsub_cfg.json
277
+ python3 ./utils/run_in_ci .py --file ./.github/workflows/ci_run_mqtt5_pubsub_cfg.json
278
278
- name : configure AWS credentials (Device Advisor)
279
279
uses : aws-actions/configure-aws-credentials@v2
280
280
with :
@@ -334,15 +334,15 @@ jobs:
334
334
aws-region : ${{ env.AWS_DEFAULT_REGION }}
335
335
- name : run PubSub sample
336
336
run : |
337
- python3 ./utils/run_sample_ci .py --file ./.github/workflows/ci_run_pubsub_cfg.json
337
+ python3 ./utils/run_in_ci .py --file ./.github/workflows/ci_run_pubsub_cfg.json
338
338
- name : configure AWS credentials (MQTT5)
339
339
uses : aws-actions/configure-aws-credentials@v2
340
340
with :
341
341
role-to-assume : ${{ env.CI_MQTT5_ROLE }}
342
342
aws-region : ${{ env.AWS_DEFAULT_REGION }}
343
343
- name : run MQTT5 PubSub sample
344
344
run : |
345
- python3 ./utils/run_sample_ci .py --file ./.github/workflows/ci_run_mqtt5_pubsub_cfg.json
345
+ python3 ./utils/run_in_ci .py --file ./.github/workflows/ci_run_mqtt5_pubsub_cfg.json
346
346
- name : configure AWS credentials (Device Advisor)
347
347
uses : aws-actions/configure-aws-credentials@v2
348
348
with :
@@ -478,109 +478,103 @@ jobs:
478
478
aws-region : ${{ env.AWS_DEFAULT_REGION }}
479
479
- name : run Basic Connect sample
480
480
run : |
481
- python3 ./utils/run_sample_ci .py --file ./.github/workflows/ci_run_basic_connect_cfg.json
481
+ python3 ./utils/run_in_ci .py --file ./.github/workflows/ci_run_basic_connect_cfg.json
482
482
- name : run Websocket Connect sample
483
483
run : |
484
- python3 ./utils/run_sample_ci .py --file ./.github/workflows/ci_run_websocket_connect_cfg.json
484
+ python3 ./utils/run_in_ci .py --file ./.github/workflows/ci_run_websocket_connect_cfg.json
485
485
- name : run PubSub sample
486
486
run : |
487
- python3 ./utils/run_sample_ci .py --file ./.github/workflows/ci_run_pubsub_cfg.json
487
+ python3 ./utils/run_in_ci .py --file ./.github/workflows/ci_run_pubsub_cfg.json
488
488
- name : run CustomKeyOperations sample
489
489
run : |
490
- python3 ./utils/run_sample_ci .py --file ./.github/workflows/ci_run_custom_key_ops_cfg.json
490
+ python3 ./utils/run_in_ci .py --file ./.github/workflows/ci_run_custom_key_ops_cfg.json
491
491
- name : run PKCS11 Connect sample
492
492
run : |
493
493
mkdir -p /tmp/tokens
494
494
export SOFTHSM2_CONF=/tmp/softhsm2.conf
495
495
echo "directories.tokendir = /tmp/tokens" > /tmp/softhsm2.conf
496
- python3 ./utils/run_sample_ci .py --file ./.github/workflows/ci_run_pkcs11_connect_cfg.json
496
+ python3 ./utils/run_in_ci .py --file ./.github/workflows/ci_run_pkcs11_connect_cfg.json
497
497
- name : run Java keystore Connect sample
498
498
run : |
499
499
cert=$(aws secretsmanager get-secret-value --region us-east-1 --secret-id "ci/PubSub/cert" --query "SecretString" | cut -f2 -d":" | cut -f2 -d\") && echo -e "$cert" > /tmp/certificate.pem
500
500
key=$(aws secretsmanager get-secret-value --region us-east-1 --secret-id "ci/PubSub/key" --query "SecretString" | cut -f2 -d":" | cut -f2 -d\") && echo -e "$key" > /tmp/privatekey.pem
501
501
pkcs12_password=$(aws secretsmanager get-secret-value --region us-east-1 --secret-id "ci/PubSub/key_pkcs12_password" --query "SecretString" | cut -f2 -d":" | cut -f2 -d\")
502
502
openssl pkcs12 -export -in /tmp/certificate.pem -inkey /tmp/privatekey.pem -out /tmp/pkcs12-key.p12 -name PubSub_Thing_Alias -password pass:$pkcs12_password
503
503
keytool -importkeystore -srckeystore /tmp/pkcs12-key.p12 -destkeystore ./java_keystore.keys -srcstoretype PKCS12 -alias PubSub_Thing_Alias -srcstorepass $pkcs12_password -deststorepass $pkcs12_password
504
- python3 ./utils/run_sample_ci .py --file ./.github/workflows/ci_run_keystore_connect_cfg.json
504
+ python3 ./utils/run_in_ci .py --file ./.github/workflows/ci_run_keystore_connect_cfg.json
505
505
- name : configure AWS credentials (Cognito)
506
506
uses : aws-actions/configure-aws-credentials@v2
507
507
with :
508
508
role-to-assume : ${{ env.CI_COGNITO_ROLE }}
509
509
aws-region : ${{ env.AWS_DEFAULT_REGION }}
510
510
- name : run CognitoConnect sample
511
511
run : |
512
- python3 ./utils/run_sample_ci .py --file ./.github/workflows/ci_run_cognito_connect_cfg.json
512
+ python3 ./utils/run_in_ci .py --file ./.github/workflows/ci_run_cognito_connect_cfg.json
513
513
- name : configure AWS credentials (Custom Authorizer)
514
514
uses : aws-actions/configure-aws-credentials@v2
515
515
with :
516
516
role-to-assume : ${{ env.CI_CUSTOM_AUTHORIZER_ROLE }}
517
517
aws-region : ${{ env.AWS_DEFAULT_REGION }}
518
518
- name : run CustomAuthorizerConnect sample
519
519
run : |
520
- python3 ./utils/run_sample_ci .py --file ./.github/workflows/ci_run_custom_authorizer_connect_cfg.json
520
+ python3 ./utils/run_in_ci .py --file ./.github/workflows/ci_run_custom_authorizer_connect_cfg.json
521
521
- name : configure AWS credentials (Shadow)
522
522
uses : aws-actions/configure-aws-credentials@v2
523
523
with :
524
524
role-to-assume : ${{ env.CI_SHADOW_ROLE }}
525
525
aws-region : ${{ env.AWS_DEFAULT_REGION }}
526
526
- name : run Shadow sample
527
527
run : |
528
- python3 ./utils/run_sample_ci .py --file ./.github/workflows/ci_run_shadow_cfg.json
528
+ python3 ./utils/run_in_ci .py --file ./.github/workflows/ci_run_shadow_cfg.json
529
529
- name : run Mqtt5 Shadow sample
530
530
run : |
531
- python3 ./utils/run_sample_ci .py --file ./.github/workflows/ci_run_shadow_mqtt5_cfg.json
531
+ python3 ./utils/run_in_ci .py --file ./.github/workflows/ci_run_shadow_mqtt5_cfg.json
532
532
- name : configure AWS credentials (Jobs)
533
533
uses : aws-actions/configure-aws-credentials@v2
534
534
with :
535
535
role-to-assume : ${{ env.CI_JOBS_ROLE }}
536
536
aws-region : ${{ env.AWS_DEFAULT_REGION }}
537
537
- name : run Jobs sample
538
538
run : |
539
- python3 ./utils/run_sample_ci .py --file ./.github/workflows/ci_run_jobs_cfg.json
539
+ python3 ./utils/run_in_ci .py --file ./.github/workflows/ci_run_jobs_cfg.json
540
540
- name : run Mqtt5 Jobs sample
541
541
run : |
542
- python3 ./utils/run_sample_ci .py --file ./.github/workflows/ci_run_jobs_mqtt5_cfg.json
542
+ python3 ./utils/run_in_ci .py --file ./.github/workflows/ci_run_jobs_mqtt5_cfg.json
543
543
- name : configure AWS credentials (Fleet provisioning)
544
544
uses : aws-actions/configure-aws-credentials@v2
545
545
with :
546
546
role-to-assume : ${{ env.CI_FLEET_PROVISIONING_ROLE }}
547
547
aws-region : ${{ env.AWS_DEFAULT_REGION }}
548
548
- name : run Fleet Provisioning sample
549
549
run : |
550
- echo "Generating UUID for IoT thing"
551
- Sample_UUID=$(python3 -c "import uuid; print (uuid.uuid4())")
552
- python3 ./utils/run_sample_ci.py --file ./.github/workflows/ci_run_fleet_provisioning_cfg.json --input_uuid ${Sample_UUID}
553
- python3 utils/delete_iot_thing_ci.py --thing_name "Fleet_Thing_${Sample_UUID}" --region "us-east-1"
550
+ python3 ./utils/run_fleet_provisioning_sample.py --file ./.github/workflows/ci_run_fleet_provisioning_cfg.json --thing-name-prefix "Fleet_Thing_"
554
551
- name : run Mqtt5 Fleet Provisioning sample
555
552
run : |
556
- echo "Generating UUID for IoT thing"
557
- Sample_UUID=$(python3 -c "import uuid; print (uuid.uuid4())")
558
- python3 ./utils/run_sample_ci.py --file ./.github/workflows/ci_run_fleet_provisioning_mqtt5_cfg.json --input_uuid ${Sample_UUID}
559
- python3 utils/delete_iot_thing_ci.py --thing_name "Fleet_Thing_${Sample_UUID}" --region "us-east-1"
553
+ python3 ./utils/run_fleet_provisioning_sample.py --file ./.github/workflows/ci_run_fleet_provisioning_mqtt5_cfg.json --thing-name-prefix "Fleet_Thing_"
560
554
- name : configure AWS credentials (X509)
561
555
uses : aws-actions/configure-aws-credentials@v2
562
556
with :
563
557
role-to-assume : ${{ env.CI_X509_ROLE }}
564
558
aws-region : ${{ env.AWS_DEFAULT_REGION }}
565
559
- name : run X509 sample
566
560
run : |
567
- python3 ./utils/run_sample_ci .py --file ./.github/workflows/ci_run_x509_connect_cfg.json
561
+ python3 ./utils/run_in_ci .py --file ./.github/workflows/ci_run_x509_connect_cfg.json
568
562
- name : configure AWS credentials (MQTT5)
569
563
uses : aws-actions/configure-aws-credentials@v2
570
564
with :
571
565
role-to-assume : ${{ env.CI_MQTT5_ROLE }}
572
566
aws-region : ${{ env.AWS_DEFAULT_REGION }}
573
567
- name : run MQTT5 PubSub sample
574
568
run : |
575
- python3 ./utils/run_sample_ci .py --file ./.github/workflows/ci_run_mqtt5_pubsub_cfg.json
569
+ python3 ./utils/run_in_ci .py --file ./.github/workflows/ci_run_mqtt5_pubsub_cfg.json
576
570
- name : run MQTT5 Shared Subscription sample
577
571
run : |
578
- python3 ./utils/run_sample_ci .py --file ./.github/workflows/ci_run_mqtt5_shared_subscription_cfg.json
572
+ python3 ./utils/run_in_ci .py --file ./.github/workflows/ci_run_mqtt5_shared_subscription_cfg.json
579
573
- name : configure AWS credentials (Greengrass)
580
574
uses : aws-actions/configure-aws-credentials@v2
581
575
with :
582
576
role-to-assume : ${{ env.CI_GREENGRASS_ROLE }}
583
577
aws-region : ${{ env.AWS_DEFAULT_REGION }}
584
578
- name : run Greengrass Discovery sample
585
579
run : |
586
- python3 ./utils/run_sample_ci .py --file ./.github/workflows/ci_run_greengrass_discovery_cfg.json
580
+ python3 ./utils/run_in_ci .py --file ./.github/workflows/ci_run_greengrass_discovery_cfg.json
0 commit comments