Skip to content

Commit c10488b

Browse files
X509 in ci (#327)
Run X509 sample in CI and use config file based solution for CI.
1 parent 61b3963 commit c10488b

17 files changed

+610
-213
lines changed

.github/workflows/ci.yml

Lines changed: 27 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,7 @@ env:
2424
CI_JOBS_ROLE: ${{ secrets.AWS_CI_JOBS_ROLE }}
2525
CI_FLEET_PROVISIONING_ROLE: ${{ secrets.AWS_CI_FLEET_PROVISIONING_ROLE }}
2626
CI_DEVICE_ADVISOR: ${{ secrets.AWS_CI_DEVICE_ADVISOR_ROLE }}
27+
CI_X509_ROLE: ${{ secrets.AWS_CI_X509_ROLE }}
2728
CI_MQTT5_ROLE: ${{ secrets.AWS_CI_MQTT5_ROLE }}
2829

2930
jobs:
@@ -52,7 +53,6 @@ jobs:
5253
./linux-container-ci.sh ${{ env.BUILDER_VERSION }} aws-crt-${{ matrix.image }} build -p ${{ env.PACKAGE_NAME }}
5354
# NOTE: we cannot run samples or DeviceAdvisor here due to container restrictions
5455

55-
5656
raspberry:
5757
runs-on: ubuntu-20.04 # latest
5858
strategy:
@@ -76,7 +76,6 @@ jobs:
7676
aws s3 cp s3://aws-crt-test-stuff/ci/${{ env.BUILDER_VERSION }}/linux-container-ci.sh ./linux-container-ci.sh && chmod a+x ./linux-container-ci.sh
7777
./linux-container-ci.sh ${{ env.BUILDER_VERSION }} aws-crt-${{ matrix.image }} build -p ${{ env.PACKAGE_NAME }}
7878
79-
8079
windows:
8180
runs-on: windows-latest
8281
strategy:
@@ -123,18 +122,18 @@ jobs:
123122
aws-region: ${{ env.AWS_DEFAULT_REGION }}
124123
- name: run PubSub sample
125124
run: |
126-
python ./utils/run_sample_ci.py --language Java --sample_file 'samples/BasicPubSub' --sample_region ${{ env.AWS_DEFAULT_REGION }} --sample_secret_endpoint 'ci/endpoint' --sample_secret_certificate 'ci/PubSub/cert' --sample_secret_private_key 'ci/PubSub/key' --sample_main_class 'pubsub.PubSub'
125+
python ./utils/run_sample_ci.py --file ./.github/workflows/ci_run_pubsub_cfg.json
127126
- name: run Windows Certificate Connect sample
128127
run: |
129-
python ./utils/run_sample_ci.py --language Java --sample_file 'samples/WindowsCertConnect' --sample_region ${{ env.AWS_DEFAULT_REGION }} --sample_secret_endpoint 'ci/endpoint' --sample_secret_certificate 'ci/PubSub/cert' --sample_secret_private_key 'ci/PubSub/key' --sample_run_certutil true --sample_main_class 'windowscertconnect.WindowsCertConnect'
128+
python ./utils/run_sample_ci.py --file ./.github/workflows/ci_run_windows_cert_connect_cfg.json
130129
- name: configure AWS credentials (MQTT5)
131130
uses: aws-actions/configure-aws-credentials@v1
132131
with:
133132
role-to-assume: ${{ env.CI_MQTT5_ROLE }}
134133
aws-region: ${{ env.AWS_DEFAULT_REGION }}
135134
- name: run MQTT5 PubSub sample
136135
run: |
137-
python ./utils/run_sample_ci.py --language Java --sample_file 'samples/Mqtt5/PubSub' --sample_region ${{ env.AWS_DEFAULT_REGION }} --sample_secret_endpoint 'ci/endpoint' --sample_secret_certificate 'ci/mqtt5/us/mqtt5_thing/cert' --sample_secret_private_key 'ci/mqtt5/us/mqtt5_thing/key' --sample_main_class 'mqtt5.pubsub.PubSub'
136+
python3 ./utils/run_sample_ci.py --file ./.github/workflows/ci_run_mqtt5_pubsub_cfg.json
138137
- name: configure AWS credentials (Device Advisor)
139138
uses: aws-actions/configure-aws-credentials@v1
140139
with:
@@ -190,15 +189,15 @@ jobs:
190189
aws-region: ${{ env.AWS_DEFAULT_REGION }}
191190
- name: run PubSub sample
192191
run: |
193-
python3 ./utils/run_sample_ci.py --language Java --sample_file 'samples/BasicPubSub' --sample_region ${{ env.AWS_DEFAULT_REGION }} --sample_secret_endpoint 'ci/endpoint' --sample_secret_certificate 'ci/PubSub/cert' --sample_secret_private_key 'ci/PubSub/key' --sample_main_class 'pubsub.PubSub'
192+
python3 ./utils/run_sample_ci.py --file ./.github/workflows/ci_run_pubsub_cfg.json
194193
- name: configure AWS credentials (MQTT5)
195194
uses: aws-actions/configure-aws-credentials@v1
196195
with:
197196
role-to-assume: ${{ env.CI_MQTT5_ROLE }}
198197
aws-region: ${{ env.AWS_DEFAULT_REGION }}
199198
- name: run MQTT5 PubSub sample
200199
run: |
201-
python3 ./utils/run_sample_ci.py --language Java --sample_file 'samples/Mqtt5/PubSub' --sample_region ${{ env.AWS_DEFAULT_REGION }} --sample_secret_endpoint 'ci/endpoint' --sample_secret_certificate 'ci/mqtt5/us/mqtt5_thing/cert' --sample_secret_private_key 'ci/mqtt5/us/mqtt5_thing/key' --sample_main_class 'mqtt5.pubsub.PubSub'
200+
python3 ./utils/run_sample_ci.py --file ./.github/workflows/ci_run_mqtt5_pubsub_cfg.json
202201
- name: configure AWS credentials (Device Advisor)
203202
uses: aws-actions/configure-aws-credentials@v1
204203
with:
@@ -253,15 +252,15 @@ jobs:
253252
aws-region: ${{ env.AWS_DEFAULT_REGION }}
254253
- name: run PubSub sample
255254
run: |
256-
python3 ./utils/run_sample_ci.py --language Java --sample_file 'samples/BasicPubSub' --sample_region ${{ env.AWS_DEFAULT_REGION }} --sample_secret_endpoint 'ci/endpoint' --sample_secret_certificate 'ci/PubSub/cert' --sample_secret_private_key 'ci/PubSub/key' --sample_main_class 'pubsub.PubSub'
255+
python3 ./utils/run_sample_ci.py --file ./.github/workflows/ci_run_pubsub_cfg.json
257256
- name: configure AWS credentials (MQTT5)
258257
uses: aws-actions/configure-aws-credentials@v1
259258
with:
260259
role-to-assume: ${{ env.CI_MQTT5_ROLE }}
261260
aws-region: ${{ env.AWS_DEFAULT_REGION }}
262261
- name: run MQTT5 PubSub sample
263262
run: |
264-
python3 ./utils/run_sample_ci.py --language Java --sample_file 'samples/Mqtt5/PubSub' --sample_region ${{ env.AWS_DEFAULT_REGION }} --sample_secret_endpoint 'ci/endpoint' --sample_secret_certificate 'ci/mqtt5/us/mqtt5_thing/cert' --sample_secret_private_key 'ci/mqtt5/us/mqtt5_thing/key' --sample_main_class 'mqtt5.pubsub.PubSub'
263+
python3 ./utils/run_sample_ci.py --file ./.github/workflows/ci_run_mqtt5_pubsub_cfg.json
265264
- name: configure AWS credentials (Device Advisor)
266265
uses: aws-actions/configure-aws-credentials@v1
267266
with:
@@ -336,55 +335,54 @@ jobs:
336335
aws-region: ${{ env.AWS_DEFAULT_REGION }}
337336
- name: run Basic Connect sample
338337
run: |
339-
python3 ./utils/run_sample_ci.py --language Java --sample_file 'samples/BasicConnect' --sample_region ${{ env.AWS_DEFAULT_REGION }} --sample_secret_endpoint 'ci/endpoint' --sample_secret_certificate 'ci/PubSub/cert' --sample_secret_private_key 'ci/PubSub/key' --sample_main_class 'basicconnect.BasicConnect'
338+
python3 ./utils/run_sample_ci.py --file ./.github/workflows/ci_run_basic_connect_cfg.json
340339
- name: run Websocket Connect sample
341340
run: |
342-
python3 ./utils/run_sample_ci.py --language Java --sample_file 'samples/WebsocketConnect' --sample_region ${{ env.AWS_DEFAULT_REGION }} --sample_secret_endpoint 'ci/endpoint' --sample_arguments '--signing_region us-east-1' --sample_main_class 'websocketconnect.WebsocketConnect'
341+
python3 ./utils/run_sample_ci.py --file ./.github/workflows/ci_run_websocket_connect_cfg.json
343342
- name: run PubSub sample
344343
run: |
345-
python3 ./utils/run_sample_ci.py --language Java --sample_file 'samples/BasicPubSub' --sample_region ${{ env.AWS_DEFAULT_REGION }} --sample_secret_endpoint 'ci/endpoint' --sample_secret_certificate 'ci/PubSub/cert' --sample_secret_private_key 'ci/PubSub/key' --sample_main_class 'pubsub.PubSub'
344+
python3 ./utils/run_sample_ci.py --file ./.github/workflows/ci_run_pubsub_cfg.json
346345
- name: run CustomKeyOperations sample
347346
run: |
348-
python3 ./utils/run_sample_ci.py --language Java --sample_file 'samples/CustomKeyOpsPubSub' --sample_region ${{ env.AWS_DEFAULT_REGION }} --sample_secret_endpoint 'ci/endpoint' --sample_secret_certificate 'ci/PubSub/cert' --sample_secret_private_key 'ci/PubSub/keyp8' --sample_main_class 'customkeyopspubsub.CustomKeyOpsPubSub'
347+
python3 ./utils/run_sample_ci.py --file ./.github/workflows/ci_run_custom_key_ops_cfg.json
349348
- name: run PKCS11 Connect sample
350349
run: |
351350
mkdir -p /tmp/tokens
352351
export SOFTHSM2_CONF=/tmp/softhsm2.conf
353352
echo "directories.tokendir = /tmp/tokens" > /tmp/softhsm2.conf
354-
python3 ./utils/run_sample_ci.py --language Java --sample_file 'samples/Pkcs11Connect' --sample_region ${{ env.AWS_DEFAULT_REGION }} --sample_secret_endpoint 'ci/endpoint' --sample_secret_certificate 'ci/PubSub/cert' --sample_secret_private_key 'ci/PubSub/keyp8' --sample_run_softhsm 'true' --sample_arguments '--pkcs11_lib "/usr/lib/softhsm/libsofthsm2.so" --pin 0000 --token_label "my-token" --key_label "my-key"' --sample_main_class 'pkcs11connect.Pkcs11Connect'
353+
python3 ./utils/run_sample_ci.py --file ./.github/workflows/ci_run_pkcs11_connect_cfg.json
355354
- name: run Java keystore Connect sample
356355
run: |
357356
cert=$(aws secretsmanager get-secret-value --region us-east-1 --secret-id "ci/PubSub/cert" --query "SecretString" | cut -f2 -d":" | cut -f2 -d\") && echo -e "$cert" > /tmp/certificate.pem
358357
key=$(aws secretsmanager get-secret-value --region us-east-1 --secret-id "ci/PubSub/key" --query "SecretString" | cut -f2 -d":" | cut -f2 -d\") && echo -e "$key" > /tmp/privatekey.pem
359358
pkcs12_password=$(aws secretsmanager get-secret-value --region us-east-1 --secret-id "ci/PubSub/key_pkcs12_password" --query "SecretString" | cut -f2 -d":" | cut -f2 -d\")
360359
openssl pkcs12 -export -in /tmp/certificate.pem -inkey /tmp/privatekey.pem -out /tmp/pkcs12-key.p12 -name PubSub_Thing_Alias -password pass:$pkcs12_password
361-
362360
keytool -importkeystore -srckeystore /tmp/pkcs12-key.p12 -destkeystore ./java_keystore.keys -srcstoretype PKCS12 -alias PubSub_Thing_Alias -srcstorepass $pkcs12_password -deststorepass $pkcs12_password
363-
python3 ./utils/run_sample_ci.py --language Java --sample_file 'samples/JavaKeystoreConnect' --sample_region ${{ env.AWS_DEFAULT_REGION }} --sample_secret_endpoint 'ci/endpoint' --sample_arguments "--keystore ./java_keystore.keys --keystore_password $pkcs12_password --certificate_alias PubSub_Thing_Alias --certificate_password $pkcs12_password" --sample_main_class 'javakeystoreconnect.JavaKeystoreConnect'
361+
python3 ./utils/run_sample_ci.py --file ./.github/workflows/ci_run_keystore_connect_cfg.json
364362
- name: configure AWS credentials (Custom Authorizer)
365363
uses: aws-actions/configure-aws-credentials@v1
366364
with:
367365
role-to-assume: ${{ env.CI_CUSTOM_AUTHORIZER_ROLE }}
368366
aws-region: ${{ env.AWS_DEFAULT_REGION }}
369367
- name: run CustomAuthorizerConnect sample
370368
run: |
371-
python3 ./utils/run_sample_ci.py --language Java --sample_file 'samples/CustomAuthorizerConnect' --sample_region ${{ env.AWS_DEFAULT_REGION }} --sample_secret_endpoint 'ci/endpoint' --sample_secret_custom_authorizer_name 'ci/CustomAuthorizer/name' --sample_secret_custom_authorizer_password 'ci/CustomAuthorizer/password' --sample_main_class 'customauthorizerconnect.CustomAuthorizerConnect'
369+
python3 ./utils/run_sample_ci.py --file ./.github/workflows/ci_run_custom_authorizer_connect_cfg.json
372370
- name: configure AWS credentials (Shadow)
373371
uses: aws-actions/configure-aws-credentials@v1
374372
with:
375373
role-to-assume: ${{ env.CI_SHADOW_ROLE }}
376374
aws-region: ${{ env.AWS_DEFAULT_REGION }}
377375
- name: run Shadow sample
378376
run: |
379-
python3 ./utils/run_sample_ci.py --language Java --sample_file 'samples/Shadow' --sample_region ${{ env.AWS_DEFAULT_REGION }} --sample_secret_endpoint 'ci/endpoint' --sample_secret_certificate 'ci/Shadow/cert' --sample_secret_private_key 'ci/Shadow/key' --sample_arguments '--thing_name CI_Shadow_Thing' --sample_main_class 'shadow.ShadowSample'
377+
python3 ./utils/run_sample_ci.py --file ./.github/workflows/ci_run_shadow_cfg.json
380378
- name: configure AWS credentials (Jobs)
381379
uses: aws-actions/configure-aws-credentials@v1
382380
with:
383381
role-to-assume: ${{ env.CI_JOBS_ROLE }}
384382
aws-region: ${{ env.AWS_DEFAULT_REGION }}
385383
- name: run Jobs sample
386384
run: |
387-
python3 ./utils/run_sample_ci.py --language Java --sample_file 'samples/Jobs' --sample_region ${{ env.AWS_DEFAULT_REGION }} --sample_secret_endpoint 'ci/endpoint' --sample_secret_certificate 'ci/Jobs/cert' --sample_secret_private_key 'ci/Jobs/key' --sample_arguments '--thing_name CI_Jobs_Thing' --sample_main_class 'jobs.JobsSample'
385+
python3 ./utils/run_sample_ci.py --file ./.github/workflows/ci_run_jobs_cfg.json
388386
- name: configure AWS credentials (Fleet provisioning)
389387
uses: aws-actions/configure-aws-credentials@v1
390388
with:
@@ -394,13 +392,21 @@ jobs:
394392
run: |
395393
echo "Generating UUID for IoT thing"
396394
Sample_UUID=$(python3 -c "import uuid; print (uuid.uuid4())")
397-
python3 ./utils/run_sample_ci.py --language Java --sample_file 'samples/Identity' --sample_region ${{ env.AWS_DEFAULT_REGION }} --sample_secret_endpoint 'ci/endpoint' --sample_secret_certificate 'ci/FleetProvisioning/cert' --sample_secret_private_key 'ci/FleetProvisioning/key' --sample_arguments "--template_name CI_FleetProvisioning_Template --template_parameters '{SerialNumber:${Sample_UUID}}'" --sample_main_class 'identity.FleetProvisioningSample'
395+
python3 ./utils/run_sample_ci.py --file ./.github/workflows/ci_run_fleet_provisioning_cfg.json --input_uuid ${Sample_UUID}
398396
python3 utils/delete_iot_thing_ci.py --thing_name "Fleet_Thing_${Sample_UUID}" --region "us-east-1"
397+
- name: configure AWS credentials (X509)
398+
uses: aws-actions/configure-aws-credentials@v1
399+
with:
400+
role-to-assume: ${{ env.CI_X509_ROLE }}
401+
aws-region: ${{ env.AWS_DEFAULT_REGION }}
402+
- name: run X509 sample
403+
run: |
404+
python3 ./utils/run_sample_ci.py --file ./.github/workflows/ci_run_x509_connect_cfg.json
399405
- name: configure AWS credentials (MQTT5)
400406
uses: aws-actions/configure-aws-credentials@v1
401407
with:
402408
role-to-assume: ${{ env.CI_MQTT5_ROLE }}
403409
aws-region: ${{ env.AWS_DEFAULT_REGION }}
404410
- name: run MQTT5 PubSub sample
405411
run: |
406-
python3 ./utils/run_sample_ci.py --language Java --sample_file 'samples/Mqtt5/PubSub' --sample_region ${{ env.AWS_DEFAULT_REGION }} --sample_secret_endpoint 'ci/endpoint' --sample_secret_certificate 'ci/mqtt5/us/mqtt5_thing/cert' --sample_secret_private_key 'ci/mqtt5/us/mqtt5_thing/key' --sample_main_class 'mqtt5.pubsub.PubSub'
412+
python3 ./utils/run_sample_ci.py --file ./.github/workflows/ci_run_mqtt5_pubsub_cfg.json
Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
{
2+
"language": "Java",
3+
"sample_file": "samples/BasicConnect",
4+
"sample_region": "us-east-1",
5+
"sample_main_class": "basicconnect.BasicConnect",
6+
"arguments": [
7+
{
8+
"name": "--endpoint",
9+
"secret": "ci/endpoint"
10+
},
11+
{
12+
"name": "--cert",
13+
"secret": "ci/PubSub/cert",
14+
"filename": "tmp_certificate.pem"
15+
},
16+
{
17+
"name": "--key",
18+
"secret": "ci/PubSub/key",
19+
"filename": "tmp_key.pem"
20+
}
21+
]
22+
}
Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
{
2+
"language": "Java",
3+
"sample_file": "samples/CustomAuthorizerConnect",
4+
"sample_region": "us-east-1",
5+
"sample_main_class": "customauthorizerconnect.CustomAuthorizerConnect",
6+
"arguments": [
7+
{
8+
"name": "--endpoint",
9+
"secret": "ci/endpoint"
10+
},
11+
{
12+
"name": "--custom_auth_authorizer_name",
13+
"secret": "ci/CustomAuthorizer/name"
14+
},
15+
{
16+
"name": "--custom_auth_password",
17+
"secret": "ci/CustomAuthorizer/password"
18+
}
19+
]
20+
}
Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
{
2+
"language": "Java",
3+
"sample_file": "samples/CustomKeyOpsPubSub",
4+
"sample_region": "us-east-1",
5+
"sample_main_class": "customkeyopspubsub.CustomKeyOpsPubSub",
6+
"arguments": [
7+
{
8+
"name": "--endpoint",
9+
"secret": "ci/endpoint"
10+
},
11+
{
12+
"name": "--cert",
13+
"secret": "ci/PubSub/cert",
14+
"filename": "tmp_certificate.pem"
15+
},
16+
{
17+
"name": "--key",
18+
"secret": "ci/PubSub/keyp8",
19+
"filename": "tmp_key.pem"
20+
}
21+
]
22+
}
Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
{
2+
"language": "Java",
3+
"sample_file": "samples/Identity",
4+
"sample_region": "us-east-1",
5+
"sample_main_class": "identity.FleetProvisioningSample",
6+
"arguments": [
7+
{
8+
"name": "--endpoint",
9+
"secret": "ci/endpoint"
10+
},
11+
{
12+
"name": "--cert",
13+
"secret": "ci/FleetProvisioning/cert",
14+
"filename": "tmp_certificate.pem"
15+
},
16+
{
17+
"name": "--key",
18+
"secret": "ci/FleetProvisioning/key",
19+
"filename": "tmp_key.pem"
20+
},
21+
{
22+
"name": "--template_name",
23+
"data": "CI_FleetProvisioning_Template"
24+
},
25+
{
26+
"name": "--template_parameters",
27+
"data": "{SerialNumber:$INPUT_UUID}"
28+
}
29+
]
30+
}
Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
{
2+
"language": "Java",
3+
"sample_file": "samples/Jobs",
4+
"sample_region": "us-east-1",
5+
"sample_main_class": "jobs.JobsSample",
6+
"arguments": [
7+
{
8+
"name": "--endpoint",
9+
"secret": "ci/endpoint"
10+
},
11+
{
12+
"name": "--cert",
13+
"secret": "ci/Jobs/cert",
14+
"filename": "tmp_certificate.pem"
15+
},
16+
{
17+
"name": "--key",
18+
"secret": "ci/Jobs/key",
19+
"filename": "tmp_key.pem"
20+
},
21+
{
22+
"name": "--thing_name",
23+
"data": "CI_Jobs_Thing"
24+
}
25+
]
26+
}
Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
{
2+
"language": "Java",
3+
"sample_file": "samples/JavaKeystoreConnect",
4+
"sample_region": "us-east-1",
5+
"sample_main_class": "javakeystoreconnect.JavaKeystoreConnect",
6+
"arguments": [
7+
{
8+
"name": "--endpoint",
9+
"secret": "ci/endpoint"
10+
},
11+
{
12+
"name": "--signing_region",
13+
"data": "us-east-1"
14+
},
15+
{
16+
"name": "--keystore",
17+
"data": "./java_keystore.keys"
18+
},
19+
{
20+
"name": "--keystore_password",
21+
"secret": "ci/PubSub/key_pkcs12_password"
22+
},
23+
{
24+
"name": "--certificate_alias",
25+
"data": "PubSub_Thing_Alias"
26+
},
27+
{
28+
"name": "--certificate_password",
29+
"secret": "ci/PubSub/key_pkcs12_password"
30+
}
31+
]
32+
}
Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
{
2+
"language": "Java",
3+
"sample_file": "samples/Mqtt5/PubSub",
4+
"sample_region": "us-east-1",
5+
"sample_main_class": "mqtt5.pubsub.PubSub",
6+
"arguments": [
7+
{
8+
"name": "--endpoint",
9+
"secret": "ci/endpoint"
10+
},
11+
{
12+
"name": "--cert",
13+
"secret": "ci/mqtt5/us/mqtt5_thing/cert",
14+
"filename": "tmp_certificate.pem"
15+
},
16+
{
17+
"name": "--key",
18+
"secret": "ci/mqtt5/us/mqtt5_thing/key",
19+
"filename": "tmp_key.pem"
20+
}
21+
]
22+
}
Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
{
2+
"language": "Java",
3+
"sample_file": "samples/Pkcs11Connect",
4+
"sample_region": "us-east-1",
5+
"sample_main_class": "pkcs11connect.Pkcs11Connect",
6+
"arguments": [
7+
{
8+
"name": "--endpoint",
9+
"secret": "ci/endpoint"
10+
},
11+
{
12+
"name": "--cert",
13+
"secret": "ci/PubSub/cert",
14+
"filename": "tmp_certificate.pem"
15+
},
16+
{
17+
"name": "--key",
18+
"secret": "ci/PubSub/keyp8",
19+
"filename": "tmp_key.pem",
20+
"pkcs11_key": "true"
21+
},
22+
{
23+
"name": "--pkcs11_lib",
24+
"data": "/usr/lib/softhsm/libsofthsm2.so"
25+
},
26+
{
27+
"name": "--pin",
28+
"data": "0000"
29+
},
30+
{
31+
"name": "--token_label",
32+
"data": "my-token"
33+
},
34+
{
35+
"name": "--key_label",
36+
"data": "my-key"
37+
}
38+
]
39+
}

0 commit comments

Comments
 (0)