4
4
pull_request :
5
5
branches : [ master ]
6
6
jobs :
7
- contract-integration :
7
+ contract-integration-java :
8
8
runs-on : ubuntu-latest
9
9
steps :
10
10
- uses : actions/checkout@v2
11
11
- uses : actions/checkout@v2
12
12
with :
13
13
repository : aws-cloudformation/aws-cloudformation-resource-providers-lookoutvision
14
- path : provider
14
+ path : lookoutvision
15
15
- uses : actions/setup-java@v1
16
16
with :
17
17
java-version : 8
@@ -20,16 +20,42 @@ jobs:
20
20
python-version : 3
21
21
- run : |
22
22
pip install -e .
23
- cd provider /*project
23
+ cd lookoutvision /*project
24
24
curl -s -L https://github.com/aws/aws-sam-cli/releases/latest/download/aws-sam-cli-linux-x86_64.zip -o sam.zip
25
25
unzip -q sam.zip -d sam-install
26
26
sudo ./sam-install/install
27
27
sam local start-lambda &
28
- pip install --quiet cloudformation-cli-java-plugin
28
+ pip install --quiet cloudformation-cli-java-plugin cloudformation-cli-python-plugin
29
29
mvn package --no-transfer-progress -Dmaven.test.skip=true
30
30
cfn test --enforce-timeout 240
31
31
! grep -q -E -i '(accessKeyId|secretAccessKey|sessionToken)' rpdk.log*
32
32
env:
33
33
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}
34
34
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
35
35
AWS_REGION: us-east-1
36
+ contract-integration-python :
37
+ runs-on : ubuntu-latest
38
+ steps :
39
+ - uses : actions/checkout@v2
40
+ - uses : actions/checkout@v2
41
+ with :
42
+ repository : aws-cloudformation/aws-cloudformation-resource-providers-frauddetector
43
+ path : frauddetector
44
+ - uses : actions/setup-python@v2
45
+ with :
46
+ python-version : 3
47
+ - run : |
48
+ pip install -e .
49
+ cd frauddetector/*outcome
50
+ curl -s -L https://github.com/aws/aws-sam-cli/releases/latest/download/aws-sam-cli-linux-x86_64.zip -o sam.zip
51
+ unzip -q sam.zip -d sam-install
52
+ sudo ./sam-install/install
53
+ sam local start-lambda &
54
+ pip install --quiet cloudformation-cli-java-plugin cloudformation-cli-python-plugin
55
+ cfn submit --dry-run
56
+ cfn test --enforce-timeout 240
57
+ ! grep -q -E -i '(accessKeyId|secretAccessKey|sessionToken)' rpdk.log*
58
+ env:
59
+ AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}
60
+ AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
61
+ AWS_REGION: us-east-1
0 commit comments