Skip to content

Commit 86f14ad

Browse files
authored
Update secure-tunnel name (#607)
Update secure-tunnel name in readme to match the name generated in the cmake
1 parent bdcb4ee commit 86f14ad

File tree

1 file changed

+2
-2
lines changed
  • samples/secure_tunneling/secure_tunnel

1 file changed

+2
-2
lines changed

samples/secure_tunneling/secure_tunnel/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Create a new secure tunnel in the AWS IoT console (https://console.aws.amazon.co
1313
To run the sample with a destination access token in destination mode (default), you can use the following command:
1414

1515
``` sh
16-
./secure_tunnel --signing_region <signing_region> --access_token_file <path to destination access token>
16+
./secure-tunnel --signing_region <signing_region> --access_token_file <path to destination access token>
1717
```
1818

1919
The sample will create a Secure Tunnel connection and remain connected in `DESTINATION MODE` and will echo any messages it receives through the Secure Tunnel back to the Source Device.
@@ -23,7 +23,7 @@ The sample will create a Secure Tunnel connection and remain connected in `DESTI
2323
While the focus of the Secure Tunnel Client for the IoT Device SDK is to connect with Secure Tunnels in `DESTINATION MODE` we also support connecting in `SOURCE MODE`. The token file should be the Source Token in this instance and you must add the `--localProxyModeSource` flag:
2424

2525
``` sh
26-
./secure_tunnel --signing_region <signing_region> --access_token_file <path to source access token> --localProxyModeSource
26+
./secure-tunnel --signing_region <signing_region> --access_token_file <path to source access token> --localProxyModeSource
2727
```
2828

2929
Then two samples will then connect to each other through the AWS Secure Tunnel endpoint and establish a stream through which data can be transmitted in either direction.

0 commit comments

Comments
 (0)