diff --git a/DOCKER.md b/DOCKER.md index a66c8d9baa367..9d102b1a0e942 100644 --- a/DOCKER.md +++ b/DOCKER.md @@ -3,7 +3,7 @@
-
+
diff --git a/README.md b/README.md
index 4292cf113fb99..acc7b5a7dd47e 100644
--- a/README.md
+++ b/README.md
@@ -7,7 +7,7 @@
-
+
diff --git a/docs/testing/multi-account-region-testing/README.md b/docs/testing/multi-account-region-testing/README.md
index dd153cbe3b30a..323643cbc8a97 100644
--- a/docs/testing/multi-account-region-testing/README.md
+++ b/docs/testing/multi-account-region-testing/README.md
@@ -4,11 +4,11 @@ LocalStack has multi-account and multi-region support. This document contains so
## Overview
-For cross-account inter-service access, specify a role with which permissions the source service makes a request to the target service to access another service's resource.
+For cross-account inter-service access, specify a role with which permissions the source service makes a request to the target service to access another service's resource.
This role should be in the source account.
When writing an AWS validated test case, you need to properly configure IAM roles.
-For example:
+For example:
The test case [`test_apigateway_with_step_function_integration`](https://github.com/localstack/localstack/blob/628b96b44a4fc63d880a4c1238a4f15f5803a3f2/tests/aws/services/apigateway/test_apigateway_basic.py#L999) specifies a [role](https://github.com/localstack/localstack/blob/628b96b44a4fc63d880a4c1238a4f15f5803a3f2/tests/aws/services/apigateway/test_apigateway_basic.py#L1029-L1034) which has permissions to access the target step function account.
```python
role_arn = create_iam_role_with_policy(
@@ -28,30 +28,20 @@ connect_to.with_assumed_role(
region_name=region_name,
).lambda_
```
-
-When there is no role specified, you should use the source arn conceptually if cross-account is allowed.
-This can be seen in a case where `account_id` was added [added](https://github.com/localstack/localstack/blob/ae31f63bb6d8254edc0c85a66e3c36cd0c7dc7b0/localstack/utils/aws/message_forwarding.py#L42) to [send events to the target](https://github.com/localstack/localstack/blob/ae31f63bb6d8254edc0c85a66e3c36cd0c7dc7b0/localstack/utils/aws/message_forwarding.py#L31) service like SQS, SNS, Lambda, etc.
-Always refer to the official AWS documentation and investigate how the the services communicate with each other.
+When there is no role specified, you should use the source arn conceptually if cross-account is allowed.
+This can be seen in a case where `account_id` was [added](https://github.com/localstack/localstack/blob/ae31f63bb6d8254edc0c85a66e3c36cd0c7dc7b0/localstack/utils/aws/message_forwarding.py#L42) to [send events to the target](https://github.com/localstack/localstack/blob/ae31f63bb6d8254edc0c85a66e3c36cd0c7dc7b0/localstack/utils/aws/message_forwarding.py#L31) service like SQS, SNS, Lambda, etc.
+
+Always refer to the official AWS documentation and investigate how the the services communicate with each other.
For example, here are the [AWS Firehose docs](https://docs.aws.amazon.com/firehose/latest/dev/controlling-access.html#cross-account-delivery-s3) explaining Firehose and S3 integration.
## Test changes in CI with random credentials
-We regularly run the test suite in CircleCI to check the multi-account and multi-region feature compatibility.
-There is a [scheduled CircleCI workflow](https://github.com/localstack/localstack/blob/master/.circleci/config.yml) which executes the tests with randomized account ID and region at 01:00 UTC daily.
-
-If you have permissions, this workflow can be manually triggered on CircleCI as follows:
-1. Go to the [LocalStack project on CircleCI](https://app.circleci.com/pipelines/github/localstack/localstack).
-1. Select a branch for which you want to trigger the workflow from the filters section.
- - For PRs coming from forks, you can select the branch by using the PR number like this: `pull/