Skip to content

Commit 0de1d03

Browse files
flochazsaragerion
andauthored
Update CONTRIBUTING.md
Co-authored-by: Sara Gerion <[email protected]>
1 parent 57c3bb0 commit 0de1d03

File tree

1 file changed

+4
-2
lines changed

1 file changed

+4
-2
lines changed

Diff for: CONTRIBUTING.md

+4-2
Original file line numberDiff line numberDiff line change
@@ -142,8 +142,10 @@ More information about:
142142

143143
- [Github OpenID Connect](https://github.blog/changelog/2021-10-27-github-actions-secure-cloud-deployments-with-openid-connect/
144144
- ["Configure AWS Credentials" Action For GitHub Actions](https://github.com/aws-actions/configure-aws-credentials/)
145-
1. Add your new role into your Github fork secrets under `AWS_ROLE_ARN_TO_ASSUME`.
146-
1. Run manually `run-e2e-tests` workflow.
145+
1. Create an IAM role in your target AWS account, with the least amount of privilege.
146+
2. Add your new role into your [Github fork secrets](https://docs.github.com/en/actions/security-guides/encrypted-secrets#creating-encrypted-secrets-for-a-repository) with name `AWS_ROLE_ARN_TO_ASSUME`.
147+
3. In your forked repository, go to the "Actions" tabs, select the `run-e2e-tests` workflow.
148+
4. In the run-e2e-tests workflow page, select "Run workflow" and run it on the desired branch.
147149

148150
> :Warning: **Don't automatically run end-to-end tests on branch push or PRs**. A malicious attacker can submit a pull request to attack your AWS account. Ideally, use a blank account without any important workload/data, and limit `AWS_ROLE_ARN_TO_ASSUME` permission to least minimum privilege.
149151
### Conventions

0 commit comments

Comments
 (0)