You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I can't use OIDC authentication, but my workflow needs the id-token: write permission.
AFAICT there's no way I can use this action if my workflow requires the id-token: write permission?
Is there any workaround for this? It seems a terrible idea to conflate the authentication method with a random permission assigned to the workflow. It's also insanely hard to debug when your role-to-assume config gets silently ignored because you added a permission to the top-level workflow.
Describe the bug
When using the permission
id-token: write
It seems that that this action automatically goes down the OIDC flow
This is not always intended behaviour i.e. when using both OIDC for another action and IAM instance roles within the same job.
Looks like these lines are responsible
https://github.com/aws-actions/configure-aws-credentials/blob/main/src/assumeRole.ts#L152-L153
Regression Issue
Expected Behavior
Should be allowed to use both OIDC and non OIDC AWS credentials flow in same action
Current Behavior
AWS auth fails as tries to go down OIDC flow
Reproduction Steps
Create job with
id-token: write
when you do not want to use the OIDC flowPossible Solution
Provide explicit OIDC option and do not reply on presence of token(option:true && webToken:true) ?
Additional Information/Context
No response
The text was updated successfully, but these errors were encountered: