Commit de62f83
committed
fix(ci-lease): add role-chaining=true on the leased-account assume step
The configure-aws-credentials@v6 action's default credential resolution
preferentially uses OIDC when an id-token is available. For the second
step in scenario-ci.yml (assuming CIDeployRole inside the leased pool
account), this caused:
Could not assume role with OIDC: No OpenIDConnect provider found
in your account for https://token.actions.githubusercontent.com
The leased pool account has no GitHub OIDC provider — we want the
action to sigv4-sign from the already-loaded hub credentials instead.
role-chaining: true forces that behavior.
The third step (switching BACK to the hub role for the release call)
keeps the default OIDC resolution: GitHub still emits an id-token
(thanks to permissions: id-token: write), and the hub role trusts the
GHA OIDC provider but not the leased-account principal.1 parent 7629a5d commit de62f83
1 file changed
Lines changed: 5 additions & 1 deletion
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
91 | 91 | | |
92 | 92 | | |
93 | 93 | | |
94 | | - | |
| 94 | + | |
| 95 | + | |
| 96 | + | |
| 97 | + | |
95 | 98 | | |
96 | 99 | | |
97 | 100 | | |
98 | 101 | | |
99 | 102 | | |
100 | 103 | | |
101 | 104 | | |
| 105 | + | |
102 | 106 | | |
103 | 107 | | |
104 | 108 | | |
| |||
0 commit comments