Skip to content

Commit 80fe2ec

Browse files
authored
fix(ci): revert ci-compat-e2e to AWS access keys (#23211)
## Summary - Drop OIDC auth from `ci-compat-e2e` and run with `AWS_ACCESS_KEY_ID`/`AWS_SECRET_ACCESS_KEY` instead. - The OIDC role (`pipeline-exec-aztecprotocol-aztec-packages-heads-next`) has no `ec2:RunInstances` policy attached, so spot requests time out and the on-demand fallback fails with `UnauthorizedOperation`. The job has been failing on every v4 nightly since #22930; `continue-on-error` for `-nightly.` tags has masked it. - Mirrors c3c1371 (#23167), which applied the same workaround to `ci-release-publish` on this branch. Example of the failure being patched: https://github.com/AztecProtocol/aztec-packages/actions/runs/25737242295/job/75580441745 ## Test plan - [ ] CI3 on this PR runs to green (regular `ci` job is unaffected — it already uses static keys). - [ ] Apply the `ci-compat-e2e` label here to exercise the compat-e2e job end-to-end and confirm the EC2 spot/on-demand request succeeds with the static credentials. 🤖 Generated with [Claude Code](https://claude.com/claude-code)
2 parents 9760bcf + 7a4df18 commit 80fe2ec

1 file changed

Lines changed: 2 additions & 11 deletions

File tree

.github/workflows/ci3.yml

Lines changed: 2 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -298,9 +298,6 @@ jobs:
298298
# Escape hatch: ci-skip-compat-e2e label makes failures non-blocking on release PRs.
299299
ci-compat-e2e:
300300
runs-on: ubuntu-latest
301-
permissions:
302-
id-token: write
303-
contents: read
304301
needs: [ci]
305302
if: |
306303
always()
@@ -320,17 +317,11 @@ jobs:
320317
with:
321318
ref: ${{ github.event.pull_request.head.sha || github.sha }}
322319

323-
- name: Configure AWS credentials (OIDC)
324-
uses: aws-actions/configure-aws-credentials@v4
325-
with:
326-
role-to-assume: ${{ secrets.AWS_OIDC_ROLE_ARN }}
327-
aws-region: us-east-2
328-
role-session-name: ci3-compat-e2e-${{ github.run_id }}
329-
role-duration-seconds: 21600 # 6h – covers AWS_SHUTDOWN_TIME (300 min) + 60 min buffer
330-
331320
- name: Run Backwards Compatibility E2E Tests
332321
timeout-minutes: 330
333322
env:
323+
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}
324+
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
334325
GITHUB_TOKEN: ${{ secrets.AZTEC_BOT_GITHUB_TOKEN }}
335326
BUILD_INSTANCE_SSH_KEY: ${{ secrets.BUILD_INSTANCE_SSH_KEY }}
336327
GCP_SA_KEY: ${{ secrets.GCP_SA_KEY }}

0 commit comments

Comments
 (0)