Skip to content

Commit d43f671

Browse files
benesjanclaude
andcommitted
ci: revert ci-compat-e2e to AWS access keys
Reverts OIDC-based AWS auth in the ci-compat-e2e job back to access key credentials. The OIDC role lacks ec2:RunInstances, so spot/on-demand provisioning fails (hidden until now by continue-on-error on nightly tags). Mirrors c3c1371 which applied the same workaround to ci-release-publish. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
1 parent a6ea7af commit d43f671

1 file changed

Lines changed: 2 additions & 11 deletions

File tree

.github/workflows/ci3.yml

Lines changed: 2 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -298,9 +298,6 @@ jobs:
298298
# Escape hatch: ci-skip-compat-e2e label makes failures non-blocking on release PRs.
299299
ci-compat-e2e:
300300
runs-on: ubuntu-latest
301-
permissions:
302-
id-token: write
303-
contents: read
304301
needs: [ci]
305302
if: |
306303
always()
@@ -320,17 +317,11 @@ jobs:
320317
with:
321318
ref: ${{ github.event.pull_request.head.sha || github.sha }}
322319

323-
- name: Configure AWS credentials (OIDC)
324-
uses: aws-actions/configure-aws-credentials@v4
325-
with:
326-
role-to-assume: ${{ secrets.AWS_OIDC_ROLE_ARN }}
327-
aws-region: us-east-2
328-
role-session-name: ci3-compat-e2e-${{ github.run_id }}
329-
role-duration-seconds: 21600 # 6h – covers AWS_SHUTDOWN_TIME (300 min) + 60 min buffer
330-
331320
- name: Run Backwards Compatibility E2E Tests
332321
timeout-minutes: 330
333322
env:
323+
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}
324+
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
334325
GITHUB_TOKEN: ${{ secrets.AZTEC_BOT_GITHUB_TOKEN }}
335326
BUILD_INSTANCE_SSH_KEY: ${{ secrets.BUILD_INSTANCE_SSH_KEY }}
336327
GCP_SA_KEY: ${{ secrets.GCP_SA_KEY }}

0 commit comments

Comments
 (0)