Skip to content

chore(ci): side-stepping OIDC to unblock nightlies#23167

Merged
benesjan merged 1 commit into
backport-to-v4-next-stagingfrom
jb/revert-oidc-release-publish
May 12, 2026
Merged

chore(ci): side-stepping OIDC to unblock nightlies#23167
benesjan merged 1 commit into
backport-to-v4-next-stagingfrom
jb/revert-oidc-release-publish

Conversation

@benesjan
Copy link
Copy Markdown
Contributor

@benesjan benesjan commented May 12, 2026

A workaround that should hopefully unblock nightlies that are currently not getting released. For more context see this comment on slack.

Summary

  • Reverts the OIDC-based AWS auth in the ci-release-publish job back to using AWS_ACCESS_KEY_ID / AWS_SECRET_ACCESS_KEY secrets on the v4 backport line.
  • Drops the permissions: id-token: write block and the aws-actions/configure-aws-credentials step that the OIDC flow required.

Reverts OIDC-based AWS auth in the ci-release-publish job back to
access key credentials for the v4 backport branch.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
@benesjan benesjan requested a review from charlielye as a code owner May 12, 2026 07:04
@benesjan benesjan changed the title ci: revert ci-release-publish to AWS access keys chore(ci): side-stepping OIDC to unblock nightlies May 12, 2026
@benesjan benesjan requested a review from randyquaye May 12, 2026 07:12
@benesjan benesjan merged commit f75d43d into backport-to-v4-next-staging May 12, 2026
14 of 15 checks passed
@benesjan benesjan deleted the jb/revert-oidc-release-publish branch May 12, 2026 07:13
benesjan added a commit that referenced this pull request May 12, 2026
## Summary

- Drop OIDC auth from `ci-compat-e2e` and run with
`AWS_ACCESS_KEY_ID`/`AWS_SECRET_ACCESS_KEY` instead.
- The OIDC role
(`pipeline-exec-aztecprotocol-aztec-packages-heads-next`) has no
`ec2:RunInstances` policy attached, so spot requests time out and the
on-demand fallback fails with `UnauthorizedOperation`. The job has been
failing on every v4 nightly since #22930; `continue-on-error` for
`-nightly.` tags has masked it.
- Mirrors c3c1371 (#23167), which applied the same workaround to
`ci-release-publish` on this branch.

Example of the failure being patched:
https://github.com/AztecProtocol/aztec-packages/actions/runs/25737242295/job/75580441745

## Test plan

- [ ] CI3 on this PR runs to green (regular `ci` job is unaffected — it
already uses static keys).
- [ ] Apply the `ci-compat-e2e` label here to exercise the compat-e2e
job end-to-end and confirm the EC2 spot/on-demand request succeeds with
the static credentials.

🤖 Generated with [Claude Code](https://claude.com/claude-code)
rangozd pushed a commit to rangozd/aztec-packages that referenced this pull request May 16, 2026
Forward-ports AztecProtocol#23167 from the v4 backport line onto next.
Reverts OIDC-based AWS auth in the ci-release-publish job back
to access key credentials to unblock nightlies.
rangozd pushed a commit to rangozd/aztec-packages that referenced this pull request May 16, 2026
rangozd pushed a commit to rangozd/aztec-packages that referenced this pull request May 16, 2026
…3192) (AztecProtocol#23234)

## Summary
- Restores OIDC-based AWS auth in the `ci-release-publish` job,
reverting AztecProtocol#23192.
- Re-adds the `permissions: id-token: write / contents: read` block and
the `aws-actions/configure-aws-credentials` step using
`secrets.AWS_OIDC_ROLE_ARN`.
- Removes the static `AWS_ACCESS_KEY_ID` / `AWS_SECRET_ACCESS_KEY` env
vars that AztecProtocol#23192 reintroduced as a workaround.

## Context
AztecProtocol#23192 forward-ported AztecProtocol#23167 to `next` (v5) as a temporary measure to
unblock nightlies. This PR moves v5 back onto OIDC now that the
underlying issue should be resolved.

## Test plan
- [ ] Confirm a tagged release publish run on this branch authenticates
to AWS successfully via OIDC before merging.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant