Skip to content

ci: revert ci-compat-e2e to AWS access keys#23212

Merged
benesjan merged 1 commit into
merge-train/fairiesfrom
jb/ci-revert-compat-e2e-to-keys-fairies
May 12, 2026
Merged

ci: revert ci-compat-e2e to AWS access keys#23212
benesjan merged 1 commit into
merge-train/fairiesfrom
jb/ci-revert-compat-e2e-to-keys-fairies

Conversation

@benesjan
Copy link
Copy Markdown
Contributor

Summary

Example failure from v4 line: https://github.com/AztecProtocol/aztec-packages/actions/runs/25737242295/job/75580441745

Test plan

  • CI3 on this PR runs to green.
  • Add the ci-compat-e2e label here to exercise the compat-e2e job end-to-end and confirm EC2 spot/on-demand provisioning succeeds with static credentials.

🤖 Generated with Claude Code

Reverts OIDC-based AWS auth in the ci-compat-e2e job back to access
key credentials. The OIDC role lacks ec2:RunInstances, so spot/on-demand
provisioning fails (hidden until now by continue-on-error on nightly tags).

Mirrors c3c1371 which applied the same workaround to ci-release-publish.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
@benesjan benesjan requested a review from charlielye as a code owner May 12, 2026 17:51
@benesjan benesjan merged commit e794309 into merge-train/fairies May 12, 2026
7 of 9 checks passed
@benesjan benesjan deleted the jb/ci-revert-compat-e2e-to-keys-fairies branch May 12, 2026 17:52
rangozd pushed a commit to rangozd/aztec-packages that referenced this pull request May 16, 2026
BEGIN_COMMIT_OVERRIDE
fix: dropped tagging indices no longer cause a pxe crash on sync
(AztecProtocol#23044)
feat: forward-port upstream oxide aztec-nr changes (AztecProtocol#23183)
test: add noir tests for get_note_hash_membership_witness (AztecProtocol#23190)
fix(aztec-up): explicit exit in CLI acceptance test harness (AztecProtocol#23200)
refactor(pxe): batch nullifier sync across scopes (AztecProtocol#23129)
ci: revert ci-compat-e2e to AWS access keys (AztecProtocol#23212)
END_COMMIT_OVERRIDE
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant