You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I'm trying to assume a deployment role in AWS account B using credentials in account A (GH OIDC integration) but it still tries to use GitHub OIDC WebIdentity for the second role instead of using already exposed credentials in environment variables.
[GithubAction] ---------------> [tooling_role A (limitted access)] ------------> [deployment_role B]
assume role with assume role with
configure-aws-credentials configure-aws-credentials
AWS account A AWS account B
Expected Behavior
Being able successfully assume the 2nd (non OIDC) IAM role from account B.
Current Behavior
Fails with error:
Run aws-actions/configure-aws-credentials@v1
Error: Not authorized to perform sts:AssumeRoleWithWebIdentity
I would suggest to add a parameter to force configure-aws-credentials to re-use existing AWS credentials generated by the previous invocation (account A) instead of of trying again OIDC provider for account B.
Additional Information/Context
No response
The text was updated successfully, but these errors were encountered:
Comments on closed issues are hard for our team to see.
If you need more assistance, please either tag a team member or open a new issue that references this one.
If you wish to keep having a conversation with other community members under this issue feel free to do so.
Describe the bug
I'm trying to assume a deployment role in AWS account B using credentials in account A (GH OIDC integration) but it still tries to use GitHub OIDC WebIdentity for the second role instead of using already exposed credentials in environment variables.
Expected Behavior
Being able successfully assume the 2nd (non OIDC) IAM role from account B.
Current Behavior
Fails with error:
Reproduction Steps
Possible Solution
I would suggest to add a parameter to force
configure-aws-credentials
to re-use existing AWS credentials generated by the previous invocation (account A) instead of of trying again OIDC provider for account B.Additional Information/Context
No response
The text was updated successfully, but these errors were encountered: