-
Notifications
You must be signed in to change notification settings - Fork 563
Upgrading from v5 to v6 breaks OIDC role assumption in reusable workflows #1707
Copy link
Copy link
Open
Labels
bugSomething isn't workingSomething isn't workingclosing-soonThis issue will automatically close in 2 days unless further comments are made.This issue will automatically close in 2 days unless further comments are made.p1response-requestedWaiting on additional info and feedback. Will move to 'closing-soon' in 5 days.Waiting on additional info and feedback. Will move to 'closing-soon' in 5 days.
Description
Description
After upgrading from aws-actions/configure-aws-credentials v5 to v6, OIDC role assumption fails in reusable workflows with the error:
Could not assume role with OIDC: Not authorized to perform sts:AssumeRoleWithWebIdentity
The action retries 12 times with exponential backoff before failing. No changes were made to IAM trust policies or role configurations — the only change was the action version upgrade.
Setup
We use this action inside reusable workflows called from multiple repositories. The calling workflow has:
permissions:
id-token: write
contents: readThe reusable workflow invokes the action as:
- uses: aws-actions/configure-aws-credentials@v6
with:
role-to-assume: arn:aws:iam::<account-id>:role/<role-name>
aws-region: eu-west-1
role-duration-seconds: 3600
audience: sts.amazonaws.comSteps to reproduce
- Have a working setup using
aws-actions/configure-aws-credentials@v5with OIDC inside a reusable workflow - Upgrade to
aws-actions/configure-aws-credentials@v6 - Run the workflow — OIDC role assumption fails
Expected behavior
Role assumption via OIDC should work the same as v5 without requiring changes to IAM trust policies.
Actual behavior
The action logs "Assuming role with OIDC" 12 times (retry mechanism) and then fails with:
Could not assume role with OIDC: Not authorized to perform sts:AssumeRoleWithWebIdentity
Logs
2026-03-25T15:54:06.8567018Z Assuming role with OIDC
2026-03-25T15:54:07.2147151Z Assuming role with OIDC
2026-03-25T15:54:07.3317433Z Assuming role with OIDC
... (12 retries with exponential backoff)
2026-03-25T15:56:41.3430774Z ##[error]Could not assume role with OIDC: Not authorized to perform sts:AssumeRoleWithWebIdentity
Environment
- Runner:
ubuntu-24.04 - Working version:
aws-actions/configure-aws-credentials@v5(node20) - Broken version:
aws-actions/configure-aws-credentials@v6(node24) - Context: Action is called inside a reusable workflow (
uses: org/repo/.github/workflows/plan.yml@tag)
Questions
- Did v6 change anything about how the OIDC token is requested or its claims (e.g.,
sub,aud)? - Are there required changes to IAM trust policies when upgrading from v5 to v6?
- Is there a known issue with v6 and reusable workflows specifically?
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
bugSomething isn't workingSomething isn't workingclosing-soonThis issue will automatically close in 2 days unless further comments are made.This issue will automatically close in 2 days unless further comments are made.p1response-requestedWaiting on additional info and feedback. Will move to 'closing-soon' in 5 days.Waiting on additional info and feedback. Will move to 'closing-soon' in 5 days.