Open
Description
I'm trying to match the GITHUB_ACTOR in my IAM trust relationship policy and cannot make it work. Is this supposed to work? The trust policy I have is:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Federated": "arn:aws:iam::00000000:oidc-provider/token.actions.githubusercontent.com"
},
"Action": "sts:AssumeRoleWithWebIdentity",
"Condition": {
"StringEquals": {
"token.actions.githubusercontent.com:actor": "tve",
"token.actions.githubusercontent.com:aud": "sts.amazonaws.com"
}
}
}
]
}
The error I get is:
Run aws-actions/configure-aws-credentials@master
Error: Not authorized to perform sts:AssumeRoleWithWebIdentity
In my workflow I print ${{ github.actor }}
and it matches what I have in the trust policy. Is there a way to get a log of the actual JWT token that IAM receives?