Description
Describe the bug
While using self-hosted runners, which already use OIDC for EKS AWS auth, the following warning is issues
To avoid using long-term AWS credentials, please update your workflows to authenticate using OpenID Connect. See https://s12d.com/gha-oidc-aws for more information.
Expected Behavior
While already using OIDC on self-hosted runners on EKS, we should not be getting warnings about not using OIDC
like so
To avoid using long-term AWS credentials, please update your workflows to authenticate using OpenID Connect. See https://s12d.com/gha-oidc-aws for more information.
Current Behavior
Getting this warning everytime even though we are using OIDC on our self-hosted runners in AWS EKS
To avoid using long-term AWS credentials, please update your workflows to authenticate using OpenID Connect. See https://s12d.com/gha-oidc-aws for more information.
Reproduction Steps
Using self-hosted runners on EKS, github actions controller + scale sets, EKS OIDC setup for runner pods
steps:
- name: Configure AWS credentials
uses: aws-actions/configure-aws-credentials@v4
with:
role-to-assume: ${{ secrets.PROD_AWS_ROLE_TO_ASSUME }}
role-duration-seconds: ${{ env.AWS_ROLE_DURATION }}
aws-region: ${{ env.AWS_REGION }}
getting
To avoid using long-term AWS credentials, please update your workflows to authenticate using OpenID Connect. See https://s12d.com/gha-oidc-aws for more information.
Possible Solution
suppress the warning
To avoid using long-term AWS credentials, please update your workflows to authenticate using OpenID Connect. See https://s12d.com/gha-oidc-aws for more information.
this happens since updating the action to v4 for the node deprecation
Additional Information/Context
No response