From c5a43c32e1873343614c533eb83ffabbe5bc53bc Mon Sep 17 00:00:00 2001 From: GitHub Actions Date: Sat, 30 Aug 2025 00:25:47 +0000 Subject: [PATCH] chore: Update dist --- dist/index.js | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/dist/index.js b/dist/index.js index 24bdf9f..710fa75 100644 --- a/dist/index.js +++ b/dist/index.js @@ -578,6 +578,10 @@ async function run() { const specialCharacterWorkaround = (0, helpers_1.getBooleanInput)('special-characters-workaround', { required: false }); const useExistingCredentials = core.getInput('use-existing-credentials', { required: false }); let maxRetries = Number.parseInt(core.getInput('retry-max-attempts', { required: false })) || 12; + const forceSkipOidc = (0, helpers_1.getBooleanInput)('force-skip-oidc', { required: false }); + if (forceSkipOidc && roleToAssume && !AccessKeyId && !webIdentityTokenFile) { + throw new Error("If 'force-skip-oidc' is true and 'role-to-assume' is set, 'aws-access-key-id' or 'web-identity-token-file' must be set"); + } if (specialCharacterWorkaround) { // 😳 disableRetry = false; @@ -588,6 +592,8 @@ async function run() { } // Logic to decide whether to attempt to use OIDC or not const useGitHubOIDCProvider = () => { + if (forceSkipOidc) + return false; // The `ACTIONS_ID_TOKEN_REQUEST_TOKEN` environment variable is set when the `id-token` permission is granted. // This is necessary to authenticate with OIDC, but not strictly set just for OIDC. If it is not set and all other // checks pass, it is likely but not guaranteed that the user needs but lacks this permission in their workflow.