Troubleshooting
Common failures for the current OIDC setup.
1) Missing id-token: write
If OIDC token requests fail, ensure workflow permissions include:
permissions:
id-token: write
contents: read
2) Trust Policy Mismatch
If AssumeRoleWithWebIdentity is denied, verify values in terraform.tfvars:
github_orggithub_repositories
Then re-apply:
terraform -chdir=infra/identity apply
3) Role Has No Permissions
If authentication succeeds but AWS API calls return AccessDenied, attach required policies.
See Policy Attachment.
Quick Checks
terraform -chdir=infra/identity output role_arn
terraform -chdir=infra/identity output role_name
aws iam list-open-id-connect-providers
aws iam list-attached-role-policies --role-name <role_name>