We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 38840a3 commit 4da328bCopy full SHA for 4da328b
infra/gcp/bash/prow/ensure-e2e-projects.sh
@@ -118,12 +118,6 @@ function ensure_e2e_project() {
118
"serviceAccount:${PROW_BUILD_SVCACCT}" \
119
"roles/secretmanager.admin"
120
121
- # Ensure GCP Default Compute Engine Service Agent Account can manage Secret Manager Secrets
122
- ensure_project_role_binding "${prj}" \
123
- "serviceAccount:service-${project_number}@compute-system.iam.gserviceaccount.com" \
124
- "roles/secretmanager.admin"
125
-
126
127
# TODO: this is what prow.k8s.io uses today, but seems overprivileged, we
128
# could consider using a more limited custom IAM role instead
129
color 6 "Empower boskos-janitor service account to clean e2e project: ${prj}"
0 commit comments