File tree Expand file tree Collapse file tree 2 files changed +15
-2
lines changed Expand file tree Collapse file tree 2 files changed +15
-2
lines changed Original file line number Diff line number Diff line change @@ -72,7 +72,8 @@ function ensure_e2e_project() {
72
72
file.googleapis.com \
73
73
logging.googleapis.com \
74
74
monitoring.googleapis.com \
75
- storage-component.googleapis.com
75
+ storage-component.googleapis.com \
76
+ secretmanager.googleapis.com
76
77
77
78
# TODO: this is what prow.k8s.io uses today, but seems overprivileged, we
78
79
# could consider using a more limited custom IAM role instead
@@ -112,6 +113,17 @@ function ensure_e2e_project() {
112
113
" serviceAccount:${PROW_BUILD_SVCACCT} " \
113
114
" roles/iam.serviceAccountUser"
114
115
116
+ # Ensure GCP Default Compute Service Account can administer Secret Manager secrets
117
+ ensure_project_role_binding " ${prj} " \
118
+ " serviceAccount:${PROW_BUILD_SVCACCT} " \
119
+ " roles/secretmanager.admin"
120
+
121
+ # Ensure GCP Default Compute Engine Service Agent Account can manage Secret Manager Secrets
122
+ ensure_project_role_binding " ${prj} " \
123
+ " serviceAccount:service-${project_number} @compute-system.iam.gserviceaccount.com" \
124
+ " roles/secretmanager.admin"
125
+
126
+
115
127
# TODO: this is what prow.k8s.io uses today, but seems overprivileged, we
116
128
# could consider using a more limited custom IAM role instead
117
129
color 6 " Empower boskos-janitor service account to clean e2e project: ${prj} "
Original file line number Diff line number Diff line change @@ -40,6 +40,7 @@ module "project" {
40
40
" certificatemanager.googleapis.com" ,
41
41
" artifactregistry.googleapis.com" ,
42
42
" secretmanager.googleapis.com" ,
43
- " cloudbuild.googleapis.com"
43
+ " cloudbuild.googleapis.com" ,
44
+ " secretmanager.googleapis.com" ,
44
45
]
45
46
}
You can’t perform that action at this time.
0 commit comments