diff --git a/infra/gcp/bash/prow/ensure-e2e-projects.sh b/infra/gcp/bash/prow/ensure-e2e-projects.sh index 4b25cce0fef..359db190a92 100755 --- a/infra/gcp/bash/prow/ensure-e2e-projects.sh +++ b/infra/gcp/bash/prow/ensure-e2e-projects.sh @@ -72,6 +72,7 @@ function ensure_e2e_project() { file.googleapis.com \ logging.googleapis.com \ monitoring.googleapis.com \ + secretmanager.googleapis.com \ storage-component.googleapis.com # TODO: this is what prow.k8s.io uses today, but seems overprivileged, we @@ -112,6 +113,11 @@ function ensure_e2e_project() { "serviceAccount:${PROW_BUILD_SVCACCT}" \ "roles/iam.serviceAccountUser" + # Ensure GCP Default Compute Service Account can administer Secret Manager secrets + ensure_project_role_binding "${prj}" \ + "serviceAccount:${PROW_BUILD_SVCACCT}" \ + "roles/secretmanager.admin" + # TODO: this is what prow.k8s.io uses today, but seems overprivileged, we # could consider using a more limited custom IAM role instead color 6 "Empower boskos-janitor service account to clean e2e project: ${prj}"