|
74 | 74 | readonly TERRAFORM_STATE_BUCKET_ENTRIES=(
|
75 | 75 | "${LEGACY_CLUSTER_TERRAFORM_BUCKET}:${CLUSTER_ADMINS_GROUP}"
|
76 | 76 | k8s-infra-tf-aws: [email protected]
|
| 77 | + k8s-infra-tf-monitoring:"${CLUSTER_ADMINS_GROUP}" |
77 | 78 | k8s-infra-tf-prow-clusters: [email protected]
|
78 | 79 | k8s-infra-tf-public-clusters:"${CLUSTER_ADMINS_GROUP}"
|
79 | 80 | k8s-infra-tf-public-pii:"${CLUSTER_ADMINS_GROUP}"
|
@@ -470,28 +471,33 @@ function ensure_main_project() {
|
470 | 471 | color 6 "Ensuring specific workload identity serviceaccounts exist in: ${project}"; (
|
471 | 472 | local svcacct_args cluster_args
|
472 | 473 |
|
473 |
| - color 6 "Ensuring GCP Auditor serviceaccount" |
| 474 | + color 6 "Ensuring GCP Auditor service account" |
474 | 475 | # roles/viewer on kubernetes-public is a bootstrap; the true purpose
|
475 | 476 | # is custom role audit.viewer on the kubernetes.io org, but that is
|
476 | 477 | # handled by ensure-organization.sh
|
477 | 478 | svcacct_args=("${project}" "k8s-infra-gcp-auditor" "roles/viewer")
|
478 | 479 | cluster_args=("k8s-infra-prow-build-trusted" "${PROWJOB_POD_NAMESPACE}")
|
479 | 480 | ensure_workload_identity_serviceaccount "${svcacct_args[@]}" "${cluster_args[@]}" 2>&1 | indent
|
480 | 481 |
|
481 |
| - color 6 "Ensuring DNS Updater serviceaccount" |
| 482 | + color 6 "Ensuring DNS Updater service account" |
482 | 483 | svcacct_args=("${project}" "k8s-infra-dns-updater" "roles/dns.admin")
|
483 | 484 | cluster_args=("k8s-infra-prow-build-trusted" "${PROWJOB_POD_NAMESPACE}")
|
484 | 485 | ensure_workload_identity_serviceaccount "${svcacct_args[@]}" "${cluster_args[@]}" 2>&1 | indent
|
485 | 486 |
|
486 |
| - color 6 "Ensuring Monitoring Viewer serviceaccount" |
| 487 | + color 6 "Ensuring Monitoring Viewer service account" |
487 | 488 | svcacct_args=("${project}" "k8s-infra-monitoring-viewer" "roles/monitoring.viewer")
|
488 | 489 | cluster_args=("${project}" "monitoring")
|
489 | 490 | ensure_workload_identity_serviceaccount "${svcacct_args[@]}" "${cluster_args[@]}" 2>&1 | indent
|
490 | 491 |
|
491 |
| - color 6 "Ensuring Kubernetes External Secrets serviceaccount" |
| 492 | + color 6 "Ensuring Kubernetes External Secrets service account" |
492 | 493 | svcacct_args=("${project}" "kubernetes-external-secrets" "roles/secretmanager.secretAccessor")
|
493 | 494 | cluster_args=("${project}" "kubernetes-external-secrets")
|
494 | 495 | ensure_workload_identity_serviceaccount "${svcacct_args[@]}" "${cluster_args[@]}" 2>&1 | indent
|
| 496 | + |
| 497 | + color 6 "Ensure Monitoring Admin service account for Terraform" |
| 498 | + svcacct_args=("${project}" "tf-monitoring-deployer" "roles/monitoring.admin") |
| 499 | + cluster_args=("${project}" "${PROWJOB_POD_NAMESPACE}") |
| 500 | + ensure_workload_identity_serviceaccount "${svcacct_args[@]}" "${cluster_args[@]}" 2>&1 | indent |
495 | 501 | ) 2>&1 | indent
|
496 | 502 |
|
497 | 503 | color 6 "Ensuring DNS is configured in: ${project}"
|
|
0 commit comments