@@ -91,7 +91,7 @@ readonly PROD_PROJECT_DISABLED_SERVICES=(
91
91
# Regions for prod GCR.
92
92
GCR_PROD_REGIONS=(us eu asia)
93
93
# Regions for prod AR.
94
- AR_PROD_REGIONS=(asia-east1 asia-south1 asia-northeast1 asia-northeast2 australia-southeast1 europe-north1 europe-southeast1 europe-west1 europe-west2 europe-west4 europe-west8 europe-west9 southamerica-west1 us-central1 us-east1 us-east4 us-east5 us-south1 us-west1 us-west2)
94
+ AR_PROD_REGIONS=(asia-east1 asia-south1 asia-northeast1 asia-northeast2 australia-southeast1 europe-north1 europe-southwest1 europe-west1 europe-west2 europe-west4 europe-west8 europe-west9 southamerica-west1 us-central1 us-east1 us-east4 us-east5 us-south1 us-west1 us-west2)
95
95
96
96
# Minimum time we expect to keep prod GCS artifacts.
97
97
PROD_RETENTION=" 10y"
@@ -116,7 +116,7 @@ function ensure_prod_gcr() {
116
116
117
117
color 6 " Ensuring GCR admins can admin GCR in region: ${region} for project: ${project} "
118
118
empower_gcr_admins " ${project} " " ${region} "
119
-
119
+
120
120
color 6 " Empowering image promoter for region: ${region} in project: ${project} "
121
121
empower_image_promoter " ${project} " " ${region} "
122
122
@@ -145,10 +145,10 @@ function ensure_prod_ar() {
145
145
146
146
color 6 " Ensuring GCR admins can admin AR in location: ${region} for project: ${project} "
147
147
empower_ar_admins " ${project} " " ${region} "
148
-
148
+
149
149
color 6 " Empowering image promoter with roles/artifactregistry.repoAdmin in project: ${project} "
150
150
serviceaccount=$( svc_acct_email " ${project} " " ${IMAGE_PROMOTER_SVCACCT} " )
151
- ensure_project_role_binding " ${project} " " serviceAccount:$serviceaccount " " artifactregistry.repoAdmin"
151
+ ensure_project_role_binding " ${project} " " serviceAccount:$serviceaccount " " roles/ artifactregistry.repoAdmin"
152
152
done 2>&1 | indent
153
153
}
154
154
@@ -399,7 +399,7 @@ function ensure_all_prod_special_cases() {
399
399
color 6 " Ensuring GKE clusters in '${project} ' can run pods in '${PROWJOB_POD_NAMESPACE} ' as '${serviceaccount} '"
400
400
empower_gke_for_serviceaccount \
401
401
" ${project} " " ${PROWJOB_POD_NAMESPACE} " \
402
- " ${serviceaccount} " " k8s-infra-gcr-vuln-scanning"
402
+ " ${serviceaccount} " " k8s-infra-gcr-vuln-scanning"
403
403
done
404
404
405
405
# For write access to:
0 commit comments