You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
RFC: scope secretmanager.secrets.setIamPolicy via IAM condition (opt-in)
Add an opt-in variable scope_secret_iam_to_runner_prefix (default false,
preserving today's behavior). When set to true:
- Drop secretmanager.secrets.getIamPolicy/setIamPolicy from the runner's
project-level custom role.
- Create a small custom role runner_secret_iam_manager holding only
those two permissions, and grant it to the runner SA with an IAM
condition restricting the binding to secrets whose resource name
starts with var.runner_name.
Opt-in because the change narrows the default IAM scope, which could
break downstream deployments whose runner SAs manage IAM on
non-runner-prefixed secrets.
description="When true, moves secretmanager.secrets.{get,set}IamPolicy out of the runner's project-level custom role and into a separate role bound with an IAM condition restricting it to secrets whose name starts with var.runner_name. When false (default), the runner holds those permissions at project scope (current behavior). Opt in to narrow the runner's IAM-management blast radius on Secret Manager."
0 commit comments