From e849e223b831f168fecb9dfd2ec6fc8854c8f67b Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Wed, 6 May 2020 16:19:37 -0700 Subject: [PATCH 01/14] audit: remove fingerprint from project-info --- .../k8s-artifacts-prod-bak/services/compute/project-info.json | 1 - .../k8s-artifacts-prod/services/compute/project-info.json | 1 - .../k8s-cip-test-prod/services/compute/project-info.json | 1 - .../k8s-conform/buckets/k8s-conform-capi-openstack/iam.json | 1 - audit/projects/k8s-conform/buckets/k8s-conform-cri-o/iam.json | 1 - .../k8s-conform/buckets/k8s-conform-huaweicloud/iam.json | 1 - audit/projects/k8s-conform/services/compute/project-info.json | 1 - .../k8s-gcr-audit-test-prod/services/compute/project-info.json | 1 - .../services/compute/project-info.json | 1 - .../k8s-release-test-prod/services/compute/project-info.json | 1 - .../k8s-sig-release-prototype/services/compute/project-info.json | 1 - .../services/compute/project-info.json | 1 - .../k8s-staging-cip-test/services/compute/project-info.json | 1 - .../services/compute/project-info.json | 1 - .../k8s-staging-cluster-api/services/compute/project-info.json | 1 - .../k8s-staging-coredns/services/compute/project-info.json | 1 - .../projects/k8s-staging-csi/services/compute/project-info.json | 1 - .../k8s-staging-release-test/services/compute/project-info.json | 1 - 18 files changed, 18 deletions(-) diff --git a/audit/projects/k8s-artifacts-prod-bak/services/compute/project-info.json b/audit/projects/k8s-artifacts-prod-bak/services/compute/project-info.json index b2933a79be0..19a275944ca 100644 --- a/audit/projects/k8s-artifacts-prod-bak/services/compute/project-info.json +++ b/audit/projects/k8s-artifacts-prod-bak/services/compute/project-info.json @@ -1,6 +1,5 @@ { "commonInstanceMetadata": { - "fingerprint": "50Ep9X_GNF8=", "kind": "compute#metadata" }, "creationTimestamp": "2019-11-07T14:51:20.026-08:00", diff --git a/audit/projects/k8s-artifacts-prod/services/compute/project-info.json b/audit/projects/k8s-artifacts-prod/services/compute/project-info.json index 5c4a0fe5e5e..91225265a16 100644 --- a/audit/projects/k8s-artifacts-prod/services/compute/project-info.json +++ b/audit/projects/k8s-artifacts-prod/services/compute/project-info.json @@ -1,6 +1,5 @@ { "commonInstanceMetadata": { - "fingerprint": "xd6oEEv3fyc=", "kind": "compute#metadata" }, "creationTimestamp": "2019-04-30T17:34:01.258-07:00", diff --git a/audit/projects/k8s-cip-test-prod/services/compute/project-info.json b/audit/projects/k8s-cip-test-prod/services/compute/project-info.json index 78271561979..3791ceda65d 100644 --- a/audit/projects/k8s-cip-test-prod/services/compute/project-info.json +++ b/audit/projects/k8s-cip-test-prod/services/compute/project-info.json @@ -1,6 +1,5 @@ { "commonInstanceMetadata": { - "fingerprint": "UfHkfNxgGBI=", "kind": "compute#metadata" }, "creationTimestamp": "2019-04-03T14:53:39.477-07:00", diff --git a/audit/projects/k8s-conform/buckets/k8s-conform-capi-openstack/iam.json b/audit/projects/k8s-conform/buckets/k8s-conform-capi-openstack/iam.json index 53ffff10c1d..2dbaed00222 100644 --- a/audit/projects/k8s-conform/buckets/k8s-conform-capi-openstack/iam.json +++ b/audit/projects/k8s-conform/buckets/k8s-conform-capi-openstack/iam.json @@ -10,7 +10,6 @@ }, { "members": [ - "group:k8s-infra-conform-capi-openstack@kubernetes.io", "projectViewer:k8s-conform" ], "role": "roles/storage.legacyBucketReader" diff --git a/audit/projects/k8s-conform/buckets/k8s-conform-cri-o/iam.json b/audit/projects/k8s-conform/buckets/k8s-conform-cri-o/iam.json index 73f06739f60..4e372422b0c 100644 --- a/audit/projects/k8s-conform/buckets/k8s-conform-cri-o/iam.json +++ b/audit/projects/k8s-conform/buckets/k8s-conform-cri-o/iam.json @@ -10,7 +10,6 @@ }, { "members": [ - "group:k8s-infra-conform-cri-o@kubernetes.io", "projectViewer:k8s-conform" ], "role": "roles/storage.legacyBucketReader" diff --git a/audit/projects/k8s-conform/buckets/k8s-conform-huaweicloud/iam.json b/audit/projects/k8s-conform/buckets/k8s-conform-huaweicloud/iam.json index 525838b9582..b206c8dd679 100644 --- a/audit/projects/k8s-conform/buckets/k8s-conform-huaweicloud/iam.json +++ b/audit/projects/k8s-conform/buckets/k8s-conform-huaweicloud/iam.json @@ -10,7 +10,6 @@ }, { "members": [ - "group:k8s-infra-conform-huaweicloud@kubernetes.io", "projectViewer:k8s-conform" ], "role": "roles/storage.legacyBucketReader" diff --git a/audit/projects/k8s-conform/services/compute/project-info.json b/audit/projects/k8s-conform/services/compute/project-info.json index 8e8624a50e2..03cbacf6b8a 100644 --- a/audit/projects/k8s-conform/services/compute/project-info.json +++ b/audit/projects/k8s-conform/services/compute/project-info.json @@ -1,6 +1,5 @@ { "commonInstanceMetadata": { - "fingerprint": "35mF2_0RbC0=", "kind": "compute#metadata" }, "creationTimestamp": "2020-02-23T20:52:52.389-08:00", diff --git a/audit/projects/k8s-gcr-audit-test-prod/services/compute/project-info.json b/audit/projects/k8s-gcr-audit-test-prod/services/compute/project-info.json index d1696411d80..99caf565124 100644 --- a/audit/projects/k8s-gcr-audit-test-prod/services/compute/project-info.json +++ b/audit/projects/k8s-gcr-audit-test-prod/services/compute/project-info.json @@ -1,6 +1,5 @@ { "commonInstanceMetadata": { - "fingerprint": "Wf_8sE-rVik=", "kind": "compute#metadata" }, "creationTimestamp": "2020-01-17T13:01:23.557-08:00", diff --git a/audit/projects/k8s-gcr-backup-test-prod-bak/services/compute/project-info.json b/audit/projects/k8s-gcr-backup-test-prod-bak/services/compute/project-info.json index 8f96a567ffa..f52ef068901 100644 --- a/audit/projects/k8s-gcr-backup-test-prod-bak/services/compute/project-info.json +++ b/audit/projects/k8s-gcr-backup-test-prod-bak/services/compute/project-info.json @@ -1,6 +1,5 @@ { "commonInstanceMetadata": { - "fingerprint": "-KEiFQTAaB8=", "kind": "compute#metadata" }, "creationTimestamp": "2020-03-31T09:59:07.569-07:00", diff --git a/audit/projects/k8s-release-test-prod/services/compute/project-info.json b/audit/projects/k8s-release-test-prod/services/compute/project-info.json index 400fdebf325..7e6274812b4 100644 --- a/audit/projects/k8s-release-test-prod/services/compute/project-info.json +++ b/audit/projects/k8s-release-test-prod/services/compute/project-info.json @@ -1,6 +1,5 @@ { "commonInstanceMetadata": { - "fingerprint": "LgsOJFVSiSo=", "kind": "compute#metadata" }, "creationTimestamp": "2019-07-10T09:51:44.043-07:00", diff --git a/audit/projects/k8s-sig-release-prototype/services/compute/project-info.json b/audit/projects/k8s-sig-release-prototype/services/compute/project-info.json index 790294003bb..efb2644cff6 100644 --- a/audit/projects/k8s-sig-release-prototype/services/compute/project-info.json +++ b/audit/projects/k8s-sig-release-prototype/services/compute/project-info.json @@ -1,6 +1,5 @@ { "commonInstanceMetadata": { - "fingerprint": "HnZ_idRvtzU=", "kind": "compute#metadata" }, "creationTimestamp": "2019-04-26T14:38:56.004-07:00", diff --git a/audit/projects/k8s-staging-capi-openstack/services/compute/project-info.json b/audit/projects/k8s-staging-capi-openstack/services/compute/project-info.json index 2b4fd43a514..b05cd432178 100644 --- a/audit/projects/k8s-staging-capi-openstack/services/compute/project-info.json +++ b/audit/projects/k8s-staging-capi-openstack/services/compute/project-info.json @@ -1,6 +1,5 @@ { "commonInstanceMetadata": { - "fingerprint": "2V_n2_NHb1E=", "kind": "compute#metadata" }, "creationTimestamp": "2019-09-11T13:09:53.115-07:00", diff --git a/audit/projects/k8s-staging-cip-test/services/compute/project-info.json b/audit/projects/k8s-staging-cip-test/services/compute/project-info.json index 0b03b63e6b6..a9c99a8f72e 100644 --- a/audit/projects/k8s-staging-cip-test/services/compute/project-info.json +++ b/audit/projects/k8s-staging-cip-test/services/compute/project-info.json @@ -1,6 +1,5 @@ { "commonInstanceMetadata": { - "fingerprint": "ozsoULwaXWk=", "kind": "compute#metadata" }, "creationTimestamp": "2019-04-05T15:41:27.369-07:00", diff --git a/audit/projects/k8s-staging-cluster-api-aws/services/compute/project-info.json b/audit/projects/k8s-staging-cluster-api-aws/services/compute/project-info.json index e341676b7bd..498c14ab7af 100644 --- a/audit/projects/k8s-staging-cluster-api-aws/services/compute/project-info.json +++ b/audit/projects/k8s-staging-cluster-api-aws/services/compute/project-info.json @@ -1,6 +1,5 @@ { "commonInstanceMetadata": { - "fingerprint": "J7yA_jmPo3A=", "kind": "compute#metadata" }, "creationTimestamp": "2019-07-24T09:10:39.578-07:00", diff --git a/audit/projects/k8s-staging-cluster-api/services/compute/project-info.json b/audit/projects/k8s-staging-cluster-api/services/compute/project-info.json index 1dc8c29df52..f51a95b0bb5 100644 --- a/audit/projects/k8s-staging-cluster-api/services/compute/project-info.json +++ b/audit/projects/k8s-staging-cluster-api/services/compute/project-info.json @@ -1,6 +1,5 @@ { "commonInstanceMetadata": { - "fingerprint": "g52AH0mi4x0=", "kind": "compute#metadata" }, "creationTimestamp": "2019-04-05T15:41:49.921-07:00", diff --git a/audit/projects/k8s-staging-coredns/services/compute/project-info.json b/audit/projects/k8s-staging-coredns/services/compute/project-info.json index 0515977e512..4cbec8e605d 100644 --- a/audit/projects/k8s-staging-coredns/services/compute/project-info.json +++ b/audit/projects/k8s-staging-coredns/services/compute/project-info.json @@ -1,6 +1,5 @@ { "commonInstanceMetadata": { - "fingerprint": "bFnjN94_SJY=", "kind": "compute#metadata" }, "creationTimestamp": "2019-02-11T15:03:46.669-08:00", diff --git a/audit/projects/k8s-staging-csi/services/compute/project-info.json b/audit/projects/k8s-staging-csi/services/compute/project-info.json index 3f07b1ef7e6..55481834cfa 100644 --- a/audit/projects/k8s-staging-csi/services/compute/project-info.json +++ b/audit/projects/k8s-staging-csi/services/compute/project-info.json @@ -1,6 +1,5 @@ { "commonInstanceMetadata": { - "fingerprint": "KHOaT-1umbs=", "kind": "compute#metadata" }, "creationTimestamp": "2019-04-05T15:41:40.479-07:00", diff --git a/audit/projects/k8s-staging-release-test/services/compute/project-info.json b/audit/projects/k8s-staging-release-test/services/compute/project-info.json index b98fc3aebce..a00882a0f30 100644 --- a/audit/projects/k8s-staging-release-test/services/compute/project-info.json +++ b/audit/projects/k8s-staging-release-test/services/compute/project-info.json @@ -1,6 +1,5 @@ { "commonInstanceMetadata": { - "fingerprint": "tFYmGmCn1bc=", "kind": "compute#metadata" }, "creationTimestamp": "2019-10-23T15:49:20.671-07:00", From 66e91537c6f5dc3ff87764bfec13fad9ffad2263 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Wed, 6 May 2020 16:27:27 -0700 Subject: [PATCH 02/14] audit: give gcb-builder svcacct permissions same permissions as deployer@k8s-prow --- audit/projects/k8s-release-test-prod/iam.json | 3 ++- .../buckets/k8s-staging-apisnoop-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-apisnoop/iam.json | 3 ++- .../buckets/k8s-staging-artifact-promoter-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-artifact-promoter/iam.json | 3 ++- .../buckets/k8s-staging-autoscaling-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-autoscaling/iam.json | 3 ++- .../buckets/k8s-staging-build-image-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-build-image/iam.json | 3 ++- .../buckets/k8s-staging-capi-docker-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-capi-docker/iam.json | 3 ++- .../buckets/k8s-staging-capi-kubeadm-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-capi-kubeadm/iam.json | 3 ++- .../buckets/k8s-staging-capi-openstack-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-capi-openstack/iam.json | 3 ++- .../buckets/k8s-staging-capi-vsphere-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-capi-vsphere/iam.json | 3 ++- .../buckets/k8s-staging-cip-test-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-cip-test/iam.json | 3 ++- .../buckets/k8s-staging-cluster-api-aws-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-cluster-api-aws/iam.json | 3 ++- .../buckets/k8s-staging-cluster-api-azure-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-cluster-api-azure/iam.json | 3 ++- .../buckets/k8s-staging-cluster-api-do-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-cluster-api-do/iam.json | 3 ++- .../buckets/k8s-staging-cluster-api-gcp-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-cluster-api-gcp/iam.json | 3 ++- .../buckets/k8s-staging-cluster-api-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-cluster-api/iam.json | 3 ++- .../artifacts.k8s-staging-coredns.appspot.com/iam.json | 6 ++++++ .../buckets/k8s-staging-coredns-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-coredns/iam.json | 3 ++- .../k8s-staging-cpa/buckets/k8s-staging-cpa-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-cpa/iam.json | 3 ++- .../buckets/k8s-staging-csi-secrets-store-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-csi-secrets-store/iam.json | 3 ++- .../k8s-staging-csi/buckets/k8s-staging-csi-gcb/iam.json | 6 ++++-- .../buckets/k8s-staging-descheduler-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-descheduler/iam.json | 3 ++- .../k8s-staging-dns/buckets/k8s-staging-dns-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-dns/iam.json | 3 ++- .../buckets/k8s-staging-e2e-test-images-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-e2e-test-images/iam.json | 3 ++- .../k8s-staging-etcd/buckets/k8s-staging-etcd-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-etcd/iam.json | 3 ++- .../buckets/k8s-staging-external-dns-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-external-dns/iam.json | 3 ++- .../buckets/k8s-staging-kas-network-proxy-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-kas-network-proxy/iam.json | 3 ++- .../k8s-staging-kind/buckets/k8s-staging-kind-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-kind/iam.json | 3 ++- .../buckets/artifacts.k8s-staging-kops.appspot.com/iam.json | 6 ++++++ .../k8s-staging-kops/buckets/k8s-staging-kops-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-kops/iam.json | 3 ++- .../buckets/k8s-staging-kube-state-metrics-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-kube-state-metrics/iam.json | 3 ++- .../buckets/k8s-staging-kubeadm-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-kubeadm/iam.json | 3 ++- .../buckets/k8s-staging-kubernetes-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-kubernetes/iam.json | 3 ++- .../buckets/k8s-staging-metrics-server-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-metrics-server/iam.json | 3 ++- .../buckets/k8s-staging-multitenancy-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-multitenancy/iam.json | 3 ++- .../k8s-staging-nfd/buckets/k8s-staging-nfd-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-nfd/iam.json | 3 ++- .../k8s-staging-npd/buckets/k8s-staging-npd-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-npd/iam.json | 3 ++- .../buckets/k8s-staging-provider-azure-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-provider-azure/iam.json | 3 ++- .../buckets/k8s-staging-publishing-bot-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-publishing-bot/iam.json | 3 ++- audit/projects/k8s-staging-release-test/iam.json | 3 ++- .../buckets/k8s-staging-releng-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-releng/iam.json | 3 ++- .../buckets/k8s-staging-scl-image-builder-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-scl-image-builder/iam.json | 3 ++- .../buckets/k8s-staging-service-apis-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-service-apis/iam.json | 3 ++- .../buckets/k8s-staging-txtdirect-gcb/iam.json | 6 ++++-- audit/projects/k8s-staging-txtdirect/iam.json | 3 ++- 81 files changed, 248 insertions(+), 118 deletions(-) diff --git a/audit/projects/k8s-release-test-prod/iam.json b/audit/projects/k8s-release-test-prod/iam.json index 57163a12d0d..e3015f3ed6f 100644 --- a/audit/projects/k8s-release-test-prod/iam.json +++ b/audit/projects/k8s-release-test-prod/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:925892675446@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-apisnoop/buckets/k8s-staging-apisnoop-gcb/iam.json b/audit/projects/k8s-staging-apisnoop/buckets/k8s-staging-apisnoop-gcb/iam.json index 7419d9295fd..0b16243a3a0 100644 --- a/audit/projects/k8s-staging-apisnoop/buckets/k8s-staging-apisnoop-gcb/iam.json +++ b/audit/projects/k8s-staging-apisnoop/buckets/k8s-staging-apisnoop-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-apisnoop/iam.json b/audit/projects/k8s-staging-apisnoop/iam.json index e0c16615dbe..d20466d570d 100644 --- a/audit/projects/k8s-staging-apisnoop/iam.json +++ b/audit/projects/k8s-staging-apisnoop/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:782271650518@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-artifact-promoter/buckets/k8s-staging-artifact-promoter-gcb/iam.json b/audit/projects/k8s-staging-artifact-promoter/buckets/k8s-staging-artifact-promoter-gcb/iam.json index 92ea46d66c9..3b509f709a3 100644 --- a/audit/projects/k8s-staging-artifact-promoter/buckets/k8s-staging-artifact-promoter-gcb/iam.json +++ b/audit/projects/k8s-staging-artifact-promoter/buckets/k8s-staging-artifact-promoter-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-artifact-promoter/iam.json b/audit/projects/k8s-staging-artifact-promoter/iam.json index 30c0d07f9fb..09b20857dc9 100644 --- a/audit/projects/k8s-staging-artifact-promoter/iam.json +++ b/audit/projects/k8s-staging-artifact-promoter/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:675573440409@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-autoscaling/buckets/k8s-staging-autoscaling-gcb/iam.json b/audit/projects/k8s-staging-autoscaling/buckets/k8s-staging-autoscaling-gcb/iam.json index 037c8e366ad..a7ea2603ec4 100644 --- a/audit/projects/k8s-staging-autoscaling/buckets/k8s-staging-autoscaling-gcb/iam.json +++ b/audit/projects/k8s-staging-autoscaling/buckets/k8s-staging-autoscaling-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-autoscaling/iam.json b/audit/projects/k8s-staging-autoscaling/iam.json index 3d0edaa6153..125f773fb4b 100644 --- a/audit/projects/k8s-staging-autoscaling/iam.json +++ b/audit/projects/k8s-staging-autoscaling/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:371644685964@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-build-image/buckets/k8s-staging-build-image-gcb/iam.json b/audit/projects/k8s-staging-build-image/buckets/k8s-staging-build-image-gcb/iam.json index 61dc6586687..c7f000af3ac 100644 --- a/audit/projects/k8s-staging-build-image/buckets/k8s-staging-build-image-gcb/iam.json +++ b/audit/projects/k8s-staging-build-image/buckets/k8s-staging-build-image-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-build-image/iam.json b/audit/projects/k8s-staging-build-image/iam.json index c1bc2d5eb95..0c5f014c3c6 100644 --- a/audit/projects/k8s-staging-build-image/iam.json +++ b/audit/projects/k8s-staging-build-image/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:960211007710@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-capi-docker/buckets/k8s-staging-capi-docker-gcb/iam.json b/audit/projects/k8s-staging-capi-docker/buckets/k8s-staging-capi-docker-gcb/iam.json index 86b2d303bf5..0ea1228a316 100644 --- a/audit/projects/k8s-staging-capi-docker/buckets/k8s-staging-capi-docker-gcb/iam.json +++ b/audit/projects/k8s-staging-capi-docker/buckets/k8s-staging-capi-docker-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-capi-docker/iam.json b/audit/projects/k8s-staging-capi-docker/iam.json index 61c9c36311f..9c71f631150 100644 --- a/audit/projects/k8s-staging-capi-docker/iam.json +++ b/audit/projects/k8s-staging-capi-docker/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:44019431644@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-capi-kubeadm/buckets/k8s-staging-capi-kubeadm-gcb/iam.json b/audit/projects/k8s-staging-capi-kubeadm/buckets/k8s-staging-capi-kubeadm-gcb/iam.json index 18da72a8dac..7203e40dd76 100644 --- a/audit/projects/k8s-staging-capi-kubeadm/buckets/k8s-staging-capi-kubeadm-gcb/iam.json +++ b/audit/projects/k8s-staging-capi-kubeadm/buckets/k8s-staging-capi-kubeadm-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-capi-kubeadm/iam.json b/audit/projects/k8s-staging-capi-kubeadm/iam.json index fea84f99521..fd1a2e5a2fd 100644 --- a/audit/projects/k8s-staging-capi-kubeadm/iam.json +++ b/audit/projects/k8s-staging-capi-kubeadm/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:778608689920@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-capi-openstack/buckets/k8s-staging-capi-openstack-gcb/iam.json b/audit/projects/k8s-staging-capi-openstack/buckets/k8s-staging-capi-openstack-gcb/iam.json index 6ae25fb7434..496d566d199 100644 --- a/audit/projects/k8s-staging-capi-openstack/buckets/k8s-staging-capi-openstack-gcb/iam.json +++ b/audit/projects/k8s-staging-capi-openstack/buckets/k8s-staging-capi-openstack-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-capi-openstack/iam.json b/audit/projects/k8s-staging-capi-openstack/iam.json index 6c1cbef6e59..0bec1d7cb8b 100644 --- a/audit/projects/k8s-staging-capi-openstack/iam.json +++ b/audit/projects/k8s-staging-capi-openstack/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:129051311436@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-capi-vsphere/buckets/k8s-staging-capi-vsphere-gcb/iam.json b/audit/projects/k8s-staging-capi-vsphere/buckets/k8s-staging-capi-vsphere-gcb/iam.json index 6830e8d0121..bfefb55c718 100644 --- a/audit/projects/k8s-staging-capi-vsphere/buckets/k8s-staging-capi-vsphere-gcb/iam.json +++ b/audit/projects/k8s-staging-capi-vsphere/buckets/k8s-staging-capi-vsphere-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-capi-vsphere/iam.json b/audit/projects/k8s-staging-capi-vsphere/iam.json index 3419e0e1fbe..1c97f40e804 100644 --- a/audit/projects/k8s-staging-capi-vsphere/iam.json +++ b/audit/projects/k8s-staging-capi-vsphere/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:459565607671@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-cip-test/buckets/k8s-staging-cip-test-gcb/iam.json b/audit/projects/k8s-staging-cip-test/buckets/k8s-staging-cip-test-gcb/iam.json index 1d5fb0dbce9..c258b1fdaa2 100644 --- a/audit/projects/k8s-staging-cip-test/buckets/k8s-staging-cip-test-gcb/iam.json +++ b/audit/projects/k8s-staging-cip-test/buckets/k8s-staging-cip-test-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-cip-test/iam.json b/audit/projects/k8s-staging-cip-test/iam.json index 24d09e7ec7d..ac57338937f 100644 --- a/audit/projects/k8s-staging-cip-test/iam.json +++ b/audit/projects/k8s-staging-cip-test/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:324460563566@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-cluster-api-aws/buckets/k8s-staging-cluster-api-aws-gcb/iam.json b/audit/projects/k8s-staging-cluster-api-aws/buckets/k8s-staging-cluster-api-aws-gcb/iam.json index da71cd0a98b..558b96aea71 100644 --- a/audit/projects/k8s-staging-cluster-api-aws/buckets/k8s-staging-cluster-api-aws-gcb/iam.json +++ b/audit/projects/k8s-staging-cluster-api-aws/buckets/k8s-staging-cluster-api-aws-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-cluster-api-aws/iam.json b/audit/projects/k8s-staging-cluster-api-aws/iam.json index aa19c71210d..c64787c9967 100644 --- a/audit/projects/k8s-staging-cluster-api-aws/iam.json +++ b/audit/projects/k8s-staging-cluster-api-aws/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:433651898792@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-cluster-api-azure/buckets/k8s-staging-cluster-api-azure-gcb/iam.json b/audit/projects/k8s-staging-cluster-api-azure/buckets/k8s-staging-cluster-api-azure-gcb/iam.json index 94ebee8ffae..fc7b05558d5 100644 --- a/audit/projects/k8s-staging-cluster-api-azure/buckets/k8s-staging-cluster-api-azure-gcb/iam.json +++ b/audit/projects/k8s-staging-cluster-api-azure/buckets/k8s-staging-cluster-api-azure-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-cluster-api-azure/iam.json b/audit/projects/k8s-staging-cluster-api-azure/iam.json index e42c00ee3a9..85198d483ad 100644 --- a/audit/projects/k8s-staging-cluster-api-azure/iam.json +++ b/audit/projects/k8s-staging-cluster-api-azure/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:1087109869165@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-cluster-api-do/buckets/k8s-staging-cluster-api-do-gcb/iam.json b/audit/projects/k8s-staging-cluster-api-do/buckets/k8s-staging-cluster-api-do-gcb/iam.json index 863b3851ced..8dde774e7b8 100644 --- a/audit/projects/k8s-staging-cluster-api-do/buckets/k8s-staging-cluster-api-do-gcb/iam.json +++ b/audit/projects/k8s-staging-cluster-api-do/buckets/k8s-staging-cluster-api-do-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-cluster-api-do/iam.json b/audit/projects/k8s-staging-cluster-api-do/iam.json index 261f35e3149..d12a71b2921 100644 --- a/audit/projects/k8s-staging-cluster-api-do/iam.json +++ b/audit/projects/k8s-staging-cluster-api-do/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:226017735054@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-cluster-api-gcp/buckets/k8s-staging-cluster-api-gcp-gcb/iam.json b/audit/projects/k8s-staging-cluster-api-gcp/buckets/k8s-staging-cluster-api-gcp-gcb/iam.json index 1b18989ff5a..59f819b346d 100644 --- a/audit/projects/k8s-staging-cluster-api-gcp/buckets/k8s-staging-cluster-api-gcp-gcb/iam.json +++ b/audit/projects/k8s-staging-cluster-api-gcp/buckets/k8s-staging-cluster-api-gcp-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-cluster-api-gcp/iam.json b/audit/projects/k8s-staging-cluster-api-gcp/iam.json index 1ae05a6d946..d716ec4f77b 100644 --- a/audit/projects/k8s-staging-cluster-api-gcp/iam.json +++ b/audit/projects/k8s-staging-cluster-api-gcp/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:606075400249@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-cluster-api/buckets/k8s-staging-cluster-api-gcb/iam.json b/audit/projects/k8s-staging-cluster-api/buckets/k8s-staging-cluster-api-gcb/iam.json index 691ca9c6118..b3cbabf4736 100644 --- a/audit/projects/k8s-staging-cluster-api/buckets/k8s-staging-cluster-api-gcb/iam.json +++ b/audit/projects/k8s-staging-cluster-api/buckets/k8s-staging-cluster-api-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-cluster-api/iam.json b/audit/projects/k8s-staging-cluster-api/iam.json index eb401ae3fa2..3e6a28d86e7 100644 --- a/audit/projects/k8s-staging-cluster-api/iam.json +++ b/audit/projects/k8s-staging-cluster-api/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:190130481896@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-coredns/buckets/artifacts.k8s-staging-coredns.appspot.com/iam.json b/audit/projects/k8s-staging-coredns/buckets/artifacts.k8s-staging-coredns.appspot.com/iam.json index 4d960754aed..5917bee0c4d 100644 --- a/audit/projects/k8s-staging-coredns/buckets/artifacts.k8s-staging-coredns.appspot.com/iam.json +++ b/audit/projects/k8s-staging-coredns/buckets/artifacts.k8s-staging-coredns.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-coredns@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-coredns/buckets/k8s-staging-coredns-gcb/iam.json b/audit/projects/k8s-staging-coredns/buckets/k8s-staging-coredns-gcb/iam.json index 2eba3388ef9..0662304e0f5 100644 --- a/audit/projects/k8s-staging-coredns/buckets/k8s-staging-coredns-gcb/iam.json +++ b/audit/projects/k8s-staging-coredns/buckets/k8s-staging-coredns-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-coredns/iam.json b/audit/projects/k8s-staging-coredns/iam.json index 6014492da10..84e8af15f66 100644 --- a/audit/projects/k8s-staging-coredns/iam.json +++ b/audit/projects/k8s-staging-coredns/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:848617618266@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-cpa/buckets/k8s-staging-cpa-gcb/iam.json b/audit/projects/k8s-staging-cpa/buckets/k8s-staging-cpa-gcb/iam.json index 1e47d806838..9625155743f 100644 --- a/audit/projects/k8s-staging-cpa/buckets/k8s-staging-cpa-gcb/iam.json +++ b/audit/projects/k8s-staging-cpa/buckets/k8s-staging-cpa-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-cpa/iam.json b/audit/projects/k8s-staging-cpa/iam.json index 941ee6d8d48..5464b227348 100644 --- a/audit/projects/k8s-staging-cpa/iam.json +++ b/audit/projects/k8s-staging-cpa/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:644315828680@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-csi-secrets-store/buckets/k8s-staging-csi-secrets-store-gcb/iam.json b/audit/projects/k8s-staging-csi-secrets-store/buckets/k8s-staging-csi-secrets-store-gcb/iam.json index cc355a0c6fd..7a843b07dff 100644 --- a/audit/projects/k8s-staging-csi-secrets-store/buckets/k8s-staging-csi-secrets-store-gcb/iam.json +++ b/audit/projects/k8s-staging-csi-secrets-store/buckets/k8s-staging-csi-secrets-store-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-csi-secrets-store/iam.json b/audit/projects/k8s-staging-csi-secrets-store/iam.json index 64cca5033a2..b8d26841635 100644 --- a/audit/projects/k8s-staging-csi-secrets-store/iam.json +++ b/audit/projects/k8s-staging-csi-secrets-store/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:766197520365@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-csi/buckets/k8s-staging-csi-gcb/iam.json b/audit/projects/k8s-staging-csi/buckets/k8s-staging-csi-gcb/iam.json index 09573dbd994..4b0ed0b043a 100644 --- a/audit/projects/k8s-staging-csi/buckets/k8s-staging-csi-gcb/iam.json +++ b/audit/projects/k8s-staging-csi/buckets/k8s-staging-csi-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-descheduler/buckets/k8s-staging-descheduler-gcb/iam.json b/audit/projects/k8s-staging-descheduler/buckets/k8s-staging-descheduler-gcb/iam.json index 3552c12e59f..c8cbb60d408 100644 --- a/audit/projects/k8s-staging-descheduler/buckets/k8s-staging-descheduler-gcb/iam.json +++ b/audit/projects/k8s-staging-descheduler/buckets/k8s-staging-descheduler-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-descheduler/iam.json b/audit/projects/k8s-staging-descheduler/iam.json index e9ec1c043c4..c65e279eced 100644 --- a/audit/projects/k8s-staging-descheduler/iam.json +++ b/audit/projects/k8s-staging-descheduler/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:1009880777024@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-dns/buckets/k8s-staging-dns-gcb/iam.json b/audit/projects/k8s-staging-dns/buckets/k8s-staging-dns-gcb/iam.json index fcf2bae3a5a..3c9ccef10d9 100644 --- a/audit/projects/k8s-staging-dns/buckets/k8s-staging-dns-gcb/iam.json +++ b/audit/projects/k8s-staging-dns/buckets/k8s-staging-dns-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-dns/iam.json b/audit/projects/k8s-staging-dns/iam.json index 6132006bd12..98c55c6f14e 100644 --- a/audit/projects/k8s-staging-dns/iam.json +++ b/audit/projects/k8s-staging-dns/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:558098336346@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-e2e-test-images/buckets/k8s-staging-e2e-test-images-gcb/iam.json b/audit/projects/k8s-staging-e2e-test-images/buckets/k8s-staging-e2e-test-images-gcb/iam.json index c4507e32f80..70394c224f9 100644 --- a/audit/projects/k8s-staging-e2e-test-images/buckets/k8s-staging-e2e-test-images-gcb/iam.json +++ b/audit/projects/k8s-staging-e2e-test-images/buckets/k8s-staging-e2e-test-images-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-e2e-test-images/iam.json b/audit/projects/k8s-staging-e2e-test-images/iam.json index 8b053c161e2..a6809e7332a 100644 --- a/audit/projects/k8s-staging-e2e-test-images/iam.json +++ b/audit/projects/k8s-staging-e2e-test-images/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:456067983721@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-etcd/buckets/k8s-staging-etcd-gcb/iam.json b/audit/projects/k8s-staging-etcd/buckets/k8s-staging-etcd-gcb/iam.json index 30b61bdf39e..af9838dbb3c 100644 --- a/audit/projects/k8s-staging-etcd/buckets/k8s-staging-etcd-gcb/iam.json +++ b/audit/projects/k8s-staging-etcd/buckets/k8s-staging-etcd-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-etcd/iam.json b/audit/projects/k8s-staging-etcd/iam.json index 360274c5b7e..0d0c51bd4e2 100644 --- a/audit/projects/k8s-staging-etcd/iam.json +++ b/audit/projects/k8s-staging-etcd/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:329483391043@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-external-dns/buckets/k8s-staging-external-dns-gcb/iam.json b/audit/projects/k8s-staging-external-dns/buckets/k8s-staging-external-dns-gcb/iam.json index f67a3867713..0d4f6d302d8 100644 --- a/audit/projects/k8s-staging-external-dns/buckets/k8s-staging-external-dns-gcb/iam.json +++ b/audit/projects/k8s-staging-external-dns/buckets/k8s-staging-external-dns-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-external-dns/iam.json b/audit/projects/k8s-staging-external-dns/iam.json index 6b6d4956d7b..f48667f56cd 100644 --- a/audit/projects/k8s-staging-external-dns/iam.json +++ b/audit/projects/k8s-staging-external-dns/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:548739681389@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-kas-network-proxy/buckets/k8s-staging-kas-network-proxy-gcb/iam.json b/audit/projects/k8s-staging-kas-network-proxy/buckets/k8s-staging-kas-network-proxy-gcb/iam.json index e0476594f33..01292e3f913 100644 --- a/audit/projects/k8s-staging-kas-network-proxy/buckets/k8s-staging-kas-network-proxy-gcb/iam.json +++ b/audit/projects/k8s-staging-kas-network-proxy/buckets/k8s-staging-kas-network-proxy-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-kas-network-proxy/iam.json b/audit/projects/k8s-staging-kas-network-proxy/iam.json index d76b68b80b1..e778f5081a8 100644 --- a/audit/projects/k8s-staging-kas-network-proxy/iam.json +++ b/audit/projects/k8s-staging-kas-network-proxy/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:670598002495@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-kind/buckets/k8s-staging-kind-gcb/iam.json b/audit/projects/k8s-staging-kind/buckets/k8s-staging-kind-gcb/iam.json index bcc59f1c8e6..c599a5ba7bc 100644 --- a/audit/projects/k8s-staging-kind/buckets/k8s-staging-kind-gcb/iam.json +++ b/audit/projects/k8s-staging-kind/buckets/k8s-staging-kind-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-kind/iam.json b/audit/projects/k8s-staging-kind/iam.json index c76664cf1cd..29e43070454 100644 --- a/audit/projects/k8s-staging-kind/iam.json +++ b/audit/projects/k8s-staging-kind/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:220811308229@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-kops/buckets/artifacts.k8s-staging-kops.appspot.com/iam.json b/audit/projects/k8s-staging-kops/buckets/artifacts.k8s-staging-kops.appspot.com/iam.json index 7174dc54851..9faf204d6f5 100644 --- a/audit/projects/k8s-staging-kops/buckets/artifacts.k8s-staging-kops.appspot.com/iam.json +++ b/audit/projects/k8s-staging-kops/buckets/artifacts.k8s-staging-kops.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-kops@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-kops/buckets/k8s-staging-kops-gcb/iam.json b/audit/projects/k8s-staging-kops/buckets/k8s-staging-kops-gcb/iam.json index ccf61eabce1..7bf36fdd34b 100644 --- a/audit/projects/k8s-staging-kops/buckets/k8s-staging-kops-gcb/iam.json +++ b/audit/projects/k8s-staging-kops/buckets/k8s-staging-kops-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-kops/iam.json b/audit/projects/k8s-staging-kops/iam.json index 76a7310e313..55c1d4cca9b 100644 --- a/audit/projects/k8s-staging-kops/iam.json +++ b/audit/projects/k8s-staging-kops/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:889470918518@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-kube-state-metrics/buckets/k8s-staging-kube-state-metrics-gcb/iam.json b/audit/projects/k8s-staging-kube-state-metrics/buckets/k8s-staging-kube-state-metrics-gcb/iam.json index bb3fa7c6157..46160a0e600 100644 --- a/audit/projects/k8s-staging-kube-state-metrics/buckets/k8s-staging-kube-state-metrics-gcb/iam.json +++ b/audit/projects/k8s-staging-kube-state-metrics/buckets/k8s-staging-kube-state-metrics-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-kube-state-metrics/iam.json b/audit/projects/k8s-staging-kube-state-metrics/iam.json index cfc7bad8dff..7aea3c163f6 100644 --- a/audit/projects/k8s-staging-kube-state-metrics/iam.json +++ b/audit/projects/k8s-staging-kube-state-metrics/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:1023797992882@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-kubeadm/buckets/k8s-staging-kubeadm-gcb/iam.json b/audit/projects/k8s-staging-kubeadm/buckets/k8s-staging-kubeadm-gcb/iam.json index 02ae9c55c33..0c5028f020e 100644 --- a/audit/projects/k8s-staging-kubeadm/buckets/k8s-staging-kubeadm-gcb/iam.json +++ b/audit/projects/k8s-staging-kubeadm/buckets/k8s-staging-kubeadm-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-kubeadm/iam.json b/audit/projects/k8s-staging-kubeadm/iam.json index a725808a4ef..7d0d3f15b24 100644 --- a/audit/projects/k8s-staging-kubeadm/iam.json +++ b/audit/projects/k8s-staging-kubeadm/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:487125676961@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-kubernetes/buckets/k8s-staging-kubernetes-gcb/iam.json b/audit/projects/k8s-staging-kubernetes/buckets/k8s-staging-kubernetes-gcb/iam.json index bc210dcf5e7..c79066ea28f 100644 --- a/audit/projects/k8s-staging-kubernetes/buckets/k8s-staging-kubernetes-gcb/iam.json +++ b/audit/projects/k8s-staging-kubernetes/buckets/k8s-staging-kubernetes-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-kubernetes/iam.json b/audit/projects/k8s-staging-kubernetes/iam.json index 21b7219c8f8..60e1c15f5cc 100644 --- a/audit/projects/k8s-staging-kubernetes/iam.json +++ b/audit/projects/k8s-staging-kubernetes/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:615281671549@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-metrics-server/buckets/k8s-staging-metrics-server-gcb/iam.json b/audit/projects/k8s-staging-metrics-server/buckets/k8s-staging-metrics-server-gcb/iam.json index 0e6e332dbbe..ba1cdb87288 100644 --- a/audit/projects/k8s-staging-metrics-server/buckets/k8s-staging-metrics-server-gcb/iam.json +++ b/audit/projects/k8s-staging-metrics-server/buckets/k8s-staging-metrics-server-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-metrics-server/iam.json b/audit/projects/k8s-staging-metrics-server/iam.json index 173e64b7eb3..0a1c2cd2d4f 100644 --- a/audit/projects/k8s-staging-metrics-server/iam.json +++ b/audit/projects/k8s-staging-metrics-server/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:229033024066@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-multitenancy/buckets/k8s-staging-multitenancy-gcb/iam.json b/audit/projects/k8s-staging-multitenancy/buckets/k8s-staging-multitenancy-gcb/iam.json index 7cf9a6910f1..9cf215565a3 100644 --- a/audit/projects/k8s-staging-multitenancy/buckets/k8s-staging-multitenancy-gcb/iam.json +++ b/audit/projects/k8s-staging-multitenancy/buckets/k8s-staging-multitenancy-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-multitenancy/iam.json b/audit/projects/k8s-staging-multitenancy/iam.json index 0e3b7dbd687..88f3c304f10 100644 --- a/audit/projects/k8s-staging-multitenancy/iam.json +++ b/audit/projects/k8s-staging-multitenancy/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:817922591645@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-nfd/buckets/k8s-staging-nfd-gcb/iam.json b/audit/projects/k8s-staging-nfd/buckets/k8s-staging-nfd-gcb/iam.json index dfd7973204b..8c8d5b07855 100644 --- a/audit/projects/k8s-staging-nfd/buckets/k8s-staging-nfd-gcb/iam.json +++ b/audit/projects/k8s-staging-nfd/buckets/k8s-staging-nfd-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-nfd/iam.json b/audit/projects/k8s-staging-nfd/iam.json index f6ddc13baa9..34a84da645f 100644 --- a/audit/projects/k8s-staging-nfd/iam.json +++ b/audit/projects/k8s-staging-nfd/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:5125544917@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-npd/buckets/k8s-staging-npd-gcb/iam.json b/audit/projects/k8s-staging-npd/buckets/k8s-staging-npd-gcb/iam.json index 1c7f73f2ff5..5b89d8ec5b2 100644 --- a/audit/projects/k8s-staging-npd/buckets/k8s-staging-npd-gcb/iam.json +++ b/audit/projects/k8s-staging-npd/buckets/k8s-staging-npd-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-npd/iam.json b/audit/projects/k8s-staging-npd/iam.json index 1015ad3383b..e4a57bffa81 100644 --- a/audit/projects/k8s-staging-npd/iam.json +++ b/audit/projects/k8s-staging-npd/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:152738448582@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-provider-azure/buckets/k8s-staging-provider-azure-gcb/iam.json b/audit/projects/k8s-staging-provider-azure/buckets/k8s-staging-provider-azure-gcb/iam.json index 5ed81fead96..112053bd168 100644 --- a/audit/projects/k8s-staging-provider-azure/buckets/k8s-staging-provider-azure-gcb/iam.json +++ b/audit/projects/k8s-staging-provider-azure/buckets/k8s-staging-provider-azure-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-provider-azure/iam.json b/audit/projects/k8s-staging-provider-azure/iam.json index 78e61a50a13..e4ae054d01d 100644 --- a/audit/projects/k8s-staging-provider-azure/iam.json +++ b/audit/projects/k8s-staging-provider-azure/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:83539169056@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-publishing-bot/buckets/k8s-staging-publishing-bot-gcb/iam.json b/audit/projects/k8s-staging-publishing-bot/buckets/k8s-staging-publishing-bot-gcb/iam.json index 12f735abab2..e6d6eeab4f5 100644 --- a/audit/projects/k8s-staging-publishing-bot/buckets/k8s-staging-publishing-bot-gcb/iam.json +++ b/audit/projects/k8s-staging-publishing-bot/buckets/k8s-staging-publishing-bot-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-publishing-bot/iam.json b/audit/projects/k8s-staging-publishing-bot/iam.json index b130de9bea3..58aa2939c5a 100644 --- a/audit/projects/k8s-staging-publishing-bot/iam.json +++ b/audit/projects/k8s-staging-publishing-bot/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:438481731081@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-release-test/iam.json b/audit/projects/k8s-staging-release-test/iam.json index d5abd994ca2..cc2696d5657 100644 --- a/audit/projects/k8s-staging-release-test/iam.json +++ b/audit/projects/k8s-staging-release-test/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:634027639865@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-releng/buckets/k8s-staging-releng-gcb/iam.json b/audit/projects/k8s-staging-releng/buckets/k8s-staging-releng-gcb/iam.json index 4934f1ad957..8aea9d8c951 100644 --- a/audit/projects/k8s-staging-releng/buckets/k8s-staging-releng-gcb/iam.json +++ b/audit/projects/k8s-staging-releng/buckets/k8s-staging-releng-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-releng/iam.json b/audit/projects/k8s-staging-releng/iam.json index 9bc92f34d21..bf3cae4426e 100644 --- a/audit/projects/k8s-staging-releng/iam.json +++ b/audit/projects/k8s-staging-releng/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:117157742389@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-scl-image-builder/buckets/k8s-staging-scl-image-builder-gcb/iam.json b/audit/projects/k8s-staging-scl-image-builder/buckets/k8s-staging-scl-image-builder-gcb/iam.json index 83c304b52e3..2961275200c 100644 --- a/audit/projects/k8s-staging-scl-image-builder/buckets/k8s-staging-scl-image-builder-gcb/iam.json +++ b/audit/projects/k8s-staging-scl-image-builder/buckets/k8s-staging-scl-image-builder-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-scl-image-builder/iam.json b/audit/projects/k8s-staging-scl-image-builder/iam.json index 285d9f8b36e..7f259c49849 100644 --- a/audit/projects/k8s-staging-scl-image-builder/iam.json +++ b/audit/projects/k8s-staging-scl-image-builder/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:974299031321@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-service-apis/buckets/k8s-staging-service-apis-gcb/iam.json b/audit/projects/k8s-staging-service-apis/buckets/k8s-staging-service-apis-gcb/iam.json index f83d118f9dd..79d48c60d76 100644 --- a/audit/projects/k8s-staging-service-apis/buckets/k8s-staging-service-apis-gcb/iam.json +++ b/audit/projects/k8s-staging-service-apis/buckets/k8s-staging-service-apis-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-service-apis/iam.json b/audit/projects/k8s-staging-service-apis/iam.json index 78dfca1ed63..0e7a462662d 100644 --- a/audit/projects/k8s-staging-service-apis/iam.json +++ b/audit/projects/k8s-staging-service-apis/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:1031494980804@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, diff --git a/audit/projects/k8s-staging-txtdirect/buckets/k8s-staging-txtdirect-gcb/iam.json b/audit/projects/k8s-staging-txtdirect/buckets/k8s-staging-txtdirect-gcb/iam.json index dffff40011d..1001451eeff 100644 --- a/audit/projects/k8s-staging-txtdirect/buckets/k8s-staging-txtdirect-gcb/iam.json +++ b/audit/projects/k8s-staging-txtdirect/buckets/k8s-staging-txtdirect-gcb/iam.json @@ -29,14 +29,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-txtdirect/iam.json b/audit/projects/k8s-staging-txtdirect/iam.json index 740bb5f5a66..4e45b1f32c7 100644 --- a/audit/projects/k8s-staging-txtdirect/iam.json +++ b/audit/projects/k8s-staging-txtdirect/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:662592719730@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, From 5f353440b32c03df5b185760dfc90778601a029a Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Wed, 6 May 2020 16:31:06 -0700 Subject: [PATCH 03/14] audit: add legacyBucketWriter role to staging gcs and a few gcb-builder stragglers --- .../iam.json | 7 +++++++ .../buckets/k8s-release-test-prod-gcb/iam.json | 13 +++++++++++-- .../buckets/k8s-release-test-prod/iam.json | 2 ++ .../iam.json | 6 ++++++ .../iam.json | 6 ++++++ .../iam.json | 6 ++++++ .../iam.json | 6 ++++++ .../iam.json | 6 ++++++ .../iam.json | 6 ++++++ .../iam.json | 6 ++++++ .../iam.json | 6 ++++++ .../iam.json | 6 ++++++ .../iam.json | 6 ++++++ .../iam.json | 6 ++++++ .../iam.json | 6 ++++++ .../iam.json | 6 ++++++ .../iam.json | 6 ++++++ .../artifacts.k8s-staging-csi.appspot.com/iam.json | 6 ++++++ .../iam.json | 6 ++++++ .../artifacts.k8s-staging-dns.appspot.com/iam.json | 6 ++++++ .../iam.json | 6 ++++++ .../iam.json | 6 ++++++ .../iam.json | 6 ++++++ .../iam.json | 6 ++++++ .../iam.json | 6 ++++++ .../iam.json | 6 ++++++ .../iam.json | 6 ++++++ .../artifacts.k8s-staging-nfd.appspot.com/iam.json | 6 ++++++ .../artifacts.k8s-staging-npd.appspot.com/iam.json | 6 ++++++ .../iam.json | 6 ++++++ .../iam.json | 6 ++++++ .../iam.json | 8 ++++++++ .../buckets/k8s-staging-release-test-gcb/iam.json | 8 ++++++-- .../buckets/k8s-staging-release-test/iam.json | 2 ++ .../iam.json | 6 ++++++ .../iam.json | 6 ++++++ .../iam.json | 6 ++++++ 37 files changed, 222 insertions(+), 4 deletions(-) diff --git a/audit/projects/k8s-release-test-prod/buckets/artifacts.k8s-release-test-prod.appspot.com/iam.json b/audit/projects/k8s-release-test-prod/buckets/artifacts.k8s-release-test-prod.appspot.com/iam.json index efb00b2c60c..cc4c7629e1e 100644 --- a/audit/projects/k8s-release-test-prod/buckets/artifacts.k8s-release-test-prod.appspot.com/iam.json +++ b/audit/projects/k8s-release-test-prod/buckets/artifacts.k8s-release-test-prod.appspot.com/iam.json @@ -16,6 +16,13 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-release-admins@kubernetes.io", + "group:k8s-infra-release-editors@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod-gcb/iam.json b/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod-gcb/iam.json index 63b494cdccd..627481068d9 100644 --- a/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod-gcb/iam.json +++ b/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod-gcb/iam.json @@ -16,6 +16,13 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-release-admins@kubernetes.io", + "group:k8s-infra-release-editors@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", @@ -26,14 +33,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod/iam.json b/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod/iam.json index a35e7dc1700..43d7bcfdc10 100644 --- a/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod/iam.json +++ b/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod/iam.json @@ -19,6 +19,8 @@ }, { "members": [ + "group:k8s-infra-release-admins@kubernetes.io", + "group:k8s-infra-release-editors@kubernetes.io", "serviceAccount:615281671549@cloudbuild.gserviceaccount.com" ], "role": "roles/storage.legacyBucketWriter" diff --git a/audit/projects/k8s-staging-apisnoop/buckets/artifacts.k8s-staging-apisnoop.appspot.com/iam.json b/audit/projects/k8s-staging-apisnoop/buckets/artifacts.k8s-staging-apisnoop.appspot.com/iam.json index 93435a93428..2db83f0c01d 100644 --- a/audit/projects/k8s-staging-apisnoop/buckets/artifacts.k8s-staging-apisnoop.appspot.com/iam.json +++ b/audit/projects/k8s-staging-apisnoop/buckets/artifacts.k8s-staging-apisnoop.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-apisnoop@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-artifact-promoter/buckets/artifacts.k8s-staging-artifact-promoter.appspot.com/iam.json b/audit/projects/k8s-staging-artifact-promoter/buckets/artifacts.k8s-staging-artifact-promoter.appspot.com/iam.json index e5c4c5080e5..92647e56f9f 100644 --- a/audit/projects/k8s-staging-artifact-promoter/buckets/artifacts.k8s-staging-artifact-promoter.appspot.com/iam.json +++ b/audit/projects/k8s-staging-artifact-promoter/buckets/artifacts.k8s-staging-artifact-promoter.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-artifact-promoter@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-autoscaling/buckets/artifacts.k8s-staging-autoscaling.appspot.com/iam.json b/audit/projects/k8s-staging-autoscaling/buckets/artifacts.k8s-staging-autoscaling.appspot.com/iam.json index 5a5eb94a86b..78b2e22aa0e 100644 --- a/audit/projects/k8s-staging-autoscaling/buckets/artifacts.k8s-staging-autoscaling.appspot.com/iam.json +++ b/audit/projects/k8s-staging-autoscaling/buckets/artifacts.k8s-staging-autoscaling.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-autoscaling@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-build-image/buckets/artifacts.k8s-staging-build-image.appspot.com/iam.json b/audit/projects/k8s-staging-build-image/buckets/artifacts.k8s-staging-build-image.appspot.com/iam.json index cc883365028..3dd565cda7d 100644 --- a/audit/projects/k8s-staging-build-image/buckets/artifacts.k8s-staging-build-image.appspot.com/iam.json +++ b/audit/projects/k8s-staging-build-image/buckets/artifacts.k8s-staging-build-image.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-build-image@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-capi-docker/buckets/artifacts.k8s-staging-capi-docker.appspot.com/iam.json b/audit/projects/k8s-staging-capi-docker/buckets/artifacts.k8s-staging-capi-docker.appspot.com/iam.json index e68db5a96b0..76e7cacffbb 100644 --- a/audit/projects/k8s-staging-capi-docker/buckets/artifacts.k8s-staging-capi-docker.appspot.com/iam.json +++ b/audit/projects/k8s-staging-capi-docker/buckets/artifacts.k8s-staging-capi-docker.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-capi-docker@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-capi-kubeadm/buckets/artifacts.k8s-staging-capi-kubeadm.appspot.com/iam.json b/audit/projects/k8s-staging-capi-kubeadm/buckets/artifacts.k8s-staging-capi-kubeadm.appspot.com/iam.json index ee5ea51023b..c209e3f9689 100644 --- a/audit/projects/k8s-staging-capi-kubeadm/buckets/artifacts.k8s-staging-capi-kubeadm.appspot.com/iam.json +++ b/audit/projects/k8s-staging-capi-kubeadm/buckets/artifacts.k8s-staging-capi-kubeadm.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-capi-kubeadm@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-capi-openstack/buckets/artifacts.k8s-staging-capi-openstack.appspot.com/iam.json b/audit/projects/k8s-staging-capi-openstack/buckets/artifacts.k8s-staging-capi-openstack.appspot.com/iam.json index 5816e50b020..aaf3a71b2dc 100644 --- a/audit/projects/k8s-staging-capi-openstack/buckets/artifacts.k8s-staging-capi-openstack.appspot.com/iam.json +++ b/audit/projects/k8s-staging-capi-openstack/buckets/artifacts.k8s-staging-capi-openstack.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-capi-openstack@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-capi-vsphere/buckets/artifacts.k8s-staging-capi-vsphere.appspot.com/iam.json b/audit/projects/k8s-staging-capi-vsphere/buckets/artifacts.k8s-staging-capi-vsphere.appspot.com/iam.json index 88d150c15a1..93a8cf356d4 100644 --- a/audit/projects/k8s-staging-capi-vsphere/buckets/artifacts.k8s-staging-capi-vsphere.appspot.com/iam.json +++ b/audit/projects/k8s-staging-capi-vsphere/buckets/artifacts.k8s-staging-capi-vsphere.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-capi-vsphere@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-cip-test/buckets/artifacts.k8s-staging-cip-test.appspot.com/iam.json b/audit/projects/k8s-staging-cip-test/buckets/artifacts.k8s-staging-cip-test.appspot.com/iam.json index 68b2cae94a2..1654c8f4175 100644 --- a/audit/projects/k8s-staging-cip-test/buckets/artifacts.k8s-staging-cip-test.appspot.com/iam.json +++ b/audit/projects/k8s-staging-cip-test/buckets/artifacts.k8s-staging-cip-test.appspot.com/iam.json @@ -16,6 +16,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-cip-test@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-cluster-api-aws/buckets/artifacts.k8s-staging-cluster-api-aws.appspot.com/iam.json b/audit/projects/k8s-staging-cluster-api-aws/buckets/artifacts.k8s-staging-cluster-api-aws.appspot.com/iam.json index 72c87abdcf4..1403ce269bf 100644 --- a/audit/projects/k8s-staging-cluster-api-aws/buckets/artifacts.k8s-staging-cluster-api-aws.appspot.com/iam.json +++ b/audit/projects/k8s-staging-cluster-api-aws/buckets/artifacts.k8s-staging-cluster-api-aws.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-cluster-api-aws@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-cluster-api-azure/buckets/artifacts.k8s-staging-cluster-api-azure.appspot.com/iam.json b/audit/projects/k8s-staging-cluster-api-azure/buckets/artifacts.k8s-staging-cluster-api-azure.appspot.com/iam.json index c3d52f5c239..36d0448b1e7 100644 --- a/audit/projects/k8s-staging-cluster-api-azure/buckets/artifacts.k8s-staging-cluster-api-azure.appspot.com/iam.json +++ b/audit/projects/k8s-staging-cluster-api-azure/buckets/artifacts.k8s-staging-cluster-api-azure.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-cluster-api-azure@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-cluster-api-do/buckets/artifacts.k8s-staging-cluster-api-do.appspot.com/iam.json b/audit/projects/k8s-staging-cluster-api-do/buckets/artifacts.k8s-staging-cluster-api-do.appspot.com/iam.json index ef6706cd08b..9721feb4a15 100644 --- a/audit/projects/k8s-staging-cluster-api-do/buckets/artifacts.k8s-staging-cluster-api-do.appspot.com/iam.json +++ b/audit/projects/k8s-staging-cluster-api-do/buckets/artifacts.k8s-staging-cluster-api-do.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-cluster-api-do@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-cluster-api-gcp/buckets/artifacts.k8s-staging-cluster-api-gcp.appspot.com/iam.json b/audit/projects/k8s-staging-cluster-api-gcp/buckets/artifacts.k8s-staging-cluster-api-gcp.appspot.com/iam.json index edcd2f3d4da..725dad07826 100644 --- a/audit/projects/k8s-staging-cluster-api-gcp/buckets/artifacts.k8s-staging-cluster-api-gcp.appspot.com/iam.json +++ b/audit/projects/k8s-staging-cluster-api-gcp/buckets/artifacts.k8s-staging-cluster-api-gcp.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-cluster-api-gcp@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-cluster-api/buckets/artifacts.k8s-staging-cluster-api.appspot.com/iam.json b/audit/projects/k8s-staging-cluster-api/buckets/artifacts.k8s-staging-cluster-api.appspot.com/iam.json index f3f67767e26..2056062ab45 100644 --- a/audit/projects/k8s-staging-cluster-api/buckets/artifacts.k8s-staging-cluster-api.appspot.com/iam.json +++ b/audit/projects/k8s-staging-cluster-api/buckets/artifacts.k8s-staging-cluster-api.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-cluster-api@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-csi/buckets/artifacts.k8s-staging-csi.appspot.com/iam.json b/audit/projects/k8s-staging-csi/buckets/artifacts.k8s-staging-csi.appspot.com/iam.json index 72c80bc9685..59ed0d7e7c9 100644 --- a/audit/projects/k8s-staging-csi/buckets/artifacts.k8s-staging-csi.appspot.com/iam.json +++ b/audit/projects/k8s-staging-csi/buckets/artifacts.k8s-staging-csi.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-csi@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-descheduler/buckets/artifacts.k8s-staging-descheduler.appspot.com/iam.json b/audit/projects/k8s-staging-descheduler/buckets/artifacts.k8s-staging-descheduler.appspot.com/iam.json index e2e3f1ccb44..0e37a0a2dc7 100644 --- a/audit/projects/k8s-staging-descheduler/buckets/artifacts.k8s-staging-descheduler.appspot.com/iam.json +++ b/audit/projects/k8s-staging-descheduler/buckets/artifacts.k8s-staging-descheduler.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-descheduler@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-dns/buckets/artifacts.k8s-staging-dns.appspot.com/iam.json b/audit/projects/k8s-staging-dns/buckets/artifacts.k8s-staging-dns.appspot.com/iam.json index cd32d73cf88..a117add5bcb 100644 --- a/audit/projects/k8s-staging-dns/buckets/artifacts.k8s-staging-dns.appspot.com/iam.json +++ b/audit/projects/k8s-staging-dns/buckets/artifacts.k8s-staging-dns.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-dns@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-e2e-test-images/buckets/artifacts.k8s-staging-e2e-test-images.appspot.com/iam.json b/audit/projects/k8s-staging-e2e-test-images/buckets/artifacts.k8s-staging-e2e-test-images.appspot.com/iam.json index 76a085ee1f3..1eb393dacb2 100644 --- a/audit/projects/k8s-staging-e2e-test-images/buckets/artifacts.k8s-staging-e2e-test-images.appspot.com/iam.json +++ b/audit/projects/k8s-staging-e2e-test-images/buckets/artifacts.k8s-staging-e2e-test-images.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-e2e-test-images@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-external-dns/buckets/artifacts.k8s-staging-external-dns.appspot.com/iam.json b/audit/projects/k8s-staging-external-dns/buckets/artifacts.k8s-staging-external-dns.appspot.com/iam.json index 4214bb972c0..101229943d6 100644 --- a/audit/projects/k8s-staging-external-dns/buckets/artifacts.k8s-staging-external-dns.appspot.com/iam.json +++ b/audit/projects/k8s-staging-external-dns/buckets/artifacts.k8s-staging-external-dns.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-external-dns@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-kas-network-proxy/buckets/artifacts.k8s-staging-kas-network-proxy.appspot.com/iam.json b/audit/projects/k8s-staging-kas-network-proxy/buckets/artifacts.k8s-staging-kas-network-proxy.appspot.com/iam.json index 51c30922f4a..19bf4fec3fc 100644 --- a/audit/projects/k8s-staging-kas-network-proxy/buckets/artifacts.k8s-staging-kas-network-proxy.appspot.com/iam.json +++ b/audit/projects/k8s-staging-kas-network-proxy/buckets/artifacts.k8s-staging-kas-network-proxy.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-kas-network-proxy@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-kubeadm/buckets/artifacts.k8s-staging-kubeadm.appspot.com/iam.json b/audit/projects/k8s-staging-kubeadm/buckets/artifacts.k8s-staging-kubeadm.appspot.com/iam.json index 1edadaa5e01..f759ae034bb 100644 --- a/audit/projects/k8s-staging-kubeadm/buckets/artifacts.k8s-staging-kubeadm.appspot.com/iam.json +++ b/audit/projects/k8s-staging-kubeadm/buckets/artifacts.k8s-staging-kubeadm.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-kubeadm@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-kubernetes/buckets/artifacts.k8s-staging-kubernetes.appspot.com/iam.json b/audit/projects/k8s-staging-kubernetes/buckets/artifacts.k8s-staging-kubernetes.appspot.com/iam.json index 34c80e5d078..128c85406e1 100644 --- a/audit/projects/k8s-staging-kubernetes/buckets/artifacts.k8s-staging-kubernetes.appspot.com/iam.json +++ b/audit/projects/k8s-staging-kubernetes/buckets/artifacts.k8s-staging-kubernetes.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-kubernetes@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-metrics-server/buckets/artifacts.k8s-staging-metrics-server.appspot.com/iam.json b/audit/projects/k8s-staging-metrics-server/buckets/artifacts.k8s-staging-metrics-server.appspot.com/iam.json index af63d46ae64..594ad64dad2 100644 --- a/audit/projects/k8s-staging-metrics-server/buckets/artifacts.k8s-staging-metrics-server.appspot.com/iam.json +++ b/audit/projects/k8s-staging-metrics-server/buckets/artifacts.k8s-staging-metrics-server.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-metrics-server@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-multitenancy/buckets/artifacts.k8s-staging-multitenancy.appspot.com/iam.json b/audit/projects/k8s-staging-multitenancy/buckets/artifacts.k8s-staging-multitenancy.appspot.com/iam.json index 0fc4f5dd637..3b9b9978f95 100644 --- a/audit/projects/k8s-staging-multitenancy/buckets/artifacts.k8s-staging-multitenancy.appspot.com/iam.json +++ b/audit/projects/k8s-staging-multitenancy/buckets/artifacts.k8s-staging-multitenancy.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-multitenancy@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-nfd/buckets/artifacts.k8s-staging-nfd.appspot.com/iam.json b/audit/projects/k8s-staging-nfd/buckets/artifacts.k8s-staging-nfd.appspot.com/iam.json index 285f840b865..c4cf62470af 100644 --- a/audit/projects/k8s-staging-nfd/buckets/artifacts.k8s-staging-nfd.appspot.com/iam.json +++ b/audit/projects/k8s-staging-nfd/buckets/artifacts.k8s-staging-nfd.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-nfd@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-npd/buckets/artifacts.k8s-staging-npd.appspot.com/iam.json b/audit/projects/k8s-staging-npd/buckets/artifacts.k8s-staging-npd.appspot.com/iam.json index f70ac20dcd9..a5112acd486 100644 --- a/audit/projects/k8s-staging-npd/buckets/artifacts.k8s-staging-npd.appspot.com/iam.json +++ b/audit/projects/k8s-staging-npd/buckets/artifacts.k8s-staging-npd.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-npd@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-provider-azure/buckets/artifacts.k8s-staging-provider-azure.appspot.com/iam.json b/audit/projects/k8s-staging-provider-azure/buckets/artifacts.k8s-staging-provider-azure.appspot.com/iam.json index d96928617cf..dc82837b662 100644 --- a/audit/projects/k8s-staging-provider-azure/buckets/artifacts.k8s-staging-provider-azure.appspot.com/iam.json +++ b/audit/projects/k8s-staging-provider-azure/buckets/artifacts.k8s-staging-provider-azure.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-provider-azure@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-publishing-bot/buckets/artifacts.k8s-staging-publishing-bot.appspot.com/iam.json b/audit/projects/k8s-staging-publishing-bot/buckets/artifacts.k8s-staging-publishing-bot.appspot.com/iam.json index 81be25856f8..d14ebd369fc 100644 --- a/audit/projects/k8s-staging-publishing-bot/buckets/artifacts.k8s-staging-publishing-bot.appspot.com/iam.json +++ b/audit/projects/k8s-staging-publishing-bot/buckets/artifacts.k8s-staging-publishing-bot.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-publishing-bot@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-release-test/buckets/artifacts.k8s-staging-release-test.appspot.com/iam.json b/audit/projects/k8s-staging-release-test/buckets/artifacts.k8s-staging-release-test.appspot.com/iam.json index 3202c8ac4cb..e19596b4186 100644 --- a/audit/projects/k8s-staging-release-test/buckets/artifacts.k8s-staging-release-test.appspot.com/iam.json +++ b/audit/projects/k8s-staging-release-test/buckets/artifacts.k8s-staging-release-test.appspot.com/iam.json @@ -17,6 +17,14 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-release-admins@kubernetes.io", + "group:k8s-infra-release-editors@kubernetes.io", + "group:k8s-infra-staging-release-test@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test-gcb/iam.json b/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test-gcb/iam.json index b326b2484d2..f5c7b13794a 100644 --- a/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test-gcb/iam.json +++ b/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test-gcb/iam.json @@ -18,6 +18,8 @@ }, { "members": [ + "group:k8s-infra-release-admins@kubernetes.io", + "group:k8s-infra-release-editors@kubernetes.io", "group:k8s-infra-staging-release-test@kubernetes.io" ], "role": "roles/storage.legacyBucketWriter" @@ -33,14 +35,16 @@ }, { "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectCreator" }, { "members": [ "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/storage.objectViewer" } diff --git a/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test/iam.json b/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test/iam.json index 633b5163a13..e35bd1cda9f 100644 --- a/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test/iam.json +++ b/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test/iam.json @@ -18,6 +18,8 @@ }, { "members": [ + "group:k8s-infra-release-admins@kubernetes.io", + "group:k8s-infra-release-editors@kubernetes.io", "group:k8s-infra-staging-release-test@kubernetes.io" ], "role": "roles/storage.legacyBucketWriter" diff --git a/audit/projects/k8s-staging-releng/buckets/artifacts.k8s-staging-releng.appspot.com/iam.json b/audit/projects/k8s-staging-releng/buckets/artifacts.k8s-staging-releng.appspot.com/iam.json index b8818b78659..d900032c342 100644 --- a/audit/projects/k8s-staging-releng/buckets/artifacts.k8s-staging-releng.appspot.com/iam.json +++ b/audit/projects/k8s-staging-releng/buckets/artifacts.k8s-staging-releng.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-releng@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-scl-image-builder/buckets/artifacts.k8s-staging-scl-image-builder.appspot.com/iam.json b/audit/projects/k8s-staging-scl-image-builder/buckets/artifacts.k8s-staging-scl-image-builder.appspot.com/iam.json index 8f9659f3dd7..6a07520824f 100644 --- a/audit/projects/k8s-staging-scl-image-builder/buckets/artifacts.k8s-staging-scl-image-builder.appspot.com/iam.json +++ b/audit/projects/k8s-staging-scl-image-builder/buckets/artifacts.k8s-staging-scl-image-builder.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-scl-image-builder@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-staging-service-apis/buckets/artifacts.k8s-staging-service-apis.appspot.com/iam.json b/audit/projects/k8s-staging-service-apis/buckets/artifacts.k8s-staging-service-apis.appspot.com/iam.json index 2a36f3db745..9f64793fb0c 100644 --- a/audit/projects/k8s-staging-service-apis/buckets/artifacts.k8s-staging-service-apis.appspot.com/iam.json +++ b/audit/projects/k8s-staging-service-apis/buckets/artifacts.k8s-staging-service-apis.appspot.com/iam.json @@ -15,6 +15,12 @@ ], "role": "roles/storage.legacyBucketReader" }, + { + "members": [ + "group:k8s-infra-staging-service-apis@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", From 11310155ea6f41bc4d553862bb0a32d3c10d5129 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Wed, 6 May 2020 16:33:06 -0700 Subject: [PATCH 04/14] audit: use gcloud secrets for k8s-gsuite the groups reconciler now gets the service account it needs to do its thing from a secret stored in this project, instead of git-crypt --- .../gsuite-groups-manager_key/description.json | 7 +++++++ .../secrets/gsuite-groups-manager_key/iam.json | 11 +++++++++++ .../secrets/gsuite-groups-manager_key/versions.json | 7 +++++++ audit/projects/k8s-gsuite/services/enabled.txt | 1 + 4 files changed, 26 insertions(+) create mode 100644 audit/projects/k8s-gsuite/secrets/gsuite-groups-manager_key/description.json create mode 100644 audit/projects/k8s-gsuite/secrets/gsuite-groups-manager_key/iam.json create mode 100644 audit/projects/k8s-gsuite/secrets/gsuite-groups-manager_key/versions.json diff --git a/audit/projects/k8s-gsuite/secrets/gsuite-groups-manager_key/description.json b/audit/projects/k8s-gsuite/secrets/gsuite-groups-manager_key/description.json new file mode 100644 index 00000000000..67d029e2a2a --- /dev/null +++ b/audit/projects/k8s-gsuite/secrets/gsuite-groups-manager_key/description.json @@ -0,0 +1,7 @@ +{ + "createTime": "2020-04-30T04:24:22.976608Z", + "name": "projects/91610859379/secrets/gsuite-groups-manager_key", + "replication": { + "automatic": {} + } +} diff --git a/audit/projects/k8s-gsuite/secrets/gsuite-groups-manager_key/iam.json b/audit/projects/k8s-gsuite/secrets/gsuite-groups-manager_key/iam.json new file mode 100644 index 00000000000..2ad2c0e645c --- /dev/null +++ b/audit/projects/k8s-gsuite/secrets/gsuite-groups-manager_key/iam.json @@ -0,0 +1,11 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-group-admins@kubernetes.io" + ], + "role": "roles/secretmanager.secretAccessor" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-gsuite/secrets/gsuite-groups-manager_key/versions.json b/audit/projects/k8s-gsuite/secrets/gsuite-groups-manager_key/versions.json new file mode 100644 index 00000000000..089e1f5feae --- /dev/null +++ b/audit/projects/k8s-gsuite/secrets/gsuite-groups-manager_key/versions.json @@ -0,0 +1,7 @@ +[ + { + "createTime": "2020-04-30T04:24:24.019226Z", + "name": "projects/91610859379/secrets/gsuite-groups-manager_key/versions/1", + "state": "ENABLED" + } +] diff --git a/audit/projects/k8s-gsuite/services/enabled.txt b/audit/projects/k8s-gsuite/services/enabled.txt index 67fbbd8c0a2..6f7f76a2a47 100644 --- a/audit/projects/k8s-gsuite/services/enabled.txt +++ b/audit/projects/k8s-gsuite/services/enabled.txt @@ -1,3 +1,4 @@ NAME TITLE admin.googleapis.com Admin SDK groupssettings.googleapis.com Groups Settings API +secretmanager.googleapis.com Secret Manager API From 8c9eee62d3bd2d638e4a84a85af0707b1104f214 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Wed, 6 May 2020 16:36:00 -0700 Subject: [PATCH 05/14] audit: add k8s-staging-infra-tools --- .../bucketpolicyonly.txt | 4 ++ .../cors.txt | 1 + .../iam.json | 37 ++++++++++++++ .../logging.txt | 1 + .../bucketpolicyonly.txt | 4 ++ .../k8s-staging-infra-tools-gcb/cors.txt | 1 + .../k8s-staging-infra-tools-gcb/iam.json | 46 +++++++++++++++++ .../k8s-staging-infra-tools-gcb/logging.txt | 1 + .../bucketpolicyonly.txt | 4 ++ .../buckets/k8s-staging-infra-tools/cors.txt | 1 + .../buckets/k8s-staging-infra-tools/iam.json | 37 ++++++++++++++ .../k8s-staging-infra-tools/logging.txt | 1 + .../k8s-staging-infra-tools/description.json | 11 ++++ .../projects/k8s-staging-infra-tools/iam.json | 50 +++++++++++++++++++ .../services/enabled.txt | 8 +++ 15 files changed, 207 insertions(+) create mode 100644 audit/projects/k8s-staging-infra-tools/buckets/artifacts.k8s-staging-infra-tools.appspot.com/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-infra-tools/buckets/artifacts.k8s-staging-infra-tools.appspot.com/cors.txt create mode 100644 audit/projects/k8s-staging-infra-tools/buckets/artifacts.k8s-staging-infra-tools.appspot.com/iam.json create mode 100644 audit/projects/k8s-staging-infra-tools/buckets/artifacts.k8s-staging-infra-tools.appspot.com/logging.txt create mode 100644 audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools-gcb/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools-gcb/cors.txt create mode 100644 audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools-gcb/iam.json create mode 100644 audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools-gcb/logging.txt create mode 100644 audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools/cors.txt create mode 100644 audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools/iam.json create mode 100644 audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools/logging.txt create mode 100644 audit/projects/k8s-staging-infra-tools/description.json create mode 100644 audit/projects/k8s-staging-infra-tools/iam.json create mode 100644 audit/projects/k8s-staging-infra-tools/services/enabled.txt diff --git a/audit/projects/k8s-staging-infra-tools/buckets/artifacts.k8s-staging-infra-tools.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-infra-tools/buckets/artifacts.k8s-staging-infra-tools.appspot.com/bucketpolicyonly.txt new file mode 100644 index 00000000000..d65a5a5866f --- /dev/null +++ b/audit/projects/k8s-staging-infra-tools/buckets/artifacts.k8s-staging-infra-tools.appspot.com/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://artifacts.k8s-staging-infra-tools.appspot.com: + Enabled: True + LockedTime: 2020-07-29 16:49:56.331000+00:00 + diff --git a/audit/projects/k8s-staging-infra-tools/buckets/artifacts.k8s-staging-infra-tools.appspot.com/cors.txt b/audit/projects/k8s-staging-infra-tools/buckets/artifacts.k8s-staging-infra-tools.appspot.com/cors.txt new file mode 100644 index 00000000000..eb128ca661a --- /dev/null +++ b/audit/projects/k8s-staging-infra-tools/buckets/artifacts.k8s-staging-infra-tools.appspot.com/cors.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-infra-tools.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-infra-tools/buckets/artifacts.k8s-staging-infra-tools.appspot.com/iam.json b/audit/projects/k8s-staging-infra-tools/buckets/artifacts.k8s-staging-infra-tools.appspot.com/iam.json new file mode 100644 index 00000000000..8ab5ee738ba --- /dev/null +++ b/audit/projects/k8s-staging-infra-tools/buckets/artifacts.k8s-staging-infra-tools.appspot.com/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-infra-tools", + "projectOwner:k8s-staging-infra-tools" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-infra-tools" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-infra-tools@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-infra-tools@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-infra-tools/buckets/artifacts.k8s-staging-infra-tools.appspot.com/logging.txt b/audit/projects/k8s-staging-infra-tools/buckets/artifacts.k8s-staging-infra-tools.appspot.com/logging.txt new file mode 100644 index 00000000000..e37f4e0d304 --- /dev/null +++ b/audit/projects/k8s-staging-infra-tools/buckets/artifacts.k8s-staging-infra-tools.appspot.com/logging.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-infra-tools.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools-gcb/bucketpolicyonly.txt new file mode 100644 index 00000000000..e77d515dc4a --- /dev/null +++ b/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools-gcb/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-infra-tools-gcb: + Enabled: True + LockedTime: 2020-07-29 16:50:49.629000+00:00 + diff --git a/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools-gcb/cors.txt b/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools-gcb/cors.txt new file mode 100644 index 00000000000..65d80c63101 --- /dev/null +++ b/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools-gcb/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-infra-tools-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools-gcb/iam.json b/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools-gcb/iam.json new file mode 100644 index 00000000000..2af22e18ce4 --- /dev/null +++ b/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools-gcb/iam.json @@ -0,0 +1,46 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-infra-tools", + "projectOwner:k8s-staging-infra-tools" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-infra-tools" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-infra-tools@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-infra-tools@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectCreator" + }, + { + "members": [ + "allUsers", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools-gcb/logging.txt b/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools-gcb/logging.txt new file mode 100644 index 00000000000..21a08f7b26d --- /dev/null +++ b/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools-gcb/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-infra-tools-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools/bucketpolicyonly.txt b/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools/bucketpolicyonly.txt new file mode 100644 index 00000000000..9bee0ac94c8 --- /dev/null +++ b/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-infra-tools: + Enabled: True + LockedTime: 2020-07-29 16:50:19.436000+00:00 + diff --git a/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools/cors.txt b/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools/cors.txt new file mode 100644 index 00000000000..071a8c6bde7 --- /dev/null +++ b/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-infra-tools/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools/iam.json b/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools/iam.json new file mode 100644 index 00000000000..8ab5ee738ba --- /dev/null +++ b/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-infra-tools", + "projectOwner:k8s-staging-infra-tools" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-infra-tools" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-infra-tools@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-infra-tools@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools/logging.txt b/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools/logging.txt new file mode 100644 index 00000000000..d3bc89d2482 --- /dev/null +++ b/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-infra-tools/ has no logging configuration. diff --git a/audit/projects/k8s-staging-infra-tools/description.json b/audit/projects/k8s-staging-infra-tools/description.json new file mode 100644 index 00000000000..96d3e39034a --- /dev/null +++ b/audit/projects/k8s-staging-infra-tools/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-04-30T16:49:03.400Z", + "lifecycleState": "ACTIVE", + "name": "k8s-staging-infra-tools", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-staging-infra-tools", + "projectNumber": "1017132094926" +} diff --git a/audit/projects/k8s-staging-infra-tools/iam.json b/audit/projects/k8s-staging-infra-tools/iam.json new file mode 100644 index 00000000000..11fcb58ceb5 --- /dev/null +++ b/audit/projects/k8s-staging-infra-tools/iam.json @@ -0,0 +1,50 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:1017132094926@cloudbuild.gserviceaccount.com", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.builds.builder" + }, + { + "members": [ + "group:k8s-infra-staging-infra-tools@kubernetes.io" + ], + "role": "roles/cloudbuild.builds.editor" + }, + { + "members": [ + "serviceAccount:service-1017132094926@gcp-sa-cloudbuild.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-1017132094926@containerregistry.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-staging-infra-tools@kubernetes.io" + ], + "role": "roles/serviceusage.serviceUsageConsumer" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-infra-tools@kubernetes.io" + ], + "role": "roles/viewer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-staging-infra-tools/services/enabled.txt b/audit/projects/k8s-staging-infra-tools/services/enabled.txt new file mode 100644 index 00000000000..36a6900078a --- /dev/null +++ b/audit/projects/k8s-staging-infra-tools/services/enabled.txt @@ -0,0 +1,8 @@ +NAME TITLE +cloudbuild.googleapis.com Cloud Build API +cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containerregistry.googleapis.com Container Registry API +logging.googleapis.com Cloud Logging API +pubsub.googleapis.com Cloud Pub/Sub API +storage-api.googleapis.com Google Cloud Storage JSON API +storage-component.googleapis.com Cloud Storage From b40867a1759abea66a406e6022922d3e9acbae29 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Wed, 6 May 2020 16:36:34 -0700 Subject: [PATCH 06/14] audit: add k8s-staging-slack-infra --- .../bucketpolicyonly.txt | 4 ++ .../cors.txt | 1 + .../iam.json | 37 ++++++++++++++ .../logging.txt | 1 + .../bucketpolicyonly.txt | 4 ++ .../k8s-staging-slack-infra-gcb/cors.txt | 1 + .../k8s-staging-slack-infra-gcb/iam.json | 46 +++++++++++++++++ .../k8s-staging-slack-infra-gcb/logging.txt | 1 + .../bucketpolicyonly.txt | 4 ++ .../buckets/k8s-staging-slack-infra/cors.txt | 1 + .../buckets/k8s-staging-slack-infra/iam.json | 37 ++++++++++++++ .../k8s-staging-slack-infra/logging.txt | 1 + .../k8s-staging-slack-infra/description.json | 11 ++++ .../projects/k8s-staging-slack-infra/iam.json | 50 +++++++++++++++++++ .../services/enabled.txt | 8 +++ 15 files changed, 207 insertions(+) create mode 100644 audit/projects/k8s-staging-slack-infra/buckets/artifacts.k8s-staging-slack-infra.appspot.com/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-slack-infra/buckets/artifacts.k8s-staging-slack-infra.appspot.com/cors.txt create mode 100644 audit/projects/k8s-staging-slack-infra/buckets/artifacts.k8s-staging-slack-infra.appspot.com/iam.json create mode 100644 audit/projects/k8s-staging-slack-infra/buckets/artifacts.k8s-staging-slack-infra.appspot.com/logging.txt create mode 100644 audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra-gcb/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra-gcb/cors.txt create mode 100644 audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra-gcb/iam.json create mode 100644 audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra-gcb/logging.txt create mode 100644 audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra/cors.txt create mode 100644 audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra/iam.json create mode 100644 audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra/logging.txt create mode 100644 audit/projects/k8s-staging-slack-infra/description.json create mode 100644 audit/projects/k8s-staging-slack-infra/iam.json create mode 100644 audit/projects/k8s-staging-slack-infra/services/enabled.txt diff --git a/audit/projects/k8s-staging-slack-infra/buckets/artifacts.k8s-staging-slack-infra.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-slack-infra/buckets/artifacts.k8s-staging-slack-infra.appspot.com/bucketpolicyonly.txt new file mode 100644 index 00000000000..ecccb9972c0 --- /dev/null +++ b/audit/projects/k8s-staging-slack-infra/buckets/artifacts.k8s-staging-slack-infra.appspot.com/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://artifacts.k8s-staging-slack-infra.appspot.com: + Enabled: True + LockedTime: 2020-07-29 16:46:51.525000+00:00 + diff --git a/audit/projects/k8s-staging-slack-infra/buckets/artifacts.k8s-staging-slack-infra.appspot.com/cors.txt b/audit/projects/k8s-staging-slack-infra/buckets/artifacts.k8s-staging-slack-infra.appspot.com/cors.txt new file mode 100644 index 00000000000..17bd1a49812 --- /dev/null +++ b/audit/projects/k8s-staging-slack-infra/buckets/artifacts.k8s-staging-slack-infra.appspot.com/cors.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-slack-infra.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-slack-infra/buckets/artifacts.k8s-staging-slack-infra.appspot.com/iam.json b/audit/projects/k8s-staging-slack-infra/buckets/artifacts.k8s-staging-slack-infra.appspot.com/iam.json new file mode 100644 index 00000000000..f3717c6eda0 --- /dev/null +++ b/audit/projects/k8s-staging-slack-infra/buckets/artifacts.k8s-staging-slack-infra.appspot.com/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-slack-infra", + "projectOwner:k8s-staging-slack-infra" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-slack-infra" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-slack-infra@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-slack-infra@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-slack-infra/buckets/artifacts.k8s-staging-slack-infra.appspot.com/logging.txt b/audit/projects/k8s-staging-slack-infra/buckets/artifacts.k8s-staging-slack-infra.appspot.com/logging.txt new file mode 100644 index 00000000000..af801e1d2e1 --- /dev/null +++ b/audit/projects/k8s-staging-slack-infra/buckets/artifacts.k8s-staging-slack-infra.appspot.com/logging.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-slack-infra.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra-gcb/bucketpolicyonly.txt new file mode 100644 index 00000000000..eb6289dc4ee --- /dev/null +++ b/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra-gcb/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-slack-infra-gcb: + Enabled: True + LockedTime: 2020-07-29 16:47:37.820000+00:00 + diff --git a/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra-gcb/cors.txt b/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra-gcb/cors.txt new file mode 100644 index 00000000000..f2d6b9c0eb3 --- /dev/null +++ b/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra-gcb/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-slack-infra-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra-gcb/iam.json b/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra-gcb/iam.json new file mode 100644 index 00000000000..49d89cace98 --- /dev/null +++ b/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra-gcb/iam.json @@ -0,0 +1,46 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-slack-infra", + "projectOwner:k8s-staging-slack-infra" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-slack-infra" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-slack-infra@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-slack-infra@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectCreator" + }, + { + "members": [ + "allUsers", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra-gcb/logging.txt b/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra-gcb/logging.txt new file mode 100644 index 00000000000..6cee71182db --- /dev/null +++ b/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra-gcb/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-slack-infra-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra/bucketpolicyonly.txt b/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra/bucketpolicyonly.txt new file mode 100644 index 00000000000..aff3275128a --- /dev/null +++ b/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-slack-infra: + Enabled: True + LockedTime: 2020-07-29 16:47:16.216000+00:00 + diff --git a/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra/cors.txt b/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra/cors.txt new file mode 100644 index 00000000000..4e3d8021cef --- /dev/null +++ b/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-slack-infra/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra/iam.json b/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra/iam.json new file mode 100644 index 00000000000..f3717c6eda0 --- /dev/null +++ b/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-slack-infra", + "projectOwner:k8s-staging-slack-infra" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-slack-infra" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-slack-infra@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-slack-infra@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra/logging.txt b/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra/logging.txt new file mode 100644 index 00000000000..c08350630e3 --- /dev/null +++ b/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-slack-infra/ has no logging configuration. diff --git a/audit/projects/k8s-staging-slack-infra/description.json b/audit/projects/k8s-staging-slack-infra/description.json new file mode 100644 index 00000000000..4829123beb3 --- /dev/null +++ b/audit/projects/k8s-staging-slack-infra/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-04-30T16:45:59.137Z", + "lifecycleState": "ACTIVE", + "name": "k8s-staging-slack-infra", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-staging-slack-infra", + "projectNumber": "470681440884" +} diff --git a/audit/projects/k8s-staging-slack-infra/iam.json b/audit/projects/k8s-staging-slack-infra/iam.json new file mode 100644 index 00000000000..89946310d09 --- /dev/null +++ b/audit/projects/k8s-staging-slack-infra/iam.json @@ -0,0 +1,50 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:470681440884@cloudbuild.gserviceaccount.com", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.builds.builder" + }, + { + "members": [ + "group:k8s-infra-staging-slack-infra@kubernetes.io" + ], + "role": "roles/cloudbuild.builds.editor" + }, + { + "members": [ + "serviceAccount:service-470681440884@gcp-sa-cloudbuild.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-470681440884@containerregistry.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-staging-slack-infra@kubernetes.io" + ], + "role": "roles/serviceusage.serviceUsageConsumer" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-slack-infra@kubernetes.io" + ], + "role": "roles/viewer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-staging-slack-infra/services/enabled.txt b/audit/projects/k8s-staging-slack-infra/services/enabled.txt new file mode 100644 index 00000000000..36a6900078a --- /dev/null +++ b/audit/projects/k8s-staging-slack-infra/services/enabled.txt @@ -0,0 +1,8 @@ +NAME TITLE +cloudbuild.googleapis.com Cloud Build API +cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containerregistry.googleapis.com Container Registry API +logging.googleapis.com Cloud Logging API +pubsub.googleapis.com Cloud Pub/Sub API +storage-api.googleapis.com Google Cloud Storage JSON API +storage-component.googleapis.com Cloud Storage From 9bf417c9a5d5023093cb858f6919e61d8c962057 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Wed, 6 May 2020 16:37:19 -0700 Subject: [PATCH 07/14] audit: turn down dev2 cluster --- .../description.json | 9 --------- .../iam.json | 3 --- .../kubernetes-public/services/container/clusters.txt | 1 - 3 files changed, 13 deletions(-) delete mode 100644 audit/projects/kubernetes-public/service-accounts/k8s-nodes@kubernetes-public.iam.gserviceaccount.com/description.json delete mode 100644 audit/projects/kubernetes-public/service-accounts/k8s-nodes@kubernetes-public.iam.gserviceaccount.com/iam.json diff --git a/audit/projects/kubernetes-public/service-accounts/k8s-nodes@kubernetes-public.iam.gserviceaccount.com/description.json b/audit/projects/kubernetes-public/service-accounts/k8s-nodes@kubernetes-public.iam.gserviceaccount.com/description.json deleted file mode 100644 index 0b3b5c0fc05..00000000000 --- a/audit/projects/kubernetes-public/service-accounts/k8s-nodes@kubernetes-public.iam.gserviceaccount.com/description.json +++ /dev/null @@ -1,9 +0,0 @@ -{ - "description": "Legacy: delete this once \"dev2\" cluster dies", - "displayName": "k8s-nodes", - "email": "k8s-nodes@kubernetes-public.iam.gserviceaccount.com", - "name": "projects/kubernetes-public/serviceAccounts/k8s-nodes@kubernetes-public.iam.gserviceaccount.com", - "oauth2ClientId": "102906005417360612620", - "projectId": "kubernetes-public", - "uniqueId": "102906005417360612620" -} diff --git a/audit/projects/kubernetes-public/service-accounts/k8s-nodes@kubernetes-public.iam.gserviceaccount.com/iam.json b/audit/projects/kubernetes-public/service-accounts/k8s-nodes@kubernetes-public.iam.gserviceaccount.com/iam.json deleted file mode 100644 index 61a2092b1b7..00000000000 --- a/audit/projects/kubernetes-public/service-accounts/k8s-nodes@kubernetes-public.iam.gserviceaccount.com/iam.json +++ /dev/null @@ -1,3 +0,0 @@ -{ - "version": 1 -} diff --git a/audit/projects/kubernetes-public/services/container/clusters.txt b/audit/projects/kubernetes-public/services/container/clusters.txt index 5de74bb72d0..b5398489de0 100644 --- a/audit/projects/kubernetes-public/services/container/clusters.txt +++ b/audit/projects/kubernetes-public/services/container/clusters.txt @@ -1,2 +1 @@ aaa us-central1 us-central1-c;us-central1-a;us-central1-f 6 RUNNING -development2 us-central1-b us-central1-b RUNNING From 9a336cf9d8e23b29276f39f4b1ad4f95c6376115 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Wed, 6 May 2020 16:40:13 -0700 Subject: [PATCH 08/14] audit: add k8s-infra-prow-build --- .../k8s-infra-prow-build/description.json | 11 ++ audit/projects/k8s-infra-prow-build/iam.json | 85 +++++++++ .../roles/ServiceAccountLister.json | 9 + .../description.json | 8 + .../iam.json | 1 + .../description.json | 8 + .../iam.json | 11 ++ .../description.json | 8 + .../iam.json | 1 + .../description.json | 8 + .../iam.json | 11 ++ .../services/bigquery/bigquery.datasets.json | 0 .../services/compute/project-info.json | 161 ++++++++++++++++++ .../services/container/clusters.txt | 1 + .../k8s-infra-prow-build/services/enabled.txt | 16 ++ 15 files changed, 339 insertions(+) create mode 100644 audit/projects/k8s-infra-prow-build/description.json create mode 100644 audit/projects/k8s-infra-prow-build/iam.json create mode 100644 audit/projects/k8s-infra-prow-build/roles/ServiceAccountLister.json create mode 100644 audit/projects/k8s-infra-prow-build/service-accounts/773781448124-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-prow-build/service-accounts/773781448124-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-prow-build/service-accounts/boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-prow-build/service-accounts/boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-prow-build/service-accounts/gke-nodes-prow-build@k8s-infra-prow-build.iam.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-prow-build/service-accounts/gke-nodes-prow-build@k8s-infra-prow-build.iam.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-prow-build/service-accounts/prow-build@k8s-infra-prow-build.iam.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-prow-build/service-accounts/prow-build@k8s-infra-prow-build.iam.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-prow-build/services/bigquery/bigquery.datasets.json create mode 100644 audit/projects/k8s-infra-prow-build/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-prow-build/services/container/clusters.txt create mode 100644 audit/projects/k8s-infra-prow-build/services/enabled.txt diff --git a/audit/projects/k8s-infra-prow-build/description.json b/audit/projects/k8s-infra-prow-build/description.json new file mode 100644 index 00000000000..d187b84530f --- /dev/null +++ b/audit/projects/k8s-infra-prow-build/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-04-30T20:05:50.398Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-prow-build", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-prow-build", + "projectNumber": "773781448124" +} diff --git a/audit/projects/k8s-infra-prow-build/iam.json b/audit/projects/k8s-infra-prow-build/iam.json new file mode 100644 index 00000000000..3657b4ef454 --- /dev/null +++ b/audit/projects/k8s-infra-prow-build/iam.json @@ -0,0 +1,85 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-cluster-admins@kubernetes.io" + ], + "role": "projects/k8s-infra-prow-build/roles/ServiceAccountLister" + }, + { + "members": [ + "serviceAccount:773781448124@cloudbuild.gserviceaccount.com" + ], + "role": "roles/cloudbuild.builds.builder" + }, + { + "members": [ + "serviceAccount:service-773781448124@gcp-sa-cloudbuild.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-773781448124@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "group:k8s-infra-cluster-admins@kubernetes.io" + ], + "role": "roles/compute.viewer" + }, + { + "members": [ + "group:k8s-infra-cluster-admins@kubernetes.io" + ], + "role": "roles/container.admin" + }, + { + "members": [ + "group:gke-security-groups@kubernetes.io" + ], + "role": "roles/container.clusterViewer" + }, + { + "members": [ + "serviceAccount:service-773781448124@container-engine-robot.iam.gserviceaccount.com" + ], + "role": "roles/container.serviceAgent" + }, + { + "members": [ + "serviceAccount:773781448124-compute@developer.gserviceaccount.com", + "serviceAccount:773781448124@cloudservices.gserviceaccount.com", + "serviceAccount:service-773781448124@containerregistry.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "serviceAccount:gke-nodes-prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/logging.logWriter" + }, + { + "members": [ + "serviceAccount:gke-nodes-prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/monitoring.metricWriter" + }, + { + "members": [ + "serviceAccount:gke-nodes-prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/monitoring.viewer" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-prow-build/roles/ServiceAccountLister.json b/audit/projects/k8s-infra-prow-build/roles/ServiceAccountLister.json new file mode 100644 index 00000000000..a8de264731c --- /dev/null +++ b/audit/projects/k8s-infra-prow-build/roles/ServiceAccountLister.json @@ -0,0 +1,9 @@ +{ + "description": "Can list ServiceAccounts.", + "includedPermissions": [ + "iam.serviceAccounts.list" + ], + "name": "projects/k8s-infra-prow-build/roles/ServiceAccountLister", + "stage": "GA", + "title": "Service Account Lister" +} diff --git a/audit/projects/k8s-infra-prow-build/service-accounts/773781448124-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-prow-build/service-accounts/773781448124-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..1a8377d4e69 --- /dev/null +++ b/audit/projects/k8s-infra-prow-build/service-accounts/773781448124-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "773781448124-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-prow-build/serviceAccounts/773781448124-compute@developer.gserviceaccount.com", + "oauth2ClientId": "110102664279275968667", + "projectId": "k8s-infra-prow-build", + "uniqueId": "110102664279275968667" +} diff --git a/audit/projects/k8s-infra-prow-build/service-accounts/773781448124-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-prow-build/service-accounts/773781448124-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-prow-build/service-accounts/773781448124-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-prow-build/service-accounts/boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com/description.json b/audit/projects/k8s-infra-prow-build/service-accounts/boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com/description.json new file mode 100644 index 00000000000..6fa0f2a1b40 --- /dev/null +++ b/audit/projects/k8s-infra-prow-build/service-accounts/boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Used by boskos-janitor in 'prow-build' GKE cluster", + "email": "boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "name": "projects/k8s-infra-prow-build/serviceAccounts/boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "oauth2ClientId": "113384456787846499978", + "projectId": "k8s-infra-prow-build", + "uniqueId": "113384456787846499978" +} diff --git a/audit/projects/k8s-infra-prow-build/service-accounts/boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-prow-build/service-accounts/boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..33e95c02304 --- /dev/null +++ b/audit/projects/k8s-infra-prow-build/service-accounts/boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com/iam.json @@ -0,0 +1,11 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:k8s-infra-prow-build.svc.id.goog[test-pods/boskos-janitor]" + ], + "role": "roles/iam.workloadIdentityUser" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-prow-build/service-accounts/gke-nodes-prow-build@k8s-infra-prow-build.iam.gserviceaccount.com/description.json b/audit/projects/k8s-infra-prow-build/service-accounts/gke-nodes-prow-build@k8s-infra-prow-build.iam.gserviceaccount.com/description.json new file mode 100644 index 00000000000..99ced80a975 --- /dev/null +++ b/audit/projects/k8s-infra-prow-build/service-accounts/gke-nodes-prow-build@k8s-infra-prow-build.iam.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Nodes in GKE cluster 'prow-build'", + "email": "gke-nodes-prow-build@k8s-infra-prow-build.iam.gserviceaccount.com", + "name": "projects/k8s-infra-prow-build/serviceAccounts/gke-nodes-prow-build@k8s-infra-prow-build.iam.gserviceaccount.com", + "oauth2ClientId": "110227136526245655726", + "projectId": "k8s-infra-prow-build", + "uniqueId": "110227136526245655726" +} diff --git a/audit/projects/k8s-infra-prow-build/service-accounts/gke-nodes-prow-build@k8s-infra-prow-build.iam.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-prow-build/service-accounts/gke-nodes-prow-build@k8s-infra-prow-build.iam.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-prow-build/service-accounts/gke-nodes-prow-build@k8s-infra-prow-build.iam.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-prow-build/service-accounts/prow-build@k8s-infra-prow-build.iam.gserviceaccount.com/description.json b/audit/projects/k8s-infra-prow-build/service-accounts/prow-build@k8s-infra-prow-build.iam.gserviceaccount.com/description.json new file mode 100644 index 00000000000..e9c6bc682e1 --- /dev/null +++ b/audit/projects/k8s-infra-prow-build/service-accounts/prow-build@k8s-infra-prow-build.iam.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Used by pods in 'prow-build' GKE cluster", + "email": "prow-build@k8s-infra-prow-build.iam.gserviceaccount.com", + "name": "projects/k8s-infra-prow-build/serviceAccounts/prow-build@k8s-infra-prow-build.iam.gserviceaccount.com", + "oauth2ClientId": "107361654189119518833", + "projectId": "k8s-infra-prow-build", + "uniqueId": "107361654189119518833" +} diff --git a/audit/projects/k8s-infra-prow-build/service-accounts/prow-build@k8s-infra-prow-build.iam.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-prow-build/service-accounts/prow-build@k8s-infra-prow-build.iam.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..2fd429f4d55 --- /dev/null +++ b/audit/projects/k8s-infra-prow-build/service-accounts/prow-build@k8s-infra-prow-build.iam.gserviceaccount.com/iam.json @@ -0,0 +1,11 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:k8s-infra-prow-build.svc.id.goog[test-pods/prow-build]" + ], + "role": "roles/iam.workloadIdentityUser" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-prow-build/services/bigquery/bigquery.datasets.json b/audit/projects/k8s-infra-prow-build/services/bigquery/bigquery.datasets.json new file mode 100644 index 00000000000..e69de29bb2d diff --git a/audit/projects/k8s-infra-prow-build/services/compute/project-info.json b/audit/projects/k8s-infra-prow-build/services/compute/project-info.json new file mode 100644 index 00000000000..944ae8871cf --- /dev/null +++ b/audit/projects/k8s-infra-prow-build/services/compute/project-info.json @@ -0,0 +1,161 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "gke-prow-build-8d7225b7-cidr", + "value": "default:10.32.0.0/14" + }, + { + "key": "sshKeys", + "value": "gke-8d7225b757872b0f06a6:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD2x5DoWU6zKsjIs0srrMdc3CupZyCk6uiJUZ6KeRb3s7MmKQ3GCngTaTmRT3eJJwvzGBHbqAGHayQVIDX8NIw8PBh7qS1wtwZXGiRGkQM9xZGnDGlLDh5/OPgsAZxvmO9WX0y1voN5Q9k26J47aVC/cVQetMD0UVYYE+fACq6Nwz7KtBoFuVE99e9QaqvJc7g3WzeOFcRj8FPtFKSskwVOIgbR4sEdY/TAlibyM3eTnnjIAKugNX78R+V9rSXDOl/OCAkx22Cy+TrF5VVzvGR4r8MytyoYupr6DLnNIqtPPnzQbx+GA+x4NBGjOB/MGidY2lTIc+qAoXX1aSOrQ+ff gke-8d7225b757872b0f06a6@gke-8d7225b757872b0f06a6\ngke-8d7225b757872b0f06a6:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0TwjNFdXL0OC2Qt0dfP64bpc6Yy5vH353AiZ/0V9WJJ5n7Qrk7oQbbtGXYuWYs/+cPx7sA3jGh6CRNkPPTl/0gVrud1XM07gMkBlr8ulyHUIBFG3jEmDipedNHYIioVz6w4ZJhQcDe83n+MTW8a2iNFU8ihqfmjMcyj5q4q8c1jA1zWv06cKG3rlfTHM7E1Y1g/twmgymNkj55vMHfax3Zdh3zsjBqAsAhWLTCCPLpU39qXg90uDnzunoXQ0rmGVliJyhrHfeJlY5trC8C1M0dI4DVRpeT2PtS9YTMoJ017hA+To848af9S5bnpQ0eHhqaMGsAjwuaxULXIPEZZqz gke-8d7225b757872b0f06a6@gke-8d7225b757872b0f06a6\ngke-8d7225b757872b0f06a6:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDbYis3+c9yPGIVnC1PzVTlLVFf+8C67ElBXCFm75E6H3J3chHxAk8kc9VKEk6MoqNEL1xWH9B0GI+IeWcqJC8IhaPAv/FDqub2IUf0YZCUnjU48Y709DodM1+IQZZcmM4bDaiRzGoB+0H9TI2rL2jhb17xckvztWLTf4aKxgRUWn655FORnrcs7064kH8c4c+W+qgUlG1P5Vad6H1EmnFG6AB488kf9y5dE7A1tDQqX/Ssf5atcGlHMR/5gdTqEF2nx40j1btDBAlHOBSBOEsNOHe7xGKi+KDlyvJEjuZbq7yVY36+twXalxwO+b2wRjV++OZ1fk9oKE9CJjxMA+1r gke-8d7225b757872b0f06a6@gke-8d7225b757872b0f06a6" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-04-30T13:57:24.496-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "773781448124-compute@developer.gserviceaccount.com", + "id": "15110083642295643", + "kind": "compute#project", + "name": "k8s-infra-prow-build", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-prow-build", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-prow-build/services/container/clusters.txt b/audit/projects/k8s-infra-prow-build/services/container/clusters.txt new file mode 100644 index 00000000000..195a6a5b1aa --- /dev/null +++ b/audit/projects/k8s-infra-prow-build/services/container/clusters.txt @@ -0,0 +1 @@ +prow-build us-central1 us-central1-c;us-central1-f;us-central1-b 6 RUNNING diff --git a/audit/projects/k8s-infra-prow-build/services/enabled.txt b/audit/projects/k8s-infra-prow-build/services/enabled.txt new file mode 100644 index 00000000000..7c5a892d14b --- /dev/null +++ b/audit/projects/k8s-infra-prow-build/services/enabled.txt @@ -0,0 +1,16 @@ +NAME TITLE +bigquery.googleapis.com BigQuery API +bigquerystorage.googleapis.com BigQuery Storage API +cloudbuild.googleapis.com Cloud Build API +compute.googleapis.com Compute Engine API +container.googleapis.com Kubernetes Engine API +containerregistry.googleapis.com Container Registry API +iam.googleapis.com Identity and Access Management (IAM) API +iamcredentials.googleapis.com IAM Service Account Credentials API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +pubsub.googleapis.com Cloud Pub/Sub API +stackdriver.googleapis.com Stackdriver API +storage-api.googleapis.com Google Cloud Storage JSON API +storage-component.googleapis.com Cloud Storage From d9fd1ae9afa5a9a56f46c82df9b67b54fbe645ce Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Wed, 6 May 2020 16:40:52 -0700 Subject: [PATCH 09/14] audit: add k8s-infra-prow-build-trusted --- .../description.json | 11 ++ .../k8s-infra-prow-build-trusted/iam.json | 85 +++++++++ .../roles/ServiceAccountLister.json | 9 + .../description.json | 8 + .../iam.json | 1 + .../description.json | 8 + .../iam.json | 11 ++ .../description.json | 8 + .../iam.json | 1 + .../description.json | 8 + .../iam.json | 11 ++ .../services/bigquery/bigquery.datasets.json | 0 .../services/compute/project-info.json | 161 ++++++++++++++++++ .../services/container/clusters.txt | 1 + .../services/enabled.txt | 16 ++ 15 files changed, 339 insertions(+) create mode 100644 audit/projects/k8s-infra-prow-build-trusted/description.json create mode 100644 audit/projects/k8s-infra-prow-build-trusted/iam.json create mode 100644 audit/projects/k8s-infra-prow-build-trusted/roles/ServiceAccountLister.json create mode 100644 audit/projects/k8s-infra-prow-build-trusted/service-accounts/180382678033-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-prow-build-trusted/service-accounts/180382678033-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-prow-build-trusted/service-accounts/gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-prow-build-trusted/service-accounts/gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-prow-build-trusted/service-accounts/gke-nodes-prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-prow-build-trusted/service-accounts/gke-nodes-prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-prow-build-trusted/service-accounts/prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-prow-build-trusted/service-accounts/prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-prow-build-trusted/services/bigquery/bigquery.datasets.json create mode 100644 audit/projects/k8s-infra-prow-build-trusted/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-prow-build-trusted/services/container/clusters.txt create mode 100644 audit/projects/k8s-infra-prow-build-trusted/services/enabled.txt diff --git a/audit/projects/k8s-infra-prow-build-trusted/description.json b/audit/projects/k8s-infra-prow-build-trusted/description.json new file mode 100644 index 00000000000..68c51680ea7 --- /dev/null +++ b/audit/projects/k8s-infra-prow-build-trusted/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-04-30T23:40:44.839Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-prow-build-trusted", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-prow-build-trusted", + "projectNumber": "180382678033" +} diff --git a/audit/projects/k8s-infra-prow-build-trusted/iam.json b/audit/projects/k8s-infra-prow-build-trusted/iam.json new file mode 100644 index 00000000000..ed8d8fdd77a --- /dev/null +++ b/audit/projects/k8s-infra-prow-build-trusted/iam.json @@ -0,0 +1,85 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-cluster-admins@kubernetes.io" + ], + "role": "projects/k8s-infra-prow-build-trusted/roles/ServiceAccountLister" + }, + { + "members": [ + "serviceAccount:180382678033@cloudbuild.gserviceaccount.com" + ], + "role": "roles/cloudbuild.builds.builder" + }, + { + "members": [ + "serviceAccount:service-180382678033@gcp-sa-cloudbuild.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-180382678033@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "group:k8s-infra-cluster-admins@kubernetes.io" + ], + "role": "roles/compute.viewer" + }, + { + "members": [ + "group:k8s-infra-cluster-admins@kubernetes.io" + ], + "role": "roles/container.admin" + }, + { + "members": [ + "group:gke-security-groups@kubernetes.io" + ], + "role": "roles/container.clusterViewer" + }, + { + "members": [ + "serviceAccount:service-180382678033@container-engine-robot.iam.gserviceaccount.com" + ], + "role": "roles/container.serviceAgent" + }, + { + "members": [ + "serviceAccount:180382678033-compute@developer.gserviceaccount.com", + "serviceAccount:180382678033@cloudservices.gserviceaccount.com", + "serviceAccount:service-180382678033@containerregistry.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "serviceAccount:gke-nodes-prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/logging.logWriter" + }, + { + "members": [ + "serviceAccount:gke-nodes-prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/monitoring.metricWriter" + }, + { + "members": [ + "serviceAccount:gke-nodes-prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/monitoring.viewer" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-prow-build-trusted/roles/ServiceAccountLister.json b/audit/projects/k8s-infra-prow-build-trusted/roles/ServiceAccountLister.json new file mode 100644 index 00000000000..16888cdb33f --- /dev/null +++ b/audit/projects/k8s-infra-prow-build-trusted/roles/ServiceAccountLister.json @@ -0,0 +1,9 @@ +{ + "description": "Can list ServiceAccounts.", + "includedPermissions": [ + "iam.serviceAccounts.list" + ], + "name": "projects/k8s-infra-prow-build-trusted/roles/ServiceAccountLister", + "stage": "GA", + "title": "Service Account Lister" +} diff --git a/audit/projects/k8s-infra-prow-build-trusted/service-accounts/180382678033-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-prow-build-trusted/service-accounts/180382678033-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..d6bef494ccd --- /dev/null +++ b/audit/projects/k8s-infra-prow-build-trusted/service-accounts/180382678033-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "180382678033-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-prow-build-trusted/serviceAccounts/180382678033-compute@developer.gserviceaccount.com", + "oauth2ClientId": "109607001040581615842", + "projectId": "k8s-infra-prow-build-trusted", + "uniqueId": "109607001040581615842" +} diff --git a/audit/projects/k8s-infra-prow-build-trusted/service-accounts/180382678033-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-prow-build-trusted/service-accounts/180382678033-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-prow-build-trusted/service-accounts/180382678033-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-prow-build-trusted/service-accounts/gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/description.json b/audit/projects/k8s-infra-prow-build-trusted/service-accounts/gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/description.json new file mode 100644 index 00000000000..e55799699fc --- /dev/null +++ b/audit/projects/k8s-infra-prow-build-trusted/service-accounts/gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "gcb-builder", + "email": "gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com", + "name": "projects/k8s-infra-prow-build-trusted/serviceAccounts/gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com", + "oauth2ClientId": "112742619569156756728", + "projectId": "k8s-infra-prow-build-trusted", + "uniqueId": "112742619569156756728" +} diff --git a/audit/projects/k8s-infra-prow-build-trusted/service-accounts/gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-prow-build-trusted/service-accounts/gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..4e79b055061 --- /dev/null +++ b/audit/projects/k8s-infra-prow-build-trusted/service-accounts/gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/iam.json @@ -0,0 +1,11 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:k8s-infra-prow-build-trusted.svc.id.goog[test-pods/gcb-builder]" + ], + "role": "roles/iam.workloadIdentityUser" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-prow-build-trusted/service-accounts/gke-nodes-prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/description.json b/audit/projects/k8s-infra-prow-build-trusted/service-accounts/gke-nodes-prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/description.json new file mode 100644 index 00000000000..888c41dc049 --- /dev/null +++ b/audit/projects/k8s-infra-prow-build-trusted/service-accounts/gke-nodes-prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Nodes in GKE cluster 'prow-build-trusted'", + "email": "gke-nodes-prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com", + "name": "projects/k8s-infra-prow-build-trusted/serviceAccounts/gke-nodes-prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com", + "oauth2ClientId": "115531411197821643772", + "projectId": "k8s-infra-prow-build-trusted", + "uniqueId": "115531411197821643772" +} diff --git a/audit/projects/k8s-infra-prow-build-trusted/service-accounts/gke-nodes-prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-prow-build-trusted/service-accounts/gke-nodes-prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-prow-build-trusted/service-accounts/gke-nodes-prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-prow-build-trusted/service-accounts/prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/description.json b/audit/projects/k8s-infra-prow-build-trusted/service-accounts/prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/description.json new file mode 100644 index 00000000000..ed80c2dffc4 --- /dev/null +++ b/audit/projects/k8s-infra-prow-build-trusted/service-accounts/prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Used by pods in 'prow-build-trusted' GKE cluster", + "email": "prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com", + "name": "projects/k8s-infra-prow-build-trusted/serviceAccounts/prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com", + "oauth2ClientId": "100468422900474789171", + "projectId": "k8s-infra-prow-build-trusted", + "uniqueId": "100468422900474789171" +} diff --git a/audit/projects/k8s-infra-prow-build-trusted/service-accounts/prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-prow-build-trusted/service-accounts/prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..7181fbf982b --- /dev/null +++ b/audit/projects/k8s-infra-prow-build-trusted/service-accounts/prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/iam.json @@ -0,0 +1,11 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:k8s-infra-prow-build-trusted.svc.id.goog[test-pods/prow-build-trusted]" + ], + "role": "roles/iam.workloadIdentityUser" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-prow-build-trusted/services/bigquery/bigquery.datasets.json b/audit/projects/k8s-infra-prow-build-trusted/services/bigquery/bigquery.datasets.json new file mode 100644 index 00000000000..e69de29bb2d diff --git a/audit/projects/k8s-infra-prow-build-trusted/services/compute/project-info.json b/audit/projects/k8s-infra-prow-build-trusted/services/compute/project-info.json new file mode 100644 index 00000000000..4d865b04349 --- /dev/null +++ b/audit/projects/k8s-infra-prow-build-trusted/services/compute/project-info.json @@ -0,0 +1,161 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "gke-prow-build-trusted-8f83dcb7-cidr", + "value": "default:10.4.0.0/14" + }, + { + "key": "sshKeys", + "value": "gke-8f83dcb7a83817de2408:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDcqrAFbHYlsvt25hXLlNR1ZfOixmZUoaPh99ueAu1i94A507qQtfe4QbrQBIvR5r49QOpkDzL6kF0eluXbeLuke8blq7eMYVDOd9NWihUvVc40m79OCzxBXNWgd85en0JcPPuQS+SDNdCqf5CFvv93x3/NnU9riLNOQV6SOK+nTVmoNfKmrKqw0PgrwEFrxM8Wf3XDvSGmEqzT93Jpeij10Wn1tUDOODnPQAODYZQIRUp0WrJnenfE8UzUX75nbRCjiRfOcrQn4vmyMZ1XBkuv7HnbArsHWSRaEcJtF4C8wQx6sLdzw3o6F6LgwVQVEyc4EZJOPfDV+ysy6SnHROd1 gke-8f83dcb7a83817de2408@gke-8f83dcb7a83817de2408\ngke-8f83dcb7a83817de2408:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCVYGyDIkhLSSK6fUovrMQ+4IDeIoLBtVfcYPIQuEoOxS7CDxx1W6m5Hlrxp9pKV9wlQbDy9GbhbqZztisReG3zB11w71g9AMxTVc/IQpDVzOt++Nb4rFIJI46a3lLXuY8MMpH+ch483qtOWEz9hvuvbdqVZ2vLebvUW7oITiZUGaGnGfIjGe1tIDc3DGpBSV/71aJ4Uf235SuZy1D14Uiw6FeNnH7jEpEQdKm2t+wYE02M83DfC6HcQZcV42fvQopuYO9KrCtCA6Op+LBRCdtIKM9PAGik5seT5050bNznHGyqLTcqClT8qzQzzsLbAPnvMEiEGQlNKUH4VosJpAB7 gke-8f83dcb7a83817de2408@gke-8f83dcb7a83817de2408\ngke-8f83dcb7a83817de2408:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCaGRrHYdKzserLbKq4F90jANA1Og3gF79f4cOQ0N8skGqQkrwgFRh+Nb+PtT/Brr0uhZZB0bjdLBrcLWR5VoZQV+zCD/hmjLNBMWWx7satLnqShp2c2Q6db+IBwEuLfD152NqIZMAjgUELI8YmpoyG39u0blzDiDHj4LR2XzgCktYKPRwiPGWvx3I+sNk4YEnTAFynT9kXa601jzBwxr+VvSAMNSJXYf20aISLoPov+28gO5St970NOWjQYcQ8BQAi7jaTbizQOyd+92RWPsPksvvmAafhtqu3Lm5j9tA4ZqJFfX60WTMPeu4viUMf+tJrGNZmrNsFCb4Xvilly9a3 gke-8f83dcb7a83817de2408@gke-8f83dcb7a83817de2408" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-04-30T16:41:21.119-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "180382678033-compute@developer.gserviceaccount.com", + "id": "7420505769285967055", + "kind": "compute#project", + "name": "k8s-infra-prow-build-trusted", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-prow-build-trusted", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-prow-build-trusted/services/container/clusters.txt b/audit/projects/k8s-infra-prow-build-trusted/services/container/clusters.txt new file mode 100644 index 00000000000..87905d88fbc --- /dev/null +++ b/audit/projects/k8s-infra-prow-build-trusted/services/container/clusters.txt @@ -0,0 +1 @@ +prow-build-trusted us-central1 us-central1-a;us-central1-f;us-central1-b 3 RUNNING diff --git a/audit/projects/k8s-infra-prow-build-trusted/services/enabled.txt b/audit/projects/k8s-infra-prow-build-trusted/services/enabled.txt new file mode 100644 index 00000000000..7c5a892d14b --- /dev/null +++ b/audit/projects/k8s-infra-prow-build-trusted/services/enabled.txt @@ -0,0 +1,16 @@ +NAME TITLE +bigquery.googleapis.com BigQuery API +bigquerystorage.googleapis.com BigQuery Storage API +cloudbuild.googleapis.com Cloud Build API +compute.googleapis.com Compute Engine API +container.googleapis.com Kubernetes Engine API +containerregistry.googleapis.com Container Registry API +iam.googleapis.com Identity and Access Management (IAM) API +iamcredentials.googleapis.com IAM Service Account Credentials API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +pubsub.googleapis.com Cloud Pub/Sub API +stackdriver.googleapis.com Stackdriver API +storage-api.googleapis.com Google Cloud Storage JSON API +storage-component.googleapis.com Cloud Storage From dd9e0a5d3679d2359f1b2b60b083fa4b9bedc275 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Wed, 6 May 2020 16:42:43 -0700 Subject: [PATCH 10/14] audit: add k8s-infra-e2e-* gcp projects created via ensure-e2e-projects.sh --- .../k8s-infra-e2e-boskos-001/description.json | 11 ++ .../k8s-infra-e2e-boskos-001/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-002/description.json | 11 ++ .../k8s-infra-e2e-boskos-002/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-003/description.json | 11 ++ .../k8s-infra-e2e-boskos-003/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-004/description.json | 11 ++ .../k8s-infra-e2e-boskos-004/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-005/description.json | 11 ++ .../k8s-infra-e2e-boskos-005/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-006/description.json | 11 ++ .../k8s-infra-e2e-boskos-006/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-007/description.json | 11 ++ .../k8s-infra-e2e-boskos-007/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-008/description.json | 11 ++ .../k8s-infra-e2e-boskos-008/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-009/description.json | 11 ++ .../k8s-infra-e2e-boskos-009/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-010/description.json | 11 ++ .../k8s-infra-e2e-boskos-010/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-011/description.json | 11 ++ .../k8s-infra-e2e-boskos-011/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-012/description.json | 11 ++ .../k8s-infra-e2e-boskos-012/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-013/description.json | 11 ++ .../k8s-infra-e2e-boskos-013/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-014/description.json | 11 ++ .../k8s-infra-e2e-boskos-014/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-015/description.json | 11 ++ .../k8s-infra-e2e-boskos-015/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-016/description.json | 11 ++ .../k8s-infra-e2e-boskos-016/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-017/description.json | 11 ++ .../k8s-infra-e2e-boskos-017/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-018/description.json | 11 ++ .../k8s-infra-e2e-boskos-018/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-019/description.json | 11 ++ .../k8s-infra-e2e-boskos-019/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-020/description.json | 11 ++ .../k8s-infra-e2e-boskos-020/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-021/description.json | 11 ++ .../k8s-infra-e2e-boskos-021/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-022/description.json | 11 ++ .../k8s-infra-e2e-boskos-022/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-023/description.json | 11 ++ .../k8s-infra-e2e-boskos-023/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-024/description.json | 11 ++ .../k8s-infra-e2e-boskos-024/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-025/description.json | 11 ++ .../k8s-infra-e2e-boskos-025/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-026/description.json | 11 ++ .../k8s-infra-e2e-boskos-026/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-027/description.json | 11 ++ .../k8s-infra-e2e-boskos-027/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-028/description.json | 11 ++ .../k8s-infra-e2e-boskos-028/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-029/description.json | 11 ++ .../k8s-infra-e2e-boskos-029/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-030/description.json | 11 ++ .../k8s-infra-e2e-boskos-030/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-031/description.json | 11 ++ .../k8s-infra-e2e-boskos-031/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-032/description.json | 11 ++ .../k8s-infra-e2e-boskos-032/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-033/description.json | 11 ++ .../k8s-infra-e2e-boskos-033/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-034/description.json | 11 ++ .../k8s-infra-e2e-boskos-034/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-035/description.json | 11 ++ .../k8s-infra-e2e-boskos-035/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-036/description.json | 11 ++ .../k8s-infra-e2e-boskos-036/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-037/description.json | 11 ++ .../k8s-infra-e2e-boskos-037/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-038/description.json | 11 ++ .../k8s-infra-e2e-boskos-038/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-039/description.json | 11 ++ .../k8s-infra-e2e-boskos-039/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-040/description.json | 11 ++ .../k8s-infra-e2e-boskos-040/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-gce-project/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-node-e2e-project/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 157 ++++++++++++++++++ .../services/enabled.txt | 6 + 252 files changed, 8778 insertions(+) create mode 100644 audit/projects/k8s-infra-e2e-boskos-001/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-001/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-001/service-accounts/271867469224-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-001/service-accounts/271867469224-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-001/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-001/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-002/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-002/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-002/service-accounts/395811472440-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-002/service-accounts/395811472440-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-002/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-002/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-003/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-003/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-003/service-accounts/117136280642-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-003/service-accounts/117136280642-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-003/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-003/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-004/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-004/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-004/service-accounts/567474418379-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-004/service-accounts/567474418379-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-004/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-004/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-005/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-005/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-005/service-accounts/627327163785-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-005/service-accounts/627327163785-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-005/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-005/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-006/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-006/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-006/service-accounts/312830434057-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-006/service-accounts/312830434057-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-006/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-006/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-007/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-007/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-007/service-accounts/7650953204-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-007/service-accounts/7650953204-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-007/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-007/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-008/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-008/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-008/service-accounts/890593655482-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-008/service-accounts/890593655482-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-008/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-008/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-009/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-009/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-009/service-accounts/1046644858910-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-009/service-accounts/1046644858910-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-009/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-009/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-010/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-010/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-010/service-accounts/370059417603-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-010/service-accounts/370059417603-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-010/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-010/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-011/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-011/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-011/service-accounts/250196439480-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-011/service-accounts/250196439480-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-011/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-011/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-012/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-012/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-012/service-accounts/117960000983-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-012/service-accounts/117960000983-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-012/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-012/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-013/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-013/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-013/service-accounts/993482628758-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-013/service-accounts/993482628758-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-013/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-013/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-014/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-014/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-014/service-accounts/195130400949-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-014/service-accounts/195130400949-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-014/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-014/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-015/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-015/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-015/service-accounts/626382397055-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-015/service-accounts/626382397055-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-015/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-015/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-016/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-016/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-016/service-accounts/689468652908-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-016/service-accounts/689468652908-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-016/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-016/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-017/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-017/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-017/service-accounts/436321592669-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-017/service-accounts/436321592669-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-017/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-017/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-018/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-018/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-018/service-accounts/961650802495-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-018/service-accounts/961650802495-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-018/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-018/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-019/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-019/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-019/service-accounts/492612675321-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-019/service-accounts/492612675321-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-019/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-019/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-020/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-020/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-020/service-accounts/741131917987-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-020/service-accounts/741131917987-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-020/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-020/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-021/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-021/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-021/service-accounts/1073676230139-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-021/service-accounts/1073676230139-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-021/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-021/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-022/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-022/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-022/service-accounts/303123739080-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-022/service-accounts/303123739080-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-022/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-022/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-023/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-023/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-023/service-accounts/2325130472-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-023/service-accounts/2325130472-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-023/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-023/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-024/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-024/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-024/service-accounts/294429263717-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-024/service-accounts/294429263717-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-024/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-024/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-025/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-025/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-025/service-accounts/865842075947-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-025/service-accounts/865842075947-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-025/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-025/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-026/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-026/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-026/service-accounts/314989574020-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-026/service-accounts/314989574020-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-026/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-026/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-027/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-027/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-027/service-accounts/42441632373-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-027/service-accounts/42441632373-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-027/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-027/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-028/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-028/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-028/service-accounts/1097373170051-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-028/service-accounts/1097373170051-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-028/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-028/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-029/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-029/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-029/service-accounts/527274517556-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-029/service-accounts/527274517556-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-029/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-029/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-030/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-030/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-030/service-accounts/580537525558-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-030/service-accounts/580537525558-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-030/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-030/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-031/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-031/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-031/service-accounts/217547755854-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-031/service-accounts/217547755854-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-031/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-031/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-032/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-032/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-032/service-accounts/900987002307-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-032/service-accounts/900987002307-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-032/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-032/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-033/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-033/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-033/service-accounts/452415549210-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-033/service-accounts/452415549210-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-033/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-033/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-034/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-034/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-034/service-accounts/1070426771515-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-034/service-accounts/1070426771515-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-034/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-034/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-035/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-035/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-035/service-accounts/601616359157-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-035/service-accounts/601616359157-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-035/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-035/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-036/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-036/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-036/service-accounts/1014481108942-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-036/service-accounts/1014481108942-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-036/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-036/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-037/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-037/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-037/service-accounts/288806337027-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-037/service-accounts/288806337027-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-037/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-037/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-038/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-038/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-038/service-accounts/415537245831-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-038/service-accounts/415537245831-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-038/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-038/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-039/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-039/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-039/service-accounts/230053707446-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-039/service-accounts/230053707446-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-039/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-039/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-040/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-040/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-040/service-accounts/159632970703-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-040/service-accounts/159632970703-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-040/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-040/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-gce-project/description.json create mode 100644 audit/projects/k8s-infra-e2e-gce-project/iam.json create mode 100644 audit/projects/k8s-infra-e2e-gce-project/service-accounts/302382158096-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-gce-project/service-accounts/302382158096-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-gce-project/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-gce-project/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-node-e2e-project/description.json create mode 100644 audit/projects/k8s-infra-e2e-node-e2e-project/iam.json create mode 100644 audit/projects/k8s-infra-e2e-node-e2e-project/service-accounts/855765450555-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-node-e2e-project/service-accounts/855765450555-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-node-e2e-project/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-node-e2e-project/services/enabled.txt diff --git a/audit/projects/k8s-infra-e2e-boskos-001/description.json b/audit/projects/k8s-infra-e2e-boskos-001/description.json new file mode 100644 index 00000000000..49ccf2ac61e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-001/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-01T00:05:47.378Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-001", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-001", + "projectNumber": "271867469224" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-001/iam.json b/audit/projects/k8s-infra-e2e-boskos-001/iam.json new file mode 100644 index 00000000000..ebc30c9dc37 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-001/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-271867469224@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:271867469224-compute@developer.gserviceaccount.com", + "serviceAccount:271867469224@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-001/service-accounts/271867469224-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-001/service-accounts/271867469224-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..3566eaebb37 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-001/service-accounts/271867469224-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "271867469224-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-001/serviceAccounts/271867469224-compute@developer.gserviceaccount.com", + "oauth2ClientId": "103300983685870175939", + "projectId": "k8s-infra-e2e-boskos-001", + "uniqueId": "103300983685870175939" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-001/service-accounts/271867469224-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-001/service-accounts/271867469224-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-001/service-accounts/271867469224-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-001/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-001/services/compute/project-info.json new file mode 100644 index 00000000000..1a1f3b66344 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-001/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-04-30T17:05:57.957-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "271867469224-compute@developer.gserviceaccount.com", + "id": "4056770666769602826", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-001", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-001", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-001/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-001/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-001/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-002/description.json b/audit/projects/k8s-infra-e2e-boskos-002/description.json new file mode 100644 index 00000000000..25abfabedac --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-002/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-01T00:07:43.107Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-002", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-002", + "projectNumber": "395811472440" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-002/iam.json b/audit/projects/k8s-infra-e2e-boskos-002/iam.json new file mode 100644 index 00000000000..7b2b8eb6cb7 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-002/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-395811472440@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:395811472440-compute@developer.gserviceaccount.com", + "serviceAccount:395811472440@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-002/service-accounts/395811472440-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-002/service-accounts/395811472440-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..f637fa2fc1e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-002/service-accounts/395811472440-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "395811472440-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-002/serviceAccounts/395811472440-compute@developer.gserviceaccount.com", + "oauth2ClientId": "115743698330432504715", + "projectId": "k8s-infra-e2e-boskos-002", + "uniqueId": "115743698330432504715" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-002/service-accounts/395811472440-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-002/service-accounts/395811472440-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-002/service-accounts/395811472440-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-002/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-002/services/compute/project-info.json new file mode 100644 index 00000000000..ceebac670b1 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-002/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-04-30T17:07:54.427-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "395811472440-compute@developer.gserviceaccount.com", + "id": "8457867493711992501", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-002", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-002", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-002/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-002/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-002/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-003/description.json b/audit/projects/k8s-infra-e2e-boskos-003/description.json new file mode 100644 index 00000000000..5b4d8f90d83 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-003/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-01T00:09:48.941Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-003", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-003", + "projectNumber": "117136280642" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-003/iam.json b/audit/projects/k8s-infra-e2e-boskos-003/iam.json new file mode 100644 index 00000000000..6173c5bb624 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-003/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-117136280642@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:117136280642-compute@developer.gserviceaccount.com", + "serviceAccount:117136280642@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-003/service-accounts/117136280642-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-003/service-accounts/117136280642-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..53ec3be0b5a --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-003/service-accounts/117136280642-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "117136280642-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-003/serviceAccounts/117136280642-compute@developer.gserviceaccount.com", + "oauth2ClientId": "104357011759133481129", + "projectId": "k8s-infra-e2e-boskos-003", + "uniqueId": "104357011759133481129" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-003/service-accounts/117136280642-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-003/service-accounts/117136280642-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-003/service-accounts/117136280642-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-003/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-003/services/compute/project-info.json new file mode 100644 index 00000000000..e8ba98400bd --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-003/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-04-30T17:09:59.750-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "117136280642-compute@developer.gserviceaccount.com", + "id": "3732797169053652536", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-003", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-003", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-003/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-003/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-003/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-004/description.json b/audit/projects/k8s-infra-e2e-boskos-004/description.json new file mode 100644 index 00000000000..408988cf679 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-004/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-01T00:12:07.490Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-004", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-004", + "projectNumber": "567474418379" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-004/iam.json b/audit/projects/k8s-infra-e2e-boskos-004/iam.json new file mode 100644 index 00000000000..0c25e45af32 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-004/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-567474418379@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:567474418379-compute@developer.gserviceaccount.com", + "serviceAccount:567474418379@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-004/service-accounts/567474418379-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-004/service-accounts/567474418379-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..fe1800755e6 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-004/service-accounts/567474418379-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "567474418379-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-004/serviceAccounts/567474418379-compute@developer.gserviceaccount.com", + "oauth2ClientId": "106278020820684711942", + "projectId": "k8s-infra-e2e-boskos-004", + "uniqueId": "106278020820684711942" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-004/service-accounts/567474418379-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-004/service-accounts/567474418379-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-004/service-accounts/567474418379-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-004/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-004/services/compute/project-info.json new file mode 100644 index 00000000000..7206e0f2f83 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-004/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-04-30T17:12:17.916-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "567474418379-compute@developer.gserviceaccount.com", + "id": "6095527299275741070", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-004", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-004", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-004/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-004/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-004/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-005/description.json b/audit/projects/k8s-infra-e2e-boskos-005/description.json new file mode 100644 index 00000000000..5cd1f0c1009 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-005/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-01T00:14:43.983Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-005", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-005", + "projectNumber": "627327163785" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-005/iam.json b/audit/projects/k8s-infra-e2e-boskos-005/iam.json new file mode 100644 index 00000000000..4370fe6c524 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-005/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-627327163785@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:627327163785-compute@developer.gserviceaccount.com", + "serviceAccount:627327163785@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-005/service-accounts/627327163785-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-005/service-accounts/627327163785-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..5196d241abe --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-005/service-accounts/627327163785-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "627327163785-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-005/serviceAccounts/627327163785-compute@developer.gserviceaccount.com", + "oauth2ClientId": "114441915415098839261", + "projectId": "k8s-infra-e2e-boskos-005", + "uniqueId": "114441915415098839261" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-005/service-accounts/627327163785-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-005/service-accounts/627327163785-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-005/service-accounts/627327163785-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-005/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-005/services/compute/project-info.json new file mode 100644 index 00000000000..c1e3b50f501 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-005/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-04-30T17:14:55.457-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "627327163785-compute@developer.gserviceaccount.com", + "id": "7705108117843269392", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-005", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-005", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-005/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-005/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-005/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-006/description.json b/audit/projects/k8s-infra-e2e-boskos-006/description.json new file mode 100644 index 00000000000..63ff44ed2f3 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-006/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-01T00:16:50.441Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-006", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-006", + "projectNumber": "312830434057" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-006/iam.json b/audit/projects/k8s-infra-e2e-boskos-006/iam.json new file mode 100644 index 00000000000..d350e9c02d6 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-006/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-312830434057@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:312830434057-compute@developer.gserviceaccount.com", + "serviceAccount:312830434057@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-006/service-accounts/312830434057-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-006/service-accounts/312830434057-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..348f5d912c9 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-006/service-accounts/312830434057-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "312830434057-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-006/serviceAccounts/312830434057-compute@developer.gserviceaccount.com", + "oauth2ClientId": "114296634736477425695", + "projectId": "k8s-infra-e2e-boskos-006", + "uniqueId": "114296634736477425695" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-006/service-accounts/312830434057-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-006/service-accounts/312830434057-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-006/service-accounts/312830434057-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-006/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-006/services/compute/project-info.json new file mode 100644 index 00000000000..276b6a2f33a --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-006/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-04-30T17:17:04.883-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "312830434057-compute@developer.gserviceaccount.com", + "id": "520932878922994799", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-006", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-006", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-006/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-006/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-006/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-007/description.json b/audit/projects/k8s-infra-e2e-boskos-007/description.json new file mode 100644 index 00000000000..f101a20bf90 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-007/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-01T00:18:57.660Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-007", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-007", + "projectNumber": "7650953204" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-007/iam.json b/audit/projects/k8s-infra-e2e-boskos-007/iam.json new file mode 100644 index 00000000000..4e36c1e71df --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-007/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-7650953204@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:7650953204-compute@developer.gserviceaccount.com", + "serviceAccount:7650953204@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-007/service-accounts/7650953204-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-007/service-accounts/7650953204-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..7da8c56a506 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-007/service-accounts/7650953204-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "7650953204-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-007/serviceAccounts/7650953204-compute@developer.gserviceaccount.com", + "oauth2ClientId": "110592845149620317521", + "projectId": "k8s-infra-e2e-boskos-007", + "uniqueId": "110592845149620317521" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-007/service-accounts/7650953204-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-007/service-accounts/7650953204-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-007/service-accounts/7650953204-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-007/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-007/services/compute/project-info.json new file mode 100644 index 00000000000..b8218775c19 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-007/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-04-30T17:19:08.410-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "7650953204-compute@developer.gserviceaccount.com", + "id": "1847964042652996627", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-007", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-007", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-007/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-007/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-007/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-008/description.json b/audit/projects/k8s-infra-e2e-boskos-008/description.json new file mode 100644 index 00000000000..91cbdaf78ac --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-008/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-01T00:21:15.885Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-008", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-008", + "projectNumber": "890593655482" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-008/iam.json b/audit/projects/k8s-infra-e2e-boskos-008/iam.json new file mode 100644 index 00000000000..7aaaa38d75c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-008/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-890593655482@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:890593655482-compute@developer.gserviceaccount.com", + "serviceAccount:890593655482@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-008/service-accounts/890593655482-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-008/service-accounts/890593655482-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..1e311dea9da --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-008/service-accounts/890593655482-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "890593655482-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-008/serviceAccounts/890593655482-compute@developer.gserviceaccount.com", + "oauth2ClientId": "110525970501881598473", + "projectId": "k8s-infra-e2e-boskos-008", + "uniqueId": "110525970501881598473" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-008/service-accounts/890593655482-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-008/service-accounts/890593655482-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-008/service-accounts/890593655482-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-008/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-008/services/compute/project-info.json new file mode 100644 index 00000000000..fdbd8588c26 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-008/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-04-30T17:21:27.500-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "890593655482-compute@developer.gserviceaccount.com", + "id": "8283440513815074152", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-008", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-008", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-008/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-008/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-008/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-009/description.json b/audit/projects/k8s-infra-e2e-boskos-009/description.json new file mode 100644 index 00000000000..30d1b794758 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-009/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-01T00:23:43.230Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-009", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-009", + "projectNumber": "1046644858910" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-009/iam.json b/audit/projects/k8s-infra-e2e-boskos-009/iam.json new file mode 100644 index 00000000000..5403fdf05f6 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-009/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-1046644858910@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:1046644858910-compute@developer.gserviceaccount.com", + "serviceAccount:1046644858910@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-009/service-accounts/1046644858910-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-009/service-accounts/1046644858910-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..1a27ed5041e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-009/service-accounts/1046644858910-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "1046644858910-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-009/serviceAccounts/1046644858910-compute@developer.gserviceaccount.com", + "oauth2ClientId": "104658379554340080297", + "projectId": "k8s-infra-e2e-boskos-009", + "uniqueId": "104658379554340080297" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-009/service-accounts/1046644858910-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-009/service-accounts/1046644858910-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-009/service-accounts/1046644858910-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-009/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-009/services/compute/project-info.json new file mode 100644 index 00000000000..5af00a107b7 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-009/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-04-30T17:23:53.495-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "1046644858910-compute@developer.gserviceaccount.com", + "id": "6132749126540382966", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-009", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-009", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-009/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-009/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-009/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-010/description.json b/audit/projects/k8s-infra-e2e-boskos-010/description.json new file mode 100644 index 00000000000..c0970d06258 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-010/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-01T00:26:08.422Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-010", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-010", + "projectNumber": "370059417603" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-010/iam.json b/audit/projects/k8s-infra-e2e-boskos-010/iam.json new file mode 100644 index 00000000000..682fe78857d --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-010/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-370059417603@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:370059417603-compute@developer.gserviceaccount.com", + "serviceAccount:370059417603@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-010/service-accounts/370059417603-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-010/service-accounts/370059417603-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..eebce67987d --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-010/service-accounts/370059417603-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "370059417603-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-010/serviceAccounts/370059417603-compute@developer.gserviceaccount.com", + "oauth2ClientId": "117844660001779302393", + "projectId": "k8s-infra-e2e-boskos-010", + "uniqueId": "117844660001779302393" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-010/service-accounts/370059417603-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-010/service-accounts/370059417603-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-010/service-accounts/370059417603-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-010/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-010/services/compute/project-info.json new file mode 100644 index 00000000000..862b6faf506 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-010/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-04-30T17:26:19.699-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "370059417603-compute@developer.gserviceaccount.com", + "id": "5398066872883532356", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-010", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-010", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-010/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-010/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-010/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-011/description.json b/audit/projects/k8s-infra-e2e-boskos-011/description.json new file mode 100644 index 00000000000..4f5ea172b40 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-011/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-01T01:12:15.821Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-011", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-011", + "projectNumber": "250196439480" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-011/iam.json b/audit/projects/k8s-infra-e2e-boskos-011/iam.json new file mode 100644 index 00000000000..0379325f019 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-011/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-250196439480@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:250196439480-compute@developer.gserviceaccount.com", + "serviceAccount:250196439480@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-011/service-accounts/250196439480-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-011/service-accounts/250196439480-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..69e2118286a --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-011/service-accounts/250196439480-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "250196439480-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-011/serviceAccounts/250196439480-compute@developer.gserviceaccount.com", + "oauth2ClientId": "112951174010046655567", + "projectId": "k8s-infra-e2e-boskos-011", + "uniqueId": "112951174010046655567" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-011/service-accounts/250196439480-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-011/service-accounts/250196439480-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-011/service-accounts/250196439480-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-011/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-011/services/compute/project-info.json new file mode 100644 index 00000000000..e08e38013ae --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-011/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-04-30T18:12:27.393-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "250196439480-compute@developer.gserviceaccount.com", + "id": "4736268672346540436", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-011", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-011", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-011/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-011/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-011/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-012/description.json b/audit/projects/k8s-infra-e2e-boskos-012/description.json new file mode 100644 index 00000000000..dedcca40783 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-012/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-01T01:14:12.493Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-012", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-012", + "projectNumber": "117960000983" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-012/iam.json b/audit/projects/k8s-infra-e2e-boskos-012/iam.json new file mode 100644 index 00000000000..6dd28db42b1 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-012/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-117960000983@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:117960000983-compute@developer.gserviceaccount.com", + "serviceAccount:117960000983@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-012/service-accounts/117960000983-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-012/service-accounts/117960000983-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..d31716e7157 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-012/service-accounts/117960000983-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "117960000983-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-012/serviceAccounts/117960000983-compute@developer.gserviceaccount.com", + "oauth2ClientId": "110873757392291752757", + "projectId": "k8s-infra-e2e-boskos-012", + "uniqueId": "110873757392291752757" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-012/service-accounts/117960000983-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-012/service-accounts/117960000983-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-012/service-accounts/117960000983-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-012/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-012/services/compute/project-info.json new file mode 100644 index 00000000000..d1e39349ffc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-012/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-04-30T18:14:23.190-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "117960000983-compute@developer.gserviceaccount.com", + "id": "1370616236299700481", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-012", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-012", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-012/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-012/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-012/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-013/description.json b/audit/projects/k8s-infra-e2e-boskos-013/description.json new file mode 100644 index 00000000000..6257a8971c2 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-013/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-01T01:16:38.201Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-013", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-013", + "projectNumber": "993482628758" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-013/iam.json b/audit/projects/k8s-infra-e2e-boskos-013/iam.json new file mode 100644 index 00000000000..77e0d338848 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-013/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-993482628758@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:993482628758-compute@developer.gserviceaccount.com", + "serviceAccount:993482628758@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-013/service-accounts/993482628758-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-013/service-accounts/993482628758-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..928df188395 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-013/service-accounts/993482628758-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "993482628758-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-013/serviceAccounts/993482628758-compute@developer.gserviceaccount.com", + "oauth2ClientId": "105277301157853398368", + "projectId": "k8s-infra-e2e-boskos-013", + "uniqueId": "105277301157853398368" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-013/service-accounts/993482628758-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-013/service-accounts/993482628758-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-013/service-accounts/993482628758-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-013/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-013/services/compute/project-info.json new file mode 100644 index 00000000000..682a381664b --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-013/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-04-30T18:16:48.747-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "993482628758-compute@developer.gserviceaccount.com", + "id": "6867135590094521967", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-013", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-013", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-013/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-013/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-013/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-014/description.json b/audit/projects/k8s-infra-e2e-boskos-014/description.json new file mode 100644 index 00000000000..33121fe6557 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-014/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-01T01:18:55.015Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-014", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-014", + "projectNumber": "195130400949" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-014/iam.json b/audit/projects/k8s-infra-e2e-boskos-014/iam.json new file mode 100644 index 00000000000..b094d799c9a --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-014/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-195130400949@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:195130400949-compute@developer.gserviceaccount.com", + "serviceAccount:195130400949@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-014/service-accounts/195130400949-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-014/service-accounts/195130400949-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..7f9d9ed5071 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-014/service-accounts/195130400949-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "195130400949-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-014/serviceAccounts/195130400949-compute@developer.gserviceaccount.com", + "oauth2ClientId": "106157138269159460925", + "projectId": "k8s-infra-e2e-boskos-014", + "uniqueId": "106157138269159460925" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-014/service-accounts/195130400949-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-014/service-accounts/195130400949-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-014/service-accounts/195130400949-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-014/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-014/services/compute/project-info.json new file mode 100644 index 00000000000..774ccc2df65 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-014/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-04-30T18:19:06.845-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "195130400949-compute@developer.gserviceaccount.com", + "id": "3410195677165570021", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-014", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-014", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-014/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-014/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-014/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-015/description.json b/audit/projects/k8s-infra-e2e-boskos-015/description.json new file mode 100644 index 00000000000..958b6d49428 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-015/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-01T01:21:29.799Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-015", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-015", + "projectNumber": "626382397055" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-015/iam.json b/audit/projects/k8s-infra-e2e-boskos-015/iam.json new file mode 100644 index 00000000000..47db51513af --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-015/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-626382397055@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:626382397055-compute@developer.gserviceaccount.com", + "serviceAccount:626382397055@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-015/service-accounts/626382397055-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-015/service-accounts/626382397055-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..2e27453bc3f --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-015/service-accounts/626382397055-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "626382397055-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-015/serviceAccounts/626382397055-compute@developer.gserviceaccount.com", + "oauth2ClientId": "101626025851488752926", + "projectId": "k8s-infra-e2e-boskos-015", + "uniqueId": "101626025851488752926" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-015/service-accounts/626382397055-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-015/service-accounts/626382397055-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-015/service-accounts/626382397055-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-015/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-015/services/compute/project-info.json new file mode 100644 index 00000000000..4e536f872bf --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-015/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-04-30T18:21:40.809-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "626382397055-compute@developer.gserviceaccount.com", + "id": "1596225083037632331", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-015", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-015", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-015/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-015/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-015/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-016/description.json b/audit/projects/k8s-infra-e2e-boskos-016/description.json new file mode 100644 index 00000000000..586cac0c151 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-016/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-01T01:23:44.898Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-016", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-016", + "projectNumber": "689468652908" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-016/iam.json b/audit/projects/k8s-infra-e2e-boskos-016/iam.json new file mode 100644 index 00000000000..694b8c52637 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-016/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-689468652908@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:689468652908-compute@developer.gserviceaccount.com", + "serviceAccount:689468652908@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-016/service-accounts/689468652908-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-016/service-accounts/689468652908-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..acbdd0582e8 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-016/service-accounts/689468652908-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "689468652908-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-016/serviceAccounts/689468652908-compute@developer.gserviceaccount.com", + "oauth2ClientId": "101590812730663286688", + "projectId": "k8s-infra-e2e-boskos-016", + "uniqueId": "101590812730663286688" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-016/service-accounts/689468652908-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-016/service-accounts/689468652908-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-016/service-accounts/689468652908-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-016/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-016/services/compute/project-info.json new file mode 100644 index 00000000000..0f1ee9f6dd8 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-016/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-04-30T18:23:55.725-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "689468652908-compute@developer.gserviceaccount.com", + "id": "2453476967358842052", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-016", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-016", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-016/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-016/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-016/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-017/description.json b/audit/projects/k8s-infra-e2e-boskos-017/description.json new file mode 100644 index 00000000000..1c17144d5ed --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-017/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-01T01:26:08.041Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-017", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-017", + "projectNumber": "436321592669" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-017/iam.json b/audit/projects/k8s-infra-e2e-boskos-017/iam.json new file mode 100644 index 00000000000..e11e3bd026f --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-017/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-436321592669@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:436321592669-compute@developer.gserviceaccount.com", + "serviceAccount:436321592669@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-017/service-accounts/436321592669-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-017/service-accounts/436321592669-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..cd9c8db100f --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-017/service-accounts/436321592669-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "436321592669-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-017/serviceAccounts/436321592669-compute@developer.gserviceaccount.com", + "oauth2ClientId": "109934433662004669548", + "projectId": "k8s-infra-e2e-boskos-017", + "uniqueId": "109934433662004669548" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-017/service-accounts/436321592669-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-017/service-accounts/436321592669-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-017/service-accounts/436321592669-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-017/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-017/services/compute/project-info.json new file mode 100644 index 00000000000..9e0149591a5 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-017/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-04-30T18:26:19.694-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "436321592669-compute@developer.gserviceaccount.com", + "id": "5388980268273419348", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-017", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-017", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-017/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-017/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-017/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-018/description.json b/audit/projects/k8s-infra-e2e-boskos-018/description.json new file mode 100644 index 00000000000..d6dcc43ba5d --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-018/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-01T01:28:14.104Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-018", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-018", + "projectNumber": "961650802495" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-018/iam.json b/audit/projects/k8s-infra-e2e-boskos-018/iam.json new file mode 100644 index 00000000000..5fd0bd73ae3 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-018/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-961650802495@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:961650802495-compute@developer.gserviceaccount.com", + "serviceAccount:961650802495@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-018/service-accounts/961650802495-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-018/service-accounts/961650802495-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..9e70ac77abb --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-018/service-accounts/961650802495-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "961650802495-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-018/serviceAccounts/961650802495-compute@developer.gserviceaccount.com", + "oauth2ClientId": "100124889103747955234", + "projectId": "k8s-infra-e2e-boskos-018", + "uniqueId": "100124889103747955234" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-018/service-accounts/961650802495-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-018/service-accounts/961650802495-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-018/service-accounts/961650802495-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-018/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-018/services/compute/project-info.json new file mode 100644 index 00000000000..ec235990976 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-018/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-04-30T18:28:29.908-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "961650802495-compute@developer.gserviceaccount.com", + "id": "7016028907812341202", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-018", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-018", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-018/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-018/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-018/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-019/description.json b/audit/projects/k8s-infra-e2e-boskos-019/description.json new file mode 100644 index 00000000000..cd9e43fc845 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-019/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-01T01:30:40.831Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-019", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-019", + "projectNumber": "492612675321" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-019/iam.json b/audit/projects/k8s-infra-e2e-boskos-019/iam.json new file mode 100644 index 00000000000..649bcac9f66 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-019/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-492612675321@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:492612675321-compute@developer.gserviceaccount.com", + "serviceAccount:492612675321@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-019/service-accounts/492612675321-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-019/service-accounts/492612675321-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..4b7080b1018 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-019/service-accounts/492612675321-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "492612675321-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-019/serviceAccounts/492612675321-compute@developer.gserviceaccount.com", + "oauth2ClientId": "102823794912322897793", + "projectId": "k8s-infra-e2e-boskos-019", + "uniqueId": "102823794912322897793" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-019/service-accounts/492612675321-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-019/service-accounts/492612675321-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-019/service-accounts/492612675321-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-019/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-019/services/compute/project-info.json new file mode 100644 index 00000000000..7e5d9b844bf --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-019/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-04-30T18:30:51.963-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "492612675321-compute@developer.gserviceaccount.com", + "id": "955418973246506276", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-019", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-019", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-019/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-019/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-019/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-020/description.json b/audit/projects/k8s-infra-e2e-boskos-020/description.json new file mode 100644 index 00000000000..8109e7e71e6 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-020/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-01T01:33:29.607Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-020", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-020", + "projectNumber": "741131917987" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-020/iam.json b/audit/projects/k8s-infra-e2e-boskos-020/iam.json new file mode 100644 index 00000000000..5e302aef26c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-020/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-741131917987@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:741131917987-compute@developer.gserviceaccount.com", + "serviceAccount:741131917987@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-020/service-accounts/741131917987-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-020/service-accounts/741131917987-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..a85b2a4b726 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-020/service-accounts/741131917987-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "741131917987-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-020/serviceAccounts/741131917987-compute@developer.gserviceaccount.com", + "oauth2ClientId": "107854109060498241249", + "projectId": "k8s-infra-e2e-boskos-020", + "uniqueId": "107854109060498241249" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-020/service-accounts/741131917987-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-020/service-accounts/741131917987-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-020/service-accounts/741131917987-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-020/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-020/services/compute/project-info.json new file mode 100644 index 00000000000..c58ad83d25f --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-020/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-04-30T18:33:40.348-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "741131917987-compute@developer.gserviceaccount.com", + "id": "2160067427583836827", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-020", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-020", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-020/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-020/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-020/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-021/description.json b/audit/projects/k8s-infra-e2e-boskos-021/description.json new file mode 100644 index 00000000000..2d38655ca3f --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-021/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-06T15:53:09.123Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-021", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-021", + "projectNumber": "1073676230139" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-021/iam.json b/audit/projects/k8s-infra-e2e-boskos-021/iam.json new file mode 100644 index 00000000000..6433d0006bf --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-021/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-1073676230139@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:1073676230139-compute@developer.gserviceaccount.com", + "serviceAccount:1073676230139@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-021/service-accounts/1073676230139-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-021/service-accounts/1073676230139-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..91d651fd284 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-021/service-accounts/1073676230139-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "1073676230139-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-021/serviceAccounts/1073676230139-compute@developer.gserviceaccount.com", + "oauth2ClientId": "107935880739977037781", + "projectId": "k8s-infra-e2e-boskos-021", + "uniqueId": "107935880739977037781" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-021/service-accounts/1073676230139-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-021/service-accounts/1073676230139-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-021/service-accounts/1073676230139-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-021/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-021/services/compute/project-info.json new file mode 100644 index 00000000000..e04d37be377 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-021/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-05-06T08:53:21.771-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "1073676230139-compute@developer.gserviceaccount.com", + "id": "1790218297554199454", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-021", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-021", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-021/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-021/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-021/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-022/description.json b/audit/projects/k8s-infra-e2e-boskos-022/description.json new file mode 100644 index 00000000000..24036cf3689 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-022/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-06T15:56:49.857Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-022", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-022", + "projectNumber": "303123739080" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-022/iam.json b/audit/projects/k8s-infra-e2e-boskos-022/iam.json new file mode 100644 index 00000000000..ab04a0ede4e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-022/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-303123739080@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:303123739080-compute@developer.gserviceaccount.com", + "serviceAccount:303123739080@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-022/service-accounts/303123739080-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-022/service-accounts/303123739080-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..51659e2eef9 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-022/service-accounts/303123739080-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "303123739080-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-022/serviceAccounts/303123739080-compute@developer.gserviceaccount.com", + "oauth2ClientId": "116984939921049204828", + "projectId": "k8s-infra-e2e-boskos-022", + "uniqueId": "116984939921049204828" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-022/service-accounts/303123739080-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-022/service-accounts/303123739080-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-022/service-accounts/303123739080-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-022/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-022/services/compute/project-info.json new file mode 100644 index 00000000000..b1837e54345 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-022/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-05-06T08:57:02.552-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "303123739080-compute@developer.gserviceaccount.com", + "id": "4344938886156214433", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-022", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-022", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-022/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-022/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-022/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-023/description.json b/audit/projects/k8s-infra-e2e-boskos-023/description.json new file mode 100644 index 00000000000..02a62a878ea --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-023/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-06T16:01:36.397Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-023", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-023", + "projectNumber": "2325130472" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-023/iam.json b/audit/projects/k8s-infra-e2e-boskos-023/iam.json new file mode 100644 index 00000000000..efe1d07fd11 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-023/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-2325130472@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:2325130472-compute@developer.gserviceaccount.com", + "serviceAccount:2325130472@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-023/service-accounts/2325130472-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-023/service-accounts/2325130472-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..9724cd328eb --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-023/service-accounts/2325130472-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "2325130472-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-023/serviceAccounts/2325130472-compute@developer.gserviceaccount.com", + "oauth2ClientId": "100986138754960309437", + "projectId": "k8s-infra-e2e-boskos-023", + "uniqueId": "100986138754960309437" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-023/service-accounts/2325130472-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-023/service-accounts/2325130472-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-023/service-accounts/2325130472-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-023/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-023/services/compute/project-info.json new file mode 100644 index 00000000000..a167f56b23c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-023/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\n" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-05-06T09:01:50.845-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "2325130472-compute@developer.gserviceaccount.com", + "id": "4909337227103789441", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-023", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-023", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-023/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-023/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-023/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-024/description.json b/audit/projects/k8s-infra-e2e-boskos-024/description.json new file mode 100644 index 00000000000..355a2522238 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-024/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-06T16:04:19.572Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-024", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-024", + "projectNumber": "294429263717" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-024/iam.json b/audit/projects/k8s-infra-e2e-boskos-024/iam.json new file mode 100644 index 00000000000..5920942ea0a --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-024/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-294429263717@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:294429263717-compute@developer.gserviceaccount.com", + "serviceAccount:294429263717@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-024/service-accounts/294429263717-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-024/service-accounts/294429263717-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..beddc5b05df --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-024/service-accounts/294429263717-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "294429263717-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-024/serviceAccounts/294429263717-compute@developer.gserviceaccount.com", + "oauth2ClientId": "110188865239168759133", + "projectId": "k8s-infra-e2e-boskos-024", + "uniqueId": "110188865239168759133" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-024/service-accounts/294429263717-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-024/service-accounts/294429263717-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-024/service-accounts/294429263717-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-024/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-024/services/compute/project-info.json new file mode 100644 index 00000000000..3ed6c37ec54 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-024/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\n" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-05-06T09:04:32.276-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "294429263717-compute@developer.gserviceaccount.com", + "id": "3643964111363989216", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-024", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-024", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-024/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-024/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-024/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-025/description.json b/audit/projects/k8s-infra-e2e-boskos-025/description.json new file mode 100644 index 00000000000..54b9d192c9f --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-025/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-06T16:06:50.319Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-025", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-025", + "projectNumber": "865842075947" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-025/iam.json b/audit/projects/k8s-infra-e2e-boskos-025/iam.json new file mode 100644 index 00000000000..3d44a422126 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-025/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-865842075947@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:865842075947-compute@developer.gserviceaccount.com", + "serviceAccount:865842075947@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-025/service-accounts/865842075947-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-025/service-accounts/865842075947-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..a93293aab60 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-025/service-accounts/865842075947-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "865842075947-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-025/serviceAccounts/865842075947-compute@developer.gserviceaccount.com", + "oauth2ClientId": "109899258226496723465", + "projectId": "k8s-infra-e2e-boskos-025", + "uniqueId": "109899258226496723465" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-025/service-accounts/865842075947-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-025/service-accounts/865842075947-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-025/service-accounts/865842075947-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-025/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-025/services/compute/project-info.json new file mode 100644 index 00000000000..b0feb50e069 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-025/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\n" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-05-06T09:07:02.102-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "865842075947-compute@developer.gserviceaccount.com", + "id": "3173001061659008586", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-025", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-025", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-025/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-025/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-025/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-026/description.json b/audit/projects/k8s-infra-e2e-boskos-026/description.json new file mode 100644 index 00000000000..44c81027525 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-026/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-06T16:09:37.130Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-026", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-026", + "projectNumber": "314989574020" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-026/iam.json b/audit/projects/k8s-infra-e2e-boskos-026/iam.json new file mode 100644 index 00000000000..9d476c7cd25 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-026/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-314989574020@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:314989574020-compute@developer.gserviceaccount.com", + "serviceAccount:314989574020@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-026/service-accounts/314989574020-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-026/service-accounts/314989574020-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..984d0fb7cd9 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-026/service-accounts/314989574020-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "314989574020-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-026/serviceAccounts/314989574020-compute@developer.gserviceaccount.com", + "oauth2ClientId": "102914589325422916411", + "projectId": "k8s-infra-e2e-boskos-026", + "uniqueId": "102914589325422916411" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-026/service-accounts/314989574020-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-026/service-accounts/314989574020-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-026/service-accounts/314989574020-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-026/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-026/services/compute/project-info.json new file mode 100644 index 00000000000..30e1ea6291f --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-026/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-05-06T09:09:49.273-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "314989574020-compute@developer.gserviceaccount.com", + "id": "1650266844048613282", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-026", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-026", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-026/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-026/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-026/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-027/description.json b/audit/projects/k8s-infra-e2e-boskos-027/description.json new file mode 100644 index 00000000000..1d395a362eb --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-027/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-06T16:12:26.152Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-027", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-027", + "projectNumber": "42441632373" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-027/iam.json b/audit/projects/k8s-infra-e2e-boskos-027/iam.json new file mode 100644 index 00000000000..c46c437281a --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-027/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-42441632373@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:42441632373-compute@developer.gserviceaccount.com", + "serviceAccount:42441632373@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-027/service-accounts/42441632373-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-027/service-accounts/42441632373-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..dafec69118f --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-027/service-accounts/42441632373-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "42441632373-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-027/serviceAccounts/42441632373-compute@developer.gserviceaccount.com", + "oauth2ClientId": "112487396685108510896", + "projectId": "k8s-infra-e2e-boskos-027", + "uniqueId": "112487396685108510896" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-027/service-accounts/42441632373-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-027/service-accounts/42441632373-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-027/service-accounts/42441632373-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-027/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-027/services/compute/project-info.json new file mode 100644 index 00000000000..dbb949fcae3 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-027/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-05-06T09:12:39.214-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "42441632373-compute@developer.gserviceaccount.com", + "id": "2571034925241163545", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-027", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-027", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-027/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-027/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-027/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-028/description.json b/audit/projects/k8s-infra-e2e-boskos-028/description.json new file mode 100644 index 00000000000..dbca143ed78 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-028/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-06T16:14:59.126Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-028", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-028", + "projectNumber": "1097373170051" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-028/iam.json b/audit/projects/k8s-infra-e2e-boskos-028/iam.json new file mode 100644 index 00000000000..f98ee76445d --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-028/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-1097373170051@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:1097373170051-compute@developer.gserviceaccount.com", + "serviceAccount:1097373170051@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-028/service-accounts/1097373170051-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-028/service-accounts/1097373170051-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..f515c7a571e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-028/service-accounts/1097373170051-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "1097373170051-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-028/serviceAccounts/1097373170051-compute@developer.gserviceaccount.com", + "oauth2ClientId": "116533670875979204994", + "projectId": "k8s-infra-e2e-boskos-028", + "uniqueId": "116533670875979204994" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-028/service-accounts/1097373170051-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-028/service-accounts/1097373170051-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-028/service-accounts/1097373170051-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-028/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-028/services/compute/project-info.json new file mode 100644 index 00000000000..29c33f32063 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-028/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\n" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-05-06T09:15:11.969-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "1097373170051-compute@developer.gserviceaccount.com", + "id": "3233051413196004448", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-028", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-028", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-028/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-028/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-028/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-029/description.json b/audit/projects/k8s-infra-e2e-boskos-029/description.json new file mode 100644 index 00000000000..0f8e4af6804 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-029/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-06T16:17:22.868Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-029", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-029", + "projectNumber": "527274517556" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-029/iam.json b/audit/projects/k8s-infra-e2e-boskos-029/iam.json new file mode 100644 index 00000000000..983fd2c0128 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-029/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-527274517556@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:527274517556-compute@developer.gserviceaccount.com", + "serviceAccount:527274517556@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-029/service-accounts/527274517556-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-029/service-accounts/527274517556-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..5413e25914a --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-029/service-accounts/527274517556-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "527274517556-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-029/serviceAccounts/527274517556-compute@developer.gserviceaccount.com", + "oauth2ClientId": "116948678442471176479", + "projectId": "k8s-infra-e2e-boskos-029", + "uniqueId": "116948678442471176479" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-029/service-accounts/527274517556-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-029/service-accounts/527274517556-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-029/service-accounts/527274517556-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-029/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-029/services/compute/project-info.json new file mode 100644 index 00000000000..d2e563b7ebd --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-029/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-05-06T09:17:35.447-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "527274517556-compute@developer.gserviceaccount.com", + "id": "2813099672885747184", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-029", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-029", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-029/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-029/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-029/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-030/description.json b/audit/projects/k8s-infra-e2e-boskos-030/description.json new file mode 100644 index 00000000000..8a0d74e65b4 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-030/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-06T16:19:39.568Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-030", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-030", + "projectNumber": "580537525558" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-030/iam.json b/audit/projects/k8s-infra-e2e-boskos-030/iam.json new file mode 100644 index 00000000000..da5a9985893 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-030/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-580537525558@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:580537525558-compute@developer.gserviceaccount.com", + "serviceAccount:580537525558@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-030/service-accounts/580537525558-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-030/service-accounts/580537525558-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..7e9c9c5375e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-030/service-accounts/580537525558-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "580537525558-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-030/serviceAccounts/580537525558-compute@developer.gserviceaccount.com", + "oauth2ClientId": "106205745571811319526", + "projectId": "k8s-infra-e2e-boskos-030", + "uniqueId": "106205745571811319526" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-030/service-accounts/580537525558-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-030/service-accounts/580537525558-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-030/service-accounts/580537525558-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-030/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-030/services/compute/project-info.json new file mode 100644 index 00000000000..1749d730c28 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-030/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-05-06T09:19:52.644-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "580537525558-compute@developer.gserviceaccount.com", + "id": "7771747275631451463", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-030", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-030", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-030/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-030/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-030/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-031/description.json b/audit/projects/k8s-infra-e2e-boskos-031/description.json new file mode 100644 index 00000000000..8e8e9957e2f --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-031/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-06T16:21:56.817Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-031", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-031", + "projectNumber": "217547755854" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-031/iam.json b/audit/projects/k8s-infra-e2e-boskos-031/iam.json new file mode 100644 index 00000000000..1834e1b12b2 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-031/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-217547755854@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:217547755854-compute@developer.gserviceaccount.com", + "serviceAccount:217547755854@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-031/service-accounts/217547755854-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-031/service-accounts/217547755854-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..6ade55f7f47 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-031/service-accounts/217547755854-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "217547755854-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-031/serviceAccounts/217547755854-compute@developer.gserviceaccount.com", + "oauth2ClientId": "103327286315953747642", + "projectId": "k8s-infra-e2e-boskos-031", + "uniqueId": "103327286315953747642" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-031/service-accounts/217547755854-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-031/service-accounts/217547755854-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-031/service-accounts/217547755854-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-031/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-031/services/compute/project-info.json new file mode 100644 index 00000000000..7ad42aec211 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-031/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-05-06T09:22:10.789-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "217547755854-compute@developer.gserviceaccount.com", + "id": "1291504300213623517", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-031", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-031", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-031/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-031/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-031/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-032/description.json b/audit/projects/k8s-infra-e2e-boskos-032/description.json new file mode 100644 index 00000000000..24c9357141c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-032/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-06T16:24:23.116Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-032", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-032", + "projectNumber": "900987002307" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-032/iam.json b/audit/projects/k8s-infra-e2e-boskos-032/iam.json new file mode 100644 index 00000000000..b47f94f7a95 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-032/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-900987002307@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:900987002307-compute@developer.gserviceaccount.com", + "serviceAccount:900987002307@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-032/service-accounts/900987002307-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-032/service-accounts/900987002307-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..b97658fbf39 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-032/service-accounts/900987002307-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "900987002307-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-032/serviceAccounts/900987002307-compute@developer.gserviceaccount.com", + "oauth2ClientId": "103342800971687532177", + "projectId": "k8s-infra-e2e-boskos-032", + "uniqueId": "103342800971687532177" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-032/service-accounts/900987002307-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-032/service-accounts/900987002307-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-032/service-accounts/900987002307-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-032/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-032/services/compute/project-info.json new file mode 100644 index 00000000000..747c3f7ed7a --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-032/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\n" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-05-06T09:24:35.226-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "900987002307-compute@developer.gserviceaccount.com", + "id": "4407315907376798253", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-032", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-032", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-032/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-032/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-032/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-033/description.json b/audit/projects/k8s-infra-e2e-boskos-033/description.json new file mode 100644 index 00000000000..c712584bcb0 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-033/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-06T16:26:55.247Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-033", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-033", + "projectNumber": "452415549210" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-033/iam.json b/audit/projects/k8s-infra-e2e-boskos-033/iam.json new file mode 100644 index 00000000000..13c3f1aff73 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-033/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-452415549210@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:452415549210-compute@developer.gserviceaccount.com", + "serviceAccount:452415549210@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-033/service-accounts/452415549210-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-033/service-accounts/452415549210-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..375790c7284 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-033/service-accounts/452415549210-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "452415549210-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-033/serviceAccounts/452415549210-compute@developer.gserviceaccount.com", + "oauth2ClientId": "110235197132006781872", + "projectId": "k8s-infra-e2e-boskos-033", + "uniqueId": "110235197132006781872" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-033/service-accounts/452415549210-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-033/service-accounts/452415549210-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-033/service-accounts/452415549210-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-033/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-033/services/compute/project-info.json new file mode 100644 index 00000000000..90688e306a9 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-033/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\n" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-05-06T09:27:06.159-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "452415549210-compute@developer.gserviceaccount.com", + "id": "6899224544894999478", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-033", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-033", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-033/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-033/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-033/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-034/description.json b/audit/projects/k8s-infra-e2e-boskos-034/description.json new file mode 100644 index 00000000000..031634c4c36 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-034/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-06T16:29:16.406Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-034", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-034", + "projectNumber": "1070426771515" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-034/iam.json b/audit/projects/k8s-infra-e2e-boskos-034/iam.json new file mode 100644 index 00000000000..888fd45b3da --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-034/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-1070426771515@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:1070426771515-compute@developer.gserviceaccount.com", + "serviceAccount:1070426771515@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-034/service-accounts/1070426771515-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-034/service-accounts/1070426771515-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..85bf9f8f8f5 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-034/service-accounts/1070426771515-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "1070426771515-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-034/serviceAccounts/1070426771515-compute@developer.gserviceaccount.com", + "oauth2ClientId": "110894339031916037913", + "projectId": "k8s-infra-e2e-boskos-034", + "uniqueId": "110894339031916037913" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-034/service-accounts/1070426771515-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-034/service-accounts/1070426771515-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-034/service-accounts/1070426771515-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-034/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-034/services/compute/project-info.json new file mode 100644 index 00000000000..1cfb6968bd3 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-034/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-05-06T09:29:29.967-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "1070426771515-compute@developer.gserviceaccount.com", + "id": "4148430590332328710", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-034", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-034", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-034/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-034/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-034/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-035/description.json b/audit/projects/k8s-infra-e2e-boskos-035/description.json new file mode 100644 index 00000000000..9868e5cdbcb --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-035/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-06T16:31:36.067Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-035", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-035", + "projectNumber": "601616359157" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-035/iam.json b/audit/projects/k8s-infra-e2e-boskos-035/iam.json new file mode 100644 index 00000000000..2dd97fedaa0 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-035/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-601616359157@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:601616359157-compute@developer.gserviceaccount.com", + "serviceAccount:601616359157@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-035/service-accounts/601616359157-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-035/service-accounts/601616359157-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..f6b262a7ce6 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-035/service-accounts/601616359157-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "601616359157-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-035/serviceAccounts/601616359157-compute@developer.gserviceaccount.com", + "oauth2ClientId": "104158397581975939590", + "projectId": "k8s-infra-e2e-boskos-035", + "uniqueId": "104158397581975939590" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-035/service-accounts/601616359157-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-035/service-accounts/601616359157-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-035/service-accounts/601616359157-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-035/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-035/services/compute/project-info.json new file mode 100644 index 00000000000..6330b15bbca --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-035/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\n" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-05-06T09:31:49.623-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "601616359157-compute@developer.gserviceaccount.com", + "id": "6180217032082938010", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-035", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-035", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-035/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-035/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-035/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-036/description.json b/audit/projects/k8s-infra-e2e-boskos-036/description.json new file mode 100644 index 00000000000..a443d773788 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-036/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-06T16:34:39.378Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-036", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-036", + "projectNumber": "1014481108942" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-036/iam.json b/audit/projects/k8s-infra-e2e-boskos-036/iam.json new file mode 100644 index 00000000000..ab16fa76a5b --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-036/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-1014481108942@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:1014481108942-compute@developer.gserviceaccount.com", + "serviceAccount:1014481108942@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-036/service-accounts/1014481108942-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-036/service-accounts/1014481108942-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..a1d1d82f63d --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-036/service-accounts/1014481108942-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "1014481108942-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-036/serviceAccounts/1014481108942-compute@developer.gserviceaccount.com", + "oauth2ClientId": "102152068856927442864", + "projectId": "k8s-infra-e2e-boskos-036", + "uniqueId": "102152068856927442864" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-036/service-accounts/1014481108942-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-036/service-accounts/1014481108942-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-036/service-accounts/1014481108942-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-036/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-036/services/compute/project-info.json new file mode 100644 index 00000000000..5eb1133433b --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-036/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-05-06T09:34:53.576-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "1014481108942-compute@developer.gserviceaccount.com", + "id": "6378319134435793346", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-036", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-036", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-036/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-036/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-036/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-037/description.json b/audit/projects/k8s-infra-e2e-boskos-037/description.json new file mode 100644 index 00000000000..d492ea60273 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-037/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-06T16:37:24.779Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-037", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-037", + "projectNumber": "288806337027" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-037/iam.json b/audit/projects/k8s-infra-e2e-boskos-037/iam.json new file mode 100644 index 00000000000..4fe7fb5fdd5 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-037/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-288806337027@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:288806337027-compute@developer.gserviceaccount.com", + "serviceAccount:288806337027@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-037/service-accounts/288806337027-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-037/service-accounts/288806337027-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..d01d9608895 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-037/service-accounts/288806337027-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "288806337027-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-037/serviceAccounts/288806337027-compute@developer.gserviceaccount.com", + "oauth2ClientId": "109501931145873062133", + "projectId": "k8s-infra-e2e-boskos-037", + "uniqueId": "109501931145873062133" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-037/service-accounts/288806337027-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-037/service-accounts/288806337027-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-037/service-accounts/288806337027-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-037/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-037/services/compute/project-info.json new file mode 100644 index 00000000000..ef538501a65 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-037/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-05-06T09:37:38.045-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "288806337027-compute@developer.gserviceaccount.com", + "id": "4321955274909767998", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-037", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-037", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-037/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-037/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-037/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-038/description.json b/audit/projects/k8s-infra-e2e-boskos-038/description.json new file mode 100644 index 00000000000..52ffed92293 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-038/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-06T16:39:46.875Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-038", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-038", + "projectNumber": "415537245831" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-038/iam.json b/audit/projects/k8s-infra-e2e-boskos-038/iam.json new file mode 100644 index 00000000000..6b0d0cb98f9 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-038/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-415537245831@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:415537245831-compute@developer.gserviceaccount.com", + "serviceAccount:415537245831@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-038/service-accounts/415537245831-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-038/service-accounts/415537245831-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..26f2750d475 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-038/service-accounts/415537245831-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "415537245831-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-038/serviceAccounts/415537245831-compute@developer.gserviceaccount.com", + "oauth2ClientId": "104988344587043345745", + "projectId": "k8s-infra-e2e-boskos-038", + "uniqueId": "104988344587043345745" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-038/service-accounts/415537245831-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-038/service-accounts/415537245831-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-038/service-accounts/415537245831-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-038/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-038/services/compute/project-info.json new file mode 100644 index 00000000000..3d0ac8f5420 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-038/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-05-06T09:39:59.139-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "415537245831-compute@developer.gserviceaccount.com", + "id": "7671479975616140977", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-038", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-038", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-038/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-038/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-038/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-039/description.json b/audit/projects/k8s-infra-e2e-boskos-039/description.json new file mode 100644 index 00000000000..050991a4585 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-039/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-06T16:42:16.116Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-039", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-039", + "projectNumber": "230053707446" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-039/iam.json b/audit/projects/k8s-infra-e2e-boskos-039/iam.json new file mode 100644 index 00000000000..8d0f5b18d6c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-039/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-230053707446@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:230053707446-compute@developer.gserviceaccount.com", + "serviceAccount:230053707446@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-039/service-accounts/230053707446-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-039/service-accounts/230053707446-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..cc26afc04a2 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-039/service-accounts/230053707446-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "230053707446-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-039/serviceAccounts/230053707446-compute@developer.gserviceaccount.com", + "oauth2ClientId": "106642468099266278580", + "projectId": "k8s-infra-e2e-boskos-039", + "uniqueId": "106642468099266278580" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-039/service-accounts/230053707446-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-039/service-accounts/230053707446-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-039/service-accounts/230053707446-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-039/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-039/services/compute/project-info.json new file mode 100644 index 00000000000..4e01a7de63c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-039/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\n" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-05-06T09:42:29.543-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "230053707446-compute@developer.gserviceaccount.com", + "id": "2571969686218429978", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-039", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-039", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-039/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-039/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-039/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-040/description.json b/audit/projects/k8s-infra-e2e-boskos-040/description.json new file mode 100644 index 00000000000..748008f3b55 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-040/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-06T16:44:37.748Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-040", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-040", + "projectNumber": "159632970703" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-040/iam.json b/audit/projects/k8s-infra-e2e-boskos-040/iam.json new file mode 100644 index 00000000000..6a7134fd1d7 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-040/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-159632970703@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:159632970703-compute@developer.gserviceaccount.com", + "serviceAccount:159632970703@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-040/service-accounts/159632970703-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-040/service-accounts/159632970703-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..c3d2c5376ba --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-040/service-accounts/159632970703-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "159632970703-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-040/serviceAccounts/159632970703-compute@developer.gserviceaccount.com", + "oauth2ClientId": "113654239549405329352", + "projectId": "k8s-infra-e2e-boskos-040", + "uniqueId": "113654239549405329352" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-040/service-accounts/159632970703-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-040/service-accounts/159632970703-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-040/service-accounts/159632970703-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-040/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-040/services/compute/project-info.json new file mode 100644 index 00000000000..926d9e78f0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-040/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\n" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-05-06T09:44:50.244-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "159632970703-compute@developer.gserviceaccount.com", + "id": "702828334502860654", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-040", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-040", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-040/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-040/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-040/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-gce-project/description.json b/audit/projects/k8s-infra-e2e-gce-project/description.json new file mode 100644 index 00000000000..1899e7abc3b --- /dev/null +++ b/audit/projects/k8s-infra-e2e-gce-project/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-01T00:01:12.490Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-gce-project", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-gce-project", + "projectNumber": "302382158096" +} diff --git a/audit/projects/k8s-infra-e2e-gce-project/iam.json b/audit/projects/k8s-infra-e2e-gce-project/iam.json new file mode 100644 index 00000000000..1a48f103573 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-gce-project/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-302382158096@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:302382158096-compute@developer.gserviceaccount.com", + "serviceAccount:302382158096@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-gce-project/service-accounts/302382158096-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-gce-project/service-accounts/302382158096-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..78ceb5f4e53 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-gce-project/service-accounts/302382158096-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "302382158096-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-gce-project/serviceAccounts/302382158096-compute@developer.gserviceaccount.com", + "oauth2ClientId": "104899080692491762246", + "projectId": "k8s-infra-e2e-gce-project", + "uniqueId": "104899080692491762246" +} diff --git a/audit/projects/k8s-infra-e2e-gce-project/service-accounts/302382158096-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-gce-project/service-accounts/302382158096-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-gce-project/service-accounts/302382158096-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-gce-project/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-gce-project/services/compute/project-info.json new file mode 100644 index 00000000000..c0efe2018a0 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-gce-project/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\n" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-04-30T17:01:22.898-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "302382158096-compute@developer.gserviceaccount.com", + "id": "295463627212118077", + "kind": "compute#project", + "name": "k8s-infra-e2e-gce-project", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-gce-project", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-gce-project/services/enabled.txt b/audit/projects/k8s-infra-e2e-gce-project/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-gce-project/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-node-e2e-project/description.json b/audit/projects/k8s-infra-e2e-node-e2e-project/description.json new file mode 100644 index 00000000000..de7b2a64ed4 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-node-e2e-project/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-01T00:03:32.673Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-node-e2e-project", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-node-e2e-project", + "projectNumber": "855765450555" +} diff --git a/audit/projects/k8s-infra-e2e-node-e2e-project/iam.json b/audit/projects/k8s-infra-e2e-node-e2e-project/iam.json new file mode 100644 index 00000000000..6a0ac27099a --- /dev/null +++ b/audit/projects/k8s-infra-e2e-node-e2e-project/iam.json @@ -0,0 +1,26 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-855765450555@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:855765450555-compute@developer.gserviceaccount.com", + "serviceAccount:855765450555@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-node-e2e-project/service-accounts/855765450555-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-node-e2e-project/service-accounts/855765450555-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..26f30036bf4 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-node-e2e-project/service-accounts/855765450555-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "855765450555-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-node-e2e-project/serviceAccounts/855765450555-compute@developer.gserviceaccount.com", + "oauth2ClientId": "118233734876699559886", + "projectId": "k8s-infra-e2e-node-e2e-project", + "uniqueId": "118233734876699559886" +} diff --git a/audit/projects/k8s-infra-e2e-node-e2e-project/service-accounts/855765450555-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-node-e2e-project/service-accounts/855765450555-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-node-e2e-project/service-accounts/855765450555-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-node-e2e-project/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-node-e2e-project/services/compute/project-info.json new file mode 100644 index 00000000000..c1a79983af7 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-node-e2e-project/services/compute/project-info.json @@ -0,0 +1,157 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\n" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-04-30T17:03:42.840-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "855765450555-compute@developer.gserviceaccount.com", + "id": "1605083010704005553", + "kind": "compute#project", + "name": "k8s-infra-e2e-node-e2e-project", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-node-e2e-project", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-node-e2e-project/services/enabled.txt b/audit/projects/k8s-infra-e2e-node-e2e-project/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-node-e2e-project/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage From 0b4c81b5449916d8df7094668223331d63a9da17 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Wed, 6 May 2020 16:44:06 -0700 Subject: [PATCH 11/14] audit: add k8s-infra-gcp-auditor svcacct --- .../description.json | 8 ++++++++ .../iam.json | 12 ++++++++++++ 2 files changed, 20 insertions(+) create mode 100644 audit/projects/kubernetes-public/service-accounts/k8s-infra-gcp-auditor@kubernetes-public.iam.gserviceaccount.com/description.json create mode 100644 audit/projects/kubernetes-public/service-accounts/k8s-infra-gcp-auditor@kubernetes-public.iam.gserviceaccount.com/iam.json diff --git a/audit/projects/kubernetes-public/service-accounts/k8s-infra-gcp-auditor@kubernetes-public.iam.gserviceaccount.com/description.json b/audit/projects/kubernetes-public/service-accounts/k8s-infra-gcp-auditor@kubernetes-public.iam.gserviceaccount.com/description.json new file mode 100644 index 00000000000..498e656e689 --- /dev/null +++ b/audit/projects/kubernetes-public/service-accounts/k8s-infra-gcp-auditor@kubernetes-public.iam.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Grants readonly access to org resources", + "email": "k8s-infra-gcp-auditor@kubernetes-public.iam.gserviceaccount.com", + "name": "projects/kubernetes-public/serviceAccounts/k8s-infra-gcp-auditor@kubernetes-public.iam.gserviceaccount.com", + "oauth2ClientId": "114307448815736377866", + "projectId": "kubernetes-public", + "uniqueId": "114307448815736377866" +} diff --git a/audit/projects/kubernetes-public/service-accounts/k8s-infra-gcp-auditor@kubernetes-public.iam.gserviceaccount.com/iam.json b/audit/projects/kubernetes-public/service-accounts/k8s-infra-gcp-auditor@kubernetes-public.iam.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..06b09be5633 --- /dev/null +++ b/audit/projects/kubernetes-public/service-accounts/k8s-infra-gcp-auditor@kubernetes-public.iam.gserviceaccount.com/iam.json @@ -0,0 +1,12 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:k8s-infra-prow-build-trusted.svc.id.goog[test-pods/k8s-infra-gcp-auditor]", + "serviceAccount:kubernetes-public.svc.id.goog[test-pods/k8s-infra-gcp-auditor]" + ], + "role": "roles/iam.workloadIdentityUser" + } + ], + "version": 1 +} From f29a0be1c107f687d12338349aec3678c445337b Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Wed, 6 May 2020 16:45:07 -0700 Subject: [PATCH 12/14] audit: refresh ssh keys for kubernetes-public sshKeys: deleted dev2 cluster ssh-keys: accidental deletion, but they expired so not replacing --- .../services/compute/project-info.json | 17 ++++------------- 1 file changed, 4 insertions(+), 13 deletions(-) diff --git a/audit/projects/kubernetes-public/services/compute/project-info.json b/audit/projects/kubernetes-public/services/compute/project-info.json index ca5f253322c..32618452d8e 100644 --- a/audit/projects/kubernetes-public/services/compute/project-info.json +++ b/audit/projects/kubernetes-public/services/compute/project-info.json @@ -1,22 +1,13 @@ { "commonInstanceMetadata": { - "fingerprint": "9_em4FUS_lU=", "items": [ - { - "key": "sshKeys", - "value": "\ngke-d554984da2fcb0ac8bc0:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCciUMboaB8M/sJNv26iHSudr8Tv5P/TYDuiLlX6l3+4zxwzGa9rjT+0tmG4VkFFlZNEMq9Rn0bK2uFrJXaep8KbhpMz2pX9H8h+1RXOzVBjIBqbo3D5k87u9TzuLAgozdxxP/eiMdJ4OT0u/YIqTIDVJPcNEDvkHdo/Kl5KplfwBOQVpQq2muzqQweCBNeEvekvF6YL1YcUY25nnCR/e/ANLYZFnTofCe878wMZagdteimGh07fUuYJfOna2XhPQrfN1kNrDlEVfzwnQSvM81nFvCRlYezSZdvmT4GDUbDMf9sN1SbocLzNU2MjjwUd2xZfuuEI8PV/iCwWMYRSf5v gke-d554984da2fcb0ac8bc0@gke-d554984da2fcb0ac8bc0\ngke-4d0eb7639c079dd86863:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKXgEw3R4S+t496FUji26QwLbLIUESOgiWTPVTaxqEvQnNQzTV67IPk7JEgKoYV5Dff6Q3D3Zh0EJM1RhpIddhgQLTPOO9/vQcdtf9Vz7yLyL8s/f5ki5Lvj1zCEN7jObBG6KXihHxodPgOeMX4NidKUOAzHXnTCzDBa0JOl4lCUy1KOd803X5F1ZRsL3L2Hxt8o9XarNF1cB0i3Kp++FXVEhPtFy/mmt7nMW3vtibNde4YiUsRbdAX7NVuo5WAleKYLrm4Y+ag3YsVBXHrNc3tTX1qObAcyA1hMq9lj/gojsjMukAev4OpKUarLZ9/3HpJsNHNgiprzsf64D5Gc8N gke-4d0eb7639c079dd86863@gke-4d0eb7639c079dd86863\ngke-4d0eb7639c079dd86863:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQt9qiv2SV6ov+lrjeD5pfqMU02I6BLmUPXJyMPwXAAnukAcBNyO1bS3jUuGWMb/jKRBS/vq8EV8+urAB0pbHUvuCXm4+sV4ijhvft4LX9cZlnC5OrvWnWTWXyWFTAv6fEGMd9MjxjOoBPKzrfDlPcdXNxa+1zCqG2zvDhhGKaEehqdGInnjmlDQbWKRzXB7zcIlf6mjK0VynPeoCpipQX4zRUqhAYKwIvrHDrFoP2hsdv2ohubAJ69PfqOX+QzVQacXbLFCDdN8DUVW7HouHzE2mfKKM2Jc9PFj/9iqG0aq0Yxfw+YAHqXs6T/rpN3nNxBuHdJWeLVrGRXaP/GQVt gke-4d0eb7639c079dd86863@gke-4d0eb7639c079dd86863\ngke-4d0eb7639c079dd86863:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBNMH5E+KJ5ZCzXQHeGo2UviWijMTaOooI8DLkfM6gd1TWbta8QPxbz1R6haOTHwCuBosGe94ldwUgCGHBbCDdgGWvFHYRa7mGRYkqHtmaUafe0esUlfhA1dB3a7d4HvsCEXj2h6ukjA7RCJTH7Xo5Eohe9i61gecg84YNQjyop9mbBnCbwqfxx/z+wy+5kQ0+n5oeTJHT13xvZTcKbX4UuEFziive1J+O9pkXvDPStCRfzd08M39PzTxm9Ipi+10v9bk8KkH8ET0hnLtTJgveBVMszMr1St5JwNfMdTyihEWkAwlzG6v7HBEcude5YHmhypQQ/7/rRIzRV8lofFjn gke-4d0eb7639c079dd86863@gke-4d0eb7639c079dd86863" - }, - { - "key": "gke-development2-d554984d-cidr", - "value": "default:10.48.0.0/14" - }, - { - "key": "ssh-keys", - "value": "davanum:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAGzbjz/9gjnmMMxhoTtwBHsJ55MTVOq4DUV8L2h/hheAMp6UlDz63CVanDk9fhc4f9cFshNfz5cfJKFVghaNhuvJdg9/HZWM5Ittxedsk5V9AvLdAMpCn5u2HI7jAHLgTKff/XdjbanZPhvH2fLI6vaz2smsINzEFfMr3bqP64BM7VaHlM4BxOohL0o5S5oCjnuQaeVWSDd5BFuTeH25TsL7xzromCrubE9ARvXSUmPbHj5S1WrCEDXSfIWaOjJu4IVM28RtLtgVOrxR3J9hLnqz5nD2OB/1jC6agHSC/nZ50uu6+WGF8SRaOf5OfifDUCEhAFnHgIyFUU7BttOq8c0= google-ssh {\"userName\":\"davanum@gmail.com\",\"expireOn\":\"2020-01-28T15:21:55+0000\"}\ndavanum:ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBO/UMR7NA99YiCIEntowu5TLd49fKv72D+rRJMPhrMUfPpM6HKFZq90x4vgK4z3TNUMw4dQvxaviu1dgQxH5R+w= google-ssh {\"userName\":\"davanum@gmail.com\",\"expireOn\":\"2020-01-28T15:21:52+0000\"}\n" - }, { "key": "gke-aaa-4d0eb763-secondary-ranges", "value": "services:default:gke-aaa-subnet-4d0eb763:gke-aaa-services-4d0eb763,pods:default:gke-aaa-subnet-4d0eb763:gke-aaa-pods-4d0eb763" + }, + { + "key": "sshKeys", + "value": "\ngke-4d0eb7639c079dd86863:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKXgEw3R4S+t496FUji26QwLbLIUESOgiWTPVTaxqEvQnNQzTV67IPk7JEgKoYV5Dff6Q3D3Zh0EJM1RhpIddhgQLTPOO9/vQcdtf9Vz7yLyL8s/f5ki5Lvj1zCEN7jObBG6KXihHxodPgOeMX4NidKUOAzHXnTCzDBa0JOl4lCUy1KOd803X5F1ZRsL3L2Hxt8o9XarNF1cB0i3Kp++FXVEhPtFy/mmt7nMW3vtibNde4YiUsRbdAX7NVuo5WAleKYLrm4Y+ag3YsVBXHrNc3tTX1qObAcyA1hMq9lj/gojsjMukAev4OpKUarLZ9/3HpJsNHNgiprzsf64D5Gc8N gke-4d0eb7639c079dd86863@gke-4d0eb7639c079dd86863\ngke-4d0eb7639c079dd86863:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQt9qiv2SV6ov+lrjeD5pfqMU02I6BLmUPXJyMPwXAAnukAcBNyO1bS3jUuGWMb/jKRBS/vq8EV8+urAB0pbHUvuCXm4+sV4ijhvft4LX9cZlnC5OrvWnWTWXyWFTAv6fEGMd9MjxjOoBPKzrfDlPcdXNxa+1zCqG2zvDhhGKaEehqdGInnjmlDQbWKRzXB7zcIlf6mjK0VynPeoCpipQX4zRUqhAYKwIvrHDrFoP2hsdv2ohubAJ69PfqOX+QzVQacXbLFCDdN8DUVW7HouHzE2mfKKM2Jc9PFj/9iqG0aq0Yxfw+YAHqXs6T/rpN3nNxBuHdJWeLVrGRXaP/GQVt gke-4d0eb7639c079dd86863@gke-4d0eb7639c079dd86863\ngke-4d0eb7639c079dd86863:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBNMH5E+KJ5ZCzXQHeGo2UviWijMTaOooI8DLkfM6gd1TWbta8QPxbz1R6haOTHwCuBosGe94ldwUgCGHBbCDdgGWvFHYRa7mGRYkqHtmaUafe0esUlfhA1dB3a7d4HvsCEXj2h6ukjA7RCJTH7Xo5Eohe9i61gecg84YNQjyop9mbBnCbwqfxx/z+wy+5kQ0+n5oeTJHT13xvZTcKbX4UuEFziive1J+O9pkXvDPStCRfzd08M39PzTxm9Ipi+10v9bk8KkH8ET0hnLtTJgveBVMszMr1St5JwNfMdTyihEWkAwlzG6v7HBEcude5YHmhypQQ/7/rRIzRV8lofFjn gke-4d0eb7639c079dd86863@gke-4d0eb7639c079dd86863" } ], "kind": "compute#metadata" From 90bddd291a8f816f0880a6dcafb82ea4bdedc9e8 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Wed, 6 May 2020 16:47:55 -0700 Subject: [PATCH 13/14] audit: refresh k8s-staging-kube-state-metrics? this looks like a full run of ensure-staging-storage.sh refresh some things for this bucket, or maybe previous audits missed this bucket --- .../bucketpolicyonly.txt | 4 ++ .../cors.txt | 1 + .../iam.json | 37 +++++++++++++++++++ .../logging.txt | 1 + 4 files changed, 43 insertions(+) create mode 100644 audit/projects/k8s-staging-kube-state-metrics/buckets/artifacts.k8s-staging-kube-state-metrics.appspot.com/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-kube-state-metrics/buckets/artifacts.k8s-staging-kube-state-metrics.appspot.com/cors.txt create mode 100644 audit/projects/k8s-staging-kube-state-metrics/buckets/artifacts.k8s-staging-kube-state-metrics.appspot.com/iam.json create mode 100644 audit/projects/k8s-staging-kube-state-metrics/buckets/artifacts.k8s-staging-kube-state-metrics.appspot.com/logging.txt diff --git a/audit/projects/k8s-staging-kube-state-metrics/buckets/artifacts.k8s-staging-kube-state-metrics.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-kube-state-metrics/buckets/artifacts.k8s-staging-kube-state-metrics.appspot.com/bucketpolicyonly.txt new file mode 100644 index 00000000000..19df9a957c3 --- /dev/null +++ b/audit/projects/k8s-staging-kube-state-metrics/buckets/artifacts.k8s-staging-kube-state-metrics.appspot.com/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://artifacts.k8s-staging-kube-state-metrics.appspot.com: + Enabled: True + LockedTime: 2020-07-30 05:52:44.234000+00:00 + diff --git a/audit/projects/k8s-staging-kube-state-metrics/buckets/artifacts.k8s-staging-kube-state-metrics.appspot.com/cors.txt b/audit/projects/k8s-staging-kube-state-metrics/buckets/artifacts.k8s-staging-kube-state-metrics.appspot.com/cors.txt new file mode 100644 index 00000000000..dc266360bbb --- /dev/null +++ b/audit/projects/k8s-staging-kube-state-metrics/buckets/artifacts.k8s-staging-kube-state-metrics.appspot.com/cors.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-kube-state-metrics.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-kube-state-metrics/buckets/artifacts.k8s-staging-kube-state-metrics.appspot.com/iam.json b/audit/projects/k8s-staging-kube-state-metrics/buckets/artifacts.k8s-staging-kube-state-metrics.appspot.com/iam.json new file mode 100644 index 00000000000..a66f96e59d5 --- /dev/null +++ b/audit/projects/k8s-staging-kube-state-metrics/buckets/artifacts.k8s-staging-kube-state-metrics.appspot.com/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-kube-state-metrics", + "projectOwner:k8s-staging-kube-state-metrics" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-kube-state-metrics" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-kube-state-metrics@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-kube-state-metrics@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-kube-state-metrics/buckets/artifacts.k8s-staging-kube-state-metrics.appspot.com/logging.txt b/audit/projects/k8s-staging-kube-state-metrics/buckets/artifacts.k8s-staging-kube-state-metrics.appspot.com/logging.txt new file mode 100644 index 00000000000..514ed11b859 --- /dev/null +++ b/audit/projects/k8s-staging-kube-state-metrics/buckets/artifacts.k8s-staging-kube-state-metrics.appspot.com/logging.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-kube-state-metrics.appspot.com/ has no logging configuration. From 5dc19178cf893480d9670590191c382c9362a403 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Wed, 6 May 2020 16:49:11 -0700 Subject: [PATCH 14/14] audit: someone enabled gke for this project? --- audit/projects/k8s-staging-csi/iam.json | 9 ++++++++- .../k8s-staging-csi/services/container/clusters.txt | 0 audit/projects/k8s-staging-csi/services/enabled.txt | 3 +++ 3 files changed, 11 insertions(+), 1 deletion(-) create mode 100644 audit/projects/k8s-staging-csi/services/container/clusters.txt diff --git a/audit/projects/k8s-staging-csi/iam.json b/audit/projects/k8s-staging-csi/iam.json index d31c2cd8549..52b5e1bd712 100644 --- a/audit/projects/k8s-staging-csi/iam.json +++ b/audit/projects/k8s-staging-csi/iam.json @@ -3,7 +3,8 @@ { "members": [ "serviceAccount:874328413592@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com" + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" ], "role": "roles/cloudbuild.builds.builder" }, @@ -25,6 +26,12 @@ ], "role": "roles/compute.serviceAgent" }, + { + "members": [ + "serviceAccount:service-874328413592@container-engine-robot.iam.gserviceaccount.com" + ], + "role": "roles/container.serviceAgent" + }, { "members": [ "serviceAccount:874328413592-compute@developer.gserviceaccount.com", diff --git a/audit/projects/k8s-staging-csi/services/container/clusters.txt b/audit/projects/k8s-staging-csi/services/container/clusters.txt new file mode 100644 index 00000000000..e69de29bb2d diff --git a/audit/projects/k8s-staging-csi/services/enabled.txt b/audit/projects/k8s-staging-csi/services/enabled.txt index 28ae873bc03..807a624ad65 100644 --- a/audit/projects/k8s-staging-csi/services/enabled.txt +++ b/audit/projects/k8s-staging-csi/services/enabled.txt @@ -8,8 +8,11 @@ clouddebugger.googleapis.com Cloud Debugger API cloudkms.googleapis.com Cloud Key Management Service (KMS) API cloudtrace.googleapis.com Cloud Trace API compute.googleapis.com Compute Engine API +container.googleapis.com Kubernetes Engine API containerregistry.googleapis.com Container Registry API datastore.googleapis.com Cloud Datastore API +iam.googleapis.com Identity and Access Management (IAM) API +iamcredentials.googleapis.com IAM Service Account Credentials API logging.googleapis.com Cloud Logging API monitoring.googleapis.com Cloud Monitoring API oslogin.googleapis.com Cloud OS Login API