From e8c3d1a006babceb014d0dff4e2dfc8d4ec82d54 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Wed, 13 Jan 2021 11:47:47 -0500 Subject: [PATCH 01/39] Fix audit script secret list typo --- audit/audit-gcp.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/audit/audit-gcp.sh b/audit/audit-gcp.sh index f2d52005007..a66fc7421ce 100755 --- a/audit/audit-gcp.sh +++ b/audit/audit-gcp.sh @@ -165,7 +165,7 @@ gcloud \ secretmanager) gcloud \ secrets list \ - --project=k8s-gsuite \ + --project="${PROJECT}" \ --format="value(name)" \ | while read -r SECRET; do path="projects/${PROJECT}/secrets/${SECRET}" From c640149fd35fbd245bd19f7a7b8351126f2d78bd Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Wed, 13 Jan 2021 12:54:50 -0500 Subject: [PATCH 02/39] Add TODOs for unhandled services --- audit/audit-gcp.sh | 15 +++++++++++++++ 1 file changed, 15 insertions(+) diff --git a/audit/audit-gcp.sh b/audit/audit-gcp.sh index a66fc7421ce..063ea558076 100755 --- a/audit/audit-gcp.sh +++ b/audit/audit-gcp.sh @@ -206,6 +206,21 @@ gcloud \ ;; *) echo "##### Unhandled Service ${SVC}" + # (these were all enabled for kubernetes-public) + # TODO: handle (or ignore) bigquerystorage + # TODO: handle (or ignore) clouderrorreporting + # TODO: handle (or ignore) cloudfunctions + # TODO: handle (or ignore) cloudresourcemanager + # TODO: handle (or ignore) cloudshell + # TODO: handle (or ignore) containerregistry + # TODO: handle (or ignore) iam + # TODO: handle (or ignore) iamcredentials + # TODO: handle (or ignore) oslogin + # TODO: handle (or ignore) pubsub + # TODO: handle (or ignore) serviceusage + # TODO: handle (or ignore) source + # TODO: handle (or ignore) stackdriver + # TODO: handle (or ignore) storage-component ;; esac done From 0c2ca8c5e61441f2697160f0d9e0e714ff2d0d3a Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Thu, 14 Jan 2021 17:21:09 -0500 Subject: [PATCH 03/39] audit: update org admin membership --- audit/org_kubernetes.io/iam.json | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/audit/org_kubernetes.io/iam.json b/audit/org_kubernetes.io/iam.json index 27570568d08..6656ef3f88a 100644 --- a/audit/org_kubernetes.io/iam.json +++ b/audit/org_kubernetes.io/iam.json @@ -72,6 +72,8 @@ "group:k8s-infra-gcp-org-admins@kubernetes.io", "user:domain-admin-lf@kubernetes.io", "user:ihor@cncf.io", + "user:spiffxp@google.com", + "user:thockin@google.com", "user:twaggoner@linuxfoundation.org" ], "role": "roles/resourcemanager.organizationAdmin" @@ -94,6 +96,12 @@ ], "role": "roles/resourcemanager.projectDeleter" }, + { + "members": [ + "group:k8s-infra-gcp-org-admins@kubernetes.io" + ], + "role": "roles/servicemanagement.quotaAdmin" + }, { "members": [ "group:k8s-infra-gcp-auditors@kubernetes.io" From 40834176ab9ce0ac023462a6c2e1dc4a0a6c213f Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Thu, 14 Jan 2021 17:20:15 -0500 Subject: [PATCH 04/39] audit: add custom prow.viewer role to org --- .../org_kubernetes.io/roles/prow.viewer.json | 323 ++++++++++++++++++ 1 file changed, 323 insertions(+) create mode 100644 audit/org_kubernetes.io/roles/prow.viewer.json diff --git a/audit/org_kubernetes.io/roles/prow.viewer.json b/audit/org_kubernetes.io/roles/prow.viewer.json new file mode 100644 index 00000000000..82fb63e879c --- /dev/null +++ b/audit/org_kubernetes.io/roles/prow.viewer.json @@ -0,0 +1,323 @@ +{ + "description": "View access to services for troubleshooting prow", + "includedPermissions": [ + "cloudnotifications.activities.list", + "compute.acceleratorTypes.get", + "compute.acceleratorTypes.list", + "compute.addresses.get", + "compute.addresses.list", + "compute.autoscalers.get", + "compute.autoscalers.list", + "compute.backendBuckets.get", + "compute.backendBuckets.list", + "compute.backendServices.get", + "compute.backendServices.list", + "compute.commitments.get", + "compute.commitments.list", + "compute.diskTypes.get", + "compute.diskTypes.list", + "compute.disks.get", + "compute.disks.getIamPolicy", + "compute.disks.list", + "compute.externalVpnGateways.get", + "compute.externalVpnGateways.list", + "compute.firewalls.get", + "compute.firewalls.list", + "compute.forwardingRules.get", + "compute.forwardingRules.list", + "compute.globalAddresses.get", + "compute.globalAddresses.list", + "compute.globalForwardingRules.get", + "compute.globalForwardingRules.list", + "compute.globalOperations.get", + "compute.globalOperations.getIamPolicy", + "compute.globalOperations.list", + "compute.globalPublicDelegatedPrefixes.get", + "compute.globalPublicDelegatedPrefixes.list", + "compute.healthChecks.get", + "compute.healthChecks.list", + "compute.httpHealthChecks.get", + "compute.httpHealthChecks.list", + "compute.httpsHealthChecks.get", + "compute.httpsHealthChecks.list", + "compute.images.get", + "compute.images.getFromFamily", + "compute.images.getIamPolicy", + "compute.images.list", + "compute.instanceGroupManagers.get", + "compute.instanceGroupManagers.list", + "compute.instanceGroups.get", + "compute.instanceGroups.list", + "compute.instanceTemplates.get", + "compute.instanceTemplates.getIamPolicy", + "compute.instanceTemplates.list", + "compute.instances.get", + "compute.instances.getEffectiveFirewalls", + "compute.instances.getGuestAttributes", + "compute.instances.getIamPolicy", + "compute.instances.getScreenshot", + "compute.instances.getSerialPortOutput", + "compute.instances.getShieldedInstanceIdentity", + "compute.instances.getShieldedVmIdentity", + "compute.instances.list", + "compute.instances.listReferrers", + "compute.interconnectAttachments.get", + "compute.interconnectAttachments.list", + "compute.interconnectLocations.get", + "compute.interconnectLocations.list", + "compute.interconnects.get", + "compute.interconnects.list", + "compute.licenseCodes.get", + "compute.licenseCodes.getIamPolicy", + "compute.licenseCodes.list", + "compute.licenses.get", + "compute.licenses.getIamPolicy", + "compute.licenses.list", + "compute.machineTypes.get", + "compute.machineTypes.list", + "compute.maintenancePolicies.get", + "compute.maintenancePolicies.getIamPolicy", + "compute.maintenancePolicies.list", + "compute.networkEndpointGroups.get", + "compute.networkEndpointGroups.getIamPolicy", + "compute.networkEndpointGroups.list", + "compute.networks.get", + "compute.networks.getEffectiveFirewalls", + "compute.networks.list", + "compute.networks.listPeeringRoutes", + "compute.nodeGroups.get", + "compute.nodeGroups.getIamPolicy", + "compute.nodeGroups.list", + "compute.nodeTemplates.get", + "compute.nodeTemplates.getIamPolicy", + "compute.nodeTemplates.list", + "compute.nodeTypes.get", + "compute.nodeTypes.list", + "compute.organizations.listAssociations", + "compute.projects.get", + "compute.publicAdvertisedPrefixes.get", + "compute.publicAdvertisedPrefixes.list", + "compute.publicDelegatedPrefixes.get", + "compute.publicDelegatedPrefixes.list", + "compute.regionBackendServices.get", + "compute.regionBackendServices.list", + "compute.regionHealthCheckServices.get", + "compute.regionHealthCheckServices.list", + "compute.regionNotificationEndpoints.get", + "compute.regionNotificationEndpoints.list", + "compute.regionOperations.get", + "compute.regionOperations.getIamPolicy", + "compute.regionOperations.list", + "compute.regions.get", + "compute.regions.list", + "compute.reservations.get", + "compute.reservations.list", + "compute.resourcePolicies.get", + "compute.resourcePolicies.list", + "compute.routers.get", + "compute.routers.list", + "compute.routes.get", + "compute.routes.list", + "compute.securityPolicies.get", + "compute.securityPolicies.getIamPolicy", + "compute.securityPolicies.list", + "compute.snapshots.get", + "compute.snapshots.getIamPolicy", + "compute.snapshots.list", + "compute.sslCertificates.get", + "compute.sslCertificates.list", + "compute.sslPolicies.get", + "compute.sslPolicies.list", + "compute.sslPolicies.listAvailableFeatures", + "compute.subnetworks.get", + "compute.subnetworks.getIamPolicy", + "compute.subnetworks.list", + "compute.targetHttpProxies.get", + "compute.targetHttpProxies.list", + "compute.targetHttpsProxies.get", + "compute.targetHttpsProxies.list", + "compute.targetInstances.get", + "compute.targetInstances.list", + "compute.targetPools.get", + "compute.targetPools.list", + "compute.targetSslProxies.get", + "compute.targetSslProxies.list", + "compute.targetTcpProxies.get", + "compute.targetTcpProxies.list", + "compute.targetVpnGateways.get", + "compute.targetVpnGateways.list", + "compute.urlMaps.get", + "compute.urlMaps.list", + "compute.urlMaps.validate", + "compute.vpnGateways.get", + "compute.vpnGateways.list", + "compute.vpnTunnels.get", + "compute.vpnTunnels.list", + "compute.zoneOperations.get", + "compute.zoneOperations.getIamPolicy", + "compute.zoneOperations.list", + "compute.zones.get", + "compute.zones.list", + "container.apiServices.get", + "container.apiServices.list", + "container.backendConfigs.get", + "container.backendConfigs.list", + "container.bindings.get", + "container.bindings.list", + "container.certificateSigningRequests.get", + "container.certificateSigningRequests.list", + "container.clusterRoleBindings.get", + "container.clusterRoleBindings.list", + "container.clusterRoles.get", + "container.clusterRoles.list", + "container.clusters.get", + "container.clusters.list", + "container.componentStatuses.get", + "container.componentStatuses.list", + "container.configMaps.get", + "container.configMaps.list", + "container.controllerRevisions.get", + "container.controllerRevisions.list", + "container.cronJobs.get", + "container.cronJobs.getStatus", + "container.cronJobs.list", + "container.csiDrivers.get", + "container.csiDrivers.list", + "container.csiNodes.get", + "container.csiNodes.list", + "container.customResourceDefinitions.get", + "container.customResourceDefinitions.list", + "container.daemonSets.get", + "container.daemonSets.getStatus", + "container.daemonSets.list", + "container.deployments.get", + "container.deployments.getStatus", + "container.deployments.list", + "container.endpoints.get", + "container.endpoints.list", + "container.events.get", + "container.events.list", + "container.horizontalPodAutoscalers.get", + "container.horizontalPodAutoscalers.getStatus", + "container.horizontalPodAutoscalers.list", + "container.ingresses.get", + "container.ingresses.getStatus", + "container.ingresses.list", + "container.initializerConfigurations.get", + "container.initializerConfigurations.list", + "container.jobs.get", + "container.jobs.getStatus", + "container.jobs.list", + "container.limitRanges.get", + "container.limitRanges.list", + "container.namespaces.get", + "container.namespaces.getStatus", + "container.namespaces.list", + "container.networkPolicies.get", + "container.networkPolicies.list", + "container.nodes.get", + "container.nodes.getStatus", + "container.nodes.list", + "container.operations.get", + "container.operations.list", + "container.persistentVolumeClaims.get", + "container.persistentVolumeClaims.getStatus", + "container.persistentVolumeClaims.list", + "container.persistentVolumes.get", + "container.persistentVolumes.getStatus", + "container.persistentVolumes.list", + "container.petSets.get", + "container.petSets.list", + "container.podDisruptionBudgets.get", + "container.podDisruptionBudgets.getStatus", + "container.podDisruptionBudgets.list", + "container.podPresets.get", + "container.podPresets.list", + "container.podSecurityPolicies.get", + "container.podSecurityPolicies.list", + "container.podTemplates.get", + "container.podTemplates.list", + "container.pods.get", + "container.pods.getStatus", + "container.pods.list", + "container.replicaSets.get", + "container.replicaSets.getScale", + "container.replicaSets.getStatus", + "container.replicaSets.list", + "container.replicationControllers.get", + "container.replicationControllers.getScale", + "container.replicationControllers.getStatus", + "container.replicationControllers.list", + "container.resourceQuotas.get", + "container.resourceQuotas.getStatus", + "container.resourceQuotas.list", + "container.roleBindings.get", + "container.roleBindings.list", + "container.roles.get", + "container.roles.list", + "container.runtimeClasses.get", + "container.runtimeClasses.list", + "container.scheduledJobs.get", + "container.scheduledJobs.list", + "container.serviceAccounts.get", + "container.serviceAccounts.list", + "container.services.get", + "container.services.getStatus", + "container.services.list", + "container.statefulSets.get", + "container.statefulSets.getStatus", + "container.statefulSets.list", + "container.storageClasses.get", + "container.storageClasses.list", + "container.thirdPartyObjects.get", + "container.thirdPartyObjects.list", + "container.thirdPartyResources.get", + "container.thirdPartyResources.list", + "container.tokenReviews.create", + "logging.buckets.get", + "logging.buckets.list", + "logging.exclusions.get", + "logging.exclusions.list", + "logging.logEntries.list", + "logging.logMetrics.get", + "logging.logMetrics.list", + "logging.logServiceIndexes.list", + "logging.logServices.list", + "logging.logs.list", + "logging.sinks.get", + "logging.sinks.list", + "logging.usage.get", + "monitoring.alertPolicies.get", + "monitoring.alertPolicies.list", + "monitoring.dashboards.get", + "monitoring.dashboards.list", + "monitoring.groups.get", + "monitoring.groups.list", + "monitoring.metricDescriptors.get", + "monitoring.metricDescriptors.list", + "monitoring.monitoredResourceDescriptors.get", + "monitoring.monitoredResourceDescriptors.list", + "monitoring.notificationChannelDescriptors.get", + "monitoring.notificationChannelDescriptors.list", + "monitoring.notificationChannels.get", + "monitoring.notificationChannels.list", + "monitoring.publicWidgets.get", + "monitoring.publicWidgets.list", + "monitoring.services.get", + "monitoring.services.list", + "monitoring.slos.get", + "monitoring.slos.list", + "monitoring.timeSeries.list", + "monitoring.uptimeCheckConfigs.get", + "monitoring.uptimeCheckConfigs.list", + "resourcemanager.projects.get", + "resourcemanager.projects.list", + "serviceusage.quotas.get", + "serviceusage.services.get", + "serviceusage.services.list", + "stackdriver.projects.get" + ], + "name": "organizations/758905017065/roles/prow.viewer", + "stage": "ALPHA", + "title": "Prow Viewer" +} From c1021660929396c3de8cec972e46789333d616d6 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Wed, 13 Jan 2021 12:58:44 -0500 Subject: [PATCH 05/39] audit: add k8s-infra-e2e-boskos-scale-* projects --- .../description.json | 11 ++ .../k8s-infra-e2e-boskos-scale-01/iam.json | 40 +++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-scale-02/iam.json | 40 +++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-scale-03/iam.json | 40 +++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-scale-04/iam.json | 40 +++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-scale-05/iam.json | 40 +++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-scale-06/iam.json | 34 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-scale-07/iam.json | 34 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-scale-08/iam.json | 34 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-scale-09/iam.json | 34 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-scale-10/iam.json | 34 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-scale-11/iam.json | 34 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-scale-12/iam.json | 40 +++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-scale-13/iam.json | 34 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-scale-14/iam.json | 34 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-scale-15/iam.json | 34 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-scale-16/iam.json | 34 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-scale-17/iam.json | 34 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-scale-18/iam.json | 34 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-scale-19/iam.json | 34 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-scale-20/iam.json | 34 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-scale-21/iam.json | 34 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-scale-22/iam.json | 34 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-scale-23/iam.json | 34 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-scale-24/iam.json | 34 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-scale-25/iam.json | 34 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-scale-26/iam.json | 34 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-scale-27/iam.json | 34 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-scale-28/iam.json | 34 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-scale-29/iam.json | 34 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-scale-30/iam.json | 34 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + 180 files changed, 6906 insertions(+) create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-01/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-01/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-01/service-accounts/40460865376-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-01/service-accounts/40460865376-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-01/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-01/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-02/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-02/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-02/service-accounts/660290009727-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-02/service-accounts/660290009727-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-02/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-02/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-03/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-03/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-03/service-accounts/647280784790-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-03/service-accounts/647280784790-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-03/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-03/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-04/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-04/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-04/service-accounts/881216629017-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-04/service-accounts/881216629017-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-04/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-04/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-05/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-05/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-05/service-accounts/303929844117-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-05/service-accounts/303929844117-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-05/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-05/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-06/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-06/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-06/service-accounts/896865780972-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-06/service-accounts/896865780972-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-06/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-06/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-07/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-07/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-07/service-accounts/908953038229-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-07/service-accounts/908953038229-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-07/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-07/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-08/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-08/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-08/service-accounts/380176220624-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-08/service-accounts/380176220624-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-08/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-08/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-09/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-09/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-09/service-accounts/514023723791-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-09/service-accounts/514023723791-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-09/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-09/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-10/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-10/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-10/service-accounts/832452291707-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-10/service-accounts/832452291707-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-10/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-10/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-11/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-11/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-11/service-accounts/835090643128-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-11/service-accounts/835090643128-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-11/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-11/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-12/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-12/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-12/service-accounts/692227742238-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-12/service-accounts/692227742238-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-12/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-12/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-13/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-13/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-13/service-accounts/717643192189-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-13/service-accounts/717643192189-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-13/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-13/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-14/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-14/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-14/service-accounts/852293948802-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-14/service-accounts/852293948802-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-14/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-14/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-15/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-15/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-15/service-accounts/392103292135-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-15/service-accounts/392103292135-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-15/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-15/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-16/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-16/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-16/service-accounts/151914219077-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-16/service-accounts/151914219077-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-16/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-16/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-17/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-17/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-17/service-accounts/529310953145-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-17/service-accounts/529310953145-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-17/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-17/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-18/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-18/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-18/service-accounts/219627249712-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-18/service-accounts/219627249712-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-18/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-18/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-19/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-19/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-19/service-accounts/175011321769-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-19/service-accounts/175011321769-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-19/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-19/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-20/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-20/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-20/service-accounts/893407088392-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-20/service-accounts/893407088392-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-20/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-20/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-21/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-21/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-21/service-accounts/961368471244-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-21/service-accounts/961368471244-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-21/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-21/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-22/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-22/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-22/service-accounts/370249020154-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-22/service-accounts/370249020154-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-22/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-22/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-23/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-23/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-23/service-accounts/610500652130-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-23/service-accounts/610500652130-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-23/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-23/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-24/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-24/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-24/service-accounts/211820429131-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-24/service-accounts/211820429131-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-24/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-24/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-25/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-25/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-25/service-accounts/500629287260-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-25/service-accounts/500629287260-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-25/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-25/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-26/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-26/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-26/service-accounts/257675618203-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-26/service-accounts/257675618203-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-26/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-26/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-27/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-27/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-27/service-accounts/440111527817-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-27/service-accounts/440111527817-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-27/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-27/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-28/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-28/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-28/service-accounts/199724281835-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-28/service-accounts/199724281835-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-28/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-28/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-29/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-29/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-29/service-accounts/718923874112-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-29/service-accounts/718923874112-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-29/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-29/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-30/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-30/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-30/service-accounts/17885835863-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-30/service-accounts/17885835863-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-30/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-scale-30/services/enabled.txt diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-01/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-01/description.json new file mode 100644 index 00000000000..47a36451c58 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-01/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-26T23:20:18.783Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-scale-01", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-scale-01", + "projectNumber": "40460865376" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-01/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-01/iam.json new file mode 100644 index 00000000000..eea4ba16e19 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-01/iam.json @@ -0,0 +1,40 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-40460865376@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:40460865376-compute@developer.gserviceaccount.com", + "serviceAccount:40460865376@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "group:k8s-infra-sig-scalability-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-01/service-accounts/40460865376-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-01/service-accounts/40460865376-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..fe2a0171507 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-01/service-accounts/40460865376-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "40460865376-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-scale-01/serviceAccounts/40460865376-compute@developer.gserviceaccount.com", + "oauth2ClientId": "104531253745867244065", + "projectId": "k8s-infra-e2e-boskos-scale-01", + "uniqueId": "104531253745867244065" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-01/service-accounts/40460865376-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-01/service-accounts/40460865376-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-01/service-accounts/40460865376-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-01/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-01/services/compute/project-info.json new file mode 100644 index 00000000000..b6fdb7bcba2 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-01/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-05-26T16:20:31.143-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "40460865376-compute@developer.gserviceaccount.com", + "id": "5770691874643778257", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-scale-01", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-01", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-01/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-01/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-01/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-02/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-02/description.json new file mode 100644 index 00000000000..b62b3fce624 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-02/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-26T23:25:53.498Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-scale-02", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-scale-02", + "projectNumber": "660290009727" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-02/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-02/iam.json new file mode 100644 index 00000000000..48a9b04cd77 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-02/iam.json @@ -0,0 +1,40 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-660290009727@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:660290009727-compute@developer.gserviceaccount.com", + "serviceAccount:660290009727@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "group:k8s-infra-sig-scalability-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-02/service-accounts/660290009727-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-02/service-accounts/660290009727-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..68c28c05b72 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-02/service-accounts/660290009727-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "660290009727-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-scale-02/serviceAccounts/660290009727-compute@developer.gserviceaccount.com", + "oauth2ClientId": "115516548101087659210", + "projectId": "k8s-infra-e2e-boskos-scale-02", + "uniqueId": "115516548101087659210" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-02/service-accounts/660290009727-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-02/service-accounts/660290009727-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-02/service-accounts/660290009727-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-02/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-02/services/compute/project-info.json new file mode 100644 index 00000000000..aa70ea284de --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-02/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-05-26T16:26:04.482-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "660290009727-compute@developer.gserviceaccount.com", + "id": "1411381574798154595", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-scale-02", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-02", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-02/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-02/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-02/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-03/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-03/description.json new file mode 100644 index 00000000000..244425504fb --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-03/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-26T23:28:25.051Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-scale-03", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-scale-03", + "projectNumber": "647280784790" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-03/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-03/iam.json new file mode 100644 index 00000000000..8624671e04f --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-03/iam.json @@ -0,0 +1,40 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-647280784790@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:647280784790-compute@developer.gserviceaccount.com", + "serviceAccount:647280784790@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "group:k8s-infra-sig-scalability-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-03/service-accounts/647280784790-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-03/service-accounts/647280784790-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..9ee7a8f3f9c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-03/service-accounts/647280784790-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "647280784790-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-scale-03/serviceAccounts/647280784790-compute@developer.gserviceaccount.com", + "oauth2ClientId": "100151099779485603662", + "projectId": "k8s-infra-e2e-boskos-scale-03", + "uniqueId": "100151099779485603662" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-03/service-accounts/647280784790-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-03/service-accounts/647280784790-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-03/service-accounts/647280784790-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-03/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-03/services/compute/project-info.json new file mode 100644 index 00000000000..52dc165c18f --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-03/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-05-26T16:28:37.003-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "647280784790-compute@developer.gserviceaccount.com", + "id": "7082145677322492107", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-scale-03", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-03", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-03/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-03/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-03/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-04/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-04/description.json new file mode 100644 index 00000000000..d7ad47ec4d9 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-04/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-26T23:31:18.369Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-scale-04", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-scale-04", + "projectNumber": "881216629017" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-04/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-04/iam.json new file mode 100644 index 00000000000..e544f403660 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-04/iam.json @@ -0,0 +1,40 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-881216629017@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:881216629017-compute@developer.gserviceaccount.com", + "serviceAccount:881216629017@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "group:k8s-infra-sig-scalability-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-04/service-accounts/881216629017-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-04/service-accounts/881216629017-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..2e17b33dfbc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-04/service-accounts/881216629017-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "881216629017-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-scale-04/serviceAccounts/881216629017-compute@developer.gserviceaccount.com", + "oauth2ClientId": "109635661273499876135", + "projectId": "k8s-infra-e2e-boskos-scale-04", + "uniqueId": "109635661273499876135" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-04/service-accounts/881216629017-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-04/service-accounts/881216629017-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-04/service-accounts/881216629017-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-04/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-04/services/compute/project-info.json new file mode 100644 index 00000000000..c0334d4a1f3 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-04/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-05-26T16:31:29.365-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "881216629017-compute@developer.gserviceaccount.com", + "id": "8007870425652533310", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-scale-04", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-04", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-04/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-04/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-04/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-05/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-05/description.json new file mode 100644 index 00000000000..29add26688e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-05/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-26T23:34:09.150Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-scale-05", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-scale-05", + "projectNumber": "303929844117" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-05/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-05/iam.json new file mode 100644 index 00000000000..2405a9b9bf6 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-05/iam.json @@ -0,0 +1,40 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-303929844117@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:303929844117-compute@developer.gserviceaccount.com", + "serviceAccount:303929844117@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "group:k8s-infra-sig-scalability-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-05/service-accounts/303929844117-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-05/service-accounts/303929844117-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..797e734c05e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-05/service-accounts/303929844117-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "303929844117-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-scale-05/serviceAccounts/303929844117-compute@developer.gserviceaccount.com", + "oauth2ClientId": "104531693407975921739", + "projectId": "k8s-infra-e2e-boskos-scale-05", + "uniqueId": "104531693407975921739" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-05/service-accounts/303929844117-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-05/service-accounts/303929844117-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-05/service-accounts/303929844117-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-05/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-05/services/compute/project-info.json new file mode 100644 index 00000000000..7e213580910 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-05/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-05-26T16:34:21.606-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "303929844117-compute@developer.gserviceaccount.com", + "id": "3399347203962050962", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-scale-05", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-05", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-05/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-05/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-05/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-06/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-06/description.json new file mode 100644 index 00000000000..625656172eb --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-06/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-19T23:15:58.114Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-scale-06", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-scale-06", + "projectNumber": "896865780972" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-06/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-06/iam.json new file mode 100644 index 00000000000..e6049fde367 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-06/iam.json @@ -0,0 +1,34 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-896865780972@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:896865780972-compute@developer.gserviceaccount.com", + "serviceAccount:896865780972@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "group:k8s-infra-sig-scalability-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-06/service-accounts/896865780972-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-06/service-accounts/896865780972-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..0d45d68b25c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-06/service-accounts/896865780972-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "896865780972-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-scale-06/serviceAccounts/896865780972-compute@developer.gserviceaccount.com", + "oauth2ClientId": "100022940934816975100", + "projectId": "k8s-infra-e2e-boskos-scale-06", + "uniqueId": "100022940934816975100" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-06/service-accounts/896865780972-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-06/service-accounts/896865780972-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-06/service-accounts/896865780972-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-06/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-06/services/compute/project-info.json new file mode 100644 index 00000000000..e7e56903f89 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-06/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-19T16:16:08.246-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "896865780972-compute@developer.gserviceaccount.com", + "id": "7303069290286025816", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-scale-06", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-06", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-06/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-06/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-06/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-07/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-07/description.json new file mode 100644 index 00000000000..a990601adf5 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-07/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-19T23:18:03.416Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-scale-07", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-scale-07", + "projectNumber": "908953038229" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-07/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-07/iam.json new file mode 100644 index 00000000000..e00566fae85 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-07/iam.json @@ -0,0 +1,34 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-908953038229@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:908953038229-compute@developer.gserviceaccount.com", + "serviceAccount:908953038229@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "group:k8s-infra-sig-scalability-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-07/service-accounts/908953038229-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-07/service-accounts/908953038229-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..147bcf7b2fd --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-07/service-accounts/908953038229-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "908953038229-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-scale-07/serviceAccounts/908953038229-compute@developer.gserviceaccount.com", + "oauth2ClientId": "101674490025563401550", + "projectId": "k8s-infra-e2e-boskos-scale-07", + "uniqueId": "101674490025563401550" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-07/service-accounts/908953038229-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-07/service-accounts/908953038229-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-07/service-accounts/908953038229-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-07/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-07/services/compute/project-info.json new file mode 100644 index 00000000000..8a4a75129a0 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-07/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-19T16:18:13.749-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "908953038229-compute@developer.gserviceaccount.com", + "id": "5020832580972318170", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-scale-07", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-07", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-07/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-07/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-07/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-08/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-08/description.json new file mode 100644 index 00000000000..36dee61bbea --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-08/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-19T23:20:04.795Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-scale-08", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-scale-08", + "projectNumber": "380176220624" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-08/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-08/iam.json new file mode 100644 index 00000000000..0a1848b1693 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-08/iam.json @@ -0,0 +1,34 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-380176220624@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:380176220624-compute@developer.gserviceaccount.com", + "serviceAccount:380176220624@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "group:k8s-infra-sig-scalability-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-08/service-accounts/380176220624-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-08/service-accounts/380176220624-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..80bd54e733d --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-08/service-accounts/380176220624-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "380176220624-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-scale-08/serviceAccounts/380176220624-compute@developer.gserviceaccount.com", + "oauth2ClientId": "101025234962604210991", + "projectId": "k8s-infra-e2e-boskos-scale-08", + "uniqueId": "101025234962604210991" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-08/service-accounts/380176220624-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-08/service-accounts/380176220624-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-08/service-accounts/380176220624-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-08/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-08/services/compute/project-info.json new file mode 100644 index 00000000000..78757531347 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-08/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-19T16:20:15.462-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "380176220624-compute@developer.gserviceaccount.com", + "id": "6538252618367503680", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-scale-08", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-08", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-08/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-08/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-08/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-09/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-09/description.json new file mode 100644 index 00000000000..3dd76ab7364 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-09/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-19T23:21:47.201Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-scale-09", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-scale-09", + "projectNumber": "514023723791" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-09/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-09/iam.json new file mode 100644 index 00000000000..354fabe09b3 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-09/iam.json @@ -0,0 +1,34 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-514023723791@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:514023723791-compute@developer.gserviceaccount.com", + "serviceAccount:514023723791@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "group:k8s-infra-sig-scalability-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-09/service-accounts/514023723791-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-09/service-accounts/514023723791-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..e43f6446046 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-09/service-accounts/514023723791-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "514023723791-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-scale-09/serviceAccounts/514023723791-compute@developer.gserviceaccount.com", + "oauth2ClientId": "115616162590942918592", + "projectId": "k8s-infra-e2e-boskos-scale-09", + "uniqueId": "115616162590942918592" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-09/service-accounts/514023723791-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-09/service-accounts/514023723791-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-09/service-accounts/514023723791-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-09/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-09/services/compute/project-info.json new file mode 100644 index 00000000000..f8962baed67 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-09/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-19T16:21:58.645-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "514023723791-compute@developer.gserviceaccount.com", + "id": "3157123606971943673", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-scale-09", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-09", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-09/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-09/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-09/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-10/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-10/description.json new file mode 100644 index 00000000000..5aa996a6d33 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-10/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-19T23:23:54.072Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-scale-10", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-scale-10", + "projectNumber": "832452291707" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-10/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-10/iam.json new file mode 100644 index 00000000000..33d972d8e56 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-10/iam.json @@ -0,0 +1,34 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-832452291707@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:832452291707-compute@developer.gserviceaccount.com", + "serviceAccount:832452291707@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "group:k8s-infra-sig-scalability-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-10/service-accounts/832452291707-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-10/service-accounts/832452291707-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..f4e6094eabd --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-10/service-accounts/832452291707-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "832452291707-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-scale-10/serviceAccounts/832452291707-compute@developer.gserviceaccount.com", + "oauth2ClientId": "104737072951398405868", + "projectId": "k8s-infra-e2e-boskos-scale-10", + "uniqueId": "104737072951398405868" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-10/service-accounts/832452291707-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-10/service-accounts/832452291707-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-10/service-accounts/832452291707-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-10/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-10/services/compute/project-info.json new file mode 100644 index 00000000000..91d228f62f6 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-10/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-19T16:24:04.925-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "832452291707-compute@developer.gserviceaccount.com", + "id": "5894295699093195387", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-scale-10", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-10", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-10/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-10/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-10/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-11/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-11/description.json new file mode 100644 index 00000000000..6f58f6798d8 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-11/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-19T23:25:56.587Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-scale-11", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-scale-11", + "projectNumber": "835090643128" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-11/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-11/iam.json new file mode 100644 index 00000000000..b172df37520 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-11/iam.json @@ -0,0 +1,34 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-835090643128@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:835090643128-compute@developer.gserviceaccount.com", + "serviceAccount:835090643128@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "group:k8s-infra-sig-scalability-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-11/service-accounts/835090643128-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-11/service-accounts/835090643128-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..5a50d768b19 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-11/service-accounts/835090643128-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "835090643128-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-scale-11/serviceAccounts/835090643128-compute@developer.gserviceaccount.com", + "oauth2ClientId": "107451015651544656503", + "projectId": "k8s-infra-e2e-boskos-scale-11", + "uniqueId": "107451015651544656503" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-11/service-accounts/835090643128-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-11/service-accounts/835090643128-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-11/service-accounts/835090643128-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-11/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-11/services/compute/project-info.json new file mode 100644 index 00000000000..041c9a6201a --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-11/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-19T16:26:05.721-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "835090643128-compute@developer.gserviceaccount.com", + "id": "7029727259352108002", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-scale-11", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-11", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-11/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-11/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-11/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-12/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-12/description.json new file mode 100644 index 00000000000..6d1dfba0cdf --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-12/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-19T23:27:54.395Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-scale-12", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-scale-12", + "projectNumber": "692227742238" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-12/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-12/iam.json new file mode 100644 index 00000000000..5ca073e1be9 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-12/iam.json @@ -0,0 +1,40 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-692227742238@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:692227742238-compute@developer.gserviceaccount.com", + "serviceAccount:692227742238@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/iam.serviceAccountUser" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "group:k8s-infra-sig-scalability-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-12/service-accounts/692227742238-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-12/service-accounts/692227742238-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..f17be43c60c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-12/service-accounts/692227742238-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "692227742238-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-scale-12/serviceAccounts/692227742238-compute@developer.gserviceaccount.com", + "oauth2ClientId": "107315553107056386426", + "projectId": "k8s-infra-e2e-boskos-scale-12", + "uniqueId": "107315553107056386426" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-12/service-accounts/692227742238-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-12/service-accounts/692227742238-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-12/service-accounts/692227742238-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-12/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-12/services/compute/project-info.json new file mode 100644 index 00000000000..166b2d97d18 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-12/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\n" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-19T16:28:04.094-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "692227742238-compute@developer.gserviceaccount.com", + "id": "4012746543341767532", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-scale-12", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-12", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-12/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-12/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-12/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-13/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-13/description.json new file mode 100644 index 00000000000..88a3122336a --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-13/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-19T23:29:52.869Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-scale-13", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-scale-13", + "projectNumber": "717643192189" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-13/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-13/iam.json new file mode 100644 index 00000000000..32e4cc6b0d3 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-13/iam.json @@ -0,0 +1,34 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-717643192189@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:717643192189-compute@developer.gserviceaccount.com", + "serviceAccount:717643192189@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "group:k8s-infra-sig-scalability-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-13/service-accounts/717643192189-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-13/service-accounts/717643192189-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..be623e1d561 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-13/service-accounts/717643192189-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "717643192189-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-scale-13/serviceAccounts/717643192189-compute@developer.gserviceaccount.com", + "oauth2ClientId": "106529918226753821901", + "projectId": "k8s-infra-e2e-boskos-scale-13", + "uniqueId": "106529918226753821901" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-13/service-accounts/717643192189-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-13/service-accounts/717643192189-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-13/service-accounts/717643192189-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-13/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-13/services/compute/project-info.json new file mode 100644 index 00000000000..32dc943060c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-13/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-19T16:30:03.360-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "717643192189-compute@developer.gserviceaccount.com", + "id": "9191155923132877589", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-scale-13", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-13", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-13/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-13/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-13/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-14/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-14/description.json new file mode 100644 index 00000000000..cc879b37e06 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-14/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-19T23:32:03.018Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-scale-14", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-scale-14", + "projectNumber": "852293948802" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-14/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-14/iam.json new file mode 100644 index 00000000000..980a56c6c76 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-14/iam.json @@ -0,0 +1,34 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-852293948802@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:852293948802-compute@developer.gserviceaccount.com", + "serviceAccount:852293948802@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "group:k8s-infra-sig-scalability-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-14/service-accounts/852293948802-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-14/service-accounts/852293948802-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..7b000d14047 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-14/service-accounts/852293948802-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "852293948802-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-scale-14/serviceAccounts/852293948802-compute@developer.gserviceaccount.com", + "oauth2ClientId": "118273172606953267206", + "projectId": "k8s-infra-e2e-boskos-scale-14", + "uniqueId": "118273172606953267206" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-14/service-accounts/852293948802-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-14/service-accounts/852293948802-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-14/service-accounts/852293948802-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-14/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-14/services/compute/project-info.json new file mode 100644 index 00000000000..fb7f39dc3e5 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-14/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-19T16:32:26.836-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "852293948802-compute@developer.gserviceaccount.com", + "id": "7299601701194958949", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-scale-14", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-14", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-14/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-14/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-14/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-15/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-15/description.json new file mode 100644 index 00000000000..3925511cf1e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-15/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-19T23:34:12.127Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-scale-15", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-scale-15", + "projectNumber": "392103292135" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-15/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-15/iam.json new file mode 100644 index 00000000000..0668a2c4ffb --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-15/iam.json @@ -0,0 +1,34 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-392103292135@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:392103292135-compute@developer.gserviceaccount.com", + "serviceAccount:392103292135@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "group:k8s-infra-sig-scalability-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-15/service-accounts/392103292135-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-15/service-accounts/392103292135-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..0e215bebeaa --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-15/service-accounts/392103292135-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "392103292135-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-scale-15/serviceAccounts/392103292135-compute@developer.gserviceaccount.com", + "oauth2ClientId": "103285314938452126888", + "projectId": "k8s-infra-e2e-boskos-scale-15", + "uniqueId": "103285314938452126888" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-15/service-accounts/392103292135-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-15/service-accounts/392103292135-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-15/service-accounts/392103292135-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-15/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-15/services/compute/project-info.json new file mode 100644 index 00000000000..2cb0fa0cbcb --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-15/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-19T16:34:22.332-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "392103292135-compute@developer.gserviceaccount.com", + "id": "1191169530581223441", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-scale-15", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-15", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-15/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-15/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-15/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-16/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-16/description.json new file mode 100644 index 00000000000..f1a18918ac2 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-16/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-30T02:10:19.241Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-scale-16", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-scale-16", + "projectNumber": "151914219077" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-16/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-16/iam.json new file mode 100644 index 00000000000..5ca1b155365 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-16/iam.json @@ -0,0 +1,34 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-151914219077@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:151914219077-compute@developer.gserviceaccount.com", + "serviceAccount:151914219077@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "group:k8s-infra-sig-scalability-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-16/service-accounts/151914219077-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-16/service-accounts/151914219077-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..b0e0559a2fc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-16/service-accounts/151914219077-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "151914219077-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-scale-16/serviceAccounts/151914219077-compute@developer.gserviceaccount.com", + "oauth2ClientId": "112038540141358578478", + "projectId": "k8s-infra-e2e-boskos-scale-16", + "uniqueId": "112038540141358578478" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-16/service-accounts/151914219077-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-16/service-accounts/151914219077-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-16/service-accounts/151914219077-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-16/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-16/services/compute/project-info.json new file mode 100644 index 00000000000..6149886846b --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-16/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-29T19:10:29.413-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "151914219077-compute@developer.gserviceaccount.com", + "id": "3636483957696410746", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-scale-16", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-16", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-16/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-16/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-16/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-17/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-17/description.json new file mode 100644 index 00000000000..f665185803b --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-17/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-30T02:12:01.842Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-scale-17", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-scale-17", + "projectNumber": "529310953145" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-17/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-17/iam.json new file mode 100644 index 00000000000..15dc96c1c15 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-17/iam.json @@ -0,0 +1,34 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-529310953145@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:529310953145-compute@developer.gserviceaccount.com", + "serviceAccount:529310953145@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "group:k8s-infra-sig-scalability-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-17/service-accounts/529310953145-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-17/service-accounts/529310953145-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..cf3d67760e5 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-17/service-accounts/529310953145-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "529310953145-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-scale-17/serviceAccounts/529310953145-compute@developer.gserviceaccount.com", + "oauth2ClientId": "106235671746981045917", + "projectId": "k8s-infra-e2e-boskos-scale-17", + "uniqueId": "106235671746981045917" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-17/service-accounts/529310953145-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-17/service-accounts/529310953145-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-17/service-accounts/529310953145-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-17/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-17/services/compute/project-info.json new file mode 100644 index 00000000000..732e9d76462 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-17/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-29T19:12:12.325-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "529310953145-compute@developer.gserviceaccount.com", + "id": "4297585587552433171", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-scale-17", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-17", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-17/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-17/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-17/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-18/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-18/description.json new file mode 100644 index 00000000000..c5c5c88b5ae --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-18/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-30T02:14:00.913Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-scale-18", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-scale-18", + "projectNumber": "219627249712" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-18/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-18/iam.json new file mode 100644 index 00000000000..1dd44d30da2 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-18/iam.json @@ -0,0 +1,34 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-219627249712@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:219627249712-compute@developer.gserviceaccount.com", + "serviceAccount:219627249712@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "group:k8s-infra-sig-scalability-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-18/service-accounts/219627249712-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-18/service-accounts/219627249712-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..c815aa94597 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-18/service-accounts/219627249712-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "219627249712-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-scale-18/serviceAccounts/219627249712-compute@developer.gserviceaccount.com", + "oauth2ClientId": "116344388628337807506", + "projectId": "k8s-infra-e2e-boskos-scale-18", + "uniqueId": "116344388628337807506" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-18/service-accounts/219627249712-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-18/service-accounts/219627249712-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-18/service-accounts/219627249712-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-18/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-18/services/compute/project-info.json new file mode 100644 index 00000000000..f445531d061 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-18/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-29T19:14:11.226-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "219627249712-compute@developer.gserviceaccount.com", + "id": "4408577588409578908", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-scale-18", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-18", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-18/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-18/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-18/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-19/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-19/description.json new file mode 100644 index 00000000000..0da3cb82e94 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-19/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-30T02:15:57.714Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-scale-19", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-scale-19", + "projectNumber": "175011321769" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-19/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-19/iam.json new file mode 100644 index 00000000000..5c0a1f472b4 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-19/iam.json @@ -0,0 +1,34 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-175011321769@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:175011321769-compute@developer.gserviceaccount.com", + "serviceAccount:175011321769@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "group:k8s-infra-sig-scalability-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-19/service-accounts/175011321769-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-19/service-accounts/175011321769-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..2452fd26b21 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-19/service-accounts/175011321769-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "175011321769-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-scale-19/serviceAccounts/175011321769-compute@developer.gserviceaccount.com", + "oauth2ClientId": "111846440325128355861", + "projectId": "k8s-infra-e2e-boskos-scale-19", + "uniqueId": "111846440325128355861" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-19/service-accounts/175011321769-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-19/service-accounts/175011321769-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-19/service-accounts/175011321769-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-19/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-19/services/compute/project-info.json new file mode 100644 index 00000000000..f11fda15c31 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-19/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-29T19:16:08.774-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "175011321769-compute@developer.gserviceaccount.com", + "id": "8812702504734602503", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-scale-19", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-19", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-19/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-19/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-19/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-20/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-20/description.json new file mode 100644 index 00000000000..fd62c13fbb5 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-20/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-30T02:18:04.749Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-scale-20", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-scale-20", + "projectNumber": "893407088392" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-20/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-20/iam.json new file mode 100644 index 00000000000..50e0a5685d6 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-20/iam.json @@ -0,0 +1,34 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-893407088392@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:893407088392-compute@developer.gserviceaccount.com", + "serviceAccount:893407088392@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "group:k8s-infra-sig-scalability-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-20/service-accounts/893407088392-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-20/service-accounts/893407088392-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..51a5181ac68 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-20/service-accounts/893407088392-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "893407088392-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-scale-20/serviceAccounts/893407088392-compute@developer.gserviceaccount.com", + "oauth2ClientId": "113831919145132085239", + "projectId": "k8s-infra-e2e-boskos-scale-20", + "uniqueId": "113831919145132085239" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-20/service-accounts/893407088392-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-20/service-accounts/893407088392-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-20/service-accounts/893407088392-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-20/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-20/services/compute/project-info.json new file mode 100644 index 00000000000..d5234974866 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-20/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-29T19:18:15.540-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "893407088392-compute@developer.gserviceaccount.com", + "id": "4806916297372119688", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-scale-20", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-20", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-20/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-20/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-20/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-21/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-21/description.json new file mode 100644 index 00000000000..5b4fd5c6719 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-21/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-30T02:20:40.101Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-scale-21", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-scale-21", + "projectNumber": "961368471244" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-21/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-21/iam.json new file mode 100644 index 00000000000..815276cfa63 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-21/iam.json @@ -0,0 +1,34 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-961368471244@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:961368471244-compute@developer.gserviceaccount.com", + "serviceAccount:961368471244@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "group:k8s-infra-sig-scalability-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-21/service-accounts/961368471244-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-21/service-accounts/961368471244-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..4102674e8bd --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-21/service-accounts/961368471244-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "961368471244-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-scale-21/serviceAccounts/961368471244-compute@developer.gserviceaccount.com", + "oauth2ClientId": "113978923717436125234", + "projectId": "k8s-infra-e2e-boskos-scale-21", + "uniqueId": "113978923717436125234" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-21/service-accounts/961368471244-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-21/service-accounts/961368471244-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-21/service-accounts/961368471244-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-21/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-21/services/compute/project-info.json new file mode 100644 index 00000000000..5a0f8118976 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-21/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-29T19:20:50.228-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "961368471244-compute@developer.gserviceaccount.com", + "id": "7053830654477644781", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-scale-21", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-21", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-21/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-21/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-21/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-22/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-22/description.json new file mode 100644 index 00000000000..8c914053405 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-22/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-30T02:22:41.558Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-scale-22", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-scale-22", + "projectNumber": "370249020154" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-22/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-22/iam.json new file mode 100644 index 00000000000..63a4cb1d74e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-22/iam.json @@ -0,0 +1,34 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-370249020154@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:370249020154-compute@developer.gserviceaccount.com", + "serviceAccount:370249020154@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "group:k8s-infra-sig-scalability-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-22/service-accounts/370249020154-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-22/service-accounts/370249020154-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..07c1e708d3a --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-22/service-accounts/370249020154-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "370249020154-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-scale-22/serviceAccounts/370249020154-compute@developer.gserviceaccount.com", + "oauth2ClientId": "105764939377645011608", + "projectId": "k8s-infra-e2e-boskos-scale-22", + "uniqueId": "105764939377645011608" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-22/service-accounts/370249020154-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-22/service-accounts/370249020154-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-22/service-accounts/370249020154-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-22/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-22/services/compute/project-info.json new file mode 100644 index 00000000000..a7a392a9043 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-22/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-29T19:22:52.165-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "370249020154-compute@developer.gserviceaccount.com", + "id": "2334775650560684948", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-scale-22", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-22", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-22/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-22/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-22/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-23/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-23/description.json new file mode 100644 index 00000000000..b584eb0c9b2 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-23/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-30T02:24:48.907Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-scale-23", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-scale-23", + "projectNumber": "610500652130" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-23/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-23/iam.json new file mode 100644 index 00000000000..2ac31a064a3 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-23/iam.json @@ -0,0 +1,34 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-610500652130@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:610500652130-compute@developer.gserviceaccount.com", + "serviceAccount:610500652130@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "group:k8s-infra-sig-scalability-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-23/service-accounts/610500652130-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-23/service-accounts/610500652130-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..c93fa3f2703 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-23/service-accounts/610500652130-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "610500652130-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-scale-23/serviceAccounts/610500652130-compute@developer.gserviceaccount.com", + "oauth2ClientId": "101771127651825434805", + "projectId": "k8s-infra-e2e-boskos-scale-23", + "uniqueId": "101771127651825434805" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-23/service-accounts/610500652130-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-23/service-accounts/610500652130-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-23/service-accounts/610500652130-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-23/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-23/services/compute/project-info.json new file mode 100644 index 00000000000..0527ee62e61 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-23/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-29T19:24:59.124-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "610500652130-compute@developer.gserviceaccount.com", + "id": "5827181414850147093", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-scale-23", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-23", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-23/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-23/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-23/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-24/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-24/description.json new file mode 100644 index 00000000000..2f5bf162993 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-24/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-30T02:26:57.036Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-scale-24", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-scale-24", + "projectNumber": "211820429131" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-24/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-24/iam.json new file mode 100644 index 00000000000..6ed1b1026e7 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-24/iam.json @@ -0,0 +1,34 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-211820429131@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:211820429131-compute@developer.gserviceaccount.com", + "serviceAccount:211820429131@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "group:k8s-infra-sig-scalability-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-24/service-accounts/211820429131-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-24/service-accounts/211820429131-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..367f03742ca --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-24/service-accounts/211820429131-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "211820429131-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-scale-24/serviceAccounts/211820429131-compute@developer.gserviceaccount.com", + "oauth2ClientId": "103946014425762103333", + "projectId": "k8s-infra-e2e-boskos-scale-24", + "uniqueId": "103946014425762103333" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-24/service-accounts/211820429131-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-24/service-accounts/211820429131-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-24/service-accounts/211820429131-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-24/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-24/services/compute/project-info.json new file mode 100644 index 00000000000..bf255175cca --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-24/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nmaciejborsz:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDqAYjBN7i1Mj9zAKbXLzlFauBn6UpuIcAro5tsLjx4+KUfbmuomYuKQlAjBoRwAayDZCQYXTWuDnFBaY2qFMgm6JJdIUvPTJu5C7DLTLKyafBOren733OzApW9Sz9O/oFlIKaG13M9VBUr1C72kvwjw1he6c9qbgQNVeSyXdTEu1aF9X9AB1bPVMASupY0b0X6mwkG/geqR1FX4TW5oPY/H0uXp50acRQOhVaiQwN92fOwDEFhMVPBCmvuh4g7Uw7Pj9d1jNY9rCsPa9zR8x6+EzjZd4cscREWaHmKUhY/vKYQkS34b+UtNHGj8JdgFEIpflbjzgr3arSF3Vuj7azz maciejborsz@maciejborsz-l.waw.corp.google.com" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-29T19:27:06.990-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "211820429131-compute@developer.gserviceaccount.com", + "id": "523493839104028821", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-scale-24", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-24", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-24/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-24/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-24/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-25/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-25/description.json new file mode 100644 index 00000000000..94b75e311f0 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-25/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-30T02:28:52.432Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-scale-25", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-scale-25", + "projectNumber": "500629287260" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-25/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-25/iam.json new file mode 100644 index 00000000000..67e2518fc3f --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-25/iam.json @@ -0,0 +1,34 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-500629287260@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:500629287260-compute@developer.gserviceaccount.com", + "serviceAccount:500629287260@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "group:k8s-infra-sig-scalability-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-25/service-accounts/500629287260-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-25/service-accounts/500629287260-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..afe6a74d639 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-25/service-accounts/500629287260-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "500629287260-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-scale-25/serviceAccounts/500629287260-compute@developer.gserviceaccount.com", + "oauth2ClientId": "100112741496382875571", + "projectId": "k8s-infra-e2e-boskos-scale-25", + "uniqueId": "100112741496382875571" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-25/service-accounts/500629287260-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-25/service-accounts/500629287260-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-25/service-accounts/500629287260-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-25/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-25/services/compute/project-info.json new file mode 100644 index 00000000000..98ed38434f4 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-25/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-29T19:29:02.842-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "500629287260-compute@developer.gserviceaccount.com", + "id": "5995130342819147777", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-scale-25", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-25", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-25/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-25/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-25/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-26/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-26/description.json new file mode 100644 index 00000000000..46dcd0660cf --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-26/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-30T02:30:55.731Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-scale-26", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-scale-26", + "projectNumber": "257675618203" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-26/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-26/iam.json new file mode 100644 index 00000000000..f8f037e0fc7 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-26/iam.json @@ -0,0 +1,34 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-257675618203@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:257675618203-compute@developer.gserviceaccount.com", + "serviceAccount:257675618203@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "group:k8s-infra-sig-scalability-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-26/service-accounts/257675618203-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-26/service-accounts/257675618203-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..94103de99cf --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-26/service-accounts/257675618203-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "257675618203-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-scale-26/serviceAccounts/257675618203-compute@developer.gserviceaccount.com", + "oauth2ClientId": "116314234950010636675", + "projectId": "k8s-infra-e2e-boskos-scale-26", + "uniqueId": "116314234950010636675" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-26/service-accounts/257675618203-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-26/service-accounts/257675618203-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-26/service-accounts/257675618203-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-26/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-26/services/compute/project-info.json new file mode 100644 index 00000000000..06797efa089 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-26/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-29T19:31:06.216-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "257675618203-compute@developer.gserviceaccount.com", + "id": "4731662874003812742", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-scale-26", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-26", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-26/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-26/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-26/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-27/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-27/description.json new file mode 100644 index 00000000000..af2f4c84542 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-27/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-30T02:32:51.088Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-scale-27", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-scale-27", + "projectNumber": "440111527817" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-27/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-27/iam.json new file mode 100644 index 00000000000..ca659613a86 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-27/iam.json @@ -0,0 +1,34 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-440111527817@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:440111527817-compute@developer.gserviceaccount.com", + "serviceAccount:440111527817@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "group:k8s-infra-sig-scalability-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-27/service-accounts/440111527817-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-27/service-accounts/440111527817-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..07745a8459b --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-27/service-accounts/440111527817-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "440111527817-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-scale-27/serviceAccounts/440111527817-compute@developer.gserviceaccount.com", + "oauth2ClientId": "101952926448371160078", + "projectId": "k8s-infra-e2e-boskos-scale-27", + "uniqueId": "101952926448371160078" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-27/service-accounts/440111527817-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-27/service-accounts/440111527817-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-27/service-accounts/440111527817-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-27/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-27/services/compute/project-info.json new file mode 100644 index 00000000000..70a280953ed --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-27/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-29T19:33:01.626-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "440111527817-compute@developer.gserviceaccount.com", + "id": "2828011545964228914", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-scale-27", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-27", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-27/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-27/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-27/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-28/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-28/description.json new file mode 100644 index 00000000000..b5cb655851b --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-28/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-30T02:34:59.530Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-scale-28", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-scale-28", + "projectNumber": "199724281835" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-28/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-28/iam.json new file mode 100644 index 00000000000..78a4c7800df --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-28/iam.json @@ -0,0 +1,34 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-199724281835@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:199724281835-compute@developer.gserviceaccount.com", + "serviceAccount:199724281835@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "group:k8s-infra-sig-scalability-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-28/service-accounts/199724281835-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-28/service-accounts/199724281835-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..571db7d5bdd --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-28/service-accounts/199724281835-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "199724281835-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-scale-28/serviceAccounts/199724281835-compute@developer.gserviceaccount.com", + "oauth2ClientId": "108204388479844202310", + "projectId": "k8s-infra-e2e-boskos-scale-28", + "uniqueId": "108204388479844202310" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-28/service-accounts/199724281835-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-28/service-accounts/199724281835-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-28/service-accounts/199724281835-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-28/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-28/services/compute/project-info.json new file mode 100644 index 00000000000..d80619a393b --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-28/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-29T19:35:11.291-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "199724281835-compute@developer.gserviceaccount.com", + "id": "2899977949256527536", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-scale-28", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-28", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-28/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-28/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-28/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-29/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-29/description.json new file mode 100644 index 00000000000..25d60b5ea0a --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-29/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-30T02:37:04.460Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-scale-29", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-scale-29", + "projectNumber": "718923874112" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-29/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-29/iam.json new file mode 100644 index 00000000000..666d5cf8907 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-29/iam.json @@ -0,0 +1,34 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-718923874112@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:718923874112-compute@developer.gserviceaccount.com", + "serviceAccount:718923874112@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "group:k8s-infra-sig-scalability-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-29/service-accounts/718923874112-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-29/service-accounts/718923874112-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..d8bf2bfb922 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-29/service-accounts/718923874112-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "718923874112-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-scale-29/serviceAccounts/718923874112-compute@developer.gserviceaccount.com", + "oauth2ClientId": "116709224701301223722", + "projectId": "k8s-infra-e2e-boskos-scale-29", + "uniqueId": "116709224701301223722" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-29/service-accounts/718923874112-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-29/service-accounts/718923874112-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-29/service-accounts/718923874112-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-29/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-29/services/compute/project-info.json new file mode 100644 index 00000000000..78ea1ad0366 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-29/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-29T19:37:15.972-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "718923874112-compute@developer.gserviceaccount.com", + "id": "5764112822290525748", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-scale-29", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-29", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-29/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-29/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-29/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-30/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-30/description.json new file mode 100644 index 00000000000..a0277970f77 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-30/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-30T02:39:23.469Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-scale-30", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-scale-30", + "projectNumber": "17885835863" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-30/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-30/iam.json new file mode 100644 index 00000000000..c7d89769c9b --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-30/iam.json @@ -0,0 +1,34 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-17885835863@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:17885835863-compute@developer.gserviceaccount.com", + "serviceAccount:17885835863@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "group:k8s-infra-sig-scalability-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-30/service-accounts/17885835863-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-30/service-accounts/17885835863-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..e03dca3631f --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-30/service-accounts/17885835863-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "17885835863-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-scale-30/serviceAccounts/17885835863-compute@developer.gserviceaccount.com", + "oauth2ClientId": "113186858498590616627", + "projectId": "k8s-infra-e2e-boskos-scale-30", + "uniqueId": "113186858498590616627" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-30/service-accounts/17885835863-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-30/service-accounts/17885835863-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-30/service-accounts/17885835863-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-30/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-30/services/compute/project-info.json new file mode 100644 index 00000000000..28f4e5ebe6f --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-30/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-29T19:39:34.764-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "17885835863-compute@developer.gserviceaccount.com", + "id": "5854497445507411849", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-scale-30", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-30", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-30/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-30/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-scale-30/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage From 9fbc0f0e516a1b31cfb82578bdc5d314f6875135 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Wed, 13 Jan 2021 12:59:15 -0500 Subject: [PATCH 06/39] audit: add k8s-infra-e2e-boskos-gpu-* projects --- .../description.json | 11 ++ .../k8s-infra-e2e-boskos-gpu-01/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-gpu-02/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-gpu-03/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-gpu-04/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-gpu-05/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-gpu-06/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-gpu-07/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-gpu-08/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-gpu-09/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-boskos-gpu-10/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + 60 files changed, 2280 insertions(+) create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-01/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-01/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-01/service-accounts/220512457637-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-01/service-accounts/220512457637-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-01/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-01/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-02/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-02/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-02/service-accounts/627137184414-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-02/service-accounts/627137184414-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-02/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-02/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-03/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-03/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-03/service-accounts/910061531590-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-03/service-accounts/910061531590-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-03/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-03/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-04/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-04/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-04/service-accounts/887670065934-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-04/service-accounts/887670065934-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-04/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-04/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-05/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-05/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-05/service-accounts/135385633554-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-05/service-accounts/135385633554-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-05/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-05/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-06/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-06/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-06/service-accounts/574702544726-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-06/service-accounts/574702544726-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-06/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-06/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-07/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-07/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-07/service-accounts/593515467300-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-07/service-accounts/593515467300-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-07/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-07/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-08/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-08/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-08/service-accounts/693828359310-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-08/service-accounts/693828359310-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-08/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-08/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-09/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-09/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-09/service-accounts/136773320006-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-09/service-accounts/136773320006-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-09/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-09/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-10/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-10/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-10/service-accounts/441369562578-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-10/service-accounts/441369562578-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-10/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-gpu-10/services/enabled.txt diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-01/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-01/description.json new file mode 100644 index 00000000000..d6cb130299c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-01/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-07T19:38:52.853Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-gpu-01", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-gpu-01", + "projectNumber": "220512457637" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-01/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-01/iam.json new file mode 100644 index 00000000000..4fb3da77aff --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-01/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-220512457637@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:220512457637-compute@developer.gserviceaccount.com", + "serviceAccount:220512457637@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-01/service-accounts/220512457637-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-01/service-accounts/220512457637-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..460ddbf4e55 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-01/service-accounts/220512457637-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "220512457637-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-gpu-01/serviceAccounts/220512457637-compute@developer.gserviceaccount.com", + "oauth2ClientId": "100298958778775807046", + "projectId": "k8s-infra-e2e-boskos-gpu-01", + "uniqueId": "100298958778775807046" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-01/service-accounts/220512457637-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-01/service-accounts/220512457637-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-01/service-accounts/220512457637-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-01/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-gpu-01/services/compute/project-info.json new file mode 100644 index 00000000000..36d44b87303 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-01/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-07T12:39:02.680-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "220512457637-compute@developer.gserviceaccount.com", + "id": "8041866388899369785", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-gpu-01", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-gpu-01", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-01/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-01/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-01/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-02/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-02/description.json new file mode 100644 index 00000000000..5d08f53b9fd --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-02/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-07T19:40:55.256Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-gpu-02", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-gpu-02", + "projectNumber": "627137184414" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-02/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-02/iam.json new file mode 100644 index 00000000000..dc1d7f80b98 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-02/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-627137184414@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:627137184414-compute@developer.gserviceaccount.com", + "serviceAccount:627137184414@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-02/service-accounts/627137184414-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-02/service-accounts/627137184414-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..b41b948f146 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-02/service-accounts/627137184414-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "627137184414-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-gpu-02/serviceAccounts/627137184414-compute@developer.gserviceaccount.com", + "oauth2ClientId": "109493456843441753898", + "projectId": "k8s-infra-e2e-boskos-gpu-02", + "uniqueId": "109493456843441753898" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-02/service-accounts/627137184414-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-02/service-accounts/627137184414-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-02/service-accounts/627137184414-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-02/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-gpu-02/services/compute/project-info.json new file mode 100644 index 00000000000..4a76709983c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-02/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-07T12:41:06.017-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "627137184414-compute@developer.gserviceaccount.com", + "id": "182103574686208190", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-gpu-02", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-gpu-02", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-02/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-02/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-02/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-03/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-03/description.json new file mode 100644 index 00000000000..b7595b3cdb0 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-03/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-07T19:42:52.759Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-gpu-03", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-gpu-03", + "projectNumber": "910061531590" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-03/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-03/iam.json new file mode 100644 index 00000000000..7ff1cc9d8a0 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-03/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-910061531590@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:910061531590-compute@developer.gserviceaccount.com", + "serviceAccount:910061531590@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-03/service-accounts/910061531590-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-03/service-accounts/910061531590-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..446c921ba3a --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-03/service-accounts/910061531590-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "910061531590-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-gpu-03/serviceAccounts/910061531590-compute@developer.gserviceaccount.com", + "oauth2ClientId": "105320867006220998427", + "projectId": "k8s-infra-e2e-boskos-gpu-03", + "uniqueId": "105320867006220998427" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-03/service-accounts/910061531590-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-03/service-accounts/910061531590-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-03/service-accounts/910061531590-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-03/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-gpu-03/services/compute/project-info.json new file mode 100644 index 00000000000..6986b2f64e4 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-03/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-07T12:43:03.135-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "910061531590-compute@developer.gserviceaccount.com", + "id": "5440990943568203817", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-gpu-03", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-gpu-03", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-03/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-03/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-03/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-04/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-04/description.json new file mode 100644 index 00000000000..a4e8151a475 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-04/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-07T19:45:13.562Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-gpu-04", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-gpu-04", + "projectNumber": "887670065934" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-04/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-04/iam.json new file mode 100644 index 00000000000..4541356612f --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-04/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-887670065934@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:887670065934-compute@developer.gserviceaccount.com", + "serviceAccount:887670065934@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-04/service-accounts/887670065934-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-04/service-accounts/887670065934-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..e20ca934344 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-04/service-accounts/887670065934-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "887670065934-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-gpu-04/serviceAccounts/887670065934-compute@developer.gserviceaccount.com", + "oauth2ClientId": "102931344885479175746", + "projectId": "k8s-infra-e2e-boskos-gpu-04", + "uniqueId": "102931344885479175746" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-04/service-accounts/887670065934-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-04/service-accounts/887670065934-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-04/service-accounts/887670065934-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-04/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-gpu-04/services/compute/project-info.json new file mode 100644 index 00000000000..a99e48425b2 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-04/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-07T12:45:23.331-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "887670065934-compute@developer.gserviceaccount.com", + "id": "412132668621197756", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-gpu-04", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-gpu-04", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-04/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-04/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-04/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-05/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-05/description.json new file mode 100644 index 00000000000..509fe671372 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-05/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-07T19:47:08.933Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-gpu-05", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-gpu-05", + "projectNumber": "135385633554" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-05/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-05/iam.json new file mode 100644 index 00000000000..18011b3aaf5 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-05/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-135385633554@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:135385633554-compute@developer.gserviceaccount.com", + "serviceAccount:135385633554@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-05/service-accounts/135385633554-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-05/service-accounts/135385633554-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..058c688538c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-05/service-accounts/135385633554-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "135385633554-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-gpu-05/serviceAccounts/135385633554-compute@developer.gserviceaccount.com", + "oauth2ClientId": "115937758963933882229", + "projectId": "k8s-infra-e2e-boskos-gpu-05", + "uniqueId": "115937758963933882229" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-05/service-accounts/135385633554-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-05/service-accounts/135385633554-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-05/service-accounts/135385633554-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-05/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-gpu-05/services/compute/project-info.json new file mode 100644 index 00000000000..140c14c7538 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-05/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-07T12:47:19.585-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "135385633554-compute@developer.gserviceaccount.com", + "id": "1001145205149143336", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-gpu-05", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-gpu-05", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-05/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-05/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-05/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-06/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-06/description.json new file mode 100644 index 00000000000..de1cb64e81f --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-06/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-07T19:49:16.235Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-gpu-06", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-gpu-06", + "projectNumber": "574702544726" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-06/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-06/iam.json new file mode 100644 index 00000000000..a0214f62bd0 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-06/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-574702544726@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:574702544726-compute@developer.gserviceaccount.com", + "serviceAccount:574702544726@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-06/service-accounts/574702544726-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-06/service-accounts/574702544726-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..7bdc23e07d8 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-06/service-accounts/574702544726-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "574702544726-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-gpu-06/serviceAccounts/574702544726-compute@developer.gserviceaccount.com", + "oauth2ClientId": "101198495662120322139", + "projectId": "k8s-infra-e2e-boskos-gpu-06", + "uniqueId": "101198495662120322139" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-06/service-accounts/574702544726-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-06/service-accounts/574702544726-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-06/service-accounts/574702544726-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-06/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-gpu-06/services/compute/project-info.json new file mode 100644 index 00000000000..a53628fdd78 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-06/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-07T12:49:26.647-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "574702544726-compute@developer.gserviceaccount.com", + "id": "3804526137988615849", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-gpu-06", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-gpu-06", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-06/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-06/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-06/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-07/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-07/description.json new file mode 100644 index 00000000000..1a8d8329ee5 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-07/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-07T19:51:02.169Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-gpu-07", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-gpu-07", + "projectNumber": "593515467300" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-07/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-07/iam.json new file mode 100644 index 00000000000..c4b864dd8a9 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-07/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-593515467300@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:593515467300-compute@developer.gserviceaccount.com", + "serviceAccount:593515467300@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-07/service-accounts/593515467300-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-07/service-accounts/593515467300-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..110b211773a --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-07/service-accounts/593515467300-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "593515467300-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-gpu-07/serviceAccounts/593515467300-compute@developer.gserviceaccount.com", + "oauth2ClientId": "115166631286598779859", + "projectId": "k8s-infra-e2e-boskos-gpu-07", + "uniqueId": "115166631286598779859" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-07/service-accounts/593515467300-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-07/service-accounts/593515467300-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-07/service-accounts/593515467300-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-07/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-gpu-07/services/compute/project-info.json new file mode 100644 index 00000000000..809bb197bb9 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-07/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-07T12:51:12.945-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "593515467300-compute@developer.gserviceaccount.com", + "id": "7721290966228799071", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-gpu-07", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-gpu-07", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-07/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-07/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-07/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-08/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-08/description.json new file mode 100644 index 00000000000..ea8ff1004ca --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-08/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-07T19:53:05.871Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-gpu-08", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-gpu-08", + "projectNumber": "693828359310" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-08/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-08/iam.json new file mode 100644 index 00000000000..def3946deef --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-08/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-693828359310@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:693828359310-compute@developer.gserviceaccount.com", + "serviceAccount:693828359310@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-08/service-accounts/693828359310-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-08/service-accounts/693828359310-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..3b7f2bc9914 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-08/service-accounts/693828359310-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "693828359310-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-gpu-08/serviceAccounts/693828359310-compute@developer.gserviceaccount.com", + "oauth2ClientId": "109341712657002955723", + "projectId": "k8s-infra-e2e-boskos-gpu-08", + "uniqueId": "109341712657002955723" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-08/service-accounts/693828359310-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-08/service-accounts/693828359310-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-08/service-accounts/693828359310-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-08/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-gpu-08/services/compute/project-info.json new file mode 100644 index 00000000000..c047ab185e8 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-08/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-07T12:53:16.056-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "693828359310-compute@developer.gserviceaccount.com", + "id": "8955621969613557700", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-gpu-08", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-gpu-08", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-08/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-08/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-08/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-09/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-09/description.json new file mode 100644 index 00000000000..7755c8596cb --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-09/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-07T19:54:48.162Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-gpu-09", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-gpu-09", + "projectNumber": "136773320006" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-09/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-09/iam.json new file mode 100644 index 00000000000..88dc636ba68 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-09/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-136773320006@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:136773320006-compute@developer.gserviceaccount.com", + "serviceAccount:136773320006@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-09/service-accounts/136773320006-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-09/service-accounts/136773320006-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..19c2c4220c9 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-09/service-accounts/136773320006-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "136773320006-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-gpu-09/serviceAccounts/136773320006-compute@developer.gserviceaccount.com", + "oauth2ClientId": "117947059727975623742", + "projectId": "k8s-infra-e2e-boskos-gpu-09", + "uniqueId": "117947059727975623742" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-09/service-accounts/136773320006-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-09/service-accounts/136773320006-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-09/service-accounts/136773320006-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-09/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-gpu-09/services/compute/project-info.json new file mode 100644 index 00000000000..ec7c67fba2e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-09/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-07T12:54:58.580-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "136773320006-compute@developer.gserviceaccount.com", + "id": "3744160437067845501", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-gpu-09", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-gpu-09", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-09/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-09/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-09/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-10/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-10/description.json new file mode 100644 index 00000000000..e2167c640b8 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-10/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-07T19:56:58.075Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-gpu-10", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-gpu-10", + "projectNumber": "441369562578" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-10/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-10/iam.json new file mode 100644 index 00000000000..d689cdd0b87 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-10/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-441369562578@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:441369562578-compute@developer.gserviceaccount.com", + "serviceAccount:441369562578@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-10/service-accounts/441369562578-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-10/service-accounts/441369562578-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..91c5a5fe4f9 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-10/service-accounts/441369562578-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "441369562578-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-gpu-10/serviceAccounts/441369562578-compute@developer.gserviceaccount.com", + "oauth2ClientId": "115433193364334766782", + "projectId": "k8s-infra-e2e-boskos-gpu-10", + "uniqueId": "115433193364334766782" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-10/service-accounts/441369562578-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-10/service-accounts/441369562578-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-10/service-accounts/441369562578-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-10/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-gpu-10/services/compute/project-info.json new file mode 100644 index 00000000000..5d36ba058e1 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-10/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-07T12:57:08.073-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "441369562578-compute@developer.gserviceaccount.com", + "id": "3193708005254237436", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-gpu-10", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-gpu-10", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-10/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-10/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-10/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage From 5caaf90a8a2b51a84a72009c101418b5815bd541 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Wed, 13 Jan 2021 13:01:30 -0500 Subject: [PATCH 07/39] audit: add k8s-infra-e2e-boskos-[041-120] projects --- .../k8s-infra-e2e-boskos-041/description.json | 11 ++ .../k8s-infra-e2e-boskos-041/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-042/description.json | 11 ++ .../k8s-infra-e2e-boskos-042/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-043/description.json | 11 ++ .../k8s-infra-e2e-boskos-043/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-044/description.json | 11 ++ .../k8s-infra-e2e-boskos-044/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-045/description.json | 11 ++ .../k8s-infra-e2e-boskos-045/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-046/description.json | 11 ++ .../k8s-infra-e2e-boskos-046/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-047/description.json | 11 ++ .../k8s-infra-e2e-boskos-047/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-048/description.json | 11 ++ .../k8s-infra-e2e-boskos-048/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-049/description.json | 11 ++ .../k8s-infra-e2e-boskos-049/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-050/description.json | 11 ++ .../k8s-infra-e2e-boskos-050/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-051/description.json | 11 ++ .../k8s-infra-e2e-boskos-051/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-052/description.json | 11 ++ .../k8s-infra-e2e-boskos-052/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-053/description.json | 11 ++ .../k8s-infra-e2e-boskos-053/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-054/description.json | 11 ++ .../k8s-infra-e2e-boskos-054/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-055/description.json | 11 ++ .../k8s-infra-e2e-boskos-055/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-056/description.json | 11 ++ .../k8s-infra-e2e-boskos-056/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-057/description.json | 11 ++ .../k8s-infra-e2e-boskos-057/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-058/description.json | 11 ++ .../k8s-infra-e2e-boskos-058/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-059/description.json | 11 ++ .../k8s-infra-e2e-boskos-059/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-060/description.json | 11 ++ .../k8s-infra-e2e-boskos-060/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-061/description.json | 11 ++ .../k8s-infra-e2e-boskos-061/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-062/description.json | 11 ++ .../k8s-infra-e2e-boskos-062/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-063/description.json | 11 ++ .../k8s-infra-e2e-boskos-063/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-064/description.json | 11 ++ .../k8s-infra-e2e-boskos-064/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-065/description.json | 11 ++ .../k8s-infra-e2e-boskos-065/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-066/description.json | 11 ++ .../k8s-infra-e2e-boskos-066/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-067/description.json | 11 ++ .../k8s-infra-e2e-boskos-067/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-068/description.json | 11 ++ .../k8s-infra-e2e-boskos-068/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-069/description.json | 11 ++ .../k8s-infra-e2e-boskos-069/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-070/description.json | 11 ++ .../k8s-infra-e2e-boskos-070/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-071/description.json | 11 ++ .../k8s-infra-e2e-boskos-071/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-072/description.json | 11 ++ .../k8s-infra-e2e-boskos-072/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-073/description.json | 11 ++ .../k8s-infra-e2e-boskos-073/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-074/description.json | 11 ++ .../k8s-infra-e2e-boskos-074/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-075/description.json | 11 ++ .../k8s-infra-e2e-boskos-075/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-076/description.json | 11 ++ .../k8s-infra-e2e-boskos-076/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-077/description.json | 11 ++ .../k8s-infra-e2e-boskos-077/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-078/description.json | 11 ++ .../k8s-infra-e2e-boskos-078/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-079/description.json | 11 ++ .../k8s-infra-e2e-boskos-079/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-080/description.json | 11 ++ .../k8s-infra-e2e-boskos-080/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-081/description.json | 11 ++ .../k8s-infra-e2e-boskos-081/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-082/description.json | 11 ++ .../k8s-infra-e2e-boskos-082/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-083/description.json | 11 ++ .../k8s-infra-e2e-boskos-083/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-084/description.json | 11 ++ .../k8s-infra-e2e-boskos-084/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-085/description.json | 11 ++ .../k8s-infra-e2e-boskos-085/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-086/description.json | 11 ++ .../k8s-infra-e2e-boskos-086/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-087/description.json | 11 ++ .../k8s-infra-e2e-boskos-087/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-088/description.json | 11 ++ .../k8s-infra-e2e-boskos-088/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-089/description.json | 11 ++ .../k8s-infra-e2e-boskos-089/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-090/description.json | 11 ++ .../k8s-infra-e2e-boskos-090/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-091/description.json | 11 ++ .../k8s-infra-e2e-boskos-091/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-092/description.json | 11 ++ .../k8s-infra-e2e-boskos-092/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-093/description.json | 11 ++ .../k8s-infra-e2e-boskos-093/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-094/description.json | 11 ++ .../k8s-infra-e2e-boskos-094/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-095/description.json | 11 ++ .../k8s-infra-e2e-boskos-095/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-096/description.json | 11 ++ .../k8s-infra-e2e-boskos-096/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-097/description.json | 11 ++ .../k8s-infra-e2e-boskos-097/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-098/description.json | 11 ++ .../k8s-infra-e2e-boskos-098/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-099/description.json | 11 ++ .../k8s-infra-e2e-boskos-099/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-100/description.json | 11 ++ .../k8s-infra-e2e-boskos-100/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-101/description.json | 11 ++ .../k8s-infra-e2e-boskos-101/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-102/description.json | 11 ++ .../k8s-infra-e2e-boskos-102/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-103/description.json | 11 ++ .../k8s-infra-e2e-boskos-103/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-104/description.json | 11 ++ .../k8s-infra-e2e-boskos-104/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-105/description.json | 11 ++ .../k8s-infra-e2e-boskos-105/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-106/description.json | 11 ++ .../k8s-infra-e2e-boskos-106/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-107/description.json | 11 ++ .../k8s-infra-e2e-boskos-107/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-108/description.json | 11 ++ .../k8s-infra-e2e-boskos-108/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-109/description.json | 11 ++ .../k8s-infra-e2e-boskos-109/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-110/description.json | 11 ++ .../k8s-infra-e2e-boskos-110/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-111/description.json | 11 ++ .../k8s-infra-e2e-boskos-111/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-112/description.json | 11 ++ .../k8s-infra-e2e-boskos-112/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-113/description.json | 11 ++ .../k8s-infra-e2e-boskos-113/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-114/description.json | 11 ++ .../k8s-infra-e2e-boskos-114/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-115/description.json | 11 ++ .../k8s-infra-e2e-boskos-115/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-116/description.json | 11 ++ .../k8s-infra-e2e-boskos-116/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-117/description.json | 11 ++ .../k8s-infra-e2e-boskos-117/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-118/description.json | 11 ++ .../k8s-infra-e2e-boskos-118/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-119/description.json | 11 ++ .../k8s-infra-e2e-boskos-119/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../k8s-infra-e2e-boskos-120/description.json | 11 ++ .../k8s-infra-e2e-boskos-120/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + 480 files changed, 18240 insertions(+) create mode 100644 audit/projects/k8s-infra-e2e-boskos-041/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-041/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-041/service-accounts/919278640051-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-041/service-accounts/919278640051-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-041/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-041/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-042/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-042/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-042/service-accounts/519781870473-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-042/service-accounts/519781870473-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-042/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-042/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-043/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-043/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-043/service-accounts/93697223430-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-043/service-accounts/93697223430-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-043/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-043/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-044/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-044/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-044/service-accounts/341096655577-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-044/service-accounts/341096655577-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-044/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-044/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-045/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-045/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-045/service-accounts/1057081706538-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-045/service-accounts/1057081706538-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-045/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-045/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-046/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-046/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-046/service-accounts/1077877847215-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-046/service-accounts/1077877847215-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-046/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-046/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-047/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-047/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-047/service-accounts/1040129457366-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-047/service-accounts/1040129457366-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-047/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-047/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-048/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-048/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-048/service-accounts/945923147346-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-048/service-accounts/945923147346-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-048/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-048/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-049/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-049/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-049/service-accounts/179636385113-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-049/service-accounts/179636385113-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-049/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-049/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-050/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-050/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-050/service-accounts/500102021523-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-050/service-accounts/500102021523-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-050/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-050/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-051/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-051/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-051/service-accounts/854680052671-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-051/service-accounts/854680052671-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-051/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-051/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-052/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-052/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-052/service-accounts/773433897863-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-052/service-accounts/773433897863-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-052/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-052/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-053/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-053/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-053/service-accounts/1067484269716-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-053/service-accounts/1067484269716-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-053/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-053/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-054/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-054/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-054/service-accounts/37678502337-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-054/service-accounts/37678502337-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-054/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-054/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-055/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-055/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-055/service-accounts/469478053075-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-055/service-accounts/469478053075-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-055/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-055/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-056/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-056/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-056/service-accounts/698279265353-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-056/service-accounts/698279265353-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-056/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-056/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-057/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-057/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-057/service-accounts/388686725344-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-057/service-accounts/388686725344-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-057/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-057/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-058/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-058/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-058/service-accounts/538229256230-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-058/service-accounts/538229256230-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-058/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-058/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-059/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-059/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-059/service-accounts/468419072321-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-059/service-accounts/468419072321-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-059/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-059/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-060/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-060/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-060/service-accounts/64847924766-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-060/service-accounts/64847924766-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-060/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-060/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-061/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-061/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-061/service-accounts/528140019086-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-061/service-accounts/528140019086-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-061/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-061/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-062/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-062/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-062/service-accounts/1005522583204-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-062/service-accounts/1005522583204-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-062/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-062/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-063/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-063/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-063/service-accounts/14607710427-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-063/service-accounts/14607710427-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-063/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-063/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-064/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-064/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-064/service-accounts/846561691778-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-064/service-accounts/846561691778-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-064/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-064/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-065/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-065/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-065/service-accounts/434948373658-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-065/service-accounts/434948373658-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-065/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-065/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-066/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-066/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-066/service-accounts/234741550692-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-066/service-accounts/234741550692-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-066/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-066/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-067/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-067/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-067/service-accounts/392769659984-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-067/service-accounts/392769659984-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-067/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-067/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-068/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-068/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-068/service-accounts/101721090067-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-068/service-accounts/101721090067-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-068/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-068/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-069/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-069/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-069/service-accounts/645254189504-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-069/service-accounts/645254189504-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-069/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-069/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-070/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-070/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-070/service-accounts/106749447755-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-070/service-accounts/106749447755-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-070/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-070/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-071/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-071/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-071/service-accounts/804042965184-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-071/service-accounts/804042965184-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-071/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-071/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-072/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-072/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-072/service-accounts/960107034139-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-072/service-accounts/960107034139-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-072/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-072/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-073/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-073/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-073/service-accounts/834104092373-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-073/service-accounts/834104092373-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-073/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-073/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-074/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-074/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-074/service-accounts/252404881892-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-074/service-accounts/252404881892-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-074/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-074/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-075/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-075/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-075/service-accounts/976069798193-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-075/service-accounts/976069798193-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-075/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-075/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-076/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-076/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-076/service-accounts/850357009671-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-076/service-accounts/850357009671-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-076/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-076/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-077/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-077/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-077/service-accounts/230903094856-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-077/service-accounts/230903094856-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-077/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-077/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-078/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-078/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-078/service-accounts/378831334770-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-078/service-accounts/378831334770-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-078/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-078/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-079/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-079/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-079/service-accounts/148392433129-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-079/service-accounts/148392433129-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-079/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-079/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-080/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-080/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-080/service-accounts/631451032209-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-080/service-accounts/631451032209-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-080/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-080/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-081/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-081/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-081/service-accounts/390883291642-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-081/service-accounts/390883291642-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-081/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-081/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-082/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-082/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-082/service-accounts/893122939836-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-082/service-accounts/893122939836-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-082/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-082/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-083/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-083/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-083/service-accounts/629839802801-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-083/service-accounts/629839802801-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-083/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-083/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-084/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-084/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-084/service-accounts/77573782464-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-084/service-accounts/77573782464-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-084/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-084/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-085/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-085/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-085/service-accounts/811589786980-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-085/service-accounts/811589786980-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-085/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-085/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-086/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-086/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-086/service-accounts/673212858560-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-086/service-accounts/673212858560-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-086/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-086/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-087/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-087/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-087/service-accounts/778305761806-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-087/service-accounts/778305761806-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-087/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-087/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-088/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-088/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-088/service-accounts/119332798591-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-088/service-accounts/119332798591-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-088/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-088/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-089/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-089/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-089/service-accounts/222722062724-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-089/service-accounts/222722062724-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-089/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-089/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-090/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-090/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-090/service-accounts/92582827188-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-090/service-accounts/92582827188-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-090/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-090/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-091/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-091/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-091/service-accounts/323623043936-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-091/service-accounts/323623043936-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-091/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-091/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-092/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-092/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-092/service-accounts/430461122234-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-092/service-accounts/430461122234-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-092/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-092/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-093/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-093/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-093/service-accounts/64000581688-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-093/service-accounts/64000581688-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-093/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-093/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-094/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-094/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-094/service-accounts/172444340457-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-094/service-accounts/172444340457-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-094/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-094/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-095/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-095/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-095/service-accounts/116031661039-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-095/service-accounts/116031661039-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-095/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-095/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-096/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-096/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-096/service-accounts/874649526990-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-096/service-accounts/874649526990-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-096/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-096/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-097/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-097/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-097/service-accounts/847658742492-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-097/service-accounts/847658742492-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-097/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-097/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-098/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-098/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-098/service-accounts/108849447085-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-098/service-accounts/108849447085-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-098/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-098/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-099/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-099/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-099/service-accounts/850929155353-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-099/service-accounts/850929155353-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-099/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-099/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-100/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-100/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-100/service-accounts/372715348529-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-100/service-accounts/372715348529-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-100/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-100/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-101/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-101/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-101/service-accounts/690664424148-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-101/service-accounts/690664424148-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-101/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-101/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-102/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-102/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-102/service-accounts/562968761079-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-102/service-accounts/562968761079-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-102/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-102/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-103/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-103/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-103/service-accounts/48099424019-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-103/service-accounts/48099424019-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-103/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-103/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-104/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-104/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-104/service-accounts/939613538320-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-104/service-accounts/939613538320-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-104/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-104/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-105/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-105/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-105/service-accounts/521265359230-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-105/service-accounts/521265359230-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-105/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-105/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-106/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-106/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-106/service-accounts/749724153407-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-106/service-accounts/749724153407-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-106/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-106/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-107/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-107/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-107/service-accounts/119968166209-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-107/service-accounts/119968166209-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-107/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-107/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-108/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-108/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-108/service-accounts/333406438630-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-108/service-accounts/333406438630-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-108/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-108/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-109/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-109/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-109/service-accounts/326288608062-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-109/service-accounts/326288608062-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-109/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-109/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-110/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-110/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-110/service-accounts/117315809279-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-110/service-accounts/117315809279-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-110/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-110/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-111/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-111/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-111/service-accounts/585851919485-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-111/service-accounts/585851919485-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-111/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-111/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-112/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-112/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-112/service-accounts/8471863207-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-112/service-accounts/8471863207-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-112/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-112/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-113/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-113/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-113/service-accounts/464129907606-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-113/service-accounts/464129907606-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-113/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-113/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-114/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-114/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-114/service-accounts/565211337367-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-114/service-accounts/565211337367-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-114/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-114/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-115/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-115/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-115/service-accounts/738548589916-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-115/service-accounts/738548589916-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-115/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-115/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-116/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-116/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-116/service-accounts/965701708155-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-116/service-accounts/965701708155-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-116/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-116/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-117/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-117/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-117/service-accounts/1086176833217-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-117/service-accounts/1086176833217-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-117/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-117/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-118/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-118/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-118/service-accounts/600851906224-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-118/service-accounts/600851906224-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-118/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-118/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-119/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-119/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-119/service-accounts/329234377247-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-119/service-accounts/329234377247-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-119/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-119/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-boskos-120/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-120/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-120/service-accounts/191832892243-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-120/service-accounts/191832892243-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-120/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-boskos-120/services/enabled.txt diff --git a/audit/projects/k8s-infra-e2e-boskos-041/description.json b/audit/projects/k8s-infra-e2e-boskos-041/description.json new file mode 100644 index 00000000000..2aa5616776d --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-041/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T00:30:31.852Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-041", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-041", + "projectNumber": "919278640051" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-041/iam.json b/audit/projects/k8s-infra-e2e-boskos-041/iam.json new file mode 100644 index 00000000000..d1179d2ad3d --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-041/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-919278640051@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:919278640051-compute@developer.gserviceaccount.com", + "serviceAccount:919278640051@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-041/service-accounts/919278640051-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-041/service-accounts/919278640051-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..e9cedbde3cf --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-041/service-accounts/919278640051-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "919278640051-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-041/serviceAccounts/919278640051-compute@developer.gserviceaccount.com", + "oauth2ClientId": "101050177795031141712", + "projectId": "k8s-infra-e2e-boskos-041", + "uniqueId": "101050177795031141712" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-041/service-accounts/919278640051-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-041/service-accounts/919278640051-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-041/service-accounts/919278640051-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-041/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-041/services/compute/project-info.json new file mode 100644 index 00000000000..7d36962ef51 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-041/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDYtHLzT9bBf4pq0EWvN/xATEMnTiA8rmEQW5Ijkn3pLzbU6/MH8Cg//VmHsyWlLuNce2cYXUzroEmGIGyz8UqSSInClc+546CGQxt+AmNOBJD62OzM8QNojjws7JrrYF1WefBIydo+EIaJ03sq6IOXF0Deu61zFLed89bWJJ4iUmys6zoJgdCxSHjIYfrU2dzzoE+V+oCH43JxWadGuHtssg8MojRDvW5s0S1bu/tt6lym0PwdnmVKzRkLZEhMBQ1Qfui4UtU+gYyyUvT/p+UtO2L6pOgYDoFkWPDdwbVlP9I3wbAJ6yO9r2widPdxSD/ns1hg/c5vlIv+NdSVfiWp root@38099960-da4c-11ea-8c1c-d23af84fd26f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDLDZi7IcRWQ4jLmAJjQcaAXlqrQtp+XwnujMI5y4ayGlQc0/n064mApiJUfl78seW9o0aXgTQeQyGZvd6uDBGrXF0yGhEV/7vtOpAy97mY+6KjcvNurO6LJXqxX6sLo/jBzQYZ0loVn8Zqpmpy94YEN1eEspH19EC49wvNkWIuqa1dBpIvarie2E+fl5GQpjlA2QsiZpVIYZaprZkI3IReegCITSvWYvi70baWShUN5Z3z6ZoB3t0UllP5WJXtsNRpgsZlMUPGm0W7uKnxPIYsxIiHQ5HVfgCBB92Zw3OvZrgR2EdcUPjWxHsl6SMrHCc+uauM92DIpIQk9lgSItLH root@7bdc9abc-dea4-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC3doODT2ZOVDZGiUno/DugndWKuFvjQfsxZuXUrzkNiW8tE1+27QePzK3WtJs02Fu1m04QmxfNCoZvborZq2Kkd/18Hfm10EayQaE0ncTlamQY67XPZ+i3gJtyQngrot1Yk8eh2j0R5YpSWlrGEq26DI5BYZka+qNY3Wqi5staTd1L0zD3Jj1BQZ0xRGjiKHPAyROvpm7Y+6BVsThak9HApbIRgKJLEil0BGIsxqexBLFoQQci87DGVz5XI6en3UCpOpqoLYkGLvxWW77fURafamtG4lsb73VVeuYfNF9ymVZwWPgUrxrbPSgcuSMlhLqGjvsSo8H3j8XJJX+OWTv1 root@bc589c24-e274-11ea-a87b-7e1d84ccc038\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2noSmvbdXL26ySmJZ+o7fnnrNmwZPtgjJScZNVb86Vzi8zozRKwJN8eKHmRWGN5VmfUqsvkeRSRbb9txEaBBSDCZ6cnm5Tp8i/1cg2j0YH61a4t8YL5MKBZX7He1hKk/tKZW04Xt2JgqD+CnLZOIbaosnyGpG6E5/SG6YVTCddAJ7GGTCBw2ZcaGXJ4hMSNhxzs2953MxHFMWaJqgchccnzV5R9xpzu/6rf8ynx9+A3rZ5g2rOFfhtwZhD6xJWH0vkkytpGKSAVsCeE3lJy2jbJov9D2FoBAqvzEkLN6HbAFE9oXSUAa3dr1HOND5pdJyI+51NcMTts+p9urdj5WD root@87c61b84-eb48-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCuuJRHOVMiGbRSikgMP7LM7qjcBqxSG9mcxaBcbeli14E8UHhM7AHNBh00IXjlOKf77e+fz4AS8beU+fljR8rnlc54veB2/0DiUH7ok9XZP/rgQP0H4ZXSI1HAggD5u5nlpzwDMkQRqne0KnUzqDbZFCCk6u44Iw7mAQyI9l1DIjfn+DWwVR1yZ5YMlW/R+z4Q5phtR58OIuJMMHADX/H+T3AkFUpc035Z8zR+mFsnqAHo4zZbKU6Lza5J0Z20kFZq6sykJQ/ZNGtR9PKlOrfMmaCjvOT49YO1VbI5lKxPctCGBTi5w5mm3HoxIVfluAN05GXxUsOuhyLPUvmCCLqZ root@6330f452-eb94-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC541cuzDOHXqxBjK/qsm/993U5IM88P8hd3epuO8RISX/BF01hb3S/kCdAXAPA/OQN7/MK7yaCcJfW73K0H70sOKjivgKsRt896Hn3IjuNv6vRXTOZW+MovnqvaBV/VcKyllF/+UTu9dh/jC6BfXiKgQmGbI/2okOSFVWhp33twBsBGftN1dMqwp+1IR42UvwofQsl04KkL7fCjVlUQ8/dJG22n9q6dJ/loB14K+YSrBGOgTopAZQK6o9lG+W6YA+Gg9T0E8hRgw26Q8/eYMz4B/lj0NfLLNnfC+dPRWvCwm3RKPVdQyqEsQrz/5Xr+nWqxIw4CWOkZYEzeJWYqLPR root@0b574182-2e57-11eb-8da1-5a2e729b6dfd\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDtlHnLFcaFJzVo6G8cly7sArvUDZ3MMjBiAT23R97jIYz0gKIDL+p3alDltlScY7WpLpMphCELTkh8zMgqDVfRl/eoaaFH5/TzWI00H07cLTJgLJH0lfruLGwDcI+KxgzFoKWgbvWvrsMCJIUzRv9IlPkBzWPTu/f8f404j6fZ15M15g/62fioZI9PToapVYMbPbaQNEIEsCdJHPLoebkcjGAIJZJV3R0UVmsmAKbi0DmepKWdl8WTKUKIRCWt5m8dVmkm7sgVKgOHMK/ev2ypdvj9mxGXSsAd/ne+KUcn3G0etfv4yTMdEruEBgLc+XoaG5K2ElqUswLm/EWVa/R5 root@80c3a6d9-31fe-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDC8qf4xFD3LhO7oRPKgdvPOp/QSGpZPKYnOBpvNd64XDbP29fQlGxwdmqcVOzhTN95bR7pbz97PqwHlSybmYnwrhQeAhDx/HuBbyBmlaD/91DVIIrbCP0IkZ7jeSdX6F8o4Yd13S+01SVRSqxgLIt+KjS3I32FA+uheb2/2oEE35F93a9fA/NBvMNuEn5v6aLTGSDiIULpfpRejVHRWRfOkyBvjvp4KpscAYsEwQTeTqeGMSCJ+RPVVFTHc0Btu06iwukr+AjP5HWhDpR50fMymi2xemxwEsmJs05lse/MsVkU/2p7RBkuq5CdfjsQwnYivyXl3A9RUWp0BjRF+0s/ root@0da94887-3980-11eb-8630-522871d052a8\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCYaQsCVox6hiwDNY180XnTjd5eATKo83vBQ+c9/F5IFcx93bk2f2zuuj5VI1DgpS9W64HoVcYE1gBR+N0aM/bBSKWCgfxzsbmIS9VrYZwBJd5B2+uFtD+HXkVUW6vS95iOPexadr+xYXJsZhin6hBVJ9hS5H3QyQJEyEhkHP1ML7bPUfY9PM04Z2dklWnVu8S/QJIGk2XbmmUEO2r0hbAr7ss8zB71w6JbEY104BdsVRjEAZ+T0+mqIYGw+ppRqWw6IaM8U6Wii4F8zKm3QloAHdyU8ET8GlRXTzeychqzJJkApmmVZ6dAYgEGn5YDuiKIJLQy/HRKiUSLP2CL2FHl root@48071c5d-4314-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDfv8sa9uUlLJTBycHej+F88PQuFjFh1x6JCudXQXgcbt6Sni9Qn0O85bw6Bsm63qMxCoylOieeUUEUB2pXL9ceH8u+mO9PItT0kkN8s9oo3pUIafqEAYNmuY2ipQfP3nwS5DVM10WfM5RLvxNcw3r2quXg85nIqM+JvhCXjZ+8TPA/POeXktP+HR1Yd1sDwk1WvQYSk9qbDjSYz+NSemlF9ySzGY0SvUxBilGUIyht36xtTdVLtb6L/UbsWnU+N4k9J0QWHNf2MhbLpDb9T81qgSyElIAj4qWIRCzaV+RUHtDdSvMwCaAlmpVrjDhdPrTRoyO1wGH5Wl27806f/O/R root@4590f2fa-45d8-11eb-acd8-6a2a49dd8a76" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T17:30:43.394-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "919278640051-compute@developer.gserviceaccount.com", + "id": "6385316130106300636", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-041", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-041", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-041/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-041/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-041/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-042/description.json b/audit/projects/k8s-infra-e2e-boskos-042/description.json new file mode 100644 index 00000000000..7fce8dc6300 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-042/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T00:32:26.184Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-042", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-042", + "projectNumber": "519781870473" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-042/iam.json b/audit/projects/k8s-infra-e2e-boskos-042/iam.json new file mode 100644 index 00000000000..e081f747dde --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-042/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-519781870473@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:519781870473-compute@developer.gserviceaccount.com", + "serviceAccount:519781870473@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-042/service-accounts/519781870473-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-042/service-accounts/519781870473-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..3ec5c9519db --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-042/service-accounts/519781870473-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "519781870473-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-042/serviceAccounts/519781870473-compute@developer.gserviceaccount.com", + "oauth2ClientId": "100541517541654851267", + "projectId": "k8s-infra-e2e-boskos-042", + "uniqueId": "100541517541654851267" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-042/service-accounts/519781870473-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-042/service-accounts/519781870473-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-042/service-accounts/519781870473-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-042/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-042/services/compute/project-info.json new file mode 100644 index 00000000000..bcda04d8009 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-042/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDB6V/2Lwgp9JOcpQH+Zwi54UtdtAeVnn0kMLA+S5PHg6+x3Zxb4Z79aXeInXZ3Dvo2aXaneXpSfBgXXEQnd4BZHUnVXRCgU30vUgggqoW3hj6xZMMB266E1LYUWRtrgBmv3sZ9H7rbd6ZzLiU5tN9XJi3ogIKYG1bjdrAzJE7+gEqjkY1lES8QVrpEMi5KHuVcM8Sme8zQIrT0Hk/gDUUdZItJJ3hiX/N2MkpU9HspOeixrNpWwuW0IqeatUdRBLPnyzGfnsOIbG7TJ8aNHqxem9LZ9iDWFDkRZDSdl9PYuOwUnmhGQZn+ytNK4LD7H5suAUdmHEKBDImqJcqPyyIN root@998706fd-e348-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCn7mE7NF28H9HbDd6yuHOOvkdk0Fka2w61rzuWCpo62P/Kh/6tQtu4knjNHXCVkT4G0Ftndm2SxNq9RQQfCPKzuGvsPPToEaPzfqCViCc2xZ8laR3AfgHM6CmYMAMRuORrWvB2LBcR3O/95OuwL1ivC4Xq5gpsHClqF8R/BR9aESVstG8CD5ZywzoRcgJxE5lszRThMG/oWpV5iWb4tdq/D78gS104thijmGsf1EpBEQJZnNwAu0hc38GCHnwQHti3ZqJZ+yA3l5ldBM6XOIGOCNV6kSun/jYp5n4HpyLsXZutUtLYtnvcDZ59wF0/6ep+WhhvvbI6NqSkJ9fCXZ+H root@bc03812c-e5c0-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEdzzxIz8T7OA84GDjHpm3GWm/4zQ5CJ8F1m7/wLchqz609tNZ2nArfQhs4vuicXxE2H24W8mdxgQJf7IbHv0+/5FLQndlFF6Uh/pHhI0zE8Q6NPedjjm0P5u5fOg+PYR3+6LqLge2icZY20TlW8XXia+lioxFEvseA9xPh6v8U5XVJC9oB6XTeBvx7NgPxbXsIpR1oHX8FzZEziCLRVpw3aNmwP1CvPubGmcsdhpa+TDmoBUT9hcti+HsVMMbIJ++Vx23717Lysn+pjIFmmUstW6LFVjC/fnCJv+2HjEoeQFuMOQtzy+nMt535EXBDbknHb/xLSyrjarfCYNYYLJt root@d0e74b06-ec12-11ea-aff6-5a14b0d7f3dc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDHKr7m4Yapl7/di+iUbrNPUBdSzdbg5FRb4Cm0jPfxPaWA8gv0rBakOkuE8h6TXNNDrrGaycoXCqrIiuiV7A7FUS/tPguUv+eABs8DCvM0PqJrKuW5nwko2LlLWNH/mTUDWmlbfH+8vf69vO+vEBvotl2MLtzJHERBcWo4akS40t/DwNyHbG+q3k/xVy6dx2CAreEf6Kc0IM42NR8g4DtXCQWOD0WpBHKA0txMcfhRBlF47erlnRhVP4ZNNsHCAY5cfd43TR06Q1aRI5NCY9mWknXToAimu8dW2mhahaswTRRmV4euG+WGif1jD4BCz5e+ftbai+zR7y2ejsV0heBT root@c3658d52-f477-11ea-8508-9a96569b20f1\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDbLefsWojVV4adHdbV2hsaXNJIUn5Wtnm6IMED/xSi4vVA9ehf0Q0H5i2ZRyyg1B6wyJ0cukbMDHEzyB7X2pVQ1aurYM3oNN2i/srzNBoli2v98wJsDa0nuADRx3RO4btABN7LC68f8BsTlkCNNh87lAfdw27DUVX5d6pV+0D5328tHsIq3TFryp+821CU/SxKK/CoVePDveBpmm77Smq+MLsyyu4aRQys9NQceaM2fZGJldjaBRxfN+j5B6YZwFJTkFGHlO0T1NAG92v0wYbhZ04T4S6bROK9ZPk7Azc+zhy4Ey05QO5ZIPZT/11vX71M4VIPoJR0UVDYKUNpnPI5 root@eae8934f-0a96-11eb-82af-de22b9665164\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSsPc/fSyGanxOveeNgTPYkzPlcKqjcRBh11AZiVyFXFsXaJ6kqMWEVX+lH11HHbotV+mLkgCBlm5uWAxC4V37y0cgpWzvidkxCdyVo6yU1f4xrZhG/waIF34u9/eUJyfLrn1d+uW6XwRKgIThfl9obatWDOD42Ay7KdbwbWTjJZ0g2KwpExHKnKrlJs/iW5rpbFa2pVrM4QdN3iGXpiiHQq4rkYivPGWs5CINOtAmz/4fB5cdo6Z1dMpwdSOYsJeHjua3nRTtQQvHHNs4uBWIlhswtLPhLWp4Wm58b1wgqiJLdiEZ9BtrK74eY1pxb2vt9Zn+NexaJ+mt9lYfdboB root@ecd6ae29-1199-11eb-9a43-0aa5164aad51\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDfLm6ytNl0eV5zVyKjjMOccwUL+/XaC9R9BHCUdH7U+AvUztSbhPg/V7KLkbEjU8pgDs9S0bHQwRZeDf4ycePYU7wQ67rHNN1Dm0UnX1cXZB3Fywdyb6cfM56QJBpiwFAVZwN4UTu86GPodx+CYMNPEljDcNnCziMNcgPJUKxT0HlJz8Ey8yG5uRaS1Hj6YD86uchRJHIIt8xA2EH1VaXRy85lr3Gn2MJqQa91TSGvuzVQtb+7gqZvb1Crj+/hyBQ+oy+tQfV/vQ8pX4q4JQBhU7ynuvYrInj0GIPCNws1THLNAMqvOjsNzK4q3RyLruqXWnAVipNwmohoB/JZKIVR root@1ea87aa8-3c5d-11eb-a772-a610f2f25584\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDXndh3+rYBZGaneDm94AdPf4/LZQaksu3/cB2m0JG6P1A7bql4jm7xoe5yKz17ineDoA3/IFLO9ys2jE6qOUbln/Mp+3Bzdk3ro7Ob37AedICfJi97eLpDiFkPc8Ib6umu+6dDV4igbKS0dGTjf3zmet3vg5BIl8kpMV9g4suY5V5ebz+vgLLHX9gPfhi95G/VTVKVIeUzO62UVzp9cW0K5/XwDcX2tmAk+Bc9Bc66zLX9wgWAkAKmNoAxXaSJvzY0f6aRSUMb31g/y6/Y7iEnMsOsnRyRr4lGvUtdNhWU3vlmqxcha7gcOQBtX9xICCrc4l/APVzorHriNdAPaqUv root@b394fc4a-4656-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCpj/eskvGKVLU1RRC3E1/J39vQyuzvUmeXXTJFOl3FrspQDorK4dWqqtGA1rxFVd59JrmA0j7PXMMsLGQ1bidd0n5YTQFgdNep3Cxy69kxvWaXWm0dHmMpZiWVJqIVPsVd5S5v3tnc/jXiJafPCBuk7H7OW40J2qooNkfEqrvAmNaxl9ucjBEA3sslE6aA6hDUtior13ukV7JushCJ0rjclmtX5QsoWLznPMuF/eahZNmBn9xBNPMj/5VQawQViSJDH1gkge8O/vYJHHFgksgZyRRwkUEqf7uBIg2oKu/3C890kbDNyTJ2TzoUL5FdUCASfMxZEPlh44L9Bc2Jh7nb root@395c4902-4cc2-11eb-af93-4e5abfa0c065" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T17:32:37.564-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "519781870473-compute@developer.gserviceaccount.com", + "id": "1489924857235691594", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-042", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-042", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-042/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-042/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-042/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-043/description.json b/audit/projects/k8s-infra-e2e-boskos-043/description.json new file mode 100644 index 00000000000..9d1bea12432 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-043/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T00:34:20.288Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-043", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-043", + "projectNumber": "93697223430" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-043/iam.json b/audit/projects/k8s-infra-e2e-boskos-043/iam.json new file mode 100644 index 00000000000..ce767ba7a2c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-043/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-93697223430@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:93697223430-compute@developer.gserviceaccount.com", + "serviceAccount:93697223430@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-043/service-accounts/93697223430-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-043/service-accounts/93697223430-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..00e991d3e93 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-043/service-accounts/93697223430-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "93697223430-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-043/serviceAccounts/93697223430-compute@developer.gserviceaccount.com", + "oauth2ClientId": "107407952950250005467", + "projectId": "k8s-infra-e2e-boskos-043", + "uniqueId": "107407952950250005467" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-043/service-accounts/93697223430-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-043/service-accounts/93697223430-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-043/service-accounts/93697223430-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-043/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-043/services/compute/project-info.json new file mode 100644 index 00000000000..c5a38785c4c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-043/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJFSb//xuoVzrH+gP7/QTGQsCNIyFbMt1hhgEUfNJT2rqjMy0WJ9i3HWxQLks6NxC3h3vaU5dmryf/1MsBW5ZeXRVyxXFTYW+sX1lATy/C8T/ZmNszIxtBOJl+dBu9TqlYl9c/Sj9IAG6gA9uAMBGo4KAdX0PMV0Exk4Swy3S1NlBFrmEUAyLVXEVhx6UruUsqwyzcx2paF7vMONgEnzuWQ/550a9zO7otWatys+krv5vRbQ62pMC36g1Hca+qVDi2IiPVwxnTJo7nlP92CsiHgKY7azwx8prk1riuhISyNgU50cU0bM0zZ1dp5eOiCG85ehAZw0e7V2coH9uZVoLZ root@3c7b05be-dd75-11ea-9424-2680bd79560c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC1dTvZko0mXdfNa/rXB73zdI5D9MGQOrhoKYdO63YP0qT3Xraqq8eH062XGjw3c6J577stjyW8Fw9gWk8Dca5JFG1GFZlcTPSCZxmz8cj7TUgJXdviwMaGa/+GA7b644MCEKgHdJkN0qlhdlQqHU76RZarjN0gA9nVRff0tjiUWGdgixV3749pa3BJd9Hxxi1a518gwVN5AMHzKW1zixNzLw2bNhNeQc3xnQLf9Y+EBwP6IOnZGRhEtPod2OEZJGxeUeDQ/eLY7H/VOwdk+4zo3gKHqDOSrQBrfHnv4r7qtbI3ZGXxta5H3LFXX95HwfbfeWZH2oHm7OAtQMffbyLl root@4f91075f-e491-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDUV0Y11A73hPAEUWLtvYtZqPLDJSxmA43VPOfYyg/wcgZFiexbXCpeQh5xEbmmMLseuMoDxW8zvlDGpCVV4odgpNxAmhiu3f0aMJfyiyl1N9/FkDPDHpBuvYV0AWctZ5R6SMykyrFc+XNeBm6OjrwEfFZhtISksX6fAwnofqXGdvV47ZUUhKtYOTv/C00b7J3gQfYfKks7R9EWw18p9o+GBlVnABCf7OQgkQ2mlInrbFWXUN60eLpDnnT1lgtthBG61c/68fJvNRDmv/y9UQp1Tq+Xb+rJD9iz0Vtrj64kaJXR9XQDeRR1dZVTHXtgGd9dHTmHdCQep3gb7kiX6nRL root@f7cb8da9-e92b-11ea-aa1a-c6580c04344b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2HnEwgUD/K20YZhLRKEt3ggT5YvFQrwGIq3aDb1POVYjlPsriUp6XOjET0ElO9GNl4nxIytbWHUPmC+KxAxISQPtbNz6TYd6Zg/OX0vIhyGypjTKd4jVsy6AqX78uUny5Ox0MasOHySPhD+kgRN0XBbsMO+SRgy9lAoAfqNJkxir6ALArLmC1AVPmy9nB2QukvbbqolFD7ltYTD1DzOMbrobwNIysLx7XwULhe2FxMqwfNBb3fHPW5MAlBZUQLSlOvIAZ2Th9qtaPJPrNBK6eXT7VBmbSaHF2WYVd0mDBo20yPWyi8i57616H+RSYsW8VnI24GtbI0oCD6zlQIw6j root@3c8637e3-ed1f-11ea-aebe-3e85ddc86bf2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDS/GpKBLWGSruuJx1Ahm7eK0E7caotd+cBJWNdqxgkylJiZOVh078FUxunT5ekkpyamfo8prlnTFE1rPHZp1VMSLhXt6vUm51+IbSG8MmczTS314tkDOaf5GSeQDh/E7/S+ddqUwfkDVVxucafw/T0nplJgYTrC7IqlkowIkPicAXBB2MWKZz/JC7TD+mWcXAVbIcN2FfOS7gzUeJAvISRtQbW5zFi6tvkGPrXPFh1bwh+RxbHTdsZMVdU7ZaB5mkRnHGSL7fLpWRJfxMUDK11tVTMSajYhJQck4Tp9pKg5VRM8JLUSVbA693w9TvXMwIKIkenB+niP2fpo3m/k6pb root@c2379973-f2b0-11ea-bd49-066a8cf01e04\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDenVyDRjgFTR1iQaNS2v4OecmX+12cVuTKhpPf6Eaj0CVmbW2OjCs1JkD96XuMlrnjlymo0Pv5RqmGjlJx4X/ShdiRueH4DM3eBFBrmU7x6wzV8yAPlt9EuU99W/06P4/CJyoweGgiqtHQ4NMBfOYS8xYb6mvVumPUcByy39NajeNzkNklct67LFRATB1PC4bMYrzBPSOQZLRGgyOp/BxAnk97PTcn8fnfQQiXDIXIEsioAP5/wJSqN3l2VtYLPYTMTcXpVfhSRE64pqK0TB0BDrzucWHvMs0e/9OSrDdi+p5kC1jofhJPYxEriX9hVrVKc/aYgBsTtlQ11yZ5x+D1 root@26bc8c22-ff22-11ea-be1c-eaa6cb7654bc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIIqouOXeAMrgS4vsIj6ZECHUv+CFhbkJpnbWN7jyV5AVVE0ABPqgfmRIsVPxAC8B2LpvVPvmOqH0K/Sx3o3z86cUwPRz5rLrT0+9bARFOfb331yLrHAcZ4u69xfDArDGM39fFKcliOf42qsWZ2oNtaGQVGDcTPuxGxcCBteGCkVJsEe0QZ8Yygx7EmWyOobvJ+/RIIhz9dJanC9RbfQEyRpwBXWCthmZ586kmYSfjtqL1vM5P99KxNEtZSFzqbm54VZfe7cObYgJhEwcsPo9aJxya6y7hunRbsLbtZCwdjtbR8Baot8SeTFjizehdawTJPk1W2OUV26mrsC8xq+Rz root@e497e89f-0e70-11eb-b727-faf44c880cc9\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDYb8BYHFo7NBI/pazhBOrHcZ6FZlh4zPn2/i4JIgBNsFU3tNXm6i6x6VbTuWn7bCJvboxk3znclSO5f7dI4uPaHAVxnl9VLdJuW23Fo0fFWVe7KkMtMVXJA2nzZAgYQ404TFRch9Qb9Drv077UJhwXBWAMsLzoBl9PIq4lzx8E/R4XCd+cbvFiF88tvAMhLIw38rmmm2pdTcOAI+Nv+CX/Rg1GjflWe3OIEOy+mM9Z2iO2OWaYjPGVERCwDHeuYiKauED2vu5M3yI4mKeCycPazbDiS42bQl1CtaaXV8DgJohWBnK8GHjkJMX4zOH31tF25rpZ4oLX+nqHrZFzUom1 root@07646fb4-1cdc-11eb-99f1-c6d701d1e283\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCswB8wsPQjkmteZ+DXefMTCx83TmjFQNFeerXKdHy3JuCPi5s1ksFQS0XLBoYTaOiIxxlZW3ZdVb/ClxZy/ord8dgEZmlZrX/jqeAE1SadVm0IBKOQCTFpaVcrh+21TEJpmhMC0929M6/bfjWD7MwauwxAscHGOoGxpONdktKE2SqQPxpl3KFthHHiRROIIeFOSgLPgkw9GOs3gJDDgW4G3yGAAoINLQ+NW/wLFIwmDMbdP7CgTQ78L1u+YvjHnBMirWUXnOaucEu+IUJBK6kxZJgq8r9HDj+pf2AxQqCw98Qc11mkZuUwn3K/dGkbwNQ5ElF7ByOa8331I+AvFBDN root@99c92df7-1d0e-11eb-99f1-c6d701d1e283\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDfdSW72qnfIaTqOpmEh0xkueUHQCbTeQPTaqdO3tBfOQnQsjs2Gq/xhwFpiMtaAkNB00EzQGpOJ50/490KSVcLC66NDCDkOvX0mj6S9lT+x0pibyVOjQsW0p1m+dEg3wlSRAX/GCuTioM2+E1zdyqAfl9bP/9vTF/ql2mV8xTJMfXPP4+pBSV0xabiMwl0hdVUplUOm4Q2XWDpGPDbe/PdbAB1UJIGHOOoDHRue7RlnvfXCm9S+LxKs6xl0RprAcDKIk5XyLhHgw775DrwO+9KKuIDM8jbqtU8z8Pftwr33COHhjqbZvfOkNhn1yl2+Z7RmluXgGaZPlbcTo3OEKPZ root@be98fd3f-2314-11eb-bccb-526de22ef413\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/nEhc1IL+WfzT0P6pZfiPr/A8k8kgXxmHBf+33uOa/+f3DeY8cBr0QKiyxNQQBByfeCObNjvYNEVyX9SSXf4OmcnXCo3q5oYABzfUu0Pj2EIvvDYEkSjEB3QGHHaxHjtmMXRWRm7voSdMUcnA3z4RtujJzgbo/QNUk8yeGFI2XEwe3LbGn6O76+tb2p3bTMEaZSS09Nfw9wII4OhfeEqZbo8EW5ikjNwEG+CtE2OfT49qYwxeCp3wSgw8kO6jsR79Q8blMrbDh0py4BXpTI5O4tRu2KN2cA0zRc4uoj2ZfLdjIe3CqqCaOo5TwsX7mzxe0hu+az6Q3y925zbQa0fX root@50b019c9-2347-11eb-bccb-526de22ef413\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDU/adi5NCW58t64R4dWqy+wk9zvb1EOUJvHMIadxLZZQjvN6h9q6yBr/YYszi74Tchaf94mm2kH7djh03SxL0DvPJCoRVwaqpk2rspElEISiOmRHJZm8fDh2rNObXVrP3adnf0zAOEPwVaDzDRl1ojJ6J1D4Sou6fzxFz6OftZbZ0LGPqb7acq3ReNR0SaqT3rdQyugXGmRWX5C245sEEV0P2eO0Ck6gcxSQnEjOebRCdZj/TOXXMHCm+3WiSTohsTe/u9pjf1DGDK1mvuTc/N63Ag+u55+TmLykYXlHTT65lkxRvesIOMFoUoOHd3+xzij2kTub2QOdADPUQg9k/3 root@408a8543-2b47-11eb-98a6-ba1d66ad0079\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDkxCvJR4qM2rJnmQZuF7VHF2rweG8RM/OH0xKCo+AM1eM70h2Q34WSvoMBec+7QQwhWquYRkO2UTha3kss0LrjUnewryGQthjmLYzwbCpCjJemD7wR2kSahRqAtbLixT1TTUYIKxLzFJVDEHMK2QHHNJPTMDS+aEskhzDcryTrFS/FD81Asv9la5Ux3Avt0vIZfIvNepKXmHzGySU3OsW05ofK4ICu1KLTxZHY56NBY8WXTM42UIu/kZpKJdPhCAy1Bf05v/KLbtqXxfdbd591+7pUrzoZ5DmLigy9BmCbedBOQHGLhxYjgk2Ren2uCisJbylnT/n4xVMqw+0cXb9v root@bc480d2f-34db-11eb-9896-aabf0c108015\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC1O+Bw5YNBa7Ni3eYUT7A9qtdADuqSrY4DDy7hgrFL5bmlkwBpmARrZwtR0qXOgQhC3ca9rIR6siEV9oThGz2qWZ83mcJ2oYlDctE0g/2d2vt43k2KNLZLF8BxptOV6WQd5soqhjDmtdgVwshpzOFxY4VVeYhaCQ9rnkH72z6Aq1PQDXXWY/djhVHKY6C2RWHwv7H70U2d3HlgtFIyB6/ZHgedrk1NO+naJnMQqRx3swv9fzeWqIaWvjmHzmsz0ifGZ6fawFZ3d/iO9gZb+HyeaDI64rdn20uA2G7YMjTXZw17Nx+axXjBFMfw7EPJ18hyulcjA5bIvXIiRe85w9T9 root@905bd0c3-432d-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2bjvRWfKXBsWN1hlPz4UWfZ3mXtmaRDKDyCIbT1HfKGgiSGVYELipzCH+pD9hq1h5trxDB58U6/TqsKrWIMfaKtmQvKqCq3JPZcVp6QwDAegPST7b1wESV1f9a1H4ijryvOiEYI97Q7/TPTtACWY1baPr1ZC3pFQAJ9t6M5GsC1HCA/qWL299pNsoFh+skjQ0pO+/DGhE8PBZ8xyQNmSOeASI23QxVLIuHzG7nabABv+r1tp3MSoa+rk3EDgb3ecpYS5aF1iqv8g3ZluelTvT32m+B4q7MUhr7M06dBOAx5OQTDgnkzphyVjhGxDKXQmGRW5POZ5PtAY4RhWHjPBJ root@cadaf7dc-4e56-11eb-af93-4e5abfa0c065" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T17:34:30.749-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "93697223430-compute@developer.gserviceaccount.com", + "id": "6642568625138883065", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-043", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-043", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-043/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-043/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-043/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-044/description.json b/audit/projects/k8s-infra-e2e-boskos-044/description.json new file mode 100644 index 00000000000..fda8e4cd197 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-044/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T00:36:20.023Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-044", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-044", + "projectNumber": "341096655577" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-044/iam.json b/audit/projects/k8s-infra-e2e-boskos-044/iam.json new file mode 100644 index 00000000000..e32002121b5 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-044/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-341096655577@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:341096655577-compute@developer.gserviceaccount.com", + "serviceAccount:341096655577@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-044/service-accounts/341096655577-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-044/service-accounts/341096655577-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..0de831684b2 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-044/service-accounts/341096655577-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "341096655577-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-044/serviceAccounts/341096655577-compute@developer.gserviceaccount.com", + "oauth2ClientId": "101601720959257248529", + "projectId": "k8s-infra-e2e-boskos-044", + "uniqueId": "101601720959257248529" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-044/service-accounts/341096655577-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-044/service-accounts/341096655577-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-044/service-accounts/341096655577-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-044/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-044/services/compute/project-info.json new file mode 100644 index 00000000000..38555f852d8 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-044/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCcJQse971NnqzWKAYgpaaZ43BL5ncRWS1dcBVd/rrUazQKUe6iZ4zo0O/3t+of82NnBC89bO48dIBu/BtDDiVl/Evq2aJRjZyzvSICbVj25s52WR/WhdNAYtXYKudib1Ac51bloercL3UOyUpgenMkqvv2kainoqhPasOlMX4ibdvg+EulRiGCjHp9ng3gXFdoZ6+Zn7e0GVhrFnJUr+CTiDqjfo/YYrAoTkFYAXrGzGExxeYzc+mSUINQ7cex8ad7iiK0VY8lWP2sE1RNqXVtQ2IJPGS6T+d0eQSNS2d6NtxgjeLGD43LAys6YPJJCfJSWRqmRreUQhQG6qCOqmKD root@82ed5276-d903-11ea-8c1c-d23af84fd26f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDHl3mlz8t/jSs/LVlyfREtN351nVkG851dfTetGnuWuEmzlkRX4ldnPPgdlhlmsEzxdphhA0rF0DeGeUQAQj7SQQs4wbwLYCLfRA//Qq+5cYmJJcXBSabtGV7/Pnvf5pa3OyiB+KYxb538vf6OmgLagKfaJwWWxiVeCZzEM9qo85igV/8z6HwasMZUbgex11nD6HDGk1YFMSsHnSBlDWfZ0pFJrrfoaKsM5ioDBVbHaN0ZhDIGP/tiJG2CGS/lJl+30A2QVmBVm9dpbasydHSDZxwr8+b+ISBH2ZkbINxnC5Br4Qoq7WdnqpoGPytl7lCHwovVkBb2rCmIk7P3FaL3 root@150005a9-d936-11ea-8c1c-d23af84fd26f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDWV6fbzhTkTnSNK9p3ZIJLGb5mxNnU0MD8M8TC0/Q7eLXNOWPkDwvV5SNQAnl2QET48zu5Dqvs5I2NuPE7zVAYQOy5P2fslHgvF/6phV6TpMpJr9litOi/Gh/cR8om9jZMPJBCz7RxwBxXigusNMJonHnF4uil2fRUE6TX5SEw/uYMfR/Z53kEutstYYCWE3IYask01LmV1nQTxlfkWppc1qe8kdNdSwU3O58ZnFZ1rAaVN0wmwo66IASX3ig3Z591/m6vzs4G8u/Xbzwow4BumXMWm3MpZR0adX3mZ1gWoNqFSYL4BGI3sSs4aoLnWdkyXj/b1A1MKHQFx1ntLdzR root@e5e36394-e9dc-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDI/fYkfgHxKCHrKxyUTJRhMqFcm5/cd1rPbgxHgCqNh9IUPM+kSyssDM7trgmKLIO5qOiyiqL67hRbdq8+xU+sH+gsRPUAw0M3Th6Gz20lXXfiRYeATyFwO37rt0l/X7s5YF//Nkyx/8rqcxyAGFxQo5pEPKLBCAhOkxypGg4JFxTir89nQqDho1kiatV8l0CzEnubDypzGbUv/mjnkzUS8ksAkz3ejTuTTWwRbhm5RWVAOrVDQWv9pUOwQG8Vl/d3+28nzzRCw4swsXfUhcd7weu7k9DhCHB4LZIW+kxeIHKyN5XidofLQ2/7KsRo6o/RPrhqxcITI+NsZuY4NXoJ root@245cbd34-efe3-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDLZq3LpQsPiwZ8+h25y5yBKP2lqv+g2RklPu56+Q0of7SJHrypjNhyuzNQFq8+e+Mk5/7KV3TepJVRiCxOSl3LgEVzQ+TRECBoVqTAMyPn3h+0MQW1Z4JP5V5mg7Y2qpMQ2zNTZDK3P6ba6UwPvra5ZB5EQUXMkOa6bUHaOjGwaTOAOUQta3NT8TPNwcN/beWwYefZ8yd3EVp+p9oByR7Q7pcpk74ASkEASvk2l7dkld58SWUxkOEzMwbZ8k+yQfsojp58xSuQrvxE+ir8cV+ByYnySOOiRTO3RhNZQhIsXZnLVx/iOr5VIQQw+845ikXmmTGWhu+ZeMj75HKhVfNZ root@b6b23d3a-f38a-11ea-84bd-b6fb6d83c68d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0qYueGgQOfmG6EB4DzT1thNH2V16YwKmELgIrI24R1hqmKkKkm6G0lG5R82sroTz0hprDaAxtp5Q1jgQg+8xOs1ZNrdSKNkuJNTD8UinsNzQ6NNb7uJGbFO+Pk9cf5Jv4hTPcXLgRDppDYyYUGrcwSmuZGt9FG7kwyx7+yq/rNOSi18XJogRQVikM49ad9er4jhMg2vRrOcSJHTHl3A1VTHsK7yayK/sVFPK2BqekZbb9frp+syaohfkEosFL8eytU4pR0iSQ9Y+QUoyQ61VFQRUczRZgReHov1jhMCleBE/QnTHZuRM4k8CZ2vN8O3zs41G2QR3xWA+ro2XjLMYn root@668d4a9b-0cdc-11eb-acdd-663f8ab42c5e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC5Srj5adL9ZZdnEhsEDq8stUDqj+AfVWchkwAGFhKYO9s8hGiyCP0RufTMsoccnxTUONBGGByp3z3SG7ji2cK/WQqLoSDgnz9B+4HTlXRj/ADDyOyHcHnZZfKJSG4Tgh18n925vT9j+TNPhpgJkw6Nryao2lpUSOZJm9QcAGFPRKOsor8cO2JvWAhLdn5MS9/tH8WSVXh7zSsLvFLRt7xEKwp1eVUMDv/UeBo0LZLTE0EXfbvxp1XoCYY+LQejlRe1tBe3VYmDe71wkcWKeqw0B90d5d2DfFfv4lgWD6/Hjg3IyTsdQi8gyRBeqp4dGZi5BSzxwdXH5zK9Mxs41s2t root@67d40f2c-0d8d-11eb-acdd-663f8ab42c5e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCLFC4hPJ7YzCB53a9ouzpYfn1suzvFtlq30wE2oDxOx1oT0MxOFCSteW5G9KNtZilp5hA27wNzj/oQGtQs5o0CYl8GsBlCAZurJrlmHtou80yF3HNKj49oGJr5lIsCgrphCr8BTQMLS+ianWjcDQ+NKqgh7E45RELmLbLAPL/lO8888r+mbDiMfzs+BClcVwg81wETc3zfsnZ1NtT9oVli+stqAkn0lYL/HKkY1thj3LMlURXM3SFFkL87GTUFDd+U7JgX1ZWjzsOmusZgdvuOXgXMzivx7s0KVKY5IM//WmzGVd4zOw2DvN0h3BtiEZpzYMqvWNJU9wWvHFeSuKL root@8b820e59-0df2-11eb-9c65-0a69ced3f66e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC4xsc80V3t3zD/avCaf/7vMkiwpgy2Ml45rhd6UpibPXmRIQnC6SL7IcqBmLexa7lVYI3L+8Ydg/A8nabuEFLGN3TuKJPJItPr4vLpYKbpbQxDnKG8el+GxJxS6DEPsU9lY+bQbj9e4z7RTf1PVTTN2g+G4rYSdSrSE1jaugfVtWhWHN4njb3g0YVliaSc/hxCi2ZbqNrMMBvSNgqNBnJCkEy1yKPgCpMOaMbqPc0VSXVBn6dxPIzWIj2PjqG2VkLOES/B1IIJsqNRWogspFyw0jHtes2UKN11tvHmD79V2hWeZRmWjzqMPw7MB/c9M5WeiTPu0Clbn1Oxp4jn07Bt root@bc1868a1-1721-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2Hec6IDQJhk8vJ7tyc0QQFIPli3KkQyoSsfkQth2R9YKnr3cs03hlStYq+X3Pi9Pdn0VnTAoI3N1nPBP5APft6FKsZLxGO7W4rXreQ3HhOEZ0Ya+mkpU4MbhP0bt0g075YUT82AlM+0ZgJLigMEBf6NpFMoGLbaBk1YQlFaPJSLLM5uhO21M7Gjix6zQceWY1Ok3xDkrR98mZGh2vkArk/QCXq22WHfRB9kpDW1Vy9Q7iKFUC/ToR+AUbhiwaYDIRLA9gTQLblbM2prhvG5aXjgJiicaUFYE8GEjTyN9Z3NMDTpkcbCKP/eII3Auw/wlEolkPDnV6eDjt/XmV5s0/ root@6a85cc8f-28e8-11eb-a35d-7a1d48297fba\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCrqk4bM+sn79eqQ7BGJhxuJJJ6SKNlIxrIEpOqrYxmpCNOWy1R+DDA3NlCGKrnsqdbWAK6S7IJLVlYXqUzUWI+7aPSKuWwO/SGI4k3dAjuDxesgFspCLWs59qnfUrZfUsYYcwWWhpFoiJKxHc4hWKwxT9V/+ZR1goW7TbWDxYnG0t9PzAj9VNUvM5kn4mvf1pgI2LxCFKYcBqepn5/WYDXZyyUjd+20c7Z95zkDv/1TTZDlgR4o2phr3C9qXTvnHzY7HwXYbeXYlp2rBWaNCZlBwzzkpO0wCr/cgRnwjHb9iPjyeJcck+0kK3XZSW6X77OWLyWC9AQwdmjMRSgb2P3 root@9dde6e36-2dd8-11eb-8da1-5a2e729b6dfd\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDFYnhjzDZGU+4QAgyd1dMV9NUlgLD6A7mvD6VTSkjxfG8lZ5fahQVHbO5sc/VxdvTtKB/Ld/wLT/4Ze2ctUqstVFX9zJAZt+HvryBJlW/K40NF0stsUiOmp+yX666abMZfxoYHgWNNsf4N37Mq3iWaE4aVceGutY2k04FcAc045T8QuxQJQG0xIKokeetdHZ2HyepvRVKF3NFv3wgf49K+AFV6BKpGAyKjEyL6Zj0UXipWaIz4IofcO1VOL0vSYOZwAyS25zXvmMUYloSjJ9YlojT2y9LtXHv+FADS8fypNRThNsOZ2uWUk/mJneb9SFVVd7cFfsHku5e/hfluMAA7 root@cb2f25eb-3004-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCzbzCBzi9dlfmonYNiBJ3aU2nS67o5wqPFSBzK+wN6bfz5xUuWNMmdBqlcow88QqAPeWsmBjuoL6tY3bjF67tqx6NnrUvPUi4Lm/nVOODy4uCSDYLuVYwIo9Jehy6m/do3grFHMU62vpTS3INTlazjiui+ny5N0U4UdBKFgH8QVMUUbU2zx4ku38caEKs46RoXBUJqVEXkPhhQ7+oYGh1zA6fWDEBYx1F8T6DqCYA8SS2qlXxme9Hxaa2Xj/zTRy10jZ6bfOZiGLUWPDWCxplquMYTUOl6EwXLXhKUBoMTe5SwXKUq4MzDMrFxd/ibvhQIw0o3SjeBc2zYXrmlgXh3 root@384dade1-3083-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC6TMhe3HNVLrq/8bOk9q3vMdyiTjuMO6CoJquW+VOyFmM9bS5ZBs9UcGGW/DlahHKlmrkq6radhqRgpdTUHAt5TeXqUidVeR89AbAwCYlz4WZnur0yYIqdO+CsqfI2nQ7zA+17z5Og3komLoggA19L68jCPOtONWRUqhvOMet4Kav3grLDIRUzuzxh9sRduxQ2jZdeAVrT62bS8x44M94gpL1erCr4ELbajz/NFmkdHJKaGwbLPzPK0JWBi5TlSbE0TA2UD45Z6w2N/+irn13EIU8vDpjpse8dhFXI/DpzNs8PMdzVN0O5rKoXbvimVBfMBIlj94tNpi4rmj4X3Jvj root@fc245dfd-5082-11eb-bf1b-5279f1a59a83" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T17:36:30.694-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "341096655577-compute@developer.gserviceaccount.com", + "id": "1852933079321991521", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-044", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-044", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-044/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-044/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-044/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-045/description.json b/audit/projects/k8s-infra-e2e-boskos-045/description.json new file mode 100644 index 00000000000..9539eb8f269 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-045/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T00:38:20.892Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-045", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-045", + "projectNumber": "1057081706538" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-045/iam.json b/audit/projects/k8s-infra-e2e-boskos-045/iam.json new file mode 100644 index 00000000000..12cd2cfa7f8 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-045/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-1057081706538@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:1057081706538-compute@developer.gserviceaccount.com", + "serviceAccount:1057081706538@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-045/service-accounts/1057081706538-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-045/service-accounts/1057081706538-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..58547949c93 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-045/service-accounts/1057081706538-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "1057081706538-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-045/serviceAccounts/1057081706538-compute@developer.gserviceaccount.com", + "oauth2ClientId": "101229148968930614658", + "projectId": "k8s-infra-e2e-boskos-045", + "uniqueId": "101229148968930614658" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-045/service-accounts/1057081706538-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-045/service-accounts/1057081706538-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-045/service-accounts/1057081706538-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-045/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-045/services/compute/project-info.json new file mode 100644 index 00000000000..47f309fd2d0 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-045/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC8qcZt1gYDV4wbO0uwMJNKCLhtGg2/abu5EazC+ol6ZmDLr3Xqp9r62pEsfEWxB4JnmqympwSiImSNgcLSkdBWT0OMnNhkd58mZarET4M87ni5od7TOVpO8EfkLDQK0kiXCt37CMktmnSS0TKDg99WNPDk3XCOy9zEjNlvp4MOtZVcV4oE21D8lQrJSb0OzY3uMe45Q9cYQIM0XyEs/1xs5zwnmnxfdQq+Fe5JffcMGY6LJn0B9u50eAw2V0jau9JJgKHmMZOM8Wvyyit0fdnxpbvIoz5PwuQey8lh6noB6Z4BmHmaoHCnJFQ2tqRPMeNMen6A79YOY1eJYweKptyj root@9772a558-dc2c-11ea-82cf-066baa17f17a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDjI27xi5GxucIcKGlcPQvGGnj1AudeQzuoqh0ImclZnLweqOLVi4c3poe4w/ACrZFymljCEwljigI1lfF8k1JjwLy6acJzWVNF6QY0RNG8fPYKiq9Agc4uTsQ+OImxrR4GnCn0SmEuCBTMDJ/dcnGDtCxvRr8IqfS8P9Q2Jf5rqe8qry9XVYwF2KEBFBxJktcjSWQW3YmdT4Qwie9W0Lbti8qaCQgMyH/i8++JcO/6YhfivoNQhVFjBb/9JcETjSSxATWb9LkIcw9b+s/8/+z6iPKIw/BIJEGNzfSw35dURwB8v4vAjd57T3t7BwcCwuruYxfwvGw7ihQarc1gySHX root@e67a9322-e112-11ea-8c67-968ff53f47c5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDOuyK/QkmmVKpm6rAg2oJO9buGRwSH/n7KRMCyuN7UYGVp/6l8kUuLXqIO+imfj3hGSRR3bL4BhlDL3iWdtIopVrIjG+u3NdOFROwz8mzYVsR+2LSopCoBIhEZDFgVZPWyi7TF98HE6dDkuYf7stoc5cs8szh0dze4Xw9RBMdIAXfhdc3p9978KgNB5Yc4VH7dagAv0d8mTkRtn8MNtt76oqSD5pRaUQJEz3ZLGs9b6K0QN7c3VKpgK0q7VCjd/Zpp/hxDABoT9lguUgcBY82NJIAWdFN/HLzHdHIlinJLPFUmQkjQ91C2MYUc1pcc2DSIWMHwwIYyFfttJ5LmFQb/ root@af62b75d-e20f-11ea-9eb6-86c455181e58\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDjCm2JYcrUn5GFE3Z96Thg81+jIZbmhToS3WIZg4mIvP5WBol8u2YklIFZlZgxFvbWCmzzhXk9ucOVN4i9V+5+GIxo41NkCfCbFE0oEEM+YyadtYQY6Yd8OJA9Fb15AR6yP5xgdZnM3cAeG3k1bv4hOiUaTkpsTNiylF/xa0xP5lPsjW60RRPOsLhyBcHsAT8tgPtAamp8Lr0Afbkz8G7vC2zQC20QX+MbQ2ZyiXp11TWikBNnL2HOGstWo9lYY9OpGsq+l8m5r45ujT6tOVbI4f7kXuF2HGTrKGvAV4vRXL1wARKcyX+F0/H7K0bkuhDjIJ616AJfeZG3FvJTO7ut root@f4a3e4ee-e73b-11ea-8112-a64f894a1815\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDgsrDoCFezISDzI9SbYVNLt6UkDd6oX1UpZKUcsgJ3Ya550yUN8cg5fkvgDThQHgPyYmG+1l+wg6cvQCM6ddcUhQcUsiBnpsxEQ8qF1HcjgxpE5QBMjt+/lF6GWhWsedfPFPJ42LJ3sp4b9NEOWRFmSbrlx1xQXhkNK1EFnC3Fxygs/49eBKwErKGb64JqJ9+BqQZsY+rwpEc9PnxXVv7vPEWAqqTeA0wLxh6XqgspHHN5R0ndKYRRyfN8XDdw6OEU+PMhmHQW20s/U83nWWZcPB5QfuEKjpfcZkze060ky+ldgqFfJVcV2j1AXgon3aU644xVolEsN05R/oorI82j root@9ade9f43-ebd6-11ea-aff6-5a14b0d7f3dc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDkGliur6rdYf7rzv37M0qiTP7n7welunHV/5HE+grzn/6Sa66Qg9dApsnQrBHbVndLl0OBte1v8pqBKvD2GxKNuFa2GWYMDPSvhUV3KnHEgbuEDOli018LEYBI+j/NcZjicoDm0z0M0YMTCKAWYRAOd0MkRYKwZs0P1qJ1hVkArWiP59n6G0Ua0YS8H75O2QNCbmSOJUeC6lZxc0l5rLeWJPU6JY2RiBWh723lwary3COxhb0ZjeIpvxwDrLEtV1NVAbHcRgkZ5L2YV3FroZa4otBtoImm0ifSqVP9DFz3WRDBh/kQUfKKGothbWKgUpIQkGFbCVY538Odoa1t3e4r root@878ebbe4-ebf9-11ea-aff6-5a14b0d7f3dc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDECkSkymCPjQU2Z1ewgITb0a778+14W1q+h5KyV9vS50w7QurpIqOtU3/1ljtD3IsbWZbaVqc/A33BcRP8D47Yy5ZqDGCQufNfJ8quVcHKUZQidD5UNgln0kuAdPlKzZtDycGSR3qfF65G54CFQMmEPxS/bzYHDJB7mgP2OdJTXYHsyWZy+MHp7YSHlViK/JogDUqFQsF4drWFlbQr3imRgnfjfgo/LAj7CDwqo1lcSNdkXnSH8ZBXhHdGcfZy6zxfcI2ciivxc9DuejCXz25xL8UfkFKF6oDye72Z66l3j8v6/GtqVRZleI0ZOsjnBOWjkSVQ+GpZzI7D1GkPG7Qt root@61021f96-ecd3-11ea-aebe-3e85ddc86bf2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDtm+yjIU5tUJCpaFUVqlucQxbi8BeCvTQ+tePuvgel0FTmczyV00A4vf9wCqgBVB4m4csh2wj1ed1dX6GO4zXGw6kwaI1kWXTjYYWRxkz8JOaz+p7mkqbShUHi/SUO32tovb0SiHK58XtC2j3gIDxXrcSi/PXaOW1VN1A0j02qtB+Kg/ToYcTeWiJkP2yO+KJ+uDheKuRw/da/F1vbDgWhwJrsQMBG5zHZ0gVSztcsjWTGnfcvxTqCmKTei0KCKae4SjHKu35MON6IA+snPqh0l7V7AV/v/E4RBZO4JG40L370zeJeW/ATCbOciZ76jXsRnKKlvFhOcOIdQq0/ERdH root@0fdce460-f168-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDayd+OgOGx2dnqGl0yZC17UdN5/uaQv4xMq62Ra3A4jQ64gBws935SS0nFkKUpTtoHoofTB99S49mrwy7gN4YsiRN5rpmKqmwARbhcIgO7rAR2MPGnFYIUwxcZLh8LIvsVeXnlOpc3ghI1A+5RoC6LMsEU5zeFOGLslQvpbLTdpfqHhRhvinOeUcNQvl8nHBIS6DviVDW93aHRHre509OuPv4Uk5LB9V2TIkTiHMeAl07W9r4zTo6fNg5UegxdGcP8Y18kOVov8C0LFVLnaD/ED+X/+LoUjPTiD1penh247qo2BfSW++d9U7859AVfkibtZNOd656Kb57bs7wCdjEX root@26e05d99-f5a5-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCwR7L4vl1Z7ZHhw0+mPJ+scBu3RcciyXHd/+4RYQhGuxdOHhsqos7NrTuqH32UNZnIX+D9gsJV3XAmqIvEVoc5h5C7STRAnfFbLUS7zEn88CFB4cLelAz7MOaaA1U/jzQhFWbmLr1cbcDMyhjnHJU6vJm2LM71wUuVZ9PyzMy26j8BsdNUD5MQ3eJxXc4qWKtIjDcb0YVEMsgx36DThbcOZTZNHhJngHlaFeDy15lW7E9HCucezpm5P1vvucgtHga7SR85tnoMtsMZrMr6CfIx9E8Yl4xeJBmEvMAufVPKoAfvKs8WQ4qqHLufW9d2CLrAYFOzBxFdJI4ihQoDFCZh root@90926dc0-f94e-11ea-926e-7e7ea190b727\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDG5g57/r5QswIlDb2zrRihmwwrh0zWSM4TeFO8MGd6kqGCPxz4WVIXvLJWBiVdcKRXeJOGPnQTdoV6r4xJtym3qgqAOAhoQ1Zg0SWaAlgjuE3/ACMvYJHqvrm8Q8hcoRiN7sq+drY7RngTlhsXnHbxRvp16+fm9Y7wX9UeuMepymrynuyJj+cWuaWLlfJr9k9wvf/WMrCukBw2Kc+FtR77HxKS9Lf/TiWDt7z9CouI3V/39x6hrqjZZQiZyX9WFNLfWY4EA9NNk+KdKIzTZvhvPWDiFfvVM0emGpq8IM68gFzCWoAYk/3TUnJl7lh7fdmzbwbCqB4/xqwKWvy1zLtr root@e863f8a4-fa7d-11ea-9c73-86173d37727b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCokWyPSdoD3evpJusSzPCXP52mfKN57sddNxvJFAaM5pAeO+4GmjHIn5kXUO/FiHIgcJu7t/eDOll9+tbbDUDbAIw85Sl50SO4+lYZqPFZjVwdsMW9McWTmnAAYP98dx6xgtNsbQq4XXHkfpHQI172Lrh6MJxN9fDeQSg/OkYyFz+20R4eUzpZ0WAZhrf3CCbL/RSubpNPC+ujUlbN1vdUyQfI0OfY3TRt6Q6Jm6kDU0uGyF1H8XbxzLdJUOoHRKl4ttGXvrRRdlXdNklgQJGYOjwJKFrUpN+tQ5EjZWoXKjn4HqDm2+Ik7iapyP9f5Jce7IKAlCDHPZeBgqAcIKdJ root@0c23307b-fae3-11ea-9c73-86173d37727b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7TzEJv/jqFywff0C7haQDTfkMMXPK2UtPvK3ZMQqWedX5UNgy5QIXObmHvWaDGozo+GvCIHNEzGtGReBqwxr2Kew1Dc7vD6vGWWQ1snVvJIChERAMMSukwyxV/qZredu2KfR+txy6jRQ0XDdEak8l1dfPSBAl0Uy8+D0ThYT1VUhevWzyGn5ykkhzwYkCEVs8E/wlRjANdUxMsrpysaDTihWHLiyCp2oosSujPY0YZPaMxf4FbNNfBLcXn8ExKJVD2knslDpADbtAbhWdcsV/LSkaC1sgTQtjI7OX/aqDNwvJzHowKQOsikrHTkubBUGRcZk3yHPNi2tsjhG8PetD root@cdd7f442-0444-11eb-a932-82154e1dffc3\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDX/0rFUxXoklHQgf5kkTqZAWdYoppSmPRMqLzTTwwDiHAeNWASzPBHqKKvV1UoCgNkLEW3lnAHklc4D2nLCCWSrKXWqV4w2VGIKcJsuT5ojhC8HPUe5A1vQ5tpjPd6D1sJg1eCTIXLmEm3LHLwUnVAAg2goYm/Gdp4t8IvL09qWSKI1zRt6ElJRJQsg1U1mzTR3r6Tn4X+uJQzHhs98by/jsFlYqvdXFPsocV0DtBGlcldwYUEWp5y5cHeuhRmQcA6eAQHLuwXa7FZ3Ix8gl6k4d95PbetkJiVoNahrBmQeMHm5nFbRFDq8dR6ZoMgnIhhDVUAQn79HxYvcLiTma/H root@d306799a-124a-11eb-a3cf-6ef374375bd7\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIHpkPJrFjfDu7d9vJ5u2+1tY7lfC2Lmvuk1MGFwg54ik7eR1HemyJos0EFyiMknOvuaABxV68Clf4m7/4g+wLT8Ewwb67Q+hwE4KDJ7MSfQvoMLwyI9vHasg65frYj5K1ArlY+bkSOVP8Sn6mfI0rXYheTN+uvOZqJY48bKFRje6FHOloniagF1p4OtVtwvLQMkzO+jkuwL07jyEoVPUF42TX2y9UOuyYjQ6xy/XEs7b6nZ1qp3lVxRHWNwzMEniFiJF6LtDab4fYEnKCabC4ZUwqoOMEwL2A6fUDLiAvnjKVhPbY6PzdHjKow+XXL9oqCLWdBCbRpv4Ybev6yWBb root@ac084e98-1347-11eb-a3c5-629ea79d0103\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2/FtRroDey7zQiWkXNTfm+QTGth/s3Hy8L6nTTyDCygHd+vwgZQ5k2L4922IXaS0plcp3HmEUvAL1cHgAKcZXavx+tlo/RE8I7aQOXnllMZGqVaJrcxclTe9SvpFTjJFMseJGbINrWDqNRXl/ajair29zqBpBV1rQhInqIQRRm6qkK9fWf08NktI7ooOoCSEWYj05zCYnvo2zI/TTsoTL/OTzEqcDjPA18MzGlQgv+hcTdfvNXS+FLyUNW8C/CI8GSe3RX1hxzAanzGkiw2ZTjkiMN+GwDoE8e405yq0GUr1ru3tWI8mOK3DV86K3NP4TQ6lgSEdW/o3u7ANwoN8X root@84acffba-37eb-11eb-a25d-22a534811c55\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCt1oeNPIBnOWCQVAJgSX5TO3XiKLU5ThzOxWvggY11sF9/Lw/DH5U5+DsEQz08ioANLSP4zWRxHQ7VLVUmd2k0NL306qSi33wD/4AW+Q2hyLRwW+EhIK2G0OcalEqmZTHHOVV2lxURcR+jHIG7tNhtqlBCR0MFGavcVXfKp44+Y/MdPTM3Rg7ibN6NzxYN39H6fgwLS3lB4vEN8B+PC19/SL+aQAe+oj5IBzwWQkOKuBJi6HQr76LdjFA2Vb/Pz/oX3Vao9bv2IehGUOjEZ53gcaf6/fqvuwAYyiv8A9gIxFwoELs48Wwp73rzq8gF0e6HBANaWur0FXlunqxSD5FP root@afff8b97-3d40-11eb-a772-a610f2f25584\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCxQ52k7EYGMLY6Lrc3Qu/fz1PR2seTpx2t6ASkUoOBQM1HVqksgK5x0IEwwu5yMpgN/Ox2111Lo8cLS4s2WbkpQUcJGMSu2gnitPZybPdSY+FoyZ/hugbObvEfjyzfLxQ6IgVj36EUKwUrvT/Spqu0xK59afjfW17lV4M76FDFVmVz+cKv0PFCdqFlGWj6DoQN1Fy+eI3zl2RKGHliHRTC42yj8yHasyG0pBFJ9osX64gT7zNI+m2MudqSurb+2M+e8v99PMq7uX7yf+n4tXuuwNF4k7ANFtXy7KORI6+vt7/W/y87IxtRoP06Y/x/AVKK8HeAkG0PswOhdrGflcK5 root@1fea330f-46d5-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDjsvtUorbGSkg6bXVkuAtYdzniHKITnG6TODhOuJeDFWENaVOekh7S/0/RJjp1kSDGFiff+iCFLTMzf3v1D+SNqCxMho49ex3xPbHkWwLmsUoP9qwzl8mOfKwdwjyLb4ZHbxBgLqNa780HxI+kr7/sSOpsEp2+/fQX7AcniqySNpJwu/35DFUGN/8n/hsXndPe4wdyyRRA/ZAXY8dEhGRNbxEoEGqPrWTeI9ioCFSgOJcBKiD3tIJgPD7Ljbgnu8VDJVzSAiM05GmEvivhFKn1ZI/qTde8kP7ZLowEnILfFGueu3QyDp57SZpDuqG09A4+PdWxKDCiJozbNtSE6a2D root@8d52589d-4753-11eb-acd8-6a2a49dd8a76" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T17:38:31.389-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "1057081706538-compute@developer.gserviceaccount.com", + "id": "328016653253007080", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-045", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-045", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-045/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-045/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-045/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-046/description.json b/audit/projects/k8s-infra-e2e-boskos-046/description.json new file mode 100644 index 00000000000..5b3126acefc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-046/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T00:42:27.503Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-046", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-046", + "projectNumber": "1077877847215" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-046/iam.json b/audit/projects/k8s-infra-e2e-boskos-046/iam.json new file mode 100644 index 00000000000..a093b0e2a7b --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-046/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-1077877847215@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:1077877847215-compute@developer.gserviceaccount.com", + "serviceAccount:1077877847215@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-046/service-accounts/1077877847215-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-046/service-accounts/1077877847215-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..28d37fa5f4d --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-046/service-accounts/1077877847215-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "1077877847215-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-046/serviceAccounts/1077877847215-compute@developer.gserviceaccount.com", + "oauth2ClientId": "104759798070080063057", + "projectId": "k8s-infra-e2e-boskos-046", + "uniqueId": "104759798070080063057" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-046/service-accounts/1077877847215-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-046/service-accounts/1077877847215-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-046/service-accounts/1077877847215-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-046/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-046/services/compute/project-info.json new file mode 100644 index 00000000000..ed495c9f857 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-046/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDAM7P2e+ym4sj4M6PoPnWj/WEdtC34GPG8ZKlersH6aCljy9YzB7AjEiNIwp1iACTikzNl+fUZ3Br6T7/Cs6MaN2MZWbEO7zlGhVd8XAAOFMIQhTgDE+cLXfSH8LT4RTVT5RxhJHxhPQOsO3wsRrsp4i2Rk7P6jN6EkOo3nlNw2wr57zY/8Fp1q8yFLkHB6/EC5h2fiGn+cOeLvj+hwL3LoDRsTpHWge9O+9ck6Nhjv9viwwp5kp8Zwij2axsLbi5fO7bTYV2U2alBQczB4zah1xEmK0gcGjVz128Y5vhlAaBPerwuvgjRe+1ZpjbF/DwvsHuxKV0yvi5fTNf+1INL root@cb11e1b7-d9cd-11ea-8c1c-d23af84fd26f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCfsw9Abx2ptv8RUMO4BAGNjV7Le3DLK4TueXAbrN3gQO8+QLltSugGmCMN2fI9H9mx97G6OSJVm9/b747+e8OdwbKFLg36gwhdoiteFyDJ9a47ri9/cdJpzIHdNQgjlSESNJcpwv4NBIF37cygOE/8PPh2OIBjY/xm6rW6TrTw8sHrjR6doqcdIaUBlLfMKFU/bJvOIsoFzFFuA1K3u38R1TTVcZs1wUbYS76zSx3mptIWMLchxX4Y01Zs6SGVkBiLGkBioVgmKFKah5uK6Rl22TEx8komhW1H+QEwwJ6MoiFRuQg5OGfYkB0FYboRDKl9fiM13A3bkC41XWdsbca5 root@e2244300-dd84-11ea-9424-2680bd79560c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCkGPrKtB8Emtx1uuNrxVdSBmQkOVheiY6lLJV/81455gscSuGMVRB7oq5IrAhh52dn8RBo8L7fCyVsGAWeczYe/V6Q5Hk4EN52uUkoC/mUe3rVwOBsn3Tmg3RQEaKyxJitwDVvVXFw0nslfI6NCyIWPiyHtzO/Gn9073C3Eq8gmTGxaqXkVCSUAhWRIRaY9OJZivgff7723VbYUtBhN/qc5yxmi1PB6WSWLTLmglZ36WiRgx65czlWaQE8Lg7RF4TReyQ7gfMTndMCFD2v7+3aJMWzKz5p4viYuqGJmjbKvD1HjntojKXTRGinKBSml8UyuD35dxSB+aZkzi/VvTFr root@4bbc1813-f559-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDDAs5f+mP9YvSsrCUhfVt00n3JbH1SRuS9I0+LtluEmpXcYf5K9E+6+v50tXyU0AkJBwoafyLvirJlrj6FuC2K+zgLqz0792PsTSgmdCqPHZhVjrifXGPzhAi1Xr7smExUKGA1IF0SzYMmkepTPoczr/AZ5ssXFCrsK+jXhOtHC6t/wGFDab6Y7khISaGhP3ms+U8vZsK88qCN/1l3pmllJ+05bVyAXoDDNk+N0BtNgP2EHvr7JXlGQXYuNTPG+VhU5QYtf56F+N5ZiyKdex6+07hEL25ISa+P0AoQrmpoQlqrNinYAEjuGQJMbth5cyEHwp6k11dpOt8C/+0mHd6R root@6f2f814d-f66f-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCl0v/4ID+cur4HpZxdvI9hpqLvpOpb4kg7j2RyxpxqZBsZFyVW0IALWNQyNBTCF0R8HEpPZhKSpnNXbvn8evmq34gGJywEdONd0A1kct3t+FiOfeeAfw1bDq0UBnkxUj9bI4wc0KGAbs14EEg+u9QPqJTa9uUlbH+dKNSEPnKvgZGM0d36tqlBLtO2GRjhWRMggKSJOgMFVcIKHuF2fVCEcyY5/etVzFzD3VdNj3i85x6hSBEZzQrOqWA8KAV/ES5eX5gZ8mUlYfBpK83MmA2SoIZ77XDnfeqILcIKGuzwSqv6FVk3iUzKkOBYcit9TXE5n/tlryBPMtOOaTzlJcuz root@0d0dcb7f-fa32-11ea-9c73-86173d37727b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC4JLaljDw2ZMDxVv65IgTKACCs1CqpImFvIu+ThOYWYvfs9VTbGb8bVGBB15nMT2U8dxGHFsJZRuxx2J9InAVa+h9pp+JXIqtT4c7tk1r6k9thShEbuL5krSbswZRitu5EMGNxjTEPXzNFqK5/1xDE5d1NX4xqI5BTEDuSRTotbhVWUJfqnxSwet85bxyTZCRvkaHOqAcaJs9oLFEkMtdPwz5q22G8BahX/rnWyd1yEXc2RO3Nmwi58wJ57J0UFQblcMgVOhMPATxziwQHJEOj2g0CM/trJQ2q3cPPWNufYUu/fbv61Tevyrlri4ELzjf8WwfdFser10FwHsLj3rvR root@151450d1-ffd3-11ea-b4e0-eacb7c15c8a0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDlbsLtKx7RfswvFJMc64NCOz8AnM3YJaLkX6bOOUTyu+RkVx3+yt5yRV2iChBcgMsmtj8sWJIRLuBrAlGxFduqynWYXBm3/0cWByE639vk1NXpXLongF73aKmpielhMFLHjI1twEe4IA63dK13QNvhzlIzH2FCsz/fpHZf/T0rekX6rhpgfpVENPI7vSw44uZg0qv0ZUKUeWaW4Q94rgWepk57YXeZ+WyLpHYqGwvxLTpnZX/llvedZ296N11UGJghkR3lusU3mp06yR3ZDHo7o1cRs6xX83M4SPx0YL1tF8aCIAVPHrD+m17aIbWZjB7/FFEx+EqniXSGjeUjsPdV root@590b6acd-073b-11eb-bde8-b2e010cd58b2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2ztbNXDoJ7JPtVgGXMWwubf3E/a4wx8vPnSMX4RFvHA70gVuCTo0W/q2XQEA1R8JSMf/jJ/nGgddTTfpq3BHUAEcu4ck1LEMJ3XMMjj/2wQotnYid8+hbtDNYFL2QdXcWMx9pzTG3tsJn3TS7wug3V0xb1yGtWwLp+8dNzbu9jAYLOO21Rf+4toIfOYXNvw13BceXZJSvkuLYuNBCrs1XctkYyc8x4hTD81svzWQs8PutIJIVJjxMpUHEybpNHd4B5SqgppCW1GSwGNDu0IamTEQkAXJ99tfOrBPBicOHL6RIRwHp4e5y/RCXcgGw5WUJI2zxRb0g7LCVUqbxuclN root@41e338a8-089d-11eb-b895-6272783fc925\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDmGBEMjZouvU3tON1aTtdMcB5w51kPB6tXmbErMPiZsOcyyrdq/p4GFhizz6mTARKqGmenD2m69V9ow8XBql6bsN3TI0gdVOnVmcoiCpu3H1nn206IkoU8Rwwq3F14M5CkHvt9Zh1kmreVM3ZwO7uCnDk7rinnpTP68+AX6SUEbPZB/PbYAtId6DNs179Yz9G8VefICzhS0gWPrLCRH/4SHUs/vYg5Y3+MNsI/hQ+Fe2dZZqyPaRjdjwXa81BR3X9tFJeJT0cZT7xAInYL/f+cmE1d02FG4X8F8viml/4AUtmdKYLuo9i7kpETX9pGJvT0G55sTT2VJgpKcZUoeSAn root@2b9a6ad8-142b-11eb-8a3c-66d0ef5d093b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDqOwQ5KFpqlU3Xa8YSldq5/LWZj/KzI/e2PMnQl986TQAu9Czhpg6nQKBZTzM+x2DAmy19DtyKlAdjAiz3P5I+Ushqe2fZr1ReLHuHETHIwvZ78euKFEhBxf6u9nZdLpLvjh/QAu9KLNGTZa21uK3iErBjpGZ45osqX4a79XU8WN1qpfw3jl1WnSNuSSE8z3x2uOx6dtnicUD5M/m2kSzkRElT77N1iEXIwvt9eJTCqOhPp1HSn5v3LJH+1Uva3jxCkMzmAjnsi+pJwomthFmlF397GiLjyyT44rP2O7OXJwKXXtJd+PgP4FtTQDd5bZE6B2dS8H6LJ9b5B7qbBWqr root@dc8462ae-1837-11eb-8cf5-bee87f5cdaa3\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqmFCJTnJs71FmktwKYFAzJyLJslD/wtvMgleCE8gjqxGeor1CBUhoeZTAMKx5eNfaojM5qe8Dz3KvGRlyfxhY2uvEGqmGbMciLM3DIj8PVJNHA7GR7MIMzyIcSz+fC1PXu0FK8ufX0EOeayykwe0JXV1IKN0AwrcFIfDuHNC/C2Q9dYRdh2UDxhe7dwTRhFRmB7SsN7I6LlGJfEaRnODvqHQItg/a9FsQEP/6hHW1ZPFpqRZcXdE+X3doteTtXS2yNCmQTYN0+pEZVCD/QuNCUn8FVB0dO2IjcbXxKXkCSZ2/XOTn83cVop9YgHdbMSiZTx7p8iF2uVT+sePv7V9F root@9d517abe-1883-11eb-ac0b-9a760af27878\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQClqV51hH1+SYPmHRuKgSdwdCfzdlzSkuhFzy1RMwzk+i9zkF2eLAh/yqAcyOCMircfS4JGGs9QROZcz5BMhkELAddWRZ8Hp7PbBZ5eeIzw4bBRyFrW7xX6XVspYxqfPZFcpexrNPbXW//w4cIyOEgIxqXcT0P3qYthaGMSN7jQTrM52P8a3MKoojGOPUAH6YkGTaGRP5CC+4mQRtwLaBvCjeJQp2pSofJxQXBQnHqQZyd0j//5WV+vI0QcJt7OLa6DaMZtkC7/RYAiW/z/pug0WRa5uMsrcPBjFKx3OUo/dGkX+9jYESOD1Vp5I1+MAJtE/QPyT9VsQSK9y03Y0p37 root@ca29edf1-3166-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDrBk55PEGZKFGUOC+TfO4rizjHTBy9Kdjswji6du9lNuuZkA611NbKgWnBEtUHv+1g4+hMPSR4KBZXc1cxPYueX246YY2hZIADtWLJsNE3W3baOY6ywX+ey6rzEdkuMCo1zvamxDOVt7tAxjXBodPlqZD0ETHNcUt2paIhad+LLJ+CO7VUxbyQvFK51toFydmob57QbSJ7oymJj+mLZPNzVrXdAZvOIz9AVfv7C6Mnj2XpFwhu+XapzrZwiEYaOf2cmAckPExpZANEPruxsWwpHXdKfCSSqmItTQyxt//5gesXsuj+nto57vem8fwqPM2VbIdqz4tpPAL7hiYwFoBZ root@37931ac4-33f8-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDtcZSfn6w1HEdVdRCzsXjuo7YUSbrXipqWgk5BJzwQdSh6JOcen5AFOapr4BYVLUc/Ltvr+Zgw3zs0kVAPFx0NUdpWuvP4XidNNPz62/S5So6o62fVONMvnArmRg7TdUFpceTTO4kUfGvi6bb4WMU1eZUNVEc/89pAFOC3MTrf5qrUXY28Y4NVX34PxicIw6Q8iMJW8hGzMeJvowLNQvcti7nRhR6Pps/zuQ98172BIaI14olF876Kvr+Ao2FhDrLntzwdyCamLofw3fLdg4vTp/5ReLYlEVZFDAor7M1h0ppYPp8VzTZlYgp+k4CQXjL6wr/DYwgbO1ZeZpqsiHXx root@0d257446-38cf-11eb-8630-522871d052a8\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDb/m9UW+mqeOvyA1dPsfIb684C3zLTeqAXYU/GCVI3SVQHVjbyt+s7X+P2UQw7FzHCHngVOzt7Ewk+jgp8uiJxc5JrOR+WkDT3PcMAoZu1g1K1N69fi5r11shdG0C1Z4o9DN7ptNG5jtevxtZk/Rd1b3+MplzfomfaC4fKVSu+RUhy/UyEU6zfyKl3Mmd5n6KYjLxAT4ebb1/Us0pD87enFHAEYBL1fu3hLOske6T/34I+cPBffMCCCCa68MqjPOo+sBgmDBnPyLozexET4N9PE++wqHD6TZHMg5nHVcqVVA6V7uAPUOjkg5YNYl9qI5xk3UZdfSv8hjO61x6kT7oR root@fdfbe7d2-43ab-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDx9CXW7K1e/JPJXd0/Ko99xjHB5v8PJxFtHlx9xDXtG4LBVLojyiLG2c+BdS+wNwXEBEVx6OS+DZWBObpFOBZqcVa3+sH0g28eHXNr6uTRV2JLQOi7B36cV7aiSnuTdIDV5NNCskF7sxndtLRHhU0QQBvGIOWt2lqFOq/NSaQhTh2oSRGn7h8Olk11+H4p6uQ/06nAlMu6kp+HeTsso5SHK7h14VuASckK2US00ujs1lp5yOzUmqoccFyFMjjGVoWFGGFIyTM0mOYP7siOt4GFy2n11YOYl1ygR20nExs/PXggru5uXYLEhP1Q62iqikcbYC22NNHdLg5YgQQNk2Zr root@49ee96dc-5263-11eb-b6a5-7e8b7adfd54c" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T17:42:39.177-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "1077877847215-compute@developer.gserviceaccount.com", + "id": "9117212430430033425", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-046", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-046", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-046/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-046/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-046/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-047/description.json b/audit/projects/k8s-infra-e2e-boskos-047/description.json new file mode 100644 index 00000000000..efd147a2053 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-047/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T00:44:24.798Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-047", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-047", + "projectNumber": "1040129457366" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-047/iam.json b/audit/projects/k8s-infra-e2e-boskos-047/iam.json new file mode 100644 index 00000000000..c13c0b7f53e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-047/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-1040129457366@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:1040129457366-compute@developer.gserviceaccount.com", + "serviceAccount:1040129457366@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-047/service-accounts/1040129457366-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-047/service-accounts/1040129457366-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..326c866f971 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-047/service-accounts/1040129457366-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "1040129457366-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-047/serviceAccounts/1040129457366-compute@developer.gserviceaccount.com", + "oauth2ClientId": "102909807023240877030", + "projectId": "k8s-infra-e2e-boskos-047", + "uniqueId": "102909807023240877030" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-047/service-accounts/1040129457366-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-047/service-accounts/1040129457366-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-047/service-accounts/1040129457366-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-047/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-047/services/compute/project-info.json new file mode 100644 index 00000000000..4b8fb1704d8 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-047/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDVMLhvmlfNshK26tQiChN1l/64q+JHwyqodKMq2cpaGQMQUrzIKZSaJ46NQGEzOpe4BqyIJ+cB4a/quUd0omXnztBo3XAVbNWOtBzGjSDVtQxT5cNoQKjhlBdfnSY/bm9o/Xq9q3v/ZdvBYr98br2JT+1qm9wc2+npdH9a8zjq4z1RRVDpN58O3djpEjE0VvaUItoSTnpmooBaBnQqtZXAuzyq1vg5Y+/QGqEf5DWmsHuBiDaFL+27wCvbcDhjWDFvjTpDdj0QIYAp7+db80ulKIKQsRljqZOMY2E79GKvdk8+3V7rbCRgYtUv9yYpYXe0F0JgD9ucaJFNcmhPN6yX root@ac5e7a00-e3d6-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDI1KUjX4Oh9TCxh2zNBkjJdaIPFCLl//oslQ6ebyHIZb9UUnigWvEsdM2+cTHLoF1oGN7rO246yeyvblcL9wDrcEp5HZVjZbBSiwF5LB+JlRefdIVN15M8HKauvo5d6AzZU57Wi+3BiiuPHXoHXkcP+7CCWPp+uFMk+JZpbsF5kaZwPha1P+DMiynSIc+KHnCsdU+/n5JINwO8pZrvDTUVHD3y7rl1wSC16eYTmKsFOAShiMQvAoc+WoYyH+326t4Qm906pzu751YgAzdyn38r158ECvBMdSZCNDKbRWL6IN0Tjs2bP3hDnfDI//zqCzOTNUJygzEvP9zhgkA72l3R root@e6a4cffa-f264-11ea-bd49-066a8cf01e04\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDMqzT7PGqWjOJJU+P3nFqHMjgPTz5NIsW9iG0f1BD15NGO+EIgMc96GEW0kyadWTU+wScBZJ6HzlcSK6JvU5wYF1T93EswB0frx3FPIYurcLEtwvRAJcEm0harFd4pAk9ANYg3l1KgFW2FQfjcmbkbKjnR3Cw2xFPreqmdfzFJg1Mqxjs+uCo2ULU3++SxlMCsWqlz58srsuT2e2ptvOUFxeoef33Gl3Ryv7jE426c/3h/OeLd7TJRHEMpWHitaYqppk9NiwcS5mpL0WabnJYcl6VVXgnL4FrwxSUVHfO9It+xDlG9zgK5Jsc0RjBnCQK2whV9sj6PgBuFjIKP5bVH root@24345a04-f3e0-11ea-a379-bea988342348\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2CXYa+8Yj14NNiDadjKuxXyWqT4EgkQMkU7PXKa3ZdAZBCJSFZjykufX5/JmLLZR/YcwSnH6Q86AT68E+Pc+qkCSmMyQVkehVkQQIZzncajdIkD9/guco07fZmM5TLcziCNPQ4lmE9Roe5HEA2cIk9hYqyka4X5aeU0uC0ZwDKJInVnxMQWDgvKVOTBMNLCD0tea6sdbpbuTuOPXRLWd4MIaxdO9xk9deImmIkgaI9XaBpxzQdbQr8x3qsFsG0jr4r9ys+Jm/EEtM/JRoYPxzE/LkTyV0tCnWiOWaxdzct++qmlGYxeN6L/dB4gSfggQW/VpFGcVPVpPQwwwkc2wV root@94630696-feef-11ea-be1c-eaa6cb7654bc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDV80X2mKwJhsNWeIvlW+D2jYlv/umHAuNEDlothNfdV7vrjMAncXP/Zkeop7i8zI701NBeS2jKylF26U2kn8t113pDXYD+bD4PnmNt8KQKIpMgy2mDK2V+Q5kauQEK5dlm8IpvIDZrR7FrYRaMibeXc8v8GCzMRtM+W3Bh5gj4+lKc7pmr3k7Nea0r5aEjJuv+Q0tI2JRniQtuVfAYDn7uG+RTfOykM8Q9JlmWxIMWGzECrSlm+IyRJE/P/hl4Zw6Wm9kDqv/164JUgzRN11bslpTrdSwFirpjh9pJFzW0CIy6id9T2CHTiBGsm6y3aLUBR5ZJ2sbCeKnjwmNrm7vl root@32503b6e-0c12-11eb-82af-de22b9665164\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDButbKzJ0roYRiOcSK6Gz4uDA1aMa9S4qRClnZsFFmsiW7xGktNtRtBRGsXB0sY5j7TkSM0tjiHw1/SGLLVBsPi+EdiQza6XK1ZoOxpNgYRWq/8mDjBxRLltrrJ0hQYC6ZeDS7AAdErg972KI9QWKwzdkkYuNLtPYzfQ1k4KCnvuGj4p24egeLJcBvV+x87pGhmTQkAL7JgFhOXGJHMSMFcG4oYMBC1XeVBm8qRsxZlZuEdXEnK1iDVk/GxgfrV+lJ4laKCl7txYU0UAYXnmpg93Be71pFeUHIRm2T9UJ9S5U+oOAj0cLf6p1Gh4rfKFVJv86Zp9R9Ejl7O1pyTWIf root@5160c8db-1c44-11eb-99f1-c6d701d1e283\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEKjgC0Ytt5q1DzvNVYMD8bRRnTGtRR2lN6FAzaEHBTieH9j6slZ30An2R8OOEWCStGU8+0lAmMdw5C1S8cR7Z9sEWghpbB7zJtPK5M0LIiD5EINhh+eZXJze+R8D8epEQoGzwYj9gZPoq9wvtTyX9ipT1WQnRwcQa4EB9v0p6fBNLtdVMS9G8FNuZEe7UL1yyM0D1DMEK+lywIBjsxnzeedAjnzPN39HV5oeJARfDZq+bGtvZVlp+tpwC5ZWFzb/cdHEEF6BCNibUgwfjwqkpP9o6Fl5WvkCpkv8GADirRsNch+UneKEVwBWzYAwEX58x4qJb+O7GYQcxBap2Zwa3 root@1754572c-376d-11eb-a25d-22a534811c55\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDR76C4h9bMQgd5YE4zV0890SXUB/LXvTkDB48XIAa4iav5YlbWDrAoVVhXs19r3Q2UWqjaReTvY8rZ5CuaQnL5HK8mubOnqMOQpyT5dc+SlKSys75bCVW1fmVNdk8LyTgdX+I6oge9ofrEvXg3MXhLT2MSvBT73Q+1hZdlyXtbc3U1MVXA04IUhRXYIBqoUUwC45jXYwBno07bjBdegMxivqKXl1dGE1smx9tOD0laOTLTD9Dx94qzgNZJY9743GECL6oEAHckFVbCu2uUabf9PccQ8RMETrMjgSXks413oJsQ5F3W75ukk3cCKfRWCdFgitLYG4TPN1RW+D+NRu0z root@1f03915c-4837-11eb-acd8-6a2a49dd8a76" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T17:44:35.491-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "1040129457366-compute@developer.gserviceaccount.com", + "id": "5676244667651250076", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-047", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-047", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-047/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-047/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-047/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-048/description.json b/audit/projects/k8s-infra-e2e-boskos-048/description.json new file mode 100644 index 00000000000..020e7263fd3 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-048/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T00:46:27.411Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-048", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-048", + "projectNumber": "945923147346" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-048/iam.json b/audit/projects/k8s-infra-e2e-boskos-048/iam.json new file mode 100644 index 00000000000..15a13d896b9 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-048/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-945923147346@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:945923147346-compute@developer.gserviceaccount.com", + "serviceAccount:945923147346@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-048/service-accounts/945923147346-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-048/service-accounts/945923147346-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..a2501c9e9d8 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-048/service-accounts/945923147346-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "945923147346-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-048/serviceAccounts/945923147346-compute@developer.gserviceaccount.com", + "oauth2ClientId": "117704649190001521668", + "projectId": "k8s-infra-e2e-boskos-048", + "uniqueId": "117704649190001521668" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-048/service-accounts/945923147346-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-048/service-accounts/945923147346-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-048/service-accounts/945923147346-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-048/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-048/services/compute/project-info.json new file mode 100644 index 00000000000..83f2011dd29 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-048/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDvqYU4b+Gli62MOS7tlOibUGgeOE/FjiiJYdyozjxBYHM2eEBNYpZZsBmMIsVysWEY+YTr75iE422O7hl3FkIApuohJ9zQirVrzF0r2G8yPyPfHaPNgr2s37pCfVmmoQoCTFexNK4QylcrWqvDFMjR2b7o2jhp1htkEgioqOrJDWAgvblo7wozOzm1NVvqUSzgFx9czWdI2ozxDa+5xmmGzgAPtaYZzqkvfi9P8WhwKqfePPpuvut5eiPc+6dPY0pTqJI+hfOEU1lgIGbfVDsauRO5uwy0Qfu1ENM7GPzvEgP1JRU+lAKJrfd2CztSSVJLAuFuwevCQQKtQQAm/bH9 root@5e3a97c3-d94f-11ea-8c1c-d23af84fd26f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCEpOB6nlXNy9CeQnqNm8pPEjrdI579JKrfne4UtyiU/Zcu702iP9n+slnnRlDG3x3zYAKJa73LorJAQrcdmfIwsGtq4kRZoq0Ivhl4q0shRiOHM2G1tfw7vXQYwgQzAdUyiCzsAZ63l+ye3rQuGPVCjzsFOJwyZBXvueNxMy2cJhiD8NTgcdVQoBU0UBdC3yL57NdC1T0fzU47r6cioE6yCy1WLlM8ut1xFJ7r5tgiCCWeUES98pFtd6Vim7W4rpp4cVeWOJdSybV9QqqlaEZ1tehh9uIkTu/q/TGQxic9DtzSpQfUCDfJcuAkXoVUe5faQG82z2BGWy3UvQZ9Y+V root@456a7568-df19-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDhzPDJ6c7sg3SV0ECzMu7jZnMtldhZ86M8Uav2UyWKVOdy0QxJFYkeJ4Fy8QKcMxZZbey4pVbuKAOCqBXvt9PmN4lUuM9SFYGz9dU6UzNkikjvKwcuQ+HLESzW0C01/+ASIbZa0LsQx9Jx9bmgQvAD8oD+xYfCIbEn+oWMv4IdW06ixGuOIBQxg680Cwn4UIS479Lw4cDqqeSmSRE/EelFbe2aP1vnS6xH/zlObZ2jjAOe+xyc2HyYRraxub4wK19pkKBqnr3dGp9E+9tfuCpf7tH9SfabrBA/MaNDDgyJie7hOR54WoseboyjzuMSyg4AtRVaUzhJMzD8zTuVW5JX root@659efe4d-e30c-11ea-80e5-e2aaca28ed6d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCu/lL4n9t6SzgIf94FE56TZmFROgKqJ4hpxciRZcnQvow7kJVP+o89h6dAScK+hxCX104xLXxC0dAfsi3NspjJZjSPUDCVQfESNX7kB6aCHYwbTiY5G/zTm1dsd2nvA0ZHKc2GWJ2Wg0KOxJ0z38GG5dWTW6hQ54AfAPr9/N/xooHb2HrDcgpoKlFcqZEvrjMaHWLansen05vvjjJ8OEGMBWXXUMn91njlY4M/3pN6hAFgDpMl5/TO9N7S+VA4n+pJ9gSUB38gx4JmYlrX74VmKPhHrUwqFZiTMCSTXlgqZe0pgwip2hbYxro8gIdUhzWfJ2t6d+9lLuG+diM88vAd root@b688f320-e861-11ea-885a-2259550e0d87\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDDYBCtIunUE+P3oYA+BP6WKbXNoALowJZnCgFn83kLKGClfpMsJGEVIpbsp1d6GmZ9Q8iQSKpVoCwHr1BEWeNic8j+Xrd7KdtQKjo0dw8tsf2LbTMLn8PCGybvFXyNNMedlc6ODRMqP6hU9rDP4WiN4WFZ+N9G33R+3u8MqXVvOBeXfkkpnaUTvl1MiZFsiuMO0JmWQkDBVdCfOzWf5gAF50kj3xr8D6O54mdNxwjWJ9WIc60StfZUhWM0NdhjWKrYKYgbjXGnp+tS4H1T2uo/0Y/xeH5p1qCkfHDV7+YjkUT+r92zq9BMFuTd8YlyddJ9yUiFGRo1kjIbqn5fn0lH root@3e77ccc4-ebe0-11ea-aff6-5a14b0d7f3dc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2nqO00/FKxIfqIXHrSp7JzfUcm7j3/1lnVFIO8mE5YvDSg814jPHfGU/JapmMpzA+pruPc4XZkHTseC2QJwtfLjct6bKvYF8V4/JTU07nddvdKThcibfI/hgxIfCYPQz02HO1dXo2oMUMRDCY4sml5IYTIs0s9Xne6dX4xcQhQ8i3C9pOiwtUEdQ7nkM6ZKhcJkiVcOZY8PsUurEVA+0u3Qol82it7/hk0N+QGrwmMw8UAn1n8CmD1sAiIedQGImJDxc6WAp9YAIuGHHUTmXjP/Y1kYp+gc8z4H7aQFHqR7TZDMs5vS57Ya8Xcq2gk3pnkwr0aXeisUuAOdWJcE+Z root@819195fc-f787-11ea-ae6d-8ed64f3416c0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDlYfiZReuxrNZoEFj7hBSih1pvyEZH++NagIrPCYZcbgsuDEq1ctgM4jWLdq17flK9SPl6PzGyxWAxch4s8A/IQXR2fn9refqbRYM504gGRTDPuIkj0m95eXbodiBsWHIQy8nU6dai3+uMUr1rrbMxmN9ABSx8QqjgZg8xQEcQrDum9JAzz9wB+Tw+l49BG2TGI817k/iMzCrYzUdC/xegDX/svr+LRnol424NvRFndoYrNRTOEiYjO+c/FJFplj2UPQNlM+efTI9jJcUQKAg7zxNgsrNfTekad7NSxNhxIzejUZj1wHi07iRdf+i7gsVYd4nWe48RS326LCZTNhZT root@564ebac9-fa4b-11ea-9c73-86173d37727b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDXUgN9U41Z9KcVvgoj+lCx/TmDU02lD1zjGfD0f+K4B/bJRvJGudvar0exIOOLFqwOKyx0iDFRHVWYvruKkEKKzwAXrE10p3Kc3dM2ba7RSaZgJEJIaHWYCImspIXDWnV4BRUgXFfBpNL3Zy5ihUpt7isObLJOFJoebLO1R6S54kY1NBvm1sWMzKjJjLqLKZmwKIjJvlmdzR48ihD+mPhytODGGN0QqNkx5r30j/Q63GkWT5FkIgz/sh/glVQf/antLPY0wc8E6mQ4YzjUe7xKukw9CroNH0QsS/51TGgt/xnCd5kRb6nCohS5hCjcObU16nSgVB156NeDnuVs9WF1 root@39a5d73f-fdc0-11ea-bf6c-a2eeca28ab84\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+jPmuT5lqwgS+vYZU8lF1QOmIWZMXfiqYk1PlOmENXhjC+6iN5oU1UwIbQy8eWqKoheKHTCpMZsTNX+JHYG1dgjMjiuVKIqTuoFq3y9amEMzGOAhImu6eid/l8clJgTuEvy9UJNv68/KhUMiOV3HKVX++IWrx3F4R5YF7zYKO4CalH1un3ambfXoT1M0J+gSp3phtBhykgPgSP21ArmXMaW87/HLupL/B3Ayq7uxpfjG3UV3k6mkWoF3/zFqfxGWwml1gzN87ZgSpHprHODSGHBuSPE/UEe2W8gpgE6uV5CvIMXfrS4ZSihbx1wW8bZ0fhoQ7ggKAfaZFxnWO0V0Z root@86df3039-04dc-11eb-9dc4-ba187aea6a9a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCg98OmNEI4al+pWXX550YOrwAw7pEgfM4Y4wXIpsYOPJfLY//Z0ipdbgTJSyi3QwseVyazRvI0PIb6PXJe5cqKyJteMqtKZypOvW9FEo2Fj50XrtFQRuXLAj/I9ei0FH2yj4Cg/jVEf6yCkMUNRj8rx+uIP6CsYzdlq7qJopQ8rOf6J+Mc0tePY1/NdS6H+uUAjzRtXzZmkn6LrXOsSrLYaJHZpAAa3httJiDsiLmzoy+L7lo84p0KBzrU9VxVCoKPD9BwBKJ55XmEJO2DwagUru0xc2V+J/GCe2ICWnyh0jMIRabpP1Ni+bPmDCULd3iAZ8vjW+QWazMz6xTZ3Wrt root@76d6ed8d-0ea3-11eb-b727-faf44c880cc9\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCy9Mfj/saR4NWrgb9r9srzVTBBl0yeG+RYM/Qy1drFE62J1p2WDR1gN7qa6ikfipUdzhsTDOVDIGJ0Y34aRVeeKxzIJhix1gaR34ER71E02OqgYssYIHH/K9Y1hr/D7iG/78uJkPAaV7dZh/1WEkYoxcZ68+CTt2+BZjFY6M6oC/HgPOIeEOeXd3GGEdILyEJkvcmgfJPhCiHozPDztCO+zIKV+tt/51/j2yCPmac1ht1QZnDyGxlF9jw/PpkJUJo8hBcphx2nji4sn8fuMsun0t13S+F13JzKlIYvr913u9TaCM1jZdOyKpQ9W1AuCyAg4Ukwx+aEOI9QiIHpCwLr root@e29becb3-14c2-11eb-8a3c-66d0ef5d093b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDYxhRDrhzeKzYgphEjGDGE2RQ//peIrkPwpposRfSGpEBNuXZpH6gzzLHXc/+KaAq/P2Yf8tHqFNqrMA9Vwdu4NYbhBku0lglLY31Bq0hdvz0HeEd16LXwNtdOO/0M3v9IWgEdz0RGD1FNqLsx3qg3bqGoQtSGZiW0Zsq9AB/7Gf+FO6MkXtmQn4ttTsZtzVp0bTcclOUDUH4BIHZdl2U0qSLcgGnzIotBgUNrYSIVsMWEHuWRK73x5SeUbmRchyOlaIvOn9IePnlepaCpqZ0aFmjwl8IVhary1WZDg7NZ9u6sIeu9+o4608+ULqWxPso8PAlXcJhmhdWn0ZSvMKpr root@936b4ed6-181e-11eb-8cf5-bee87f5cdaa3\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCnnNnDXH0rwpXACKlV4Ts47VoM8IARpmMJa7vzonS3G1eRwl1hetNHJtYPM1gzdvdp02YZynHcDlACEFXxbm3wXo2QneyS99SQ4miwG+1+yi5ygPrNQwryzxecADyAZtTVLu/rWLTIDmDXVIQAwbEKs9Is946V2L7GpXv1SwHLthvjvPABPeJHyaWfq4bZRVssOfB1AdEHl2S6EuvyB9MTcYihWwQdE4l7Xauz6UfUde8IdNfDKs4wtTvTMRoILxqw2AHeygYWfQX6i3LRhRI+CnT7UXo4V164qHLs9O6YCOKLyZ/i7dZ87zPFxYDWYEdJipQalRJGHzr5sQq8eub/ root@abea4d63-22af-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJPjaA5Nsfs7t/MkpGrOmtgEBc+4/D+YBArUcyS3ZVtQ3io5H0Vu0Xo32uvLedHYVA+mEOhSBEwmIG5AVllznpQK0wZJKvacIslSwkEab2wsqlpYPMl0H82VehdfWlsLnm7OFL0PoXcIIGN2rRY9bunVA5Kyqb+nuxcIibFYhCImjsADQ5ynbfngegc4djQIiTnoYtFlBwC70LZds40jPAo/UDJUWIDeArzTdOF+/ZtnhtrUc8MC0TVdU3j8O7+rdF2bY1M6buo+OoPQG6IU5iq96WGEE1WrAt6yGDimfoqEBC79gAgsOSH3Yjk3b/kdwz2aKhSW7MfRLKJO4BC2Yl root@2606b98f-255a-11eb-aecb-aa862b891259\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCrfx2Ksy8i7dKfyz5Hog27sQzHpIDrZtWC7BmWYYlfEZqOhPayYTTXJX+lhyHRJc9xozMujdOmxlxyJpJdaNuo6USzAXnc08BEPhHGdcKit0NRVNwzxuyIgxDkr4qw70A+NRqV5NEaHurSxSAs3Q3ma2paBxsgKMM8WOLXKXWdvWz0vdum1LJGsQW0Z0NKJ4hfh6qFPpjGdEfpWhr6tNepjZWPix1cURPPqS1lsWYfpYVGNNLayqWHEeF4OZdf8ugvBA7QTZU48wiqNKrZ/0eiCcCyzU2CEE+qokMLThdRvvHyMDWATB+y3o1cDOiBJzhCpUMRnGuelFUHYxZ87xGX root@73b243ef-3eee-11eb-8da8-6258f8057dc0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC1Vse5RtX1rp6YAKO2qUeslXtK9vZlnDzJMGJGib010WRf+8HGO+ujCKZMUyPj8ZEvoqLfeFrp8hmiWFWhT0gfyKZp8m8NFfrSNysZNsm/JkgbYOP29stb5x3jo/5VKF14LQnH36suH80+vWnnhCAgKn2PYqGQPwiY90jivsAbuKVken/fczfAAwHZ5KMA3Obv0FI1jcpNceAcjI37K7+rKc3w76c/wwe6hZp+LF/2hgFl9DIvUtK0v+zNHHOlD5ayMnGqoRBny0pfH8AnOe+nIusyidG3l2uHR5eKFflO+Vl66PNGvGUdHp8+13/veaUnkDphG/oCLsCC7s4IVliz root@b1846471-47b8-11eb-acd8-6a2a49dd8a76" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T17:46:37.208-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "945923147346-compute@developer.gserviceaccount.com", + "id": "6944023347328898818", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-048", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-048", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-048/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-048/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-048/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-049/description.json b/audit/projects/k8s-infra-e2e-boskos-049/description.json new file mode 100644 index 00000000000..fe058f480ee --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-049/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T00:48:34.941Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-049", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-049", + "projectNumber": "179636385113" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-049/iam.json b/audit/projects/k8s-infra-e2e-boskos-049/iam.json new file mode 100644 index 00000000000..2a4f4a27931 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-049/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-179636385113@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:179636385113-compute@developer.gserviceaccount.com", + "serviceAccount:179636385113@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-049/service-accounts/179636385113-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-049/service-accounts/179636385113-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..11f68c64303 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-049/service-accounts/179636385113-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "179636385113-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-049/serviceAccounts/179636385113-compute@developer.gserviceaccount.com", + "oauth2ClientId": "105271666369117020544", + "projectId": "k8s-infra-e2e-boskos-049", + "uniqueId": "105271666369117020544" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-049/service-accounts/179636385113-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-049/service-accounts/179636385113-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-049/service-accounts/179636385113-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-049/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-049/services/compute/project-info.json new file mode 100644 index 00000000000..df50a5385a3 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-049/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDATacb1H55n9kCq+4S1OJQt1g7bfZ4rCd+3eeQR+BHV3xBnzFyet1t3Qyx33nK6Z8ZpZGI7H1r3Fx2pSl6L5S2k6wC0JBzqwRbi9BmqZsswuluv0s5U0AE558CIuqO3VG9c/gKvOi7+zBj08Dpj/oqe6S5puPm1IWZWjQyePRvmYdMIOLlUxu1aebybf2ZSjmm2+bCKpSMU4ZNHIE3T6HstQO9EJka9C1/nqVEwyIVJGVaODzbjGPnWx6t6OjDyxX0r8+J1GRFEFJRSPr6mGpuzH/uDqNaCj41ozy38wJTGgspAp8T3ztCDp+AxS7mdWZkPVD5UxOCoXkhDmV7BO8/ root@3cc768d9-e61c-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCPKs9N8Zm0UQM2LpD6QV4p3ZD1atZKgrpvtOESQQkKDpaT+Yx8qCPPcV9ngOc0TQNYedv8dkegUx2xUTxwqQBz0txRTVjAL4PnyQZ63uuLkB2IDG8pB2/FFQ41E9t+v/vpSx1sZgdoOAbnBHIz1CRDlgt2zI8waSb8rd6l6+xyawlgQryYvf9pgwywaYPO9op/PshCi6OtLSG95a5MzXGUanpVC8qk7auOb3JYPOh5JGgD4lMhmPNv2XwbAuYvSTk1CgvFdGd/36yyCeMBC0psJ/8MgEPg/HBg/O8tZcGFZ1qVWhHAuQD+i93WPpJ3fcKsi+EnHcTJ+QssKxlGUSj root@c0359ab3-e8e9-11ea-aa1a-c6580c04344b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDyHFlO7AXbJ6pc1EJ8Fk0Tz8DPQu4RB7XNADDsfqOP2zyf32MzIW0WltLILmrchxvhWbYp75FNFVsp3KIFudSxQy4z5Zt87rY+PTh/q2V384VfNIDD3cZzpaUtWXzKN0OR94+7DfUp+uHJVCn5n/QC1bohdADoxuCKe9j+R+hzhugq7Xo7A4mzNn9OjDbkIi1mCMmmYKhnbLXBxqKQc+M+jNqgtyQuUwwGLTHUvCvC+WN9CYgep1hNX+oMHSHyzqRjGpcn+x6OeopdLDzJli1o67LrJvYyZyH9ipF9iZxjM8nh5mXVP4vTT6uLxU1VL6ywtXm2PXZLeU4+69CAZBIX root@c995fb21-ee8a-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCxfAC2POfsEtRNreuidJ6WUinRjQ3pqRJDhfwMjtI2E3uCtzEWssgfKgUhI5/WzFMV+XcrmvpyQ6uWNppBx4qdl/FvmjUfF/pHB0/wyA1wCoSXMoQ+e5p133eiTlX7KJgrejN+dt6NakSX7e+Yo7nMtaOUOpYfoyOkicCe13wQTGPtUUWAW9WKByEbZTmZLVXj8+In0jnDtDheJcizDAfQkcNcjYPOljOPDuXBzISLcV41c2oAiJBfPgKGUtGKqd1Cb2eztxO0IiS4z7M61bTTj/3keP4Cl/oqmMgdOzfPMNF4Z0F09ssFW+aHgSg7NFej4VBzyEBugEIJq64Y11Ll root@ed9ce5b5-f454-11ea-8233-42bc8ee613a9\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZPmjXdfMhVhc0w/m3a7B9flIyOubdfzxQjlw5sB362fC38AZ3+fXBtfn8J6fdRAKZaIRSgEo2hq1eXtlwpBEBKCGnH+YIKXDDyZUd0qp/JKQ8a10ZUUfiUuawjoUabUtidSMY0Ow1EXFxXLoI+aMwe3vBeXJPwWTDPhm22rhpCsj9Kr4GOSaUTRgZBa7rAWtm/b+j73/rLpFLLCodrBLGgEcI+loJePD0NUPx+2VARZ53JRt3raeqn5+DO1sEoxdRUAZMZJk5IuDpqfKAKsbnNjH3CvdlOoSP3EhfdoHWcdXBK2AH/7M3Kkgf17X/gKpX9+JJrT1SoO7bnKR2PFtN root@fec42094-f86a-11ea-926e-7e7ea190b727\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDkIJ7WCSGDXeSWqcyIQDEhvL3AkJ2Du2l58bGIpbQpuI/wKts71EKV2AFfxiY2FvF/6Vjfttu18RyJrXu0PhWOLlUFohmlY7d5jPvjIZqQ7mepS1qcqHZJdJWWqE0cJy8XSoOX9m98KC3TPGHNKm4P7C5c4h0REX2AMNlF2wYZrdUk9O+P0KJ7BfwosSmozPRCga4U5LTSFvSaBm2Hmx0WnB1PH51neoo+SqDfj1tnAsTJeZ7CeS9IvChes0x6yo75PgQD74L63ZecQ/sbntWSMkl2U0rBkm56KMU7bdwZAx9yi1vAEqHm41Usv3uvcIiZ6xnjvkui4EyOkIg97zIp root@9eb9a024-fe3e-11ea-a78d-ce9ca29dcab2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCLMtcpfXh0q2Y6BQoRiqWHhAEfrLPOwnTXn7VU70fpyl7hqiH72j/yxpKa1EeVxQcBJggPa+OLxW2LdUhasPhohKU2yGg6tcVeC2bFdlRMNoB8cxFmGFPyPSaZ3FFIyLwtK0bCN3F3Cnn1haAocKhE8msMf/lh91l3cDcBOVG6h+5oIsh6FaOwgp3PwaEYQEAafWq2kIjdPn1UppK37ru+5/pcU0epAicN+NEOJ7BB6O9GUtElgoFfudFy5eGp/Z4pslnsYlYVL1prUhvNdfxzVwPLyiiG7qRQvR2r/EjZSKaspRyy7d0EziQecMR5vvrlH3Gthdy7xezGoAk7Pbz root@171f890e-045e-11eb-a932-82154e1dffc3\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCtpitxIuD0Ml+lJreqceqULL7MTajR+pNEVgn7QMI/RzJmsXogfbKz25J9eXL4f1k5JkJjsJuxQSSTkl/i0VcKGRi7juHw2UBuzGvmJV75WdQfwMn1J0QhzW2BoliqDpoqa/UUl7xnhp9H7yEpGru3QjCnQu/RXkgts0zdR31iAfm3VqtLk2KetU0Vwvo66uMh2OkY9Y/OzBgJebA1oFftzTIeki8o+JWN9LZsWP2MiRlPLyW4y/tXOkOqTto+pQjxRnyB39yw3k0ISb6ds2nrz0dfm4VEsgVuJIyzrd16/VLb86uUiKFXn6KyqzDlDGv4iQgleLA5vxkh9+KXMe4Z root@14c6c811-2f6d-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCxK44gQSKANYAjNwpHXfE1UD8G5LtzrEXB6vHIj7mh0KGp3q6Bz2Og6gs7ue1nMI/+CF2RHdNTNEwJa1i2AbLbGDZzsyl/z2l9wlVgTDipkn4BdrWzCceKTASHpjt29xRxngqLYD9jAT6h8tSK2Gbrm8zdMSUk3byMnbIlzSfusTmbRh5TftFa6ROGDZ18xLR5IPGJ3+gcyKvNsZoHzNPRwzp/Ay1V6B50ejb95mr++0fZiwWbh6Wzl4Tb88iYEOSKFMHbn1ZgMolU9p16dTjj3sJ/YL9PfQyI5k07orBrRhV4FED2NuGwKeGohAu2157z3RT8y27g/KJhGFL7AgRR root@b470ef35-4443-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCvMCkL9H8PHIWLW55kdzfbzRKZWWVcJzFTisW5Kp6egzfPlvUXA2gyv+tXYoE3fJqlMw9NY56o/LDptwS2fO06GGRKlXfkW217xzwS/EhqnJNxJtI4VsTYoOZmHD6cuyFNt6Yt9RyN7I3xek0xqkdKhEr4tLGA1V+swUIG8RRLNUq8djk6gct1dOjYNwfs7DHMMy+EFH04opRIXDNxwYVESM6Scei3mZliaAnQvvR2XsYDt5PX3LPXUEZRLMzfrUIY1RaVyZpfr7EWadGd3C1ao5KSACuVtuOAPGDocCnM3/ydiv407q2HU5hGdFJA1Mfghawi78lPaB948zqYpQRH root@d6431a78-48ce-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDc3HOzGMHE/gjgDwMCQuVd+MzgenWLyTuIoYdHM4LYLYHaGnzawfUb5PfweMQhJowjRpsgpSJxyWv5tpUkgcPa43frba/odn9nNwVMHSLfYq1yN8BFd6ayC45GOceJ+6LpYnbWn3MLEFq2jzHW64AZlXpQPw+LIHOVHteYGZCmYv0oUzn7cxLlSLg2MldMJBQApLrkfCAHElvMxCfoJp4v8Z6BEOCUHWgprS46Yy8GKHTtSD3u9BSAioWmCItEPar8ExHxKnvWmbrm3BIE6dgqR70KcBhcZmUzcFrGEdYp7+ow3X0A3Wo3q8natfHiOR0CchFmSIRW37mWO7/BQtNJ root@cbb85e0b-4fb8-11eb-ae25-d6360d0295c0" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T17:48:46.872-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "179636385113-compute@developer.gserviceaccount.com", + "id": "9056342457399039105", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-049", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-049", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-049/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-049/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-049/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-050/description.json b/audit/projects/k8s-infra-e2e-boskos-050/description.json new file mode 100644 index 00000000000..c9647c83398 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-050/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T00:50:29.447Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-050", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-050", + "projectNumber": "500102021523" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-050/iam.json b/audit/projects/k8s-infra-e2e-boskos-050/iam.json new file mode 100644 index 00000000000..4d066f0257a --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-050/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-500102021523@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:500102021523-compute@developer.gserviceaccount.com", + "serviceAccount:500102021523@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-050/service-accounts/500102021523-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-050/service-accounts/500102021523-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..6f3ca897109 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-050/service-accounts/500102021523-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "500102021523-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-050/serviceAccounts/500102021523-compute@developer.gserviceaccount.com", + "oauth2ClientId": "112727616813394163318", + "projectId": "k8s-infra-e2e-boskos-050", + "uniqueId": "112727616813394163318" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-050/service-accounts/500102021523-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-050/service-accounts/500102021523-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-050/service-accounts/500102021523-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-050/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-050/services/compute/project-info.json new file mode 100644 index 00000000000..be6272d057d --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-050/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDNuzdi+rVDeE7SBFrir1tZT/qiKxcp0hdutwxBY7ppQeKqhslWzD0C5KYtHuTN6HXc8bkcSKulHjRok0JaBJKXo3yZaP4CWYArZoioEnnWFGgVRI6id1wzkwL2jyni9xBGzX6yIU++FSxAVSo3XrWbW5HVzBfHGiXMYKtCPu0u3kCJrlzs7s4PLTYFN7vTiONuqh00Zsu8f67EhC6dhcFFXc/LxCS9+E24NUu0nC9HEVwuiPu+kl24zQlfitg1lmgMSk82SkKIrSym/nl6nUysN80wG5YTRSIgukYhuSqUyyazr3X1LMJ6ZCSO0azgK7tObzc/xMykNg/KQPzoGD6h root@9ed3fa38-e06b-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqisuS+eXdk9SHjMNOmSgbvup61TIdsas8/qjXFFxRhrY7Z7xz1zSzp8czeE5BRLFDym4TmUVjjoShCOU/xPHkYcWIx+cPQT5l2QYV9JfftM5Kr9a1rtY31vPWTpfHuvUzqeskv5k85VD3WYReIP7+giAcpCW3Scu1/+bYHFDK/gKo5DKb7aIl5ho8hRalis6F8CWbJX1o0gKNsl+xjDPdZEa7esaAHlxZmB+FJZqIqN5h7g/ynSChTAvmkWqHi5mcy8T4mobAEUftZPgM6Dv5BxIz6D0RSxw+EX3tSzTHc4RA9LFf0/7vK8dv/3buA7HsDWpnmd5kXIBlF1tOoQyF root@4136d2ec-e103-11ea-8c67-968ff53f47c5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+QBPOwHeFMFB6nyFCrHuJQN3jGX5jCDyCUASDOP7weJCPB7hRmYYCZ+JAIxQL1PMy12eCpuo7McsFS7dM/P7g6pwpphcmnqLRm+KT5pY2ZogNrsiMdVaJtH+dcL+3S1LqYLdMAH3bx9gfAjtkLTl7jZYq8Td/lVf0nMARGaI9+X9Bslq0+SpQ2ufrX76gLGeffFnl0urvebTOxdtlAMPRJdiPn2uJLruAj7xTS+ae752vef2siT0Z+hnE41PJKsr5d5e9LTtzSoi/YC1nhheuIT2T+PeeKSsCWG26Z5tljtz/Zm1F5TnzQpDNOlXE8E2rpJ3p85/55cG/X6r3H7kf root@65c1ddb9-e168-11ea-8c67-968ff53f47c5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDidM+gxyaSK9aA9y4GIjS/yyjKNiAJOD5lPJ+tZ/AoNQ4BqPXtjOtXvwEl9a6SNWPEGzEVu+JkK4SemVq0KIhLbI39bUsB5vuHVMQDrUWBRMwW/JXn2n9Z7QdPwXlAwPv3KM4mzyAQLyGCBLaQMDuU7QVkt7zlhWaXvjcRilm5FyyVINy8Es6i9sSUDIQceIgTG27JlPHoBXGcaVR8d+mAhCe6U/yahp0FL1oDzzbv5oljK6LyvtNtTmlzibiEtrgZfBkVP3xTJpP2nsJIW5qPO7Mg4isP85rkmawiNX/yEGXm+47FfcSiTGjgkisWX5and3HVevqPC0iLrpD8wbRB root@8ae2c765-e1aa-11ea-9eb6-86c455181e58\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCso2aTYYN9JJXiFj5T9ieUInJgn67NFkcE61w4sxFAYHGoLl2CQM9khGTErrhElXMLBkv9cYnYeDuujK5ZDGpIyPAkt8jRsilB/VmDEN+k1ct7oFb2H3uZbwrqlQ/D6hsih2zsjfFKhmcy6BUj6kFIUd+vT7OZcoIpVQVnwvjERQIofC3y0fJe+x38rXxImTkrXwD53/PeNKvgABY3Ut/AiQsYA4hqChYTDXubgS/gxpGv3voLyLhqNQR6JEvKG6GnH6uP02l50w6WF3fXsV4wXNDRqcH8ekLJx4+2ALxYz/80ygxqXAZNcwR8piXZs0NRShse0+GdVTEEl57LN513 root@6f13c5f9-ee9a-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9ZBdLiUPraG/oxMrUPOguSpmfdLqslF8sdl62Cbkvzxo7Js6Hdj59nfWVNSy3M9CPozKcCA1yu0Yzd7uacrnKQ9HQXoKCvCmNQg6mEbZ+gefyUtNm3hwuueipZWK1VC0L7ilVLmjB5pMPqCgjpyyXfzQcjTRCH4YvRDxTyc+o8ZACAVuDd0LXl3JNq0+oRIgtrStcBBvq2AiJLTDnzG3nIKBgIB4zI0h313PJdUSHp2DSmidkdYpfVtxuJh12bVYlSeO2dj/L9NEEdtpgPsMScSYoVMuRqb8nEEjXJy9qKSwXhoG/q6rvF2yLS709W+kDY30QufWTjzcJXBGcATWP root@70efa858-f50d-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEetzKIPSGHki8T8whbW0p62GnZTG5HX9Oc4N12xcPXYV1AKEG4V22W5xZt7wfyStSIEoZPB2Ie6MyCcL2/bgvtcjJ7knzlK8EjIlJcBBPMv9vcoYJmfJwS77oR7NtzTS3beUP/6C1DKK08m9eHXrqLOtcLai9PA1Hf53yD862ybhDjRxeAWAKbAxpbhMD7nWQoo4qb6gIelK6GL0BxfBw0+E2JT/6wrIcAXIe3bP5JqhOuyxwWGIMRWW7ZYugzNfwq82Po1YTgUTZm6Po0aYxgtqF4SGXtJVgviPdgYDgnXhaCfd8RsxEujJaIT62w301KnUMcVg4uePrC2ui5UQB root@ef4ed24f-00cf-11eb-b4e0-eacb7c15c8a0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZh65NhmvFJCfjG1BWyLYub93jn+kpbfwko19UtTsAHGLPnzIR/0Bhl4UxGP7r8HEhwt55js0mz760jfGKHSpDxRJ4mvLIcFimOU0QnMKlaGXXrz9kZ+PsvByJxxT2zJbx7UnmKASX23lxn5yfQ1ZkUwamdstdYXzrKBZN0Q4PRbVCLAzAdjhy9m+OzQl/lkRgoTVY1CQV21Ok0YN+hZxrBnZafuZoLq/8H67JVPehAuAlOvURZqnIrh2UCpCZou3VR2QoL/ogodYX42dOtSvp4QirhvSBTpoZjICdiFw11zMih8ip4U8GtTVrSbDT9i3iKySp0iJdjyJeXanYdMHX root@f4586b70-09e5-11eb-9ebc-160f1a1b7fc9\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDRF+cIyLyt7BRq4yHhKrHwHaeCLq33hy/iLnmMTWZWZsr5a9d0SQwDUxBjpDxf9Ya8yrKbT55B2CMT1eESrd/62shp/A/6YVjfjHWWjWBeb4UutEIG0CIkZSwP721nQw+iYrYR6T/PExgil7XNHsALx6yZSnRoGrboPtOOLMcvRK5gmxjbkcuLcWjLCvJ9CVn+T0QMeRk2jJyJH+Ol5OKXze2KNEHhbGvg5KPXbP07MjCaE2szO0p6lRPkrpRHOZwnI0SXe/+aUSO6agxgUKb8VaB74YDS0/rxfC2UebnBM4i+hTxeMCynrG4nKfABj3Fs4+br7I1FfoqvejW5fOc9 root@eeddbf63-1037-11eb-9a43-0aa5164aad51\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDmcKw4F89h/ZBToGtO208BueI+ylO7cL3lWKFP8hnFGZ5d/QjfddMvGaMqHvtG2npb8vh/8LGKcSRDCayYjZVbpayA+vgf1PuKDpdw9SyyeSn/CqxT8i+70nYi35SG6Du98aoeyUrK1pQsnPJnxnue0PsuOdn7VsZ7J9yqvSBv95GWEVmDRmz0H5eew94Njmnr4Sx8DD069gICOG6aNtQBbrhlAo5b+Uys+MTbrbg3ICPBz7cvpD3R3d+kaFkPR/2r+oTTk8Es7an3mn1J7sTleTOw2arTCGapqD8VZe5MGalxo/vsqNB3TzvY7jVPRQQi7wjFD+7b0U1Hgjo2Fsh3 root@982dcb87-16bc-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9siuTxC51z0SK82c8E/P5Nf4EOdHDn0D54FCtV+wpPfdG4iui5nlFjztWLTiE4wqIw8bbe0HZ9232MVKuUY9FNI0OS1UErgi8UV+pkN1BTdx4zAYe7B+S2RHQzTvBJnjmnt98yBB2ekSn2h/ogc9hyur9JfWQ2fZBzmpagdViP+U7hbXVrS6Tf1bbG+I51VF2afzWMaJjjW75EEtSeEMTn0IZCooaJ9CsxsZquebticjVhiHknLoKe2l4pW+FfAb5nZ8uAQUvri0YoA+Q2CTHUDoqOLGjDDTE2RWDW7umlKTIrdIq7vq6kjZngV9ndzRgsejOkc8RMgJI4OJwsay3 root@579e33ef-2c5d-11eb-a59c-42dfb897bae6\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCykVp+E78rGnH54avmgCpq2sJxHmP80K5wdr7VWtxCxLUV8RgvPnEFlUqyN6JcwwEJ265rBY/uT9s0g+S9p2ivZq/TrGRywkRFIunkl+XHMOpQr+EWNhFqDdFupzdUjVYzTpqjNARKvta1nlO9A7JFowkJvWckRN9I5L18kQJrYWTDB9tNqj4KVXzujOhvCwYLVoFZzU3zSqvqdjf5qv6oI64pSYYxWbRqqBUbBxsvMtOnF4LVj3k0gSU8/p6JLbIn8zJRKV/pHJCplf+0faDOJuNDIM7H5wmC9ISNaAIY6iBMGWzYtfe5TxIOCHEQ+Yxo4fw8CFdHxYGJAzbjgD6t root@3751808b-3296-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKK+GOtCG3Hna3v/DMlnWF32wp0TT0r0FY0v+GL0MC7nTUUs9Ew8RSPoF/0hu0mQgp8NyLQnK7SWZSOrlSTkw8sCynpbcORHHKBKx/3qnxM4OnRHmj1OBeIc0bPk8PuM7YwIBZ1VbvygC/v5Q8e1Ykm2CmaxyRoFyWsxIIKC9qw7S7EAYNOjfgsUjJCXExgwZPgbfdgQ6CCMmBRbzIxptiLWi0rJcZosMTtlnf8yz3xpvSSJTembt9aF90KSNTPitER/k3oJjGx80j4Hs5E+ayqYtrDWnyAt733Wt6iCsfvaQRSxVZOxD4cBhg/xgWtgBV69U1kYAQd9Q4vQGwYslt root@6e473ace-3bc5-11eb-a261-2eac9c79d9a2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDvL426BhapbC/wFS5wLrICKv0d1RN+QaYaY6zeq+2hFtbVNDa55QcT7pIZRRKfNS9sXgFBagWtNc/ChxdMXqVn84hAfB2kGgCm+OxlHu4wWfKzmB/L6urJPwfJWjZdCJwS5wJnKWkwdRaixMU4Qf0RR/n0rvwv+mxmAmHUHVaqCSSJ7maf1F64bKrctv7ywM/0npHYm0rdzkjTNZeQaIVQ6Wht+fWdEENFF6gbq4nPVe/VfawfHZtmveM2FzH5vUFVfmx5Tpv4nhD2gHWs/451r0IrAenB3cSL+wG9ewO/blmjD8nE/TR7+HGUQkpKGyRuSwbi47a06OYLcuEO7IUZ root@efaf72b6-4ebb-11eb-af93-4e5abfa0c065" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T17:50:39.296-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "500102021523-compute@developer.gserviceaccount.com", + "id": "3551053583544669233", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-050", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-050", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-050/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-050/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-050/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-051/description.json b/audit/projects/k8s-infra-e2e-boskos-051/description.json new file mode 100644 index 00000000000..c0ba12c86a9 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-051/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T00:52:32.220Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-051", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-051", + "projectNumber": "854680052671" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-051/iam.json b/audit/projects/k8s-infra-e2e-boskos-051/iam.json new file mode 100644 index 00000000000..756c971bbdf --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-051/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-854680052671@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:854680052671-compute@developer.gserviceaccount.com", + "serviceAccount:854680052671@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-051/service-accounts/854680052671-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-051/service-accounts/854680052671-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..d4e573bbe41 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-051/service-accounts/854680052671-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "854680052671-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-051/serviceAccounts/854680052671-compute@developer.gserviceaccount.com", + "oauth2ClientId": "114306334123002530805", + "projectId": "k8s-infra-e2e-boskos-051", + "uniqueId": "114306334123002530805" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-051/service-accounts/854680052671-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-051/service-accounts/854680052671-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-051/service-accounts/854680052671-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-051/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-051/services/compute/project-info.json new file mode 100644 index 00000000000..e5925a50420 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-051/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC5a3hYCBLZ1Ca0Q+MW4D36Z3uMuQ26zVnCciiRZ2gUpeqQpuLWckTBiQWsYixcTDWw72+tUE1VdGH+jYt522gy/seJuWp9uR1lrHXfZRPqaoQp9oAXQOMZ89+Vd6Id5QnO1KGQypGLOJATxs2XG6a1N1E5nUvShMK+COoVdmVmjuZsXkr+tO/I8KQGOrROt/IWu0aKb4jnqFizH26eh8degP/EPJL//hHmo4YTJRE38+rdainMIn6lilEoBetuRX0oYhyw8Xt2s+JhxEuBBm5miLGGb5i0Z5Y+rbMb4OFaF8HeVFEMfXz6wjDrvkFbOFU++FE3IPmUqsXGEjAkve3b root@f04b81a9-d981-11ea-8c1c-d23af84fd26f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDGGzmNj/i9sAqgjsaKjSd+mOikitRjtYfJ8G2kjtSMoJPz21DIgRvjyEk7UgOFdLuW95ta8IrVqwBnU4SCEFtlbpc71+5iGdy+WONnwBwQycrHbi0x73OO8mS5eiwLCNP1PJf2AjhL5OXI+2+Z4zdV3fFssRw1uFZLahQzpiqr9YLsAmj/TvSMX+6LII7xoJhJm+QunMKI4vCEA+0Em/X2bnI7EEHEfsVxFxM4hutzd2nwlsspjF2Vyy4QFqzfMS42KU3hW0ULfIRrs5hUzZihbzRNYzyQ9iiJVCW7VR50lWPeaaDmrJMgUTXNb4VOPboEq//dU6WlfEWCKxX9b9fj root@35c7c4e0-e806-11ea-885a-2259550e0d87\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZyFoNJj1YTB0NK4JQ0MGE2e9va4ZeuDP5WsAdBzIRiyXnLuWSry0zRzxCQ9CVjcEiCsSs4xWx1CNViK2Zn5qk96If1agts+H9CnQXxnf7JAdYwL6vn76Px7Gf8Uk3BHnA4ckhU1GcOKavC3tIhj/CdijmQYgyu8+iepDv7VZ18CJEb9KZ3kSFplrcbirYGN++PqcwtDRMBCBEXFBdcUc4ItkM5sC2JiwocTR/432qyo6XMxU3TJ8c5ljJwG2UbLXLzla6JFF5ROaE3XDqk2xKGBdRKaAZZhhBII57GZFy/2KgXueqvm3L1s19NDhk10PpM9QJNUdmhxxHUXLIOdsr root@006fa931-ef7e-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDHiu8qo7boG9NOuCRAMm9H1dr06DjiWCxPE8tRULrEkFTLmwj+jOliwXsWM0iVKuhZbDzq1C06rHqSiluzX0kJs7kOG0UgcNdZ+Zjg7hjE/d6Q25/o8k6UlDw+qLBgzjNgwBD+jpqrTsawXli9jsyV1IuMeLOheoLIydOee/lMb45WQGEUzIv02gd1UzQE8kxORUU1lT50rTwnE4x6QTEFFgVAZuLtgk+ik7vAaseqqD6oIqWtsmYgbvurxo7QAI7Y+et12oA5osvww9jf4pDcNBQQgrJ7PwT+4vIWvUQ54xFIgPjFJP8BnCSHh/K2FDqhc9cDe7/vEgT/XG6+RNTf root@da6975b1-f07a-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0KlAGP5inudQhCVyKxqjL5KABTX7t2weaIm0iQWKGnW4PzK1OnAqUW48Wn7czglzqmUoV+8H6NKdqLucWebMFLT5n+W1L2rDJAgvJAghzf+TXVfDZDH6RamJj77TdCv34KrMG7Eyo4b91wZOUqNi3AS2UW+fnrOmINgfqZm2YkHj+Hq/tuiUbt2YYAMFfSmMH2vjDTfeYKqxQb3IvqwDfIaFQ/zgtDAw/u3mPtD7ZtsoheZTxnRasGXA3b+ZSU/wvWEDet9xbWX9VbOgfeDXzEqe5TLFWrA3d0os08jO1vKuNXJZ7igZeTM0Rd5Y1fT7Jo5OrGulfV0Skf0k0pF2H root@348c8000-f11c-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/q2ttKpNZXknRxBiMOD7bhNi90l1PvbcJVDmGz4fqikz9uFPitcPGjLPHG2yO36yhVjcXsTqkEQEcBEdh46M4rU3Y75iBvc7/wj5UOVz0Nzk21srVHIrNccP1RCJjlnqwh4UGBr/XgAdzjGqXukN63xQbiIcOmy4mvSu+X687B6B7nMrVGN974DysKvbpoTKThNanD9AYNo0ZBRxpHKfKa0A4LmBa9Kng3oXsbDUJcAodjXkm+xWyO4te5zfz4gR9jmsPNAEbNV7mzvN7yPTezP9NlbjNDzZAb47ao6J0N4U8p9c5CB64zOQJ0qgMp/sHGkZvRi+XX3CzTCyzply9 root@19eab674-1315-11eb-a3c5-629ea79d0103\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDvetdJu5hX+znDME8L9ugJOp9aBOJGZXDD9trtnVrjZjCn1Y/Cik5dYseq9C2/D1vu8XDk0GnoUPp5nFiB1PO/JuLXshNiFLCenNIrvCfFioD39XzNQXnTjGh1cM7vdmBdFfb5XCE2uhMx4pRJIVEVNksJgyEmc826L+9PAKlfnc7ht7E3Q19FL73axiJj0S9O3j0PXR7ehJKQmk9FszIUlbVYoAErbIhsbIQwVEDvKCUsBx+YRiptnI9b/l/0bIk6joIrPGGTcy1lxu3FZ80OLtqOvjUIYNPdKHvEePk2iA+dElJjP8fyNv3KLA7rWgty2ey+B/q4mlV3N2zQoxfX root@be548645-15bf-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJbvEu70qK1g7i7ujvcTqGmXW0UIjKXag2ESparj2KDI8eaMSKt0CpD0dzdIwy+RY2/7MZWE4+uc8U9qiEbo9dEb11tHl11o2ZXSiMRX57wCb+4zK+LXMZAb5I0hw8FFouISTqEJQcoXce3Aef31As8SeFBMHqPvDE5fKdiKgrK9KGB2zjWVzT/EVyQo0d4NoWExPztyZmhjLkoHzv7lu+EXM3EhmeUed3UlblsOFYZh8SthRRx/F6qLOzt5qaUcvaFXXnySPTrq753sD0nwwMx4mbrx0/i6DWJMaQTCKzfQztruA6ikX8+BlP1NufpuctfmO5gIkkebi5W372kx8j root@56d1918f-2d0e-11eb-a59c-42dfb897bae6\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCnnGxJLHTAo6NlXIrLt8FtNY0khfVKV57tcIwB95zMMf1YHmaOiZibJpDKUtFXup0asPhu34N1SaPraoVr7Inzr1LCM+KaNflvuoo24O7jEYkplb91/j2Wo2YJJNZAYahkrolkgM9I59woII7c1V0iTCqDeyJGAng6Emi8WCPYXfkCcwUccL3DGlI8NH2PnhRevdGjcE5X2kjuzwfLT9aJCjZYlzNUnwIcW+ocQcbauZSqTiVLHeVROkDoN/Q5O96RX096fYyOsgMjmH1FUny4ToDp9xgb8+qazuVh6XnsWldpNIx9hKrvQ2gpnY0CgpZZS8fS4AEUnNX5ADbLSKRL root@857858e7-3a63-11eb-a164-f6e7f2ebcce2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0A8ZEWr2DpnY7W7mt6fUPILrM9YjjGGlxNFEOb/MzRpzEHJBbQqds7hMr8RxdkTeT7grgGMH3F0SwDUyYAH2PmPjG4vFq46Gd+yA2043xCN/m9NffW4iczs76hyCj8s6M/HwBLjgIxVJEvh7dieMNpdiDUpt1CWw+vYdeOrQmtkrxeFE5IJtCCk6tPm7H/f1Mw/dYu2GKvSL4TXSxkuGDvU1557MJ/L3x0MVOfkjMEv1hpGzqIdlA6sEigUOScY5aCbQMxRdZWKpugUSmnWXwYcpuSnrZv1xk91HQ6qz1Ofm/OEvlM0WWaJ0lZkI0jRdm4yMvw1ZxGRzzHNxEK6U/ root@dd4cad3f-51e4-11eb-b6a5-7e8b7adfd54c" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T17:52:42.495-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "854680052671-compute@developer.gserviceaccount.com", + "id": "7997483962095031733", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-051", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-051", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-051/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-051/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-051/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-052/description.json b/audit/projects/k8s-infra-e2e-boskos-052/description.json new file mode 100644 index 00000000000..b08a60f166d --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-052/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T00:54:31.229Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-052", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-052", + "projectNumber": "773433897863" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-052/iam.json b/audit/projects/k8s-infra-e2e-boskos-052/iam.json new file mode 100644 index 00000000000..031f1e7d959 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-052/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-773433897863@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:773433897863-compute@developer.gserviceaccount.com", + "serviceAccount:773433897863@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-052/service-accounts/773433897863-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-052/service-accounts/773433897863-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..148944c6901 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-052/service-accounts/773433897863-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "773433897863-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-052/serviceAccounts/773433897863-compute@developer.gserviceaccount.com", + "oauth2ClientId": "100124274634183370809", + "projectId": "k8s-infra-e2e-boskos-052", + "uniqueId": "100124274634183370809" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-052/service-accounts/773433897863-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-052/service-accounts/773433897863-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-052/service-accounts/773433897863-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-052/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-052/services/compute/project-info.json new file mode 100644 index 00000000000..c75255afed4 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-052/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBFnCTKqKDwOcoJatDa4MpnCnkOQr2ZMhdQZoOgxrU6zw4VOqKUQgiLJVRskcbhEnzGgWHmkONq9PVPw2wypzbhYHcd0w087mfFqiZPDCo1Hm1HqYjf6L1Cc+IW6jnsClfY8du2DxKTbF5XrK3/npgLBclv1438+ueBpp7DEcbbWemAItaEM1y+IsmLUBU0GxUJWRoM/jqtoydBa82HtBB8x3x+Nqk7IEhCq/Fw36P5wMNAe1eUztJjALJU69BjcMfkanKUWBf+vTaalZ4JxFUcL5axnIfMM2fAiKzmOR1mcioojksNpaLiPGn8dgdy15tu+4B7OW/yGOvhGKFgppz root@c23982bd-e0ad-11ea-8c67-968ff53f47c5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC6k4ryTqzbrJ2r+e3NdqXu/84v9qjeT/VeJjI45ZJYRjVtLHrhUn1me2B68zijC+slh7bnGWbrJheAGtEmIHEXT5Aos92Kp2rIknpsyeHh3SN0nFKM0Q9w0uugiXsa5YSIm1LAAVsU44wUhReOC43SkMwBA4zTuHmcyYBVtsqI+i2/TKbfx6treDjVz0washzLnaW6Z16SW2jUqsQnNV5wCVFMLXSHSq/TbVf0kMJIqjJcEQuMIweUWeGHgtu9KG3pLB9RTeOpTsG7BmaBMd4gXmrt1SSZnAAtiyariFoq/BzUi1MxeBWXfRKb1BFRsKS61ieGI2uwxzOPcIJ/szsP root@2a81c55e-e4dd-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDaPfhml2ZGw33Guy5nE5Xw09Dn68ggTogYpblOKoJwFEda7YUQ1/M9QMMuGWOyM/lTGl8YOwwQnt+GlKi6kI4gOSj1hvAorOcWA/qlZjYtpGdGw2zHSnf0ni2i1hgE8BlBoU7HqYc7Vk9ZiG1wlKJ9uQv6Qb78EPvU0nV0tCqBcPeXW7UmZY1O/1omUHRmhRb90goBDZs+pJGe4GNNXPNt2tSqKAerO9iVIvHus6i+0pSuI1VCST6geDVbMO99wzKUMiuhcosAC8G8ABIalK9AEa5OtOHcvDuxIgc/b6h9ES7fDodIQJ7XtXoT4/B7LMRozncccLkKfP+v4W9wQtVv root@620e76ba-e51f-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKluIig8l+uNd2FfoQu8erzsuGYU4MiVF7Az/V7FU91twIwhg7zs/GnkShXMyFH7/jZMoiG0XfgiIHbntLzMgMzW3TkL9oaffICOROR5iuzIgvm0wOFuxrp8g2Gv7adrojd9Xtxs5m2nudzSQjpLcdchhVnaUMG3xzVz4fdIDgPXnIkKtfQ5XQEyo4Ks0tgwCgJENWQ2iEXUw8vonmz1udH3/6+CfAqGFPrVZ4KkDYuoPlD4wicHtLsPnprccFW8NGz5a80Y24pTM+j9ukCNjTXH05hA217O3M+DGapjVfR4HEGUdfZfzKMDY0CBOAg7Qml3VwNIcEuuvAiS2uvBY/ root@a5aa6db5-ee25-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCbYUFI/h7v/gN8PXWayo2AXWGfaNnTglHo1AZDXgSUwfqoSvamINz/VgPBBB8CirxCgTtx3ho7f+mUJhUytdVhiXZUCTdk1lmqdcSzg7JKActj7VHpHfHTbAZk+18ifV5LL2vewHrjDx4RVm4y1H7pZgxfQIVgHaXP58dfYo/tTj9kKXY1Godno54dP8Exq6gOC7Nd/7QlcUZ6eyvJrQoJqKeGlVOyrUDRhTabPYHtMrlEM5uhAZsEJ6VCg9MiV2QKChowdM3EJ2xm3BQi+DhWLe62QfFRsZPIzZWfwg455N2XiTdLtmmAG9NzVU757dDxyzJmDBzONFhuNOkK1EPF root@cbccadeb-fd41-11ea-bf6c-a2eeca28ab84\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDldjTqVXOo6KBXr9zP1RtI/QT8MKzu4uIiJhFA5x+Z47IFMCp+za8xLbPCkr/omYI0Fe3ffDdAjEbO+M2AqdKQu44yr9Q6Dqalxuw1f6+I0XbwoO+xBSk8ZX18V6U9gzc2aXoSM8Zn4MiyACl19JWhMu2w8zxEzMVfwHE6Lmt99I6BAjJtBPwGwdLhEcJn106EMRb7yD2T57g2x7oez3Il26SBFRgxvwYVECGg9RIvmjvpPhFOZb90n30ovDhk/ejbYu4ek7HR707pjWvfdUikyygwWslrunh6zo5XxSdoJqy3IFOaIhUrbwND52N1x9vfSMrVTMbIi4ZoyU+lOzW7 root@19bdf6b5-13c6-11eb-a3c5-629ea79d0103\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKlNSQSwJ1HkSvfv46ZGAYy5YZvlYu0t2ZIuezZ/elyixhrGIim1aAb8clB/z6NToQV3jWGDTfVbpoH5fqyUzX488VPBj5v8LcOHarrWGDh1mMQJP35EFj7+ZzCirIsq7NU5HeDdlNg10CV7dRyHq5MeChCySCS8toe8yeuFdQWltaqbypoEl5OH9JoM7EE9D1X23yKIUkpE8e3pMBDkXQ8B9z+j95dX5u+wRKoWXSxGlJfk7iO/qBoDJPwUg95wYB/MYIAXGAWqPNqSrR2YbXFCSqAqWp2y3BFDEkD3CwNN0D5edaauUdTC5jQqIy4sI3p6ia7wxiaftKln2WwT5/ root@826e4ffb-2feb-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDVAyHiGBTpxbjHk+zpTFQBC1t/LV7CCNlbB9JhqVZ6p/htyuCWCP3R9Jdgk3WkQl1VR5yRpEJPh3eZuf6DHdeO4ybEG4PUXZ6I8kiqfO51zM4IjmBqMxAo9ucDVuBcpArzf5Q0Iw6qLK8ZlBxH84ryfq2hU2OTSCDMxMOK5t77smG9cw+2ALobdZN42mQ6ZcHDS/Ri11cMQUxj/QyXZSluE0ZyyTm3cPDZTToOjV96KFh7slKnHv/6WoiDvIgTWyx51ul0XZEaJo8tvLp0g4XuOy/QuyfbhFOR3/3tb5ocPsoYlFHQ+S6GhK6rXoCx4U4x0O/dpiuUX03JOHjZY7ut root@f2582942-3869-11eb-a25d-22a534811c55\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDHQPJMa4fNvF5dmLswt2MBXIcu6x7DupjoaDwlR4vRfhITq3vIHGnyHOLkQk5VNIYFceefv+2cBWWRlMv4IMOrk7E7yIiNL748pAWmTZC9be1413SJrFdrPYSLIjVCdVFsDnmjUguTD2YrXppHQ7xxmzMMHf71pKNorPSn/9G+dxxEjLjJeRwipJktRUyIuJbVkh5CeLhxKiuVhOKTknZepoWhNw46GunLYYDGlAXYR84VpYwp4p9XeyQ/T+3GfflCDKeIN88EBQdnwVnhI/CdFxmJ3DLpoijv3WpHR9sVapWKfRq55pVGeteT/j9jVogaj4/eaAhzaa9IeLi4YnBT root@fcd7ae03-45be-11eb-acd8-6a2a49dd8a76" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T17:54:41.298-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "773433897863-compute@developer.gserviceaccount.com", + "id": "1373496827941147966", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-052", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-052", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-052/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-052/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-052/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-053/description.json b/audit/projects/k8s-infra-e2e-boskos-053/description.json new file mode 100644 index 00000000000..c1e81f2484f --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-053/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T00:56:40.070Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-053", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-053", + "projectNumber": "1067484269716" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-053/iam.json b/audit/projects/k8s-infra-e2e-boskos-053/iam.json new file mode 100644 index 00000000000..1058f1f9e2c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-053/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-1067484269716@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:1067484269716-compute@developer.gserviceaccount.com", + "serviceAccount:1067484269716@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-053/service-accounts/1067484269716-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-053/service-accounts/1067484269716-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..e2afcf6bfa8 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-053/service-accounts/1067484269716-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "1067484269716-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-053/serviceAccounts/1067484269716-compute@developer.gserviceaccount.com", + "oauth2ClientId": "109978962716809256160", + "projectId": "k8s-infra-e2e-boskos-053", + "uniqueId": "109978962716809256160" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-053/service-accounts/1067484269716-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-053/service-accounts/1067484269716-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-053/service-accounts/1067484269716-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-053/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-053/services/compute/project-info.json new file mode 100644 index 00000000000..27be309523e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-053/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC5fpz+oLgKXUO5JPj6vs3DCGes/apT11cukZrVRktzgapb+WoAtHVBe9/U1M/ElEd70vO9ZPBSceb1hEf73bazG7b8KrW7Rin2SCIa7aMLSzkiL0M8Jp9fVQOSZ1Aq8QCsUf0iyMIpix3G3t7a4hkTVpM3zVAT7HA2wQ4ChILQHJrnz0tb84RYQl1EoFZU3Cp8WXRqa1NcTKkeZtpPhzU7xG9uAd/KBQrtmvyJwZdT+7r84TQcX7JMHCUlrkOjEltLAS6M2RN/jWLzLQ1cDkXqfn4e4km7HOdXz1m5j4yj5hBYDALLYllTwj18AYU8BA+L0OnANPxgTDNb15Nxq90F root@7aaa390f-e006-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDXTXWGraG3v4K64SrQ9Hh+HDWM6SPHnASYTSMhZXeba/ZAQ0xa2RG5bLdLkNVw7UWqJWVNkioTFg0fXsGHlU8e7+NpX/1nwcJx8f8TLsU4gfgyzIaBYcb9qfSv8lC9M4GLdjKaec7zVMF3MtbtKtE6XHYvM2URIQpRycwvYktEj+IiSP3j6KzPX1j7B8oJA+QbqHJ0rLCs2D39vVQA4QYNRmSMDXVicp0qp43ijRzeU+nBAE4ZTQ40MF5pCVl+6akntbxmj9M6oLUr3yiFbqmNUXSqmhjtzg1FXfZkaaPt632t2OzGlxq8l9/3Xy3Q0wRAO3s1kKY+Qid/d0sO4PDn root@73406781-e25b-11ea-a87b-7e1d84ccc038\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDFMBoFLQWkEWlzfgmYBhkbeYupFKh+F34v+ITeQZ51mL8gSzae8w4PIG5T0DPqI+LhludcMjsxOAQatGc8SS9A4FvsNF+74Oz85RR2i023IiIOOD6MwYFpBnhphhaU/4F3HOV+4ctpwj4aIznuNcORiDsPgL2ItounDOAcjvMpyuAXqgZoPC9Gx8RvrXlNAbfqPJ5XRwlyhVCW2hdGp4PU1xm/xzQw3GGyo1IglFib1xYYD/F3tvs4WVAGBPQARaE5Snorh9cuBEP3xtOpUJBb3zJGiwnGDO8N9vk982Z2YHaLFEYSEKo+U9N2QdJVggcMGi5fmRFRvKkRnLXFYEw7 root@a3187e4b-e884-11ea-885a-2259550e0d87\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDnKvdeZPJSgs5FdNdCPHB/B4kLSAL3faqB0QciGoyjopOcyqqKIzF/U+FOGJXOhpL3+zxiPpIE6d4gaT0Wg4aZa9tcmQv2+Ql8lLfTWh2osDwVkh+4aqeGc+FMO36InrxREeKXoRthmEIQ9SDvnlfrVtU3kd8viAj0u212H8Urk5YuBND6XUl6DMTwQn9784JZ2USqd+cy7A9ve9+oETrg8HAwnp7WsRWyoeR6kqlYxBsvxJuzob2q0amOc8lUhPU6ayhUqqDck/mshnIjzxIJ1AAuZjB+G0UhEk329MTVRM1CpVzLx/s8s2nyUzElWSqbN3TFGsETB55NNcQpHdWv root@c83b1b1f-11e5-11eb-9a43-0aa5164aad51\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDPBK5P1h9/dlFCugmkkdrvU6fYkUn2XKwIa+LFaxpwjXkrUlDyyrUL9BnVN5SZMdgnxhJVuFPQCzFRTVyet5l3p03sXzkjKqEyV2bfiTBf+VBP6bm6L7HBAsHQ7NFrb5rnu9v0NQqznD/PDfgaIU1Zqg/8GjbI5RVoFDbRshfyRboT95lgG0YIETxDqMSGLWP23gYulodcflcAlGy2Cs75V1mq/LJw+GRfGXNosze3BXYMmRUfwuMjFVDi4BpZWL2vp7TIwVGITh+kj3tnBs3TUFT3K5L//pA0506qftctSQ9ACS3pguwud1KpjNhFafgUWO5ddJINT+BaEz3CXPFt root@7315e249-1708-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEFsaiSORHU2mZRlSHqdLIjWohgssSb/hwAnM3db52TOUBupuDSZ74/9twAALWGnl1i6zhvI6T0yXHgqD40xV4rcsKT35OvCJ2My0LBtdpjhSL7N6LB9Wj0r2O+V3nZoqsHdLtcZjYbK/axOpvfWiFS64nhbyaAyv2obJ3JPeDwtv0Ng/84L6e7H5hQfcnyEHQFNisXL3va3YFolUzMT2nwatOoOzCsQ9Uv1RnwcY/2jKQLYR/GV1Dt6LM0aqwX7klCmSD90GAc68BLvJ1vV2gcaZaHcsIXkmAenuccVlLtjkVwJFOF0NsnIvQj+6agHSLTxKLDO/Gl4BHq4/4ZFgd root@c959b9bd-32c8-11eb-84c2-b68ef41a6728" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T17:56:51.067-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "1067484269716-compute@developer.gserviceaccount.com", + "id": "6551862678238712509", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-053", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-053", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-053/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-053/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-053/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-054/description.json b/audit/projects/k8s-infra-e2e-boskos-054/description.json new file mode 100644 index 00000000000..9d4a9880f36 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-054/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T00:58:57.272Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-054", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-054", + "projectNumber": "37678502337" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-054/iam.json b/audit/projects/k8s-infra-e2e-boskos-054/iam.json new file mode 100644 index 00000000000..c0ec96db97f --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-054/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-37678502337@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:37678502337-compute@developer.gserviceaccount.com", + "serviceAccount:37678502337@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-054/service-accounts/37678502337-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-054/service-accounts/37678502337-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..42abc1b1d74 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-054/service-accounts/37678502337-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "37678502337-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-054/serviceAccounts/37678502337-compute@developer.gserviceaccount.com", + "oauth2ClientId": "101549295613258791319", + "projectId": "k8s-infra-e2e-boskos-054", + "uniqueId": "101549295613258791319" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-054/service-accounts/37678502337-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-054/service-accounts/37678502337-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-054/service-accounts/37678502337-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-054/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-054/services/compute/project-info.json new file mode 100644 index 00000000000..0e7a1d9f87d --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-054/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCt2fOJXnYzG50X6msMYoTcW8dzDF+S5yW3JYdRA96DNF1wJQconUQzLfZoK6LyrMJQgzaqUAZmpRxL0YdAs7BXvMcPKwIn0/+LamJFMKnemumldPXIU8YqwuRW2kSh9YdqDWioEuGS2IZRoLmUHxw+VGonTgbkaFbIjB4hdMMAAHkzfD79vD+7qbPFck6FiQ5BsddsRz4Sze56OzHqzBhdPZzFc28CPhui55f/ah74EjlE2taWpAUGe28lVTTiE1cBA0HGrxkMC4PQ2EnumprbbG5FCz1XH4+5xMUdzZo9g5ms8eWzwwJoiGZYqrenLmPRk9o86FboTLn3T2n7dPwH root@6a7bf562-decd-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC4T1DXLA2K1Qgnt10deDaVsQrTyseVyKrOsw3h4i6yJuhfjUUPOm5mT6HeFzUAB7YzgRyh8ziTXTcagZAvuTvAAoiu99xuD8D8qxck2HoZgkWzBmxCI993wWsfNzLgZcIcE0V1BKz2igkYRDQ2F5PR81W6CbzNhKx0NZwa/GoyhKBp5nNo+2q2MdAM+ha1ocQ2Dg8+L89FxT5qdW1lSnFPY1Ck3KZOKrI8/GOjELhOAjlZeT8Z3Xf12Bp4YxmNY/53vYXWtTYKTgIhXSuJHQc/zhFsaneoNOr1aF6UUtDv32doIe5RtPgwWMMtWIUs9Y+Pac+Q4O/iMBglAlRdT3Jj root@04fbc2b9-e5da-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDTQE0D55S4PcAKCIabh94y7/rJuLrHHnbVnRa9vZOFRz0Tf102EPfsHZjORwsUSMPkEI2OMz/3atqeqHfrD+G7iHEBADkijdWCKnZQLw6CEOBwoxy331tagaD1Rjrbs+1jg90icJSckjfhFBrsDW8IztHUM+Csnas8pTKIYSGFVKhNnAwp83PWUHqPACmkRDDSwUXVWmdh6VNYERgdG7rvgjVAHUKtlyeyviJlQokKrULY9KFte6+wYJMhg9oL2YON7nh6ELCxKf92CUT8CHrfrRPbEZM7i5AljlLweToWh1qBrHHldB0okdwd4UL8RsTrgKw7YtaROupHpzJxf5kD root@3eab126d-eb2f-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCYMSHsXqQM4vslPjQhQGnc6cRzXlSvX4banI5RY93pFYizkmJS9dRqjavlLXQhkn0qvHhs8aQciYeaKEi6iTfHuWXUOlQfEJwGcB3zsIqSe/IxBZX/Xygc35OXGNjxavJ2CzKJ2juDAKAPc2OhNq8GRKTdd2e9FxXrk7Q+YlbVs1kVT7fqpUICY+bnNNcYB/K+u+l+m71RnuC7Ys8c/nHovK5a91dcayMNgvxX3SvQr4QtewoaQC4yXvCNp4uKaqPyPNuz/pZcgluINsdHkcLRkhEKHaPlqhXMrREYW0kynUs7EPfWlLPqZTEP+Vw1RPIzL0808JY3mBDHtEM5b4T root@ee024f00-eeef-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDDdK3OKfNLOZYTxM3PxMBRGL5wtfljqfnO5ptrkxVcBrtHS3f+PB9CC3nECNP/0udA+/LNAMxKvJQbYYcWz5b7nmxpMgtB+a0iYN27MiU0RoI7khgiHs80QTMxiRXMR+UYiyQfoKUWtAH39qkrgtZ/XZK4pgW6eaUEtRSHbiwIrh2S5cKV1iIsa95dxpAANY+2v03ADMY5p7FfEMQAd4+L3nEUa5ePUjDbfJj0eU65OOybVGjrfM63+kIeffP8dhDMf2+9cD4IV9HeFj7m4auRClGN/UZ0gJK8GWksmbMMkcihlu3Hir9w6/XYiah7xllnAjbpWwNCcdczMpul6jLP root@89b10990-f574-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDW02RGaaDM1npVzCS9O5r3E7cTYqLpn7amPFPzm1h4s2lGrBQdxkKwLLTA4iFq8fPSad7cvObVEtAMz880vL72HU0ydVfh9hOZF31YDsmAIJPZW+ueLr860XXGHaQZ9XvZmBzIFRtBuu9X4FzDdjH/cxBKTOeQNq+YJEfNtRQShlniKTFSDGQ0VxXjzq9GO3HAoeTDIMFuFxseFcZIjiQO2vpMQacQXZ3T17o1EV+sjAtemn+e2nOWhtWz5v9g03xtzdzp5AYgGvI6wqS5pVoz9BqlE1law0eY3PJbyvZxtVaNnl0utThj74hYz8JA6F5KJLlC4obqNd9l4BWOuLPn root@f5c771bf-02e2-11eb-aa74-ba383c228abc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCxlzrVWxBnsnQGUPwXZ/5rQr+MAnGz/zzI40hEeGEMrf8mrU9TeyL+HoMpXGyyuVHeodOCk4AvPu+SoC0oBD6jIV+H6hQbIgFT4o+yL7/yr+Sz5mwvWPGliV4ak9nuN2acZSHt59jM+NlpISxy15PzTFtpnGErJKV33H4E0jVrYq7Ejrp0LY7Kc3HTjxBOJlSP9ATDVkgspu2po/D8WZDYHXdOLDF2fUIgleh+IxfVfhC0OGJQKiazR7Vz48cuaxDFU4usBCDOrm8HEprWz2PtBnTQVppuc/9DwgDuc5jkDdv7XyES2OfVFn8tMwcYCkgKDY/X+JspcLhv/uJaBR/B root@89d4828b-20e8-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKy39JbAaNoQEf0v4Kkk1Q0kOfXOPc+7Fq6PJFCWwjrR4HGyItJOO+DtdCMZKhMkIB6d/Glhgy7mrjTTDcMSxNxc+3Wc5NJIEZqjBP26othPqNcZp5wn6SF52uMQS2Eo0JJBZtTZYzdB+0OFeJuyFBwXMIEW65eD656QTdqfdVCDvWSGE7dl4I1a5J3NmEJHou+wxu0taJrJTUfYSMh5/u27NkpfjTvkROI8C963SUziLw4fJCNHK1SCpw4oFY0vYZxsKNXfyubFDSPsY/zAQVLTZLbYt6zKYE9z9IYCUvEM9Ze4H9IEiBPCbjJFx1npr13v5XZNq9V7m5MvGusndn root@8c0da2bd-3d8c-11eb-a772-a610f2f25584" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T17:59:09.089-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "37678502337-compute@developer.gserviceaccount.com", + "id": "3755553318857790003", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-054", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-054", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-054/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-054/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-054/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-055/description.json b/audit/projects/k8s-infra-e2e-boskos-055/description.json new file mode 100644 index 00000000000..1ca11b46b5c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-055/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T01:00:54.246Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-055", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-055", + "projectNumber": "469478053075" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-055/iam.json b/audit/projects/k8s-infra-e2e-boskos-055/iam.json new file mode 100644 index 00000000000..f21ac4eb033 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-055/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-469478053075@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:469478053075-compute@developer.gserviceaccount.com", + "serviceAccount:469478053075@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-055/service-accounts/469478053075-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-055/service-accounts/469478053075-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..b9c9e305832 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-055/service-accounts/469478053075-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "469478053075-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-055/serviceAccounts/469478053075-compute@developer.gserviceaccount.com", + "oauth2ClientId": "114253191976332087379", + "projectId": "k8s-infra-e2e-boskos-055", + "uniqueId": "114253191976332087379" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-055/service-accounts/469478053075-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-055/service-accounts/469478053075-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-055/service-accounts/469478053075-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-055/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-055/services/compute/project-info.json new file mode 100644 index 00000000000..cb3818ecfbd --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-055/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDN1sE5ZcEdflnmWWJkwAq5cxueUDJoNyh5diWLBLlgzCX7hNu24I6Lekkgc85AL8m1XIUVqenj/kgcE/kePX2uLkZZAEYt4ZMegeioZWRyVIkmSdPqzSjBCp2VFh7p0usMRMHMR8+4ZESg06nOv0GQHmpbqyygjeAX3JEk5k8lUkjM4NOkQxvpqmigKpNmtbA1tnTj+gXVCY1o+ok7upVZ5iftDrnwAE4syuRINf3jdNeO/bB3AcChxevhCSgUhcrQjAK9UyOrYaPkayGJipPjfdSRpHMWoiDwiGiOHBHeqJAFq4kg5psAC21JnyiYTfdOvMyJhkHZ3IHp1TgXFm4X root@6192059f-e681-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCs2F/xOhmt/nUCxyNJdgFVSnCob7I/TixGH475sQQfTHv2gIdsguRaZS1wFGsW8XIDNymzV2LrKyVG0sxW60uowY2LKwFzLQlj351N76g69/ufuoVnEtZwsvDJwJ/WhoQO4ws0KSeTtZKBw8PE9oQnuC/UNUdzlZAc6NyZ3846qrYNrGRR5dh+lYqLbFRgEyTSnSrOyq8iQIV+aeCN8y6UbDD0jfBN9v/axuTQWLiDkkijq69Tt+iN9cJyH8f7u74FGOV/F2K8XlTIm9vnpUorg9BdpE3k7g5XW12ecsEnxGtR5r7PQ8saepaYDBlpnDeeovDlDwoVDCn9Z5RT1oWv root@c1db1f3e-e977-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCe52RSi5E9LBPN87sB+5YU87/VdKN7LcVJu7hQkvGc3wa5QudJEfSQaJkB3xytAICkltyeB0aHGprGy3WVZFl3/81lGK2P3tkIswWaMKJt7BRYnHMAC4nE964BUAvNVWsPcClmM3/15CH3/FpifR75N6Be1lk8RkRX+SYW8ThtaftyQQ9MRv86M3+KikcW7zaQ4psg6UV51BR3YwhUrGbFZilsMqZyVOOXRUSsGaioWF95r0Lwy3pfxnfgRcRLdvdDzHkheDTE4jY9oE9Ie7/PIbGGrp4LlRGbWEm5sRyybvW5IBjSSBLX3N2Q6Av4yVMBbE9O9qdbcDjSESFNRxt root@88605d54-ea97-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCfq6JPUrRybwsOi5xCo5VEWRoemigqoxFuBS+XlH/poXbRbhmHcEVGTb/ajonHQH1HfBD5SjmecvwD+9PO0U1qVvXSy63DmxFx477cspvMT94UkVX+ugSiyLXf+i+uNkCb+cRkA1apO5GJ/RYY3px4MO1gWlCewnSim2sl832obvKwvH/OMhHX0YuCnst5gxX27jrxtdg3mpMBeEUiRJ9z7r/G579t4IiwGYzoc6DTT6QPH/fdzxaf+dnefl9Lrdmrnxqc3RtoiaO/dEqlHWoTGEpeVMtl5pm3Eta5U6oHzwFUiz1HdbB7/E0a1yRUaxduJgxYuF2N/OsfDXErIn3X root@04bc6c5f-ecdd-11ea-aebe-3e85ddc86bf2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC1BRDwnoVpaS7YEsA7zIXir5n7Yc/rKYCJiJdbeVZZxbuTpJRRaWpoB8luN9s95TId43qC7Ppmgcwku3fsR7lYVzSTPgsLvFNivtC1ZP9plncJrD75DN5fIpWDIKLyE8XbBDpNayP6Kf10rnF/GsQ+3tmFseVQADaNBlFgFihd1lKa2FwlrMTcIbrWCrC5cWApcX/96umBgogCW5EAW8UR7oqSW9c0bUBGAwaZ2iIoxJg/UZ/fF/RyuiseYQmghBQVEmbb/h98PBoWJp+KOlO4sZ584zIO7/MJ/hQ2EiuOfpIz/XUpPC/OJiiyMtCyAIXEecooceGOXJPUwlHgAZ1N root@7dbd5092-f135-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2i5RK+zobw+G5KA5ulGIhQu6MRcGwKl0QuU+4xSZhoo5sBXZlWnCg38yMHxJXtqOO4mAkO2plAHHiKHJbl27sE+eNfoU5jf0hW7MWViAUaK58eTAYxMjKmom3gVKdJIqV2yR/+AUl18F7Dt/mWIy0pBZmE55s7jQPwUVL0gybbZQqKYSOZCZuoDP0DzTxirWp4heGd3u9Ce44aXlkY2D+NX5GtZHqCCAWmUGiur5fL8R/KF/ke63VnB24Kjgdiq5pu24fBQYaLL09hOOOnhyDD/loZMhd2skx8LG/FbwEzC0c1/Co9jWFnSPsIVllXI/E96wJKpNrdNFiBzXb7fYH root@fa46f85f-f241-11ea-bd49-066a8cf01e04\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDqzgj0CK84zEsRYMZVheFXDxqEIOFWbyMl4Nq4DSHOYc83c3fK9jNrW1LcC6Ob3z77MALh7woJaEZsFA89HD7smsWzoSG9O1o9ZU8OeU6unDnqDSf7BualkN6pp1skJV8FWJFeA8sYbBrgdCNuvLeKN7ZsEUAOyaXSsmE404Q640GcTpkSX17+4Fw+1cRud9owm7i54cDKAduZ8NjBtndQTUujXtTpg9XJ25vT33Rs1EPiHKdC++IBDr0Wgywd9i/w4hkhL8l0y2NdStl5DKRUZI7J7UgSJ1vrxxV5YJjfJexN4z6xx4Lt+XthiayOAjGdv2igzBFwGVehWGaFYzRr root@59a00c58-f2e3-11ea-84bd-b6fb6d83c68d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZPuYbe5/X3MAwVl9ec8qzSb7kUZ2sG61x+0KXUbSvPuYmQTWc2FA2OMRSnl4/zyUdWRbNnoU6gakDtTsVwyomyOnnU48qFwo8yLB+FfuyiMBjeuLjKgN7HJfkcoLkvoIUoobirJKBSzn0VH/4pENejPaQ/tNIUNhR6aVJlFx74Ey1pcxUWPX4HP4pKiuyE3cJdYylme6heap4MNdm2BJ03k7pmAOTXBbvsKwZ2t88EUyN5AW+3oldKfwXTPS23xVa3Yihgln7F2VHqeeBF7IODMRJwtIByckOPje1fg+BPbM0BqmVzgtn+SfUvMAI3RKB3wVR74TXDVo9Zq+5cuev root@6d9e3f09-f3f9-11ea-a379-bea988342348\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC1+RbMwRmJllCxzVVFTnOWg0EbCAREg6BdSM+w1wOWxSSKyvWQ1afstDIBd5KP64qbUdS6xreUaFGGQqCCBeFv924eanVeUE7KaPdpy8YLVUQODLk4YCnHZgqYqN8thpiIPvYl55WNcpkYIkI6gV0mtkSlFsy0D8/mSoADH0It1IQcLxXnwWP1TSZgRy9h9e3S8V9WsdMgX1ywzgO4QKO5L/zPdgv+y5fa1Eg1ZppMC3r3Du5PIgDW3ZOQO2URi0TTAlRzHGpM0IE0hCktlp4BS3m+DWs1BQ5oSgIKTwKcF0O6CEwjslFj7LAgKW15HY7WH1dvE5nrsPqY2YwpTzf1 root@810c0192-f6d6-11ea-ae6d-8ed64f3416c0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDB+OtPpZLcMBb55Y08C+Vxli9MeoBuQj9UYWgZjbkkh/VUERrPkEpr/5whmtxmG0kABMwKwPNbi5c9uRgbtUzCh0Q4rFyYcvIdKWJI3xn+yiz8NnJCJElKBnPd/q5ViKSsoTe9zozcmzuqeqBd+FTEj/iYF1akKl/eJf9JoZFAdH/GpMR7przPH7OIwr6y72uhn3xozEuFDURJgsgOdg1G4oAk/OBqT/sL2x8GlgVKTzMEA2dAxhsrLqGh1F01lzziKPRtJ/rJfr2cDNij5LlUmbaGE+E/V8v5jmooXTLKmO5sC1RBDWfnOKIIoGv0SZL+aYQhNdFALDfGxbZXgWHH root@63134fa5-0902-11eb-8b01-e6b73feeeb4e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD1qUVv0ijMq0Vdk47mMhjY/53FM9xlFBKzLEtuJkbAEz1I1+vXF4/7QolPsehXRc3Kp1H4fl2YtxouKGtkIhCvFXxtWPFxAXEtewFOQdbZ+ICevyh5kfTu9um/AApRHHE9yiAfvzFcYkY2Lpyq3LopScR7bbY24jhxA2WXbfsTsg1FKVgMX3ONFskQsOsnl6zwJ1RxOdTSkGiUWf0+fSFjOhub/PGfo0g6wCtrY0qErO7rMsMgjth7vnM6niDccHMD3qIoPV7LHVBMHsOpb0Um3mjXHO7ftdzoZLx5PR3vEfd77Ojvl4It2gSce6nTUBFd3JAzgIFVSV6o0bcHnZc3 root@11d654d0-114e-11eb-9a43-0aa5164aad51\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCzZRF2kBRWRYSN7c21XpG9kKSAoc8MSaKyevlxcqFFHUeQgDzCBEkVhizgMl2WOD4nYGuw3N/qtqleN2OVbTLjZvgruCGmELFaqthIsgEGr+FGVaoXa3yOTnVGP/qh7Ho44AwFONBKZE1Tu/B8lNmlZBEXslvZDd8xUZEUMXU182XojYXE94rKAQZUb0ascsM0HO8FfAPyEW9atUEEBKugApDVrdsb1CGaBR6PbQCgnxDxpT/NQazFuzGLA02fMF1LnMCHScs92WEVMU3rlBpUCm+QhvZ9+s4ZEQEGRegRhZUxWcO4ZN53wwnykt9dMyqdZ6S1o/bpTnuh2gPFQxsH root@e2da8da6-1411-11eb-8a3c-66d0ef5d093b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDvaXKOfIKbPXm83NSfrsbWKty4aGLwl6+EJG/Vl4s+mCzdAuEXwUmkXhP/s8+6oYXbiEUcBRejHk+ixZ3+0oOxQpOqvlHZZeodVrRLkaf2lKbHE3fjunQCLQOhwPqfK0yfb64OrjDIfSDpCpWztmFHxvd9gJqDGWzbQ4rzV+4W/ZbHI+wmRq8sZtJ2ZBpFBjCjJxKXEFaWk1krEtMyQYmJGqhvc5g8gLWuKZnKjTBnudJonDNNZ+NRUtyKHaV3CC29cb8Ta8Z85U4spFV14NBt+wyXq9W/QeUVYIKwDlXHMK0A+lE9dS6a1Z+g4EqUcUbMDPh1/9SlQx8HGgJwpNDD root@051e51e9-173b-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDkRdGKmnQPbxosmjSRpSiVfsfsJHDsr8mvOI9ey/1raO+dIlMhrHmiaq2VhLLygsjcFDh8bg7A/8QHLITyx2X705BkRqlSrm0KarOS7lHWjXhO9clk/49WflFOr3B8TB+3E08MhieUh2JcUY/jMIuLqxcbqiFzdyrS8esjohSaTAsasI7EiS9sG/QHb1h5Hs18WpaMqBHv9YiM3GZ6F8T14qBu4aOPXGlOFDlzELcsMs6dOcGvmCrdfIbb06GAd6NoN9F+8YIxX8PWc6Xchv4/dHWaP8xQaZvqUj4Ee8p1a4scVkRJsvbN4lgF5pQGYDZzJw2IBjD2YK25u8Ff2hhd root@ff6fdd2b-1a63-11eb-8779-4e6ceb30be03\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCnX7L3bdstHwHPO5G2kdhZtGulNtJeeUAxBE+9+0rUJbBhrlkzZ4klFnbY3YMdjsGq0bCFmWmy+HL3iTiGld0JHmvIX8h8bDU9noUjYf9goyKBzQJVcSqdvLIFHd1HLj+0zfa070ACkQz6r4a6FYcRrv0eEqT7ufTHsiqLhVkqbN7qRYyc9pm9KlGhoJR+n1kzivmTiCYOqOEQ+xIzDVcaFytaqxy2H7RpLviyzDMtxcFSbjxAD0keEIAdBpbyoLYqYU4o6xtZAjNhCNlpzF1+KemsYBgUMeWCMdzFyy5+lSKIfK8yKvJqmk+0mor+jNWt98aFBDQ2FzVqxTDL5Tqd root@b3ce6c04-2eee-11eb-9b0b-d6a9455c8be7\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCd9CPWCiOyXRUAQR53hNEEE6A6eQi3tKQzRXKwSNKcWFIEC9xKCaTWSnBc5CSolo7msZHbsAH0CtcIxqTMOc1Rc/Ah1sUhDHdUXQeD9SObKQaM7YYhaXiLq5qqjc31oJ1zd8Abzerd3DtGEU2JhuR5AsvrVnVgvhfNFP/YH4p9tI9b7fQJl1g0KUF68Q9sO+d4tQfNryz4xkQ1lUYM20hYB6EqfK2D8gIpigrr29qVLZIk6HWEV81Scw8YA0zGZEm+QEFF80cHNbMz0ZPE4zZwBhRMbr0iL0sPa4eJ/USi74nhuY9elTwiKHMjoxShiw3VuEESYvZARuPnI0CHjlc3 root@38e4cbf3-2fd2-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDc+ZYLVRGZN05Sy0ZRqtXVnl5lX56jN4IY/o6Iy+MdNzrIF488n8KOdwtWZpOkGOzuV1aZZWtDUiHpFpnUISo/E/7T2zcDrmpU0XOQIWkKXjtRqfrlSX7bLdcTploMSmSDboz6AR+SvSPD4gTW5sKmOZT8MFk74SnBwtnm/Rlw7u0QuLjluL5HF7d/+e6hIpB+B8xBt7I6byJ4q683wxs7oS9j4eOdeV0RahD1vtfKcmNsnKK5SWKE9BHf1rY+aZcjjf1HikdBbFGYV3VqBfQSM4brmeopMIXIZ5NnqBe5fz0/PyCUkrzw1S2yJdgrZ1kcljlma3lfDK5MAjHgKjeH root@5f453085-4b14-11eb-af93-4e5abfa0c065" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T18:01:04.199-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "469478053075-compute@developer.gserviceaccount.com", + "id": "3255996043343352736", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-055", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-055", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-055/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-055/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-055/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-056/description.json b/audit/projects/k8s-infra-e2e-boskos-056/description.json new file mode 100644 index 00000000000..6591b6ac64c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-056/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T01:02:47.344Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-056", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-056", + "projectNumber": "698279265353" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-056/iam.json b/audit/projects/k8s-infra-e2e-boskos-056/iam.json new file mode 100644 index 00000000000..487cae3a8e3 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-056/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-698279265353@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:698279265353-compute@developer.gserviceaccount.com", + "serviceAccount:698279265353@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-056/service-accounts/698279265353-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-056/service-accounts/698279265353-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..caeb365a816 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-056/service-accounts/698279265353-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "698279265353-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-056/serviceAccounts/698279265353-compute@developer.gserviceaccount.com", + "oauth2ClientId": "101393840987161207127", + "projectId": "k8s-infra-e2e-boskos-056", + "uniqueId": "101393840987161207127" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-056/service-accounts/698279265353-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-056/service-accounts/698279265353-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-056/service-accounts/698279265353-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-056/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-056/services/compute/project-info.json new file mode 100644 index 00000000000..cc6da71da6d --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-056/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC43XLoVEtKvmYAfxtmBowx/M7/PONVKq1HRYZrDT6xDmWcaQR/N+fqCnLc+XPl7miESpl+y15qzU2fZjim8WLaBUABJy0Dfz8WDtD/LKOscXu3XDstkjHlFz8yaFvpi9vnws8n7C9hLjFFJ/iVKtMq0+UD/wUcYxrXRT30EKO+tEwDgc/g31ICXta1+UwdFYp2CU2XvUx9YfhpSK9W0L1dtw639KGYLxldeSiVCwqiTyBqY37Ugx9ILePfJP+cKgHqCaCVWLcpsyvPe/wDmBGahIEpLROufn20iEK94dl23nMKhPzGJX6N0USEmFdrONwmk0tU+dCWq6wS+9UdOQUf root@86f84938-e76e-11ea-8112-a64f894a1815\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSNyt2tG0Sq2lN4uTUcMkPBKq547tcU9JudxurwStghvGFC5Fq2z3AVeN1JbCWm+FHy/SVqNdRomRKqMVH0Ksi7bv/uGc8ldPIWGkzkDpgMZCaayKR7Gy7AEMFT7eyq8b2xjXe2fpoUinYCIT6MCMxbO/z8LkeUNBnqLWts5DnvmOg07a3qjvhqmrF2xyz1miW1jIi3gtnrOaFSJHlEp1Gfl7xzrdDIlMxw+0rRAiSDM9/71sZd7N/eWLlhJ2ftrkn4jUGSIFCTVgesulFoeHuJdhkTx6HMAIA6qdKDTzuArYgzBMbAvHtvXe0PDS5Ne1AQw+C6LogtFbAAhjU1RBR root@4b0d22bb-ee35-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDzjcLw7K8TMmQyFAi7OepIO6w9gZswC8UukyL3ugGG8gfFBbj0q6KNxcEc0gDjMqq3IsbZ39rGL5+gHKBx3bc9wYU+rhEpwqw5D4dI9ZXd4AQZwEikergnvxYqNc7yHg4EMNqXFY7NL/TowyDrGYQsGS6OAL0k2EBB92kVp3ePPgB6E+82JepxK4TroOas21V32GmcYDH6VrQh8ij1QPdbkwvkS/i7KPhbK9u7xcpXAMb8KL3KpHaTLPkSNdxlMw9//LmLPfp+SpXjIAxU4mmvMkGU+64uiWhJJZXi7hcPFMc5mN++FtcTr4dBaPx4X+fqJDbEMH0qXbVw8BIvbAkh root@1e85e5f9-f2a7-11ea-bd49-066a8cf01e04\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDL8X5YNvaIGa36ZvnaXKAJ/Ctk/XG9Mp3WwOcJU2ByPABRWNxpxWAH6V349ldxU9w07047Cz0dp3GF21f0x7ANBv6wOqK0VOjTi6W+9BS0DL2ujLLDisBmOj8hRQ2vC1CEDbhUWXwl5rMWFcv3hXbyLwLHpoZxzvAUU+xuxEvWhtqXJ1pM8fGlCduY+VkUpuEb82C/r0Aa5yCO1fqZjsqikBGs/EVNQozZ/QiLIloM/P69NhekQKaOoz2JSobvqQLRJDkZKOnAKn3qqTcWmcRGp/5zrJ/trE6nC6jL+iAqJfjPgs7VLRZu2UhPbvvfGGo8o/zZqqTXmhNBzmySwvn5 root@fbd7043c-29cb-11eb-a35d-7a1d48297fba\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCvP7R1av9oxaPE5EgEu4J0Ezd1DeY28cPn5pvkPyFr6zWlJuMOnptGFVXieRuDqc//Lw/lAGjueM94uPP9yVJaYORXty7e6c4+fQy3rCdE6OfC3mQV3lGY3kXuwzwPKlBryyOLeZVqE9oYNUg0WSOOKfxiO/8X3XrFqYtaRhRerUq1737ex1ZKQm5JUaQXo6fOVARNKdGt7T1CUizwmRVZPErpCVBCxnS+L2Z461fDUuGRWMoh8Cl2hWsIELE8jY9i49yqQxDEIfO1fHa+Sk7gc1IwclIlUFo4rr4fODt6JeCpUW6C/A0FsIUh9CSZugDTKHiKjbF3w9TEbyEe9uVl root@d3cfbfc8-2a17-11eb-98a6-ba1d66ad0079\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDGt3D1ZM0v2Ui5vLYyaNb4rxFsb20XdxcSL570ApoDzkgUty5Glm0QJCwTfPQdZ64d4n0jF51Nip3+b4tcAnTkqnBTOqmHHTiyql/az3qW8lLOfaCbshw0h6ecJue+R4AmQG2+PfQDCnf08AUL/N9w96W33SOyG0JHQY8fnIoeVifidhkk/4YL5vddY7Sbwp5rFn6mY7yU4jiRuVkSq5gA9u4NKzX1bYYx16tqgo25/C6Q3Y+u/tHhPaddZoWYvB6i4RIQH9xyXRJ2Kd4ZXcQiqoGxZB85GH6Z0gZTeNj9Bmt66z3ZhDCVcTFi+qdhzORJPALSMHMzAJsiscLiCffd root@ea78387e-2bde-11eb-a59c-42dfb897bae6\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDLZbGHAzfYBL421EAu7GP/XhwlBYriNboTVTEcKWaLxHtUr34viY16yOE8yUGRBUWPJNPocfUhli0TwYZj4IyaeT8WvbcMA2VWYL7xrlYSewpTr2IpQTLlGnKkxBwjR1Ox93EAWTl4YAWt5xDxP1TR2JXBEwoDtV599GViJDcQ5qYjAGbOyjMjuhLtyBPaNT80i1EmHjZ1fnU8C3SWqjCdGa0BjKNjN7BFWnmeFCQCpgR84Rt1Iu0D6wuwCfNCB1txDw5U3iSmeArDckGQHWJGV1rLMJyOm053aLXKBKyt+vKGTO1rOqfQre/UqUcPNiF++zTY34Iv/p1KAHOVdz5B root@c230ad71-2e3d-11eb-8da1-5a2e729b6dfd\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7apVW4fG+FY8oPLXb5SLiErsKcov0e9wJ1skYOXjInPrhFI5ul8LWPdlCtZFOMUQC2tMkVilrS0Nq/kUmM1MuScKsNaxhAS82wtYxh7ElEGHP7krkV/yDQgH5HYDcL8+i8Rn16/hqGDn3rkcQBzwSZ0XC/x8/CSCz7Ka2n8KtByJj1BNhvqAmh9qVH6q8ObaP0c9Oc3KWhoLGSpcCxVYuPLasZ/7/9vIZCYNkbyeN7ALsYufv2rfbLhFD61q+scpjIapOxVR+Be+98dOFsZgY0ZmHfKDcAiVpQJxWKKyzAy5CDt6RFTA0GxS/lL4fUcZURn6SE7crDYHu9O1+Pz3Z root@37e42ddd-3134-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2ia26O2Pr8jaVOUJ/lomUzFyZve656bqWhN3pXNpYNvlTgw4FwUbCMFoHWRw6VrFguNkAJaZVnNlO2zhrXdaz+E9iN++RwU/6e8tOSH+I6sR9oGgarOrmUPGhqPafcSOgLsuOp5kyMRA5W/5tPqLkyMCDwHDq15+E/3Iijrj9z7iSe354gSo0lme/pMCOIBWXeAiiipG9pq4pjHBj9lAY3NJSb1Zbz8jGxt/M652R+N/LMxR7h9Fuk4OzJEkfLqTL5BDW7/d+2T8+ocH4hNOMPHHUGbO6wdWUf196t+UFiVT7X8HSjgPJdLqvdSYS9ztvh11esbfMjT3qHFXMUD8V root@12a85d69-3393-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDYFV4BUzBwGAl/D2d/MSfSdIMRNu5u6JJgwLR7SvleQ3kYXZuIs71M/KihK5b3HzdfcSc9QX5Sng/QM0HzHytibfsslwb/zw4Bkl3cXUDCleIYAFz2LrD52Byllw65hNOh/DxOuNokztOELykaxi43YB43lX/glx5ezU7/Mel15JQVMOHu3fwghiqd+iZRPxBtOcd2KubGA8auvf0imT81lrelGSQ0s35nAZl6Pi+yrAeQgcWtvnE7AK1UnsvpWH0ErLMG+itf2Jp70tfkT5s93uWigsuq0oIXckh4P6CUwDqcYEfPVhVPwBhGh0jL5jFYfNlfDFIBO0iHvJm65VDZ root@c9c7a6b5-342a-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCj2+qz6uTAOYMaii5+5WaOFthfAh6Kon5qPojGSJQOJNiy2S5SPKarzgdfML2+YTrIFqhjFLAaAfiingOe77eMw/uTvyfaCSMZQeElyZcMA4XRYaa8gdimBdUIJ4NbvxOhzkjfEQwQ/QtwfvHgDN/xjYfI2hFZABWYBAmUnrK1BWRaW2KnXewKnX/3ytAR6DqYDLqP7vyffzgvwMND7I3WLN8CvxPtGvrxl2rIigSHSGIga4769//DgK+PU6tIbUMX9ByoKxR5B3bYFoi/0DkZPNd1zObg/4oBtSdYYT+gh97xYicviF0nsFzS90bTUDCg/5XRXWZ69Ed54vEpWVwf root@c1765b5d-358c-11eb-9896-aabf0c108015\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCd87idAV4CZRDeeZYQmLexfVN/2bayZVBCytiedHvTOKiLfZWLO1JV7I24v5fT/xl5DqCOKZnjiRnqas92WGsXIxJFRw+vUL1ztX7gKGjI6IOSzHySnBNQcNkeZ76wQAj0uQ87rg0HVWAaiFYyJqIRCUYpScpKCZ9YnrdQKEZxcmzT9Afe4u6UxN9Owc7aXoFN4ZQPjIqrcI/auZeVJFtLYLKSjFOUeEgQmYyF2Qa0jMmc9tC+Mhv1+2BemUl/Ngk5TlNr3nHq5/r15WzRU/0SPnTjSWdsUipcrLegaltJ4oEjMDBvqTUGlIgyJKdejhsxZkDxU9nVuixMtOKRC8w1 root@d5d63d9a-481d-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCk3LYj386LjSrqemczLoZMnKCW3xnSGjODrQ5yxBfLuPw2yi4TaJJ5JG39FXh4mJtJ1rr2OVnrGS2SFcGxm723pBSLE+Mw68DLj7lX2QhrEA3+saS2YSqQGhZyduCFZtpzBg6JZUr1Ar+mgG637Q3kT0uf05DJWVSpo9yPNZVD04Rgx4RwcCy8ECx9zE9hKOwcTk0ctYP0i4+rxleH5eeDKeMxEEv9u1WIxRFho2artrSKhrGQ9RxwDqFAWijfm985urRulFnUCLNc4dDML2jBqqZ8Is0FOl5uPLw08+Flygn/IB2nztJnTVGf3Il6NnIhRyV16+kMfzrCfR/BLPVP root@f1778ec8-4b46-11eb-af93-4e5abfa0c065" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T18:02:57.829-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "698279265353-compute@developer.gserviceaccount.com", + "id": "8483380007497814830", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-056", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-056", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-056/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-056/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-056/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-057/description.json b/audit/projects/k8s-infra-e2e-boskos-057/description.json new file mode 100644 index 00000000000..b8d43aa21fa --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-057/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T01:04:53.971Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-057", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-057", + "projectNumber": "388686725344" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-057/iam.json b/audit/projects/k8s-infra-e2e-boskos-057/iam.json new file mode 100644 index 00000000000..4b08f6b1440 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-057/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-388686725344@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:388686725344-compute@developer.gserviceaccount.com", + "serviceAccount:388686725344@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-057/service-accounts/388686725344-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-057/service-accounts/388686725344-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..d6c06776b63 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-057/service-accounts/388686725344-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "388686725344-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-057/serviceAccounts/388686725344-compute@developer.gserviceaccount.com", + "oauth2ClientId": "101003281475510143130", + "projectId": "k8s-infra-e2e-boskos-057", + "uniqueId": "101003281475510143130" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-057/service-accounts/388686725344-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-057/service-accounts/388686725344-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-057/service-accounts/388686725344-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-057/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-057/services/compute/project-info.json new file mode 100644 index 00000000000..ad9d34a6333 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-057/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKCcngCktYLBfYRu2wTBZ8dipF15w5iVzo9BYh4/7vv9DYvo8/FM7cR39CKoF8oc/X7602MrrkQtQD0EpFCoBsUn+7B8ItRNSWNO0TbGrcQXdxKLSn6j1GIpmFrIzr4qpzDuH8aMJlrV8uG4lBpwg65mvdOpg0aGrf1dneJaoqzZ5NPdYHA4c5fR1970ehF8RsgwAelGAxG7ToTXREp4yoEvtLkbfnggqXcMjPahkK430r+qe2i9nfsIP+I3VNTpSon6s4fngpegvnpdfh9cOxVOnHiKQI/VVzV28OVmvqJmW2cUgOGII/MfgQLt9N3sKFEjF7tMKyKYl4g0PsjSrh root@a76d310d-d968-11ea-8c1c-d23af84fd26f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC6fE+aZC5gVSirWgYf8P/hPyr2TsA9nkAS3wapG8wz7h3JlXTx771jUCZZrH9LnDJXYeYq6Hrzvlke1Il28dnNscHUylxQkDtSaB0yv3nYvQ9L9S1GlEkTn0Vx1uXUJkfHYPo2TV0BqpTy8wXOHs/a8vTJ4wrZYCjSrLYfaAowX2d1vj4SvM5UVfKhZ5EPwMklGIZkBu2PJC9YcOxiadYaRs4BQMsu7qO0BdH1o1XNHkF41OuR447GrpSIagWhOXTEMwj0j0KeXJ73KRjcPUa3/LmUBNnyPSnDaa7PYnQ6s23nih19o0DDQkJtLtwr8qJlCemWQTz4zsC5QH6gy6nj root@fc94a98e-deff-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDUCx5u5SULJOKT1R3bufzDW/3WgzbJbqUDIgI9k/a3M3/ypFtimRkSYyf/aoBnhlAnLvbYFJwf4a5bxMrvwAt1SDYZ1BTe85290QQWmgtE17nkbdfksxD5JRKryFLVCqwLg1kKC1YiyVgOiIo1V8gssCLsY7vHDECNuIJWJuV+BuQMyQW4K1Fe8qLbKSqtmNu4xqSO2dg0uXVmU87fb3kfIXO9arco3Rw0Cr5TakFUCzMSILCBSLUnEP/SVEKyHT786eoFEYY6Qiykkayy6L+yKChWssD37hJWDkpvmyjlMKxSwql7ZCMx/OC3LKt4WAc2DjrP4XqKTG2rv2BQ+DNB root@dec4e5c2-f4da-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDGInxMTl7Ir2UWhXnart1t6yvvQE+dN47EMfVYS3ghwQw/6WgVMKygQqyt2Rezg6iP0/ULnPipZlChsNiJqMP4q1GbaTrAV/Ke6YnkQIoh5uC7hF3qt9qJm5YtrxETLFWeg6JrJm4S/j6YYYoFOY89d24jT7bEGvGi8KaMHMKE5AKkDtMfND6erjNfo+JZPC/NxUIRz5sPjf7Nh5znGm9ZDcyWupsf+w5eNxMpNx21CXIlD0BYQXhMvnNo1/HSPDtBQuzraXF1IXKz1uZ6+Gsavozxy7HXZkAJSHLtVD8YbYrcrt4IQJN/iUNpirGLHavZdwTTf+T3RsJTCw6q6G81 root@3fb6a215-f6bd-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+GS/edbK8nOz82MMFi/SeTiR1Wu19RcZsmaMuTtKv9j1xG22EqaQS91tTCRaS2lZToA896ANzIGoeR5RB5Ki7dnkSYjCWTvyvFNsP+Jehki3xkmzdhG0/overzUaqkDkFfOgQhI/fdw+QmgPVEKFDMra+wDRDc6X6TjZacipoVXWqVLqUFtihNWeHoW1Er7JJVwIG0RzP/+oXJ7LLXxyRypr5v+06SMzUBcgoYsvx67qrdc7H/N6fVFmvumCyNUD701LBrSJs+Fh1clcLo05fQwdPWSN0P7EmLBq7KAkHuLKwRxtJr3iQVkTdd1JUc+JJtRQa/KCar73qCyLNhAOD root@cea94ec6-0657-11eb-9dc4-ba187aea6a9a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBqieCv/UgQ6fmYRbP/TCfCTjCxlLwkU3+/652NKN79qj2mnX6tutwIWy9RXcD4zX1XNKHPIRjOlsaYknwWlzbD0YhOH2dV4RyJTmUUoM5pZgzHeaUJy1IIaZM4qjZegc2GCo1F3mZmuIb57cod4CW+x3mTJnA2Xqlg6MUamlFc//u97yec9adkqd5CQWNy4tmpI1VqVuQb4qreHLB8NBv3vbHQkVhNF4JA3R+gRv2WInGDj5AmHRfXU1++z9tkHd7ZBg5n1pBoFGTpLbS8qh94HzGqpnmXadQ9L9CTNyNBOULXynvZYnYsborpcyu9vQsYnEnGtC4/rReJ6jwWwpV root@998a4487-14a9-11eb-8a3c-66d0ef5d093b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCaJSV3dUkY75vO0Gy57q0kkcX55nPvEH6sqtQHbVQ6lzHw6BeKWM8uC2teR10/6QNv1Znqvj7Qt8hmYQXlXgz8Q0lvIbCsChCzQ/IXcJzvEXj0cVb8amMp7sl4Tunjojbp8bKv6ntryhUbtTmYRZG/MO1AiZKw4kEc79hNBUSCAiWvazsKPMOyZu1GcxszCfa4HJWMIoZTdFsGWgyFfHArIuHTqDx3Twi8WPSMmZl0T7Oj0UedXAKxilKxGHgObA0GpS4wkKVAMY0nqaqfWM5GKAw4ZGLLWp8FKhI2BuklP/p+5k47jW3t3tGbLOSnZZtwvQCKQu/DDMaRlGN6AOmp root@754c7aad-14f5-11eb-8a3c-66d0ef5d093b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDqqt6M9CXnPLfFFbhYkHa4MnKdDAD4mWfKbk1C+iKlFKDJhvySkAm9KUAJxSAvh76uv+FTv6utE+gD+n05P0PLiJv02cPV24omBTSva7pfIhYQaoE5TFe3YVvDHWjAcNaMJg57JCJZ4yDP2H1rDasJTRgEo4ZdZj5zt0sjNgBNukOwy5dsQaJSX/1hFd70HgosIbGGAVjAFhgZ+gQ2D91CsLhHjHjnNHprHZUM45R44EyU95BZwF+Y/CmMD5T5c3X2sOZC1A7K3C+gC1PB47nC45v3Rl1XkPgsd8PO2qb+FSi71ng2PSeW/+51T4+khvPI/ACT0TdsA6NrGnX1WFD5 root@f89407be-3e0a-11eb-a772-a610f2f25584\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCoCX517YHd7Z8FqO0LHVOav2S6ocVe3YzTG22XFHgr5In3q9Lse/BZz7oNhglTocZYZDHUK14A7FneDT4vl8anN4DZdzCStkymugeli5oUejn8IAs28e0dAenzGJIU9ltqvxF7ypcEiqqfK634l84uvUoaCNyUcnrQkUP9MOMv/I/GIO7W0hML/UTULdjv6v3h3Idi3lodRuq5WzW3iPKWT/oXOPfV3sez/VDuQ6p76a8Uf57nKhEgCN1J0iD7dcz2HcJTOm7ypM93EgiAtJQgKkPJRjm85eZPvgWY5R/PnULuMQIPosEiE19iJzccREmvAEvfbDCQakevgeQTtpeP root@160d661d-4afb-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqwGJu1MsdhjSaoqEloXG1E2I8gLlUzpo6tGfTi8zBFlbkt57TSo0Ro8ntsri3hNruzcNzjq2LXbU3/HPMS+8pxIza0n30LfgshoVojVOlftYs2+HUP8SWEeroQIMVcjn8jq5YqnVWHuPB1MRSoF54BlxKXS7bybOwLGeoJJY7ZsV1oRmrqePFSxxeGZkp/VCn9ML7HGL+ojzBKmgiXbDpzXxmRCwXIry/l4XLdGcTmJYyaNfGO4vVe47zyc98p2hkhH1j96Y9NG9xcjU0M2Nv+bVkQ/6X/ObyyHeVqt+5BDyy6e236OpFaW0L/FeAVJlLe/dG1fK4wHn0n5HsdJdZ root@a6a5b3d1-5004-11eb-ae25-d6360d0295c0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCn0gsZ0LNf7h5is3ooKLTRpB2SsCfkzrUYGsDXWejyJ5WvLHKyoD2lynQq4/Lh937w71LjvHgpe7+0utVvBm0xnPM/G+QO/RfTs/XG2f441VvNz0k9MaKC+mM5CB8AMwcfcTZRPVbTo23ZB6cVOUC4B7Zp173VOkXGSw7VymQYyPMLwFg7Ls7Eg63j4pEqZx3XYgshOxoIZHY0AMxsa1nkZYNtGT0mX+98SjFLAWWwwzyWBFQtS1W4Ydbvswpzur6c/VDwY9S7ZPaxP1MbuIauuU0ui1yulcsVvOjObqCpxGvvucTTBm481+M+mYDzAZ5o3UQY9OrMie6SAI6tl8z9 root@96e3b2db-51cb-11eb-86b7-56818f023517" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T18:05:04.515-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "388686725344-compute@developer.gserviceaccount.com", + "id": "5695959851735109807", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-057", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-057", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-057/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-057/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-057/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-058/description.json b/audit/projects/k8s-infra-e2e-boskos-058/description.json new file mode 100644 index 00000000000..afdca553d6d --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-058/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T01:07:07.183Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-058", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-058", + "projectNumber": "538229256230" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-058/iam.json b/audit/projects/k8s-infra-e2e-boskos-058/iam.json new file mode 100644 index 00000000000..64f354a147f --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-058/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-538229256230@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:538229256230-compute@developer.gserviceaccount.com", + "serviceAccount:538229256230@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-058/service-accounts/538229256230-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-058/service-accounts/538229256230-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..8832c6604c7 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-058/service-accounts/538229256230-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "538229256230-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-058/serviceAccounts/538229256230-compute@developer.gserviceaccount.com", + "oauth2ClientId": "117301017444081253150", + "projectId": "k8s-infra-e2e-boskos-058", + "uniqueId": "117301017444081253150" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-058/service-accounts/538229256230-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-058/service-accounts/538229256230-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-058/service-accounts/538229256230-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-058/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-058/services/compute/project-info.json new file mode 100644 index 00000000000..43f7657b698 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-058/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDGlqFymZtaL6U75oXk8l60aiIQOZyMSeN2Hx6+zaU3UBIpdA3uoZBkcmSIWrqEdaN+iB+h8KbqKLmO52clDWx2I/gw6mQhjc2mYbTrFOBwgZDJHQnb8s+M00GZTF7MxUTPB/BDlmHaV4nUOYyIEUIITIl6zNCbff9oGPiJFwz5OzZUBZ4JHy+7NBxnZuEHVqcRlNYylt7s3obUGfWL5HaKhz+ziyRAIKUzwXGKrICU1ObGVKzKOPvzZWlkXx27XCBKtQxTg+2vWZo9KgZ7GNTX4UYiRz7m6hh0ncNZttRrN4eCCc55SC+Zny8Mhc8fri69nNy2x6mm1HgcoSTBHtHv root@443ce703-e07b-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDwxcr8zbtHMJhlmoVd6KJ3Xnpiod9hGXmQxTbQ9aSK12v/AZ3+oPOWlGttz52mSo6CZdXmVYt9WfbdOZG05+kc1+hIo1fQ17TqeAGDHEEI+oWuwq3wSkLhJMAWs3m59/9+hST1hrKzu+3EetXVCW+TRHl6C9b/OJbjmQhG7Z8WQnc3ghpsaRMQpwFI7/uAjGCPZRAhtVa/3T9LtkRRtf0dyah8Cw3nfyMABlOElcjObfO5zELBCfMytlb0NexkYi/O7GJcNxtASaVL4xZWRmyQS9IYm6hdoDRY3leWhYRdSmq0lYEeYpixx/NHMoLqYCgde49/oZ4tQIZoz+GG7ugZ root@77c08e39-ea0f-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDhDFWqo/No80v7SNxJwa5T4WQBhs8wlNGPFjxXWcWMg7ebQRpTXDRk6ze1vEWLQM1Bk6/ipcVzo8Xu3vBma68mVE2jkHOdAX19N9+byOt0UPafo9HNyPp/tDgSl1cTOhTqtqTgELM1hyGeSnr7cDJRobCdti4Cyj1CkofRXxgC9qujoArnAeo9DUs/zr1ueI3q9gbymgHWuY5yR6aqDlpa1cgfeOXKCZlNQTA9KI17wOs6nvnj2mRXtHu4bOeTcsPmY2Y65zyuCjRKaWpxcsuptvoX8J3NAC2j8iu4iLiRJJfIY4sYPwdxZnyNS6/6UqKq/G/neNz+n07beg2vCZUz root@a520c00b-eed6-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDITTLtwiCwE/lCzNrSrvkY/mVEzQ1xZaLoP++MgsT7UDQNlcKPrwWstmgYVkvzHSGDQQ+oQl5MZW/FjUN/UfRHp9pvBH5zdiD7IHb26y8lTOZhY+K4XdIXB6EnqLaTDWILwb8uxDiT4bWmOUwg+v9SL1znOnr3Zyqceoar0/e49c3vp5kCBxSosLdq8Cz+r4KqObv6r+fFBYo+cEy2pAJG6WqwczyzJGmwPKZiSqtQPA1QbsVFbYVkSCNbUGVlZKwG4pm0+nVr5Qwjn2pXKL2RQYnzlV97ODiaHkbHOQiLMsXPkXPgNdWi3KlY9QENxRyPXMZFq0/RLSR9myVewxSt root@edfb3b7b-f3a3-11ea-a379-bea988342348\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDoLOUcBZq4u7X/y3qSJrNPDvO+T0heRGE8dmlHGJNqDR/ms3yfQIwhGkaIG8oJenMCf2l4C/fddMYO8AewhSglBb6IcVSYoO9zzZCVbOgNPnX6e0I3Dc652lt4MZwFXo5afKmUCWu6r6xBTlRY3lOwpahTJ+zdMUKD5zbaIS6mXOxyMbuJxokDuXNOoM77LPdejl9gnRxAFFGEnooVgWShj9tfakRHm8yTzbXroz8pS8aiFEZqJr7mv9VJDWlUY9iYRI7VK7YzNTTf+hUrNGGjV2LLiaPKw/AHJdvGr0Ui8s91aMIohNVVzadUdfHK36Hx+MdqkhiUAkyZYIdbXjrT root@6fd473d9-ff3b-11ea-be1c-eaa6cb7654bc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDN59XwRPHkS1Q2SLyELh+EWpXLOEWvIHaW2U9wACC26x7e2l+kvk+C9uy72u9+fx7/oNwEyQCfMN+pZmlu0gWgrdbqtqX4rOfpgztQfxWIM0MG0zx6mTGU9qzca00daem3lN6CNtbR9o2I+2DBAkrx0Gh6l2+fTZGgtxScpqaYkRIDVvgGYmp01/XybOHBiaZ+nZZhQJVBIWVZLervxOnemLnX6Y9JyCn9/f7Rjqb397/QoAa04vi5QESoqVwBzC9s1spoYgwRAUfC8za2IaIC/Y2JF/EDur+0L917FtVT1TNMMd8ml4pGj6cxT18M0XC87hcdn2hFSAaFuQD/hWWd root@8411ec6e-01b3-11eb-8b6a-ce996ee2646d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCboxwf8O/yRm3GK3CJUO90Lxw+AuT64sdH1AJm4PzFyYM8K4YEgLqPs2yU5EQRdRdGh6U23zJF20LwMFjShtW9TKsuB6KibsHon+06tfZAnE3lFOFjdvOEvHZq/w3BD0HnuhgQrCeEoKOhXIvF+N7UFgI5ywphGctRWgXaE87wBt67NE3Qg2jYB/EpP32zuSiauu3/joy4Yn5jSu3ISqn9/AH80iq8x8pREWazFkRXr+Z0fKBhZq/tXf2RmiXrShhX91NNqWpasEbVsTZeaT5eJbq43aoUwnCVn8FAkSzZhLvkvzQ0XtS+udqgXextU0QNKnYeaL5DP6/+Go5pqMyF root@9b57b341-155a-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDYU4UQ+zZPBgE8fY09Uc5Acvf7UgYtl7s1odNdEInlm+S92/hsxrKA6f34MDY+KqzunkmSSffrt9pJy7bakxTos61QlX2AWP38ZrgmAz9NDND0vtUz9msuvRYdvfSmJRUXUvasYnPUXRaH7y9Ez8eqp4S0shgFAtPh4uwN29WqF+NCvKgP8TGNAgNZCvt81kjjZ3hmMURDZwgQS/mpCIRr+vBSAMCJgjkh1tyEw2812KJtI3csAkIx3xvoWfVYBAT+Zj8cntkXS1gGx6OQZFhxIGY5K9GaT2xJLNqZc//odneksy3nDIS5WMGyqan+QNWk+SLXW4kInXw1jAO+Qq9l root@09d8ce38-1b7a-11eb-99f1-c6d701d1e283\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQChrsy8S2Aw1S8J3gzlzYUksls09dbKsLKi/6Ep9QwTj83akj0U4t7ZPF7hyKYjVPcwHaKl0zGOpxZ63V8EG/RLGTcUZvP/zO4OcWFLOdMnmhq9JJ8737aiAiqIj+GlSphFjQmVWxnUCJJcdZzdpvkIlPw3VbSNEpe/ewRTHar7JKkXgsD1+fDWkY3ncYLCHdwNB1VnxJ1oIoNSS1wmkE3D40s4ftvZzYNlIOR5fEKtu0yYK0vWKs0njlcaRHROeQqHSOB+MSqjYGL4yMR0bqomCePVkO2WomiMUt2IGI08HVbuPEqsv+umrEGdaUdV7ANFggfij/dB4yQCV5PeFr2r root@885d4e4d-2199-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDqFm5ASLepz68BaNgmltJBgEwvQtrYggIJXE3bcdL4MKzE7jp6MiYK56fkNLsU5snrLbGusyG7k8NGy0BSMaqh4FJyduIerVAjizN+kmCoZAmDwSuW6Ydb645t4WfAOTE5yy9/g+4Kk888+cyako3YSWyKopV+BWtvTQr3tBSD0Po0szkfu86wHaQ01IZRHsGKSU58TsL3x7O+nsJI4hU3LumdZIitSqrUdCA/IQwUN/akUR3qShq+0w80Noga5xu2LAtSYLeVfOV1FGUx/hV7oALN7bB6QV2SVOfwv5VC2YVlWNNG7V8XBpojD36cweAzvaPyCgvnfAoCXQrlIJZf root@8e59dd18-294d-11eb-a35d-7a1d48297fba\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqCW14dWQdH2Hw20RN1M7kUw7FK05MvlnWfX8FVFHRqWxzd26ambBPhOd6xMM20f7KWYnB4DQUKjLnz7cGka86zcwJIC57jXNCS4kl70+98h02fJL4Fe63uuxqvXCGKZtIdWReNJ3H+XxGrmnnPIR6iSwgYJYwHDxSiyAUWqrIJPzf4c0kajwrcPpFu7Hae/EiUKqQty5q/bBrOlsz1M3tNwHIXXNqrhhXaGrbwfjj1D1SZfVFCZgxHYZR/e2gGxtTTn/kaGuuC5T+hLawIVQXcj3hJY07VLyKtsWZhVTPV2uoJMsGOB/+nqtnkQ7lfy3cwhq5BRT7G2dNVZ7Wu06T root@12b38e58-3231-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCzFC3Z4ft5dHTnjlK+KPr1X2j7oZyNFA5JlzV0Q10lPrKWnLBDSac2ctMJ3gGYuIhVhWf2n2fsYukshiYpBzEZE4//Y2xYxlEIUjTvZ2zrG+c0s7uesN1NW0JRq1z8bVUhtBIrTx6nX00PYP0UZgkDxEZ60doXsQy2OmheRfBDSKT8pM+4nBe9KZF7ORuSS3UXK3sH1rAiz/U1AEgiEFdFIFEQg38maQ2vPrVPbw+Z+zRgdYq4Gg6i3GitUPF16tyPrtRBXLeX9M2VNBvsMe2kED4phKza97Sv+J6Ibm38i1b7kxE+sxvtbg2br/LRy8c6W5D/xgDs/a4oGOBGdzlz root@60afd044-36d5-11eb-a25d-22a534811c55" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T18:07:17.287-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "538229256230-compute@developer.gserviceaccount.com", + "id": "1295494002733142058", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-058", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-058", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-058/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-058/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-058/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-059/description.json b/audit/projects/k8s-infra-e2e-boskos-059/description.json new file mode 100644 index 00000000000..b368c9d0c2a --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-059/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T01:08:47.970Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-059", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-059", + "projectNumber": "468419072321" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-059/iam.json b/audit/projects/k8s-infra-e2e-boskos-059/iam.json new file mode 100644 index 00000000000..8046243d8da --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-059/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-468419072321@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:468419072321-compute@developer.gserviceaccount.com", + "serviceAccount:468419072321@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-059/service-accounts/468419072321-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-059/service-accounts/468419072321-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..e9b9cb0d2ae --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-059/service-accounts/468419072321-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "468419072321-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-059/serviceAccounts/468419072321-compute@developer.gserviceaccount.com", + "oauth2ClientId": "102832060927780509160", + "projectId": "k8s-infra-e2e-boskos-059", + "uniqueId": "102832060927780509160" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-059/service-accounts/468419072321-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-059/service-accounts/468419072321-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-059/service-accounts/468419072321-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-059/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-059/services/compute/project-info.json new file mode 100644 index 00000000000..1d6b42ab587 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-059/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDbhwels5z7fBSFUoHvdL5rEHviK17zPjfbUGLrwRfwytpSRWJ9qupWPPZ0MIVcljykl/fM0HYjCgn5dQTX+ntlAgxaoglJ7iNy3uj+JIC0JV/KrpQe37AGvdi7t/lJMIeYikyjXghC90j4N4nNfQHo3Ss1fNg4mRsPTWZy5zujHKYFvN2Wl4enRYlHzuaglILemSNV/gW9MQf5jvyb09UIwSokTElNG7pYfvcFsp+otvMm1TxLkbI597cDRTxXs+8Bu+Jmrj4wbjH4J+1k0pdchJP4jj4tsSPGX01wR7JiHbqeqMmwLYQtq5lt3Ia476YZEbjS9Im6sClEg2COOB9R root@b2938847-df97-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEMH7F6VVJYtvBbV1hDEuzYGaK6RRhsUBey/rusoogBHwTt4GzmI6stfPJEZtAtDrYoyM2e3oJqFircIiTVc2Ta5IA6HGG+obikO95SXo4HnsG3rRR4QhEE7K2SExoCsvRfymC1yyA5DLCq+xqTFYrZvl5O0HblKHMNTAuJI6KT2nBFYnD68rC654ws5k94otmjiIVhjZGi4tnq10t3WVZWmXurwcD9xGsBKEr9kL6hVQytZWof6Z6p0Z9ADcoi0R8eWuHJEQNef3fEyVVugAnFrnvULz6mMKlKxM8+3cxCOcgX9LWPE/XyE/N9rd29BuG9zaL24g5hL05Ia8ojsRp root@29dab626-e2f3-11ea-a87b-7e1d84ccc038\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDFG4SvmiZQhyDjH4pDKXKPobce+l1rvb4kbFGnRP/wSgKNhl0jOyJTOozYEf9lkdH3UrgvoNxXoHbF/zv8bSIPf7d3PXbkq0YqF33/guMityQ1Bdj8b0fmi+0iqd6qVAA0wdYxJxqLIRYHV05S3uBnYhaZjTrEuJ22FRDeiTqGaSrvM+7gBOpMEFEXs0jcmixXlC2pIsazAPh8iEDvXVLZ/36QK/d+4ni3GSpD22o7LBjWW/dbbNS2zgnJ1m0vIthB69UOfFFIam4fuyaZa4PELwQsmQx9YU7h1riE8UWFTHYm5l6bD0d3AYYGFQt29sa9JpFxVA0pYThVOM8WD0vZ root@01e54a88-f5f1-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDK5xKoKuO6LjaQftLwU6Xgg1YXSwhVucDXfNEeg2pd1cLq28P7z3X+1NxjMftTYr2eOqNqf6N9x5Ky4J8I8xO9/QRo8SPSM3FPv4za8L4F38X0XNRWfSH8UUdt+HQgR++eGoE3eiah9ez9iNZ28QBMX0u/+Mi/kmCFa7JdQk4PUCUZP3gzJmFNJQKxUmEy1aiDjlSs5C61j/angJLBLoHSz2jBjtzTxZXXzS5OQYlYgFy17JI7x0UQIj5d3EA/QBa+Blr7GgX1aN4El2gO2anFSwvP3dv+1UR2Ttl6tiKy4mzeG5Wi51BXID6Xy7a35oDTvSUWmo42WSwKtOFC+QHT root@d46a8027-fc90-11ea-8986-ae48fe2da37c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDOllutw8l2NC3hiOH2LXtFQEyVdNu/zkSZNuVySsV5DFPMHUawhmT/OM35oyIRJ3W849EIvYmtyGTOjFWhSR5xeQGVv4HMmHus8fTHSzAxyk/CgEpzvDpKsty7JXs4vfgAV1KV/Rh0M0Hzkqv9uq7FMqKA3sTbmsVK3xwyXs4uMXKr43rAJ/aBQwNz/cWqIOFJFnAJ1SPGDw7fD+UxqWqrdIqylKcsLS19MFA7rlbDdDUhJiTrRTCYfHcEcXPko1vlR2YtD36nseNbHHTfH7thMHyo0VbLIheNWjly3VlYpp/gtSell7IzDOFtgn4peYgUiVaaaGYm9sduQO1FcV4L root@390ddbd3-0038-11eb-b4e0-eacb7c15c8a0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDS/3TqThtfibFkHa2tG2bmZ4wRcohVnSpwixrbdaoL1JEmEuh9LgSOQFrjGhcsoKr2bUp+t7yswNY+4q0rUVLX3CBRecrDkhiCBGf3UAVogRqi89jpfiQpCLNys8LGnjcVUR0kqhqlcKBHrJj1+UPb3gD7mZWgdyDjjrynwr6ae3uigRWwYiMFJMcq4MKpoOKWHpvOGuaStfG3CImXcjUSYenlirEXx7iaQcjU6Bt4MPhWXShQjuj5/bCfTBjVRkEA6WMEA3WATXVS4LAI6Y2/tXwybg8xSsDczrXztIZufaEAqJYLDuvVa/apQ4/qdbJJLrYrYtW01LZfO/YcfUn/ root@604bcd38-0477-11eb-a932-82154e1dffc3\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDbzcV6df2hVCAPsZmk7IJF6SSX4NbqLK0NVO8fJOjpqa7CmBBWl3TAJXHEpWaP+yyE0e/RCVouT9csCtFYPNbDOLGcYrbA//aWgb0uhEwpIksTuhWGh5xzWWPq4GaMXDhXmOSIll4xCl6RxWY1qiPLEkGyk/qqitomUfkmMMKyUwyFDCb6HOKSt0ItZsO1QNLP2DeJ2heHZuYXti7Btco48s6gmbDTE4d8VLPBOI/uTyuXJSZ546lbeI45hAUK1d5n9pFkeET/xZ+TukWS4mXsZz7GdraIQi71jTT0IweID3lOmXwuZrjCJg0S6ntrt3Y0S8q3mYEg7k65EmGwFwoP root@2df980d9-0e8a-11eb-b727-faf44c880cc9\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDr6B8gufQ5KxlQ0B4Lbr5iQZp+JXeekJDVetz6uO2dbtCJY0u7P3MN4EeBouCiTVKqx4Q5FYoSfzVX7aagjiRHPMq8xvgD4KVCWlKIZQSoJauYM3TC7woIJXp1rr5/4U0PyDZUhSSQOilyG7AMz6TkI3laAzcfqE6nvTbsgQ9biPlM7oQKa+xReDQmm6Kb/Ax0QxfNvqGJVZXtGqX/+eYYpFl9mU0O4qvcnd2JM5oXZejxOGnuIWRj0QQh9innPog/g0VofurUEcux/SYWrLxStwCBtwgrjELPVRRFViDya9ypQ6FHBaOTZnRnYk0PGLw7oCwyLW4t/etvVdJ29XgV root@063242d8-168a-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2paR6bkTA9eEv/OpdEb1277PKZZoFq13JYgPwXQbLiGAbCF2d+FQQyJICNGNMo/hlvUZccXSNpZTqyDc7GbjonSm/ZkpJCkP4mBqkerFLx53j8ONVv5+ZpU0aQHIvLOUZG5140sQgte6clIu8AsG222viLouGUDG00gg0FanxqcjMWWtsxkrxImZAv+jPQ1ui9rpVmU+gtQtfwVojI31CWP4JQpfctGGskb8C8oVpiN+kqGP/VTTaXHw1GKzuRpo53IWftBUfc36OpD5NkheRebTwZMZV+zwScttiokhsEuqfZlSdEQ1CgGcwsgUfgCeS071Q/fvMCY0QTwCgQgSv root@946b903f-19e5-11eb-8107-96bdcb308f91\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQClBZzEd+wK3h+bKrfDnZ5+h67nVq+Bn0xtpxO/l8jAuBZs3ixmBVOk56MG6s1qPBLvgGwF6eGHI+zlUWzKBSw3iJn5fdRuGqeXG5zyhsDiPL2MSfIUtMqutr+R1AmF0znFul/BUUbwnmfnHz+DDLt4HmLik7e6V1H8FKNY5Kuy54P7Ib64/W2wZnjJUCy6vI03CDPKm6K/MEMJSEtloghttTk7vsm70MLDR8mycSpf6HhJDagNp4arDNtgY7pjq0s+8+Isrn2SjSh/y2mhShBTFyDG+/WCjATkwox0b4EuxR2aVLg/95u2a2uYSNG4W0SOsGNkUNCQvlW0JgeR0LYd root@6a5d518f-2ed5-11eb-9b0b-d6a9455c8be7\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKs5ubIXlrBMKODImfBYENG6+qtaGVTyBJfmX1T1XaIbeJ/eFFS8LhIxhPtxHw7z6smAxvbSLv2wCNr8PMtRU8bv/oyeM8TVMVjvfWNPMR723aoQ5vP0naLw+ATLUkTJS4kY00MS7qgs8oi+t9sIYP+3AoowmIKKYifTHiUYCCyQxXumm3JFLKyTuzeU+A8nFxWU82+D36OIt7Zrj8XfPs1nl1cRIT0m/YWnTZ14Qm+s5LQ+xR7gkPoYzEcQzxEFMdtI1OwfyTFLEFLMa+0KBzQ/vP4Tmu62uLfFRUBvViDklNw/k4v7g/IG5szxOuX33ZFJksIZvrwKYW0ILfe/hD root@05691cef-34f5-11eb-9896-aabf0c108015" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T18:08:59.290-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "468419072321-compute@developer.gserviceaccount.com", + "id": "5180673529809392068", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-059", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-059", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-059/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-059/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-059/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-060/description.json b/audit/projects/k8s-infra-e2e-boskos-060/description.json new file mode 100644 index 00000000000..ca01f0a56e6 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-060/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T01:10:53.226Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-060", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-060", + "projectNumber": "64847924766" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-060/iam.json b/audit/projects/k8s-infra-e2e-boskos-060/iam.json new file mode 100644 index 00000000000..ecfe8ac3dbb --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-060/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-64847924766@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:64847924766-compute@developer.gserviceaccount.com", + "serviceAccount:64847924766@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-060/service-accounts/64847924766-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-060/service-accounts/64847924766-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..82cd3e9f50c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-060/service-accounts/64847924766-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "64847924766-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-060/serviceAccounts/64847924766-compute@developer.gserviceaccount.com", + "oauth2ClientId": "103322638720165955656", + "projectId": "k8s-infra-e2e-boskos-060", + "uniqueId": "103322638720165955656" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-060/service-accounts/64847924766-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-060/service-accounts/64847924766-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-060/service-accounts/64847924766-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-060/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-060/services/compute/project-info.json new file mode 100644 index 00000000000..0a86f9bdec6 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-060/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIshOhGOP/nOsGaNU8lEYJKTb5ijLNcJRepdnmfOT8rtJbdy9wRI0a5QvVAomN1iRcpKD7QEgZ6wpRqn0mZES9aj3QKkOerSTyBtnleYUfbhKlbTg1W8vRrKpJPCwp2SGPZX7ZH4mdwA9nZBf7u9tKjYozX58cFolPYKl7W/cWcExA0Z9O7Kw+azmdSsjgvbqUkHEDpsQxeUaVqWPlQzSrWpr+EyTCfruL1JN+9ltkKKOor0eBsvRVg6sKAq5Z5tRHo4VQx6B0SYOW5QD+OPIW51+To0VYDvwkgFDy42FfKfLqAFDjFHfPc+4sRQP97cFiqRdo6nntHQkOPDhXpBtn root@ee6bda68-dae3-11ea-8c1c-d23af84fd26f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDuB/V61dStCMRPllr66i56bLy3mNntKlXjK+sdMwZEjaaQNzt7tPaIaj2idYB/j6oYWuaX0XJ1911Ul7FZJ35+M7Mc5Qy0xLi8egbMmF+QmfQg42Lj3CXrrPm16bn7RdqvFJdgM69xQjnLXmdtm4nx4hZP75esS+o4WbxUgESeI9CVvyMVwPTrhk9RtfnCDN/a/qry9vg2gCxxAapRc0ifR8kePH3DIYl+AJ6SGXq3dbhst7kEJA4m+jIHAhUrkTlfq1tRTSFZPzqYw7s/x9RVbfWas//eTh8vwl9CivBCl4Pidgsw4a5LMNXkkQAe4G2ufE6L8zLRZotBuUkzE51X root@e061dbe5-dc45-11ea-82cf-066baa17f17a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDHkQWn2lOqFJuWBwVx+23weIvHO60dk/Z2+atALb8DtkFlXWMXr2uaGkp9oR1aOL3lz6jbN+BWt5KywjaU9blaSJ2WmFG2/deeiN+ljrZV+nArYphoZHk0ofJX8yhv5Qoy4vWPEdTLDmILdV08cp5LuHJ5FxMpa1nP7VERtr2PqZQZMKhTNxWfmWUWsT11fLtaZ1pPraKy3TdoAzPLXfBzG/jfthSCLWqhhAW4gsUdkFoUwml5GO1BkzEiD6FzRTNksxdzo3hg5l4iyAKUFHwT6OoDzw1Z5QSOYwFfkcZtYB4ITw78YJIANdGZx9tQhnTiS1foI4TDgmrNBCsAOV2d root@f7f4399f-e0e9-11ea-8c67-968ff53f47c5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCyegavA2Nfl6rRaD9VUmJGugY4qODct80A4J+ZDd2p3Cr9eHjZgwuKZxzdz1tjQJ2/KUjAuONLmr8iKTyWkHIUXxOxocU/xbRomjgEOjqJNeI6Tv/6jG6GJHTKO340WwdMl6bGtxo4RwkJExf5Ip6lL+5vE1Yb3SItzaOO2Orv+DswPAWI4WvVVPyAgjPy+qvhN4wu+5B/0HKRBW6078nW6hDbMOHtA5Goj/fINDfPI/UpUzoP4cLietddfIRkZrrtj+npqYook3b0hX3fp+pex190ab1pTSAwaIwl7TJ37DHf1pQmyNsA/QENmgcfXeY6cDvQWjdguFLdXvcvD6AN root@bf8dcdfc-ec3b-11ea-aff6-5a14b0d7f3dc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKb+DleBCLAe41NLXT28looOYUTEZH6bqtdwQFPLbuX5stEnBOc05cf+wX/BPAjsCkQiV/GvIlcmX8P9Fbw4wm41ivyAzuxyFvxcddDVYtDS3Z95N9gF3Cp1bnY6XQib4jmP0jUP6c/8igh1g6eoNwhCoK3PjU6giibI3+F3C0x/2UeVLrUsjNlRzqoJ6DbLiJkwGlv0+1mMgXDq66Jf7S0W/ELsfGIPD1SiyAsgpDUs3mCyZbTeIO74FTeJbi370NmufN+BTP2iUw/HbvPDxoGWYnTEuOlChcn181Bha+i2e+V1IeRY/64nGHD7R00lijfmkiTfQ7AZYTXIV4pDI1 root@94205dc3-ed9d-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCh+rNNhw+S6VwvrNj+oCG2GTvsV60yx15Kb3ZyJqIYpqSX8OvXKbEEqyh+GG38+t2kl635xRuxzVgdBhk610GGbEvzGo/RbjJ+Srz9sOOZ6QbJIaMJPKnC/Lqot03VY92TfgfMcXpYwnvblaN/v+tnzaiDVND61e/joqLwfhoefX3uHruMM9Q+xGV0XYzakHj2w8lW4gwZBZeXjRE3OtSyeE/sY/8UvtypJjWbVynMI9+Knfm4E82tXD3hKf4SDFuJWUvEaCvHLYcaQjWHGnXUayGFQ2XG05de891slDhk43+dV7EbkzdN/r+1IYv5FKPBPSBM/Z5ADJff5YyqsSz/ root@f882fbc1-f490-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0OnQ/332sJ17pFigphYLyxgX1lS3zdw2IUM7MDoBdR8LmH9/K42ihFCxoBKFIC+tck6pQ6M2N1zV/98e0EcBSjf0gLmwUiTbk5Fmp+Cgfoe91g8nqtNbGtMw50iWRSBnjvvM8BY5NvceXhv6eY+iEjwpJOgIJ/OAI7ohl1QzqL6ttdmBT8pRHSXn04rsbS/wQenRvXHsKyYVlvqoNdw8IXF9Q1KbI/XktmxUlcykQXvcIRfQWkZjKwhZiCQSspCEVrh9dds6KkAxUEh3mQxJMsPVEUtoh+gvc0XrrdLz9RmdfsOlCXmecvzOqQqOI09rjAG+N2QmIeL34DVhqmI4B root@1dbf6b14-fcaa-11ea-8986-ae48fe2da37c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD1p7vTfHP9dTrNP2P+dOb9DNDsaJGF3o0WHl42XngS4DYyuCzHePte1DipofFrv3Lsjdy1osnUkrU7qMEi389fKTPNiuIWdNza/14Bv70f/VmwmzGsBBmbsXyftfamNs3XuoCextz2iSVO+eQuZMgllxdLeyKGQfnpQC89QfBAthBdWJxlS9q//MXYjH4vZPGpMpFxSjAzps9TqoSLFNW7X4SaFiZSUM6h/gSHtfc6BE2+hmaWn376t6oFuqI8b2skOKsFYk0Iow/vZVQLOShUw0tDKOQwK6ms3hG1bUOdeNO4ZuhrgyUm5jTgO0pjHorOI9+rejIrjFzmiipp8+lJ root@56f1df18-0c77-11eb-82af-de22b9665164\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDHmcv7IWCXbKQYx9KBn8WX/w2e7/IjmATj4zfT1PSjdp10xFcldKip6LzmaKF439jxu9uALjOmrP08aniLL3bbRc3riwYqVOgqdAyLDXq5x6nGBaRdnOKVypq+3qhdrT5I+DDW5eCn24xcoXtGSg8YAxyPVKD+doqr9zmlMWSAN/kWeNiSASpQVKkJYhNrwERGn3tGWK6jP7ZnbPOLfJNk35NvoyCXrMmzUH9JuslYQ6WMPogAAZctaIghn2QPoRWMx+yyhg50JtW50haGXSf15Ai+sBbXgfLX2hs7n6QkAZFEmvzwRljTjVJ98MfK+f1ib/3GXWh8zGGYsftT8sa7 root@a3d02613-1180-11eb-9a43-0aa5164aad51\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDLDm5u9z1KONBSmD5SuWL6X4YG+9kxgyzHgLGcZt1MlVvJ17/0qqtH0iakYdVUYRnjzaW6jtgIdN9/DKJWrp5LgMFAaqQs/zcKnG8D6DOHbt3M38e97HqHK34tbAfa3f4kL5CTV7kZ/gjG+3KclpmtR2A9jBGDbpEGBPozL/qNBAguJK2TMsDdfA7RkYUgvUqGWtpE+dkZTzWiC/2siHn9BRcnSxL4PpsD3wFWKZN3YkD1kpIAzEAhtPbpPp6aPMxMzMQR1dM0+nhAtRym/DYIT/ulq2P52eAcvc/6JBZNZegONy+C5+FfacUsModGfVAnHw0nxNwv9BYtEB+/RQpV root@1fe58e41-1f08-11eb-a4fe-eec30b56844c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDGq/rdNZeeW6sluibr1e1ztriQJwwIuDX9aTjLDqkGCmLDSVLsZyAhSJM0Gq5bVJgQlpWkaPXLP4lXEAFXJGShmBjxsFfeS3C0ioLK3IV/yAF9QJSF7QDb5K0RY7r1Yep/O2S+sgcNekeNgx9b1cPT1UfQ/N/HhkUyqKfNKnuQ/V7VGvbnQ38M2XqFAMz5JC+9V0unS6RZtrlhRC/QdS3JhkEavNX+QygxSN9MwmZo+Ycj378KX60IXFWIjrfWAH7BUPAEPPs8Yd1AzriNe88OBovy/tM4svN9+bT7MqxT1TgtBM1wJizMojXYtG5GRRKgx6fMCXNoMOxTXDZ79ahz root@fcbf5092-291a-11eb-a35d-7a1d48297fba\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDWUk6j1+boczGh13We/xVq9o4zNUl/DjAAXyW912bTlADHe8fx52mC4cUPG7ZjrgjaBotYYtgFSjERG5chR6sKrMC3h8PKMBgjQEpQS5WooJrGvRbID+QOx19cRQWXW//6IA6JL1XKdDpENJOpUskj/8J5Md63nyuQj+YOOL9YDV6fOcMr/apYTX3wESTOQyr9OkScREaIVmIbDIi4OOX5wSwb2QyoV7zVsSArWPtlR8ehPy+awjOwkQsEWIqWHvQQa9KBq99aGdEmBB+Nxfmx2kX5b/SZoDW6aHtDv7zHebdnkkC+MiiZqvC3BeoEEPMs9/LT+WcezX3LOkZlsfJ7 root@e07c5474-3540-11eb-9896-aabf0c108015\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJUgLv2rboZkDa2bE+rHRji0TuLew9Qd9aBKv4npXVN1jKktZad/T37UaAfS/scAmrAoAVNweXJ4PCa7oneMrsd5U8NTbfU422NDSpnRjXIxBZo8+hQyc6TKspwopBF7EA6hXA4BLzORaXQRLdx+7EEb0f048k0jslVK4EtF1WKmrLdb+3tVaUJtd7ev7oZU6KXW7bvQ0rUZhU8LNMrSAqUDrM1EfO4hi5nEtoLouRa6PjdfWQSFEHJDwScXEicASj7EM1ZtwBXHY9OrLuW0U4/31M6IYehqZq6G0g4oejPHxCPm6v4cL00BY4O1P52+8JRibaVgeaDGAadxRv3zz5 root@b11e5289-491a-11eb-acd8-6a2a49dd8a76" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T18:11:04.374-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "64847924766-compute@developer.gserviceaccount.com", + "id": "1519466046024503624", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-060", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-060", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-060/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-060/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-060/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-061/description.json b/audit/projects/k8s-infra-e2e-boskos-061/description.json new file mode 100644 index 00000000000..827fae11a5b --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-061/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T01:13:07.264Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-061", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-061", + "projectNumber": "528140019086" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-061/iam.json b/audit/projects/k8s-infra-e2e-boskos-061/iam.json new file mode 100644 index 00000000000..909cfd356c1 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-061/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-528140019086@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:528140019086-compute@developer.gserviceaccount.com", + "serviceAccount:528140019086@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-061/service-accounts/528140019086-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-061/service-accounts/528140019086-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..9725d6f3066 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-061/service-accounts/528140019086-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "528140019086-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-061/serviceAccounts/528140019086-compute@developer.gserviceaccount.com", + "oauth2ClientId": "117236785524385045615", + "projectId": "k8s-infra-e2e-boskos-061", + "uniqueId": "117236785524385045615" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-061/service-accounts/528140019086-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-061/service-accounts/528140019086-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-061/service-accounts/528140019086-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-061/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-061/services/compute/project-info.json new file mode 100644 index 00000000000..9d5ca3dbc8c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-061/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDM1pLzEeSPLc2cmmIhzApl1PeaF6TtUu82NXpcjpH7quFWgXUFHacBqRVjhmul+KTrPMWtFM4EMBFcUnPTBnn5nfLjww0DlUpIcUdSr0bx6Agby0V6oqw9SEE+UrY0Dog8i1+MxP5dN2uzv7v4VoQ2GNEVCfxJhaNvWH/ARMybLePIUZ2HQQ7Cv0rHxKZiWoJb8nRSsLEgTXE8qLHdRRZPzyT91Whlu3CD61ev+H8deIl+pdYNL0UqeeuHDMyz7soRrcdzuQwIV2MYk6c2NlkS/3cKP92SUi9iyaKJzop4af7epx9Cvg4YfZQLEyKGH7J/spedbMkcYVyu+m6ekCu/ root@c39ffb86-e01f-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCvlG/aoG9SbtdcWY156J2mzu4byLG3eOoiltMmc93droVgqSXaZCyq5F+/ia+ibqremlmHmNafh235BmFaIhISlFhb2aDDLn6auU0/uuK5WMaAmIV9tAF/Aqx9EJhU1bQDXzrZlxUguCDG62HaJ4hTiiEo0TFaSXdlrJArypWamnxCJpPSN+0Ru1iEPmNXyHvzqsFYv+BMMct8fW6T+BHPtdWvLwvMXrDPZFhFn6pJoVWtVHqklOrlTDGiOjN6oeOfQRN4ZFJAs1Z4JkXwPQBkkR8UZYVH7L3m7arzTcQRHU46Tw6sZFgPGgBaPu5OLZbQWpSsM8LODZNzc+Ctw2nt root@f5be5010-e33e-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDL6PaJdSE4cD+QN+n3dkY2Y6t2eC9ucCog7sjbu2qf15x8WfA9tGJcuxNq3tj2JJqgBwF94R623VvYnGPV11vLLgcpmn5S8BpEVI/qE42umh7tIvmUO43PtvnawtIfrMcJ+Ki8L6+YqF9WOq6hvOR/Ef0U3x+jd1PeUBXneNGvpM4Wb9BcYCyuhbCmm1QPrX0k9DkH3WD4iKkh318k6nh2Dnjt+n+RUhjbS5apnB3ioAOEx4/6BbVk7A6YTNiBgbMhwN8eBu1arZnjgUu6cWWlTfErXK8sC4aBtGfOeJsrzjUMwKTKq242J7oqSOKE5defsEs+4/UR9u3ChzyNojt/ root@1b5f6337-ea19-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCw2HYauYeEkAlVSS0lWWSfhw0674tkUjhSyirSPAz98LODmFr899JE8XcV8624o2i8kKIChFFUwYHonnjEFMFbxQqcOBz9CxPYTtyBcJTzIMbu00No5raha52ypFW04bzAPXvhWETeJ2VvLuF2pzAGoYwqw0K997bCA79YjvlK0yzKAM/snCU5+98URGgz+ixIjbTrjOomy+IKlmnlYyKqpNPEQG8xfUnr4lrqjsu3YSfD5oP+66h3FKzMxtgK7loBKxBfpZcB/L5Cj18FscooY2BHHWmGPO8C7B+KzfNW96M++GS/9xTPK7pXKx+OWfH5RXvZby4N+NWr0ZPzKHGx root@cefff24d-ed51-11ea-aebe-3e85ddc86bf2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCrh7UZphp3Jn+Kr/4ugYgnWAFBi8IJjtbEy3fvXUxO8WkCjGHXwKJCVrJsGoHGaU/GOB6dHDBz9qfKJ1/7t6ybRXJ6N23H5K8GpjpJcZlqSiGybZwqq8HscjNo+mjlbdcht/I7PXHORaEX11hwjHpssNA29G0Y/zkcBbg42LWGwiahVPX6tHa9zs4lZEQPsoEOohipQby7AW3Z1JVF1vw9uvjuMT3ISg5c6eH3tXB81sVUT3VDuou6P6JvB1oYoRds2WlJugwHwORw5kKwWihkut96CHNkKGHrjefKNQ+J10LrcL58eCYJaVQ8EwqAdoFLIiPspa4/85QoPxk+9v1T root@493b066e-ef97-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCkknyBem7SKu0eZkAOAYSp2SSpSdOhTPCYm58/4BkfDoVk8Cbt1nlXPkkeM29XaJspFucOe550VH+VEZyZA2TSbXh99rYc0BJpOQ3R/cd8koz6RbRE+hXwfhsCy/l1r1EcISgQ4P9dS3hNdiXPZtD5LUmiGMqtTqmrrczW04lHFD14o2xXuEnuX6pcIZVfSHbOAj1+BZ5iGACKkkkkA7v9wfPjsxzusiuTk68wIheYlBKLARqM6HK44ok4zVqoi3QfZXen4KR2IEaBCwdd4pOHd42z+7sUCaFv86FYZmIqpi8LdCkTKzldkDy/uGykP732qWK6jUHLOr899s4dQekL root@6d4c6211-effc-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCdZS30hmYUbl+a+cG9z14E3EwlI1/DlfnfuQCrWZKIegNX62L1LBpoQcT5qHdYvtMbd1+D6S9CL0xJvU6cdFhkYFO9ZvKTshZIAnOrJuvCsNQXWePCpJpClC7BQPU+5vxsFp3yy2VD8jMuYcfBtpzobC8FMOmF6yL44WSC8/S1XvD9KDBgATLBSvgkeAs9xqQsKZHPh8a+eG7EGA7PomdfLTdYjsd+iSzlyRCfUzxjiu/qBK+PXa7nrWY/5IJsnAFjZWwTgyUP9MXPzqu3dj/YF7RSMr4myQkD3JJXa6CDzTdMdpeLSNsDnY7QbgpEmLHytUxjNh1FIXlopzl+brKD root@eb70f181-f102-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDWZK7AR1eFf2L6w9Rg4N/Ekt0fm0s2tkTIthr053B6Kw47XujUx35HDNWeB5oZpxc2l2QoRYgTwZNOOjNkjMzITH3T9llVLC9yfuD6HDJUbJAuQo+KwG4mo9X/6gKg3PRfawIqN1EQHj7+GrLVQLS2IeTfBBZPjqehrPmrGTMJ8tKMwb2/31PlS0JckrInrVvziWSBKusKQiCXUba+9YEqwpZl6F3cdFkOT2/Uw4iWQ60Ae+tb6Qx0nFXMjThOY2ixGhlBwAeCpl6bKAGC/qWmvL/gD7sqfD8lk0jMjOQFp3nJUer+Rsknabw15XAmN//NWKCypeSVFVQkP9EMwREr root@231444a1-f145-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCpLCXp5rGH5StvPA3ON2gqPo6orE/jfsZpn6vXaH5T6n329CT6+QS1Tx2F6//J3VJvaE+O0eoHvlRihytJGNGvr5nuXax1VsbB+AtYy44w893IbV1VQcJqpnyL06ZtYDgdpPO5ZG0MxY38+WhzeGVVAq856e5rROhf6ZLTgY8O3pocFS7Cnqr4JXagVC2n3MnYnlInOYyLV4oU43TUo9QNW8SigNDLb/JCuHVqA7vdsZGdyCFJ0qEFkLREMm9dYSGYi+i4Q8JPJoxELFyV0l1j6C2ossUJybUjbvrDgemh+AMB0N1VqCIsL+bv7nTwrjpscCGP5mNwToY861v+9Sf9 root@f79ef096-f541-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD7LFbO4aNFGAHPspUqGUwQEvfblHUJ0nzRtrdJFdOluDza6CwWm2pGt5TiY0FhNC10rQtdnY2pORdRzPtsfr37hFPVtf4joX7nzKQLxmQYeE3T8QTqWbaHW8XxnObMQG/7HvYVFbG3aN/fs/fX1h+m4lUfcpw4g4vOJusMLKZfzZWg+ybQ29gkli1ddBu7Wt1QepRv2mLV/XBpNhewj6U+s+D0Ra01bo4oYoblRk9tS/fx7GInb0RTWA5H0xc5wo1OOzI7cpCglH9wC05ERZuGT7WvYOT6W3NOGPfA/CYNw3uRGpTEiKRXxRuzZkaFje74JB44PCBy7PlKT3FS3hY5 root@a57534ad-0167-11eb-b4e0-eacb7c15c8a0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCuIoNOxUnRhegs0+oto6Ce9Xk/FlAhoOGbxbswsnauoT7Y0nnva3qrXN6wRZBWJCfiB/KgDDSaxyPbPTz4k6xGlIxBy0cmd8e+8Igbezfnq8hLlwYfcZOJg+ZPqAtCuVRbPpFBnSh0AzwkDfJu8+h30Xlzae2pexe58ljZbnjqrfxPy8jemEpwiIHkdglHBcwrF+W7aazy6i8ON5K4VHvqYfAupj+b9zyDslHhH6z01+Eggnh2vSFzV++ecDKpy2u6S6MaByoiBhvdyoi8TOAC70m8DqX+zACR54WjZm2aJjdfTp09mAev9czXEk2bGecSCvp+WvhhQiC4sEmP9t5h root@23162976-03ad-11eb-9ee9-2af320b50223\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDX6sj2zgZe1h55LEmvyWcvg6ehhCoJ+3PtEp+jDm+R+K5w09PBm8YCV5DadeqXccAuCHbdxaKZhCSuCfF4QKDeebZd+ftjiZgfsvqhyg6jsepMof6lyTm9yOBSVTLJup7cunvRr1f5fv8QM7bB6tehw8nD/aTqI1DVqkwvniY+HCexIHf0ZivFML8nhhOE633w8FsGY6DY2l0EN7ERqGz0K/oqUk2fv8Us51hELAwq07F/kZIFznzntgZf/EuHc59iRQN2HsKgj3P1zmmPfhLzhnDvDPn14bxC4V/laZZN3OwQpYqM+A5Lb2RxIsCa4CugXmz0ON2HzkjBARrT3QAJ root@ae7474d6-1296-11eb-a3cf-6ef374375bd7\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCl7cgEIz4yJNxne/LmKOOhIvXuBWLZ8Myt48BjVSTv80eY/F0538A0Ul7ecraEi1RZYRKGbhUaYU4xmdhV1lTM9B7UmP66cKjvrTOJuSmLaDox+Mw40qCbZiSEo7NIdAsvTjML28B/G3hiSTlkNT2PNmsYGglWnI42yC4fn64xIgaD3eK7+/xRHdUhPOhGvzvAZcUyUfLJQq2ECAG/g57cqPM8M3HadbbPbJCo+ovsHsOUGKCcwcjw557vKpDF62uz2BkRd4hqvKiBoCscXiRfUa850nO8NX7B4iVSNOcRojEO7buAGd63e2lyCsoBu72H9tc9SFBe5GvSqfKPRQSt root@b87405ff-17d2-11eb-8cf5-bee87f5cdaa3\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+Va9nKHKAoI6/N5J+64Xtz+H7YsvVWssc5cPmXg3kTJcnSAzVpc7fmcID+XJi/YyiwmvxDetOz40xvTEN7hjBUpV1Vs6ZNS0VAT/+ZK7T7BTNhCo1Ysv2QitRpoILMEUb261MY1ZBCjIMl1QDUmoBb1EdODV3Snsd0H1SHeLpycmXrhsDXQCZrwta9Cr3U0sH7JsdS/Ox6YBus5OPj9+C8B+YSqtxD05jPvTyhK0+Fx5dWVk3qxHU7fiQnPEc0toApRj8g7UDuz1Hc78rPOG3bm67UHXIXnJZiO3Qv7KxgZTxROfHbUHh2kkI8MbxGOAZRqJ5PadfX9pb9VyFxr+t root@ce4598b6-3b2d-11eb-a164-f6e7f2ebcce2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCRPT8UIi+iVkk4JzMXib7xT87/8QOaKzIsSA4E8xIRpM2xkFu2no//kXthafOFhsaVNS8/pF172P6wwcbFb7c7rFVe0mz8DELuKLgIf28feJi12DJnqyCBV0VeBwM5WiUWxkoxe/9U0fg0SwFyUePBLSMUj1snyjsJbBBJSlTEknVhvOAgJCXWuaCtpxSNAYCoT3RYdyRdiJDsGReadHtLuMOvbbQ5vcOpZ1smuBMGrIDHVSjNY7lOYzg/20sd3ScSrHESgEf+WMSn/zdv26mHwCjbdNSEm2eElyGXgC7gmEWamcTxnw8/wDDcjcA2jsseQP2aWKT20+58r3dWVjh root@5fa3f569-4a63-11eb-af93-4e5abfa0c065" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T18:13:18.126-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "528140019086-compute@developer.gserviceaccount.com", + "id": "6485767100103052994", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-061", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-061", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-061/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-061/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-061/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-062/description.json b/audit/projects/k8s-infra-e2e-boskos-062/description.json new file mode 100644 index 00000000000..09425d9ff44 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-062/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T01:15:10.577Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-062", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-062", + "projectNumber": "1005522583204" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-062/iam.json b/audit/projects/k8s-infra-e2e-boskos-062/iam.json new file mode 100644 index 00000000000..df491c79989 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-062/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-1005522583204@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:1005522583204-compute@developer.gserviceaccount.com", + "serviceAccount:1005522583204@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-062/service-accounts/1005522583204-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-062/service-accounts/1005522583204-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..f19be11df1e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-062/service-accounts/1005522583204-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "1005522583204-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-062/serviceAccounts/1005522583204-compute@developer.gserviceaccount.com", + "oauth2ClientId": "117892583573817202076", + "projectId": "k8s-infra-e2e-boskos-062", + "uniqueId": "117892583573817202076" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-062/service-accounts/1005522583204-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-062/service-accounts/1005522583204-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-062/service-accounts/1005522583204-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-062/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-062/services/compute/project-info.json new file mode 100644 index 00000000000..941f0f19bb4 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-062/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC5GRkKzfBRtyNX31UJ24WkmUTYEkCKy2dOkmmqPBv1/Klp0XKUHSQ50k7vhwjZzQfbQ7ApiU2H/p2FSxqEgBuftuYmFBk9OnfyEtU+1FSic4Dixw+0oE0wk5jIyV3sYJa+nvNGZ9xCWQxf72VxUBAMBvMcp1Fityaxt0vhfs9sirWA1qU+abOF03HpH2ShdcKd3Rq6umWvxftfChH5edzu1lqyNrsMj/HBYm6XyErwL7zDp7XT+yx4vPlimbH8Fjp3QlQOI3iDpwQG8v+yk4V9yUo72u/f7Hsx+WEsDWrScu62p5k0a83WV4Ur8DgTVvXFpx2zVQn8YH7U29eQ99nV root@2ea11e3f-e1b4-11ea-9eb6-86c455181e58\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCrkmIkA04KuLj/XLi3nySSP4cJFoUjBIS8JNWnpirxxzxcKTIjGQG47el8YU7bf9LTshM41bYhKtjeIa5uoZddkMAdaT1YVkpbNcTWVg6224ZYiM+qQS8XNAuZz6FtwcmC4Yo9KDB1jrGaNZDHmMsMx+xNdG08gn3fKOWkcs5kQr/O2g2dWvbf1XvD3MN/QmCIiyYs1CJ5912r/DQxMq0UZCIqOlI7KPUg+3RlC6usWAK7Ak1l5JBfCPvgtnPoNwWtNUnHBm5OfYjUJvJwALkQSfUovncXjdyyjse0Ers2ZVvQY2RCmPgk8dLgSqrrL7vaUgn02QYf+wjqnvgQyUGx root@6648eb90-e1f6-11ea-9eb6-86c455181e58\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSLYJRmUOmtYg16A1KbSpDdbL5Oy76ZMGfP4AcbhXjNRR+7uD3letln4wLT5n+/ZLm+2T80NhVHueR+AwaYJ3Y1uBO+k9BBM/IzWakJiGu/lJisUhjV+I8mRlsYQfjfUS6rFhhl0GqxHcv2VZ6RhCD4aTINf06+P62FQr3FIYBqKuEGgPtSN1DbGRVdTHA6jZ+xXKVcIBrXBOSrtauO4Ao3e52e9FaIgqReCja5zApqu1tVQBlOylwtmidZITIX77AP/7rrd4tHbUb/plWuweLyDdad42+xVJK/iPD+XbekFQj16Z5lWRgpI4bvMQjGmvzW9DCFtMaQ5G8j6NvD6y3 root@263be705-edd0-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDR0oxykTkszHsNlabpmkdSehMaQkhRtTUrbGGqdzGa6tjJ3Qug5cea32dWeS/CJv0b18fni2cv8LEWOvrwaSWK+pa7a47zAw5DnINyGbpE36neKrHlhMWVJDxBvsTTAVAanu3qdXoViNxL6SEp9N3QbbBvoF+7MJizrKzZJeKb7WQoMxYud590GRvefw+Xi47GKCy4LEpdnSX7LCeElB7me1P5kSJuRZ2aEgrujRqBCWcKZD+ORsq1zav0GkYHJRSkFmM7UThU/apFAuq+xgSOruan3vdhN4xpE6ChuXpw2VhlNP2DBKVs0mfGAY+7V/3E7NAXjLJT8HSdkkNFkGND root@c9b6ef05-f3ef-11ea-a379-bea988342348\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/V0k0k13VVBjzDK6rhhJLabOrgYxjfi2e+G5xIVAKsyCbuTMBYrYgB1eh9k6x9YZsaeuGFtUQmmxNM2MiSbzB+hoi/9+Je/ue7deWvAKkEUabrC/DoOGeHoaBBhlmdETdYkRr1ZqFWLkixxDW6f7Afc3MQTX+gKEwWrUpLZNfbSMDltGjmA0OUbTx/eq678J1fAnfDD+EZ0I7TrR6r76VPZCTsyi0303z6lZ5GVFvLeaRf5dM9AewhM/YSv0h+TJcr4CDC4i1OOeHcddOWKEGs9yImRFrCaBMLgrA04UzU0o+RRJbeqnygLHFezcKINE6u6RQP5SJGS0VNzifpZW/ root@eebb1415-f754-11ea-ae6d-8ed64f3416c0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCsHcHsUISfFyMWkrz5hsmOJM5oypfvsPMHxheX5nTLsEM0IUQhogH1xeVqYH7/Z7jLG4KlM3qFpi6ddt4bMjmIZEjiLQAUD43sksg62Ipt19mvvxVndnPNCA6nZ9oKpH8Wiw7YhykBBZwOUVAxljBicUC0gmI5tY2fxh8U+LOyKFMxLaa487nfeJbKaorRVBFTFGA+nW5TXcXVKQmR928V+789qrB6aVLfUbUrSAcwOdA9K6Xr1ltZaugSVA/fOYcJGS5kZi5t+QQ09AxDS+jwmokOx1J3ehr7M358uD4iI4h/0C8kEoTYwlKogN8ZGMFwZrgU6B1fmXLpDbM0+n/3 root@0b83050c-fb94-11ea-9c73-86173d37727b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9g9wFNP3W3kdJT/BhA5jXGMdNBbXWcsVIJZwM7c7w1nCCCj5GiBxyNLLS/4Gjuqj1Yb+xG9GpsehDWSVp2jANS20/TbZy+wUpxg/QwkC/6k8iqlxKqoGvC2QdCgdA5SjtKmu/HJduvBxmks5ydfO3GYpsRFJ+0/OjaROInUyFDHXrEN3tfo/mv69BXtcB1vJJqVsdL0gAaqhhFdIDgRl3Tpm8GG+VZeMHpx4QZqOrrz4Iw8JO3w+fhUsieL2lK5+zCH6CM6WDMjTR9ypTloVLXpz0pIccko8WLIgTlv9v23NaI4Y9CwaTl2cda2vaC6U+2kU1+ZUnr4hWNIUycBqF root@a8497a80-0218-11eb-8b6a-ce996ee2646d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQ9sBPoXQu20mHmW4hjiciF/Z/KVB9aO5xIEv/7+wwIuqPs4rL9Gw84Pv8FrqWKuxsEALaqLvBkSJe9aPQgmwGGs4LIQdj6f74K7p6+N93qCXg1oEEGFvfPrA/eShKkgfthMpjHLXjpv1GTGBw+Tf6tq42y82UCtwJCWnZw07HVmRNV20yLVEClbSKf2AP0htCM4xEdj+vCtf+KEjibvOueV0afBYl6i30YMKHdkcL5reBMLoUSo0kYuiLNdrvCs/cITcIZ3FnVfpAey21RGmY1zl1HG5xfASD1OeChF/yb0t2BVl3QlxL4MhM+esRZ1r3Mkl6iu6sD29++6aFfVQL root@f26e86f9-04a9-11eb-a932-82154e1dffc3\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC75kJ/VmbC0W5x+S+2rIGdHlLjSfJ2EnpmcTxHeOeuIHm2WSyj7OUt+xkLBJZLa2+XXPCOaqxiyI9XzsE87CmCxpj/bTrLWEw8AaNDNDZwnwrRZBMg8n41JKXKPfnQzTjCtgVE8jneJUQONq9eYU6FvfUTlrDEDMV71vSXYbcsxyrleTyJ+6OdpJeajGvQ10oDULAIaRu8NTge+7FXEimgaCp4J8EUIQVC4ibRB7rEEcAAPvW7cRa41fDwmKwZXf7KdGGfWHVAln8tcOdZ6lo61iixitPf/cjjATDfK3DamrPO18rtUI4BE74EWxYTFvLk6YQ5+c+jI2zaBwtlrIll root@a2098d2c-0a7d-11eb-82af-de22b9665164\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDN4d3mUuyNl1z94l+hEcZQw1Jtvr4oEsq5IsWT+LHxvfJdWXPhm4BtguT6Orw8TEM6NWlykz6L97Kg7r9cFLPF81E4iaKZHgFkh4NhN8dqH6sRAXefRLvH31x3llKeZeY8eHH9nmJ4YASSCp7EOoTXMzAWWM+JTfR1h0lxwT7ToSUugiAXNlMDQnf2V/NBAuiWUoYmB/PHFO/3LRHiqlMqYUV8fkU6OqgG/Iigs9VO6j7zJ6MOPPtF/erphneIy9EJA06hVMmipZil8mAn+iNwiPe6T0zpgmhjeO6am94gh6JEvVgNykJEvbFScqGDvyFOpPqxBIsv7Mo2hBYGw8/L root@8c039ae0-0fb9-11eb-9a04-3e74eeea3a1f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/gOyIXpmSKLYZoyUhX0ih6fXk6NDR9icHk0QrwGyfQIuQA2tqvFjouwTlfX1m4OaeUmdX8fH4pvzVWbIiDwOTjy4J/iY+5DAuihehBhd6cUUPYWN4m3OHaTDgJRfOP3Pt6SzDyy1c5Yp9SHJxc32paK6IMn2pS2KKA3fM/G17Ent2w7l8o3Pye3bf5IIOV8aXw4blSsnNtorVe1cwWqp7tlXERQr0ndPrQeKGUMrxC+9Bi4aQoM4/4SlAsQEOSZftcgq1q/w3e9E5lD8A1x4OS0TYkYEd0Hb/EmqnJCz7z6C5s0+b1uccUUcf3ZJelmwli2HPALcRPLoYLyzrLtNt root@2b3e7274-163e-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDX5Xq7gWjj2Y3/A8MPb2Z5tUfOH1dyCeJNSxqZiKm2hOZKOVnsoJc7s45CdcolqA/P+b5vf6JJRD1QqvzoNdqvQPSFSY8tBrUbOpKO0Rt39uVlz5mPJaL+w6l5/ETzfd0JiR/035AS2jRDj8820NGRNSFmrYGDlM/aZesxaO1AQ6h92PEHJRqv56wu8j5zf3TYbT5j2BdUSJH/6HIyE/bZl1p/V7Hcqsq+p1y6ir13l3LbefmqAXwA6o6j+/k0s41RA2IcQlkWHqINiHHDmD5+jQYDOjhNIbIWg7bkYOjf9qJ3AQ7q0deYxQRJmvddgTO7yVC+ZPtVOLDalhk37QEv root@29c7ae86-17a0-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7AJr8Ofg6EUAzARpvr/1jiLbSE1gwjg9jzpv7Za7M+CSSFxnYGY9qBhgufnuig/va3DEiWK6ySwXSijHM3R59ZfPfkiuOI/GvmNUf6JDaIodlZ0bP1r44lOyoB3NgeobWLVxDgtl0RtTWG2bDduMcO3JftmDfMuykCOOZJwRZ6yMF+X6s6fIkfkvCjxswvm2rgwhoR4qAOok1tDzLozaidrQssdcBeGN5z1zu4KYhgsy38ktLfltAluxNvS+jPdA7o/ZNrCm4uT8p6vbCBJZTS2IYkDnzc4A9IyMxLvfRZkyO+fLhzGibZ6giy46yi8IfUhoMNHNtl7kB4qjgQu8r root@e38318b4-2379-11eb-bccb-526de22ef413\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCyAMjYuQbzWpYpqJMkvBC3hq/JMjAh34TeaqALjhq78LOGkSQ6X6dYXBCDRVakM1B34kG4v6H1Y11uFtR98QIA224ikV9NRN2TpXAFthtLKNsB9P83bZK868ySkdL2hoxtJo555CQ35AervocdWpGd1pjsMGvK2TJ8fAegv4fDBJbxS55IszT+jNOR6vhiRIKmon4Zw/mZ0mdWVjd3f0AM6EycqpzJ2Ut27QK5ifsJKV/4UD14AhPnHMVjC7zUxrTusf5mvOQAAJyzdrd5nAmuuhAPJgAKGI/9Kq10DWoX/16BjsSZm81ThmTbAjoT7T/bWQqLKbtxwDxr4rbx5M5Z root@d4cf9db6-3cf4-11eb-a772-a610f2f25584\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDOJPw61S9I4eHM8DQ+6RFYFDAuQekjwEQo2LWrJWSnwzgNTiQ5Ijmhcok5DA79bJ6L/eoyDxDjtpGk8pOaD+ywFwCkk/fzg5v1dIVnIwq9PjKRgdiIOEwnAk7OYdgb6m1m/gUAvWUa+2/PPx1qxPF2WDnzGtKYueaKJI63VnkgVW45O7/QWTsbZlk/yq/HaOQGk+ZMvh/MopCA9mS7rWULw/3b7gKnDmkVDq0fJPjz0ogXGsjLKzuSWbKWsgZTf0P8AxJ+jBG4cKy79Al750S9wKiFNGUgJDg//3+foOpGFye0ibH6nwrdUYY+lQQls6yKxCCyt+bVez6NiQu9YugJ root@23415dc2-5411-11eb-b6a5-7e8b7adfd54c" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T18:15:20.788-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "1005522583204-compute@developer.gserviceaccount.com", + "id": "8257724010608905799", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-062", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-062", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-062/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-062/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-062/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-063/description.json b/audit/projects/k8s-infra-e2e-boskos-063/description.json new file mode 100644 index 00000000000..42d32c7d5a1 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-063/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T01:17:14.678Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-063", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-063", + "projectNumber": "14607710427" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-063/iam.json b/audit/projects/k8s-infra-e2e-boskos-063/iam.json new file mode 100644 index 00000000000..a3b124bf0f5 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-063/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-14607710427@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:14607710427-compute@developer.gserviceaccount.com", + "serviceAccount:14607710427@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-063/service-accounts/14607710427-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-063/service-accounts/14607710427-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..4e80c6ff785 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-063/service-accounts/14607710427-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "14607710427-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-063/serviceAccounts/14607710427-compute@developer.gserviceaccount.com", + "oauth2ClientId": "113645083197698188543", + "projectId": "k8s-infra-e2e-boskos-063", + "uniqueId": "113645083197698188543" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-063/service-accounts/14607710427-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-063/service-accounts/14607710427-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-063/service-accounts/14607710427-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-063/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-063/services/compute/project-info.json new file mode 100644 index 00000000000..81c6378f1fe --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-063/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD3TwuASSJqwHhCUtPz+sXTAVOxXTzQq3EMCN8yO5JrLpIQcWIyU4zDUG/FxfFKWQegkLoTY5wJvaYrQQce8QFmWiFCiVQO9n96vIF+YlNLO8t0EHn29p1vrBsqnodIpXqbpWTkDsfHcFP8P6hpwEo32r5M8RSa/BPUaLienrZWpbKxX+0vC3nrsKbS1/dC1qLJeuCeTX4iQ59udQqyRyQXa9j4T1IvtH/g2Y5pGFGHU9GHqZvDrrQk7g19NxboTGHx+KldoXVlvTQd5dT6cG4gHnS0fJMmpso0sKMUNkBTTEXcc4k5e/UpH5Ww4ukMDokzNevV4y+R5DJjM7UKq0yN root@80cb6d6f-db16-11ea-8c1c-d23af84fd26f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDDe6IUzDmCmmCVob6f4AXoM4AyIt+0AwtgJfOcWF2iDTOCV9ZgXSKcdW9WRJjUOGXcNCxlKVUWrsDLCYjAdO/EwIdl2Q/y+2IW0sHQHr4D5k9dxC3JSEO4cwcqxXJd2kufl+uOAhYqOkwvkan9PCaqd5AxTrprBX9kgJ3GidQomOBv7GituBWsGukEQqWty6GvMPPNhBQtgU29gYdEZU267sELhuv1FkolO4cSis77vIUPZBlfQUdelTUwqPfAKa7f82d6Y8WF8FOTxU/OSFKEuuHVRfyKBmppJX8R6J0m2W5l4Kzi3f7LRvF+9wI1pXCISsbxOGAVKwR4xk3clStf root@c43d0375-df6e-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCynwrcA9NTs6ukW4YOl+SGsQwGPBe6x8iPjjRZCSkdWoS0Uu5rdXHLvjxjgN++JmO1kzTR97Khhqcs8ftGTbkPrNquLaRRTCYyxYaEGJzUvgOkRIGvjtULAo1dbvbUgIao4i37yHiwp+egqJ6jtCmRpgYnZcc0bQAuE7/4yV8GfgiMSbRq9opo+U9eTkTZ2ABOF4XI+SUanzUme2IXnw1opcWubrDZfHa6A/nNU8Vj+2xCulgWui/lOr0hLTF735mJ5rWCg8U7FZrKggMkxEUZ75r3g9gQ5WmYSv6IZ01DWRMFBVbADFLaiMYxiOFUP24NJsT/ea6+0p6Xom4MvxhZ root@f8727b6f-e228-11ea-9eb6-86c455181e58\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCkMM2EcnvZMtnbZokIjYxKou7xgAkPVX7OKzwHL/HfeOexVHB+mrh1kZOPvuC3/8pgQvlgyqwxbOqCabJ6AL/cvbNynIw9fH7tfs5tanHVTP+FJp2IbhHFZoX9HZwn7BykKxpPU5XN+dXFsxGVS/3J9hmmzhzXCIy3i/Yh4oG5l1ZQKhB8csKzaLhRWGKwbpnuZV1Fntl6G+/wJxn2aFm52zi6N0sGB160EZzAV6wpig+7NCb65oObOMGQmtubDC/rEqE5dYgNNExXh2IasvupR61co/gEPVAeBN2cS+tLNg2zPK2+kL1tamOGkR2w/K2n5/q/NRQtwT1Ed49F9jb root@db20a6a2-f3c6-11ea-a379-bea988342348\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCo/Hn/+GNIVF9rvvgiJ0Qs9uOIkKgOSwBwZvEt31TJ7k82ISyC4FFbMsQQoPSl5+Knwxh2+X/cevqaTPzfL9/6XcXsFmWUjUtblT8F8kjCXCuFBaWrPzpa03aEbcw9O2uaM0gsoasGsx/ioe0p0cB5Clej4jflLUurrvU/uzp7SH25Eb3J51E05e/ytzTGddYkCPNkOAE/CTGU777JN+e7AGE9n9MhoXwV6TEvV7Q6m2kdTz+oDDZPuYfA0y2JDzUchppZp/F11DQRiu6p3FbHIMNLqsx2qi+gddct7oSPjTl9L/UpwIsYWl5TWLkuGoAnpTr7XWlW35hIPvM8BO6l root@b94b0405-fea3-11ea-be1c-eaa6cb7654bc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCvVLpuYwAKDvRrOfR6UX+eJTVmQjDQvMv3KIt3vJqSbUUYlr830Q15shR96AChdpIaOhXKawKQuobwVXF5bPPAZBAtqZ3bOaLvOl4RWIPzYTUIhok2V0TrVdm0UdjESxheU6SeM9lgcYfdA3HSCb8rjYOZG+PGkUwpzu05Fig3gfMJAS5CbhoYq1P/+sfYVoxuaFSyy1Xmmi+5Z8vOC1NlVR2ccwA4QRZ1LbAVnJ3oPmDbrN1zelz2/s3VtEV3cbyPuZ9+Xjaqc6glSJRMqcg1Ty8ZeBdPP0ZivvjaWXBRE60apTfzxlEqD56j1a45hpHjcrOJcrqpenmk/CcIvxvZ root@f00c2a44-001e-11eb-b4e0-eacb7c15c8a0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCxaFvYehJGJB12fNcUaThoX8YZNrsDVWjyaAkymFNgED/0vgRKkL4Z/pt+lebVfQYTks+qKZEsDKzfwgp1LJGfhiYfGFPgf6oD/iGZBe252zn2sn2tErbXF3N6pZ4vR7WIua3mtV+P9z82+sqUEGo/ViNulLYWDxaURIDvP6oRw31B0kDKC7bFovGUB//nxz8BD3+44173kdtQ7gHZ3+tJJbEutPGQ3U8NeKDj8X6y1ITK3z5XzYw0C7OkKm8xtLZEw9dpqD6kBEw6V8CfSQOxlPlA86nwnb1B0WM08ZDZOfewDmDPtO7vGt2i5Vz9uiTpYQEi8vuTpPn+e3gWMQX1 root@c4a3bffb-0c44-11eb-82af-de22b9665164\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZ73W9hlxSUu9YwNpTf5ed/00hRUWxytY60+s2Oa2i2FRI0w8kNAo2ZZ+jSSVwGxeZN1kSVWQs3zKEI+6McVCzMW4OwNBa72BeLYbFoiawH38UGdNbhUiv0k8GwodlK9adDPm9cvs61hhz8PnmbrgiP2r5LiSpuMmzPtTInXLIvQfZLXs0QEAlWMZY3vzRN5AH9zdGRkJjPWNcSSZSWarrGisuN0/eW2um0Rxj9gVIJbIJuB47tGoEFhkEVyA0ptqV79y7XNBPxedChAkWy8F0nf6GanS+IjVitJuohD0+sA5YOjpvQaoyYln1HyWZa8ku2QD8AqqI/kbHlIck48+Z root@5af70853-1167-11eb-9a43-0aa5164aad51\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCYC6y3qTZZ9Du5jW6qfegHj1n72+NlcprkthXbd4/Ix2jWTo25vXqkwNpZH4dMEgngua8k7RUgWyFK0tvkO/yU8UDv59psZ9xSlES0Ikp92Nq3lQfSboFbP64oXk4mo9hllpkQGbG375LOW5gIMaJaVRy/KYzqw4/fYuHkXOyv53HUzqjmM3kllVLV/ZxrcgswOIjNDTumFvGPsyiBkQUVZ6ttCXX3UCVRrwY1kWzwK+JVlxGpy3UUtVx1SU8ETiELhTrzWC78HtXeN5FesUCDebFQfuLnoZhmnhTK3gViMyAL3HyBqJParnN2pxh6EUiZ7iE0ouaXbPqup0iPAQa1 root@f7785deb-12af-11eb-a3cf-6ef374375bd7\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDcH6xEnA1TpEuAPKD3d6hQOOjyEItYMQF3E6ftDMCUnEDZ5mJl+Be7EDyKnLVI9iMIqRfz5Jl8rQ04PyfrLjaj3NTxe4Qi90jofDQofJ0KvmCKwlTpT5VqO5Exor7RNI/vKbM+Nfsg2QI6pUG755UPAIhm1z2gAPUi5XaNztW16ZTqx6rVIl93LI7uPNJtypDeX3mGhmSIPVZA3jNYjvmeqCmoxBT8jCF+PBcynjDPbKHzkRBN3yynUNTlbTH0W1ZFaMtQMCwSreGoMRqbUOHST+Azn8wrjHm6N4WVsE1sXzmC5W6fKl5Blt2V9vviGCcmIhw1d1JqHuyEkl6eyYaD root@e97b5994-2c8f-11eb-a59c-42dfb897bae6\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDFqFLKBP+kEU4DYMnLtnSc+7QVSutyEH8k3taRRZypG0VFH6n35cw1sq5dBQ1o0E/WREqH1Zxn0Ud0mUxbs5LiHQCUMwtyKYxJ38aZNgZAH3ckGvcMJ4RoWIWIDVcYa9iRo1U50Qo6L2pniGHAjxLz0yqiyLm7rytPrYbkreJYO0R/8quCFLByud8sI/suADXJaU6Pu5ellORfJCdJTHOq8746lDgJICo2ykoUJh7cZSZRiQp6U4kaykVKTfjuQv7HQx3TWIcd7ud4fZa8yIX7pkp9dz7TvHoLVcM+DGrOai/b2XM1tzOLGedxOi3VhUbW99PMq0gjXYnf4E3H9qZf root@ee1f70d2-332d-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCzZ19V0zTHqk0jae+qvraamXFNNrp7g3VAUHlYZQm9rZNAlO3op2+QVZprmqEtQge+AD59xtafwie/uui7sTsEqjBH37GPJvMGfdLlCuzSERlpDK8Gg8a4Oo0P7Ci9FeoC2hDmmvYrVtC1ae7IiLM6D3gD9lVKAfGYTQr4T/jjEb5HRkNF7Qiat9sgx/YQzMdvMoiom6MV8T6niJD1sWJfGN79OTjAiV9pvTA/mZUpY7RvrnMzd/8wsMQVcItNoV8AST7ElL7nQF8VDtdaw97kclUyZ52RDjFmDPk+OkxWJ8oN03mdsRGIC95zwwE8qJqOxUcyuIOH87D6d2J+Tk+p root@8588b025-3b14-11eb-a164-f6e7f2ebcce2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCyUCCxiyqnnS5ezgZjcNgCHNusrGj3HmET+89Y/rbSL7b8Xrs12Neu32G5Li5YuN6OfUfvX3YWSyFs5OFCWjVO6ibzIwjuNV0wD0sSy0igeMEh//aeJVuffcs5/+DL3jTkkH1kSWy5HOROS+Bi9qsNqTZH1wuJ9nc4oacJzecGl+ObFgZODSuTmIQH66gqrV+cjEnqf6/e1IuUg3S3qauQavVoobGPuAGy8k1siYbevFLqZ9AAF/PK4Aw8sdG4pip8FLjNWMFZdX5vf5jbGBTGaZGhv9Jp3Rip255soF/C4xXiTRGihK7HVtCevZ6r7p4xsbP6S2LMr5/dOnvryjt5 root@d57cefda-497f-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDRZbFyrVJePrUpGEMF7GyJxk8Bx/VL6QzJ00bR/giezANoFoUVpMT3sG6j/CfEpcYAiwDFNgR7yLtBfUiyI0PTsTJdxWgthR00uq0tZrzD6eB1CC4spLDFIIXWYOk0K/TFyiQdRVUF0mJ5pg+xbwZXxuPz5u2V5ewK088TogcDdAFtKWlLfRq7K/Y5pYEd22fuLLRLDB2MTAp4rClWf7ydKFMpQni5Nef+YRIIjc+h/82kggsk5vZY/wqLtnBdqOjwavMzpOF+WdaBG8cKuehMhnlu5uLVQGZXlDWwsACmsiMIdiARHO7cl+Gl9M8izgDoehZtXT6ACnUkrRwsnYdx root@b8559903-5230-11eb-b6a5-7e8b7adfd54c" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T18:17:25.726-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "14607710427-compute@developer.gserviceaccount.com", + "id": "946087443857067978", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-063", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-063", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-063/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-063/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-063/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-064/description.json b/audit/projects/k8s-infra-e2e-boskos-064/description.json new file mode 100644 index 00000000000..e8d9eb62020 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-064/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T01:19:13.397Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-064", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-064", + "projectNumber": "846561691778" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-064/iam.json b/audit/projects/k8s-infra-e2e-boskos-064/iam.json new file mode 100644 index 00000000000..a0ec756ccb5 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-064/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-846561691778@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:846561691778-compute@developer.gserviceaccount.com", + "serviceAccount:846561691778@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-064/service-accounts/846561691778-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-064/service-accounts/846561691778-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..be35d74754b --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-064/service-accounts/846561691778-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "846561691778-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-064/serviceAccounts/846561691778-compute@developer.gserviceaccount.com", + "oauth2ClientId": "116269728603345630458", + "projectId": "k8s-infra-e2e-boskos-064", + "uniqueId": "116269728603345630458" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-064/service-accounts/846561691778-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-064/service-accounts/846561691778-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-064/service-accounts/846561691778-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-064/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-064/services/compute/project-info.json new file mode 100644 index 00000000000..f7063ffb483 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-064/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDXvYRgUty852E1f1rMnHj+aezGAR9kxmvTzEtHMHavweT7a2x6Ob/6G64APeZ1RPbXSEGMGB/Tv2x1xsB3LpAkxx2+c7ZoR4tyA8nfw7slyj1OXih1oIPNf5E+ldKFDqhYZM7RoQxCqCEx2T0GCsfdtv41m83fC+cBteS4qx0shQASe1Ikyl1F1LT2sdJHT+EKvIEqKYNCUATOlZTp3vGFIAA0BRkcSYqboB+N7aN+TiJvi/nG0A8lyUSRzkj+EWJ4d/a5XaMGy0fOEEQm97xo7CL6wxjCkF6jTwkvPeIrLlC+I3m3CHUhtZxdS0vtGXjOjZ5WoEq3eXYzb9GpQUZT root@d86b5e04-de9a-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD3NtzUbHda07xOZd5zX9EeSdql4T/CblNb8GfK87fTNWxjQkYKSwBDN+lopdeVSqZF434G4G51nQkeZvWYYH7jfKqHK6lhWuvs+eemHZ4Yt0loe5JatEYWQs5TwX/L5GiMuZULWKfHn79an8GdsY2PIo386TCYs+Ek1xz2VLE0wGWa/D+b5xDcD+NxwsMTXsgJi7ImGou9fCOqLmm9TvqwYDDZbzsBQCc1g1Vro2u1NS4K6x//G4lhtcCDbn8ovWypb9Iu9Ii0LFYG+ltdvfRotgCAcq5aqK/L3jFP0lG1lkgsXA7863RafTCCzHIlPzFyRKtemzIQgl0ziNF52Ytx root@b3b274ce-dee6-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBsx6OcWFqUOgvdWIVUsqY80JHiSZL+onuwbb+RtzyPWsadIvNKTnAYYtPR7DilXd1kBJTsGFKsMpzYkzov6rm2NKkuYahEaNesObnrKFJ3g3P8KOSKp+CvCSlFxW0XOMMiy7TqGRLRD90QwdhjjqD3xGLclnjzxHrKj1+R2UujAfxoPIf0TAj2TWD5Z2rmxPtdk7ax9bIQnqBDss3ZzoNJ05CzsNRQNdMt9x9ceAVeekI2W0pQMrpuW9Z1w1qen+cDQ1qCGQTYZPt0Y0i96pk3iHeHpyGo09izuPS6MyBcNBeOgCl1l516y+Z7ITMzKwqnOzH44JBbBqsrSgN3vbT root@3f9e3181-ea7e-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCUtGcPnBuR700VNeMLw6Vj4wA0GFmbq7Oejh2TPYgHqBEzJTvQKxOydSq9YLVz6cWOJ2Los+szZyZw9Qu5xUn8HMRJI1J25x53bi8LXPiWBIyMdyJ/wIDS7mumfs6ZnXvLRSTp98zAjKnrEbINToH94yI5M5SkNmJWbmTiOhrvBO94lxlfz7GwFQrzZ0iiOxAEAe0Gx5tukEY0tPA7vodl7TDq4JMFGimX6HsQYRi029gcm2GQcRniws6LgUUXasixRuea5faV/kdydKugTT/KiuR0Y8AIroIDYnguQ/06Raf1+7UiFzk3ICtUaRuyd0Q5VP8KGN3qyq//sIHEZbX9 root@8c934a67-f785-11ea-ae6d-8ed64f3416c0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2o7IzJPIZUsp8njX/8RxuCrhpU+V+T+CPAA9IEYYFvREkON8jasta44jhVEkN/eYN/0SL8Xa9U4LS4gpw1dbCSEOoR8gOzu++mf74k1Q5crREuF5nHKGOfgrY0OgrmYNVtOa9oiZ+roN/WsCX6nRKALIFfMbitl2BhLjCOWO3eQM4ypeGd/usMtHpDu+XbROMP5dnT3lf6fKwZm6vaT69kKpMqFS14ubzEMqUpz6DlBA/ilrb+BokPZ06rLp1+9acoZcrpSXgRABtZ7TolbLPXDr/Lh+L8UsMNF63qiFBSxhZ1f0AlM6gRob1KJ+/PPp+qK8JDowMoe6zcIJT3dwT root@322dee5e-f9e6-11ea-9c73-86173d37727b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDeZl0gCeD1vsQO3rGsQjEVok1E2pGTIx6Gg8Zq0n5YZKT65FzcObLDYt/nvsHsx8RhKqaqL0idVZ/IVOK4ntMP8u0TnS6Wfeeq4SECsDYwg7Lk9uoD1rdNiL5NnIH+Fc3G0nwY3DG0CwdNbBiLU11HKHaTNb+fHlqxr0WQLDekZYD5hYyCEKMUCKaLnP6col1kEQsrCcxhGv/SZjk8sMM0lKkFUdpu7Csp3w5H6CbUpFp0LSn2+6msp4jUdymM49pc6D4bvrlVkhW8B9+5la8I2u9RQU6hKmBOF1rshOC+lFvd61soG+wgPbBW0b9YEn6aSxBGk8UlEc/68qVIS3m1 root@910875f0-037a-11eb-9ee9-2af320b50223\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2nBEUpdpwjDoREDstfSXzNGr4xeBY3vWHUgZp+RrUl44Cmqx7/TDGQFJevV4UZxxTJSLNX4paaZB/dqo7h9ZqwlGg0rbBF1vxHCpo3B/trzifm8CautdUltFZ7uRWVgEs28lb/Tw95wak4bCfxgRZca2L7dV3XtzjlkNsi5mqQ6e1TvwQidhMfQ5O4b3QDJGeLoE6UNWYfKo+VN2LS6ae50rxqixrd4o/kmXzH8k0xrsxkHjZWdDMWdJOeaPXn5l3TDQgaTuiYZwYYeKQuaC9FpM/6iZ/ltiDP58pCrRcVd1oIPo2T2Cc6hGrcIoG1ZH3WNVwb2FOXtfmFpKdruov root@85add1eb-063e-11eb-9dc4-ba187aea6a9a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC4Y4NK6TER5FgcrTTbPoSz/cWvjIgtGnKmMlSB1htA6WUkU6CFRnYjqX2jWuNTarHROrgFBYpPIuhpLEFvAjjFV7szWtr0OgzFBbv6jYHANh6vqRwcJCnC+oEosxCFueJzTSYB4FS80B9yNg/RRpxT2Y57fCjgIJG689JrAwc/l1JjCq/1bffr2dKk6ElWhEtGjPyoL1mMl4Il7XJ5I9gPv0+sCBmV7eKF1IsN+8iaC0SW8nkXZpra9WtPYNx4QI3svj4gZS5a9B2MnOhGskvD7RY0mt7MTx3kvlBUvoFBQ9F2GWMhNw88X5D6e/A9rSAkR0E6fa80z0DjMCPo/t0P root@7667ae73-1bf8-11eb-99f1-c6d701d1e283\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBKCQZnL4oypI4fjz6uZ7Hni+hVmdS3wkc0tjjaMGqbggzYF09jDs2WCrttLVvGuAHozmP92RzSGxnM4j1qYEdtegJQPDLBfkMkp1+3wuUcAGBJR8vCYgYpTvHhWXyNRH+KWx8Y6ymChxExgwa3YofFa8hmLLM3etbBNGuFxFzU6pItnAEovO6Q0mcs3ygk59z9T+FX4fY9tm+IIUdkbrkuZUBblhTO0AKSawIJqEeQwHo6UxAwZl3cr/py+P+EBDYfzd5j6UcAbDBt4QsWyPe108cPclDdgzxxO3PEMg4Ez0Li8t1CCP7oPXmdpqrnAy4/t8+yfHTjBigV3IGzYYf root@f71269c3-2b2d-11eb-98a6-ba1d66ad0079\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZ5qRQqaiyyqw4Uw9Xrhp+2BGsb+fO/8bGEfEZZQ3Euq6zwyWmkTL5G83A3M0+TXk/8igxxq+POhd25RT5RGdurT0Opef13wd4S2wCpyv/oFVR0FY7YlTQyLzaYps4EBrNdRR3ivR7jdu+ST5irH+RnPXhPxg1BZemJGe52DlKSE9crTEHK310msjq4ewnAyeNcnzsn+tGfs5vNlEHASPAhMQViLGNQiaOg/LbOkEMv+q9tRdT/cSZwrLM6KTuGH8QlGMRY/TUuJ/XJKLUK9KhNefIUY7HRblmbKh5WoyndaWYta9HrQWLeNxfn6M//mac9zmQ9fzqLUUwTGIT3NUV root@42dce4d6-3cc2-11eb-a772-a610f2f25584\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCcPjkLuIWrPSTuSFkQnD4ot59kpjIG3hVrp+8mKEggv7xlIbWZ5F7iAeP3qm/S0NX/9A0NhoTbrKPZFW7q94xP+uwN4dtMpKLpA0hBEXOP3c0IgVoRDj56a7Ouq6TLqcvAUNKxQoxuapH6dvWb2jxqaCKRMiGWWXZWc/ANcV8xkwHAmCjZYy7TgRiGrtFAKujlTCTAa3ubDq5pU40l4T7Nm6108nsQilSFkbSuL6hu12VxykPVnifsqO87OWHvA9UlRAPdNHtlgQsjHajav7bVF+tewV+EI6KLqzWnJRFL0oiyF4B4tQsNEPmtLMyMOKbETJsjHutHSdYllfaMT2pP root@f9c466de-3d59-11eb-a772-a610f2f25584\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC8qwELhgUIKaJdTAMNkGddDCfF9kgl+/oBx5zS1VVyfo9FhJv7X5MPE/bekrE533ftFR0XEalzrApQtRyo0oNqbU6USza7Yo1bYnpgKXA+uhjfNJ07f7Ynb7PFmzb9Cw4WyoIb9MbsDswPvrrLG4r2ADi+FGo3XPuVHv71bPA78TbS6aG/iPsjbVXJPV1Rc3RbbtusqSIbh5UUuK0VtrikOFgTEd5ap5E5mIK04gb3eWrCeK4O39YnBuykNyoX+TFXmmarwy+WAtal1JwzDkKggSlFGtd5h3T4QUwegKeABzJUT6WIr/nSJeW3oM+VV8539Cd9i7Tx+dUZaDPAGHp3 root@499c9051-4101-11eb-acd8-6a2a49dd8a76" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T18:19:24.412-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "846561691778-compute@developer.gserviceaccount.com", + "id": "438148075808018291", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-064", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-064", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-064/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-064/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-064/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-065/description.json b/audit/projects/k8s-infra-e2e-boskos-065/description.json new file mode 100644 index 00000000000..7c4a4b338b3 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-065/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T01:21:14.992Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-065", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-065", + "projectNumber": "434948373658" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-065/iam.json b/audit/projects/k8s-infra-e2e-boskos-065/iam.json new file mode 100644 index 00000000000..a572aec9cf7 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-065/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-434948373658@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:434948373658-compute@developer.gserviceaccount.com", + "serviceAccount:434948373658@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-065/service-accounts/434948373658-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-065/service-accounts/434948373658-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..78fdd8c1b9b --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-065/service-accounts/434948373658-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "434948373658-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-065/serviceAccounts/434948373658-compute@developer.gserviceaccount.com", + "oauth2ClientId": "110559801857907920378", + "projectId": "k8s-infra-e2e-boskos-065", + "uniqueId": "110559801857907920378" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-065/service-accounts/434948373658-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-065/service-accounts/434948373658-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-065/service-accounts/434948373658-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-065/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-065/services/compute/project-info.json new file mode 100644 index 00000000000..3e20775f4f2 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-065/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBeRi+0i+hyUd62mv6AD2X6WjC2WQm+7YK+EW2VaF8Ghnat9t/BwOrZLAwrxGfB3lJ4l79oY2TN3XROsH+D+xZz55uKCcnGoL9+RZwG3qXA4KHZmZNR4QvLevBSABMTvmJXSQbMJeeRwifbsptvjgjtYivLmxbR3LIuKwtdgTkXI0Cnhx8pb5aQfYxSU36J4bo+vHsI80FxfjYAzSE+E8ebI1IzOdpQ+9o3r1adoHruoYo+e5Qz/SeCwWycYwOqHDNLSzRxHLJKI2GxTJmNGFV1RPlcO9uX+L9sP58PInzpevtPHDf2es/QAYZVh7bsLPqN1YyXVoJTgTLrdUXewuB root@d766d264-df4b-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDjUYC6TKjKpTgJf5/1sC7r5L9hHJhi0jCMFOQbKeFl7GF0cxngdHff93Op4SdfQ/laUtFyl/clRY9y9m7vd5aTws9YB18RQ74aTB5SPIP8DUD1sQJKz4O3I6Ackj0fanSDpKzaVUeMlUIilLqiCpBAUU6ye6VqJ970ISZ/MqIS3IirDu5Esh6RAjpLxjmP050qO5So8TnwASqMLh6vWgAmCMZo22aWzb+6W0lJvFDiSl5YLVE8pWznKUPpl0Sh9nk6KnccJe4fN8semSeywIAQe1ogfTrX3rG9sR1rmANXIHGC2eFGRA/uLZejXZhyPP6o6DF9WifieEMn1AUf+gb9 root@8a2224a7-e11c-11ea-8c67-968ff53f47c5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC95s4+GRtupsNZmuCod75XEAe8/N62KsA/U9xaUU4QQ5Y36HVAaFSKW811LR9boybhASRYXxxa1UN3DOtK9BezfSgrwamvcqCDD/qowOxxENBvGRnrLI4mXxDltTws8wPkFRTc3JWWOVZ0Y6JpMD3IfLGs3fhwOHqLF2R5h4L60TC19URZgP9DELmFZC65btsTir6+7YJuo2BODc9OwH4AWMemxzrpYEOUVwbFXdAR9hsZoE0tRQLWpzBXVHrwMIQxengZzPuBVlZ5xU83AkZnSWxEMhlEzixy3sR7WttX/2R5FoIJutkoklmhaga1tmTd9rkW5lbldmxkf5YG4mJn root@f5783682-e3ef-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCv2snQHvvf/tHm8RO4/X+KvoyZ3XnZXdEa1dolDIKb9C0/YSDeHVflppZwCQWqhrJBLkaPuLY8R8Q2Egmjfi9m0EuATSEBbErm979YnFAjAWv0XSKEkbcnbUb2Y5vDYZyg2jFHIyo8YgLMctlKweyz7uVJccIXXv4nydg+kHuZzCJKLL4vKatFlDEym2CDJlorl/JNf52try92Nlpp9ID72m/Mn6DL3QrZI2lxQP+dis0Xq4prNnpT81kLOFBqq5BQGMm8MgMMzffoW1Y1b0xfqIP6Pt0WgBo2hYvxIX3o+7MB+jbtg0NBaX7mH7NRQEp7HtZwTcfmBxoBjsVrBj61 root@7279bb0a-ecaa-11ea-aebe-3e85ddc86bf2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCtdcSGbaH5vg/K4OfERZ6rbJMrirBm4QqH1r/qEWalXoRHEkL+9tHqJDpukNJn6qGkKFVbo2YnOSPm6Cw2MSBNoHXHDhC7shRhGDPmJq0eLT2bIXU4ih1w/JBIMSOh15u3LkX1PQDoCVGz0MkNKqhrQfMT5BCXA8v0v5z/aWzWxZm05J/e9lol/oLxCbGOVKiLxjRw20iW4D/t2XDttjdyz9Qw/9lWM96FGdjU4hBD2TfaeGQ+LgHf5cW/ucJ/8mE5EBe25vkCWBw1guIaPnkzhWD+mhbylemGousa3DSss58tdcdXzYWorZh+rHXgvhEIFUAd1zxHXS3dARX9Ite5 root@590cd3aa-f181-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCwgdx7Uba+sN65zltF4NIFqxnyynvqo7mLohuPmI2zIIo/0uFhxYdkJ1jDU5N79G9WBAFTwtToK4TGYDeFc9LgnttRaSgH+eOf2nt/5r8ryDboPOO9CX6adipMpU2E0W+BYMgTYcSY8klgROysqqCtPFpvBHyOsmM6NGhhh2HgwONr7nJcogJ4wqWwIXXRsSeWMDrHGcnaWsKYSmB2gHdb/a5xExIAYU0DhsKDFuVSF4qX7umuNWIa+SlodDo09sUWVza/pmTgYuIEPeAgPzlHdd1j4fXlygkr6vpOIClJ6g2vyOt5JPX1kNfvozsQBBN45UeoR745JqxlsAvuvlGb root@dd06de4e-f63c-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDYvaTZFJM+4pRp6KpYYGv2dKr+hATW4V/nNglojWYkQw41/lqwUsWFL8hYLpjSLLpQ1+moGr9eRxZIcTPNSbe7DaYPEKWVs5fn6JI2xqETyCdR37A579TBaYtH0b/0gl5rzt7jQ+OVUk0Pu99hNeMBvUX3PKueWIUMizKKiMxwtJOYTXRzIJPvUvTdRE/7IEawz0JAEMXAacLPGbwbmFj47rcZH3duuJDHvLYKYVdEUU0prUP1jwWiAzrvV/Mt7Bb9iQighiX2bCdlT2eyG8+f6m8h07KDXbtqTfl1OeQkhzrheFnV3TPC97ehvu3TQNAPXThjRn+A3EMdKf5mL4nf root@ca6feb0a-f851-11ea-872a-bae3dc204648\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCrMId/829xD6yYRfNuYDQAghXzOQACiPL4J8uDxGFpRn/NwnWSXUIy/UQ/aWe/F1/1bf+HXoqJnr1vTkx1OFRUWZcxeFJ1EFmuwkI5fPBBP7/dNBzbTWLOk7lpIxEJphc6mgsXNoq4wpsYbkH3kUQj/mi5SJg89pnHkRI1DsHe+w+BUOCP9cGHqYD1ZgkSI5Fzv2kUkQOUnYKsPJoiVn8x98gDzpf6nyMBYVaBkp467tRfLT22y5TJmedNrgyCIOJC97n16Be1R0DcV0MNOn865fpuNACaPXgN0CKHwovmgOAh/LBlLIGqPWOllxC+mlMbqTWklC/Cje6/m0F2Inz5 root@62351d2f-0a64-11eb-9ebc-160f1a1b7fc9\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+Wyclv/Gfkih2kuo7ji1eFwvKYxFbTQ3ZSBT6mztmErt0413uGzOvFZApGpayuL+YeRKqyuP6Zc5s2DMkH0sZgHUc506JBAQS2dwi1xnGqGWc5WoXTbp/gRa6EYGgmvCQsx09qU0cKWO+Wu3c0zUIyap6A8zH0Y2fFsehVsHRv0JSWQXsTiMzaVcwk8nDKBSmtiLjHYn/WJdFCIlPXLb5nISfdjUnlzwDBM78iz3b5TBSzo4SAEs9t87X1gzmJFnEleR/Jkt8NoakvUfnIP+E9rJii6DyEWASEFc1CPs/67of83Q85ykVX/7svGc0XXhSsfPJnMG+CthAVwx3zfZn root@35e768e1-11b3-11eb-9a43-0aa5164aad51\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmEjSxkOyRBgyQnQ/TmR1kUDjH7I0FeSQMgOBb1EsxhSdQjHc7GGXR7djhZWpOJCf4pFgZaGmlwR/Vs3GtdzULyqt4coB9wgBvHQJnTnVJchhzL9zwjTKbMuqnfXxZl59Q5hNy9rRx+Ddz6JZNBdg6WolEXzOD2XgZWctwZ7FtsnIvMWNQET+VGDUNbhG1kw2kzWjWJKGxN2d4iEncsG6HW3XKdEfVpAv+BQS/0G3Le33a/gJ1WG8lwLFVKyov+dRRCEWF9Toj/5lRQt8CjE4dJQrJ4bkUsDXRWG2sQZlJbXO1AD5Z5SfiwasWLFV26pXS3BRpK7fryKxdwlQuxjgN root@be147e64-145d-11eb-8a3c-66d0ef5d093b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0bAOPUY1T4en8QN9tKsT9UXFupL0T/0lFQHvYTXZi5+okhZLdtORA+si32RTOwuXuNmSCQlIohcWq94jaYxfhBX2JCdYOWexoZFIHQMzbikbWDYPdISo3dmZ7yBdn7lF8qfGdgkreJSEYjYTVKKTxBPKUNH3MshuuIsZK3p8nsz+FMhsqE4D7UN4G27BwPcJwlthBOM5tOmhXeyqyD7MlbBqGXG6OWG7IERB6fV9rJpVVEOy7a7+PGRuvIMY2Io9JGmlNgvejJmitnZm07zedUzZMo3H2L9YkvsLWL2BGZoFSyGEPhKHFWsqt+SelSwv7PoTYVozL6kCdXPZ7ups/ root@5bce78bd-324a-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCtfVg4OoFc4yP2vC+9KOH7ycSym97H9J40eYuLN1gWfPxQBm3fqyufV7ySAezeaRqCpaFYx1lwFCa9G9yYtvoq3xzXvjI6bax8zdiMiBGo0NVayyQBNF8KB6f27UNQFRjC3IglaLgV26LQcUUfHz3JZaP23joyJpQ+Mvr7RTgTtQ+YRu94Pmq/1MYFQPfCAMWvcw7VNx/ikH3jsMxLOWWY0DjEEhUc9z/fwkSFF+Dp5Qt2RpduhVNpsjVS+gjwvYdUAe/y5CDlI2ddoGl89zUjz34s068jKQNxihqIbY0fLRKboBkaIreNBhDcq/H3T4o0Yn4QAycwCJstoBbqMuwd root@80858962-3411-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDYhQTlrCSE8TsJK1/k1I+1HadjVAhsPxYDtGHdjSSkrE1HVWkr8l4D7FRBvhIPt8S3U6pS8JVH64lojLg/Tc4RJVzs0vuDqZaZfvZo0n5dRLTuOQspz4Qep7Ywr5cXI40xfvgspA3SY2Aq9OrdJXbXi6ce6uo9alRpcqqhfhnv9iOk5ejWXZXD+reEEPqz/OUHTz4aLZcJXv3bz1pjBj52uS1x+5dquvras7k/vkV1bmfxqU1zXuDBMIqhkkLN/KiuIAQOy5jM7VV5P3yAGiLKtg45V9DGwmVNxoS2kelxq2tc9Sq200492WHK5bb3rANUK54//5+a+b0JnkkWnNpb root@05f8deaa-3e70-11eb-8da8-6258f8057dc0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDgoiyFN2PtdT1Y+5u4kMnpnqmnWiSbqBmsnKvQ/WjtkFNwNsiQCoHMCXfqW+d9vxmaCMSNmnoZxBkgMHda/sqLehJ8qT1D0qHtj6LsSb3IJBfoOVMH3Q6eORsqyRIeKWQ4YXqX/MScULGscbLfkt+Eh0E08kQ4uLr1OBTjJaSoeSu79UHX2WOhhyibX5x5oAJ2bQ1KhN+zOXnXGFTwFo+5jjpGn3e2ud8LOZGZJQhVRVwF6LmwpyiZyVGZOF+vIlh9aID+WN/HzDKCGIiQ0qo6S5YiNZ3y4Y7Gdxp1WjJqKWgvPJxR4z8zXiE2Ixr8gjngjSd2vs3tApkSZ3jlroOj root@16757094-4bac-11eb-af93-4e5abfa0c065" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T18:21:25.584-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "434948373658-compute@developer.gserviceaccount.com", + "id": "2623644714113355002", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-065", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-065", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-065/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-065/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-065/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-066/description.json b/audit/projects/k8s-infra-e2e-boskos-066/description.json new file mode 100644 index 00000000000..a887dfee310 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-066/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T01:23:19.919Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-066", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-066", + "projectNumber": "234741550692" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-066/iam.json b/audit/projects/k8s-infra-e2e-boskos-066/iam.json new file mode 100644 index 00000000000..ecba895d4c1 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-066/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-234741550692@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:234741550692-compute@developer.gserviceaccount.com", + "serviceAccount:234741550692@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-066/service-accounts/234741550692-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-066/service-accounts/234741550692-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..f3346c939cb --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-066/service-accounts/234741550692-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "234741550692-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-066/serviceAccounts/234741550692-compute@developer.gserviceaccount.com", + "oauth2ClientId": "109816537890166074291", + "projectId": "k8s-infra-e2e-boskos-066", + "uniqueId": "109816537890166074291" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-066/service-accounts/234741550692-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-066/service-accounts/234741550692-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-066/service-accounts/234741550692-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-066/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-066/services/compute/project-info.json new file mode 100644 index 00000000000..b53925acd32 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-066/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDDlRAHr4dN7T9S2YL7iv18llvI+qHy+iZ6R/cnNbMRczv+QGjPtmxEP1MNOcinoSryh78Sku5rL6RtxuBDxg72tzEzRT4EuIkNI24KI4biVzMsZ8uiLZZr7gloqLK9wDd6Ywl0gG+LYWKEanTfmRGUZ7M+wDq6WJ1rSRpCftz+zyPGuH5yeUfiZv458oF8ZGYf0+dMQyR68hqygyCssS3uNh07b3H9qzQRwvn7qPXeU2CcQlGrSThUwZq2NRFTRmZWZ36LrI228OWumrbTNtP9vSmmRHUgBTkjdUqu17QslMSwheyzumP2DQTHFc3iRvhQ/5Nt/YyhbjYUJfBrAKQX root@988d89c6-e4aa-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQSQKTuekqIq4Oga9OWRQzKPV6VQ6/HYhLJES9twOUE3zSC5aI8rZ2P5wwkPh6PGwsi9qGttTOr/QXzfD6EIszjObntny+NlDtSZtmv/dcFAXGvymDAL9yXWoPSYmHix2IUaEthcuW6qo2c04RNXPzvlfYRBpDfj5t9uj+bL+GrN242N8GXvGnnUHvKp7uLt8+Aqukd0gceR24hSVOdO74AGQ7UA8/pJRw9WZy3zD2zXoo3spFq49mF7tfrrBUwSypJWG/soxLPShfrRkKtqLm14j+Q7PlG3f5bGohC2bcZ91afjXIrBxZSe62qo4j1hcncRHpdfi5aPuZL+jExU0f root@33b06e20-0787-11eb-bde8-b2e010cd58b2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDH/4gVJ2cqFSjIg4mfi9gCXvmCnsja0loY6Blco2DQrRmUIvD8b9Gug7BOqbGUATLu5sz3dAxZhqbDgJ5ttgeYDr+KJ0sEljHO6nK+qRqCbjk2Yw1mzBd8fan69GKvdS3ZYOjzwmjCphNPPQZo3QU0S8Uk1kxd4gLBnGmPtPSjnyo+/UMFQ/Xxb2Gpk7G+BGnoWorG5gUmv1J3ej/Mlw1Dvvhm0dxwrUztPuFzyUetjx+BsyrvGaGlTaS8ali/khEU/6Cnn5UhY2Xx5fg8588g8EAwuhI5H19x3Ue/Gm+Fk1vaY8TqsP73qwyBlJUZSGbsxGhPLgIQjbF7D8GpAaXP root@574b8ad7-0bc6-11eb-82af-de22b9665164\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCksGjShmuv/TOLJcrC/IMb3UR3qxre0cFsZvAuSChwDjRn7ky9iMVktJacTUW22XdSZV0GNv3d3MW+rsujsCMudzU9G5XjKApJCjhuTLgSecfAo4PuIwZ3o/LWTk8Ofcqk2Iyi3Zzl2iS/uVowuUdzBJdHn7xAkVgIFLP3cRhwpfAzn5IjkDj06mb7rxsas5dmzrhLZnXzLHzQSYxwFeXYmyLfnISzb2CLG58YJqfhCwhhhqFIdBdGG1FM6TRi61lW4ByATTawuNRlzJGGq2cXqOSq7Va0iqNoNBRTrD5LTqNNCXur9jN+p8OahkrTuQPLoyhrGHK0lD8/ocMTVuT3 root@5cdc94a6-1005-11eb-9a43-0aa5164aad51\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDChATQGGhi3dBT2sBJst2V73j6P9KBrNJKlcKuzRwOEkl32W53t5SKB//TxxK7BFTiLnKZCCVhI6DOoQEe09S7ei1S0kZglZkySb6CzGvZqv74cc2Ar3KJjTTZzgfqwy1Bsy7l2m1emnagZ5J8H4QYHXYtFPHjonqDzu10aHreFdElWwERum4I6p3AEIBCZslsHCi9FPYYMME26k1yFnnmRRDPny7V1y/Vbl+H0ry51fNymGW71RZY8Sz2a0MhhqHD9y+vnKGQq8Kjy0At7wW23iDuhxOq5Pt7Qu9kI1ceqTggxwiWW+YGqmCVSTp2jNIm3P5eQ7egqEPG4cdxns6x root@12f37047-109d-11eb-9a43-0aa5164aad51\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCYxT4I3De276vPeQQ0HBjLa5XTAHfTIaM6A49qTpxtxpzg9NDTkJHf7+AbC50HxtFATp+CwQDZ/HfktLthBt9557jATOb1xXp0GEE2AOUKW+PtiydHZLBsFCbPWoEZ+ZIfAIK9qC0f22o5up/57zO9P5m70DGlGSqV2klxrI6UWhl98v0JeNaOdp9BnctD0JVF5oEf8Cf0OiHosY/mFZGumeznxjwtYsxDDW3klWTV4u9Z0FXQI9J+68SRraujwhVLkAr5zp3YyVVyeZfzxO//K7pP4hGeWrhiJ1LWg5NG94l8bvVpa4AFrFRQW5/qSGXzJnoO4LFXVX+wU7y+ZQxD root@ae63551e-2a63-11eb-98a6-ba1d66ad0079\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCg5yeCWltuEEIhZSqNX09U/SyFwHCldUOexz8QLr3HJhSQIMQN4yyADPr9puS/JUvelgectLtR44lvStSqH3qvOY2MKBjJ8Yc9O+gj4Uf3wITQVkK85Pcv5o8sqAfnnDfJ/qjEQN39bN3NE7tkZ6HkuySZi0rSz6RUTCyHg8ehaXz2jdLIA6TG29uiyrWvKoomI/+Axict0wZRbn1AKb3OXof8y9oIL43q0dOjDI6BwfajDQtVSbMyRwWUVNnFMm0SpBktoMH9zsmu3DJqCtF8NbpiQUTV9PGWfkJOG8giff41uNdwapZcIRhsZo4hvqUart6/IKxW1HkPX6cP/gH root@858279ed-373a-11eb-a25d-22a534811c55\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC4+2GvxcDEk4BNQ9DSKL9hTUEtvqRnXXP2cefRjZkvH+Y3cBDlD+3pDQHf6E8PclQLuZRtJ8F5I6KfjUYLg41cWpouCaDOn14OHR0rGTsVQwJDjOTMnFTEcOgfqpWeTG9lURqv+MG2D/2+ujhrh/y6skVSv4u6f43lFPapniPokaQBld8uHjMdJP7sH/ZasD5R/HgRBtyzdikCkuHrXsXtxCP1vyonZ/ZGVU0vvJ6XxvMTS9+taMyqdubRyY82uJK452r8xCZ/I/vk+ph5hYZSmStYiqD9jU5XbR2vPrg3X+1fq0FElHhzIWoo93grJUASGTIT/0+/xBSKR7jzik9B root@32072218-3934-11eb-8630-522871d052a8\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKPdSVVltYfsApKZ6NlHgGM9X1YAy/BpJ82n54CcoSUXhzzGgWe5YuugvoDmKgQU1DKmSyFm6zVYWhNuvc5DL/3mYm5D/mhO7L5H77aKVtcaaU1TVat+mapjTW0j/SdXnsQUVGhsYUO8OgRQhjjsw3eJ80uHZKqCuvfRySMYLn0sHQ1VJF62jqrir+ezvHJT30ZAVx5ZZE3XmTzeNQPYwb6khyktorW6J1MKvB0FOKuPEvh+D2WyjZbVd9QKy3rjDpPCNWJSEyOkr3b6W0Wdysl3AZWGy0caseEeNjs42eXSlA3MEi6rIGQ6JmCzylXcB2p7sFkS7mTIy2WwcYMWWh root@67001651-3d27-11eb-a772-a610f2f25584\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCu4BfP+8QgmnsFvX++CfkY+blC6Qm4UZmKNxkx78dnG66VfvQfPDxbSIZgAy3Fs0OWu6/a4wuAAioTk9S5vvzuyehoPdOWLYPhnRLNByKSEvKGenGrXe3w+frZApHcT+Xbo3cvMA0vu8KSMckJGD5X8P+F8ZPsgAbdqCOmLv3hV1+FjOYgjjDphN0uMG2Ix8yQhdnrTHqbMnHJIsHSpLTfbDtE+g7MQEKY6AjiVpdesNXM5jzsHyLgEW/Zy0nYxTXIirivXb3K4vfQuC/RXwPaJhfP9VD56fRPLbH2vGqSy239etTBSYVIrcoFTKA/B/OF/FMByBf5MTfWTWxWzb8z root@da61643f-41e4-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC5toRGx7DQjbJZkqRvXdtLUVxckm9qMUAIU+S5TZl6060384F/o/fDz+smdT0e1Lugo7kAO23GMGx83CGHrPJjJN5j8UffhvfN/RYGzdc4qnj1VArFUYPqJHt45YHH1NIw3KhjPzMoxjbpat5+0Qorr3JL5xh9ktmGGkdgT5zaWQ4eNrz36O2FMVp4lErls+UZY2waTVm0tMhdo73voekIRRwbsIKgojJ1eN8NgeqGAAL3EJ3cvFu+ivd5/OBZVd2YhnNvp5fnIK0CiaybQ5HAqkbZ6Ldwbtxna1ZwDjNt1V+GXTAiutAyfBprVkTW69xTkNIFnlkFNa7mbRgMmMR/ root@475bba1b-4263-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDYQ9pNgG+KYVaY785EvYwkLHruUIVR5lxPmeWlS5PgeZfNpFUzfdNa7MOQooesJoUWgzMhxPvflYYY/6i+92jGAF4Ebe8nh1p0jkiMN32wpUZUVE5Q/tZdYLPPxXzI+6W+hDr3ti5W6Hevo8l1WlpiPgcAqS7mYGHf4i8GbEigYeDSO5X5CzFImxud8WWuKTEzwrIZDtAUlw4+u3f4JlJVYKR5FVQPxOeagoz1+WkVVWbXa8puN0ZV9/t6UuOfGhHNnYrvMiOmZac2ZqRqpbTVrKe/lR7T1CoFqTbcvzJMyiAGQ3UvnEu7GUMNrDVZfX08lDYVzdxDDuPl7gGN5UuH root@6b5a9692-458c-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDNG4E+upkDZpnd1B820x1wVGJqqGMoj0vjGCC9f0SxbcQ/EMiBWWptS1+Ux6J+akgVlIekYuCZgmNu/EuI7XmW8vrqBjKA/uqq90HJWXJy1C3vnhvcAlHElRjK/pPEkk8lGBrtJ87sGgBb161kJx5rA4VBWONwwnRur4OVEpOjU1dhBcOhYhmVN5Dxe8peLzDwNug1NMSW9PEaQpMb+RQiTFqmu/l2bXzfKprQz4YCSK2ciJTdzmU/WF8EeoQAs0OInTXweRu4i27KFxC7mlIQgkHI97wlYXUz8lnGb+b3OeTCcx6OBCKu5VbgjnHJS947OeEERgO3VeC77/tzW1/R root@f1be427b-4a95-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/dFaMjqlpplimOOhA4VulRjr1LEEDvouLkPN7G2WzfYrEQPJrwEq2JLv/lR9DdEQ0vl0MIWbdJe12s6Cdt0Ji9l/8MEM0b8s2NPLzoaRkO3Q934JG0GxYz44aF9Y1dk67aK93pC3zJx0xz8fDkNcDqNZ3nwsX90pjdFzkk44+4oKdzmS8bZcgWQEViGmh9H//ssxeL3T3h/LfIn6/6X1+GEusN/GMjzdbXAwghXVvHqYv3iZ+BTdqzu3Vkrrlc7l5tqV1xjf6I0gIbl9u0lRhLpHCQJIj1DIpV0T3X4dlvTHrsSQj+T7wyRYJvPVcKv/ghv0kacMUIVF7VSelhUfp root@a39faf20-55a5-11eb-b690-769430c9414e" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T18:23:29.876-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "234741550692-compute@developer.gserviceaccount.com", + "id": "1478357123033123966", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-066", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-066", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-066/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-066/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-066/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-067/description.json b/audit/projects/k8s-infra-e2e-boskos-067/description.json new file mode 100644 index 00000000000..49c81d47f0d --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-067/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T01:25:32.183Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-067", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-067", + "projectNumber": "392769659984" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-067/iam.json b/audit/projects/k8s-infra-e2e-boskos-067/iam.json new file mode 100644 index 00000000000..d74c49fb3bb --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-067/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-392769659984@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:392769659984-compute@developer.gserviceaccount.com", + "serviceAccount:392769659984@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-067/service-accounts/392769659984-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-067/service-accounts/392769659984-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..9bac69efd12 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-067/service-accounts/392769659984-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "392769659984-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-067/serviceAccounts/392769659984-compute@developer.gserviceaccount.com", + "oauth2ClientId": "103664679542280174424", + "projectId": "k8s-infra-e2e-boskos-067", + "uniqueId": "103664679542280174424" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-067/service-accounts/392769659984-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-067/service-accounts/392769659984-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-067/service-accounts/392769659984-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-067/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-067/services/compute/project-info.json new file mode 100644 index 00000000000..b5a776dbebc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-067/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDNzMVFFWtuVwbyiLBXgZ0VfxWSxM3gQePmVp0gD0/eiMv4BYLaNuz4ycp/RuUz+iz0WiHDwIGjutsmAModhpxXfVr0vDV0JHYcY2FmE4W0RJTjSfX6UWl7fTlev5lM/M26qixpGG4N+TfqHw+iM5aMO1du2g/ggsSQBb/2fEkKG1CBQdw6P0xGCLe+RklO86e/OeW0y+/mN+Xc2XfuI2jtR3eGhcCivji0JQteNtMTg2qjQmHVdDv4X4EzFYrdG2pHUqG/htVQBQc6caFFnJJyjyNl2Pf8F9ejnWeVKA371aYhBrRR9MTIgsjHrIfWtzMw7pLqMyGFK1vyeEA7GCoJ root@cf4f17ad-dcf6-11ea-9424-2680bd79560c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCw8WqpH1L02mD40qq3+ebvVmDY8GWKA1Z7xcqC+vY/yd+S5A7UoURfqBfwOml5KqkumzfaohJlJzSJ5PVzlhddkLQx72GehhYT2u3NFnbaj1E5Kp9Mps2WtovI7KNzW7ZFooytqx6hv+N1jNapWeLcn4upK0eUlmxkybarepTgBIH5ZluiDbzelgQyPocGItH1bE5eOkovLlu+w/UNC+6Z58kprefVFKC8YuFE/hGgItjMc4s6385ONEycyNDnySN91O3JFbdvPnxqDMR049X0EoLt3yd2Kjtu0abk87VEK5IYtgznYJZ5ByUraX9qNnIGHE0r7PgxXagzDE/llSpH root@e56e8573-e19a-11ea-9eb6-86c455181e58\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDn9nQ0nT+kfxi8UJRVjC5IxXcMiF/6gC+twXcEguBJqsczeF3fDdYC2vNmlp3d+ynxIHKBgRuRO+z1qwC7FepqwUJShaCNhFc/b8M/1jI6U71i8DQdh90vf85E6fvwRzFUkkk7PCvJpR93h45QFw9A8maM19walVlXOulazoKqrU3GokFKW7MQckDnL1fdPT2RPUyK7jIWe0e/+cyekcSvPPS4slCKjjWQ4NHNq5fYj+bwmDwQru2oRoz7vVNLwWKjYipjkYyauKqJ7Ecp1Hr+TX9ZuJXD0kvmXcdhuRxP0i2P+SX3ED8iJLKd2BSF8fBfIYb38DJ33eZLvaTSPSTJ root@e076fbc6-e625-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDce6+HNkeWaLiDsRA7GokQHeC+4hLj5L2WMz4+iodNztfsLAT/8+9Lndc9DgkRC4OWTqIAZSODx6eVDMO4Hvieq/IlXn86UyKna5A62cZWBqg0y8QpZz9Ya7vXv33UE0elkUYETaIlRxgkARwD1WF3IFCoTTb0Eh42xADrMB1/TPH0VQ/nO4DfV14SfaZ75siKqLmeFtWDoNC3PRwWtLQ8hK7ZwbXY9GFy+Yscv8JbCWAxZYbIEcL7Vx1KXAEEH72/U1BALILhkwgGobUXBSZIwDafMHH9HOKR6coReiqrhzimpKii5h3A9TDHnbDlVTsPEaiIiW+1Z7QhojIDvDXR root@48a47a32-e7e3-11ea-885a-2259550e0d87\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDLPjoST9RgcPCXyMJ5XKNm6ysydgCs4qiRKUT0HgRs1nEd4fQdrBdauCwtOqwcjrx9iQUBLiw4TbmC/pUxQF7wXsJt8jN7YyZfbMJXhO4J+prJq+eMm4UXr6gLABTj+9MX+DpNmhNcWn8Y2DFeb6JU9vAz7migPh8yoR7UxpppsZsV85Iqn99HO7XJKCcc8DWkGBx7Bb9bMEvlnvygFZyM5J2ebADZ1DAYCFcyhBRoBWkI3JnjK/QH+Qt8xcun8pxNsbylpnioOOKiB1hXPcvAsHSIQYFQD8CPct/fty61izJGLzy165EffSU8sSXXbAlrWfzirkSohpIaw9sT8e33 root@8a2d1fdd-e95e-11ea-aa1a-c6580c04344b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+juGIV+sn49vaYmwbN8/fD7ck4eS91cABa0V+tbsdl/rODMH/PIhi7+5r1wF8c/UOih+30SvhZzXZJ/urk5dp5MGmQMTiiRno+nkSXqScfrmpwe0jVx7kvaNpVB68B37Bt25sj/xH5UWoqlUB8DaIt9wyPlpFjQKNqbvFDoVqCrFEAZuk5QmnkUkeIp50TBGXnsQnWhGmr7Tz484/wdz18/Ybc/dAaQifEqPqzTCCa+VjN5Qq+XPHDa6ZY0uBaIQUsbihKcJhIY1/k5uJdnca3xyqkyBrEclme4RBvbGtHb7aswf3qvZpuGNKH/nKDgqPXVw/WVC4xW4yXV0JlA/r root@ac64a35c-ec5e-11ea-aff6-5a14b0d7f3dc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCaE/MNtA3hbWgG5rwtjs0pJSmNOYl55BbpJAh51QQusQhDM8zgBEeHyAxivkZY5NSgX01YClelFk6a1+kvPpElse9+r09eIE6lsxi0LfghJsr8CL2dOnb9dQs4u3GoI5JOBDRu7hEpWGSzdEKvHJHQGOxRpzGf155BuWL5uiRS4atvz0iCv6loFNElDP6SLH31ei0LOHKYAzEfsv2tECO2gS6Mz9Ru/RJe2PWwBDmnVmcbouq2jrP9U3dIKfyzILKflSb7BlgOn/2WMPCeus16Jpeqmx2Gibv2E7L+9QubAcYqEmKjMV/0cV2MSWiF6f53tHEQTA0A4TTkpjgn3ed root@a30520d7-f2fc-11ea-84bd-b6fb6d83c68d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2iAfRDFrmKOakzltfaAmK4Vg6RFM2XM1drZHzWFhHPaBgrEbvmQ2unDKgcP7wgr0Nyh48YqOMdKL9RaM+FevEed3TbU37BBTQ4OJoBgTyDvk2/uuLArhek2iQ+PMnkin5kay/timOwcOU3XOtt8evloceXdwfh364UI/1Th1byI4iMDXd57QP2sZEus327Y3kDBECo/SQsoPamJVngHXkQWpw8i/dsvjJFTr1GjGmG+4coQ063Rab2L1cw10WTo8y9h7KT5baqC6BCh0VMxknya9FenKBq5x6VqDSrCmXYGEKdsPFpG230TkzByfRj/9XsQAq8kopdRholNz8f2ZF root@b6a7dfb7-f412-11ea-a379-bea988342348\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDYpYWrLP55TGqnEeKaeVu1OVMJnbjrpTXBmvn7jzOr0AeUVeMfV4o94Vc1G+im7DjyT36KYyH3sDmpev7dFF7jrd2d9Lld5yw9qJRhev6nHZVvJiNBfq7Wt2SvMHbXrcFAGpTsGCHsE3w/2yBZwAP4rxO2dhsIy17+CwCFAuwFkH0nEfr7cLgNW9KzACOTCcDP+h6c6gvSogczfwlfFX/LISQC1a4aXVrbEbJcE7/eNp5unynkHFA6J/jrejma5LDn8iNfs9OAVIFqWPHfD/9buQNSblYvIYIsweUsrzJ9o3gkbBy4/axQylYoB2x9Xl3J9EEOq188/r6pJrIZ/0jx root@b4ce80d7-f9b3-11ea-926e-7e7ea190b727\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDkyr9idAgWPF4phzEEudwmy/WrQDymiM9J8ka5+g80TTk0G/hy1miQD/1mxmlDubJfvaNeCPJywrYbUeQZH9K3uZ5lF0GRFXsxkFTpquZH7gUnMbMvSKZ7++WgDR7OTbLoaYC4KfmuAC+rJn5mVXTcekI/bGr5Ftp/xu6FxyY5e3loZeTKLbvDGf3+fvFkxBw8lpNH68pmkSkremoa55fgZic0PgkXsyyt9g4hQqAQ4gV57tvkDTmxcYVBsPu09xD2o1raqqA2H6EC+nPTJnqjuY1JDWImhTlGcY5oHUncCpaMLEoDF+Zp+YRocIVm/bxxyOIRMqI/5F0XzIhJv1Jp root@54b0eb26-fbad-11ea-9c73-86173d37727b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDGegcxHvIeZ0tyH1s2eRSckkuPLNGwC0jwv09jhQOk6A5uzUBn3y/C756hgJ+N4vbyY34gkzJL/6YzlQKp4OMKjkAcQvMIPOuSlHMZJ4E9SInUEaXgaJuG/2Wp/6nlq/4awmoskyupYC4CSjPX4CO+j1xS2Fl73DKUzl+2kl2QkIyD4UJOsL5yyOJzEJa0HunnbH6w8R5Is3I4CPy66GjCfjCrdH0DNBy7ymIk/e5UHJdUutJdX66dGzG0SRu2josWcDsYlc1FSCoNareusw4dJf0M45d4EBDa09ZnhQism62S6bBt1hAb1GjhxHlarNWetBwcnqbtE7EpYC+osN3R root@4b7d1525-fed6-11ea-be1c-eaa6cb7654bc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEae5T5coomRBsesXVW28Bko1cr+lqzNgPWtWe/zyG4ouHwyHv79Md0NsiB87WuLxGl9HX5yxNSflmbOf6XreE+EU1Ii41C7k65Qu67IR1vs/Mcev8EJ3ZqA4uKvroHvbKO+wLl79OBU/7RYTUi6AkVSp0hRNNhk9MG4+rkxvKc5XY54Ob/82dd0pci208t6kb8I2Xfag9FPfkjmlWcUu5TwMte55ir7wcbH57uWs1W0QKcJFC9XdmI/SdC1giLp8psuP4YbmAxNq/Ia03q0bKXiZlI4bUdQX6Q7YvOuhCMuKSPQ04Z166xjbV94K5pnDvB+pD/+I+MRCaY0xkGWJn root@3e5db168-094e-11eb-8b01-e6b73feeeb4e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEaQFdj3wLl3ykxogohca2fcaP6ESPS5TOVehNjjENAovMvLs3rpsWh7jYHFrnwng4bdQOOgg6BWcHO9O+i0gMUhfdVRhtmJNEpvAX6s2lAYzdnG6yroryBBOctpBjBSTz5dogbHApZTScvqJHulS4PYGEDTiiG4zlj7Dlv2QthZS2SXkZ8QfG1MaezPsraLBkZ0o8u99H+0kfECQjhjKxw8nZ7YyXQWM2bgZ5G5hiYkhFHhVQ+X2+NoUCf/hHe0ieY47ve3kwpm3fi8jgp2EpLyhzSLpDUXs7QhMYUZFYNWmFKiDEz0VzHcndMp4oZufGDHb7NCkKZETTkHa4WJ+x root@66d186ac-2786-11eb-bb1f-6e397dbce9be\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKXTvgftbMyEW6s3OqnfF/f5mfEve3JRG+zg/l2x0jkDiWTQtU+IJk6uFfoJDVC+4mWfy4NcjTawVGuQJH4WDfYqX2JgGbTvNVrdiP4ocpks2V1F0Jqdj3CjQx3Z4Qkkp6j9ob9u8/6vLq0u3gn+4r0kz/RSeBAs3FhGa6AD/iwtqWyECMSpWiMmvhAUFRmRm+bjvdvToLVK6ednnux2jwwVtkfvBc18oaRApDlmtVnJl1Kiylfpcn80c9zUZzIF6U+oppQQs1TRjHjurSTpjBeBWJX++RI7lq2rDzxNu4FkLPzRJrcAdYsMXtOAEN6aGPrDhMHBMh2AVVYvXecj1N root@eece89cf-311a-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0JOInyQxtdyZWUJZ0hrfcbqzdeUTIlaGh00EwmzpDR+50Gyq+J+41ituCClQ20B7afUmL6xhK6f5Za9ALQeHYgOXvxZNmitKWndrbFysjQu0zwnc8y3IX9tZOylQ6RNAu9yswywQwUUwiWOU810dWhONQN109YlAR/RjHcjUmXnYX2yL/fGIjqRXLLTzWnOoPMQRa3kJv9AsUU+Uc2vO3WEMb308NZEkW9aPSD7OL/iVIcCqVynYvK+2KEckF6J8B9E47mkHpcKPZyz3K1T2qzNFftAV7WYHeGaCcffkqTreCN1p1ZaMEH/30AiowjNarx7r6utFzwcvJC/u0p94X root@13370e1f-3180-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCtsNkdbJ72ZjEaN8GQLKPpVwuMfj4a5FXEP8Ot3XTdPMKgN2O5yMp5uibb+ehzhNTvZWo5RyxQAG+lf7XC9GBeOiaYIBfm6CRafzl1qWBclAtSrh3U4RQdY0gKkuMOX233lQ6zRlZejWdJhWmvF1TUq55igAGRhhuS57GnZpfMDbVaO9OnBQq6prtz6kMJrUJLsSxyhtUngexPxCeE7Iw69WO2rulu2ea+YvXcPN0/uY5soLJd3MGTVatd37SE767t61jrqvjPEJtRGmevRMpgZH+22a0UQjNKc5tdyPLIRm6Wl0VdnBAxeUuX+LmgXAbqgq3O57ZwOGXXXy8nshhB root@13387c90-3444-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCld492xvKeBM06m9hMRmnpp0THz756wOFCiFLjsOp8JSfi1Wtm8yMQU4pjpLnwKdD8bpAoZpGuLu4QP+mVIrc3w/W9IYgYhiQvjrwKbTeHrqhS2fjjVh6z0bsW2+CDKeJUxKtzz9jrGxbAdkt0V5O3OBFuPbOR6OryYxseC5wWNVrbITRe1AREU2LPw8o5jwmZKaHuoZJfHQCvTHg2Ds6wESlScavRAcbggQtW02dQa2gM5SHhnMpHkTvMt6UauMzS4nWApABTFQA/BE9ARjX0f99fD76N4VUW93XRPrxXg/DyYoyL3XF5pc4Cp+RCHMVmvbc95b6lpgMU+VyM1Svx root@cefdfb85-3a7c-11eb-a164-f6e7f2ebcce2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDnU0/D0HtYW0LyXNk8siRDUaFhC4PWC/oa3iDCMW7mdR10GCTB3B05nqu9cXS79mguJeR6siYc5BZjXw7AAK2KJpRbsr4MQ2PRQvdfQZbSKoK565fbW7a/NU9u1VaLIy9+PscQ/GPlKRe6ZIX0xxALNu/TnrcDrzu3s9Hnf9LVva1S/AmK2waQjjxoK6G+BetaPriigb91K5cY6TcuXx87HppEAyY1VAAUU4OSqrecLuzwuLCh3w5nVvs/46+EEk0xi3kGBP/x9ynN7clpBYwopmlzC0M4EbYBGyK0y6FkaQ8rMN2DDWSYg6O+aYSXaVJJxFDo56+oL07lNbRp2rgL root@dc4eace2-3b92-11eb-a261-2eac9c79d9a2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCpoMt732FcWSa8C9gpp8Udefqs7er/SpdchNprzXFqg+Lp6zNFDG4Nnf6pa85+4FAAseEd6UWpqe/NKDkFriiLP/bJJjMiNMK180HfO4QFOmGfLZRrZQ7NUS4FupPvU9fAM7r3WV8Nx7y6QKYr/GmBxcUYfnullxkSwd9iKuB4LS8PCHkQQHqq8JPBuYy8zwqy2mO/JP1cz6Bz7o35lKGmmMOWSxeo2gY2oWmUBFLT3t6P4BYRC9ycKtA0qC0Abc5lbXg53dm6T+zwjge7d2zANaMs4ke7RCviAf4oo/c3tKJaYUj/3tQnhQBmMjCEkyYjfdJVmpGolGRcwcmkbN+B root@58d4e098-51b0-11eb-86b7-56818f023517\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCh8/OTfsm0wVLRQDWaa7fDYbHdqjho/E5qhCIMBZvwnPdVLLQb+w7WKhi0+HiFdVL/9FCkuRnIulhwS6JkRzfZJ9F9X0vCZSNRMx0Sf9b77HfGCU5/QA9I47G6dND+IphQ1lvOjFfqT2wUp3sKKjfKvQkz/Z2B8FZtOcJSZPkrpRyXi4g2ZotpOIuS/kTLJ7dxZ7fsN91wY+RVAxEskvrwCYKIEv0NHsVnBoZzBpWi89bDEEWXZD2QLUzVx/Vc/Mwlo03dcWUvEF2vm/t0uMl9MbUwggHrZxpRfDm+8QS4jt3hvlzYbbIWVntkCKnjL5T4ZEGcUijAZB08ciu4lZxP root@5a7629b0-558c-11eb-b690-769430c9414e" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T18:25:48.553-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "392769659984-compute@developer.gserviceaccount.com", + "id": "3845880861959310835", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-067", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-067", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-067/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-067/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-067/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-068/description.json b/audit/projects/k8s-infra-e2e-boskos-068/description.json new file mode 100644 index 00000000000..c21cbd8b529 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-068/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T01:27:43.217Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-068", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-068", + "projectNumber": "101721090067" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-068/iam.json b/audit/projects/k8s-infra-e2e-boskos-068/iam.json new file mode 100644 index 00000000000..e163e26e972 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-068/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-101721090067@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:101721090067-compute@developer.gserviceaccount.com", + "serviceAccount:101721090067@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-068/service-accounts/101721090067-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-068/service-accounts/101721090067-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..57b585d5a42 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-068/service-accounts/101721090067-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "101721090067-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-068/serviceAccounts/101721090067-compute@developer.gserviceaccount.com", + "oauth2ClientId": "104417096839168725924", + "projectId": "k8s-infra-e2e-boskos-068", + "uniqueId": "104417096839168725924" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-068/service-accounts/101721090067-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-068/service-accounts/101721090067-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-068/service-accounts/101721090067-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-068/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-068/services/compute/project-info.json new file mode 100644 index 00000000000..cdb1f07c98e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-068/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDYgynNo3niut5se1SPLR8UT4wgKOwh8SEEJ3WOUmNPxs3+lYBXtJIXDOXiw9nXDqTSMWYpx5Yu+PgkUxKiDbAEYnyqEgroNvj0htnSOpaifGZduW5f50TVa7wVTGL1jqyz1DFs1Nb2tDN6j5sfIAxQDETy4V+emvwZLZPlPJwpFiJu/x1dfxAmcpihhNxVl9XimrWaFIv0ORON3C9eOaadtkPTWsdZ4cVB6LUOBZ8XjOGR2aaUpBS3q9TrNJRWmE/iu5JKhpNgr4Eho+nWkgwEQadu1qiPHsmS1Okgi7HNpN1PtxzGutGynvSybTx+mmLtxqkTgug53h+FCTLjbaOT root@811527d6-da65-11ea-8c1c-d23af84fd26f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqZazrGttyXUTq1LpbbY0WIXaZ27EEqKU3Nkwz0rP654bnaIZ4sG0v8ujNIVLbW3SK4aGrG+a5KLYhIx8lM6GsKOFrS0qwMucrtXb+jkELslH653FN2wrcyp+4RWT3OwmILnm6ROdbj5ZkfVC8qn7oiWhnwZ9iIDSwVWaZ1GxmXgSx7DW009UPPdBd9veH1IoxUE7lrT8JFjbX9MkyxqCDk25eMFex+6spBZeizl4nfWuBgW2TUcTqfvtT+3/+A9XoTvAHCRRnysV6bhTWGTsLZTOmhQ669fGf1/Rr0k9g9UmWdSTiLk8ARA+lePvdrg2L/3PT1x+6dZ875aji9ISf root@993ec12c-e3f9-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCvk5Q3J4aeWnen9BrsC/YVc4vykzJqnaK9VdmI/fcqrAZR1Fiqs0UJ+1PCoyjd3S6mpfJ3eBNUFvVuziLeliLQ0kQ71z2iszg3kc0W++aB6pNEDPyArMUuQps5IyluQQcxxxaM/tagNh4bDP0yd+HHN6H82/Ga7SDYBfL9x1sqMNMpZYpsZGPjX4Q8PU1p7/Cx24oEPI0hk/qE9TCvd7yNvMweR5aw3SupS6orA/+Lkd4tK3ViAkNCsWfBgv5nIu5+1yuOS0Ds3zEJ2YmYrZfC1JpfgyKzQnqEi2m1bLc+S4fU9W/iCrDFy0IvK2GyUvMu99MiTmo0504LQGgod6iv root@8002a7fc-111b-11eb-9a43-0aa5164aad51\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDctfWpvwepTUttndGfzzOp0EywbfnLuCXxP02X8+hl/sxMlp4BSaQt99O7n8Ar7F5bpEH0HZGa3ZIeH2Lcq+3ivCMqWVu5LROxWjsQluFt2xCod1eMCZ1nAEbWgDQ0bpmnQGZWhSXznxXIo/xPA7kJi+3FEzYHDKn1pQaIJe17vhDlPcaFsjFQIvzcFmhY4EWpjFe0BpbHbyHIqc/42RvtgLvrBbfydY+kgYKIZxVTHDVG8oFXjHnceOAxFiiulxd/LzuKOrH0Z4rU0e+LRiLHbheW4Sy5VNqanSFFF8yGsvJWaBaFekLNba7qnZJaZcjh2s/YJXqTCEkWNTDuFk7F root@48f353d4-1a7d-11eb-8779-4e6ceb30be03\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDA/hxGJ6oMtKnawqzBUc9OXycxxifdFtAbkyK1AU1vuvIZ7DvD1ZrMirbvqXZFaB12JNbE7aOaVj1eSraaQxe2nBOx8EKsEYS1xpyCBB/XyRqMSuhzKNCW8V71BiqiId/W1Fd3//TDU9Q84IB1vuyDmMYwgujVKWnoJz6UQCHNc2MAqtMY7g0vXGJqBAA07ilvZ73du6JOtcqZ0bVSGtvbu0wIww349dz6No9gls+64lzEhZBzDYbC660TGLkE+incCh9DgewxAe5Az7vSoVkSDUHitNVX99JvFHJaT1R62DXb7AM8Pwy5PqsjxcVbjrvkUPsyuebO3HdQ41pr9WeP root@644d59e3-2134-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDzIyVdOX799vIBp2t9flO9twM8REN5V7Jm/WocRmbiRQ0vTdkPuaFnxVUFLyqUihAkWq1fXG9apv977k+2gxr/zJfWQ/Czm++CJk/geTT7TszPxAKjO+hqQAUci9wAbUnL3ntgEMtB8P6x3vgUPXBgg9SWfZLhJR2Dqy9MQTvnJkR9QeWkEJX6/p5Es2gqu+o1Dy9mBopVLVrpbDmbe3BluGOI7H7tpiXWimJ4UGY17Qjkw+uMlTwcHCl+q7sDpjUVifSz0yDMvkO/Wk9sYAF6Xkz63lBThd3C+6/Fbm3Pww9CbIjKwpPrrBinmTYDuOwAw+PKpuR7L+k7yQ6MdbjZ root@01a62e98-25a6-11eb-aecb-aa862b891259\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEZfbXrC5QCr+/tihOxps4xa2l46vwNs9WshleCbnDd1LHxzWWXUFwSLd+N8gm7iMSvsFutv3V6/yI/zqVXIlK0MlMc4D0uNJO1Or3IERz3+FF5M9LF/Ej6pO+h92NS0p85Y0u83tJAboCHO8w5C7B6Ho2kBdaryXMgxyGkJsefzFGFa6FG7BzfgsSUKob+5FrJI53SWAfF5nXWlfB/E7KCVt1Gf5SAdabPWCvsBrHsjh+X7KrFLs7qMfJAHjFGcHfYiJICYwri6px9w98ld4htZdb4TmvOMqmiwsCAQpbDtCKSScIoSq+yhKF51uIRPz+R3S3wZFlYQCK0xCZCzRh root@d63f1ffc-476c-11eb-acd8-6a2a49dd8a76" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T18:27:53.992-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "101721090067-compute@developer.gserviceaccount.com", + "id": "520601019710623094", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-068", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-068", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-068/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-068/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-068/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-069/description.json b/audit/projects/k8s-infra-e2e-boskos-069/description.json new file mode 100644 index 00000000000..df03700405a --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-069/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T01:29:53.025Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-069", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-069", + "projectNumber": "645254189504" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-069/iam.json b/audit/projects/k8s-infra-e2e-boskos-069/iam.json new file mode 100644 index 00000000000..e7ea7b10820 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-069/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-645254189504@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:645254189504-compute@developer.gserviceaccount.com", + "serviceAccount:645254189504@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-069/service-accounts/645254189504-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-069/service-accounts/645254189504-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..55f81ba9ea9 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-069/service-accounts/645254189504-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "645254189504-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-069/serviceAccounts/645254189504-compute@developer.gserviceaccount.com", + "oauth2ClientId": "116900896297093287524", + "projectId": "k8s-infra-e2e-boskos-069", + "uniqueId": "116900896297093287524" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-069/service-accounts/645254189504-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-069/service-accounts/645254189504-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-069/service-accounts/645254189504-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-069/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-069/services/compute/project-info.json new file mode 100644 index 00000000000..3b9250ae8fb --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-069/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIzZfjUWk9rMq7Ld9zRUES4qQiJx+xA/IQAtEPBpsBfsgI3CFPQWS8qh24YyPANg2Hh0BzXfyfnWm4O7g4XdGDOcmk399aicpS6xV/tVsDPfV+dncxauUGm8v52hS8tUozgsV/BMfA1vuAj5woizrqZ5kkF3KkjwPhKcbytySnYtVhzub7WP+9a39LNUcoNrvtdmilXD/l8EIOYqfk56G7yTXI/yJ/o0vHDa49xyoXRErHPBfyfpah98VNTUxH7t3Ke2w9sGE0IXP5TyMFAO0Jg65OOJc6UjEqKy/smM33OlWN0TFpAfQ+ibq8XMkTQ/6tXJfW1jYWpoa1C0OC70zn root@8628ec04-dcdd-11ea-9424-2680bd79560c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCS8ARjkOJhWgse/tupN8I9QfuIh0So4s4yBaWYZ9C2XQ77Ic37ZdDAd1eAwUNYYGBfgdDyzKS9UerXXglTtmwsrUOUGCQ76umgPCG22rLN0poH5GBEe7OmWl4W6dClL/knXizN3TYcu55P2bfrGi1oMHHTrmJAAd1tN/ycm5EtxuaWb9M92JWHGtEdyVNv4PZa+3K0+s4t7eqvnC3srb+7rDL5bCdu/hfjjE2kH8/m/7jCm399lpbspBDVQIkKSSgxdoJA18X07O+r4zGpOJYOpCjx1UFsRA2w+Fzz2L0i3xqyG8oeFAmnKVgVtweUKQd8lBG8KlpyZzQ5G1M6Fswf root@3b425a20-e2ca-11ea-a87b-7e1d84ccc038\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCvuTOSLti4SB84auw2/tVffOruN8vrabB1spnShRzqi9CGqE5GOJuR0E7+n2AORoPjrzEsbPtgShzjNemLGJt9jZWWAlG5gu/jDTrJBAPA2ym/mmlpDc0WSFz8QLCYdxBp1AuT4IRjCff0agZ3gxa4guVXdIO9OS//VS6C6yIYMhHXtyggbe9vmRzeV0hW8KXh+AAHdL60f7X1lmry0+m2MjLa8PPwL7O/eNJ8iAZyjGutN83e6ZvRsph5FpldocPmAvV3rEopjbXdGfuBsuZKTMJawUN78b9txckkbQsDbu+4izYmwB2djwyOnIgAuwVGig2SSq8OHcihq7A8+JKp root@977e90ad-e6bd-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCrjGcA/YmvYJkdZLODvmgsue+qKMGvWwE6TOQkJZ+bQ50IhdtWvbj86tm9dU4WBP/H8aLhtXCKdiAwsPLjRthKWldxuwv9pys/HVNaNN1XKf8TmJWHxxdInjKJ8nwRXf1wF8BUEroBoQ/B132zqIba1ZsVMvMFivBVzUJUQL/WJQnN0bnsMKHmo91/BCLyiMebwZzXFRzB3FjUjISZwrc+bO976M67H4KwnjLi3efLNLZ4GpI7tw8Rtx6exor8MXoDyDTsd/Sx0U8KN8hMeoe7dq3v25ankOZG9mqqeO69ShAoggecZaCpBARVtb4dmXUPKUhegx3LHWrH61fsNMIp root@679435ea-f20f-11ea-bd49-066a8cf01e04\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCzgpH2pTunk9YZgw53Y+IMVFi5lQmN96c6fVSY1/Ho/L2ItDDtgTAK/XUwXpycTbYXv2TYGla68zybOCVCyEqBmEitoA4d59jnNJcWMgowaqKm6f1CxmRyWSMRCwq1Z7mjT27nuOHQPYbwgJQzRBE5AYazIwPsrM+ijk2jtvadrAZ7YAzl67ksHSzfD+Y6a/3VK6qkGH75kbhmmkoU3yVHRZz7IbP7CQe29bl/dOnWO7Jq5vwCXXaN16pix6xl0nGn+aOCrJQGEtJk2nE2jOxtBJ4LMuzVVF996uzZyHIqJdiet4Jgb2edu/Kjt4MySbMWCN5OpvDKm8JTf30n5BfD root@073ca29b-1477-11eb-8a3c-66d0ef5d093b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7sZ6GNSbtNdYjdmdHsUyNda61pCgdglgme1Emcy1ixVySmYeYESA3x4wB6/TJIJpFyHJmsixPK1aQJprIZBSUr7a0MYIvMKgp+vE5ymJKqWm+4/Yp/culUoSn0Ej+7iGwYAKz/jeun2NxfBjuqaOAHcCisnsnJ7+Gu8KefFC7prp3m7xn5osyVuNrX9ZI05126sVgiVby4RRfiaG7JmbcF6rbJ3BL93ZinSyT5i8qGZAP965jsji/RRQV5eWY+ysDBbsuOqZLObdY3XoyBKpnJ+6LLI/bByhQ4CMtWxsDchHOklpYQNg6vMtaEyyem1N8cs3V6Yr5sm6qISVVozdR root@e2394149-1624-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDYQypCzB/O3V+cDTMUw27xaqEZW/CKQjWO5pZDBfFKY6xXeIkFXvMDWxiG0Q6RRkNww9zc7Th6y+qJJibvcqX6D6ih9m1nh/+oNWCD5Nt87rDBKvFWaN1jz+RsrVFtRkJYOGYBIyRIBftcjXKFYHnn9PILEgg3ekY5tTJslur3vql+BWOx/4FpmW4R4wBZisKvfj1XgWE93ScNe2cl6nNC86jUMJyLdVSuloeV23l0bm/XwYIheehdL8n9WsYlj+BuukBRDM99rJB3thpi5i6JQ806kd0eUeFY3nwaI7t5XhqJzojXu0X+R+lLcVZtYYcrvveWz3Jq/zWktP5hCjXD root@e14cd7ab-16d5-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJz9zPWwHIeYygq1JZFecJFdXdCJJwoHXjm/LxYTkNjYWFHMBVXK3QKYFoU+nayyKw5TRQ3pNpJNl5d6VnUiEJoYJS8Sn31kuyH3/7lvV1V+QTc/EMQbz8wvexrHyqWbNYT0DsjgiRAYacL689UMnleAookYyi9+3MTGadOaLAhEKzoyNBVf0+BiUZMAOFOpHBzDXa1i2lwezO5o/c1q5GXN+Hb/QY8cV3HaDUjSFYLzecJVm49a1W3f4n6obmF4o0sDs7s6XJieRCH98qAdSr9e8pZQsLbdh4cD8HqWYlrYtKiizCMAsT1A0Ov0criq/5Xb+MPnIqT7VlnMicT1hx root@1c9b9ac1-206a-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEtZ1lEQEfxIyM83BaMtEw8+PvFr2ElBUflGrXXWn/7LkwDxuVxecdF7uKN6JHM5uCk3IWacIA9VGrTVotcvsmIo2Cjklbr3jhGS4Ju1kdbzcHKonr3LRnnUw5arzzY5ouLkP4Xno1Nu00KHB/J6xlwy6eja2prB3Nz8eMCq/sLur5tkf6xcpYe7JkcxB1S9p5gSMEYn3qZoGtbVHI69qGBdsm6z//ulfCWY9pVFF7hUj6pzC4ydUx9Vv6R3DmDm084oVqYm/uUkJAfZw/g5k7XvVXz+kDqXzAGWKy4PUZZYTZUohRhSWI55dnIvid8kEiWCa6dNAHF7WwLfhHzF6R root@4618eb87-2f21-11eb-9b0b-d6a9455c8be7\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDeiU7L+i8FSQEqtAno8RL5eFR/PsBH9Jhh4FhVEqPbe/4r26Ip82nfOiv1Xqut+sLRqxPlG6V6Br22AniDxnAwEiS+yXoQQ/zlzxI3Y4Nge9GR9+tCBze2YbF/2zc5LXrXY+TSp8pDcpqHuGuddpzhJYuvdmrosUOhJuecBZ4nfQSFURSsHzaMdzHnGoL6ua1PmFFkNJnJBAHlSYavjj9V8CHzG26a3D6psAGv9jCBbDkymKF1dMVw5Y9OQRocjsG4wWZnIW3SJoLIbwr+4WPgwCcEhl0tymnKJT6HEwCFLuncQIS6GSSCRMbXhsKgs+ch8CFLGdFaDod+GDJgnTF9 root@a4fc2591-33c5-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZ1iR5d95eqraAGg95e5vbABIVZXzcLNsfa6PYScI7uhew2FU23xh38lX5j6JnRqPPg6sMmyfMRu5P4bVTR2vDYyFCCVEzVZfYjv9URvg7xEkdOfvpfx4oh5Q7fFsMRU6xDRKCsmcBnJAM771sKJaf1G70BjWZiI5oRM76I+gqsTOtYmvpOovH3T4cLQGYW5WBHuwMCT2IbL6IO1KO+uKdgfiOeVgfTjJn4+jS8zcQfWpPZthNW/57IK2gFeTKxcvlHeZN+VPht+ctbuJ3lGBE2B84lBocAp0gdQf+S+CBRysrvYD5+llxV+kPdwQrpkPtXQkhuFQnHGx1C3FxTdfR root@ce45495d-35f1-11eb-8ecf-c2fbd71c5254\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCxMpy6amMhy0GNHYhbqhKbyK6ii8v3txDxHfsRznM82lzAVo2xDxGtX5cPZfUsCEYoVCgCbCujIlMb1dnmGnHjQTfQAWdNe6w8b15XUcFsDvBgKiorGJFxqAyQQCgGFR1oR5pvjmeXt1UQXOjrWPPIzLI5gJ3cefDjBq8Rrfzyxet5WCduMcRpqSSFVzDOcPivEFTq+npmmDNCD12ssd/eC+vP251okdtEMgurcW8QPmnffIaMOXHWVudbPZ1UZxq7q18iRuKcpt+l4JrXKv0luUnqwMHyxGcqTV75fXtHB0eC5o46QSR7RY/BPMZk0tt1R0pnygtEHJx7cr195VpV root@38afb2c7-4ed5-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDOasxkFMsrT7gZEbJSkWW0ygkGuH89/Gj9UvsiHWs65gck5tv1UNbz97FwL1U2+jo9Q2hM6nOc9CCPxNeP14tV7abS2Iy51IJSqFVujJWyc3GLX7scQUiI1o/7WGDkboJGi9GDR+W6HV3BycmUnOvR00Z8tOs6FxhAByPnLcRFAjFUTjzoEVRiDh1X5JGFwpPzA68AV2xZQRF/9okv5+Qd2qJyRedLeZ91rWP43SgnRrs22Z29MmG0wITpclu1QXQJK4Bt9RXQTXIJossloMX5RlbKUYfdElSKLmYp8jhAPdc1vPe7CdRr6lGE9Lg3P5nTNz82L/cOZ5idIjBrwuqT root@6e183c80-52c8-11eb-b6a5-7e8b7adfd54c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD/n+RFjMR0oT8EUtlm8dcU+SPgDP4n78S9BCUtodaNLAj6K4W3y9OjxDOuN1snrSnaf/022Mgk0KdlfWQHX9Ck9gu6BvKw0+EB8CNqeBM1suJFDkxHMbcJ/2Ze36JpUZCn04QAPnUOLY1y6uCrGJvXDOea16lybR7UPBjB5bvg/7onsljYyFkDBZU8o+Ep8T5x78zzOHaJzW5x0ibuP5zfULX5+3a4rggvtiyOCOmw+kNcuF+yBXgVnuz89vc8nNXHX6PMJbBohDGnEg+PnKOHpD8Z0wqLAp/9Xv0LlIqsIduCGVF9xORGdeGcxyUnZIPLjTi8+CuAgUY44T1v/evp root@c922b384-5559-11eb-b690-769430c9414e" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T18:30:02.515-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "645254189504-compute@developer.gserviceaccount.com", + "id": "2229895658742926069", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-069", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-069", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-069/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-069/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-069/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-070/description.json b/audit/projects/k8s-infra-e2e-boskos-070/description.json new file mode 100644 index 00000000000..2d993c26b4b --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-070/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T01:31:43.916Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-070", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-070", + "projectNumber": "106749447755" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-070/iam.json b/audit/projects/k8s-infra-e2e-boskos-070/iam.json new file mode 100644 index 00000000000..51bc65b05fa --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-070/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-106749447755@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:106749447755-compute@developer.gserviceaccount.com", + "serviceAccount:106749447755@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-070/service-accounts/106749447755-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-070/service-accounts/106749447755-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..4a482730fe2 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-070/service-accounts/106749447755-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "106749447755-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-070/serviceAccounts/106749447755-compute@developer.gserviceaccount.com", + "oauth2ClientId": "117877138867445495893", + "projectId": "k8s-infra-e2e-boskos-070", + "uniqueId": "117877138867445495893" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-070/service-accounts/106749447755-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-070/service-accounts/106749447755-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-070/service-accounts/106749447755-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-070/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-070/services/compute/project-info.json new file mode 100644 index 00000000000..dbfc964dc18 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-070/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDbtvh5DC6uzNdYE4SKu5ItSphttHIr9WqfX+mdEECryDWdFk4h+3uWOFRbFT5NthqC6236vZtDWyqj+AzE/RGnrcct3Typ+dXapZ/vAteX5/JoW9TnatB3EUtvDMWzG7+wEYwGPatZkaNGb3yIyucaD2zXn/X6X6T+GMMfnV6FkblSNP37aMXD5JLzxbRSZsV1uJS9FfTawNENqpmzL/yNMQmz2oTUKH79Nk8AEgjlXsWn377lJ2B1X5KmjQB+h9q5foNuNmyT65o/qlTBWc8c/EI4fiPl2V1GN4FcwlnrQL6EgZb5E0aWYwuXKtWzqGIKfjuspMKLphthjlffgk0j root@32dc56c6-de8b-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDScHsUs3kG/yIcN04lyxOLa3D0L1oqd1KTsuq8x7TkgFBOch4GOwUJh3PKxvMH4u75DWAJsHL+Pgc5CzjN9Uzl6OBUkqp+HTqDgcx90c3a4UD4prlzniCUQTi3XcUlT3S6qdvO9/ZXtTYAAFsFryc+YiP/U5mJB/4gL91/QqwPJf4f+NVwnWJHQDv94mF+WYpUX4OJamVyEPQmKCFmzXNgbHNBEeUfN/E1P1rLye3f2MY1zIq83dwE9PJkLwxum2Xzxx0IKWRnn/LVdcz9Mzl55ZBYeEiszasjGwkrCj9961M9BR34wSZo/xbKTMAsRqfbVLqMQrUg8+VNOTdF9IsZ root@cbfbdc10-ffb9-11ea-b4e0-eacb7c15c8a0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCa5vCVNx7maEDxGR7vs/ev0gXFkqYqLEXrUCDsamfdQzcuL+uCbFyYDvwzFE5aJj1f1QtOzo8wx980S4pSTJtu5QTCkXMMpRTZYLG71W9i1X1DyIG7ekzEP7LHr56VbIxblF/6aYtCqRYt2XFRJme/3ZJUDxjMACYLy5QCpfwqv4GF78sjZu+08MXWb7HCqxTFhAsDHbPawFNdvm17B0KPDZFQyVeo6E++uSwmnmM4i1lWY+OODZtjOTEDjW/dHHiWprnB/F+9x17wGPL1trAkVevasFamLgsikA0FDWkmjIFDg7iQWVUeTjFJ0Hzo/G2Pv0ZA19gBj1uEK59qtb+N root@aa53b53d-05f2-11eb-9dc4-ba187aea6a9a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDdD7pcaBrzVaZxuk+vIWaIi4loecHPCS2hQn7T4c1wel+zUZfDaDWZjcryvhw5YAKf/1LOLX9cpv3cEmKhkCVANbkJO/VtJ0LpkSEk16BjDzKHe8NoUdilyJRZImEPv+3c9yIdfvxqFdV+QkrwnZu6x+L1JoEJDQnpsAXi66l9yeWPCAm4YWEioz2yMF1ZZrB+C4y1IYvZ/ver/ZUpcgdCjCIAA+HboUwrYlNIkP+M6lOhz1O70k6LsMhdltyH1fpMrJOXRrHIIcViZNXWZ6bsDUyRNuMSucCdtXgOIOqGjmHqDWU9zBw3uKr2eVlkc5elNsQ3e0u3F1jSzgoaRpGJ root@3d7c80ce-09ff-11eb-9ebc-160f1a1b7fc9\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDjMFVnpJfN8H5a20Z2uyLU/ooRxOL37u17rr4NozKToTbLeZm2WhAAzbtSA6PMDpCGiP/Hbcy82Cg5v6vyavgqzwOOs5laiisi4YT/uCBRiL6VsgzD5cAR+nsdY7D6XbJMrgsQD/h2bV+UyxAdYcpklSfkgSaMLhO9fivlWKlZmWtaMQENWF0CrdK0G/RWuEhkwnx8SPpsSjPzqsSuOfAL2mqfZBpKKzvW+ZpuHQKpNoQjFhqaXKYjID2Dr7p9drpG4idwuIICxIBuR3MeZLBzeiM2gStxN2VZwM1JfAWm3ZeD9+T/wofOhPGcFDpLW0nTxb6p4ryHk49/AUC4Tf1P root@d0a809fb-12fb-11eb-a3c5-629ea79d0103\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD7IKlHeML+P1p6F8w2bRkLL8Bzli/CNXO+VRLhMWeRy263KQGDxvW5d9wpcKQ0T7aWrGtX8hFS1O1v61wpPNkmHjHUmNsGhqtnKz++LpjgoeCup28SD1xtLPIcB8cWPE13jg7Y86NPwEnMklFZFiGqihwYfOuAaNGvEBEUPiGzyJZyiCFaR/LO1pi2li9ZhTQsCCPyWhDC+KdWOLnSQakQbYrHDOQ/c6/aOT6u/ulpb9NnxLoFwmqqocMJVkbaZtcLdjvMOWe1TTR/cg+jGiOoV24cm/GK3yfeR+u5qMHwUSHcXsaHdjZTPDdo8YfgTYVXYwo3XYfYzNexJr3bL1H7 root@025d8844-19b3-11eb-8107-96bdcb308f91\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDckTcZZiqz9JkygObSyxlbm2Eyx2h+6IjAEvGO42z6S9YrkT9SFOgBBVHAOQwknrUgxHXw0ryPT1x1i6WrJ0dwBPX7UtoE4aDKlyGZHNh+5a7cYTvP8AOojVM9M9L5R0tiBQTosIaQDp8kZsvtGPWyLTkIkyPcJZMqVwBUT5tPk0XZvbcstOY4qhWbF32LfdQf8h4ahw+7iRpoDqNKsGdW0nY+xYaKJsxlssrVbRd7gJAlqbpmnwUNYbXnKaZjkgNDdRoPtUDEEMy37tUW4NKQuqpQ9G91LIY2h+QSaQ5+xji23WFfq/g2j25V7j3AD9ZK3YMwPQIcFNMeTMjLJb3P root@44dcd1f8-2670-11eb-bb1f-6e397dbce9be\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDRO858S/6BxTd6H1h0MqnglnStW6T9SBCEGwfG9H/PJQSYDAAphjPSvpVcFtKgSZ4ONVOCvMpAzh1i/8DJ9VSrlVkJllz2/dsGJcDH1RqADvE7mVHItoprFbtK6G7mxsYDrL9tfeh0XEz4wFO9EXaIZv5bU4YCBLWR3iJtxsYVrV7Erd0XVegiP5fNOS6/y8c9BJaWc66G8jRNjv4li2bDtVWWspQWQ3UmBroPzCb7SFonbwityiwNKiu8vhmOFRmGeiTCG4VHmRqq7vp6djey2EJEyep/lUjylRyYtgSZjnB545A41udbXg9HlzoaHSOyWX+a/85TLY9OQIrTFMER root@213f471e-2ebc-11eb-9b0b-d6a9455c8be7\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBPDwKUQWY+8dRTcZ49Iptt4h1oXG0sWg6jKue6MaqMJXsQai0qblpLsgK6TBP0r5pZR8rqTn3VUFwv4IhtY/W1AN5tG99JjI+GNipWemecp2CRMT0gv6LSyreTm+/hXLEH5VG31IAe6j3njwH0IMMkoNzuaZsYdnjDPp3mcS6Oaatdksj36NSecFT0Dc9aUYxUL+4GPgb8rZ+pIic36jiF9ki0Z47rbS2RsgH7/9tRS4P4cw45LFxu6Iwa4YqbnaezPRViYhakmkYpV1TK197Nla7t35mzGhT9Pcb17ZdOCxmH607+OwfiNsrUZWlH+AX6WrzbVAyNLNCl5J/b69f root@a40ef1d1-3fb8-11eb-a0eb-a663209ac437\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDOBL3ah2JcbJ5HrblTbzWc9b1pFrB6n2PMqkxjPdjZsK94iBRLRwsUCV9bRn3AVHq577eNohB4Arjb+F/0wiIJ2kwC/Hw/diH1SBIRIRN+62JBgGMZIZM5SRJDuCw2afhzxf5c/Gt2Q6pR6Q8mJf49cQxQyXeLhVyiJlywZ++WHGV731hXBEyjaPfhonp8yLkutJA1fjttfbd8KR6N4dK9TgUKQjabkrfRiO34LP+qhxx8oOEBQ/Z9O+kIxgAtDfKU43A/K3pysip7SFRqcXBgefw+IDZXBlGk97D1dHeu4U48S1Ulya/h+aZro8yLRrjnKZxI4gIZZDlXxbDhHQv/ root@14b4960d-4f21-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC5tPGrxS4Sm8RBmVZgPLsMTDuDtMa5Ivoj0bxfFkg4pYWE4ZjgN3S0ztlYEhMjDETYdGEPUPpPmc9BxwRC6KRTpLcDmmsHfcnDEDtcPIuqnKr/QQuFsAax08DYPlBKti4Fpy2HLUaP7X1+wP5Xry9lDSHiDl82zaHq3QblM3/z87ZBIfkD8AAp7lQcW6fLjouN5KfBQ1vb9GH04IKibA2Y9R6tiO4cDlNuTv7DEF8dSodZZAnZpTPLoclOYlWI6cZBD3o/N5xY6hquGu+t6cFPCs+w8V6gBkZUEPfxZoa3ugkJA80Fl0PvvwUzxpYRZIeBTx/z5rHXT4GjZCM1XvXJ root@20c5d9aa-50e8-11eb-bf1b-5279f1a59a83" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T18:31:54.627-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "106749447755-compute@developer.gserviceaccount.com", + "id": "1376489724361755237", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-070", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-070", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-070/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-070/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-070/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-071/description.json b/audit/projects/k8s-infra-e2e-boskos-071/description.json new file mode 100644 index 00000000000..066c257b761 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-071/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T01:33:43.846Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-071", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-071", + "projectNumber": "804042965184" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-071/iam.json b/audit/projects/k8s-infra-e2e-boskos-071/iam.json new file mode 100644 index 00000000000..cbdf54c2b8f --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-071/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-804042965184@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:804042965184-compute@developer.gserviceaccount.com", + "serviceAccount:804042965184@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-071/service-accounts/804042965184-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-071/service-accounts/804042965184-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..f7b38d90885 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-071/service-accounts/804042965184-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "804042965184-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-071/serviceAccounts/804042965184-compute@developer.gserviceaccount.com", + "oauth2ClientId": "103555481111546433026", + "projectId": "k8s-infra-e2e-boskos-071", + "uniqueId": "103555481111546433026" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-071/service-accounts/804042965184-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-071/service-accounts/804042965184-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-071/service-accounts/804042965184-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-071/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-071/services/compute/project-info.json new file mode 100644 index 00000000000..19448854f86 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-071/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIvxrIm116KcgsKNTAHAbDqE3ZmgT5mIs1b0oOaGJWmQYbYjXV4pHJYB2Dy4ko5IT3rXMcxO7IhENbm5b1zPb4Q/lLLPnZzm+36PmoEjky+Vj0tbWN0t/FbqE9jvtq8cgnoIaWqAVws5137mbJyTY4nDgICp1OAcQm7hG7+Pe1T/G0jjprzG5LAuRPS8HRL/7rx08cLfsngqIJ1VzaYGUZ6nqs377sA3SBgbT4AuOWs6MJ1M8tYDjBDMdJbQa96g8IWCnnL4xLhvkfi77ZYKCW0WTmxmIHP4bafTm52yvc+eR/TC34xh43D+y4SrY/pvzCDLBigPmQtHLl67f2Up/D root@3aed3fc6-d8ea-11ea-8c1c-d23af84fd26f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC3WdKVQzDBBKR9IHDHrffIXNZsyqlJOZyVoV00xCoSJxpwVamG5BLyE34qaAr+lYwCLYpm1F5cYjTDdwn6dbvpMR5xKPL3m18lWLTr7OxMI9oG1X0cYhSRbo+iBfG7xaswL3dnPZvWOHG1Idc8zVho3rPvph4NmKHbPIYKp1kE6vLr+dVRfzdeKUmGsub9gKw/iMOLHvVCdVG263WltZ6o2dBd491bwzwFqE+iTenNZTlx6hVe9C76Fh9XKLqY21iVXHmzGa/gphrCX+LmJos1uJlzqTyMcyKfx90+splZsD2bwHFu7lI3mGUpswcdLme2ihr57bkeu6HCIDaHVWi7 root@392c8f7d-d99b-11ea-8c1c-d23af84fd26f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9FjkMaIpzuy46LcDoRu6nD+yGZt9PG03s9NDf8kDD6SO4s6na4VPvP2He1X8cWoLOQCAgMFDt9e3ZyPS8UptR0HdTYVPpzfSj4RxVgi2wsHjAp8TVC4z+OPSFa+UlRDQO3XICm9lIBrzyQuiN6eMCCdjZAivRgZa3a5LUzGEyXq55ytF/jLLjCh4OckNZ/sZ3OncFTxz85B8XWjeiC6mRKBQFILStchKq32CsRjkhFqqO2ffQZxBJdbwMY4ojRT+R3hwWDwyKWjRBIjJOI47x84n7WWj19XxUXs7u+dWIWRFwzyUm7y8v9phGn8k9KaHc+AaFFKH9/qywf3TuvLeD root@a5ce895d-ddd0-11ea-8a0c-be937dd98cfb\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBOa7U/Fas9hmhFryiX638/lSkM5cqrsfDZVCY3nE/EuhG86jVodVfLxkxvqG5dy1+z7EdZPFOanp79ALgzq3MpbJrjebfUO4xohvI8jMGqYn401sB2F82EFGUBOQHb/PPa1R7qPYkVB1HD5/Y4+voKT2ruE/YYqWyJUq6mzGUHDTcG6aagKSam71Ik+6Q5NXiXOKU+aDeqOkJr/MWHJ1IHxipn1y/4X2gi4d7BbyH9Qm7ob0Z05842JbU2PjYuW5sLF0ZK4YJH33jAcr1PKHvmnO3DdIAQX+W0h3KV0Rer9UEIUuAlV/36gj4zD8hrwtLazWZdehintJV69/wtAGx root@b1f76db2-e048-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCeOtr6+psX/RawknDtpUBDI++5H02U4TFpP0EvZq5+Nz8GsWSsxKiRNmqTciys8j18BF1aDtXQhH8ddRYspbt1RxYGRkEIeCeSN5ArJ65j7iClbKp+v8DqHeLU0Re8xmMs8sEQuemUut/WPHIKq+NtsbjlaMyLAPqfMVmrknVmlQdpmYzI0vrEMVLtnpII0amwJOTKErkhjIUHGweMePP4jJS5SPeWYUIHZ7oOV2qs1cn62U2h550p0akOhcHDYHnADPh79CZV7p+vAM3o+nivBGFS6Ki0xh8UgUFZ9AQQO8PXEfSAVT/Jh9WYJyfGcduetWLDuRCaWrJp9urZW5bF root@e29cb9fd-e361-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQChhMjoA9H4BuCqND8lH+xL/K8v4wKYomvQBF/96dk7Ekuxsn04wgRQwDrpt/rlZgxWkLjn8mcABA+yOyiLteZkulE406FjR8tbiqIwExt0Xi4yDm6E1WhFIXD34FaoFzZwwnuscQNJScn2d1pdBiuFnP7+F9oUOfm2EUf994InGiXD4Zj2CU1RqxvQp7mSjqmCw85RmO985ZNkgIie5IUJM0dbWhfkJKWSTBzQGPNw/VPiexU1njqw3japaRyH+HmIAIc//iimwAgVNNUiAFD+2f7T5ePWPDj0sOODGZa3HwOdshSXi3xikcFkuum2cZv0mbm+tfIfzb4V7P5GVG23 root@bbef3b75-e671-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDPPgXGz8AJZiOXKhu/NBp20TS97qImwsptuSTMefyJjRnkWZPEBq5Tyqe8rZOIkxe77kttYJ1+SWuoMFRza5YI7AGme56CiVMndyclBHiVwNL6/q3dUZrNJhYcRZrmxJ+3ALjRl9DhJHbKG5bu5rMgFO7ycKVAsMXAVispjJV/hE4yZxLmryv4dEF9VFTrq3FcrWDDCHVqsNvKPdq9kvlmjckj+2YIyeQLqbHLx5A3TF7OL1qe7hdzPx+bX8rx/tWYhqc6g/AAG/dgWobab0w02H/M/K3W7GW661hg8dMHqML7DlZjlqv5KA3b3c+G4fWo5UIaEbyx0wCIWtx0ug8H root@bba8ee9d-ecc3-11ea-aebe-3e85ddc86bf2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDY4RVvtnWK+ytldHB47pxxjKEaYnZv+3kxT5IY4yqOx5tWU+Bi/MCurtJ7d3yq4tSKgEEpzk0aOvTBsRUdPWpXB49BJiYF2wBUdWPnIOkr0CHS6zW5+T7bkkhCGYCucVhx9fzeDvLvJXn59NG4+QoS3YSmhVWKmukVN7On8ynfinTmNv4bbs4EjuB/Utp8HCOsSKXwNTlc+rHRldLkwRzvq7qf4cbJUjZG4U7aWk6F6zHIn4eYOtOk4OflU7Vwjx9qL6x0OqS4/M/Q4QJUQRacJ7WE4iUog9LQuC3fJVe9fUDUqHtkPjzeIHsoqJzzP76tTLy8iY/Q4W6Pb1iBu3ER root@b884acaf-ee02-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCtRhZRL2H/sNvGOzVqnJ8WBh40CGI6CIR8kj1HA9t5YDj+c7EW508UZ2EylBwD8wKJEuGDW4B105Gphx9epEqWagh2Rmul+k7nB/l+RzSRWh2ea0EPlrJIuMrESyVdQhroUC5DKVBSfvhreuEn5O80ubvLDc9HQWj50GlmUcSQwVukpwwKCP/JOJEzKFKNmjnTvm7riQRb/axcTCBYBqiycdI1JwSG62EBrI1o1QHjl5ko/W6DIm0CrOKgHQ3gj5wU2LkZ35y+zuTdKlr8QHz/+gT0JcV1q/7I8/plYVtoE8qdPV4y/w1T4nBhQZcTQmnTrBB5VFKYpYh+4Mus0avz root@d39427b6-f4dc-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDRWePFOo2DzoIAKqNTINVOqUdxMs3/T7fvDl+a2gGcjQtS9y3UzQBxwvXcrO2GtK4s4JBlT/BJzrNBJi0KDPObnuMRJDOE2vuYXVNbmyyP5BOc5y8gbxEuSR3yujI8r922YuIGbcPYzbObaAe2mzR/PE0WkrSROwKVY/+gRwGbmGbbORNU53HSvtgJBRLMFJtR9M8uLvgYyEykCI/Dngr96/XpL8X0DMoh5OIJUwGXpYkcsfKBe2PqgJjQ+u5C0OBayLiGEiTGyXB0mqMISkUUvw/g0U2FdfuNmvgOl/hDQkrm+bXY+baKkRfxowrpXdCPNleUkfIV34pf+RpHVVcj root@caaa3642-f7a0-11ea-872a-bae3dc204648\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDO5XwOFHaJblOS63b9DvdC7GnR/mwbvwGROmswwrjnl8ZrBs3liBbor7B0lLGBXf1+h9a3gPDP1x+rH31pRH0pR/Y2f331ospimNDyww2sYe/OO/ysbyo1xNX06yEnPQs71YAkKf8RfM1Tj1HeFF6clZJIakqTyz6vxbfyw5jOyhCN4Lb0V9WmgGxX39yNhunXJZm3C5klpyHNkvWaL9H5A1RLRGnaAXdrgWckZxf92yydiBg7KJA3UHUdAdyCNcriDUOgwXmZ8Wiq0joVuLv6VvkSRAkhkJvc047vBkerGMNQgGJyo4I2GPlpgrcyEBQUDGlGUyYNy6i1+f5ClM4R root@865e04b4-058d-11eb-9dc4-ba187aea6a9a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC++1ok/Fr6hiGmc5sSze9bWsrDiQJOqNWuLIxNa0UM+q/Q01PfSrQj9Qti5VADZdyFbLN8vF7zgPvmHaoPLGFhosPDa66vwIZJKFNbtaS1WHIWuITcy4dOF2MtJLKJ7gaPVemSQkzZ2YhV/VrBp5gRbmzxr9SGEcxSEy0zoUcptl0wNcdtzNMzspmmmAXituStAdvSkoQWBbIY0OWS2Giv5tVFJahT7HMsJm8DdyMes88xFFvsexmZjJNLToAAn7e8XODMfgOEXq2rZXxiTFbSjPspd9gbh6uw8D7Z3BlE/r5LICfLdwMmiyL2bf0Ckzoa2bfQY1qDVaW+g/sVW8oD root@62f036c7-132e-11eb-a3c5-629ea79d0103\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZxQqx/iLEFQL6qgjOi9ZnZ659M165F8JrabiE6JGMkTyHVNTC1+zbnH8Xtbo08TBKON+mVEaZWdVfWWlKVQjtyOyoYQ1wjRS5FYgfEfr2f+HyI1ZRqj0El2RM0JTZLylt6oU0IOlM9PgBVwWWdMHJOsVt6OvdN/3jFEZKkyOqb0Ree9mIYmQIvqon4dWfuiJhjgBPKY9e+DNiMP6m3mSuHrAgHngaA4Wvn8yqdEb/l8qFC7zhQZp3oIhDwfgVWHws0/EuVMiR9U4sSce6n/mkEypRIDwBeIyES1AzfTMm/ZAcdUTtsf712i86QOSUjoC8SFWzcqTR297BGsZlI1ev root@2a0e7ba3-16ef-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDwD0N6uPTrCgqh3EqY1rJaO2Xmmhbo1oakK31eB3oxeK2Z3eBdV/DFUXC9blyWY9H1G0h154LclAMLalm1IPSIN772zI0SXAf3ggZDXAbWLB9Z4N2cg9PGI8XE8VZgy7wDGJGW4keFIQEu0u54arxs6tfMkhxxFD+F9OfxyxqEqAKIG26uNuMnZc137bx1i+W13vce8VaXudK2gs9Vd0uT2nahapjK3CZ7B4QAUZG3QwxD2j95Z7W/CTz7Z3wR+LZ9XikQruWjXZZck6jyes8K1i2grhRyc+XXxBhWfr79wSjTNvdCoEWZmiZLguk3C6W/lwL2CcKAwZ8zig6Qt6En root@2e51253d-18b6-11eb-ac0b-9a760af27878\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDXN5of0C8yNMQllXYtmwGTZdYNmHbbOIqPzrbBKo2n/M0KpP5q34RoAN5bJhJkIWU1PH0ue+qm7YK94pPrY7neQJr10SvqOtg3ux4FwD7QvCPx/zm6EqWceE3uXDY0Lxp+b82xMRf5LaRokwhTivuA1tjs13PXEUNqCkZ9dnTi0uINmpH3fYbGWoGQd12MdvZlXgo9U3MqFUF96BQC0TVYVmW1nhbsricR9dooYYZXLtiVcJLh4aChdjjhKI/KIHsCSjMEod5RGFDuglOpK7EvqF1e1yj3PqdjX4fmmdDaI7npWH8WXPQwRBTq0ItATWWn0KIYiuvPP9OqlBHtpWS3 root@a64e8dd5-2476-11eb-bd88-f687e5d66392\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDUIWW9SbfhtEzIXrbVoRJMxUOwwdLtQQgxhDqdI3o1WnwZ9CAXay3uWA3LKK1fSpN54sWUCiIiqcZRhllJ/oPgLebTw7z7U5H5MOtHyifl2aP7+QsPFfkTgMVZpttE8oG9bd3Yfq7BhSBO5Ev2ygveUTb69W3KED03+QLIlFuZfavPk0nB7KbN/FEqMgCf5vGicdAebAW7YkYfGLlvYgWgAddUGHVNyzB5/bjmlabMp1HIrdhoLHVpER8KeLKTv+AUuifONk/LgUOkbBykJshYrDraEMzBTFp8bCu45ktqfZ/pOi1FHUZI55WMluqeiUFYj0WQQtYkWD4rhK67SYx1 root@827018da-24c2-11eb-bd88-f687e5d66392\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDfbWj1twQH2ND0+3ygHww68P0Ovyk7P0JI26cAK9ie5OBwqscsjmMEJ6d5Bj8u02r9Bx/7wyiB8P4ZKJ69lcM7abqBd1j8HRuRxM2PruV/+PD4ePvdc+5/WT4AHIfRJnin5croJNQxu212jsEJRAX60Rrw58MQzMSwRiTAYSw6pey31QJDGT4cWe2Q2nRrmBRR5qowd9TgU8dNl8vnBBBdZENiCoiO8F7JYd3tKqd/7JJyHxfSJqS04Ao0PCjZg8owCIaoh0rZeV4qhg9yFc+Dtsn5MREGTul+QkjGpYYH/0mdTHyLpXYB4NDxw2AOrw5QXiYVbrzTgGtr43Ti6oHd root@b0d1b357-26ee-11eb-bb1f-6e397dbce9be\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDRmDWZZaVfj/ydo1kf8BIfJ13N8zlX4vylu3PfDYkxipaURt6wapcTCwrmrVsPOJjkaSMJ8/WO1wCoMnHShV89TYT5aj6GTjlmWQPiAvAEDAJ+yjXpJmLYvq4BEZ8tGOCm9SDFTyYD6a04XlmsyD9/0u7E5JjoRgNQfboTFoqOOXbYD8Z+lyLQlyUqIOW/AbKYfj5FqPeurVIO7n3DaYJsQeFy22Gn01saAfXdMIkwqsQa3FaFOgCBM/6dIrDce5XLKv7RW/vtCBqkHvFZYp3w4Q61Fannqo5uc+O0qP5HlwNqIg9rc+cDRwaxq5Ahdc8jTCZXc2T79Dpc+Xaq54/x root@4e49cb43-350e-11eb-9896-aabf0c108015\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCnoAdaUd+GqmFt5iz7/JFT8eQgSHr0GnDD+SbjRx+WEf8g32FZJam0OQhhT5+sWqdS3MlLyXIuVoinEKGH0+6LHxZI2X/Tr/D8Kt5tc2lPHWynPtJG3cljx6QhKKzDNTBDYW+UZMVA/aJZjwuAghmA/YjIisdLB1RHWEV6fP6+eKwIjgx6NCqvtOTZ5jN+u+lxAjwJzUD0S0FBM75DBX7mYP1McRTQOhHh0pAKhRebkcUbH/kI9AGOwFszwaLiXCzIAfyji5hKJNmK78WuDmcX8wcyd30djJ+zY0MO81MKukTxQHzc5Ewq4aeStl4SY6PksaDsjXvPmkBy4xPn8tOD root@60647805-3624-11eb-8ecf-c2fbd71c5254\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCkj74L2iDHwImorvKnWLJIf5s6Tno4kSfsgZ3G9tjkzjzaS/rlpoDo0yIwJPSkL8qgNkpGyXhNUGsUa8KtJRK5WvOXYNiIeVZDq6Xp5bVhWcTyHTGii5oZUcy4IMsBBQFkpIp94Xtg7f2Cl125XiiSUfvay5x8IIqR4pQLhNYxTxdwJy2s/RDB+mKoz5gEKiIbklHbJB6vsklZQP7JhCzQGhwEKqpAVbAX3ERvwX4ccXTdykNAw8TbR6DQiZAit+fi/86KYc2RRf2UwkfCZKkGv7wc8RrGYHX2LLzCL07XqSGKeVh7WPCPsuEriKEPgZTfGnqJjOIKYpDjDhaxKw7B root@cb437bd1-4f07-11eb-af93-4e5abfa0c065" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T18:33:54.953-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "804042965184-compute@developer.gserviceaccount.com", + "id": "4827046723183365101", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-071", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-071", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-071/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-071/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-071/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-072/description.json b/audit/projects/k8s-infra-e2e-boskos-072/description.json new file mode 100644 index 00000000000..df8798297f5 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-072/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T01:35:35.168Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-072", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-072", + "projectNumber": "960107034139" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-072/iam.json b/audit/projects/k8s-infra-e2e-boskos-072/iam.json new file mode 100644 index 00000000000..47350881425 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-072/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-960107034139@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:960107034139-compute@developer.gserviceaccount.com", + "serviceAccount:960107034139@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-072/service-accounts/960107034139-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-072/service-accounts/960107034139-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..0cb56e22b1e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-072/service-accounts/960107034139-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "960107034139-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-072/serviceAccounts/960107034139-compute@developer.gserviceaccount.com", + "oauth2ClientId": "104224844734618825830", + "projectId": "k8s-infra-e2e-boskos-072", + "uniqueId": "104224844734618825830" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-072/service-accounts/960107034139-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-072/service-accounts/960107034139-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-072/service-accounts/960107034139-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-072/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-072/services/compute/project-info.json new file mode 100644 index 00000000000..d9301fcdfe4 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-072/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCiV6AWJlGMVWsLXUEqBXKLM+yZaHDcIu3dkeYHx5sla9qnkAwiVsvL59S9Mzxnd1rjm9VtbI3lmdtAY1F5F3tUzuGKgl6oEjfgLGhgLkyCNtl+OcBTM7piiwBg97byOUR3+76IIEPu7BTiEhSju1xSMn3SqYEgAc+lzlZakoalUXMjCJMyrfR+iCN2qdxfEHTxQOXrKMVns1HiTtnlNgcVeprmuw0g2sfKxCW+UlQ+uHkkIIx31KioKC/mF8APBqvv/j7r2hIEtGaOw7thSytjaCz1CRCvNP9S2JAe4nIiY6Xu/S5aVSVXZJvvMtmN7szBboL8mQ1i+AEsDf9MvrNT root@dba2d4cb-de0c-11ea-8a0c-be937dd98cfb\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDi9cw6VSMCmfRWGX4Ccym+no7uoIZFRTnPBsIPPVSA+b54ykQzxzCRKidy/l3Ri8d2uyapsNLZlQUM6O1N8QQuAL512oYaJKR8uysgUegy7g/U20AgazFWFyiC0dcjh//ndxilhnj/oWo6gaTTWJJuDxutmdvXUHoagmbRx2liTLo8yTxYPC0u6ejbbSg82Vn6/m8fEn2kVy7sDWhAwL1Px5x6Fwn0wn1uxmM4dcwrzW4W5QrXTUs7UHzWgadE4xC5C0Ia+Tawhsvqq3uo2FXcUlxyYVMhChvcWiDX1InkIn9x9hCf4P7C1+JmDM/muucMUszPp50miaBBRbZlQwrn root@e09e8502-e6d6-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9SfZI+xVz/jKMmDliC9f8+mjVTMfUg7KwZK1sScPh/TbMKOGqjKX46KfD79iMb6oPJ3S6j86ySD7n7YhQfvqzJz+fmxGvJHHCj3W3M830498gJ1cyRjeqFrCVmVSF/BHy6tfrHVDrJ4BlUSaoQHm6l+UX/dJOxoLhGePXwPr1f/BEJQW399UlSagIJbbSZ+XVi5D2zXiPEsaGT0SIPV5Q6hLxzDisOywPD8+8IvqMjqxfxssGcYLAFagc8D/Q/LrANHC6ozSP/cVU7FSiccmjlmYkXAsZRr6Fo44rYqEdSHYdLIxnDlSeLCE7rpxEDUzJ/cGC6a+YFPbRltGMFxnB root@4da5ce54-ecf6-11ea-aebe-3e85ddc86bf2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSeD8anRJNVG1gP3aFg+Oin/NctYA3xcpeUmcJmdoou7Ku5e01AjlvP9rLT2Xdbt/Ne0B/ySEgMNKDpY8fOSOg+h6uDreCTailXDlFnzP8cGy5b2HOWiN6A1J2ZYVkmb4jQmGQ4G0Fh3YJxf5rGEybwHV4d7ULit0i8d77oAlrN89p2weiqsJov9Uxu8qxYPrsFyLVYOw4X67JFwHPQQtZFLf5HqNNYr9Du4XaSKxmzq2oCa8MueB2JN6uibiHLIECsW6g63RKa0mjv6z2vZfPD5KJuSBrhit2dr177ImgJMHuZ81ZjCMYow5A3NVT9ZMJ/4f9pxPoji5OIi43p/Zh root@a9b47a7d-06a3-11eb-9dc4-ba187aea6a9a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC3zSL7BvEMkBimH+U6sIbXyAc0chNzlHLlfCuQf7ItzeAFNeANXkAZzuZ2OEbcmnihFZ1TFHrYjO+bEwRtVDCyRLfR3JEU7UQw5YZXgiS3Un4bQKeCKlPwlvShwGvOrFFqBmLB23eYXySNQdJ6xv6CcCP8Xztwxmzk+Pvp3uwOEck5qAiiq9LcGlgevvGxnYWt8/Ofg03bjIpcpXv2D7AnhK4p1I4qbuRWeh71BCQqOn3SyM81XagPf/gghzMywym0D/VaKf1w1RjbetCSVLYCDv8vTT2N0M40OuV0plE5Xf7DQiozDZ2KL0bo/xOw4UM7mkl4EtuZpmokC05lTaRd root@4b6447f4-19cc-11eb-8107-96bdcb308f91\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDUNGVOXYUE92H49Eujraubmpfxu6aDCQ7snBDnkQYvyVb3VFApSCZ5mdZ+Nsc3e+EBCknrivlhJTu9se/BJ7uHd3Rb+tRznpT8plJ7xh5eIcfqz31sDYu51J7p2O+f2gvYkQSuQiEdroW5yusFHxnSGMlbr7xeds9fKQ7oOISalNdRdv5eIFnuuvtayv6pWjZLdVKsZ3fQRq+wQ5zu4etTHOi4jHwZ80pqnpRonPYGMl+Vg/x2USWdQ0UwvvtgGxQM06lpgE1WB5jumaPXjoUo/pr6tZwmqSZwwOQMjnGDfYR3SOtHr5czbAF0JkSrJd7LmLioG6OiL+uXPSB/xEwf root@f4dd60f5-2217-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDE8xByKfA9X0CzpEUsZEreoM4dclRsNRxnWzkBCL87IHDGfuV4VYpIP++M2OnlO4W4gwYn8EFk/smCsodq9YvaPe7PYGjX6zJtUvKdsRWK3z9eTskyeoLTj17Yn+8M5yk6q2oVSjaGOWJ6TuMMzDztPy6tLCdRAiJGg+Kd9kUAl5iWDkjGVL9JpVhr/KG0tU83Ul9BypKHgDiWkElqrwBQjvGOMFBzFQKwnkOCuNAp9Bdzqm9zhV8CtZtg4eRsxhdpDJH4Iacq10FKQUgmeEYCMBeHlFORZoeHexePznZEecBsuLmaK1/puFrGemu+Ddm2z4qfwc6gi3aTGnk4zib9 root@5c3e8ff1-345d-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDgu8T2NcHepVfNykStOu4Bjtw5fqkna58DLDUw/DOa75QSTymCpX/Znbuyfvd7GZxKU9vF07gk/ofVXY3q+c3IDz5e1LES7bjieRn/J6B/mZA6EDdNDnDXU/fbgl9j6z4PNuvYW0oR0g9xja8UgU0Fp+RBQm79AOelRPH/HyRr+vsoQjJgjjM/MGMrlv5pz/WAZswQzud/4mBHzEvuYRDMIgBZaW/LlF8rYLw7Jbg2ioRzpRVkdgzVJqLecqcMcFbKQxo+8f6ZAsO7NLuJ1247uurqIw19OQREonJ1R4rklv6uw6HKDAiXSerctHqzz5nwatE3Vr5C6lobX9XhG4pN root@a96cfbbd-363d-11eb-8ecf-c2fbd71c5254\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQPDmJ0DmmzWaas8rAU4p9FqZWY5MGJaTbZZEmQp8fzAhBjzaO/rpjnCfcjnx5EODKr0C0XPTMl9fSLnPuhEA4cQqEZAFQFIhY/LUo9GsUgKZEpXbocSj4TijKKodRFiYaIQE7/1zGfKIwO3ZN/EokSkTwaVO8EBRXvWN7evEWcLDbt0wDTlZLtB8yOMG0sGJtL38l0q2uKLD1jPmO0rJ6c05PPJRjQxXnPJIHe4yM4Gp/8C3WBqt40NhAq3Idnt4dftp+H35KYQ8pfhoAxJycXJbN/i81sdbWGbpuf99+sSntx1ikZllGRp17XSXFWth+DzydJWs7LHJog2CSxhbN root@223a01f6-44c2-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCrFNiOPfw4gI/7uzNGbCrAz+V3740e8XMB3mcgznWFL5VAR0N/PWdKcz0Gf7oPKphKnSn886qyAHYW8kVmi2Ldblx5JrxwQeJu5qrF2ylA+/LMVUbkMMLFB3z2aaC2kI0XhcOCfkhn5uyanGRPKSdaFndnscr4IZBjTAJeMVYp/8cOkXnLpeJYm2MQx674QKCQrL17rvXytvwp1uxX1+QT+co6DUXs5Ykg1yeAy2XofvQYp+U/mnAgA77fKJ2J7z90k5CZ0E4ukYPzq34REWOVKkl+YmO/BPDkWsOzgKR9Vgr8S1siP49lUAt3L0hE5yLuEp+0pHvq2GBzHn7KGSOD root@ef4bdac5-4e0a-11eb-af93-4e5abfa0c065" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T18:35:44.973-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "960107034139-compute@developer.gserviceaccount.com", + "id": "5416483525170744223", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-072", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-072", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-072/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-072/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-072/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-073/description.json b/audit/projects/k8s-infra-e2e-boskos-073/description.json new file mode 100644 index 00000000000..4d34896932b --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-073/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T01:37:37.910Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-073", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-073", + "projectNumber": "834104092373" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-073/iam.json b/audit/projects/k8s-infra-e2e-boskos-073/iam.json new file mode 100644 index 00000000000..f6368cdf1a5 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-073/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-834104092373@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:834104092373-compute@developer.gserviceaccount.com", + "serviceAccount:834104092373@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-073/service-accounts/834104092373-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-073/service-accounts/834104092373-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..fba06befc6d --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-073/service-accounts/834104092373-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "834104092373-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-073/serviceAccounts/834104092373-compute@developer.gserviceaccount.com", + "oauth2ClientId": "109327221147049651540", + "projectId": "k8s-infra-e2e-boskos-073", + "uniqueId": "109327221147049651540" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-073/service-accounts/834104092373-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-073/service-accounts/834104092373-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-073/service-accounts/834104092373-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-073/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-073/services/compute/project-info.json new file mode 100644 index 00000000000..d1128492ca2 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-073/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/heOMuFNrB+1A6EcjsW/OwL2IyUWHR/JYH2Yii3dUWENmEhwnvbl8ywexL54bXolKHWJcxoSVBolX+b60FQ8YRziz1c5gS3G93Rhp7eY6si2U1FVnIguBnsT1m1fE+37oSeYrYNLLF122lD6blDoSbDbirhnSCcdVVtSGFGU4/u5LsqTYAhMrTnx3c9gl+490KtgGk8M1qhEFBJP/D5B2hdvrp70BQvs4dSkCIH4m6eJAdDmeFl9cL8//w8Z9VhEa4UrKeihKWcvZU67ocuP8gdOcsmvHbqm8ENRBiymVUksuZwo2slZ+SZluH6QLv8TFjyQAqjCgnJtiAhT+8NLN root@37981af3-dafd-11ea-8c1c-d23af84fd26f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDAJw8nO4IyFLgQ02IEZVItyOUCc3cGK3RgfFrTJd5jdLtqR/GJpSLB6MlQxTGqlAbBHwld1lfLfHILgyRjgC824aj92Y6svGrhoR1FQ1z2dlkY5yL2OfENxVoCIE5umbq2Fiiyr7QUiw0E4p2H9XTfYf79hxNKHbl0aWN+1XYuzhvZbJsQ+gPBArP5Rk0Uv1lrwwae3qKXUIsnOM1h4KfPARkzRP/wcKEXU+GLtKuVcuq5eJVAuBb9s76DTVukNwWN5NHw9heLMW2HyoHvzT2we2sWlTeXd42/G8fkw21suMEZ+2pcpz5WR9OVhqie/oOpnMODTQ1I7As9rtfxRA3b root@186201fe-e5b7-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCzHc7quAbrLbXuWbrZEvb2tUJhWAMWb2E061YIrvWFWZLV+zvFegshJ3HX20qGUUnmkKMFTe/3Rta6uJINe0jIiqVXL5yv9VEZjNJwkegOccYdrX4ek3YuYEr9Sfr122fZqF4hEjZMCfEycLl6SLk1/sVAwEIucpGyS88voaagxCeDcj7OonNCPXPPsDGegJWL15bjqSf2DVlxJzOT2zycksJgTNfjOwhaxIB+AGGF3EMs+C45WmrEsyEQM7Yoe0mq1Yopg1e2r2BOLntKWKjM9XB9EmHFoGW8xQzq+o+ou8l5XBI8GqIbRX5fAD2tMBeZUHIYcWYO9ryxQilNN5O9 root@ffe10120-e7c9-11ea-885a-2259550e0d87\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDe3Q/VGRxcnUA+83AZTTq1DgyHLn5KXI4B7r697mef8oGVBzlIEuH6HkNi7m7kY5mIKmo4yoLV4sb+hvyGyNrzTxGTUgzTpgOw2H8gc8ULBrmcHy8w0VLXDxLP7JniQ68Wx+5A4P2qI6Yu+QKtXCIWXz2EwxdkAlltZKW8Bg6kFR6hAADoQsj3U38GuIJ7K7KNQRKQ4vWrWDyRHEdmjY1T6K8vWUkdfKg1Tfl7NkHWyMRdI1CtZA2kJ5eprFw/0npqEkH/OtuNjEKaDUNK4Q/aGuR1ypgwPFjV9Er5q91W8c33bt4QYuYZW3WhexQEA8Qt3VSaf8OGGZuTKnhCOAOP root@ca5dfe01-f6ef-11ea-ae6d-8ed64f3416c0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDP/lC/ZNGZu/OHiV0DIc8CiGQLhRKWsXUMETAE6Yn6Ko8qoMX/ZCODCuM4ePC4ywbr4afiFVqX9H8eaCeGL1Q8LIQA8BbhbjuPWIf7Ir22r3vkkSIZaYja86LoY2gHW3rZt+47k1TzPnOHlhBouX9guvCxJ2CFly0uPrqFLCNsLbpV1mME8YlpFBb/fLbd/AtWk1pxaeQbT5A6Vl7MFzLGp5dTU/rcsLFmOX2DoOXdy+2gLKQP/9UqOOWrYEZ29hJe1o1w5fO0MkjgA66Jl/Q6GpWwQkCM6kM1g2S73aTVw1R4+rSNL1z9Jx+m0IaWloTpVyvhJJNgGufuRhNESDxx root@32c8cc85-0cc3-11eb-82af-de22b9665164\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDiZQ2KMhfOhaMdm30vZ1erGTzfyzV8Dw5rd9+Fv6mRUePmeOKFKQXRHje9jV1Izqa5E/rlJhiFYcZ61MiGjlwD38VZvd8+i+/wcVjkrYaE40b3HO6aCBRvUdelGcRcKLNFBKae7Rvwa/ruV5YL7SCy/qNpFnv/QiCRaW6YqEjjO6LL++lkZKWhoG6ATIyIdVM1onecPAOkODjM/q8vIWrdJqjoArJaBXHksYlnYIKFwYxz/pMJgDshBbVVHxKXW3WUdkwFUeyDiORlFS06mdd7ARJgLfl6QFeBMbswGDA7MmjH2l6i0SYoPuHE5Gh+b4B0jwLMHEp0Wj+2A5hZfZmn root@9b57ccff-0f08-11eb-b384-ce16c16e5d30\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCbHL8q8djt8XINR2SdQrZMq40CY5g+xsUdmSJoU0s+CeqAts2htNsSPi5aYlQFTTr9zemLHhFZW+xK10z383wZKs9BZEjQb0Pg8O4wjVq7VAGhtckSLxhDJo1Ald1E/mc83tu4IIusm48C6ZTWX6bUpJVlWOCzt7/12pyHs6GoLml7jc4rRRXjx63ZBLQgjyIMJp7kpV//Utkg5DKK+qdFRVAwrqg4/yZv3WcJwVt1uA2+QxfhS1/JeHPabImU4g9KbN/S6aBMgbQTd6OH9RIO6Az+sfJjrJc99xkkDwzBpTOu4IK0h36deUO1DmDTDrR3xjRacLMlSglm7sdvM8+l root@d5428c5b-0f21-11eb-9a04-3e74eeea3a1f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDyfdGl5ijOHwkJuUwdjHKlpsxZbUZzIRj+B3gCjQ23LaDr8KbfRmGPZNhIlmjOX11edP7Bh/S36ooFEvLF1I5sOIwmAPgvLpGMGFLw88Z0C0Q/G9AoNpJoH9/Gt7sGOBGZNiIj2X5iAnEtwAXJ9s/UKSQHBlLx0xhtjI3KEuKxBs29DrxA11EJZWPw9JShbCw/Ot5lyLNXHchoPX49f0lRFOuXcA+buxrsF76N9eHJB0Crp0Vam2EgOHaMXJKFFeXuOcn8G+rkmJQ5PabH8LzAvsMuXDLhNmvl+GgXJk2rmFPxnZXsdJach3P4Wca4Q2Mp5MwQr36Llzb95D6clSk7 root@5bfa7349-10b6-11eb-9a43-0aa5164aad51\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDDH9EnD02iSZ1HYm6SO/0owvMHN8LMpETnf7RYmmvFVHg/wx5kOMvRmb5Y87Sf6NLxBMGp7mveGZbJz27QLvsyNeFRg7fCWxrlTzMBmx0dx+HBKafUZMyAy2OWJr5eH7B3hL+GM/wQj/jEBAwSIAi4WcJS3UrMzbUW5ZRo3MFgXY+1ZlELMqw+UTkMK+gkiGgDgdDdlSUL+5dYLC7g9/Thv55RiBeeX/Pd23GdGgbVgHY63eHnygDf8aFTd8uLhdFc3mq7zFpdijwwuZvtFhMEkWI8svuzGJnKDzNauKqScsyWZshjOBU5/CRNU2FCWuuiohc4IgtSyZ0m1QSZm3Kd root@6b52e539-1d5a-11eb-8e42-66e2cea7f923\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCz+0m/wrIpSbuqzGWYa5J0qz0h/+CK1MQWoBcE1Ocx9IzqkHrPPBqnEc+GsqwsijF1TriopXV7L5OhkOnv7hC6tACaachd8zHi4rZtaTSfdK65L9O5EArLsL6w3z7qEA4vcLvEptRef3XnFINDegIoZ/e67QvLuRzERQfDPT6B80VLKzaywOc8C6moRiQ3biFfw2insS2BeGBtKm1E6hxJ8IYqXZcBUVOz5NCmzqwssKY/+PwKOCDC59ds/GykO+chkG82v1c0wjjwX18mIeYE8j6J8sGhjmu4Jw1PgvK63zv0A8e41JJg7KU1ccFFtKeg07RMTumaQ7bOLoJLbLV9 root@8dc526a6-1ed5-11eb-a4fe-eec30b56844c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC6kJ1NoLjy4zN40cC4ZylloyMdA+6uclAziZixcN2vbZkNSaxPwMK0mcKRbVlVXlNFv8JRnXZLVhlIPFlSIMUM4lZhiYzeKk/ljI/bI0nfRmvIxwtIPmHpWcrtc9ZgYyif4Ink5JKKCB9EWMG8ZLqeHapeyfCC4zAIWPh2kHTwFGM5URHNnKIs3lDEN0B53lzrKGzE6fqisQuOAE8U/ogo4NPkyyTOfNBBk11VMMjCuKX6j8avJG1wawQt66PEMtpGpBadoG+TiVwvKezEdnT9vi41effcGh2ldYT2KWPnXo6aMHJ1yf5Jy8y3dNabt8djNi3soQKvRPQSrHfbXTlR root@7039f49f-2573-11eb-aecb-aa862b891259\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2zY/o3TFQsvcw8/dghatzju4oqC6UE9p/u1n9H8nb1GWKYI2JnYVXTBT4MdNoj/F0+a92Zhyx276ylMJ9BMn7BFJpaXU5Tzm1UubbmIRrZeoqfxoUCrTCX6zNRMCUqzUdt3WetgqEK3V68DLL4OJv6eKZOe9FF90ESl2Md7ffHZtsvruEGcaRr660IX+pM7pJxeLtxf9MaFsCt56cVfWx3eZiEHmiUF5Y3dUSi5CcZ3NugYerWZ9zWiY5PFFeuHNhW+XHWLmmnSIXp60KNitvj/sVnBFYefug5RwCgqkh+SyK+7Y3aPRPPdx7DMCy1sdKuQfjznPqjH4tZy7MorTf root@b2e44f7e-263d-11eb-bb1f-6e397dbce9be\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDDgu6+P4ah+7vh8z+sONC4J2m1X1N2lr04H9IB39Klcn4Q8jOs9N/9Db9UwqIyXUBY/0YcNyCODJTlZPpAIypdT+t5NY2c/zDCP9kOgci5RE7DTcpEk8JNd4OzJjGmboyeI3XedZidwh7w9g89FoYztxk5M5b1ASKmBYXj2nVnAdePqsi6Msuh+ZTv/mTaAI02ZRvDwvUdthtezSQRTECvFZCcTdq4S0usOeTfQcAfIkOHnoKfWlIYwS+VJqOA3Nvn+nfhCmi4weiHk6Bm22Ygt3jbeQQzSP1/A5n3E6rbWbZroC2ZJp6OMILZMemOV7bxmjUEcB8i0b/S3o6XWa9B root@669a0d14-2837-11eb-bb1f-6e397dbce9be\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDC3F2zO2tfFFArt60DksW+Tno/6LWOxWSGOUvG6rPRBgaTpVSgkQDhusCgasvKWg1P7Gq64nkL50zE5vi7cJH5IGWJvAg54qKQHGUxJHgIgPANxyxEtwdOqzN+te/bZCnCesgerQCcQcqPoPVkrxO2v/sRxC43lIGqnmLIpt0S46mojZirhPhZHJUO/b9bA3czRPeXI4f4H98ZPLtQBj4s9y6OHMYlSGiFG0GYNG5Du0/bmG5alZfEVRWRd3yOaemTyg7MAs0Fd/5QMBC7cGDX9qw8v5j4Zncpuy+Q95FUICYxVW5qR6L1zbzkS3XWgBFQP5f+H72NFf0Lb6r6p2wF root@c4983d40-3966-11eb-8630-522871d052a8\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCeZLADKOR/5S5J7aZ136TDGuz5+y2SEr8L1gBCspPDShGi1udWlcL1eWE/UUZc5k/LpDaF5grzElpXEzxrtGQjXFmFNSA51meiBN984n+QHb/U8T5TCAH0W2WoCSyDepBkr0k4D3YMrbKRkPZAQ/CxAkQmpkcVDabbaiMpXGQiZlKbcTMl/CLIoWuT+ZuY7zjs8kWOadWnLFKwYPwfu/ZDN07rdfWB/EfFWbcN3TwJfweXxwi7NL4mnLov6S+ruPkPw1UailJstJWeELtHrbTy+wis0ObqtXve6Ng8ifwCcKYZAONct7rBpn7USB09aprxEE3mT+goSTlO0sbT+obP root@fe4f4941-42fa-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDILPNkUIxP58+Wrf8FC0E8Wt8r7Z9937QTt82xwzZO1jrsk+uWlOeqn7e3P3oR1W/mHTZYTYUE8q7GTuZy1SOmjO3MVvyuwB3Qt9pNSHZkARJyKDVkT8GLxRH8NA9gncbB7lZmG7/1au/5t8o9wq5fpOtLrxGAGGQrARJsK4PGubzxHlPHkdki+Lztwb8t3xiObR/bw3+fKZ/NnLLS1N81Sxfb0tLBFfcpzfPoDowHRrHpnK86MozvaF5UMgD/fK1fBoCIXlh6shLcTmAQKWWWGflvGToa0yYfnzC4KES06vNgiwqOJv1LBO9bPThYAhgzki5Vyk8oc9PHLlSFES4n root@00457f70-52fb-11eb-b6a5-7e8b7adfd54c" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T18:37:47.777-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "834104092373-compute@developer.gserviceaccount.com", + "id": "7969426465463651076", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-073", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-073", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-073/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-073/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-073/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-074/description.json b/audit/projects/k8s-infra-e2e-boskos-074/description.json new file mode 100644 index 00000000000..e41296a609c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-074/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T01:39:36.932Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-074", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-074", + "projectNumber": "252404881892" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-074/iam.json b/audit/projects/k8s-infra-e2e-boskos-074/iam.json new file mode 100644 index 00000000000..05b3ce9305e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-074/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-252404881892@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:252404881892-compute@developer.gserviceaccount.com", + "serviceAccount:252404881892@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-074/service-accounts/252404881892-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-074/service-accounts/252404881892-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..8b85b49bc7f --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-074/service-accounts/252404881892-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "252404881892-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-074/serviceAccounts/252404881892-compute@developer.gserviceaccount.com", + "oauth2ClientId": "102847245017680850517", + "projectId": "k8s-infra-e2e-boskos-074", + "uniqueId": "102847245017680850517" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-074/service-accounts/252404881892-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-074/service-accounts/252404881892-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-074/service-accounts/252404881892-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-074/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-074/services/compute/project-info.json new file mode 100644 index 00000000000..9e7d3c8fde9 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-074/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/vpqjzmUx/8Wc9IjAX7ZUXepaJKFnytG1gKeL9woNfeblr/GFg1gAkHonidMLYu747qtcnKdBl4fEv6MmJtcZ+oj//4hrHQkjpU3ty6P4gAwhhOxGQUHYsdX6LEkJXgMLF7mISAhdGVA82Lu7fnLLnLRYcvIUuzIlhAk9YJPp6lARf2CwgZPKUDsOFOmVi5cwKdxIF6Ef02cmOikYDGKLqi991dp88LFwUwhS+9UyVs7G/FReZrvN56luwSHdqHIcVsbW+GL7CNj/8YNU1zCdGAORGj2ue7ThabiCAplAfMqguxBKq/rUNQB1AhmCA8iJ6mWRXThhemZcyfRe8cyx root@13080335-da98-11ea-8c1c-d23af84fd26f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCnM4YtUXyOIMwqvfqVBOxR6wUWE+96KVbXvl2ky72VHsUCprC86ZRcFAsd1oqFqPt1qD5U3CD8grA5OItW8hbw6uyYPk3x1sSgiLorxZ4SEKO4ZOiPW4uQRA8OJ199ynOnf3EmrdtGxqTRtnGpwlAgRvn0q8CWVblBABSUG6Qwpi97UfdOUVlOgqa477YOfsOUnKyNihHTtCb1Fs5i9KtR2S2+XLg0m7kl5z9ESiV+padHlFcyGcVtXChUQLMe30psu+Z2oDQcXciq581VwbiGq5F3fFgmTGiKGy2+OIoftzt6XNsFUoEBwkQLakdqIURhaI2MXEuCvJYlMVKIkpBb root@ff35685d-f02e-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC56aZZyUpiWp913A1Y7dpwNa9i8QibJ2NibnSy+laxRzhmFOb0d5oTvWKYEYmRC3JKmT6EviYMn+aV+9bi361RueNrdRcbNmeqL17RaRiKSWg2XuHYeQSKAD6dBQxmxld8lctI6vVDJHBP7EViCJKZgoGcwqiLktyHBsbp+X5i3xY/HQTgJ7/euOLyYo47u6yiTdNRVoN/8ZgBt3k0mkqU6TK/Pz+9Clr6uxdnQhJ7+lP2RGY+8nQNOwFRLXxqm1b1BNyBHSWeD81hujXzhm1/Mhc9mO7+ml47tjYt/Tx3sFcANDuf0fSIR2MW4hpddDtvizzWO6NvxrxTnUtz2rin root@5954034f-f0d0-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDXBGaAGESZwYcc7B3810sNTFXInWJcpNcJ87Y+evgMFrYP0lTtS2vbh6wpafTrN3uPp38l60HyQaQpSlKEgu61cPd1Oe4NWVgV769PKMGeT2/kaf10MsVczWsh/pcegPhXiEGuiJNLHD86uKYDBLaLWdHzFinXIluM4pP+qXOQmII58iE0U80EvU2H/1MIxYuRnviXKSuewZOvZQUwcsmnY3VQ0CzcuAqB9L4MSDmzZ9e5UzheTmRcYEy+zVORys2YuRbqnrea148+oLK2FbW/wyQEIKtp7FHu8mXiQIwz0589+5YWCGzkcTJBfIonifOiGTUShAzBxVnRlViTl5tp root@b0cbafdc-f228-11ea-bd49-066a8cf01e04\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDovpVLIwCN3bW25rPUpMIQcAi+OSGjSmWn0v1oU7P1h15I4KWJxTNhcJg4wJwdjfYhJ+1B8CtlSiZGQgWb6rldxR08lyXKdpp9vcs7ZZS6+dpo68/U222ezDn5yRgGiaq7pwSirziHOHYkF4RgyPgOULHtBh+kg2eFHWDlvVT99VN5NDFbmTSiXGP3CDpFFkF5Sd1INvbL0mTxB3QVnPCR7W2G753Ex8GomL11+wF9vn9n1uiGMqulRXSXjx1xRw3dsG/5wmaOed56sr0vCJt2V3ih7xWJ0+AcQO40hh7Ie9tGWY9qbdnQ0UzmUQvt77MYXyyQVPSuZXpPOe2EnN4V root@80b07364-f3d6-11ea-a379-bea988342348\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDglZ1UQpkbmAnS6SSarDwJTEfQ0cYiTWuPoyj09CASstVWAFMwsQp4tYu69EBwqITqAI6IM4KHn5pdXoHPgzpPGkTjWDwwOUfeivixd/NU4+lbN33fuB1N2LrghaBRbiugxkeV6R33Ps+eovfrLplRHs8vIlxxRieV4MSORVuLDT477IGReZP3hHzixZ7yH2IWens0GVC6UJX+FDuAlPtw2rDC9PD/eGmACDhjXxtSlMMF4Btm/Kz30JtQjR1KXE83C3luJQWUSIBGwPfqwKOfM97YERSYal28JKL4c3lwfycVnAXD5L26ePIIWWZFxEIqpZmYrCaL0gxhChu/SlzB root@c5eb8f04-07b9-11eb-bde8-b2e010cd58b2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIGL634It8sxwg6OSOEXLfObyFabk60sDJb7TFhDdTbf/JFuESZgKHmsft8np1lTLnpbUP6Z+lSfS3NVXwf3MhYRlcX+Q4Avf6L7/VUVI/JGuLsqVrJzJwrTJQpDs9C6URZnydK4YN4N6gfVh5QT8nD5WyYRbp7cqQaYf8ws584mEozR9CnZ9vC6XEapDfTclD/pDTsiWUc9GK5no+Q/7KGXA+KrlNXbU0sTCd37PGtMasqd44m8Fh8ItbKV3QFWVlgsPxOnl7WbhSUo9cJ8OOkXXKVR2ljufQxfF0TE5MOfiC1T+lVc+kWuoKC83hxJMcLkXl0CjHHv9GRNzsObet root@0f3bb743-07d3-11eb-bde8-b2e010cd58b2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDN8K0eqK0SHxtXnMQXtj8+U8XTuVwjIiCtYdR/NtqvmL7ZgJmPeh1ibxndfh3/U67kqOgSJUpki9r7nldKXSaYpM7TR2y8UN793NPj2VPHOV29lphfYRtH9dLrAWmIR7abscXelqT9BWWnboaOdl33L+NbshMwE4uKqIxxZOT5MQkPYkXmmxX3nR9CxvXluHAoqcMHWgX93Z3yPWsc9G+1pHlngZrnSXqAaRop2gAn+jzGQziEMh3KZTb3dzhQJ6FQ7Cx0BviOyZLKIKBFqinIBYRmPkb3YXbxIaacWxLyWvuf3Gd1xSSdYd1EBtPsLn6BBZa0/lLj/HX4S9YmgSfn root@e9e8277d-0b47-11eb-82af-de22b9665164\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/hL2TRVRzYYcb6tY80F2qvQif/b90QsoEgBENarDLdlzTTD71nAk26REnDmFsCzW/v4jOYnTdmF8dNQfy4cXoi/Mw7F+W/ie3iGTp233Si8pnUAfBfsPn6DVNsqL30N3KFDY1r+oQi9G7rXCo2woijIkEOoxPi6qsd6w9ltYaUxxekLClrfsdLcPtrTGi1FBwIGlI+hyMFYm/yo1d6U8BzCF3zmbsQqfZMDKclEimOpJ+/NTRpRl14b8H/FPmCvSREfqbdxlv2FAlSxFWopyf+tZIybo12Mp9MEiNW3fYdrqhVL69Lys++b075VMd7pp5OTxGwW1pH4E8z7bFCV6r root@db02a86d-1aaf-11eb-8779-4e6ceb30be03\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJDmXyLURuWQgfVlpYwCUDF5pBfw/V/1Ery3DMH4Sp/c/uhvK+s0i+mAsoql9uXo3AqcuzmuFOVtVoNY4QipA/S4Uk6sIGa1JEVqQudJYnC8IonraZKXd8qZJmEVB5r9hTgunTikM9Qa+a8YAStEqdiq6v6fExxrfzcaptk/YVyL6YlbkhLC2KtEIXpZFfOhvpFUKVyIP/vNCw56ak321maLO9LjpFAxCwoEEdx5bEw5iDQs46EJpqI4t/Bgtm274pYGEMvQQJ1gD3MUlBcLoxYK3NzH4yRhtvpfcMIgJc8W/Gp4xf9WcOThEZu0ggKuGRT8tz1Ff08hikz4htvVNj root@42b964e5-2721-11eb-bb1f-6e397dbce9be\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJ4OSUTkyLQrVzDRn707LXpwpH87gL/yVw1v9l6h246d82fMSgok6mtBA7q9Lm7n3G2UDVewBxhm6BDnisphBFtcsY/wmrtjvI5yy4wclwu5c0xplsSKkW/GGO2yOasChVmiSqZobyCtXBPMqema1yS1lFlbyA7xZ2fknyB83Dt9heSWmURfCsrxPBP9JfOiYERSr25gLXhDQsBB3AqNT1Ozl3302I6vMt/0jnNBXWo2z4sZo10RmJPfXQL7jtYOLLrT/GDvYV6gJMCRNyEY0HrNVVBWHpmh1hfaUXbVigVcA9q62FCLlqwRF4QN52vcc19+kMVMefIWC8mN6+YvqF root@cbb4a86b-39cb-11eb-be51-2af5b2470e9b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2Hz2mxvxwdpGfQg1EvuZ5NNi3otgZum18HyM5wyqcMERs8pADPOeZrTDOBwBMq8aTe2CedZmwKFJItmUF5NrvZO3DMYG8ZE+b9pnYI9X0j3L1V2BRc/weBPVz6QOYcVcadFamHzYZ0WiM+Mjy4JBi2EJD5Nxp0eBhiYLmCbg7ySnpN2v2pp9usod65iuCfA1EQw3JPTcaANpyPeWSU9O50lEvrXK/8D5FOQqf0FVVqsEYrVqojQfZZI6sZDWkaaiSZCKBOwdrhnvS7genc74Zx1/S965iluD5YhOdZl4j/6RWg5EmLSCjpC2JQgSX36I6SVQiqd08iZec3YX95Pz/ root@5d9e001e-4dd8-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDiDtB6MDhUgjkydYbKzotZCDLEZ2ArHkxM4sYVQTygPNqO3luOtk0unKeXeBMhi+FUtBznm88QjpXsPYBUucKtU0lOzg2dTHaePa5jdhkHt8dFJehwYzmJHNTMAqi4wDyE9FqN7vUcuHhe3pNt0Qdr86n0FL5ORJv/YzsvoIjnDooWK04yqIwMoCFDITvJK7RG3Ow7Xw6svfbD9KEPQCVdDL2/ulqpeU9rDnCZLAAZVAVs87Fc9g2bpkII8D8aauhXTv8euapWmL6EnP0cE6h+wMbynb6W1/e0EAkHw/o3rdDfoSbZMLpEP5e4ql3ZtgILHG9AkeMod+Rg/mR44Xkj root@0f3c8847-5197-11eb-86b7-56818f023517" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T18:39:47.609-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "252404881892-compute@developer.gserviceaccount.com", + "id": "3293056925298509964", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-074", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-074", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-074/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-074/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-074/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-075/description.json b/audit/projects/k8s-infra-e2e-boskos-075/description.json new file mode 100644 index 00000000000..075be17a410 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-075/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T01:41:16.838Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-075", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-075", + "projectNumber": "976069798193" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-075/iam.json b/audit/projects/k8s-infra-e2e-boskos-075/iam.json new file mode 100644 index 00000000000..9c4953130e7 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-075/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-976069798193@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:976069798193-compute@developer.gserviceaccount.com", + "serviceAccount:976069798193@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-075/service-accounts/976069798193-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-075/service-accounts/976069798193-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..3dced99637b --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-075/service-accounts/976069798193-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "976069798193-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-075/serviceAccounts/976069798193-compute@developer.gserviceaccount.com", + "oauth2ClientId": "116697886974564437578", + "projectId": "k8s-infra-e2e-boskos-075", + "uniqueId": "116697886974564437578" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-075/service-accounts/976069798193-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-075/service-accounts/976069798193-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-075/service-accounts/976069798193-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-075/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-075/services/compute/project-info.json new file mode 100644 index 00000000000..bb696f64011 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-075/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDH/Twl9pk8jlT6B5CwyNgaAy8FlzW9GkRGYGROkG3OqvLM4ZCLbSXtAfp4Ui5k7BR+bxmaMwjacEyDZ7rDJx6OC4SB9ALz12OT6+i3hCduQgeOQZ5oIw2hkBYIj2VeSDiAxq6aoSonXHP8OOlv42silfYqDunxQ/ZxU4s18mgEQGTr9qWU4Fd7DLON3ghxzZYq0WDh/dQ+b4NkhUdrMutYTbgfukJfmMpXvI/QFGfsrL4V41SmlaHVScEiFktyAx89lehS+6vrPo2dWjh8rIEEgSFYOAUZThv0xumzPNWKkoVWNJSJZ4W2H7u3yyjt6IjyFFFPbqoNCAathQIQ8p8V root@d00ff35f-e4ec-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDY66y45WQlRuwIitup1V6I9fzqIGAWyzvewyS+uC3Zp2jZM7GxgU8o5OL6hi56cq3WltuKfgv86W4R2iXzNlF+xZTZ3P/+18VS1tqhHMJ0oo5mjaCIm0bZG74myyNeJOTby+nLPaJcxIPFpnvEk+pTtLWsn21yF+TaOHFfKP4nBsEtqw6YdNrjxRAjLQUlTLOjfesAWxkrB7cMol+W/+KeyTBN+eSr1QOfUgL5y33iacjUK9pajvGFFv/uB9BsZkUqOpCE7rRZDvBllNAY7aH+buktwH0DuTUIQeoyylMZnZfAdBdGZjvwWHBq+iBr+pglSOTvg/4mA3TICzrcFWBh root@ec8e1740-e7ec-11ea-885a-2259550e0d87\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDNcYNITugB7gJAJRWu2SVGIVqvXTCNi0lgwl0S/BNa+JEsez5Qe7/iOl3v855vnRoOIwcXS9lakEgs39HPo1KrIUJM8ibS6DEqLvE1RtUleVCNQ4eVbAbeu3ca3ga04KW5SGtOOHlVqalWgcvJZfs7GwrVLy5O9mcXw2OhJQLk0vcGiWWLlaZzLYXmtt94hBCv8MErwyHNdQuVLjYsLZMDzQgkTF7ujewHvsutQlV+ADFfXVK9MigS19NHwr9k+eMdOIIFOqXRyJfT5Yv6H6jz0LmA2MqXkwA7by92aAFbDg3vtq8/tTsBTFtJ2FzJ3tyXFTYequuHCArFoJ31jGYr root@f0b293f1-fda6-11ea-bf6c-a2eeca28ab84\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDUZRpHpjDnZcrsCxHZGWKxX7sM73Fnyh9iAgTdi0mE+N7hKWu/rcjgd3KSCXLZCRs3BSjCP9Nq04Iupra5l41QdmqlijeOCLEl5c2HbSc9KJZvgr1pe6QJQOg9AoCkGcYA/IBawcPh/EeXRmUPu/4C9xab0PG+YbR8thAWlf637Stv683/kDHasO5uUAOFEyMiM9PzsI/Q44atGapAT+7GFWaQgztYAC9O/U34j7TYvju5bAgRiHxQ91jY4t5LvEC1G2KWwuye6s8+tWEinfnTavzyNi8M02gHf/wGd4b2qn5Bave9y9p63GoNQQV11Giah1K2elBzyplAaDLr7Tql root@ac19f1d5-091b-11eb-8b01-e6b73feeeb4e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCyI/H71BDzyW4wCazuiifR7DB653IJsToedC/hn8sn1XlvrwHOxFyT0hE/cBIqxeLG7ttfvrFtfZ4Y2C93ArI09kVP9Q4GKOSMb/a2fp2OERbp7V62YN7ddcMu4tB9oZEoPnroyCS3CKvxYKWMCwl776iyhylOvA1mcS/sCZeWg5EaOulsfrwmXDWrqBkuixoy2yWL/NtwOKD35a/QVLdF6ZudAwrYNWveygDMzlp5Zg+AS1oy8vXQqiX8nu+zaG8RBPO8fI9/8WSneSujvJz0xQFmheprXjfRr2MWgwJ+XK3rx9E6HL1kv31iCDlK0NIMXjg94e0Ts49Iq438e5Yb root@37e08425-1051-11eb-9a43-0aa5164aad51\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDY0bAxoPV6UaXTdB6DrDhL7Meu5A+hxuUBIz9IkCLCI1WwUwdj/KGfMO2cLUApgBKVNZIRUC8KG+u+NkEpJc9Nf2ZQyLKzDoiN63zgzahecxuFtistWDnN/k4gvz7qSjsiARD5t1rwhd/8rfy7X9UXlFTO6BkyDI3C5s01WqAuxAt+OlJucDpAXiNMwylyF1RrE6iqYRxl5zNxLe+StfGicxy1yijKwuarklSV1hVaCCKAM97jDhnTVfAgGNQDcDXbP+fRt8aU5jolgHdwDHeMoCJCjPxSXNQkQ+/2yf7vA4JT+Yb+43fpfEzToTHgz8hE+86lgEAlwqBjw+vRLbe9 root@6dcba7f6-4217-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9rsB9h9mRuhzNeWCl/jcJRYGQBgQQrErUSKh4zCL2wDL4SdKQWGdOU8dbpOYlTnleNrTULXEqDaR2ZCFWX7Oks8ZujxkyjRnECdF0P8kjbAj+qJdHEr16e4fvpbbbxHxtsjcPrCX3rI2kUq8snQdBvok709kI6wlHtacRI8b12b+/6/d/eOc7gdgs7KEUfNh71TP5sTBfJ5z404H5AhXPQvwhg1eC+VGGc9LkJnNCOckRa+jIDV8pybEklD/YaQ1EyeuqcSy1o/UQLUTJx/TM+mKkLvmqDpUF0W/LyMwzbvb6h9xaURWjAoSfORSHs4D2Or1A96LRBK9PpO7exMt/ root@46796079-4476-11eb-acd8-6a2a49dd8a76" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T18:41:28.121-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "976069798193-compute@developer.gserviceaccount.com", + "id": "9129846738156177448", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-075", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-075", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-075/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-075/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-075/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-076/description.json b/audit/projects/k8s-infra-e2e-boskos-076/description.json new file mode 100644 index 00000000000..d4e22ae121b --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-076/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T01:43:37.685Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-076", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-076", + "projectNumber": "850357009671" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-076/iam.json b/audit/projects/k8s-infra-e2e-boskos-076/iam.json new file mode 100644 index 00000000000..929f27cad8d --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-076/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-850357009671@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:850357009671-compute@developer.gserviceaccount.com", + "serviceAccount:850357009671@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-076/service-accounts/850357009671-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-076/service-accounts/850357009671-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..9e22d460d6d --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-076/service-accounts/850357009671-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "850357009671-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-076/serviceAccounts/850357009671-compute@developer.gserviceaccount.com", + "oauth2ClientId": "108207378470934056408", + "projectId": "k8s-infra-e2e-boskos-076", + "uniqueId": "108207378470934056408" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-076/service-accounts/850357009671-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-076/service-accounts/850357009671-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-076/service-accounts/850357009671-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-076/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-076/services/compute/project-info.json new file mode 100644 index 00000000000..17ced36202f --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-076/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCpN6I/FCOpY87fSnSBxPykRmHC6fEuNPd7Smhr9k7DMne9VDVDpaQg1dbAhssTcOgWYfBaJihoVVPK/9bKXXVxjsvfR3mIZlCbIbFYjdQxAplhKJhaeplbwG84N/jujoE8L9GeSE6hPex5RGuyDqCL34/X3qMcx4PDYt0o0yeRHUDlIABo4bKlLoHbo7wo4u7dr3Cyur41Gf6DRaF5NgXiIJ/jWbW4C6hv/2jXLu1whAt3X2Rt9GBVJauU6483ckncd4pU7pvWmYDrvLxfSt9JwnWz4dU1GSUIg2DHoC4gPSJs9JWUbW5SeNgnw0oUoMiNSzYf7wjFFDMnTiqUDj6R root@ca12ed1a-de35-11ea-8a0c-be937dd98cfb\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDNIhvx5emzYl732yv95T5WPgDhO8r1gO8FxvXyYlBiiWXW42T1KWfytNQR2eAj//P6BcMDC4IhNDj2KEgGd0i3eLbpfOsNaJHZiDmjNHEzgcMwcnykoFVR9GOlXIduKPahE3C1R6dYNisvelnuFWskJJ130vDGnXvwU97VZAUtrZ8xaMjULQJcu4tAtnO4SiH+Mc/Tja+vG0tpECHC0EOptQY3sn87YrrZHUiKUW5g9cbwTAz7HvxaxhSy2fxnLYi/6OCWT9IjpeAl25DOi5RaCepmt7OO4THy7INcOV4QSkHDtR3jBp09m607VGKxNWIP4/hxCbQFCdY6gatXu3Vh root@a367f234-e7d3-11ea-885a-2259550e0d87\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDO58YK3i9ZV6aZLb7m4M/Uyw17dF/+ijBHJEOfnI89I6FTcYHIAE1Qb3V3fsfdPCQoeZiMspmTtUKpRMyWU4SK7b1iuyjEcviT4OWwBXet92X3yC6Wsl0c09oI1AUOXyIZBYJ8n6JCudxje2jDyZo3OgW1w+mQuThAmMxgbSRqRqDh0PQiz89rruXFsvPnpcAPgW9dUypLqECXeQwhtIGU7P18fuUFUyNgSQvxNe6e/0CmvwDQgq32+4Ry/bBu40CK0b82+he2yVocdus5f/xjsYUCbLcpIwVlEDNKN86aRFsocYIhbsutbucJF1/9FUGdAMSxGbk4Ac2HjiUH0PVL root@e5d851ec-189c-11eb-ac0b-9a760af27878\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKTa9Qjxauk8mqiGq4XpR7inRDBzCWrWbfcoq8gBB0H9fIcZoMzKTGUmCgTvJbo5/ay48pUqZ3w4zdxvCYZF1uVLngC1HtV7WTPOIfjk9/9Xh5zfDyPC4InlzRyEZq4d/hbq1Os+4g6Gct628sZlpUZNKFMyVfRBuZUoYmk0bOldbDuRQfQwsyFS88yrVD0yFLEsR2yrXSRaTznYDOIpkLRGuHL/JO/Ozw4dIWkAsahB/hv61/1HNm8onhC0RXWlIkkddah0MtoenQt+pdXivyQycFXYr0O5uabz6qeTMUiDlD9SjxbqeTMmXC7xYL1gKTEHIaYpaCVc53eAWaHAHF root@0f45e56c-2b93-11eb-a59c-42dfb897bae6\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDFj+1k87Avz8bJWtR+ZssQCExX/uFG+bq7B+LRWK+5WPsRbOXioKYLkAQvkd4mQf6LJPs4x4ZZjo2WGI5V4z4O8IprHOGjZVU6KqF6Eoxwk6s9jafLUazmVR/eSPN2h5NnV28WYXaR6Jy4YD3L4di1VXazJQqOyiBWFYTt+SlCtAmiMs4UNBIf6DszLvmkvl1AE48+mnJY4w092qvvYB2qXoViKofD5lAVh4NfFqTsKycYV+MlVTkqqvRQpw5XSndQjVu3ntHRC9KtYS0DeKGd4H7D1wLdh+XblERcPtDy42vF+tGDl4mqEmuokTpSEv5ZNp5PTJyLAJYcudF6Mvbt root@b102d9a2-3c8f-11eb-a772-a610f2f25584\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDvblXwlR1Jw938T+eE19pCFwjEj6puRXlK+U5hPioyztqsb38WpPpOfolV1qi1VEC2xtzXdascN//PN8Oj4obbrErjFTJcrRtM7WeHN7JNOCXLA8KTF2QKPbRdJzQkX0k3pJD3XQDy4eTJQqXtNW1QW6N3/7ziLUycIQj86uT1fsLddp5hRoRkAwfowSCfHsjQAsZ2z7sRVTHYghW/AFX+MKR13A2TtPeXLRhJfM/pQ43tf8DWRi0GzKtqANoday3QcGzV6CSAp4Y6TLTf5+91TgecYJsJuRIkZpjA9iA8N94MQ2WvQvn/xJuSOij9UHgdtbbMXDuKGkWlrGBu15ah root@ece2b083-55be-11eb-b690-769430c9414e" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T18:43:48.502-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "850357009671-compute@developer.gserviceaccount.com", + "id": "7755337107560647099", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-076", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-076", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-076/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-076/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-076/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-077/description.json b/audit/projects/k8s-infra-e2e-boskos-077/description.json new file mode 100644 index 00000000000..3f9b9463a0b --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-077/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T01:45:33.824Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-077", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-077", + "projectNumber": "230903094856" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-077/iam.json b/audit/projects/k8s-infra-e2e-boskos-077/iam.json new file mode 100644 index 00000000000..0f286455b5d --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-077/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-230903094856@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:230903094856-compute@developer.gserviceaccount.com", + "serviceAccount:230903094856@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-077/service-accounts/230903094856-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-077/service-accounts/230903094856-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..4c98d035679 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-077/service-accounts/230903094856-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "230903094856-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-077/serviceAccounts/230903094856-compute@developer.gserviceaccount.com", + "oauth2ClientId": "108471393967689750594", + "projectId": "k8s-infra-e2e-boskos-077", + "uniqueId": "108471393967689750594" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-077/service-accounts/230903094856-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-077/service-accounts/230903094856-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-077/service-accounts/230903094856-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-077/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-077/services/compute/project-info.json new file mode 100644 index 00000000000..cdb91737783 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-077/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCuFyGDPgICpGumzpE+O38SFzA1LXZBQkWzdBIxl0mkm4An69312pw1eOQ6izrjADHW5wyaP65jDr2Bx2Pz0KzOzrEEi0M2FrjfQCnoE8SanjrqW5JSKPpsFZTlpnNZ30CNXcNLjIzAeOCzze/VDzwTVeE/x270eFLRqQIYsyUcgJRmH4ytQAqvvJ4OxmAJ4agpmjIC4Uqn1jC7EVPJTwDHKhqR4EB5PviLLW1EOujBhfrYoTwfqV2T1TWmZ1909mUKm65Hrl0m+3Web4RdGc4wV8W37IWz8I2aaCjXlTnOY6S8NMuKk++jV5JV/ev4jbiINZjjGJUWBnyqBEh3Jpj5 root@a600f977-da19-11ea-8c1c-d23af84fd26f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/Zy5sDZfJlGzmMlZewGQM1t7w2luqKCFkFv5+foUpFJeAIH2V56PSOJ6+76g/nGWjOJUIDGlf/Et1PHWlnOB3gUCNAoaZG9+8k+1bY2GmN1MlCfc7Qhe3xwPR2bfXEmGvqM3pmqU0mQPdYOmkaHSuhQSWUS/yvD4yz5laC7OiadwoZaoEHLKLJRRe5yChAwQ7HVhPTGDBGKichlStHFhyhyvNTKIhIdgVCvQTIJeHUHw2biEGHgB2WxPUQHSag/yIRLnZzSX8QuAos6aVgmJh1L+Ue7T22kSjE2uY4GicIuaKyUNgozjqvrwtoM1jS9Ri7+7/e0SIfvyGuYsUsghB root@822268e0-dbc7-11ea-82f4-1a238816176b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCyZQcObinl7SiPgSvUHvOb0O+KYS4xJNreHpvSa2ftwo/j5VMRPHV1zeoWQOZNKsT8YZxO41Jo9rmOeoraPMJdUij5KJgYIa+gpAWrIoCVbNkyAiV8ybdL1vVCk6d9lArtsc8XfVDxKWRu6OkwcRRGqNobXIUgfyoaTZhWoZx69EkTs9HRsEyh0/coPcK3qPA2kU8fd1lfgkTKdTSmxWCOPp2znZqUMdZ31omfYKdIcrBbRV1KiE8eCe4T7yQQ9eFTJcS7plV/EShhPc4zIUPdaavtLifTsPcO0CxY/ygWY0H1YvmVmUrFZWfhvhJexBTdHzrzh67dREt8dSdv0ril root@0a1a3d9e-e200-11ea-9eb6-86c455181e58\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC8TBn1dxWIR+OHGnvrg8fjSEy3VavWzW64OyIbR5l8st+3ZVACkKBmlSV/5DZ0QX07whNUa6r8CfpW8Dfp8ctwV71kv63fefD0aV5srG7PqF2UetiXRoW7bbOvVnlIGLvKNxxyFU/7GsPZqxol/ZH3AJkTXAVLPcpmG0LFnvxsx0CAkImlI3EKVgeCtWqcYRffR8BudnHgpMhHYrzDWDTk69hiRhr596sRAuvqCxB++YaIE2FdNonRajkCogmBCN6KJBvUap1Vg0fZMsayMfyA5JdHY8ZUqqkXiwRjquQR12THwzW1A6DezjADcyYeVP5enlufvrmd81qDhwdDdKRN root@614a7243-e5d0-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDRRfnGLHLTFNB9CXnhOTRhC3sG+5MmjdHQeJ0p/898XLRiCe+UdsdkYek6SK3YB7gbdm5GYhOuFyXsxx+y8tT6Vz2uyG0SHShaSunsIAmYuACBBnp/paXyvafwOluDKDOhdZtJaXAqqWsAWAkYGs9ZVYgv9Np2t2SXAygVlqFCZw4JgD8H5Zea0vxNfOb6tqX5ROosZytwWiaHO8dmEJim/Nx9cW58O9hYUJ3K7BSVDC5Yci/+2IjaGAM2AzZVTj6G55Q7QatBWI85uzhZiGHo3EAACtlshyhwESvcQVOuG6wONJGcxh1hgK0SSPQ6qJNxmIZ5gMt/y94Ipc4STiGl root@9a23af3f-e74b-11ea-8112-a64f894a1815\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9G7yVZVt4mz+UiGubCdrtnGTahaUDPTK0pqsNmPlgMBlTDx0wkkYUPwcvupAH/cx7DQGy1Rr2avi7CR/GnkPXxcOE91Oi6/VRdd+6IBsIb0h6jbq2wYd02LMwGhdRR2Sx5gOp/qrQIYwJmJb8OhdoN+N0/XWGHv8e/bjoitoL6hGDmnl3c5tdpyvcGT9SG9Z13W9QLg9MWcr+9CjIPrNlcCUyWkBM8j4IeOqqsQMbJHXQARErExpBr7UXhwpCLPPdNNDMXeq9m9LJyyuU+g2jbrXmBKTuF9Ia+VayORwJ9uKQSSTLRfcDm//3Z9VGAH1mGdrS1ipHn7ID2NchNjhT root@f7765268-e9b3-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCcLkEOhi5hncO2ZdVTsokAnWByT1KMOp1t2ZBrBkBQMpkhB5YRO1Y5emWcQOClV6GfVY14X7G9cISXBe0jEbMjl/ZqT+zSgXomNLmuomRDe01j6mJauTZ+iDRVPUJ7xs02/NPCfnaiI6sAj/3w5w/GSTa3hit5Ti8KqcsGHRw5W8oXlgFRqEkKmZfaSkJxOMDobvqIj3Efe/OD4byVK26nlLnBO9BbAAynUHJroTz71WfoRD7ljlEEHAOE7oXz5UNZ/fmuVXjLS7Nx1RpaUqcSTopE8u5gXI6vmH2khWGtnUHx6rSD9OoKvGu+ITUjX+kz1O1kCjKyDiYx/O3MTh2R root@1a91bce2-eaca-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCyKdH9NI4/4FjAa736g9MxGPCE8ikYZrh1X3igQdO+5N4RsC4T6zDuqCK3DpuAhdrj3Tcu2GYWo9gdmMtPzBamAOK/sppw6L7WWRAuy+j/iJOjXxZZ7KlTDXjT7f4fbfHxrnSbP5M4bnwyshqo5h2j5pFQRXWKWkHZIxscA+hWwuQ81qgGuDFw9z0r5D+/+g3z92TQDuS1zqmY9zVya6F2d9fJ+vsJVbKxtvNG051gUocN/57dP3cYFAaIBe5zdBCGPebv/ERDu4p3XeL4tXz1yKBSV8TeAY3j4nPZzAs8xLlCx6QXsHNf2LODKweibMmbKt6TRDkJKXuecwTbT997 root@6f98df01-ede9-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/8ReEyx/Acy0iVBfDx87VMzCwicoBInYabCkrDUP/POLmGzN2aXi1HPEGo8RdCmfPJh8h1tC/apWYexyIdc308tMaJcU/SDjWYRRefo1Vqa+L1IKEoGLLyvz7WMwrSxmPmqYghdPyzDmVH/gNrD6E+/XhXN6MkB8YS/hXWN4KseWGIPQ9m7/JSRJ1exF6ilh3inqlbIx7VcM9QD3ccbzquMJjoevHeMqs/jOBGKVtqhW6Dq8iAe2WTqkQKTCUPZ0oXceixoy3NrgnjKQDegjmOBlOg5Gqneq1LCoVKnjbwcUQ+oqroW5pcK8MDzd1Yu1ghX2yEwt3l5JGfCv3R7wh root@b9ef77f3-f526-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSSKCMPi+5gJRq8ik4Mr4u42jit2PPUxAJl7ZJ68wNXj990KPQwGEYoH2H2U3YEHAIU8nM3lbps7YN8TMbK6YoK7/pN8HiGCQ26vpwrMZuFx9eVA1rtjxiHhtaTQngvsMevEEcsOrkygfnyxOSzpgdZycLnR6yReU3uzVJwz5NCs1w0tdDYmCE2mY44Ldx2dDLhbzPn0/yMmsbpzmjDicTCp4+/9CviDMR1jI29VRmcQV+ux74/pJEEepylLYdmjTYBthV0zzRjOq8vPVMfVGZaI2umTL6wleWGwv1SNwUIW2OJAXzFVEYvA2WqSM2vMm7qt5zZQaeTUdH/5p1woXJ root@f1bddb75-0231-11eb-8b6a-ce996ee2646d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDgtedcLRzIeRylUcq86i1y+b+p3wBwPYh+qL3HaZLDBKqgjCyve5DmejApCN7LaGOUjIh8vTTeVHzM3HsYNFcuYcCaXex6ndEEOfF/s4yOc2AuNHSXzZaHUwINlKqVBCRBLBpr1XtvYvYFtuavJhloY0c9ePym7GRp5NcFVss0HpktQSPtgwQugFS6h6+WR7YMY9idyfd/XQuGGQqQoMry4rFcTFma9U5BhI6X3/Nymp2DT287HRxfxyqdKZs01TXD3A46lvz/vDyanEDtN8y8LYEL+QNCzzYEXIwjGL24ElXIOrAvaC9Zkxt/DN0woR1EcnBPfF9zOuNJQ7YsmRkD root@3bb61cf0-0412-11eb-a932-82154e1dffc3\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC4Iqgo1N7d4VinXMdxxjDMcBn4xWvST6FS3LfWkgjabtOXnt/owzPcLuqzwsIMC8UDqGOXXR1Dhym7qBGr1TyK529fkcCAApZXcOk0BA2l5pjyk7/o9PmBPDh2Zi/objj87nImnMGMNx1xcHwKbNdxz1bOyreM7XxGbQcPAfFgPVVwhF5/AK469Oe5XyrKRelxdYHxkj9B8LeNyQgnq41z6mON+CO3y1aQKv1HpAODRKziXkhgPldXNT6+xoFeGWW7XMy7U6dDv6UP0eQlHRy8JYYzDTRyZWGdYJxHB3cSfyiZlVLCAkK2i3Nq07xwghhVBW9ZUMPPlC/4HdPYuN/x root@84d02b77-06ef-11eb-9dc4-ba187aea6a9a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCjNN43cJtDZkn/hdaTojbmrcJabAnwwaMjsXdNJYPw8YnIiONsWVYkMRiJi6nkm5iZH3oieoXQ+oLKiZ3XPOS4Mk0AL6sPEGsWn+oXicSlH1oB/ylDCkDTNAPkkQcLKEFggL0LBR6z/LXqv51N5lxQDOgj06XTIHmt1uyUe0+Vtj9Y5X2nrz1XZRmXHJq0+i14ofCVj+7QHYBRNJJdoLfGLadOtSa7/J2djRukzBIeHcJKWgSlkOK7p++nbSok8hS1CLkfJtPpFrGdcSgdMC2bi6pDni3L7iC6ZHlde7C9eTD3Ys1RcG3ocGAB+URjJk9Hsq4kn0Xm15B+/dCykGo1 root@be30e945-1cc2-11eb-99f1-c6d701d1e283\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQW5meO3RnxcPb2/eo/XDrMihxwSfg3B3u0YJK5WeoakEBW0evwt0ixqrtXL5zISIJAD6SU08Hs1TrBlwOk0K+gVplYs5ivaYqcudfzXnD3c1RyD4gFBIQmMXqsDMSAIkkr6n4u7uqLCDccnmfndzo9afBlL4hL1ObZ2HJpauqVn+o6sb7TDjQ7rjXbIoaWLx74cnLSWJcqvBqguNvy3Yo/MLOO+p/NvTrIy49F+RNusR0n1o1kdezT6Pstqc1OODN46YPn5Dfv9wlYaIHlS12vVI5m7fUtS5oYAQJ+3jhKX3AV1ZpE71QlXpr1ZlgSgA+fr6MEIBfAXduHIh17bvP root@8f9b4436-2f3a-11eb-9b0b-d6a9455c8be7\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCrdKv+QzwNLRtnw8BlBElHL6PvFLX4BT6TOZbQqpLGGYWeeQzdhNVxtgx6BNJRvitk5pvugjqiMfcXX7+p1OQbPkfEXoltm6qb4Yr+ZFnf8LjLMV2FzFKXR6Fc0BjPCGNWhpx6uvjBu4yNcu2p+rUtRzDXoHBiHemgYPyQCIdXOpSM8FSbkPU928gJ7g2MGuUg4awxNBWGuVYf0C2gQEQ6yV2hAnv+x1kf+DRZ5vbcr6P7Dd8e17xVNjSMqkQON3kPtITBXjB7LfUgjOV3XQReVptWdwbCHqUzRO1Z84lSmhbN/IkNdYJilTMGhud52NTLZC9VacCzGyevBfikqldb root@ce9c5f79-3753-11eb-a25d-22a534811c55\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDLTykgTC+MbXb8bdVGLbp2C4TwTzStnJFgvaHvGOh5HK3LLiBK9vJaNbjTpu1+/qCGrT6RXs0fAPC9F94CBe7+M+Igmxq3zNDK63O61ag/mMiBq8jvVNe5IsT6i9MwFGHJgnfFsbDW36F5Afp8gsi1fepDFsyVc+WTjHmzgqPHMlG+DxBXPrtfbH9EUYXIa7QsSPcyaxe/Q92wXuEys5Kz/T145y3mccgtfrjWv8fly5Ke4DIl429wDNwL5nohOF7sK67y/5Z7AWZeqoc87qko/Q7/AsuiN17STBpdBiBoK2U00URz1Qcla+qzxROeZVSiJFhsPTcktCOwtGhR9qLJ root@4387730c-3c11-11eb-a772-a610f2f25584\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDW+hoPGRKPppNDDUte8gANDhAElUDFPBCV1eV2PvCKp+sZDcfWEr7eyr//+2vQJuZ7JxOCEXoeIoiZQ5qrrVfSFMXDdtTpyEbXjSjTA0hCWHgPcrKYTTD0LWbHWTsXA5AmGKyMwcWFEUexEfkwO4vMRdMUd5qKRkH0VFbmdeDdLkhxhwg2BvCZlwgxV8JjgrwJzxY/SE2L1uTbReLYlnRbwcFg6Mq+KH6wdogoRLmk5eCKgMOMFipoDvT8jUDV/J/QVV8XNe+UMRAqXV8bWx/w0qIQsxDMnjX4BHrVBeSp8xAXYEJERGlN69kVeGBqtsNUPfOntw6sLyDAPiRbx8W5 root@42e3ce22-3d73-11eb-a772-a610f2f25584\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDfguWfT9AYJh3BNUEsUa9QMacoTVs7ecv/VqQ1jhYMl3NmG/U2mrowlYRKrft+IyrT7BWc/Dt1Zf8qDXm/n9Y/vDotFYB9B0IZ0M+jf32s/LuoF6IVOUSHQwnhJQfEsYIEmIJFqlfHmL0y2NCz8aoEdvZzLor/zeS/4fn1V+nQCNakXV2V9M3dkINLiZiW8xgbRyI7VcQLJraRMSbQnLumERe01oldkDeLiM6kwnuOOGu4L+580Ntv1LKmjgwZcge6KzyyvBdWRpEXNIqsW79piiVdO7yAYVdZxrlnKd0uphtp/dt10qm1Zy3BF5Uc6FKDDibhPR7dfSHasxCjqiol root@1d09667d-3dbf-11eb-a772-a610f2f25584\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDznl8lFPT2L4DOfZOKpQeeEVB1ZUkmbGJ2x/ud5mpxjNeBebx/zbOBCi5bX9WxYDwyf1jdkp5+xzcHy+8a2FXAG490JEVmbyfPa/sv2eecW+1BiV0ucuECSv1UmIfjBu9OTtl+iDG7qTO7MCWCEm2V9qIqIEk5umhEInEdXHOv7OUm9yNsSk2Yh48KPyL1tLo9WOog8QxemKwbI1fzwUOoRdj5w+iagi+s4kpk/jWTvySX6OxgNs/QJ5IY1N9zPJQcHpiSHsW6nq30m3e1o1tKptzMTdc99BmQ+B7WQ++Poxca915DAGiySAu+/RK3VkYJ1Cc9HoLcORD56nWbtqkD root@d9996bc5-4082-11eb-a051-06e11967f91f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCUDPkDcFIeRpT5tSooJZQL86wQ8JXWnNwjk29p/uYjfgrsfnEK418oA1uwJUkpZwhYsYp6LerIVAI4PoK7FeR9ZXnRSrIzwyjefOLy/yyjbZdNgVCf3gagsXeUR7x4VPPtIWRGZdXX5MVvgKfkgqmH0DY45/RPBZ60MZ6MPhnrj769JKr5ImzoKRWEcy9QgabOmVzA7+QzwbTdt5UweOiNy6v13qVMjhoZ0YKSOA2apNM4yVJINR/dG49Vz/Jyiy2xE4Nv6ZddDNIZ3KcVJymKkXnSb+KzFdIExDSRgk9AKFzNPFRN+bEwDxcRHRACCIkW+nNmtNnyls1LZ2vJqpHh root@f9e1c01a-49e4-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC5bXWSvglald0eBuPfdV6lHWzZzZLbeovTDOdB69vS9dc0FP9/Dh4wZ9rg4Ya4fpPnwwKswNqDyxzTZlmxt5P5xEjQT2u8ByUMnVDyNxRr4dSTG182T+0Ymc25DcuD93VMdJAmJxYl7n1dwZX/ttz2VmtcKfgk5e39o1XP1YBwdbGvouBLViUgogR3FLwTPeLSbKeJVqEQIw06HgSSuGPzrMzfPVRA2efnThTDSxOc/qHTrxZhTKk8YMnWUfu4bBU2qJr0zbiCJ6LdDoBLXbGWtpgjs1c6z28MKtQMpyshbewRYV1YRaBWwaeXOuevxsz8I0nA6HZePsd3JctV91+R root@5d59c1dc-4f3a-11eb-af93-4e5abfa0c065" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T18:45:43.991-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "230903094856-compute@developer.gserviceaccount.com", + "id": "9218766408157940008", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-077", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-077", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-077/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-077/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-077/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-078/description.json b/audit/projects/k8s-infra-e2e-boskos-078/description.json new file mode 100644 index 00000000000..a9d44656a05 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-078/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T01:47:44.521Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-078", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-078", + "projectNumber": "378831334770" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-078/iam.json b/audit/projects/k8s-infra-e2e-boskos-078/iam.json new file mode 100644 index 00000000000..810f5fef9ac --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-078/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-378831334770@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:378831334770-compute@developer.gserviceaccount.com", + "serviceAccount:378831334770@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-078/service-accounts/378831334770-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-078/service-accounts/378831334770-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..a04e2464a06 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-078/service-accounts/378831334770-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "378831334770-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-078/serviceAccounts/378831334770-compute@developer.gserviceaccount.com", + "oauth2ClientId": "114549417254029878879", + "projectId": "k8s-infra-e2e-boskos-078", + "uniqueId": "114549417254029878879" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-078/service-accounts/378831334770-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-078/service-accounts/378831334770-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-078/service-accounts/378831334770-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-078/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-078/services/compute/project-info.json new file mode 100644 index 00000000000..bab5452f3e6 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-078/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDUOBWM6mNJ+oWt6JtzL4Jh1m7th2/ABiC0grkKZ+/zRZGIxx7ltROsGXTafXlqamKDy6qqWfzlUAozwGm3gwor6DeaHbCU4cLdYpxrO9N1hKMrkSf4a56SCWF56KMM+Y8UoPI/h94s7ZYSdn3FeVr/EzV9lkjPWCf4pJ90Ku9xjckpGTZ/uQaxNLhVLkBn4QIKsS1pknW/pLk5rpJy0pphgWdxUZPqLsnuPaSfyDWoe2lwdw32yRhAvrTKMvDZgsDJb4KrqcfSTH00s8jjyBANl66rSRH2HIU+KbeDysDqUP8W7x9fPQJJ4iMEx7vh6+ibOYWzjCu4h7uPZg8adTxL root@659fe6fc-f50f-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2olfkKFGxXrq+zNZCCdhkKTXD6kMaHVzvE0DBgyrEsaroNi0NwcvwpLilse4I1dmvIhv8D0w0Oo+FNWkyTzU0ersMTWPMUUv/xx/pkibMdgo0CZz5lAK3FFkKverEPYLBsxU27ofYnjoDR8SFyPrv2NRl7DnYY5lqhNZtx1+bOFPU0hIanei1EkDd0Y5jtvW6iLvsPomJrB4O8Khyy+6UjIao3w1dlKoutn1qPozZnkKc0MYzr133axtuzk9CroLC8/3KdzQZzS8yyKeuyJHfHfX3cLGbW2h2V1SrSG6N4uc5TEYH1W+EdEVUc1bG7T9GTz/FhNwwLaV3+lvnqRTl root@fe32e4f4-03f8-11eb-9ee9-2af320b50223\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCdV7lKUajpHlcc8LBAjGSr6vzS5n3jWWVJRyrxPoBOY4M9qONEampXPxhy9MoGmUZlMJLuazyPD8PGbs646GFgdwECBpzmLvfLmmGvIzcXWJBkK5538aZWcweBdiDmQh850eBZvROGRGpxyxlrUz7sflphr2T/arLpXpGbYH4wqvs0UgBrD3xoc16548hA+Gd4ylud5bL9NSI7xQlgpcuA6ZeC7l0oJrJpfMbesLVVBn1brw+xYG4GtWC9zYwiueoaIoPWc+BU5GfYjxyB43CtBOVLFTBR9LD871ymK0NvBmswltVUb/uOYfTa71S+WNerh4zICPxZF2kOySafFEed root@f9d5de83-0f86-11eb-9a04-3e74eeea3a1f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC6aUsC2+1frLz5WMgn8RhpVGwzPPDMD2pmTdF2HOMOUnZDifFbc1Mee6ZNWdwmkWUKAtd9MyWsTDkRL7ojgpxoVywruBboa+WOvfd/0LfKqPwDGhEl6rOWosHmKESSRHO5n7QOUGybqc28QRuzmvQW0KHJNrAzXQwc6apYO2lt8U/04f7HuEd+pi/uKBeNTQrCa0oLE5U38gHfhCReR3Hsexmt8wCcD+tv+S1guTPZBFAJ9Tfhh0xFYYQDX/raChQj1TRmLtSknTvOG02KK7XK2Txnc8z+iOchYy++BYHNlPb9DySZymKhRZVTGuxwPI5f8byaxrb94jhzMru/QTWR root@a1850a84-2bc5-11eb-a59c-42dfb897bae6\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDWbbP9tH/4LESY7f+/WCTOo0cZrzwTusDHGJc/9nhuKt0bkv1ox8Ld6JL54FVNBXKwzutl8YEG/CXFbJpzbJImC12T2wMZbYvFkoIJBoRSf6hnl3odpVHK2Gtm2XCb06jSu0rKFAW+1gedPCrlil1fjDG4vVcvTPUnHYKyF4TYTv99orNIMETqCKgCmBXvVnBGk+9Zf/wWtcBLXfzmaePyWZNJElfRFeBJHE1SE8Zt7newnhWAj/2zPdssmmwA6ukgcWkBPuMa2GGEPdNHbfRIRq3cUtlpDXNsBrbdwL8kBFaS0c0GsYWyy2sjGVxJxRdPmP8UIgo39p7Mn8oRn9pf root@442b466a-473a-11eb-acd8-6a2a49dd8a76" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T18:47:55.408-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "378831334770-compute@developer.gserviceaccount.com", + "id": "5238620631566567076", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-078", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-078", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-078/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-078/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-078/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-079/description.json b/audit/projects/k8s-infra-e2e-boskos-079/description.json new file mode 100644 index 00000000000..84475c36841 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-079/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T01:50:08.118Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-079", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-079", + "projectNumber": "148392433129" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-079/iam.json b/audit/projects/k8s-infra-e2e-boskos-079/iam.json new file mode 100644 index 00000000000..aa7fb1cfb60 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-079/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-148392433129@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:148392433129-compute@developer.gserviceaccount.com", + "serviceAccount:148392433129@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-079/service-accounts/148392433129-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-079/service-accounts/148392433129-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..bb61a57d60e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-079/service-accounts/148392433129-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "148392433129-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-079/serviceAccounts/148392433129-compute@developer.gserviceaccount.com", + "oauth2ClientId": "115879773620428081978", + "projectId": "k8s-infra-e2e-boskos-079", + "uniqueId": "115879773620428081978" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-079/service-accounts/148392433129-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-079/service-accounts/148392433129-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-079/service-accounts/148392433129-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-079/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-079/services/compute/project-info.json new file mode 100644 index 00000000000..41c30555a03 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-079/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0QjcKTnGj67Mssdnk4VJ48v9M/gx3UaC/+KlS+uuVyIDjdf9OQ5cTQL75ev0klwAy6BymjYBokGW9tYGDOYt/UkQC8RjMWG92y+3h+EPe8Lh1b7Ue9fuKUNVkaVaT+T9M4iIxlJ0Oq83MMH+fMWSJ/6ckLgebnBeUn53J3v6rW4YPjUKfR8+387iDvHW8riR7HIC0kRiTPKAFDd1EtRNGXX/+7zSFZL1TY/GEYPGLIGdDgpO1HZiXXUHylh53hxgsvXexfI7HhihigOISaGdxK7UCcfNND0ylo5kNhn+QXvO7Wbw7b/Ob+ibOc7nKlKJ4EmSmJDPihWcgfwbWHp9n root@747bbe78-dd06-11ea-9424-2680bd79560c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCrVVJLjU9/Jwf+r5tYXQSARkBFm389UmkV2lSd/LhIQWMFZt4Wq1zPW4uhijRl2yTCWfglNur9LljVDmBHzMMW/+eOUQV3lyRSZumVocV8p6JatjDq0SjDgfzLWxnD2gJZWO1meIJ1atD5SkreAuc5JHBr1QnjCLVAmc+skLDHA3hqcm1+WD/pYeHjssyvVz7E0IVwYcUBhAsHwcJVAXYqzh04//CCiYuWOXthh+1NZWXrs2DmMrZHX6RnLmom9Bk7Vkkls/uCU6xTwoOrPiNeP++PlNKBlUTC5kzituqZ12TCkxFhlcc288aZ7mAwozZ3M+iP32nJ624Z9V33Eivz root@2c48f196-e77e-11ea-8112-a64f894a1815\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCtheRSoaHYiP9uWaxfcUPRQjnGwY6bkXnHIPAmTlUCEjWz/x6foRutCGQi9torTe39kPQyckYA5xYrBq3xMvDU6p+st4XjRqxLT4s5sD8CtCy7vW9In3FYosASy2MjmSrVWM+fhzZ7mWkCuVByeEQq+3mIzBmAInQWVZYxoI5CBzcSMJYNRi9dtncSgVY/l2Diu73th+kv5MZVhsACD71PP0J/e+WJ6tsMeKfokXSgF/Uh7BpcVUKkvgJQVNpQCzV+GapaeUSdfDB2/3eTOCMF/PkNmVTVHMSkJxMeR8a2W4pf6UIPzHiziYHCxn3nVK5RRuhS1ZAPAzaoqMQesTXz root@91d500a6-e7fc-11ea-885a-2259550e0d87\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCvHxXFFqpkyMglLtDDoi4lyKIZoGpcwQz211Gsgy7GkSNujJ2C+T2ZYFaj2aZQUH/5EzpekXqNPsGuv4l4DMAAjhtV4II/8h9pPQlp315xZ8aJ+NF3uX43jn+ulrfEmJJW1hke/2DVPZUULFqOFB/3+rXzJAZvHtPM9PQCAxnJYLYksXMofTi8qMihDgTJ00nzZOoVRlAGiQO1FZRLaHqOmtutLisiGfHkivXudQCA5+ilSQ4unSkWDmE3f7VYzrD4x88lLKy/nPEcrWQ44pgBMJNSRUWrLtRYeBMnTv42/f8V2zp6iashY9q7ZqKUEx4K+Fh42UwkUDOsqwnFcNFp root@2ef02bdd-e9f6-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDDDhokOvn13a6wGcjY/Wi1f4l+EWJI9XrLBXto70YvjRxvtpZIBogMFxkMSG9RFdAI7NHDI7qSSYQ0NzS6fJ+T8B07xhqbqQx59/e32L/WH2TeAd5827AIRCRRWs13ynSaxV6Qo6jkhvo/KJMIpMLYi8KwjwregJkUnxAx6AibUTnRHLGbgWp1Wpmeoe4avauPMo4Z/5YJb+0qi2/1bzDCpcJeKBrF8yyZoOhJ0nGISTT5pl9hiNSZGu3JxCDwQi251nst73ikvot6ZFFwrW+Kie0X7JP+yeXfVGLZ7V/6BRLcTCaRcI/x4T+QejEqAGAq6zY60TzJdJVKb0eiYUHF root@76f3c4f2-eac0-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmCt9CzvYtQN1EKoNVkkQTEFr7k1fLNFOHDWD0jNeXbtrN7hVj4hBY0c6cLVp7Ofmsj/ckR6wsnTjlOJqN3weiBkI3LuyIEOVAEKt1+7BTQNKIo4GHP/mAvF6BKcTQjJ8ro/QTEDbImwFIs1bedWeIZk9jotB44R4Qev89mYhyF0zvbINvdEus6/68oIpHDs62j5kjv2NYNPFUcST2GJU/jC7GE1YS1MPQNLwOPM8T3dd89JN9QktUHemz87Oz/o8mo3+ysTd+V1pUHIqslVvZoJ/HpF0Y5r2+JeQXE8Fzqbimsz+HeuKz7auvXY66HuPK6QnkMFCCMSRtpgzDp/0D root@2fd5bd01-f27e-11ea-bd49-066a8cf01e04\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+Uhcs/Smhtj4O7SsUKTE6Wz144f0uk5nhadml9MwCdtL1dALq2IKKmQFdEli7MdzIvgnnIpx0gkJxsNNM9OXtSmREeoPwKFcG0NATK1r1anHAObtiWBPluz0744JXSYRMorbsXp6h0UQx1AZdw2fukucWmjjn9reCzST3AFyvxhGTN1hslkmNpmyVedL4eNXZG+ytZuYDJr/KNfeGOKVedp/cMdjwDuYNzCoTQAC9iEoRHOGJE2ECB9q8BOEFdxvHy2C295nG5ax3Xd9ezNd66wOal7raLMN26PV/B83YAa4bCn2sTYRY3oMlfB4xuSEIbpsaeZ6130uQnAOJQZHn root@92089a39-f325-11ea-84bd-b6fb6d83c68d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBXtyKszCvHvJiXDRQt0YVJUjGfJFS6rciDRg517HiqvlI+rlTWV5/MuX3fQEkdpCmTOK0lACrFsTCOcKvQGA6zwdqgtBTMXsfoFx0EyTltMEFpxPm03wTINxq2hGs2fOzMPOqNri/35StI1CwCDNV/izp4qcxSX0ervf+OFeHRG6szGsVhUZE8xPkX3XQsdQv/xNTb8JelJTZIAK8Udm+O721KnSxhphhm/NhMSRYnaQqTV9u6IIegzvrHyImdJjqQJlEAIFv+JgYqaBbDUILDyjpTraqAXPLnrVxqg0oD/D5OulThVsNCRvhZf7Pc03GEymtAASA1oyGHULMQpnL root@b545e1d6-f902-11ea-926e-7e7ea190b727\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCJZ7O1f9bp9NNdFFGJGOUjyo/JGaFAWFIYQ9XCWRJYCU+TFCbHHrZtfFGRQ1O5GMkE0QU89DM3vtRc50UeC/nCRxTYAXv1MYmPVU5VsLnJysDLLs+vrlC8rbh3E1mmHT2DaiK7JZsGA16S/hPvIwvOo3sEbcAcXVwXWHiOtm4mi/yUXywbnl0hdrpLSjWxVy2mMWthYNjK2bPCX613yJ9qZQWMj1oJpZtJuu4A7G6uFexgHvnxlIX8HtVfADZYK7s86wd+ASCYYOwURAAmT3UlUnIDgcJZnlFqqeJrWfYpVGj+yG0nQdeQ9qt+e16yp6ueJQQeQvkhJlrwm5g7FEh root@63ebaf18-02b0-11eb-aa74-ba383c228abc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqTCFVbBaCQuc2IT3Nm/Qy6dL5451eal8+Ue0I3Z6UPC7KQSh3aPt/dS7HPeb4Ymp+dV880LX3vVBiAaOgkmppls2JOemnAeQYMaV/1UOI3J/7juqFbtUrcvY2eeaRD4TIupAmBXrIFisJJ8zUDZ13ZLTohGiAwX57rQ0wLTei9CBH5qiBOj8IU+/JreAE6nXvihAUN6x0/5eTobbPnj4HaN5Plc0FbJZCCga3EaQeqZjj1HFnyxd+K22dgqffYq1Mh4us2XIZ/679IvB8KwpJ/fhh6svihZD9B7la1tgwjiPetpVWAXUxVLok5KDm/IOcXyNWcddta7NbrYkQyA2F root@f39bc3b3-060b-11eb-9dc4-ba187aea6a9a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0TfMv0irST4wiG/szwy5524JW2JtPasApRo8w/uOf95rkMhXGxM3nYw2irR1JXpcikDIp7vICNgnYI453IaoCYyvnR9v/BW3SLGGO13RieI24kwHAR1yHdElumTOv511nK5OPqh0oty1gZObSyrPolqs5apuNxNXrIvh3vVZYXS+Q6aiWeEIa3QeVn27DaOBkR0qnq9x7OuYsg6+a+U8KiLsXzX8H09z2iPfeOFvAGMvS/1GeRnjz7fYFLxsSVx/JBnxcheg67QfMSbrfQow5DMleG4X0pFOHKqbI5LH03QZtscYu4PH1SPdHT3t0sEQmjAoFhLu6pJQLvCc5Engr root@ae72fa16-209c-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDUN+qEIlKb0aCOUjEfPD/fe9f04CdSR3HVnfWoUPqE0gzY9rA/L4GJhQpDEjuiWQv3Bqw4MFq+MhHMOsocE55ypySJbPwNBtT+jtW6+GOUFHdAIAiE4ufBKku5LGeICZdO9meZJ7aoJXROSAGfaRgF99B3DcVMqi8FDGwZuUvBEbJErSk0ZZQcTtmcGGPlgSlFZuOqxQWHY/L1gVVzLrJF5ZIp4vA9xp+OaDVvNOGO5C8js6ASdQu+zCiYKKtLcre+gnv/25BO31AZuo8NtxVz0XeP/kRfE/lLMhOShFopzJpd5WlzkCPGYJW0W34nIgQmOHz1majgf/3mHApsyX1L root@5c439a94-3199-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDDlluFE/KSK3SF3/lBclSejvvUPUWvBhNfkVpiUyn+QTeo9dpl33a2SqzysNbQfuVSthg9q0lRC/Vk3PNVFcYawXi7H09NHkKGC9Yxty7FsiUK/A5ffqbqgm8m0e0vZR2GWxj0MwKRND3A/RSRuReK7+7KEQvmCqABi7o/KGuIm+nHNCtd0vF42Ll4xzvkUgkbLku18frpS3y5wn8IiO37zutW9FAptsXR+R8wbllHS7Kvx296qV7hH5vIFEyGHJnHD3Cyw8C6/FtCqOzKYNmlDkm9/2m0n1orXPx/DNOgVWt+Gz8CBxtMMksdSK36Ab/kATI1Rkhh51mS2YObWzoV root@858786b3-3689-11eb-a25d-22a534811c55\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDA1hyGpFHNEi1ZGDBaZf02r50FUcehdIbu+z94iNBvcYB4bXhv3H1rSlktRc8v3clF5iiUBmfj0y8k6hh0QK+YEgNAa6nQBLOstKV6xqALTzusuUS/jmaYgd1WN6lWhCSptnRtugfWkUrpZqzXkoyGknaRyAxrgoTErDVP0CZbbHLTIyc7k06d8bG3kFsxMzVXmXwV7zdGGO2OZuPPGfJF7U1ygS9Iahjm2oqpetBz+HJs+H/uco/8NtspW2rszVizhg1jo2ulmq0ScD5Q7pox+aXrQBpSiHQjPReIExQt7+w1FJaaqIV/ARglMKB1CaFtconJSE5cQ0vodjAOMZav root@e155ff32-3ebb-11eb-8da8-6258f8057dc0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCZ/B3GARed3ptNL6Wq1N7FiUbXpstT446jiS9+zvNd1NRJzxSOITNOgRzG4fC1lnSN8j91uyE3D/cvBDUkLl0qa5Mu/WD3qwLWs5R0rHw3C2nB+imOqYKgEISuQcKTnY87bsQgXwhTrXGbAnMBIr3dnOUwewDFjAXY/WZpEevhDo5ufRecokPWh4zxmkHMvaEFJQmCCsJjDtzrjhudiipddaE8dJQ0/AIYItUNIiHugxFDGco4+1Y30D4iI2TAXEQvLsih1EwvtEUhKM8datKXn36YUZBBK0NIwBsb5RWNFJw7pcH4/LCs0B2udDjUkUv0gfr5NFHgzz3YhMjl4fll root@fa613402-4933-11eb-acd8-6a2a49dd8a76" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T18:50:19.430-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "148392433129-compute@developer.gserviceaccount.com", + "id": "1121524320889128501", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-079", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-079", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-079/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-079/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-079/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-080/description.json b/audit/projects/k8s-infra-e2e-boskos-080/description.json new file mode 100644 index 00000000000..720d57a6136 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-080/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-31T01:52:13.551Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-080", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-080", + "projectNumber": "631451032209" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-080/iam.json b/audit/projects/k8s-infra-e2e-boskos-080/iam.json new file mode 100644 index 00000000000..1835dcfc3c8 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-080/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-631451032209@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:631451032209-compute@developer.gserviceaccount.com", + "serviceAccount:631451032209@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-080/service-accounts/631451032209-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-080/service-accounts/631451032209-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..677901fb9f9 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-080/service-accounts/631451032209-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "631451032209-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-080/serviceAccounts/631451032209-compute@developer.gserviceaccount.com", + "oauth2ClientId": "100717682942448198454", + "projectId": "k8s-infra-e2e-boskos-080", + "uniqueId": "100717682942448198454" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-080/service-accounts/631451032209-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-080/service-accounts/631451032209-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-080/service-accounts/631451032209-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-080/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-080/services/compute/project-info.json new file mode 100644 index 00000000000..83921fb4d18 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-080/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCYteYXAJ3CgHMLQ0DZ5MJLSoXjhdL82zYd8VbJAukuXumCOrI04WA3Q3iqFFiHsUVQp7Vh7QiqERpepw/SpE8C4uNisGCh3oCX5syYINtkHdXCmPMKvW5qCbupY2wOooyLb2+WfuDiaV0q0WUNwb6ts8EQoHxBjTSqEXLET3aXmzLMtiuLqzugcYWDPte6hT8W1pQ2KZSbxq5XSXrFiL+QhWrhlSaqcY0gLcnzdSrnsuLr7syXUsL+IG6gpSCZjnMv9ciPduh1v0X9uXUJaRK9ognnlR0VJScgKYJ3l5O1O8gTjjt/+tEC/MTSe1GgmVWgmUF3E3+cgxmesqyp4lw7 root@d6e028b8-dffc-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDok4kx4kZ1JxKnx/+QLaLSmfYO/ObQy6L0mrQLzCkAEGPvh+2c+7VN8KBhBu5vjGFhDEBiZGrWGamQR3aQEoGSWRUFebKGylPEk7DoHHG/bmSUVgiUiKg6dASLxliWbiXyonTeE2/ub6cZS9elGKVhme0AF3uVLuq9630BmPJQ+ph+JhvkmIBIMivfZrLqffD5fN/ppcl24hTGPt83Ejl1RJ3mALxktfZetlzERw/IOi+wiTGFVk6KMZqY7Vc8twz8jz1QNOJOxiar0ePCiPF6v18rKE+Ll70NazO5zE6lGTZal0RixUh7Ji7L6G/pJp3PL9iSQcUps0+eQiZPBPa1 root@e0d2ff3f-e574-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDgqcgi3BK9LX1BEAgCO5BKI+ROAq4abAd5zFLvIbIrecM1xDdbFG9dCpAG2/HQIRR7IHBF6DhpGrJzdcgrUIlUDfqSF/um9DpDTNuhlRXVBAxWodvBldOBhHodkBvBwrh5A8Vy97tAR9Kc7BmET/Xw6JVJCO7n8ffJTj9dTK+1NxlYp+NrIa83n6EPH/yaDR33NAUnFYGGbFSaq2Hw9H/uLcTIt0I/MjkhZMgtvCkAkLDAM2j1N+X19cji/cVSj74RQiWFLhbtJFrVsaFc6FUlX8NDnGR74rCVqG7a3YIUOuQkGttOxvlLRFVWe0//ExI20vrG2/34zGL9l6Ftexff root@cf4617d3-e64e-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDqAWW6azGII5HlsmOn83hUqEfPU0Qk95Mpm4RdERbXjOF6xP9udQpvIBuoU+4Q0EW5lpt127isVhNA20sDcdwD/M0KQJV8XzhOynI7wtX19f3ErkTwqkVsq1+JLYfAQh6TAnbFynyzE98Js9twoh7u3xFwRaWZ5WJ2V6eNDI1wZtxhw6xPHp/3YAOzfCaQeercOr6BChNoIwjAMTrNJDclxQ6aZlBupOfPVJyUzKgNEi42Jkb6eXohEZSCcEJyWcNMyLM+ENFxttI/OzctU3dr7NzRU/ZQpBFTbKjbVdQO11kenGp1yYkATH5hvnJDWlYdz04tiDdRyMPk6g5Lid+r root@f570379b-ec77-11ea-aff6-5a14b0d7f3dc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDGJXDEZQ36dRW1kU6BHMBsShQ6STH2PIQ1TYAl6JqIVha7tuy4yEc/QW+uru+DUFlWh27zf4FLMrAAa+o/8jsbFVkMTJC25PYhyk5zZtJjVS5OBY1dsQ1L2ORN4pMeZ3h/xAgk5lv+IbyUCiJnjfzKp6A6pgDqzJPPI09cTDKzKosFvZwOtlLxEikYdYeC0Nz5Eeb4neSDdcLS5wpyPb07vcCRJo/mZc/L+tExfK+/xwmJ4aXyz04hWbIqDkitB75yPlfJYhxh8y3DmW9MldK8C3hDbp/ZPLdMXJ9EaR+IJL835K8BvzHVOdJN49H45OzR37MpsauDpJDqp2sxaa8X root@6c7a6d2e-f2c0-11ea-84bd-b6fb6d83c68d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKkoNGVql0/neRNAKenHx63QknOT4t3GpASTrk31ICJztY6aSPZlS9Q0FBWvWKRqQcYxYQjCg/IO5smkxdORw7r6jOP6enmj/gQjST+I648ADZKej67Z+S1hxo87s+jvLt1NxT2kyL2/pOeNSD9iGFJucE1krz1IjRDrBJb3vf1s1BLKKnN0ibVfbjzkhyzuUSP0pTL/QtxJFcpQTuIgPnTtJJ5d8dwYyUZLG0qy18SBOrfgw3FZrwHca5pAkDrBnDwcaJhFV3CpIWDws4SEz+JkBiDM6Vd6U89tTm8eoM9UG7S8nL5ZFh8NvL6TVmfjcV25Nt6PdYrQBS9ufQGPMh root@fdb901b7-f9cc-11ea-926e-7e7ea190b727\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJ1+0hdCMZ0GGY3LnukFBgZyKyMJa/2AK6Q6g9YNldzsDCyNvBZF1W8XNAUMpGH5h4/UtrX2XG8fNmUf9ewSyAD6swpDbvCf2aejK6a4WK0G55Ia4aV7C0qMw2GqRsGmRWub5TfTZ/zwKIvPjraxjzBgZSmfznYXxkE1qyWdeZ5RhmcXrjjgg2hNiuNKgca5eSu0MZc+luOlH3iGktXFL9ER0epzexACicPgBu9iUGHqxZsFUn2RZBtDI4/HKhrh4DW8eN/0tN39OyNH9t62mZaog3pC/YvS7FG/9lMYUliN1GF37pcrSVj7qmqtPwgjGtmHRJQUHvw4tqrSgLeOJl root@3bad644e-06d6-11eb-9dc4-ba187aea6a9a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDPm8TaE5loxqgOKPX1GwRzJL+OGyepp6HjIJU3004d98o+dfTiQ30YoZhHTx8J4slF1fx9FwTFmmFgqQkGbd7LnqlhAz41paEhJTBhgNF+wPlXvpGgv1xJ+69+9bvhSmK1qvAY5Pz0YgdPmjFFCQ+ib9LC1rC8Tw310+FnH99kNAKUqeyWeDAqfQSwMDcZSvxheWESiVNho4BHDcuHlggtmUbzGrxajLlp1cfXrV7NA0LL2b5BbEwr+P7mKMfJQOBAqNhai+59XPrsDjNAh//Btc+fM5mn3unqU1aDCaVm1vl/iwRLCTlHlPmgpgaGKkMo+NLOhGGkJda0Y2tNLz2F root@d1221856-08cf-11eb-8b01-e6b73feeeb4e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCubq+2CCz7MGcDCdhBzlzwdv3ysJA0VYb10NLNGvZ6jZ33RKtyRSw+CE6vLW2HAhqsGsxC/aI7WiWD3ctlduEGSrkdFM4plSOcxoPm/MZcPwl+RSlcug4ZgSS9bT2ormGV+zJpzG9mC2oZaBnMu1sMwtohyryWd36kDgBmdWLfXMxAdyGx2MbtmLTzhpQSdog9Y+Qc9/7wUNKxh1be1B01xUSb4RPMRoz1t9EQGDba1lpUm3Yqa0b2Bfuv3kPfCkkkdn7IzxlHimOax9CLnDo7Ipc4W2+5e+mCLI8bddTRC9gU55+6Zacx6Gj+5H/6HhEKlc0hZXdzr8/TevS4OvVP root@c02bcb25-0ebc-11eb-b384-ce16c16e5d30\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCcBEKW4kbcr2Ub9aByNB1/VIpyhIeVDlexNjxvTtOfXhGyx9cFML+iCbi6Fvfy4uOu5RgW+d6RLiWiTJO1fygUei0EKfE+LKYKGtwsF6Apv8KqFX8rkrrum5L/WvV+9Yf5LIOpFF7MOOWvil+fSEvEftZaZvORWR9R/j/uubcKXBrL32PdaLTf7BRHYbhd96bcUDJfnG2izUcht7KupU05/+eDYj60tsZDv6JcCx6hlmIuZ98oiO2O01I6ws4kOJMtmXSSd3/L36PjeOKJ5z+wdOuAa7D4YFpHGCzacgtkNMRtfI3whAajI2p7foktgeElXVee9CZFYwVBBMNy3z3t root@2b561c35-2444-11eb-ab3d-9a499a0fc9e5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCvDBdYT1LPNohAMKZidPK8J8S+6KTkIAmQQ3VBjtn5HEfxLaL9OftDzspHc0yphUWMwO2+DPn1RF023WvWiMXggMZnh1gdSapJdyhqiE4+bBuN4C5RpguurdweWxG+y2CyzaxjGdXgFtVFSEGbvzNiRYoOAhke9gJIpsAAmewBFT98/xy0K+d7IZUzrdixfTn+KmxuIjQmcNlhDuXrWp3GjQyDscqYaChg08qzNC9R9x+4kshXSVgoiY4tmMLjKx2L3jUP5eE865XUK0bZsbT1wECtSlxlk4ztkc0BbBKRf80SUGQMGKOCAPu4G4bMThm2sdq3bXDi2KC9SoHqwRIF root@f9ae5c0d-2707-11eb-bb1f-6e397dbce9be\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDxjnvx85R2/v5lXakLWYT9Ktnjhv2J5zh75CyUbQfj7VCSgo+P3+a90SD3esJLIHiRrejch5lDjTML/JjrrexoGlx2jAFINnowUbokYYMA8McbNGAC6KLGQl1YiUHW4voCpi0nEeKWuFRUtzccAYf+bwiRn5Iui5xxPTv2U4TYIw45ujlP3zL6aryivyL3USEjhlFRE0sgKzK9cfLXuR+C8HYKIcDgI/4IETgOvbeuEozow+vRkGwPW7QxVQ8TQW7BmwOdtZJcD398IEnOshMv4dPlbuTQmMkvpapnUw+HRJbmt+41WG6vlmq1VcZ5vyUXY/OWSt3QtBCDmiEUVxjv root@58288202-2bac-11eb-a59c-42dfb897bae6\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDUERkLDh2B1kS0ipOUevimmNJzBUFja1p2k9JrlvrG3Q63ZkvfL3mb/BLOcXMjeiteeyiZK+dvYgpv4we2CLCT9toOqG2uDF4Og4jZdvKFF8VEhTx7By1/elcz5iNy0fUWl5NgDIALX/koPqQSkYinApVqOEna4pj3uQILGh7qRgaP0pA1jELmVgLTbsJ8XQbonTl5ZVT6zgowJTpv4VLNIh0cK8oksiAjT5fQvyVyqZGE8oDgUmjhiYsX+CIwtfiHlMI66bG9j1ZlcZVFnbcZdprinlLYGVC6bNBg6SJ7jbb2uiO9M01CY+h/0DkwkpJiXXD+Ww3LQgV6ikGWOpjp root@a08608a9-2c76-11eb-a59c-42dfb897bae6\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7yjEDJWbH3Frz5rfwfuwXv4Ryp1cH/N25xrWiRk3G/dJ9lkCGjpPrzO1S7LTdR0JAJEofG8Jz5nf8M7lOK5U1hvAEvZuwnXjDJEeuDZIoCDKD8esnzUIbXP/df16SngbBqAQYyNX3QHPgcX8i9lBQl5Td0nPrVgAGET+YiHxesyaiVZbChedSqTfsAa44a3F19SBkF/TjvlCOisrY4HtGSJ2S/GOXXRWRl34nE0xUxPWMv/VVYW2C0eIPN1XnoTEKVnv9p9x1RoLxeA33VbqbUUUMiP56IskwLFz95iHEx0ymrc/aIsnFDHBBvpFlQuRZcVHQv2+Vwdyc4fO9LRhd root@80272da9-32af-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC46RvyI7wbdGAF8KOhH2vOA/HISQavpZHNGc9TcIeVvVC6A5XT2d0olxt7h/UJ3umX9vC9D7sC89KBjjZH9Y3sVZ0mK8PpfVbuZjusqeE/ncRj8d/KgZoymjupSDQTIlQe4ckZYK/0oW6+rjP7sTg9XQu61WSd6IT2SQVtPcGHtYM4jIeU/rCC4ybt5m1KeAikK5IF9ycuW/8AfJEBc6BExNyZGkdVLT0UReajoWOyz//5MAsmz8eHyxtF8CzFo+5mA8Pul3kDRr/7ecqmFSLXYWOL1AidU1pJFKnuMEIYDZ5Rk1dV0TfsR0Syg3ce3B8hrO3GB3xWZ5ohSzdU3Gx7 root@8c20ad62-3cdb-11eb-a772-a610f2f25584\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDTc36SizVm6aXWsaeBrcoK6RVFN9m9icL6wF5tQ9j7++WuZSsGST/sNeoZIIEUUQK/X1yiLfZMjKH7wXeg1accyL1rJEFtO2NjOOWtgdFJCibr/bUKDrnEZexo3Fk0vfcPH6nHgR+h6gAPEBgBf8yYWyALi/rhbDXNa8tFUV3EwHfzgkgG2MaJ/OmtA6jj0rYQJkuuJf82bMEiPd/FsfIDJ+3iB07nSH1B3bqrIR+ABroWdlrWmvpzPQAOk6spy8GzRY1shE2O6IQy48ltfcRwx1YPC4wJRHzDqWuRbJ7ZpeEjGt5lgnHUlijiPldfdwbO3C8ueo1sY105W6otjtLD root@b6c2c7a2-40ce-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDUqLSj+t+n1PpUYVF0R7ivLw3WVkNAqhk/+jHvrZd3ofgd/eH2o9SuPtuBQ0dclvbU2SNjTPjCYtPZAFOFvk/WZIRVuYri9T5oVbc+FG+xSXl3ySPZZByqPExbw3SINm3QTyzNqyrAgr8QnYYO9e92MGP0qlBoRQuLUviRLcHCm4CW6jdu5qpb3AcaGkwdt8bhGX09q3llqye8C5l1eFX68G4H2o8BYS7OgXweO0nrSOMdXYs4xtpJ991wf3KotdDW1i9dnzO7LaX2kQjG/jRO26n9kdVpOT5GLCTBYG8o9WmE+DYAnk6+ChBxxhi8ydYlvTHzYEVcWeQ0nOPxWKqB root@a8595acc-4b2d-11eb-af93-4e5abfa0c065" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-07-30T18:52:24.269-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "631451032209-compute@developer.gserviceaccount.com", + "id": "6177526741902215096", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-080", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-080", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-080/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-080/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-080/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-081/description.json b/audit/projects/k8s-infra-e2e-boskos-081/description.json new file mode 100644 index 00000000000..5be07530b73 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-081/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T17:08:51.163Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-081", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-081", + "projectNumber": "390883291642" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-081/iam.json b/audit/projects/k8s-infra-e2e-boskos-081/iam.json new file mode 100644 index 00000000000..8316bbb1e0c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-081/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-390883291642@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:390883291642-compute@developer.gserviceaccount.com", + "serviceAccount:390883291642@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-081/service-accounts/390883291642-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-081/service-accounts/390883291642-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..cd5b417e323 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-081/service-accounts/390883291642-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "390883291642-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-081/serviceAccounts/390883291642-compute@developer.gserviceaccount.com", + "oauth2ClientId": "107697879921506437655", + "projectId": "k8s-infra-e2e-boskos-081", + "uniqueId": "107697879921506437655" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-081/service-accounts/390883291642-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-081/service-accounts/390883291642-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-081/service-accounts/390883291642-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-081/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-081/services/compute/project-info.json new file mode 100644 index 00000000000..88aabce0263 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-081/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDdks6xx9YNLP4REMjfeg52DoZq6KXnIgY0OjVM8p+pVhvi8T3zslaEG65zu6/lNEI7cZPVcZU5iiMTUVTmB7snAgTb4PBxzv5vXBJ2gbN1gyDRayQQBw47lgKb9H+rESNsVoUPyFhPOEb37tfEh9jm9LQQgbqU0WltOzFZ7VD6qvVgmNomYcAQV0SoXxhvwvghqRHEJfuTA+xBs71N8Pp+pzWZm+zRoQ0g20eTnA8K1WSB2QATUQzlJQWmCuxlcXiLmWx5MuV7OS6j4Gc1zRCe9MA/+TOUKhs/sY74RYJAQlkdKSPKmH/VBBLaZvMvpkn/wt2085YsuG1J/PdcfGiR root@85cda2e1-dd8e-11ea-9424-2680bd79560c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDGxSEgEQP5HODwIXp5/nHLmEJc9zDJoSOty1zasipk4o2pos7xsYsyM0yaeMeBo0Asw13I0jlP8CPGFVyKj6WaJvCP4znSwvV1uhFXTvza1I/vLY1Eb8qr2Bu48RizVVYeaUKpl7bb5CHl10UlTvOO/DEYnOTDfw7VfGO0WJxFQOvztQTEos8iTLH8sXAKzJo6DUS9sz/gEMfBIYLcvBQnYwYQDxzSjWKID21w0NL7LdQbditbo1XWHpTw8t0ELT2aOnzgFYE3fKsqFfiJfh1OvFKtupNbocBCQjIk372bwP5VMe7ptiCNa1Th4f90otUbwyTq85Vkk5N/O3Kk1oJ5 root@37fdca1f-de03-11ea-8a0c-be937dd98cfb\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDTVOJUcAgmehkm9XHjWOHt0zm0ZxLOq+awbOjy9YWCpvHqzDLBt8kHBIFPD1v9ezwZq1unkZkMrpGMYlQRo3JG6f9JULKXLRiBDmDgyLGiJCA40jKJvR/Z4x7GU3Wde3Of63z1Q75bgJs8ahzL1GXSs+ZlR2Z9RnD60vIvsbEz9XHBBy7WDaJi6T5sNWdQE3xMHB8CktTWu0GGtpMxulGj3hmAUrTTgjuL4YdWedRp/ODWtbDtwIDgA2qU3W4rrJHoYnTcHxYbYD/Dgb0iQBC0JY0yA1pQtVEyUTNbJ2p4oD+EpmTIokgxkG0pswLhSSqdOXl3w/ezdOiz4tVJd3Th root@f5476795-ebc6-11ea-aff6-5a14b0d7f3dc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC5vKGKU4bQdgz+zEGATqY646RVa0+oMwkMOwSCIh5F1jeZqJh4quF2iJYDOphG4miuLJFthi6pfpU69ks7kgI3Y567pkOVt9wm/vBU2oiSX7YKWoAN9zelb17g+aC13PKKcGjxI29NzVRYt2clZ95UiYs3T1sGFNOOyBoL6K/wZqQx1ewlqdtqCX0gJNC6YOfB8Ylodc4a1GHHAoEYzVZNRPnok5QFDiRmcz+XbwfhUrDwS7sHs4cOb236I5u7sqWN/aiDmDMILoTkqQmab57gpR7+Srdk9Jt5P9aQlXBTxKTKvqwioctiZQnyFi6h0jk0S7/V6nV+Wl7i24tlEmxV root@101b2121-f0b7-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqBXhhn+dQUrfBT+j0YuHikPzdVggS59PDJWzCQ3HomF14sDvcVWCOx9IdFj3iDwbCYWehvrj03127h9f1Z5CV2wN2yqEbLU0rW63p8p5LT1qlsXP/YodaeV8yEU6n+z2JizVLkFguWDSJU32bdqfhHVGvx27E8KdYUFdC2rwUA2h0Nocatkv3yGShyQxUVkPVGgj7+zE0e02hGsp4flYd1o39CkSDJ5vWn5xKPEtCm4kvE/TbbfRQQNgvbeYE0G9D4XB0jAQPE8za4G3UyGxAElI4ouH/Gst3MwefzhRSZXRkqA3xgI1eCzH1/qPqZHPd2MoMpHfBOt5FDqHn02tp root@daee952f-f33e-11ea-84bd-b6fb6d83c68d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDWhZjOfCN2zK6ALlPR7L/0256eyBa0RW71BDhQGcOVXpJJQJxG3OjXZY2UUuvSk4G333I/FsgbLuGjvw1SfsEVO+ED8CPlYaV9xZzYTQ249BD0sED+PgWE2PNzgxgDPn0tr3zhehQnEv2YeJUk6lXP4wJ/59HZtVwTqFXFiPWqpmwL35CDVk50kUlMlOgRIPY/vgiBjiczctcUkKWAkdGG7tRdH6UXkV+Y3E1HudtW2E4QLx5cliPjHqpFSZk5icQ9AZM2+1TasJQxQAM1viXDkEkwBj4kdoc+mEz93cGHpHBS7ik0OcD3WHuYxCxaxZNGbuU0QTpUMTkva8rgvdXn root@1a5edb85-21cc-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD0rY+ThAjjMQsE+dmMw9/d0kWEipshIuTWEUxQixF8pMfHVfexm7rhPzXB2QfMgvehMYbazs7pqiwxrnUUZCEk+DCUmheM9gcdE88HvRaH7loc4mr+7vf0tDkjv7E/ZLLgPwyniTyz9ZI5YTi6blx+ixCQ/Qc+zR11+sx06B5jKSnmIIaDTTq6ZDHWOP+zEriTtRgGr0/0+ZX9YLaURhhoI9drBNBBy52pOraoWKb20VhJj4an056r9f1AFi205ZwejE/AstXT5sN0wFpNtcHI3zXivSkvC2uF9SBkG9eRpAebto0HCKxPbw2k03tWB0TouA7ksA9oqGRo0AeApU6J root@f868d634-2a7c-11eb-98a6-ba1d66ad0079\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEknvE4ta6j0JRf+4TFY0fp+pVkwwxgN0f3fJVuhc+F4H3w/757bEBX5vE5VbZKz5zijpB/LPavLzf8R/hlATNgkNy52jxfZZtfgEqKukXtf2/rqxMrHGnzWji2lLLH7TVYY4j4x0jGUCbnUvSSzj5dBnuNCrkfvjxBfXwPzEV5pES32g34h+D7T0dUh9NlwoxyuTawUyOVQV8RojIq04jCyO41FhVrFLxVQF8zBzD+M7iXql5RHhmq79JCICGgcQRkuoOObs5pQYsFjCF01aNLcgZKaDEFdiXQVrBNA/oSislrf+05Zi/lc64eOofHKfY8voiVKIZ49I3kZ1D4yx1 root@139c1536-30cf-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCg3naBIkXCyuzuy9L4lvKlwpmMZpL+/tM5E0CDhiLhxdKJ5RlD7HP/hD4eYMLP2pGVorvDORO3+CUELOO64NPEdtyrLqBrCacF3c+s2xmIVMHxkLzROgWn5f1WtvxFCliOwwFbzmbOP0P757/3YohtjpJdhrw/GxpiDVjrjlALvT3NGcl1uYZnbIVncNVpzCXfg8962+LogXWCwSW8g1u3W0NYFxxvGLUQTaMuFfTpZDN8FodHWHdSvomxpxvszdc3T5IXXZ/jahAAt5q4omsn9POdrG+R5J/gJd2+axGU17lRk7whzIHEmtrNBU9vWvo7euAArJWf/7j0bdlDYtXd root@f0581337-4ca8-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDDw/gmwHD7zfBkssthc7K9QHLK6WEfA/sNjhSaNksSx8HYIj3wzrROnofOoOBe1lWLWKh81c06nQJzdfrrwP3myeZWv+I9vExnX/luJyceGhaCjSWlhff3OCGD5OHNg5cjagwo5j5beL3DasFq2rZumnuvSwVwo8Z8XKXTPqvnxq5YMB0I/gS1p+Hg4gy6xNRKkhRVJh6kzIRTydLXWvb7de/KmmdamPaIqmK+Fk6DL87hfFpTJO+OiNh4KssymadkgYpUXTGu015Nl6Cphr6zKOBQ4FkvK70l1XFWC2vjClsxXy04SAaBEGfwSyrNeitCE1t4Pj9TE7czRGyAMJxT root@90c4f883-53de-11eb-b6a5-7e8b7adfd54c" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T10:09:01.858-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "390883291642-compute@developer.gserviceaccount.com", + "id": "5185550374980600258", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-081", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-081", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-081/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-081/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-081/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-082/description.json b/audit/projects/k8s-infra-e2e-boskos-082/description.json new file mode 100644 index 00000000000..55a4d89fed4 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-082/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T17:10:39.613Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-082", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-082", + "projectNumber": "893122939836" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-082/iam.json b/audit/projects/k8s-infra-e2e-boskos-082/iam.json new file mode 100644 index 00000000000..f2fe37967b4 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-082/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-893122939836@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:893122939836-compute@developer.gserviceaccount.com", + "serviceAccount:893122939836@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-082/service-accounts/893122939836-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-082/service-accounts/893122939836-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..64b854771e5 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-082/service-accounts/893122939836-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "893122939836-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-082/serviceAccounts/893122939836-compute@developer.gserviceaccount.com", + "oauth2ClientId": "117259585710375723194", + "projectId": "k8s-infra-e2e-boskos-082", + "uniqueId": "117259585710375723194" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-082/service-accounts/893122939836-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-082/service-accounts/893122939836-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-082/service-accounts/893122939836-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-082/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-082/services/compute/project-info.json new file mode 100644 index 00000000000..2a36aec8b7a --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-082/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCoIgjZh4F4HY5CQv3H+ywengAaUhOGGOiLk07minZMDfT+fLK2aOJbMMagQfeNjK99i9b+FALyXETu1mLFsbh/r/JX9daV9v3yr6dqI6aKSi5RLRduxeeYeOh5zgR9voPwqjWjVgE0begiZczphHq4nZqYu+I8KWCUkNteewEjKlysbwcPrq6tr3IAJd/sv+MLnHyfxbOXrU1uyYjZQmO/whsKl7qqzN8BRnqzR/D+Mu0CV7wx5VAvzV1l6r0GWky12FA1PqrgKB0nI0ZkvvKwgFFZ0pwnvm/+EcbmYPlqrkWWfuSTYXcuLDhIbHb2KaRlLtjdZ7P2t+Aya8x0YtmH root@310ffc09-e09e-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCUiaLYFprlnNRxkegLhnTkFnVcVu/xGndow2TAHTY4RLovPHaburoKJYY6JiKW47eRXHtgOkUR3AZhvHCWeYHeovCrDYa426JdM9wbSzlTq1h+dR/QRYyeoD/0tk4yhZkc4nBvQY477nErLb7fhjL/6quoYw2NnnBqL13g8eQHf5K3FSw2Z3zeamx+l0axHczbJDJPAU1iFJPR6b0Xmh87MfqnjsQzv0cxZGkmGCKdW/wjddyVqZEtEN2rzlgUiQNa8eiyp4S0pYRVKc+m0qITy+AAJLldv1bmOS6O3MVFC1maidapm6wZcXlY6FeB/RAy8FRdYpskILNO7UnMo7WD root@72e3a777-e5a7-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDXw6RhfZ6GAYLARIrr77HpghgjK0X3hZgZBUlC5p35QZbfaANT49N4dXJsIUtGOJ1fn7glIOfzpQJCtfLs0eu01Nl7IMhjZDc7hVpblXJAFFjLfpLFqxuatrpva13Vl829Gml6YgEhRkizTyDKVghQnOtCsr9sdBUc/1hD0fYYx4VOfXOqfa8jpT3JuswNjmG/izROwvW6x+1yp4cnETDbuuH0DrwerZwtb0cI7Vef6pHa6yJGl9LK/oGChqsqivfpkOdREYc112NsYpLIJcImVYzpm/gmavAQzW1qAYFb+QsjCNWzoyb7j/eFAB8ClEfxpwBWlE75hLkNznXCpSRP root@ab8387fc-e722-11ea-8112-a64f894a1815\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDDjmu2wH0fD1GkK/IUea4Ypk8PqX9CkhboeuliDLErT9cO1fyB+Yilzg/sYz2Z1VGix2TQzJacM/010EoBtJfV1oFYiryYNruWpPsXbCBca9XmQW5MBSrjzv+CrJUpjm2afGG6ksyxpAAMLs9SCb1QgDAKJgYpghOf3P0Nt8UeizBfznHszfXBQvXCeOmEhIkd5lvQRCOl2aupeB4+bpISuwwcmXS9lrkCLniiX80IKSkVDoippxafqbAHAE+t+9sJCOPv5s4aQDiKn+8ZlF8nqH1ctUXoEP+XqYuKXIOM40tviJuCMF2Hjl8bLav6WfQbDIharYeLYq2TuURJ/bqd root@11dba22e-ef55-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQ0ZGRcu3BPTgPaegariwzGYDB1uwU7f+zEsFy1vSaqsIgvdiAUqJXnfsTGu7NM+BgPPpq13dhSOUo1oF8vJpzCtymfdttpJd7Q335qJeZT+DOz+WxRaYUZreY+IlJBnBhnww7OzkQdIr8GAdRxY1fzAUE8cO+8DWj2zL1e2mIxd7kJJfHV4gLmX7j0Xmp7sAQygfS6Wi3X92DSzHCy15uhnJIdfTAYdBntFMX5QNUyWQFXKbD0v6DwSJkJcJNRuvgA4BL33y0bvGi661j4IG7G8zXDEETxnkaw+RainxGw5fSFcby+Oty+pOb8AZ0uZIkkGqfFFhqqOXT7ejKKKZB root@95e030c7-f4c1-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIAsPoBJVsELJNtWjJdZ+VH5Gc871oVq3HYokcdLukaK7Gh9vpvSQCasMIoGZwzY2LoZJ8pqHOXOuLx24gpj3tm52YB32Bz+OawrlBahIujFtwLnYYVMNjA3nw6aZBDlMWHt08KcpAKjgcbDNnfVudPvVeFyq7x42k3tWsW7pg0Fll7s8WkVst+ZMmJqA4FQ6ljx5py4y2s1ChUQd3F7mCFDuWo1VzOHldXE2sBeoYJlr+4Fs56h6/8sI5qTHL+VrEjgAGOR/tlnx5uuXhPjkwI5tzRTa28D909nTwMsWs7JOcYs5YdjwGyICXLCjOG+GgDokEZlXiUC6OLFXKhEFz root@ae86e8a1-f528-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCyGCZthuQuXTZQBPSrtG/g3qQDqMBfK9+/8Uk/siuk3R1eFG+Hi04n104xvsLo+U3Yjp/TBB4cCGuU1EZUaxSaq/zMVMWw6Bp4DQGtjDOH0sqn5SRF0PgCLFkYunn2t1RY0vYLMQpCG1Ln5zzXJkBqajpBrpKEm9L5n2i350chwyqigwMGm0gyvSss5gldWj+r7zQDZioTKn2PtxIf0q88nXZ/fmki/UJJAwIcpayQYSwFXEox1X6tJjbO8DgqiiUpJNYaSMm7gufHfh6jyNO12BnIa1s6wRpjzBCPaRRK4KD3cM9617M7FQEcNpxmGvx/OnEAI6L/q7FW5G16Ndn root@1a37a07a-0297-11eb-aa74-ba383c228abc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDhaodH+ff+0F+O+c8Zh9DKUtsO8sJFhnSkVSsvKKclnYYTkuxLuDy7aszO2eKZ6J7B6WbtI8o3X5eCigfIKmOfBkgb7oyv07u9iDKyiVuLdDilnqjMmSZu4QHb9i59RSvjaWvpHxmCwsQAVF+3nKDRDrCE6gq3rJ7LIJBdeOSqGiu+wFcWSkcSJ3t11i/aqldyUzvPZy0VVlDPe6FGCj/uJoyNIdCsdHgLqZjOWN6yE5z45HC+hlPTz/oYCE2SDhWhGAt6b5jnUoas0iwKHo3Kf9o35yAYgPhjNBs4oJbiOB8y8+zvZELQXL4KG2bznuqXnFY3uP3eO01crGzRhp0r root@4a1db781-3b60-11eb-a261-2eac9c79d9a2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDXauO9ulDoDJ1c0dy7FWIennD2FZK95SGdTFevbLDxa174F0zyS5u3HAMU1TeYUaHhQSMvEZgwbd6Rr0wb4+Ly2fl0yP/PNPHMNkGVSNFulEH0xKsrMGqI+mic/xLYwQG+UiozErFfX79Wr7QSpZu5z4i4a9j+h5/yhy81rJGSYbAOC+4NQpcdyNyjqqkZc/StS0iwUiuqU1nqHg1rsGDBzzZJYRmHO8j/Nyt/PdJTDnVMMwpvpBzXpgQLAkwob52fpzZ5yJKCynUKEYS9J0l+WJmKhAvbBjjVfRRLm8V9zXmSMB2Iw6tZZYnClbP0ufxBqCq/3KXkhnHfB6vYG/6d root@d41427dd-3da5-11eb-a772-a610f2f25584\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCT5RZNpfh9g8k2eAoPrqD4Yqb5c0qFsPcSJd2AII5xRBrMC/gY9Qv48uRUzRE87TiVhPCVUmovhuSjXjutxQ0NtNV2jK7QZVQNxNr1BC0JadAVREYB0+cuIKb1+kZV/rQrVcBgGy0ZoiH+hLHXl9iPQHooX/A6Bqny/1tiSoa5KxHPTs02cpjYqwEs816KKI7voJ+C8YJKG45v2R0rjdosJMSWjw1xHOeicj1kkfSmOPsQ3Z4hN0soeiBcjwZqWYywX1C1vOPN8K82LeH8rBnun7F3w1enocVnopErn6dP77XnqeC+jcwQTxtXjfrw1ImGW3x+8WIX/3EAn1SWzPBZ root@af3467af-3df1-11eb-a772-a610f2f25584\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDDni14QxT76aHWusEQiqLk6G6beQvX7DcnJywXjx/ts2h2Koivl9WwVyvKcbAuOQccj3BrNTtHa6AMDNmqeNbxTkXCrcOvTjhs5CWEOG0iQhAA6vWwUsrStfasfzwc6cuIY5hXkoS3UoMwwDf7huAPN1qes0wWJSX+B01faeP51uTmFXfM4FtIC+jnBpQX6VZmUjPgJjRIQD6oiiHbImKDEe5OimfrkaP8wr48pHdS6qYWu/mt85fT5N2+fwo4LfTXAWmMm86oK2Bfrri2406biT1TYYb7PZQxuQIeH2DapLLyPFyqpJP2mzrxAYh2bDOiSFulaPEH7rMHsRuSr+jf root@90383d59-427c-11eb-acd8-6a2a49dd8a76" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T10:10:49.873-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "893122939836-compute@developer.gserviceaccount.com", + "id": "3478880016800727414", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-082", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-082", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-082/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-082/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-082/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-083/description.json b/audit/projects/k8s-infra-e2e-boskos-083/description.json new file mode 100644 index 00000000000..19761bac78a --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-083/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T17:12:33.969Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-083", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-083", + "projectNumber": "629839802801" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-083/iam.json b/audit/projects/k8s-infra-e2e-boskos-083/iam.json new file mode 100644 index 00000000000..65663957ffd --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-083/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-629839802801@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:629839802801-compute@developer.gserviceaccount.com", + "serviceAccount:629839802801@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-083/service-accounts/629839802801-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-083/service-accounts/629839802801-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..25ef434a3b4 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-083/service-accounts/629839802801-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "629839802801-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-083/serviceAccounts/629839802801-compute@developer.gserviceaccount.com", + "oauth2ClientId": "112355237044137712904", + "projectId": "k8s-infra-e2e-boskos-083", + "uniqueId": "112355237044137712904" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-083/service-accounts/629839802801-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-083/service-accounts/629839802801-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-083/service-accounts/629839802801-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-083/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-083/services/compute/project-info.json new file mode 100644 index 00000000000..a4d92cd3086 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-083/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDl1B+G3IYZJOthpp1XBLKF2bFMaUaUylpMacQeNsPzH8CMvycYWgwbqC5uLsVBQnJiaSpBWeg/1IuCJh7JAe67CfTrDbCRSWZVq1Lchuqkd8kJv117NB14IXlpsQxNucS/1oQ7YhBHZjEYLbP3d9AYfXOxRalfLl1d+7SnhZUbMCgpQtZTVXohFR9SJ09UcyGawPXHNeVq3d1U5bpPUgpu4L+mYka9AUE2wULQvfRd93R9FB4BMkJHszFp7jPURJLVgOo29siI/HY4Faf/0jkXgqI6FptKCTNjFrXtBB9iWXrj6fN2R7LpUtEh+VVkvd8gnNwxNtoKIoOVop9GpXAr root@0b664c79-e0c7-11ea-8c67-968ff53f47c5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKXInhTnmVCxoxbXCOL6gkbrUJJ+dXE1pPZtaqUrW0VsUalogCPvKJSGjxF4P7h75vBlBG+v0JR4tTinE2rNdVqmrUMq1FyFc1G+HubJ/S4U8IgYPFs7Eo3fzG3faF9hcfUIugy7LpVG5T2jpGhPPvtt32Uay+FGlMYmLxvTZawjBILmOqgua+iQnc33U+CRrGo7pdQEb0T0Qq0a0stjbQybcXdfpudg9AhgbznQe3XL2VQijoG3p1VoBQ3NAG0i970FVDfV1904J1z3RqWnykKx5V3Yib6/H8byK2DPT46zUlJK8YvmTfSwEkxootc0oDnFjdOMKeVLeptCAEPlDx root@4e5bb81b-e6a4-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/Bsefb7SZIQTsGjY8SN91VBmCnXFZTZXyF0gBz0NueuKJyftyXivhZDS9VHohA+Vl7+N2UOjDHDyUCWC8GrvBmBWqj4b6GGR32ekLevoOyD6mET9JW7MNjh3IGGQHWY8uggmU91rtlQUsPBvi5GpikY2ugJxgtXt6PERRVahlpOgfViitLiw1TL6b9pzh+r9a264J5RpQcn3/8qsBz5xyYaJSmnloH4bWtqCAjsqUugMjM3Mqt77ZOPeEjZOBruMr0lItkZ+HSHYYz1MzXLPS3XnqYq1sM1OZ9dtgd1STQmWCTXXNTWmoPXGCeOKX2Qs726r6ZZSA3LCYcRgkg0tZ root@cf3b0207-e6ff-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDTKgZzxZeh+QfG9ZlmLf3vM5IR36jkzO/yHIcAFxJ8uUCMEjDz6/DDwtoNsSNeTzLVfSNwpeF1iGG/0dABBMRylENWxznkXvSbUwcOFdsbdVmkSvaI1xYVTu117ELro43aIfbnxdiblQp9DFMZZXWC94mqsmAJy33wHcee9nYxGkSBs/fTe9MuCFVnEzk11BUdqTQleofSsLjtxRqsV4iYIsf+zA9LqlSXqCS28yRwuPGNCvM/IuNqsBc7pIGaOBaluZnuzSmkIYGDLakWXUM396EXuLIeIzF4WxoM3lbTgg2BQ/vyFA4f0RqrSymVCn0bLX+BGXKFl6evi+S2MepL root@1c7dd2f1-e8e0-11ea-aa1a-c6580c04344b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC1jjg2ThwLoeDo51PWhUA81yWIueufRbNxI516TENdSAt+KdzZO9TG4yGmTKV3n44vfUakyJHZsPS70jXgx4ap6f+zEzRnKOwHdHpUPGwy03BXZe85RtXyPzXm6KAXvE1NfIV0tAz6kdm3kfMPKweMgdQ2GUKoytgm0xlIbCulNbpqbITA+7duj3hJKnOZvUUGzyhlmHTeA2rVn6c0yUHVHV83EV65sWHiD3dOE1KnbtfhayQhOn4lomFwHgbaFuP1VCNYqAY2VdLsb9dw92eVTJIbppCsaE3K4yiZGd85pyf1pwdF9q1/WYkKBn/7yUU61onVyKClSmJAtuQXByhp root@765eda59-eb71-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCWRwTeO2lZZJVFAQ5WokeZ6PHCzwLQAd5of6r7r5QnP5qqW+0qJgqSiqqyExMzcmE0ynQ15Cv7BiX+dph3C6OjJ8NH5cowHY9p9UnUTXS4JW1lcV9LIalMkZzXXZrbp6zwtFp6xwFjNTNpavLCfBQIxDwkYMRyYTLPj5MhEbGy/eOzjSqnvj34ky0hLYAPdLkKz8TfkJ4ZsuUABMilNvr8VvitwwklvGnzttpKNx6urVPX1g+x8rvs7Q2UF9rnofxlFPqeYIwxT1cmpgzK/MB5o9HdFhLZ5Hq3ypBfk7Y/PnNsrOs7OZ5pJbrMcbu8RPXKasspwV6ElxjgtF51ohWV root@a25d5c8c-f0e9-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCzaxadkVrXUyswklmfSE3+7ogYJfFSe/eC1D7NKc3VwbX7RzMmvgEWngyB+kkZqIM+0AgjY295gnByWmlEtPF8lMo89orLPKmKxrpnSfGgXojpmS4jgmloS1PjmqHcV2tA3cftTOc/06Bd4nD5KrqWwW4y+JDdDvkWy1Cf31+75I1wm1+D+KHlcjyhpNN0Ovrjd5ptdri31GOv2gw9VVB2A7fg1ST0plfGbfI4VBaX+M+Bkrjy+rEcarsUrJmhIGMj6TSGjePTDNRxX4AoWOtglZevHPCtebRRm6YlUumVvQi1nZ7Vh9QX00usLSPUiNnCnuTyj73P3yL2jtN9ms9z root@4ad4d8d1-f60a-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC99eSyliPAEVMymLkNyhiyW0H0gJaAQv9dXT1yPJfHAavMJTDmNMLaPcYHVP+5bRejhERD4vVUm3tEDrOFe5UwvrRups1BknevIdDCrwZaylQhnTkjNu7d6IeRjtR/fdiD/Ha100u0yW3aiY+hHWOGVPmWAI++62TCHIYw3zk4/Emxi4HNoCw8K5W3/cqBqtNeJni34dNd5ZKxqtfkG4CCI3qt24swkCjuHtlXpzbwfhimdrGOXXEe7FRXve9zbjOyspNtF73soQdd/oRTLgFItZlvsnV3gDd0DrOnsElDDAf/sCw4ENScOMIW0sVctBHkhs6Az+oCI5lg66BRJ1fd root@1a2c0871-08e9-11eb-8b01-e6b73feeeb4e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCc0Wr51tk79UaihUikSOjfy8ldHlTc8tUxclGlrJ81y3Df/+bPa6WpvAXDJu4lw7w9srpLubryjefcrHyvfe25DkT7/LuV5YbzVYEwjyRPMnMMsfUDaosTMj71mdRjJBNkwBFfKCiHkb6vPXmDZAGKXjfaCXYq8EAhWAAxllYeSq+JEaXs2euOsJ2ZzDpa9IQjVALv+VvX9TveY0pwuY7tH+wwo6DVWNo/nh7CDM4jXnZgMBHQMFyCnh5vLGEb0vtFUPNYibNiA2taCe3mQ/MGITSicxrGbxCuj5fa1HqSELluaiN0ZqhuudBahqySyx7uzz9REa+ZyYW+cI4afXj root@505f2f73-1541-11eb-8a3c-66d0ef5d093b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDdXW7NJZr5DR7eKGWO3MHRx/2yVSZlgXd6fDi+2SijJf4aE9PdG4SRLVP7M9ARskvR+YSxCt2GL7Q9lXFtz4Vgh8sQ864rJBzEkolaqdINFxWs3R6d4ZANLTGvra4mgQrOso5wmjDRMWcWbyCFRfsl4W7bq/gomjbwlGUrI9x7LrePZKlnQM/1mP1Ybpj5ucBFJn6867UnDJVlrrZTADblHB1uyxJNLnOxXY4HDRJhdzPlZrPgYcahuxfqpQjR4PvmL0uu5X9GWYe0b6gFV6IQ1hHwIv3D7TejUveKIGmawoMwObpryiW0LAyq54yZoRJLrRp9iiBwFGuFMoPhPu+h root@e3109bab-1c76-11eb-99f1-c6d701d1e283\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDiaqT8OCDQ4c3CaLBrV2tvr9NmA2SCOUJ6NBI5ywMHm8cLhMFr/+6uHlX3ydnUcR+vWfzIomCs1o3pMWRa79qqbomQ1Zp50vyC7cGpq1+JkmLfRuleDUAn622Cf/qWg+xSVpWRLcKQvm3UBp3dult2F60baB5iDP6apJWPXjh/Ul4mRp/nhhddDYlyfh8wYLL33JTz2m5KKPcvAOv/Rcl6qAlpZebcjsqVH0KYRAiYyuWzHKYKE/QloLc5sWaZ5pjseoJYoQ+ONLSI1/rLXcNju32pisOqE1y+C3XEB0w5R2ptMXELmYIuB52Reh9FbvcqHSxTxvUN2bFq4+IW+n09 root@d142940f-21b2-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+ZJMqzW+YpMgX7pWMpDHNQxOKi4mPMpEBeMBpdwWLPCHgumkJT20l/ke041wBZq3utYTEonHRELjHU7/XFoa/j6ytUb7ZiDx/uMvUL2T2Lyj5e7gyRm69H5PXdmweSwWdE3G2pDLn+NqlaSjfYPl2po8uBk2c/5EeqaT0QqHER5Yl/tHmbd/c+wn+XzOFuIK4I7zYTU+kqPFtoSSimQuwZLuZDM9r7e0gXRnC4j0VvtYpOFAPxiOnb2gQCQd8buUSjs71m8tTTb06DfIK4m7oMJELK/CXQ+gsyd9PLcGXaxtaz1CcpDhhwBP0jt9u1uJg5dl0VdZdB+GKegvum+4r root@cbeeeb68-24db-11eb-bd88-f687e5d66392\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEsh0oPz9RPS3gEwj+B2UOZc15XNiqDGxa4z5mUyMoVStKWKYLR0IyCSm4xqjKvjd9YRt98vh5OBCAKBn/JLvzJ3IYft8RX/CWGgeJP49JFl5ZRZBjOOd+XCUAPeGVLAJGyZ45F7OgcCliX59MOAROM0FZZpswLlHff2uKhaFrRcDKsdeeBDAPiT8JWnC5nVovrxYtMvaohkPwa/5QM73897sfuLClNFrjOMdMS88748iCU0sQznzMTrTnhf2js7dsAeaJLy1TsBDz/fIPNmoAGsHP+lWyxIUPo/+ckTDE6nBFJEfU+knNOwG0m+LkYM25IE97wKG3dO+sXe035Hj1 root@f88d484b-27b8-11eb-bb1f-6e397dbce9be\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDemS7hfu7C4v12X23zLRrSiL+wzNT5PZqByxJfk7ODUAISkaUXE0MGiOHzixm6ZnCjwZ2dWK7V84sbyY906crrEEYT84DAC7Jkdi0vmSQA2gCQNMZGA4/RiV3enuEyozPvqaiTRlJX7PU5G2Mk2U42ksnhMXX9lO3qSRLqyt1zpIAwfv3grzMqcTLea48vuYtGafLNrXnxalyexL6vInwBQciqHRY1m6BsjiTfMwk8KJrQZUL0zB4UB4ra3WTbHfSy9WhaoFshsDWl7VvxLsWvRW4tUO5i9akv6wK/H4lENwRAuakglPV9uJb48d+QLG+z3Ni6pgKT2TjVarUFBX03 root@45d78cee-2883-11eb-a35d-7a1d48297fba\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDUvZk6iPXAn9yJ1sh8uY7SRSnxdjio4g9/vss8C03wKCq2Jig5VwmkjUL/zx7tmkyGLEgajw1G9ELgCw9JuVTwbRPUvD0MLVIkcb8LC//oOsZDX1/T26pXUg09UbQJQj+o8VIYo0Rxfzpbk3Cc4h518AhRP8EdSImXsAWaPVo4hBw0GnX6/2W4Ng86KNYmjwXVqb+B4RrBZol7TiQTWoCgIIJ6HDXbR8fCMFL0Bw+pKZ0CuKMd8CDpeUMHljQqTrbuYUjXWN2zZvy9jx54M5eG1mkiP5B2SRax9BAUmM/9I7tFC3bHUXmX7fRiXnHPUD1kj71Lg2R2YuvJBJoFSIs9 root@47ef9423-4527-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqVxR4D1/vIMz7TcMTeiFm2AspJUN8e96vtYIuG6Roai4fa5y9pLNvRZI06Gz+uzF5E4oYe8UPpsjezvssuvx4rA4QvbAN2xfv0fuLn0AW6O7tFYJkq9ZIa+5YXdYHAomuwciAcQPl/j/3wkZRMoE33pU1NZHdSW9pUFu/vbUp+zVP7imGz/K7z7Jw5LrnfNv3OEtXyGGx//0FljGcsIEe8augyVJFwF6xICVVD9b8N8BJ9Zw09byo3pqtmEZFwshbpBTfSseDKZUZYwtwQjhbdFw6Occ6H2hX3KIALv1Mzp8G+N+XZgglfn+3Y5z7VFA9klcpilYrx1ztav/ZNBKr root@92e1dbf5-527c-11eb-b6a5-7e8b7adfd54c" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T10:12:43.709-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "629839802801-compute@developer.gserviceaccount.com", + "id": "2010556893027385060", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-083", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-083", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-083/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-083/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-083/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-084/description.json b/audit/projects/k8s-infra-e2e-boskos-084/description.json new file mode 100644 index 00000000000..3b1d658db95 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-084/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T17:14:35.067Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-084", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-084", + "projectNumber": "77573782464" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-084/iam.json b/audit/projects/k8s-infra-e2e-boskos-084/iam.json new file mode 100644 index 00000000000..6f3e05827f5 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-084/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-77573782464@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:77573782464-compute@developer.gserviceaccount.com", + "serviceAccount:77573782464@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-084/service-accounts/77573782464-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-084/service-accounts/77573782464-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..82da0ee5382 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-084/service-accounts/77573782464-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "77573782464-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-084/serviceAccounts/77573782464-compute@developer.gserviceaccount.com", + "oauth2ClientId": "100204358775026227866", + "projectId": "k8s-infra-e2e-boskos-084", + "uniqueId": "100204358775026227866" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-084/service-accounts/77573782464-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-084/service-accounts/77573782464-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-084/service-accounts/77573782464-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-084/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-084/services/compute/project-info.json new file mode 100644 index 00000000000..e0ab8328916 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-084/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDGzABfyA4bRD6asnwg2TfqB9jZYs5aYQbg5WOUOwyQxgMA3qf63qpQpRJ8SvpEc1RTVaQKUvqG6ZgCRgrEtrvs9DExf0ArmozhqELJkml1Rkv3Wssf9f/FxI9LjNyD61TzmOBsqf3zbELc+jSn+qNxhOTGshZQ++qaTs4hR7Bs5kbreQAT6Gl2Y0PCRE+tukKFeBzHX6Jka1ObZKpoclk8qr1zGnT8DcYKNwS2aNxyrfk0cpZ+6w9fekI3MUp0KUxyjupHeptYNlHCHp14gFLSJfpnTfBXkU+e0AUDfD6nkWHZEifmHBglAcizSnB+Kr0t6BhmKE1ABL6Zr+/ublq7 root@911a38db-f112-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDpLqMPBKf5O0TZZ0DqGLhi1YkhcM8bvSclUVcM1n76UE2pwRnJjcp93UI9OT7vXpOM9+l29VOwexmwC0bVolKX4Fzk/7doLdiSX9Z9iRWi59QApdyZ/ur+IdlwHAPBrz/uCnG3GJBulCXfQ3CpgNwAIudulD6RwgvyWcN8hkiF/9dpoJqsks7w3xP9n+oZRqtB2SGOhw7RrrZBB5RTBcLlR6ZddXGnNwSImp4WGdgg2gDZI/unYI3k+4cVC1cAi6flvI3H5403D7Dsh9KST6XAAd6Y4fd1bGgU4E7dHubRVSHs+1emGlI+TpcrTjBtxxhp3nnstrWriBIGj37QhLcT root@66e5753f-0e3e-11eb-9c65-0a69ced3f66e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDdaby252xANUSoFEa0YE6AiiTcMtIC1QuoZZGb9lBK2m6qRdjr4qx2FAtn3XIJlu83I1JrbmYF166BPvHMAwdKErkkFfyHmvxW7N40OpRdhi3l9kdkLH4/Ac2GsL9fvLX6PrRGfKMupI9pYcOw7cNR3HmadDUDKVscNhqrUXOOYUXq89RRcZIebSWbmVZEDi/GqOHhLD75L8Jc8AyDFPLjkYPd6242dsx8+v4XHDwhS+dkryWpdqrdto7+/d0n8Aac56do3sgjVby1gF9eUiy41cc/XMZTcHuCKlkdCpjSUl+4BWsnEU9ccgZWpWVpQ8dGBAPCe7pkdPajNFgI5r7J root@6258381c-2296-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDGwjZP2yKbrA6Zl1fxjj5+RheuBwMQ/7eduX7dUtbxAddWYetXSGkW78kNK/WLA9mzWmkbLWNOjJfqn+ZfWCMzsOegUcGfYeloF61J2WBE6nMKn/jdTU0spLkFUNeLxU/6dj1C+fxe1scUMqV3JN51LNisZaZUD/P2Ao27md2QyDvhqgEc6JSAku8nxKn2pCs7d8rP5WDQYpjBoWqjQlBYnhS2laH0NTc/RnflHQp0IqvBiY0rdvFntThEuS5TnzYlgmCDiwLi6g5LKG13j2ELjAYOZLQfx6rNc4Qvre3qk83zR4j4Rwj7C1wJidjdT79XSrAEvGKExGZdNROgAmXD root@40dfd130-2a96-11eb-98a6-ba1d66ad0079\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDruW0G6dfMn/8OV9cTfk9FwXo+09A1O2R7DIkd9OpCr9KZrPNfMEgYAxphHxTV+zGL9OQwSLMlndmb0GLrBlY4GfapDHCJRmpNFYGaWwYJd1WLkUBM969OfXePbaXaWfde+AjDOvKPMbj3kVw5dNZL05rQzF0ftdk41qKv0iiy/AjE8hSSu0hQP7QhqBCmISEN6K9e6ap6rLnJbv2FrHwJoBT+9bOTpxL+Y8vgK7PXDC9+kWGY7D3j9azVp9iWADozOLVuhpz8JUpBfHoHClcQD5uikNrguXxhmyVhixwq2v/uTuJOp30D3102h5j0yHcTJyc4zovaogvI01iEO5i1 root@bd0877fb-3e56-11eb-8da8-6258f8057dc0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDUMF8Mpovy8plIARDnTfNtBVMM1sIjsJpH7nBvuJB2z1XTBTgKp3z4ELbdy0ZLr72BhpWEP9hv1xNUh7ruH5ufYs8P+dBJjimOnj/jedo1FhZ90PsdJCvoVgtV6tUDtd86PvsKpwTRc3SBR+dKU9W53CuWNR6POjB8Zs+25EFWmItr1P8tJafzL+lBlZMI3Y6hcX09UVZrKP9JvQSN8CFK5Vv+vG/J/XJA7bH+WpMtdrg6nafvccJtAOq7FsD8dGbJwDJPhyOZR5UrpU3yv0k18ziEJclkJo3DCNQStwSBPgGNexm8a5VA4U95gZz6smBzLNw8b5Fr8oVO8Z8HVYTp root@97f783c3-3ea2-11eb-8da8-6258f8057dc0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCsIgKov2cuwyZJOebVLSEB/2v+SBi6+rjpKHBVSqkjQ1J2nbRdVeVMRcsz2plaXBY7tSK2QgNHh3ClGlkS/0hTJYEI3Mttz7s1f+i1gBo+o5u9jw/JO12NNCR+XDZop7kMrOu/4bDEZgGvxWkMqxyxNai6PyCP2pPyuxycSeaVEbWWbWeAdNajf8OMvsuB3Ij2uK5IyJwVeCQIIhuhAIeFej+Phx6mh3UnzKm8WObJtfBcXY7xz8/qiin6uf002Ef2+sXF5nok8Psfb7D/fl0AU4eIvZXuOZ706teneimG8YEiFC9VVhqIMozEzbALSkYXNq8AyssCHpGTePiDYhpl root@d9dcff78-53f7-11eb-b6a5-7e8b7adfd54c" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T10:14:46.761-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "77573782464-compute@developer.gserviceaccount.com", + "id": "6284353620915535465", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-084", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-084", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-084/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-084/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-084/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-085/description.json b/audit/projects/k8s-infra-e2e-boskos-085/description.json new file mode 100644 index 00000000000..5bf425bcf6b --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-085/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T17:16:33.596Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-085", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-085", + "projectNumber": "811589786980" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-085/iam.json b/audit/projects/k8s-infra-e2e-boskos-085/iam.json new file mode 100644 index 00000000000..9a26031453c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-085/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-811589786980@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:811589786980-compute@developer.gserviceaccount.com", + "serviceAccount:811589786980@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-085/service-accounts/811589786980-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-085/service-accounts/811589786980-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..217a995df60 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-085/service-accounts/811589786980-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "811589786980-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-085/serviceAccounts/811589786980-compute@developer.gserviceaccount.com", + "oauth2ClientId": "111286878547893866175", + "projectId": "k8s-infra-e2e-boskos-085", + "uniqueId": "111286878547893866175" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-085/service-accounts/811589786980-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-085/service-accounts/811589786980-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-085/service-accounts/811589786980-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-085/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-085/services/compute/project-info.json new file mode 100644 index 00000000000..c6fa6c838e8 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-085/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC3H35HBomK4lam34W1THmIYrGL+MlanfDbe0touGlJLynsHmn9qJ6KTMQFjM3b9k2lYAySx7frzLCR46aFzelcj6wv9GMFszP/f2NSfjKJOG79MX/Is0aH7RG6wxiTLgLN6+7mzglBHfH3w4RSw69jmSsqUbSGe5R97vVajKkBG3p2SC1WawWl2aEaUkrzRjZiX1QLJianBVOet4fQMlEpFBqNOUgHH0+AmTXG5Xcj8JQIrglDqCTwzoA87WtT8qY/qMjYYQdQWYn6IC5eH0udUJ/y25Q83RNfXwH8rVIEiVkZI/Um5kxUK1VD0GLHg4WAXrz713C2NWTOnkMzHBLV root@65d73dab-e0b7-11ea-8c67-968ff53f47c5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCYUNiuXHeui0L+liFcvP5ViO4/LFJptCZoQHYXBSBz5NqTMvOn3tJfpdZXzSa4tV7XMBXgrmMvvrzipfCpbfug8KEzXxZ3/HlwZDIgkh57VSukAX/AqUxPrdGhagqxug8Y5kdW3pfm2DzkKCo9lpumKNlVxyWPOT93RZHj1ummdYpJ9SzoJ1jEhXj3DcR7QVKbmZLbRCFvYxRztYlSz/HjIfzii7SG3E/MsAhiZZ/Em9A5B3pFlly1dtsWjowomqW3omKLI0Ke784Nsndipou+Q5VwG2LS7EtSwsVFTUfipyP6gTQrpUepBFL159lh0DNrR35pMYBQhPTjURB3qSZ root@c7d8487e-e838-11ea-885a-2259550e0d87\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDUUEwlrVMl7In2b7Sg9TCgf76E1R4ZDctqSqpkGBxQfQRbguOXFELoNJmnhpgrSWhR7jAmfvgUeqHPAKikOIwE9pY0qOKaWFz2WtFGIqJT7S+tij3w+tlaSUeuESWynMXi9h47JPYGNiO2yRiw7wu6fH3Ry5bbmLp0zPdEwdfF7fDdNrCWMKesGEVFp9TF7fVwQkKddKq1RKAt+nvAULKN/9kIgEzqJ5ZSpKj1CIDc4lYLaBqU5bwNW9ZYOCttQimT6Oluoc9Gew9y7SO984S743Rw9poBgooI+Q7ekOduj95Zw4I4fZsumVejazJptltwn58U6T3e+lUs91ogr4bR root@65a017f1-e8f9-11ea-aa1a-c6580c04344b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDaF8Do0cpR8Xt5GrqBAdKYrP+farGBSyJj7ukClD5MF267bflpG4B9vtHvCI1Uz+ejjLABh9j86W+rVzPQOhGiVLeXnmyaH2DWoIhryuzSBFau7gB7thix7qkKtnB8bQL4vgpdIC8mb438/wm9htPlom2Zpq2sw2qfPbOkVtkuRu92G9/zWolNXFLGkavQIn2xdWniPZenQpCiddNN0BKgp8g/VCXj9z00H4Ij6uJkirS9Om/T16dsQn4upSNg0PrNxse84+LiZix3cjpBavJ15+07HPtv67gsfX0deqydrCScbchtFIamuk0Dwq0AvsXuiG6LT1786pxJtSXbiFDZ root@1050fdf6-f2ca-11ea-84bd-b6fb6d83c68d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDt5Jk72jshCRusuDaN/w0lu5BrL3o7uNJlDkP/PmHWaVKjCxVem18T94Tk+k/ceiEPvmV72jkKYgnV0/w3AllKcn/nxqyxMhFCO2aA7Y3apw5t7pFIu6qbBpFMapizaIkkmdXhn2y+Vp3C+7V7H3vRTl7qQRmooVDscBb15Th06eHDAHovneqB01lojfDB9vF8gLkkoDyEiYIxjr63eqIPVjhPkSSfZY05ESISeXhGU6YQzjcecsVfk6XufKdWTPmiG3w7Af0N0sNiuaHWfuwz0EryxC/5ebsoUsVJ/CBWso9iz235+gg50q6RTg0+zrGkO7eD33uliYTTewhXuWUX root@a7900bca-ff54-11ea-b4e0-eacb7c15c8a0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCXd98UlZEZmrEfT2bOKeR+6+WCDkolYT6hiLltqYQ0I9qLwZryqYX5F6gxhOvlrqtWXiI8u0rX5q3B6dkfLYYle83JsZFjHX7K8AuWvKJXoy18iorJBoT8Om63UjLZIMiY7/AfPn36Aurb+wlWsHtG+3i2lltSaomcuKcZvOp7Jd06wxcp2HjPfXk5IakIJ+kHkQqNLaGYVH/4C68T7cmsiTWzIOsZWH92GHIODX5Iq63qC08Z2Ru7ed27/hG2ALj7YB+SK5SXYpcSiv0r7GfTZaCrkkLu2gHoT1hK1BYHwwUbWnsfsn1JYMpvqZPh/Eu7CRKDwPitSwMcHXA6oIsP root@b5685c51-4230-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCzgo+cqgpUXeSuH/F0ZaLnU4xlDhbjIQIrH3kO/tsIRTODmFOdghJb8JzjKKGnjspB+UqKGpDXSUH9zBkJ4rL+wiziMwtJec4IOASNM/hoOjDSJifl/t9/0BVPApRloPoSNufC3QGhCW/s1YW3S02pN4Z0Q7VwBzHMjkCY5CATauYME/tRXuGXEa2f7dsMSb/YrAWQr5MxIJVgr33YG3dTb62dG7kOG/rGuL49oBpCNi/YT6XH7ZCZWaOP1ShB+jsKTYpr9E6Uziuxhi8YXT6uO5zplRLKuWRq4mPmd5mAR5k2/O8VtvgLe+bykvF22nLXwEH9H8UALthazWUW+Knt root@d6dbbf9c-46bb-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBg0oMPFJHlwnojcY0NH4GDGD90sTp6cCrdnBJccMxLzUiX6rIe8Yb4OLbHQKzXKuV+jJosZXEAUS9msy7ONUhDF8dWcFML82L88ZHRcQX2WXIHa6a46dJWmn53qGsNI+hwsPuCbmecvhnz+wgliJlcVFlJdnTvfd2FdLu5prTIZtyV6t7aPBRGMfuTjWBbh/Gr8OWw1ywpyFVpvK4d/lG4lTFw2BfAsQR7HRgljdRAE3KBDLkwt5+bFYkbIMi5d6rEFfcMLnv1Fp3dWrxI/Fx56IahSl9oNmXXVZbNBn8CxMRu/sbv2RtnPjM5X/fQgk2rJfFTwEffmTRFi+LdaQT root@b70bccff-52e1-11eb-b6a5-7e8b7adfd54c" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T10:16:46.435-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "811589786980-compute@developer.gserviceaccount.com", + "id": "3550454096305339921", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-085", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-085", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-085/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-085/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-085/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-086/description.json b/audit/projects/k8s-infra-e2e-boskos-086/description.json new file mode 100644 index 00000000000..cb537f1f0ac --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-086/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T17:18:29.354Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-086", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-086", + "projectNumber": "673212858560" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-086/iam.json b/audit/projects/k8s-infra-e2e-boskos-086/iam.json new file mode 100644 index 00000000000..a90fd3bc5ef --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-086/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-673212858560@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:673212858560-compute@developer.gserviceaccount.com", + "serviceAccount:673212858560@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-086/service-accounts/673212858560-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-086/service-accounts/673212858560-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..ece02ecac94 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-086/service-accounts/673212858560-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "673212858560-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-086/serviceAccounts/673212858560-compute@developer.gserviceaccount.com", + "oauth2ClientId": "101644646174055430656", + "projectId": "k8s-infra-e2e-boskos-086", + "uniqueId": "101644646174055430656" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-086/service-accounts/673212858560-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-086/service-accounts/673212858560-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-086/service-accounts/673212858560-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-086/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-086/services/compute/project-info.json new file mode 100644 index 00000000000..e1749fc9473 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-086/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC8K9WgnT8ZjjcWAZsD6xYPbl6xGyxE/WGcbQPVtFUuuL5tCyzGvTJ6DIgeAlxw1CDrm3So9uxcEhJqLP8Byean0p4D4S0cpoOzXFzCoZ33DRAZ2khyzvQiA0EG8TiJ7ElWwrB9v+gJwEesfirIQLyyxa5THJjzR28u4VzAd27YSoIjllM+qMutf+BpHLlK3IsrkbosLcyY/yCMpoBJ1i3UkpOYcnW5jUMcpT8duzsPzbFpSm85lCJj4towdVgRxwDNVyivbD2i9tDo28OkORtAgzZem7Rgj8UPlO3eKFrq0R+BzQJ/x1ScWlj+SbYoRCbcGXbir3D/mr6VU+HsGWvZ root@507af063-e32f-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDeWdnHYXTdQ81PGfJchbkv26Mr/6KAv4RC2Lf8r16l0XCoquyWPhJhpOM3cQ/jA+ge9T6CN+9l1Gnp5GPMc+YVmKWhNCxqC5sLaGsP5oAc3Cg8l9yKhtrgyjtFW4hY3uij41O5R8bp/khJKHvqUsGuJZJ3vTNcaChl59wh0caj5eTjSlsXKwB6DuThwAeASlcvSaYLLTQhzAyi3HpSEoTM4FXcIYfKqv/LXoHzmhynacIEPfzgubr3h6otYEwnRcJsHs0XlP5c5AbNwiC5HKkqoDdD+LtVfskBUFVF1m5j4UYuPfSU2sLMUJh2knvy59sRHvanDgy1kZIxdk1tJ6eD root@62462d1f-e7ba-11ea-8112-a64f894a1815\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDjDwS1NznvcfGtR0KUHitTQXvHNmzYowBnttIQfo4Y3NWNzvuHWeThWcpbkRCIEzHYcBWzr/pFRMjYJMIlZzFOVIqJNVg9lgEr+HolLkQT0QIfl2jbLjtQdMZ3kpbiJHWpjvyoWGpbLK4EeUEhJLU2hXfMJKObMnAEYys12cQQC2Hf10KhkBv9fa5KVkjQ2mdjZb67BnUGMSf61kLNQ6+o6OmZLAs9f3SuST71v009GyREakGBxfRAJ58JhBhtQPsm28cEM1d4H1l35kSplxhvQeGyc8mWOvFAikXQxxc3sNa7uZkXonOj23oDc/FjyHTABz/wgx+rQqx+H1pMVLwp root@d1bc02f3-f63e-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJGwrjr5Zep4uA6kvbfbEGGsZjoI3Ch0k6YqhOqSw/66S1IXd3ip4yCDE3qlCq/eidQh17IkFZh+Hg1gwMbVw0WloYWqJluOMJukmo3TchMJBzqsPbyUQeZryTP0YyCQP5TT5JThldJWqhm4g45EGZt9I1e7GEKGA5pAANAX+ev6L8FaAd/Dz6ecTIZQt1ECku9R/UzGYkUe5Qb0B98ypy6XSiHx4av1GtiwoGC9YCL6qylP3cGcy7eIpJazmUrqNKJ7+cQCH7VDSdgBBAOYgf3uUq6t5UprSIMqNuf6eX8Usxm57UqFZZo0c3nZ1RBPvf7jZXYzQ6eTqBls20plDh root@d971670e-f967-11ea-926e-7e7ea190b727\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDAtUB4GaTzjtFSj4OpS5BQbCLNS3Efz019+aeGF+zvbiDU+sql8jzjy8f3LRSSaJVVOKZAN0V1eZXpDT40h2GXm0dmVdwebtty9on5bcIMyWuiWgng3R/8+XoxQjBzzRA0jOfAfqYDoWvgYsLPK9Qsc92PiObjE3/aLp72aBeURaAcG0YCAVSarDVdlkOAZbgVlIK0wIpjTbzU4iJgmdiIR87G8XagkOeP1gn7Um6D8tSYPnWulxupG3QKOEXI/slFXzQbm2ItbxUk+lpQwEs465dTF17M8AMJGigJZCEEkTGDQ225K8p/2htfz+8jKmndNK+BnoE2bvmg7PS0p50B root@d4f2f1bb-0fd2-11eb-9a04-3e74eeea3a1f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCehl0ht3CBLQMZ3UM7/T9yEK5IOe2GnTEcDWhFPwH4E9B9bE8m02wdwRoBspNIwZjaQ1ijZN0UP0xkCHc85dmUCQl3DHBXSsJvRt2yZeqdGy74m3R/zVrAHi+AUTuWRseRCoxMv3V0lqPugwnzXBqrJqRwwX1SJartIvOv0xEAvK/aK2oVDDkxEITYp4oK5alS+T9nwey0GpSfd8/J2YrhKRz0CNQ0NiZQsAQwexbLrPHR+qjH0hFPp5lDNDnGCCNjEAYwFbZelCiLtRUn9Q9w08sn265UO4kG5JUROG+I7zNEZrm1rBC5aHihz1653sk/qu1krJX7O2IvOTfMD0yp root@152ed9c6-24f5-11eb-bd88-f687e5d66392\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9/Eo2VGWADIVWv0ZVHbag0RMMbynLEBr7CzLFtwssbWSZbVukxwE4u90438u7sJqFdgVPhay+CN+b8eH+rUdwngdTtIKdxbACAFIzy96Dj9to1NGzo3eF/uffuE+qiUpHgq70uUn9IJ9OsZ8rnnVVi8Wk8SOlx+GP1Orl3xwM+wDuLEdgsQgXs66ikKtQawB2GaKCqrS2RUTrIBLxK+i+KXl8JHL6tRQDHWjHHT34mQa+VppNpSlD9x/71Gr+O+vazXzOrIXVCGd0NvqlqanEM0tLBap09iecqHC+v3RJuK0+CyPGKgsNuVhif9DaPWuSvSoHRN0c5b421eePWuE9 root@370b118c-3347-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDr0efCeL+3o6Rpe3arnpw9lsNnb/4jwurWt0U78oxTma/CA2uP+5GfZKbjqzd3yv89s44QkB80BGJGol6DDS2Zuxy+53gbCkdbl1dA+kr3yOb12yxuJC848rsOmmpHP292EcAOWXOcryQhKQhhpckEcv4Ijjd8LEadYAB17YSG8+83+w6mFTkpR29CH7jj829zPxP8oLUORqTDBn4yoFzxMrzctosGSxuREunvpctQp2oHhUn5gNaeyw5+O0svVRy9u7ZG9M1Tr7q94A/++P6x1A+3w3c5CYyg3r1fNGq1S9JaWGO5VPjK8dPfgLnm7a1s4PuWZCJGTUUeP47kP+t1 root@378368c2-34a9-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZKJ5ZNuB+fo4bEhxeaQGNFWE2eVr9bqO/HTjalwCFFJmJw1eAqSjJ/KX8KI40U1Ly7HZ8RZRoy9a7jKWcKR9QmVGtsxnOcvOUoaa1pffE9RdtiXjMo5MTOgPXsA+ZJG5LHoPrpoayPKwaZ2Dve5A/qJO08gW91T05x7AenWd5tOmAJVttNFubcrkUCefS2OdHnF6SC4rJQTHDZtkUS/+KbMBFr1qMCPMk5Rep70vzZsEneRLSCY/StOZJCGrYx60jKDbr+CrBZZhqw9o2BJvv6VvRarvyhLidJHii3vqzmOh+7aec/1VsLg0IMr8pk0fsUi3Pq0JBJ7GepPHE7p9n root@fa7d636d-3bf7-11eb-a772-a610f2f25584\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/ZlZSuCkrwHYY+gBfeb5UiZdjaVidOfAbQTPujRuoe4I+GzU9oQ21tI5XUUs0Uj++MG8J2TCb6bTtqdgvRUfB+D4mouSCxYYyaEKTHobywgFhjwtg5r94cIySIgV2EKvJ0LNXMEoeLLnIOoIju13FTAwytmdfISZhHdXqb9CW0XlwNFovmIu95TzXjRB7NaY98RfhCGmxbmuiiDgs7cqBZCJFiRZ0OIkxhGqTi15PKkAVijtQqjNHNcBM3nAkLRlrnQfjj2TUmmu+8fRQYh80UItwSMwYF8KaoJ+r7teDBbg4PLNCmzVeq/SeG3Ukrysz/bIAaL5GB8MBsGWz/Ns/ root@b0e26200-49cb-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJkqWuMaIhD4iM406G8ex0BJ6BO5FlE1dT7KvZptdcH+WpNx3tixAnK5tTPwcXHk49hm94R+1iXxTlaMINjMsYTWKJKwi64pNfI0IhynYvfavdMORbydKe2FdfkVs4xGf875HFEHDmoYJCGP6LUSN0wBIx/F3q+kjnzdl5cpqSifEGiUXiUXY5TxyPJqQy7GEm50YIO4p+6sEsEnZ46yI7VV3hk0pyUDP/Coq5oqDkz4TACvW1qmaSv2/f1mVUF8LNzfdiIK6EX4QsqPJRjipfmSrl8mu1/JeJyaQc9osI9WQLl7df4DSiK8awq9C3GUdkPl7RRBJaI9M9AjtqjSu/ root@a8da60be-4bde-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDDKDw8JTe6upnUqmX7sU2sOl6eHgXzpwqG8eodh8hR+uX0ZaBuTrxQWZ8oV/kUFiUECawoaZPJD/LHwSZSzNTwW/rr5mYqfpHvfut/CI35xZWfNlnLCXwh3if0ydi8u97hqmGwoyl1yQiELKf8ova/tdjkykcfLpuB0ExrjuXDrIfgQjUeN+gwcliUoQLau9S7YTgdqJPXhSuuV0r4apKZu11LaFX96K9BkI5WfD2HM/LJsgHZD0OXAH2OnAJui9jmgqxBU8DoWYB1/QxIDUEha/xtfxmCn0fxL3pSoQgFuvVlNGQrLqUbNOGiAInksr4yfnYJTLo40nm13mHXZwO5 root@a6c2b1f3-4ea2-11eb-af93-4e5abfa0c065" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T10:18:40.212-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "673212858560-compute@developer.gserviceaccount.com", + "id": "7135728018585829248", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-086", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-086", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-086/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-086/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-086/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-087/description.json b/audit/projects/k8s-infra-e2e-boskos-087/description.json new file mode 100644 index 00000000000..860126665df --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-087/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T17:20:35.237Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-087", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-087", + "projectNumber": "778305761806" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-087/iam.json b/audit/projects/k8s-infra-e2e-boskos-087/iam.json new file mode 100644 index 00000000000..575cae6c8f3 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-087/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-778305761806@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:778305761806-compute@developer.gserviceaccount.com", + "serviceAccount:778305761806@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-087/service-accounts/778305761806-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-087/service-accounts/778305761806-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..b66ef843ac8 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-087/service-accounts/778305761806-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "778305761806-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-087/serviceAccounts/778305761806-compute@developer.gserviceaccount.com", + "oauth2ClientId": "108839388529543419108", + "projectId": "k8s-infra-e2e-boskos-087", + "uniqueId": "108839388529543419108" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-087/service-accounts/778305761806-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-087/service-accounts/778305761806-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-087/service-accounts/778305761806-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-087/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-087/services/compute/project-info.json new file mode 100644 index 00000000000..b7ad15c3e18 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-087/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDOJElOpTyXdP9W3vuCvnyTiGU38mzjGGr/2ZvH10JdFZddU+e7xYd6gkeOM2y8FDZXw6hcYZzSUaHTQpeZvhqIkSOWzZi8fscalPa3PBmhNQk0YpPrzW75AszHaDYoxAuDlTNsWH5dc6g3PjEmaYHfyWDZFK/VTLJurk7ZZEjAdP8WSRkGYEDW3XIiKLst36R34iz/EjsXN8RbavkHWdkLZMELHsLlQwEVoVpg/EzpuTZZ9vsbZtnSRhuYWphzBfPnddirMzTyOo7kPvlmNo1Mm/EVWaRxqlAq1UQr6MPfVhchcm76CXbo0AlsYLpyD7ZiILPsIzBfjMDQBrIDlzU9 root@749ff485-e394-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC3tbkLwkfndmA0xz+wsE7gpyRB9CgkZTLPWn0zuuakE+xBddoFtJuljIH8Ily83iFFcHz32T29eWtbnur6le1VbcvEyUQI2HUq63h9zsusFoJycCSuqRFHogSTypDEIOvNFGopPDPVY+5u2zrWLy2tofh8lsdRYNqGqreZMywFB7utP6Qq/Ojz181/67NarQDGm7p6+EZxZuxX21L+ygWkiNOiTm0KPScefXG0FC5OmxYGuD3xnfa0BDENClBt8+s6dmTgpHvUMTB2kIskNSXnCiVLmXbn1bJPrtKIBxieVrY+Ataq9yjwZs02rXxe6oLBueOgOYL7Kut95et0VDzf root@93683b65-eeff-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCiNwW//5kdjJR2BwH784QlUE+MhOMFsgZ8C1+Oj7R/+kYO7FrBWQgqObUy73XzcpbVTosnIOZs6pDYD3ZI2PvNcv6ZJEvB20HQLxsg56fYvDexIAP6u2WjeRsgqsCxjfTRcz77PIwyZhCKd0O5gT9KV4BjhxVE/q+H4UNRU4uffH/ZKL/powXtCVjijMEckEj42imut94ZlxzrAg/z7gXoU0n1RifxhQ2+9HNABOri6/Udt8joUkt5j+4e35hHCXNQdq6YZrJQZpQ9Q3sF/J3Kvmf49MkSpVpuejM05JOmDP9FBhzPlmRsepWOcWMKqhVD6GFmRKQ6pbi63McQ0n1z root@48adffc3-f394-11ea-a379-bea988342348\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDyt4OqFTmwxs4th1pP4y72+ZEoY6JSu5qcL3MfFUiPIk+uC8AfIkfetbVw698lfxta8jlhknxpd+SmPABhWV+gCJgZJfI+5S3clhrYj/b/wHmYHNDMxvNIY5/l0HzlaGxffBa0gAKAhVY7DJBuuWFmHssbjcnmLgBH0cROew9DQKMIMohXCRP1Fyp3PZvhUYsZUR/uypz/XjfV5fNCr3utEdDWfMJ0F9MUGLT/9cuCZwL8Hj2NAJZN7ojojD2NBTSI30cUYFww16dKlPzHfEtqFd2KzxD6QcOqLD6VW/gA/DnQodaQ8AOhC5nAhTRT59YjrYc57JzfvX0ggOzXJqJ9 root@d4b0233f-0e0b-11eb-9c65-0a69ced3f66e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKu7k1Lca3TVFZJB9bk8NZjp49u8fj84C9zbntWvYehZn9r0Egt0zrjczAdLshPUIo9JPSjNKqFq3D/C2XewxYokFkGBO093HDpKGFdnSUjyen20J4V14S5M+TYybTnm0/iVfOZMyLoHw6JpZ4og6sQ9WF0sAuOO06GQkidlguNfA1emd0JhAcjOqPw6jKJMnWc9aOhpftBE/OuGjd4i9sNUJnFuJ0lSSe/uvF22NCxYQjH6YAM7ezyH3ANvsh4i6hHJnf1D2pBVsJ+xEERn71r+d2il8ZWtF+iAMjbF7z8aeCreOiNIIY/tp0Z+FqpcXlaPcSXh6cCbIjvKPySIFv root@09638882-1902-11eb-ac0b-9a760af27878\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCvezcUe8bvL/fmA/6ucbn1fFPhRsaP/Eqm9a/v8JNzetK0+TKj6J0arRZ+YFJLiQ1+88joxMnNtD4Bgw8kSv9kj37nHHYKV4OzyxQgmWGqFueCLeZg5dw4w6nas4vlBFlNvJVw1niPsGmrlq7RFCDklaEmuacGubVUMXpYOF6rFv20QJA7PS9H/kapPqt03qYvGBBzz0O8WVAw341jDL5TgS2yfFhvTVdqkbPr0ORFnaFxxCkBbjK1J+vrQ9y1gGu/OureEwUzR8poJrjbFhRbmOwj9FSiZ1qr5vkOCDCxhyvxUFCPp3GSnWiQY1Pn/AVV/kXhpW/rT6N4+UX+P9E/ root@350092cb-1e57-11eb-8d52-9233771f1447\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDPbDvy7S3GG1H5tW28UNyDjD5z90tstm8BEFXwRV+x4A76aG5xYoW/Zbs5aYA+ZeRu6vayybl44wNCTR9dGSlF5W2CmUltYufIhnlc97IgJ200VkfiLox9AXTS52xyg97oNEQrlFuYxNMBoJdAUnkRJNffq+tzBJt6L0R4VQhsnFxIhWIovirVezW+iIVoFcYQE3sQDALbSJlZ6fJXmN/nZnWNCdbGU5JYhWsgd05yEZXSdpPXf+DrIeJr4JkN9au83ijg6yR8AOaQ/+OGKlbe99PXaaR0lCykR1iKY8thSyoH6s8FvMEg5hdmhBZ3iq3L7b17z1kB9DIInpAfo+mf root@b8c0bc7b-1feb-11eb-bb76-36aba4894793\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCjIOHnErI+Ea3Bmto0T/1zY9skDrdYuR+AM5Tx2deVx8LB6lAV2/ZIGygr3feit8y/5xm0HoAqIP/tM/6Gh9rHVOx6v/ShS2DK1WKc6a4jVkrsUPuT+9yAZ3HlBZ++XCbkOq2gSq21hUxi3oc+dXVqlPmaYMxQrzrPjY9NOv1FN+0hSNQr5+7y45Tlo0kNEqBA33psp0/Jb2TFkKx9y/Lia/Hv4ySKkeNWdBBp/foFX2aAhzwUJXDlidJF/ncPULfVwhpLlhc0S5X6+6dFiRa/kbkZQXfvfQJnKp9fmUOosJrLTqNqnlDDRhGGin3wMfcF3uV5/fr6tmB/NmoG4lrX root@4f1000ae-23f8-11eb-ab3d-9a499a0fc9e5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCv4eMM1JItkfhG912fVToE6dEVwOw9gC1Ob8abvTeaXscNws8C3u9ANWqj9iyGiSEOcV/JolABcU05e+lO4Xc5sE+5EPg7oULFpQEtr2eXhCRCz6Qdkwysn6NO8zx5+WeCp+OZ7PdniqUlkQleQKWRqSSbIJ6O5Wqzaofjbxl7ckvm4cRmNJUisktzedcHZNZKn8KmTMsIit78pAcyWz6MvGJqc7RUCFNYtasWZ7Yi/hs6M0PPJ0mBMrBt9fiFV1g9vTAmcz49oXnv1U5DcVZXpl1pQXv3yrxzfkLj7psVmZcEFwou71xWRi79SaUdUm6kv/+5U/5hKH+WPcbvFnfb root@8da3cfbe-2689-11eb-bb1f-6e397dbce9be\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCjhanQ4aJswqrdRbRYTs4IRsRflnAwR7nhygQt78Y/noVrqNlTnYKu6W9GocT8iwnOchrjgM5rA4F1zT6esMLzqqk+tWUT8clOtyRxANKGRHmHQ4pQfrskN8qcVWDOLTLZkBJkHtv+x5Z7IP0GzS/RnPJ55adcL39qo4a91W8f+cpTHFPAu79aL0RpWouPKHDnfLGGpLsskW0L8u9sSsTjSYpaKtLVW+uJRAYM/CZqe8L1avV5NttXSnF0jSBtg0qD8J2+X33VxCnZ/h6PHfBShtvxmCWav7LAiDBWwcC5gNqAenLZbtXTpOfXlTKeyX4W7r3MyExr2c7BVYylIaPV root@89e026d7-2aaf-11eb-98a6-ba1d66ad0079\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDAXQMnCPCG7BNqPozOE6oetYxeb/qQa2VWAUhEM0AHs6iGJqIe0JxbHvo8aQGZ0JNSy0Fp86aZatY7ZBuGAstZjvzoQiJ1uHUTIIYB8dR46D2rl+UGFrPwcaTmp9OX6cU6P8gY5ONBqUQUH1QMplGhjXwcxbiGiUUap7K4A1awNyacl2gpkt7uJRxrhuM/ke9CMlBS5E8qOYLRCKjmsVBaQBjj/jl3KarHtWirsUvNHgHwWeuZZqokW3iu/J06ui4u/PGWAnxzeLUouEgyqT5G1gcYe+/X76bnbxn5awoLyBd3LwBhJ8BQ5k7UcaqqKNdVn1vVYeZ0sCExPGjL9fhn root@c5079676-2cdb-11eb-a59c-42dfb897bae6\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDiRaS7Pph2OvTMC2KMExOdyNNutsmzFIimjjmoPpx/1WzykNhPJItclRw5Q8qfdAa7RYMdRINNkQaQxTqgu7cZCZpg2wVf3Qy8XtPGMyxtYJsA3iQFZrR5n8W/F5h16iSePRAkSOAo5AjHMMjC8/hoPcbYh3FAKp1+4UoxE4fcU6LRa1hVTP8SuYoBy6Z84W978M/f2Gf2IO3fcEyHxuJhYdhyYkXT1Ri2/VZV1k5rhGQFWNbp19atKGspEs9ULvrEXiEJYkDc5uv+7w1RtxbwjJEzkMfGM7ls9/WPvyD/vAaXGMQ6zK7xNw3NoZCuPGIvUaUHUk/mURmiBhyr2I4d root@3b470735-3883-11eb-a25d-22a534811c55\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCpQTcKvFK5YTHXNRPsYX9IfpbTXQOxzHNab6g6SWDyrLH7lOvhr+nXDLpcrCZGsT45OaPcd1w4mhrlKqX/ssI1tnEVSrEIqZxD9ocCwynKCFhocjwWojOneGaQbtT3e0Nzo7Fw1CJ/0CIXIBEYEWEH8LuggzW82qZpPi/gi/gtoFqgUUJvddeyQyoDN+vk0mbxLD6ifQySS1/zGrD155XxHqw87KY+inxiq+B4DKRZUFAL/MX6Gra804hbFdrI0PpFcYPeXNDteVRigtXxvOeF9ACwG6LjtGEbwKCOKy//ntvf+z9PEDi9sfj5oK8pp+dsGegJaSmYhdk3YRX8iD0f root@6b42500b-44db-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDgFND5nGELqelVKUbPNt9rzDMc5I4MFTygTGiEhxtLBeZJlzQOHyJHo3SASOcrYUIzWZXMlpR4YyvHuHpilupSJSdhYCZ4ZNzywQqXUtbN2PgOYPikYlxus3R7AA+HO1d4IARVtwrRBkUFxTrV1gBx6D/7h05SLimGNLJYi2PWHnf3Bgtx+fVnErxEipgZvjx6x5EPh/q9JYY94yFoKdLxSf/hurpq0JlCuGiQ6+67zJ9Ln+g+XIhB2ShAA9uO5ARBgFH8EhR4DpVYGsfmUjtoIpaLoNj1KQjJW1HYl9X5dvPmzsP38REZCbN64kEXIrkHpORviRTb2srFNxcqm4XF root@35de9371-5527-11eb-b690-769430c9414e" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T10:20:46.004-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "778305761806-compute@developer.gserviceaccount.com", + "id": "4434823227312455426", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-087", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-087", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-087/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-087/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-087/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-088/description.json b/audit/projects/k8s-infra-e2e-boskos-088/description.json new file mode 100644 index 00000000000..f281236d149 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-088/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T17:22:32.555Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-088", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-088", + "projectNumber": "119332798591" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-088/iam.json b/audit/projects/k8s-infra-e2e-boskos-088/iam.json new file mode 100644 index 00000000000..678021353da --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-088/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-119332798591@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:119332798591-compute@developer.gserviceaccount.com", + "serviceAccount:119332798591@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-088/service-accounts/119332798591-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-088/service-accounts/119332798591-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..cfba28f3467 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-088/service-accounts/119332798591-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "119332798591-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-088/serviceAccounts/119332798591-compute@developer.gserviceaccount.com", + "oauth2ClientId": "106485266792568998029", + "projectId": "k8s-infra-e2e-boskos-088", + "uniqueId": "106485266792568998029" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-088/service-accounts/119332798591-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-088/service-accounts/119332798591-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-088/service-accounts/119332798591-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-088/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-088/services/compute/project-info.json new file mode 100644 index 00000000000..b0a047af777 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-088/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCUQ+5h+6sqhD8wp2k54QrJFcqi3AMba/A2x6HEbtjOJB3Vr7lhjEjt9P2SQLbrceiA/DmWuPNVIDfm3KGWNqa993qjVcUd3CqZaYI1EYGq/WVcq8RoJATwe0wt/vsV4BEpHymwpp2QhVfubhnCyMSWrJtO1LBB4YR/ZvtXyEshJofMKGDItDznr/syZPdE87rv79QPjScZiFzQVUy/hpfWlmgvDWn6UkUS1Y7f7LjEWKAWbWzAuaPIYbThznlrr5yDLJCxqaAbKuDqHYUvS3Fv6dGXZt8k0Hd/qCMo2UYhYDRiFSs94NfDsoUlx6pAyuYG9INEObWk86J0tKNgybil root@2a15c21a-e242-11ea-a87b-7e1d84ccc038\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC16pVhrBBXS7YREt4zQfLMBcoxSPItVYzRVI4hMLvug6crp1dwxmbwdTGwEndsOBGLFxFj/VSkipefLcck9ENJlaeuzV7BlhmH9bisgzI6ig5D2jk7Y4IhbYb+A4Gl+MoDCJpT70yPvXOd97AhJBxHvyqiFdDbMAG652DMwr8z8e77xHolRyA0Y7i7dP8O92aGaq2jDnfq1bp7LKIGoh+vJMKzYSSb7mGPsZ0oYwM4xuFPFpmYAGNfElTnUjZPO6tHhJsVh1XFZL9gL+iWFyi/DtMKyvYfORATfuJN1zutQAgq+XqFOvPg4S5/IXwCQc3MA5qu63U2R5PjMng/xQFl root@3ebe1691-e409-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCsPnJxiHNzg+J6rCckqnf4t4XmpuUh0+SoTdlJ1+/DKNSNFuufkz14IVsAA9+9KgZkce/fZnj7ksageiMErygFvBIjFiXD/grNyqAAYdklAnQTvJnYpzzYSSq7FIMQ6IhS2I9OrxP8pHFygjcXidArCMDQdPSUMtvyiZuGrgDHKFXSHgVzz4CGdMiy18sQa6mz2aO0doC0IFnpx7d0QKMsvHeJTyKbjDg+QypViommO0FLAhG68rZ/MO8gfABgM4iV3FvfKntRrF82Kmtl64AYbEwAmMyrEDsP4HD0oHeQPgW1QR5O/U1+epe9tRaS4kU7ElsEa+C0xVh6F3qHWST root@25f6f62c-ee81-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDpNdNYDEy5WX2e4V8ZF8DJhJeVhQdgOWvB1vs4lVd/89t7lNycgRfti/HAP/s/k2xhG09ej2ObAQSS0eLCn5bemUrVXiGPjGCz274yFbgEVq7rv/nl1hM2icXsl2akVx1gifOseblxN9lnhPt3sIIkvwXdPVWq57RKIbygD7D20Goqk1QgPvvHWZ62kHArbeEQ4bJAlufAW6/mw96c62GkUJGohyyC0R87SBDMaLYL17GDtp/Cw0oukLNoDwiDuvMe+LSPuv+T+m0sMo/FmPy/4SspL89qds6fZedbAUsDHK40531HFfybWZkFS2SsgMj5JYkeTSh95N3b0c8yM+vx root@a3cfa34d-ef87-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDFghSLi3zRiwBsAi5GMhZ1RQ002P7uT9Ks2676qhHwAWhUR1pvi+ooE73DODumnNv1JIWPKZC1oEN9j8hOxoiny2Y5s68vivk6flzjCYlrxsCgAtRFsFqVdzUtdfww4qRO+RVrY2EIC7NOg5WgDpNeTcwPB+MxQpcqSNbo9t3QjQ+KgP2CwR0Ti3GW1bERrx8wXhGv+U6ov/pExHoPKm1rnhO5rBAWnEnqKHccniA8tIH5ZEkPNLmzi3QF3x3gK2Q1292P4QwvcIKPR+/bXOisE25yLFPO6SAeVbFwfp13TNC8jqwpFvBxVA0PF4WQA+/NhtQd+HjAsDGyQS1ovj0R root@1fee4dd0-f46e-11ea-8508-9a96569b20f1\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7hJBr84nOvWfdKxN1jPUbXhdV9oXeSGrxu4BAN7Rjll7wgZQVZ2DkxEuqI3CafN9v6A27dF+ercGs4GnRiIE0YKHnjZtUr4GUzLP0eDoqxIvYMsZ/ytXbnaNpGg8YJuFqI6bO7sTwHgFiwIG5Wea+eL4twRbIwCrS7FdAdT1nsN79C81n5/SzfTQzU92bmqM51lW8N2+8whZPC1rVU9Er8OacoLhfk3hygahjRt6N/FJcmQFnsvzVFQq7vUOZ9eG9Yq3DCQLHDMX7m7rW8ba8+9ncZbUehsYMv7aueca40I/FxvYVBtHh7Mb4RYCOyYvO2b/8+DwfSfP79KFz7/yZ root@a9526d06-0490-11eb-a932-82154e1dffc3\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDidpvb2gC0wdoQRuDsnLHdBKerDOI29EhKDCochyijGj2nDuORSO0fi2wouk/QUbqISPygv+0QHEROcw5wlk/+dUpCbLU5krBqKwwGskS2DE9z6T5cZMcsVKXggSbBEWZzaSSE/TULzTwB7Hjg7y3u8uk/S9b1r2fmmhuN2SGWw5IN2KKXgUvRf2FXm19ZuF+ASgvJbBsFQmrb317w5DmtiphoTOwmNfe8CVNnOUVvhntv3DYHY8KGQVfAJJkVwJYBOyuYIC8jyZxlyAGgftDTf8bC41XWvy7Yr9rW4v69J5LZ1bhhOjNZq8S6JcuwE3gtAPTrljMZsIWwAP9eVbNT root@d9ba87b9-1dd8-11eb-8e42-66e2cea7f923\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+1JLmTP5YB49+IaF5TgtT7Nfu9tljOSKhYdWyR6Xpn6ldkbjCkEAqhMGYYKLshZrMONSVQ76UuAWAH8/m6J3YtC62+1ilKV77RHM8E/WZpYc/msWAB1MagThRXDi0AkWGp5vMeQVxLgUgs/2qlI+/+DLNorYH4xNzLLX8VsfPIwxOqhMWtIap26WwHy/gh4fMGoDpeSS6okooteVisyxLudT5Dt58jF4qoEjcMzH8HYv8TtrO8clGQ1RKOZm/ghB8n3/6lUpRiWwX28xBV/k+1u9KtpcvPwFbIhEcsXxlw3K1qhy3hUSRvP9WlqnjyM9MRHpV1AWzXDRvJB4rGVjN root@a291114e-1e24-11eb-8d52-9233771f1447\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9SJs8Gx2hIYeCfRidd5/rIWlAzGCfyBlmIMnfnlACV1zUurGPwaZtGyppImIxZWz17V+FI3QiBPdXaxCXydqNPVQT+H8OiwT2OZMp30lypz32vGg10FIhDzpxn880MXPCMd4/8cvmbPWkHO6xYhswkwfchyIa7pDwIqQRPhiwFeUuHu9N1EF6klzjDfqcSvKjhXBfSeqfySuehaRhZy+SdxNNX8ef8kU8LugVoRn5JPxB3PExp5pH2ocdjz48dg23I70agN7ENE5EpJ4czAbM0l0E6sxRQ9ayKVMU+zvYmNzFVpnXgWaFX5lWuX+xiugFStoy41u/nA0ylO/DT71D root@d7601552-2966-11eb-a35d-7a1d48297fba\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDPusBFNUwi35FvsUjia8nWHNNKVrqP2pXY2nvBOVIR7UQzfTI3xS7MyuKNWyvd0nPQlfVrmIGnadBMdhtIbFB33WL6C/hACcEAye9s2+CbRwS4fR7Oyqi+7LZCBqLki3l1Qma42wPaLEzd9glUzIqfJtLYD7moAgIgm5vXm5zgDTVR8sH5uBFZ4pfrxXe13h7KSmxqLInbRbjK83SPQQ6ie+gkKimIqmkaQYavQ4JocFXVTLV16LY4YCv6lFJ3OTdKQEETe0Jire3BIHW2+Gh2hfZm5hqNOfHHawKg6eW3XtUhpPx2R3WxSq9+oEHmYhl3oeLK6TBPpYLaGJzlc5dD root@7ba43b2a-2cc2-11eb-a59c-42dfb897bae6\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC3cYxcQNfN0+G8A2WhcqvYJWFY3vY42GBnNc/+EK8mqprOHswiEhEwMQplqUYt2I7EbO1yOOULUH2dWJsbcW1BO8sjk0oGhRPRQbZp+OtbhWW7Nx4d80arF8QGu5QQO3ma8gfiZQb3H0Pyq3V3cpNoeRM1sJJijb3XiO2ABJFiZmWzQ6LTTP5D5qSy0Y70bGXj/RbzawSjN6DfLnbsIe8IbnDLSIy0gXQCCyJn7amD72NOrGNvTFQkSsX38ORFyUdZ4p2SP186FTL+rzPth060bc4gZ/NS7RFCxrrshS+ReRaZ1+VT4MoAiEACfSpEUqmKJWs1b3iDUO5O+vawreC/ root@b2026fdd-4707-11eb-acd8-6a2a49dd8a76" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T10:22:43.936-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "119332798591-compute@developer.gserviceaccount.com", + "id": "5528198051197107340", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-088", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-088", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-088/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-088/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-088/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-089/description.json b/audit/projects/k8s-infra-e2e-boskos-089/description.json new file mode 100644 index 00000000000..9192f3e6412 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-089/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T17:24:34.519Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-089", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-089", + "projectNumber": "222722062724" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-089/iam.json b/audit/projects/k8s-infra-e2e-boskos-089/iam.json new file mode 100644 index 00000000000..c8b5cb17302 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-089/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-222722062724@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:222722062724-compute@developer.gserviceaccount.com", + "serviceAccount:222722062724@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-089/service-accounts/222722062724-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-089/service-accounts/222722062724-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..95185fac96a --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-089/service-accounts/222722062724-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "222722062724-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-089/serviceAccounts/222722062724-compute@developer.gserviceaccount.com", + "oauth2ClientId": "101601981472666653015", + "projectId": "k8s-infra-e2e-boskos-089", + "uniqueId": "101601981472666653015" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-089/service-accounts/222722062724-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-089/service-accounts/222722062724-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-089/service-accounts/222722062724-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-089/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-089/services/compute/project-info.json new file mode 100644 index 00000000000..4481ec23355 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-089/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDhEtgGpMYtkuIamxmL29JRc/izhHLQScyHY1yXqFo0TeiI5g7EIPlly+PVIhUhkMyiisCMwrpVMqyW/1u0uIX4IkKTkoVa7NvIiiSJdgFpoXVj5j2S0qIsX0Oo3aZJRh9/QiakXsUfk6OhvJ5s1ntQB9CKTW3jfFTPNo3EFAkfZLxzwV/hzmphcuK0mfWwXInWX3rv619nQMd3rnaKiru8Dd4JqMwa+SpuTalQ/iDONkU/NzxK+lY/325F8SrjLFZ9YHhoDyMJWFdhocoozd9BV822lLP9N3GqsoSd6bZQl3Jt3NXMIkk3xSSvcOG/cfb5gZtqpEaV82i6H42zmGsT root@efa73bd9-db94-11ea-82f4-1a238816176b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSw3nO3peE9AoGKvIUcciZJzYfMmUWfZ76o4yOaoGrOrRhgEWpOdQy+t6uFA4tsw8noe3yoWR0EsgLiiRoTrUV2HySV4bAghYkkOZ4M1bd+jtMRSVHbCioASU09kihb4TDf3Mbb+zn7FbGNxPtgYzkotm7dsbPwt7lI4QxGuYlxBiSUqgjvKCK7XWuhn6CWEXjX6or+vd4q5JEeES3K+kd7WOfOcVLPOCPc12byIjs/zGuRIozD+1j2qqjyHRHVMLrQwPQnigVRrt6iSxUYDXbbQlpRREDWD4WYZX15IG769JboUlMw3XqcuNJ0ERbM3krQNhU00yDdVHlaQ9BZ6zx root@e8f34264-df22-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCpBR11xbtF5XPSUVMxVSBIRZi8vgTlA1cjItGh9n7u1tVDavHo9ajGshC9RD0WLPnDQsvUTanrX+q5fWq/BO8CzdlCyg2F2PyS1Hj4zj6l1XBPljWgSFvKNrd028YKjlQbU68mwALutlUej8cwnn0MFPXc+1i/bHz1+SuYQSNm94Nulv/JqGW4LWU7a8b92zrZjbGD/w/jYoK55XG/ZuOfGaIWuc1nTFKkaCe7LNAHaGODMvRQqo2uKWmwVXBRP4TyVNzSdDU1M9w13d9IqAodYy27zORtLSvsW5iwKYHz1srH/fSFtgMzXctCKKsGCvUgcWXtCbPmRKWi/2RhdA/D root@0c957cf9-e039-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBdj3j2GkHU+skb38wKXfaD3UxXDYUGIe4oo6XdlGz+JZUKXDUkWlicrhe1i+lTS6473yxW6vJ1tKkeFkycmBWyMzqOSrwAgKfgEAIMV03Kqm3oe7w7zLot+1oZsXSWdWo310tsjusxSrvWRkMbz+7sDOv7H7ki7N5Fa/518Qq2Ek94d8U7gKZ44xKm6WlOdX3vGlOaoB7LVqxKPpourE3ZwSCF93wHjPEJAnpf8TKgO+WdhILH0YgvQSZQDbRLHCtg14UbRcqnufCabH2/Yt5oDy43RLnJgnWbFDvy/GefveSSJLX0WsKYcMZIDQ2OYGZErzs2AbyddfBiPmP6GIj root@d266b8eb-e9ff-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCkn9WIOU7Z5YFhDh25lLHDpL92Y15RFqwfy+U+2F8hlq7tzWPzGY0M0CVlxZQ7VvT9IYCPpifjP0y3sKs+bDHdcN/NEublqzsIUoJ/mDWt6NdkufcwvZ8HLz4F1se6IxaRdFYzk9/3FQq4g/rCHQbpeZXpf9tNgK+KagHReJmHacOmWVT22FyEzh0ubttdg+bREpjELo9DBfTdfVu2qepMbO7vMx8Ub2dKO5Tj2+7A+bl8a4nbrSUZ/yaHJhu8wId2Vv+6bltihk22Ya5oH2Uyc8gr0QsVmCr4CKvMePgOETUX8+b8dgWMecMWOLKNayM7vvCZUqx2+G7lcfIFhzpn root@bfe4b68a-ead9-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDMLqYRO32QqWuevk0Kadm7rdhskuT6hqh0HDNxA+4fPV5wID49LlYkEzd00CN6dKTKuFlmE91aN+lblyHKTYT1D6qreIrcNnPWKOZ43hZc5N8IRDsEY29GF4KqaJzjPGhrsiC7dcF51ACklp44tCIajmxkNkCnPJ4AMWL1+vy0t/TBuze/bF8e5J5HKRolknTJuXrhb8mzrFsvl/mBtfztk9mGCj2xENeDD4lgI/eAcVxXNHmZ5ABmBziSdsfgtMMNgSpMVaGydVL7fjfvkKd2p7IyP+rrRwMxMv5Byz8aoANg69nj3d+1vxu980EsvaWcKonI7Rt1q0CMGhugnCPF root@f56a90c5-eb15-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDH3YEZvxNCnRCNsvcO8dbMJylviIqAegbZY3W0cCDfMJV3HisXbT6ZVj2JGfhsTNz+FUINyXHjbpLLLgXmqljshuOieHpAQ1RNbkqYlnniQC1JBFC1H8H7Gv4I3g8jvtdWnTjvvyMpT0v+dm1ByPnVYVuunKZWlnVvIO7Ve/hjmSZgmfw2CtqxfdEroimRnqO2igbSfKakzNKIrFJIRYGNbWF678F/Zuiq8hHg4Ss34RH4zLhP49zBdXU8te4eeOTsXGSpczhe1Kyr5Pvaj0p6eZ1H5VC7yJVXQFzbsBSRsOTW25iYYJXNiolsu20B/SytNJM6n1d8Zcn6mm4EVSjR root@d5762ca2-f28d-11ea-bd49-066a8cf01e04\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe7/O1KYTJ5mbUAgkCQrn/3/NDgbJ2QCp5T04aYT5OpqpeiAQC9arajmW5B9Pi45QH2e678MRJHJzEMSG+A5H1ak/16goasXfPIUdCjE17vyl+vf3q2vTKquJfhRj9v34lRx1Q8DZEMO4/X+tXMF0k0BTPYAeEQR2aE5d2Lnjla8RifSD0tBnmKngB47CQFQxQjJq0kpCw6tUJiD6d9VK4c8Jmu8c0P6uxrH4c5owxrVJuWdmNZrBW/LOu0TtVbYWf3KwkTL55UxKWiA6Bz7sVFvbII/A9q/jrzZTsmWJCtIN03+HA8ETpWSYXoBhor+oN2vENmzN+RC+QB4FVgTcZ root@301ada4f-fbf9-11ea-9c73-86173d37727b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCjwaslk3K4nFFdil/J7MsGhWPE5PT5Fp4WuSeeDMkeA5QmplDIruW9AJxhF5qxwTdRIqOqQOmBEmPV7fUQNnWF8Q5ftEiZuXqsuWcRNSy2TcuRPKBYucbezM1XCGnQVnVaN2hjV5S+NxIv8/YjnYBRFKAP99Ml5yw48+B6XTS8dyVjmWPDbzwm/sNjRjU902Bo451svUVjXQ1yX17FdJkhQZigCemLki5ggWOHQyTSQ5966eTE5XZq8Ai85828m+kdnoO/548YY56ZCbJjbLEtzofFrEaUdeK5nKKuou2obc/x41KuZFju0nAnXpQf0JyDf1PIBTGqzvtjXQJxLUwp root@c27a9cca-fc2b-11ea-9c73-86173d37727b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCeexwGftoko+0vOppnLdrNSS5Znoyfbip/Zj9bcQyUkZk/8D4ohWm0nUqIqlSurQOSJwqtAzmoNrGSjaFPZIuRqygLgisq4xGKfNzHvYZ18gO74ciniIM0dztgltWCWQxJNY6NBfEfCXREmAth6ZQ2cUG+E70iXZqJasmspWx9kfdK9adzbokdp1Gd0TR8/dEdAyMutZvgdTHRtXpmSo0nD7yHUN6munSvL0f/kLSwKT6Q4r0j6YSURVKjgE1qliq2uhdcpnd2lRnYlUhNrLDn3yfJYhkGBJnPz2ZYRyaWFpZpiM2e5RJJj5m43hD9HgONXx1to88FMWnl09LlFTEJ root@d1a9ec6c-032e-11eb-aa74-ba383c228abc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCjRXNXsHcNQoJqRsgaPN/d8SCVlj2QTZ6gRiEzy9olxucDkqhut/zGI4GFbQVm0FMuLC5SJzIyXQDMVsmYy3R5FSSeJ7Ze7ANWvtg29zopns+aI9BNQCNbIz3jABPvn+ZE2/cgQpcHXCaOi10w1mt/+pHEj9lSZ8xvphwvwTJJOZRAndGMmhdPPnBZpNSKmjSZ/VuznnvHpM6pxd6MKnEKUorlHf0dwpKZQ2KE6hZpwv1McPd6GgpXJYH9X5ia0GkvWQ8Iu78+tHR0hEh1iVfyw76QPQ/f9qgRWWH3CAnHAnj8pLU3U2Gh/PrRULkwf9MrhjWLPrfAPd63Dyo1OVNh root@b0cfcc21-0f6d-11eb-9a04-3e74eeea3a1f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/INpgiv9ZfvyLMP1X+UkId8OK++Ny9MjuFN7jmy/Ddc8IWhB35MCetz3IheARsf7st/x2bj+RQDXrq+Rgyz9E2H/TPJlO+7dsiH+D26SJydkNG5cc6XMusAt3ikGBphz6YRVkriFV9X3NYb72kj3PI1ft2GHAY5AD7bkPkq8+rwujB6NsZJIBgLgzdOeRPlJReZWT/+4NEAVtrZoagculHbvKZNqwf1oTfBoiQxPdV6h2bre+hUNVmybuKKttMKLB1gDZV2JD7+mAQdKTF/sLBG2zR8tDOpQIuVYtOkHmIF1iB+qsMIKVaOENt0YRuSZjwMO8rlYdDvOhBe76Gl1D root@813bb7be-106a-11eb-9a43-0aa5164aad51\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKAd9qbGDZ5G7OVJ0VoGBTI7zeo5o8KQ6twjOJv3Av/o2gJ3bPUlV5cDpbdzdlGOsDl3uQfxQ9uEI0j2j7MV7lHxNzRguFaLlTgumWADyA3ZBRlPwQeVGAScY28wor1bdE5lIA2V8M+ejC5/opyMHcWFC1W9GNHl7D9Z2y74TzZLShNMpY73gEJCZQf4g96LmDHfm5Y8m3DeAIXnlRiT8hnjFTdHozvsMWGJL84KAmILrJDeXUeGxOm4Xexk/mY4uQwxBHgDHp26DkX7DUF7K9duljQdIXQCtctJN54ZHCtJ+RmlueDRPXNi7+AGUs2u1rtBTJsBd+/Ts0qx+zAdFZ root@69fdab68-2624-11eb-bb1f-6e397dbce9be\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9j/zJNRgDm8oSz9yyBUzr/bKXF9vz2qWuztJMG01jTkbtEBXGXBMbj46+1zlcnTX45iTN+TixV61VMyduJjTJgVtlSNNYlv/vLeUp/4U4Qf2eeRVz2RySr04HbjR2fAjz8De40qEfcUMEfvXWnEJUkK2nNJoZiAPU4ReZkIXbKP+JzvPTSugz66dYeYH9nfwzUmuaNkJc9VWsGUhKR/bVJnCve1MQsbFAWLGtcQvaE98J62q0klHdFbBerxSOUW2GBRrJcuLXvJ4G7Vo176vHi2olPWIvwIlSc9WSBYer13ug6yjcVK8SMjuEb/9fWRrpLPgEFtL8rXKs8ZwVyb4R root@fd3ad382-2869-11eb-a35d-7a1d48297fba\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQ1k2Clmpdiu+NN3br7+lMuxCBiFqjpe3psMQaFDoop8TTlqxsH7+Ww8BUhkOsn7V38c4auqDpP+xuYj5Jbqr6FA9uSp5lfToJ5T9OKIJblLTRsKdCYnzhn0CXuRsCaFRpSG2aTxUD05scxnm360Vy/lYdFMj9VHLM4hlCU1gEtyh/4vXbhtHVJ1uKF7sPZ+KeUD/bvxFLJjHw8fHDTgYkNMWgF2AnIsay2/TVk4Y4V0Eo/vHAWQjfxyD5P/GgqQ6p7g+afaKkxq2i6dVYTy2YaZUsN51LD7jZ5CJ3RSoyT3PS2ZiHXaV3m9Byy1zXuijtGlWOpPNXr/t6yolYcP0p root@37908956-31e5-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCZL7kb7so3PvAi0B2/m0dh8nfVe3mtNeQBnvWv9xQiXzprn0OhEz4ooC9x2lSdHxjqsRxC+b6XLxNNXqwadiZ0Ocs6vAW6INRGeY3X4LoxtoeM7fpmiQFZmwmCGo0hm0j0cBvqtInac2SrnGZCxwkt+uiEk4gdH4f+rINLWLs4wvFqVH6ycTsrMkZHSxRzhFo7/LZiPbkgtFSd7KDB1Beaw6UVQsmo8Nhm8gOoNcON6bl/9X5PME8ybhLiAg8tYsGht4i6LIQHL4hLIsVBIy3tw4vYTsfCvsRiyGMXWk6AAKWtymiU95kbdSnNL1y2vyh4xzLnxH/kP9KVEGydyTCZ root@01279800-3b47-11eb-a261-2eac9c79d9a2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC4bYdehojigfI2UqOSsFPUjrxFU5owD8pNusi5UN/Zc/XM2Kv/XAV5dBncRgebS/QB1ot9VVSB0wP+AXVab0lBi667MePEgf7HTLE201PKca/WNsObGRrr3ZcWye1ETOHeMZ0mq0zUbrO0KxgNAW1RtTrOUtr3uyKRzu71rH4uu5uLD4dFRN+TyRy2z1pASW4lbA5uOY0HGho2082MmifQGOYWBzfDdKnd9EqkyPGfpwm0WIe/rm+VuROeiNxeetiGAp6BVTsl2496B5Ixo7EXnQ7s8qQRfF0BDSifnWDXknDux0oSXrnrNsnn6PsrEXvR8ZpwUrlQAFB6PvVcGz/D root@23fbced2-414d-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDrh9OdEKb/sAY5aca/GelnuQkZU0jhONwwokEOmjOKCURFNKNOiQxxyeXcsXERqpAfEM6tWy5tjpx1H7EoTX8/uOlJ6gnkL/y/2yCtqXjlSpZnnmCBDpqzkOnFrfxH0mPEJv35+23URGAD+nV6k8lWPVSSUL3bCuFgoA2SqGpJMxWhzs2/D8lpbA1gNGiYh6jNpCcHiHoo+r/CwnZZsLMRXc8ZXTfcQAIJrmoDKFSJ8Ao3Sg19SNPwp18+cd10sV7AgUykzYfKunEz4aFEjZPJzU4kDEzKD33alHz823SR7PCZUXzzHjZA/69myZ/3mUFzxgrqKB0sb5UgLARKAZep root@d85ccb91-4346-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDbZyvUaWzkURgCnF/iSwGvisCCdvF2/pSsLC6CIC9MWEw03gggZ/28LIhshq43baoMjO9KupMNBykikCawd6yQb9HIqR9bGYU3rB/07KL+YTEtcIlmdirHZbfsdzYyXRrjPiFGp0CWeSqx9lpKuQ3nEAHvZCukAcE/43qxAc2WcV8wjir4tt1guwFyrtTVO7aBTBYo3KxbZKKGt2VPdrng1Rwi4FdK1Q5c97/2xMOiop76TWT3CKZ4g86OPmCh8RGDwtpH7nONto1FU9Bou+5y0/BqA6My01pxj+hsjc5/4Z7nPZZ6HtD2qlBAy3vMgumxvXoSqavKRW03mylySgZ9 root@16e2d77e-4a4a-11eb-af93-4e5abfa0c065" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T10:24:44.515-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "222722062724-compute@developer.gserviceaccount.com", + "id": "2632696890266500147", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-089", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-089", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-089/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-089/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-089/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-090/description.json b/audit/projects/k8s-infra-e2e-boskos-090/description.json new file mode 100644 index 00000000000..e0fd0c22249 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-090/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T17:26:25.904Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-090", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-090", + "projectNumber": "92582827188" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-090/iam.json b/audit/projects/k8s-infra-e2e-boskos-090/iam.json new file mode 100644 index 00000000000..620f2238671 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-090/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-92582827188@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:92582827188-compute@developer.gserviceaccount.com", + "serviceAccount:92582827188@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-090/service-accounts/92582827188-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-090/service-accounts/92582827188-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..d2e52dbd538 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-090/service-accounts/92582827188-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "92582827188-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-090/serviceAccounts/92582827188-compute@developer.gserviceaccount.com", + "oauth2ClientId": "100458600037231086271", + "projectId": "k8s-infra-e2e-boskos-090", + "uniqueId": "100458600037231086271" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-090/service-accounts/92582827188-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-090/service-accounts/92582827188-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-090/service-accounts/92582827188-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-090/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-090/services/compute/project-info.json new file mode 100644 index 00000000000..1d93939235e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-090/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSmH1NAgetqvqBdTFIZoZByZtuVZhPqeL1XM12Dnynq1xO6AQp32bqL9mgA7FZnlg7JpkRYRNVAFGNogSGstfQq0BQM4vqFIKH1t5azgO0h46IUrqDuYy4iniUs8Hoq4iwkumFDyhOYtn++ySDg3nVX2ehLI3oblyOKk2sPEXekpU9WIGnvZDCUzDitUSa1+TgRKfQvfzzqOYrRpB6fBUJpZ+GYU6/Kwf2deCfUjqBXMNe0aVq4FvPDLrlZy6l2qfRHTmqFdX3/CXUGwLhiFU6sHE8nKDT04r0RxlMQIqnoGdDmkfLo6F3Gyscgl3RB87BBgcFFsSdRzaEU+mfro5p root@7b0ec20a-df55-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC8vqGb6KxrP6tWFNB9wjTgrdQZjLXVh4l4L8NZTtWfB3HvLYomoE/zeszILC1cLHnLEM2fZtf/OJpioV2Nu9qKUmdPz0NVd67fF8p3L1uedrDHDHXpaxGBzDGaYokpGdadn7RMWb5Ud+H2WEHO8SdzuYU/mC2wAdnI7VkZQG7UFpDvIjuFHGZ76Dkz0nN26qQSHNIQzi2WhwaMreGu0f8l+KjPahMSTq9YBYPe38G8rJl3D87T7c0McNi2az6jaxcfR3FRrBYqukb1HN5NiAm7gPBq4pOLBSpFOXOah8GF7qxSRX0xdx02olvtEojVX9CEqU/6kp1P4sVD+pDaoGQH root@f65a0e99-f6a3-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJGL3cvdRh95BDTlfK33zNn3UXQJz+FQEJHj1pUhT7OhIqcVKVlBfjKEzmmL0d3kdqilScqkde1k3+hHbXvrAPbXh3klzpIXPx3i1y/su+64knkkTcRPotLL+7ysE38TugpcyAnFbJk1PHyp4jVwa/Khk78CpIWacLPce0WU4inmShbZJWNwxm7eD0uVRwggeqdmKOtxMEpRvlLKDWvtWESypVrpLn+PXd3lhXm+/aaKWNohz0ThzJ8eingzr1P+tgmyBsEPg5SoU1hPKTqR427ACyKsp5RyitfcP1yEZbK7km1e6qVF95/56pGPcRSrkWrTS8l2SSSJtfqciPad4f root@9f516a6c-fa64-11ea-9c73-86173d37727b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDFXp4TwiIlK7f/vc1zMZnTT2w09uvbLge5ZmNRf0QDV1bQEJRv5w4ZROhHgjgw1xotHeWSGu7o5u3GK3AhzujFBcXjDRg4uZrjch6iOX31ANMH7pgfY2VvOdMUPgwGl1mqXTOCXzHrcs+RXcVtEK4WuZyw3gWBCONOIkH9dzsPBVrr0iZEhyRTUdvML0TMQfq7caemEAWtMcEdwfWOB+uKZg5HgNxjlv4eUnCozTYIdZQ4iWqt4K3grdw3i7Wf2FUkfBOXv8dkrovlJV6oAQ6lX2iN+qwzfUjJfsa1UYNsYUuxmbcpyeO9sfdLMzFN4ZxCIpA5k7wcc12fion6eCVD root@8b98557d-fc77-11ea-8986-ae48fe2da37c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDXwf74F/0or8lUXVJtdCu5aTpaDpqd41OUZRXAcutZWfY31BKk5u7jw2ljQxIXRqU8aRGF7WaHB7I4SsjsLsvRkXgGUBKz/m+uwD4tI3/RQGS2mkN1wNkk4z6jVbX3uB+rycmGPrJvFmubvjB2MYiLw5TPaoZPG3x6+QPs3f99fXuMiJB1pT5Dcq2uJxEmgM1BFmtxuBgcHIa3AmN+4hPP5TQsIYjL1cZ8dneoLDiRBNFwMo23H0zapN7VW7JX/BUWRITifhWCU1IrXMoW2ltvzjVQ4bk5L42CYBGkXk42pSuKVJT72rGQ6j6UdXR/yTvjkty5cwzCp2lJFpZtApGF root@5074b340-1cf5-11eb-99f1-c6d701d1e283\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD0HUfKNc2YCnRkYJ5FfX9HJseqKmeuYLwxxDeD7U6plHIHx6swsg+m0SHSmseeeIXpV8wVBIBoZdMA44LAXiQvWvxNokngSIpaR1CadGRCX5QGGMXIG8DYsXN2wDqOBz781iC4WdjaicUGHEs37L2+jg35ANS00SV8jUFd90DEt8jHkJTN2aVvsNEFI96C4iZhLyYHkkpNP3+bGGMHvVIVzATOkJa9LslP6aDF7X2UCeWJ+I/ypk52Ey8vABlheyGXYugeJTLEjUcvOqqcFllQaovHGCe+qEELfNPb3NwMbVMm52sUAAaAzuc9OcmjRqpNLy2WxCgFIWDIZ9m8xzcJ root@1d9c6f04-276d-11eb-bb1f-6e397dbce9be\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0HhDD47Fo37F5dK3ERvel5D5q/WqUdZi+7kZ8wKpoV0kcK+90yyb0E7Q920jsX5vUUasu2WEQp5nBtSJkL6vzZ67kDtzpyqXrxf+x6vZbunG9RY+z1hHqA8A7bpsEw9WSeCAA0dONfxdshAgMjPabspqJ2auzr3sR83CFbag3Tu21m26Yxc/yxrzcL/IuC5mIjmPArvDaXMuLLGKhaTsKcnBTjGygroc1cWqlmpvtTNBzrdrylZG7GDnXFYVef8aQJGjSgHGyDSJEqAg09hOeYkedRxxjl0x94hJpTqSsLvMjXHaH1WLkL2Iy7aznfrygoqApnS7uE/g6Fnv8VPTx root@a5d591f6-3101-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDOMUBbrQPBTHC2nenUlC6WXa3QYoV6phNuFaseeWI3iJjCh6O0bX4Mqit68dIeIn2CocWDDGrVkLAbT/j5Rk8C2KHq6YC35U1sYQJLhctiG+b4QBO8g6Fq3WezA2tQQq20Y0xpXdBZrx6VY2wIk1gJXb+KxJUJjit45V0RWpESmSVTzU9tY/rPy3OMM7cSXCYAj4f6CxRRgozpqjm4z49hvtDzq31nwk8mee2oG/DrbJ1Vao8JxvUt9fQSHKABPHtUMvpSYwdhspImxJh7g3XUJtGnqqyHuoDY3J4j4fYgC1oB6zykSR+0+3VhCR5nmpkqR1Wb8M+4wBMkYXyaepfj root@21c8705f-4360-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJa9uO2uuMf0e2XvKf1MMauHV934JSElAIIzPDrdy0Gw4+gj2zSV65U4w+5TSGaN6r37lAvCr2kTDidj20XP7YRj1hjJCtNfoc/6z/8wDJSYlhwMcxLBWOPF4LxuM1ReQRHgvxCiBV404iHw6ZIIjBfI44Ja6oQVK9NVAo/E+bmrKNOcSc5y22rf5R++eku6DS3iSz3q2HrcfJtkD6jrewS4lChBMLr8y2iePtrs06RH0+tdCU/YWyYNJ+bI3hDwidGSfMbuoG7TXrtiTQ4LbM6nTypECqn8gRNxirzG2b5RtgKNAaOclx0T5+YaRpT+BezXImLmI00I0g6dbbotB7 root@21ea4189-4411-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDHuQwtJ9Z6g5yHHcvK50R7faN1o3M3aI6FYV0lcTOYngNEKdIxiB3seiKHNkMLgodkM5RXvuWC8rAxKTalHmQ79A+hhtsagtdUiFHiL/abegmCZUV+uZGNiRSdYLvOZNLMeGLsrd9KSLt0wbKWct86MZ9rcjY8cq2IQZ/CuSic5t6K1NeHdftvAHDhslraA8K4t/oFYwYl2WIYyCXYgXuOEQAKm45AsEUSpYawHue4ahyRBElsUCcgTIJq+rkf5kmff43OpFq1OKMsfqN2CfuOvZO6rcDXhAuHjCuxxeYi/dN6tRJolu7DsSk3DDcnYvUZJImMr/aDdL0hCDukIkSn root@a7772de1-4c8f-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCeQwug8DcWe16mNSADL4Au8lSTZLEhgtedfHGf7E5qtSXtIpat2plMTNsh0u1U5/qHyXuJS8rBM/MDX+2TR8PXI79Cdub99DORgnUpW0pGJoqP1+1w91cbfsvhVh+CZhXfymfPPmwf7sYTQBzWu2fvoMOxHD/qZ+CkNQy/Xmxy2Pf0QbDsgIdgYsfDkDFZIxc6wyNtMi7QP6B/J9YwwrbkpG89y/0t+cwhEgy4jOyOOP2KqFdmIbh9qMoPccxpKe8TiViTbA8zfGkHcpqrdGqZ5YC0ROIxtV4FH7bFIct2sTq/jWWuCCjUw/VOC1wiQDdvqRtasu+8rzu7SaokuKZN root@a29191ee-5118-11eb-86b7-56818f023517\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+rL99VQhRB4TwejkAqvxr6ukaUorfat8h6K3xCJQRpRCHGMXmLK5l9FlAbrdDnMN7qrD74iNbv4YMDCBZn/JjpPE8Vka4eg3Qsa60+HarGkIz8h9k2BYoCQZ9rlfY13ePv542iIVyeXG+7RGbNaX1jp4O18xCMajSE3nxgORHD9EskeNyI1MBd8F6b+qutAFYIXO2W0m98Oguqc50yzgwmS6bCO8POXYdTEabt/QGoZ+Oc93L4OyuMh+77iHdkmtdAnqVqhjR1MzDqrqbePXYvRlm7JOLJxZt3URwx2/xUZ7IVIkLPZWwdLL6BMStETPWdZACGQEo5k6qab8UtkAH root@7cfdcdfe-5164-11eb-86b7-56818f023517" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T10:26:36.017-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "92582827188-compute@developer.gserviceaccount.com", + "id": "3089849786163805604", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-090", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-090", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-090/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-090/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-090/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-091/description.json b/audit/projects/k8s-infra-e2e-boskos-091/description.json new file mode 100644 index 00000000000..0416e5796b0 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-091/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T17:28:24.250Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-091", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-091", + "projectNumber": "323623043936" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-091/iam.json b/audit/projects/k8s-infra-e2e-boskos-091/iam.json new file mode 100644 index 00000000000..1ebfc000870 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-091/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-323623043936@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:323623043936-compute@developer.gserviceaccount.com", + "serviceAccount:323623043936@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-091/service-accounts/323623043936-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-091/service-accounts/323623043936-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..3a96758401f --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-091/service-accounts/323623043936-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "323623043936-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-091/serviceAccounts/323623043936-compute@developer.gserviceaccount.com", + "oauth2ClientId": "111626914728262704937", + "projectId": "k8s-infra-e2e-boskos-091", + "uniqueId": "111626914728262704937" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-091/service-accounts/323623043936-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-091/service-accounts/323623043936-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-091/service-accounts/323623043936-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-091/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-091/services/compute/project-info.json new file mode 100644 index 00000000000..d059a40af16 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-091/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+Yi3Dv7/4Gt/av82FUWmzKHCK7LiDYoEm0JTPPim/giRUmUeA27WOwQjeBxhnI5hoUBADzdZcQbQ744QGR+dsdtYclYF3zqgNmlqPKRKIqSWs+wFYKtmuPiAk8cTILWvbS/GzypcZQxyBu3PV0+pogEPdFWQKa++QefkF23zt6cCI8HTHJ6JwpemTaiZL+Up3YItA6HfXdqm7FgXGxNF9SAOVPYQhEM5iFoYx8NWfHSATwSl/PfrwZq5/xUI9jQQb/U2h11DJrxuFzfCRhdS/gPGeefAkWke3qUSWPhYX03E827Rgp+wBebrQhDRsQkA/+BzDMPmZSJqDZwjzXSWv root@47d0df49-f0f9-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDapnx0t7AMYM/gejyHaZO4bpy3qwxexHUSkU7UncXWKFlCd56i+zw1Hqe3fH7WoMfpGi4PmePd+V3FVaL32YJSdxsYyCUJY4Fx+Ee2EOAPtsDhCD+R9PZfwTl2I8mwYrdVtbDDUoff9BxGkj9OmXqbc+BvMMjDofG9HP50Sohjc+/SEk4Np5QDTxiF3rH+Sn5SnYLfSb4CYnAmTh13cn7xH0t3jqy6kRuMjHevAdcgLKzRfj0R4u/d6yksnpwj4JHDG0hs0TQqB8P1kLsL8Bm45gTQJitA4zp0LVcLEBMW3TusCQrJznb38xWCYlWjDmZ05eF2gBj0pZJ7pq4wiZzB root@38428211-f76e-11ea-ae6d-8ed64f3416c0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCuWbYXnt6ne/jwBYHX78vxtOWRBFpJgNlFooG8R/x8YwU06Mzp5gskYYYUgb5msFvnKSKmvBXXJjAomt52KQOypFCyQvweLiAQWzn9gLmR0zASFieRWewthl64tifWDW6OnjU0pHABOeTOmx2zNs4oySh5aVKQSeSIwWnIrFSWpvQaC+cwzpdCJVdlQboLqto5QI81M2emkwflVG/MD0kob1Vu1JP3pg8MiwWM9Sgsb2UPK0m/PXjAMSgas0BsxCpPSZd8ugQgu1AjCtDiPLBfeoq9yv+EYEEcYkApFT2bWujQAtTC9lzuPEP9B7pFiMgGGxMGjwTZ+TFJTENjcs0X root@7a9c7676-fdd9-11ea-a78d-ce9ca29dcab2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDXlDBpuGwW9zW7wZG9DM2uXmUr8q9kL7D/q6zmioxspJ6cSg68B46XTKiMhYkTM9oR8Y+mAI07IoQl15oL1vZk1g8GQIreebAxVDAOht/tbPQDUvDnlt9pjsyoK0rgmd/XDpoYK/beJ2ZL+8fnu3y0h80KRXgQCaNsMR7Nno7QjZEV6KmrlFZNh0aKDhrHTBcIfwDGrOlGxboMHS+HalSyW+p2WayVzjiACEyL1c7Fe7+3MV8dgulHxzANwOt5kkTHdJl+KFwAlDNa3u15ZV1SjysHlQ3q0NJmhiowt9PVqSYFNd7tHNJFmHtYrBin1292Ffpu9F08n8tTBYFnRnHj root@a4ff71c2-3263-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmw0dPU//gFdbQA1i9LVzHA0E+7vbPuPCo3jtp6ql5x154y3jmyUJXUNqUynL5D9JFEjFE4fYfgjexWCy19TyKpc9gP3Ji82ifsU70QovlrRl3ZtRnd6xOFKrRhx/WeD6wjnk0g7mBZL2zb/tj25FR42TH1uDPPyLhKF7RSCWbNKrmQIL0jxN9iiNIx+HpJrzDypYhts/F0ivotyd5o4MuFpqiR6EabYcoMqfWKOKVvrzqlC6NKah9X5FmwPZE2hiOwVeiX7NA7gbI9ggZfzfHYecVmoTFRBpG44bKyhLuMSaaxMYII0PWhhhQKjUqpdA+MMC5vunfQhMOiF0eHoM7 root@80911b73-3360-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDfYrrwpl4BZ1TosEXGbCooTOYRYS0+8DKFhAhLw1ZM8bKEryXCHBFSmNU5Jewvhuhqq9aYIULKO1qPRUhK4mRL1+C95EdAAdfTJpgmKJktFu/U3eXwAmmHc984zOmfIIhME2DSaKlPL5/a1+VD6SSOxlvll1TpI9XaEVS0w28m/s957jvOSvBtXLOPmzRFNDUYFXoYDVOL8ZPNnDjrs76GHIK5DyCRXAzNbe5gk8pk3+bFRv1L9lhnemsonZwrPD11xP/soe3DJKo1Cq89fIPacHNmF63ueqXSzL6L6WDbVDvFHTboXWEieDPdFOS2+S57NA9BMvleROsB0nfl0UJ5 root@59cb7e44-3f9f-11eb-a0eb-a663209ac437\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmPHkoV4rEMC0fXA0LifYlFjmMvl7iygJfF6Zv7mH1mNh329IaqEblinHiuLMY6c7nUCptqBQYTOb+XTJEY/vSsJmz8edVyVLxiiHTJkoOyzBQAN93hlq5h8zI/jc8n+YkES2QP3p8mW8bjZTP+uoOk471a19Yi3JcNcnrU72vi1dEsQguPG9e1VUxAWK7PSHknr3fBJaL24scbH1/dROvCqYwAjhqerb5he7mhlW6M8DauDYhWIcmiPQ2G7XaylK16Wegobag4VjnJ4p17bLmqIvvu8X0rEHcr2R2qAaBPy1EZE7YHj3OP3EaR5jp+FZ/Z18MsR8RaH9rIsDncwwT root@c64743e6-517d-11eb-86b7-56818f023517\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDqPZnfAacCfa2OYeaSme+n/9GNTpnACLX6xljybAy+Vbl8DifKBr96ajK2RVGT5rZvGBDkLr52LG8+Fycd0xXi48BAAjGbSIr3d1dAanwlTL9aTcXO99dBzuKPr2trZ6TJRVhVgr/8yWZKF/8yEohOiwUoEJ6jM8j/NBQTcFXXVfFhC9p0s7xhXy3CqFxU14kSYo/AB6uxk/UdmHZFvIX2CvhkMCDHb6sHswb9dLeY8HFj62w0mZYJv+mn0ecrHInaITRVbVXHIsFe/VnGfSrG0kErjAWcjlZtt4lFCjKSDX/MdtQOcZMuFF5E7Q5NWKNIjjqluFhWeDPFjvUW+Y6B root@a6cbc352-5443-11eb-b93f-86287a8f9d41" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T10:28:34.220-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "323623043936-compute@developer.gserviceaccount.com", + "id": "5211382868099218734", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-091", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-091", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-091/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-091/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-091/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-092/description.json b/audit/projects/k8s-infra-e2e-boskos-092/description.json new file mode 100644 index 00000000000..f3a4b270fc7 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-092/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T17:30:20.396Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-092", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-092", + "projectNumber": "430461122234" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-092/iam.json b/audit/projects/k8s-infra-e2e-boskos-092/iam.json new file mode 100644 index 00000000000..18c568824f5 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-092/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-430461122234@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:430461122234-compute@developer.gserviceaccount.com", + "serviceAccount:430461122234@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-092/service-accounts/430461122234-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-092/service-accounts/430461122234-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..7734f5a4654 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-092/service-accounts/430461122234-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "430461122234-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-092/serviceAccounts/430461122234-compute@developer.gserviceaccount.com", + "oauth2ClientId": "111448883500854485637", + "projectId": "k8s-infra-e2e-boskos-092", + "uniqueId": "111448883500854485637" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-092/service-accounts/430461122234-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-092/service-accounts/430461122234-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-092/service-accounts/430461122234-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-092/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-092/services/compute/project-info.json new file mode 100644 index 00000000000..fc4c349a19a --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-092/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2NU2iLmQKipAwUcUjpjcEA1uRXRcBFipRZhiA+v9O2Y28i+YagnyKLbK9xH8wRjGg5JA/MeOUwaVFVUakDMpHKRsHGSTgXyPJcBlhk0Ul9gPh1dfl5MkBSivnaOWD6uTQkjos5XzmvRhFZOlO2c6egEuXbqg1ldmj8gcZDaQCIBuBvWpDPH3EQ1fpBxmzGRLjCy+cQNTVfVjHyc4ijaEVS8yyJ31sdXj4luUZ+AUDJPw1RHjjivonipF5chI4w65f++j0z8+oB89WP1o9+/HYT1WzMrYzh55WVo+zeVsKkfNzqxAbuxrEVd3Bl2ZIsQED+IcW0/h0THpN07TcXnUh root@1ff02ed1-e016-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDtwEkwGxqagssPDGnW4Hd9V9YZ5j5GknfM4+nkklLz49nIWvRoivnvS+7T50Lp0/uxT9ot2SO1iYsRME2wdA4O1qpybAiLomjR7VVuPktKUCFgXxF3hXkEdBNdMtSJvnCCobEtnR4qvG7GvVWxxBJLGJPqwWIIX46yqQQYX49FGS1ui03eovbt0KAA+74c9x1kIUU9NsX6HiEFnGBZf6cHIC5t7wdFOUaz8yVg5hL+26YUH8eo8jJVhynYS2bw0gPSgpDYGC6FtIdRVfjORoB74YyrQancfDfX/uPVTIF9v0+d98EUwEqGJiyj4OtdP+9yJf9VFiJoC07HNlVgIIw7 root@979e7711-e2c0-11ea-a87b-7e1d84ccc038\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIMYD95V4EmTpugeB99BArz35UNBqDBeRA7DrL2f/t/jqjkCkhJJoHij5kUGvLbu/NmroKa2/CKZkqw0EbUucWWP2EmIk6TbOaqzN34pnAGn0RD79yuA1HiPBdtYJGKyUUeJLOZLvht9GF45pnz2kpDjFxD7dZ9wkuV2i4vYp6y90ap4T4kZ6Czg98MP1/rIfDWLnfgsn6buyQgUl1YFbgU8m2dh4p/Ry5WH1GsBjwTmrsJvkgs71I1hFGcKsnN1SAnO4Y6ec7wAcE9tVkbIqGG/vH40NE1mGoRofZaViWegl0nD2rPRKcFkAGXHrSKzuB1Wfcw4eaqiE83ijwZYsP root@48b2f6de-e894-11ea-885a-2259550e0d87\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2ffnAU7NN1kdo4WfwdD1llhLmQh4h0XedIoheNiMGjrk13orYZADOiJ1rmPcq2F37WdvGP4vR6kj1u/6U76m1yAFcYOGOop1sZf1mrdB7SaJ4hNrU2GgMCDVRDhQzNLM6VxjbPFMbU2xnuEOFwsILstXwFTTtX2pAmhyFxWrDeHnnwqS2EaeE4A4lqNVg+FnHF8G5vKoDUeI8hC1CiCzQ8cl0cadQpAi7H2YUkbjxtafa/F7jirlV3CoD3zJtFV3OPCS7uRSaXw8HcGP05gqJT354gtPV/lpUwKh3Y8bdyPbdIIDp79IlKx9AigSLYC65LFtd67Nm4gA2kaCVChFv root@557f663d-fafc-11ea-9c73-86173d37727b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCv05Zm5uTjMaeTgixYgBUMZefnyqRcZjO0RQ9ARwJxvsgQZgKhYc9ZzNxXK+3Wxuae/W9+RG4Qy1Cxk9GuCGZYah9nNDmQ6psKd1EH7GyVBJtkQVtt/+39DK/kiT9uULoc/x+uW62QUF2TmrJpOqkbQdUf3JAMPrtHVk6HuWGPjGqFN6w3yny93rem2G/UZHzJRUAQJ+KULMlIewrz45OFI3BA/AAGN5ajkNd+wWMosBRkOhtcTmeyB3MW63V+03qqIueF4oB72ScWjxcsy+m4jktky+Cx9/BS9HfoA8WNvrg9B+jW4VpVz47zhjYPUbre8pXcxJX17rgDc2togScB root@15379796-fd5b-11ea-bf6c-a2eeca28ab84\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIXAijiE79POAtrv+bY0mtWWMTEUpzK3A0jz3P/05evkejt4bVVXepLAeVjjdqs7ox8bynvJxW95R0OLsN4ehquVvGyoGpdnUtnqmpp2F44o/gtVOxfQg0NFnYp/2mgDz5L94X69bUDsyjqCwEWTKRexExMK5dFdE3N/4gwpC7pQwJ3saE01XBIXb36K50CK1eeS6UuQmNQ6rEZRTsnWqDLWe6MXuioh4ehsKYlOJlewA5WoieNvpR5V1TTGdwfcmkaGhEjJ6J7HZftTqEl7gUc7+dsp4X+Liwv443rAFKhTxZtBCL6TKjwaLRC3piwF9Fz8ZdhQ8R8eDXDiZ5/TSD root@33f23a8a-0ab0-11eb-82af-de22b9665164\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDqNkqcwEEIAwQrJP7mFswXwi5+ql3tch0TW1VHtT4KocpKiIhI9MmZDPCbmSPoEvkyJZiYKsO7SYcVA9gpmmR587Hjsy2MOKWuLt4rFAsXAZdrpyM+BQgz76FtPcxj4Wi71rpUaqqN/2H5GRWlC+5IPfObtYLIFISKgQP3Tfdww+5p3TDDZiGujEwBz+pCw8VIVQs45ban1j9tsZ5XwQeb4q3Gf+5aDk4VzcanAl+O0lY0lL96QVbdeHeoAJLxOn+9kECjkJPI6FrzwRALrbkyEVh4D7WOdJGa6HlpVNDzuvmGn6WBo5emJYlDg7TbDuzRgT4rZsLHZyMhSGQsgOEV root@32df957b-0b61-11eb-82af-de22b9665164\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDRVZ333cIVImw/PZruoYPDyMcuODHy33FYW+Uke3ziQgud8//o1ejywGeIuGqVHGWHv+gFCcR829ITYo1aB9OknlZqWPU1OCff4jXP5DZpKHpI6J6En7lsy8fZ9M/TXNjbElZK7a+Aq8E9GxCwUrpR16aqT3fApOfe5u1et/HuGNIL52AM0wUzidTkGMaFlz7JRJ43EhSV1g7qgW3Sto3w5MNrVcC/Vhzfi6KCorDsp851t8uoJcy4+sHIQS4WMNmIbnp8gB3fO2jgsMrNM2GRay/1AyvDtwosQWqX9jBBzZC1/M8iqQmG5fM8KblZLFzsz1AK/ENBY6WnXrjIT3IZ root@c9d92524-1083-11eb-9a43-0aa5164aad51\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDrAaao9zZ4DUCoE92gGaMV567bx0EkX0HQDMw6kqyvbO6eG1KKW39v7aGM+TraTFBkF29xFa3vstPVzvk4h4NbQjtGMtNznOoGFdrqKDhexOLKAbZkNlJRq6eEgJSS1hFvQluHeuc0kZTGLhBbf6CsZYYnCSQMQlelpXT1CPH1FzSTagTxaQWbPfEnQ3s2RogSxdoyASQ5Wg7Ektx7FMeGP186XrV8BQZ1PsV66FeLoIptLUaptgGTanVCoX+23sgUYlaahiurDfe1OQQNKJeNZ0ofgWYBauXn+m5B/qER77T/Jvwf+9sfs6cwzDp7LhOUfPdVMMQolRqnUNE0d4mT root@0727b1d8-1528-11eb-8a3c-66d0ef5d093b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDLdy59YoUo/ITcJIA5GYKIDgi2m0E0CLAWP8g/EwrutsO4pOGicLuWgMS7CTKmGntEGow40VJxFPAhpQ7uqYx49PeOIzNs842K/jy0I1ZPwruJ2q0yJll4FXnFV2VDhrOzFg3Qupu6AXxKVIwqr/2RwfUuamZRLye5ofIlye89C52vxUPNkWMcwUnpwM1UAnA3yKuiTaFqIWowT7NO/L4kg49cwnsF06BaAHjCuIXn0tFEmrsp8laoYRlMnTdkoswr5Kl3IOCBSWB6WCMkQoZoDRz1EIj0lIJy2A0HVQcqJzpJPWT2bZSDnE0vWa/xEXBiYXFF7MTiL21MHRvNjoUj root@00da5fe3-17ec-11eb-8cf5-bee87f5cdaa3\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC8LiFAvgyD9wTupYOwPYuEMBgfGWTjVjWL/LP4e/wDF0HDCE2q8VuxrudgpY4jZjicz+1b1Yjb+ZG2lchhJ+dLMTs7LJH9qbbYRNyATB7EdCdPWVYOdwi/UQShOZHWF9lgiV0myInojFjJ7FoyIaXUSlVChbX48nMY3kANoMzJQv96XD1VNXaZKemQqXQd9pD7TqTXg9obfq2ck4ZIBwmTPG3Gy0tTSm/mmbDDwUgohwXrVoqFL9gv1XKQWYgC0M1sSF3HyY2tESgoGuPhqx9snHN5ihDK23KTKaEs5rUQyjVk5qWfSUbSZ8oC8lZmE39EpD/dVG4c6rcsGd6KywV1 root@2ce817b1-2393-11eb-bccb-526de22ef413\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCcj89QMy35GgLc+x1idoBQxKuMCsqcEZkKPRUdWS4w5zY9r9O29gZTqGGYnlPcptqXMj5DAOR3rzGTrOKk1KXKm4Qu8HFU6UL9pdO7ayN8MPYySy8+wdIklE9oBaebHs1d2tAfegj8ekxHKr/D/WcyGXAoLX/UMVNUI+878k29goBKEwxQNt71IPGcBL0urez8v7c8TjnqMWYvZYB26RNifbQVAerv3YlCSNCyhEOfOP1O5foYWI/KCZncBk2jIC6HqnK0XrJy2pBUg/NrwByMYGUoJtrsuijyU+OP4eivloXMzFyCbbmNnn2D5PZ6u6Ab8wTlKQ+aho1ZrbJL5DbT root@d499fb0a-2753-11eb-bb1f-6e397dbce9be\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDP7qcutqV1VKc8h2+t7RFdozK/rxSDXWJA7aLs89VdaZ8k5xsmWPNSkS9di4nuUTbbJJINk1DQvI3x0oSAMODQTU7DBxsjYCz9YSsdRVJbu6cD+L20Eu1l/yQkmochNJIlQz1McPw+2jykoAAHrzfhY1QN7aLisk7+0TmL1FrvnaC0+kAkWsydcvQF5zSLOCP92UNZb6rv1khuHrNZ/6V3DpYg3z11qkns9LqFSFvGfOP5VsYlpyHzcGtwEptYFykqbYzMhsuuz9vMSH4eQcAj8PmV1PdsBAOhum4ehsh8HX5Ls83fjo90Jiw39GIRqpXeUISfgzgvWwJXUGj9qTFL root@c675fa94-2b79-11eb-a59c-42dfb897bae6\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDElTKc5oZeiXkKQOkl4LMk5WuHoHCigPV3COGoUxGbeXyl84/rn6yqv8chcqwK/xEBq6819B9ffMCR/NuuWAdGNYo2zRyv5jrRljYY8bXp80MhaYxsAWKFvnRq6/A8VnYSFLxEZl4PDsiHh1cBl/WPe+Zqv1GnOKXo/1m75FLIp2SXX+JQc88xATHNOsXI4WFDjIKhWatG7FN10VOS11cFDzxi2x4hfG8PObixAnr4JvslLfsJ9lQVACUmdGsPdxkuRjFBuv206Zuc6YmRLl+nbbqGPSE32ZOBgZoyGzrIxOQIDVuS2CDP5aD5qpA5paDVrRwWA1Ru9YSBYqN2Twsh root@1828e685-3a96-11eb-a164-f6e7f2ebcce2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCrTXJa7WHztxk5fHuA6oJoJi0dpM+q4l8+rSxZ7+YYdtT4ZuPzvKBQIM7hiSUSAz8d9q/koMT1WclroERLHlO/+He57l4P4saI7Uwh5X9FkFRzPBD/cNnxlgT79XYLPQFCiP1piIwwc7Ie4nDOSVZXjvk9kcDLUgTx7q5I5iI0Hey+6lTPwZrYNE/xeJLcyX2wTitL9kK9ourOpjkA1JbMVOYbIZ7yYH6y0Di/hu+ONRWM2fXxlNkeenODlCA8dxR+BRAI6U5hf/CFLVTHmfmGuv647YdlzuSGFlhtAy/OH/JvUvd7MG6MsUucFWUgs3rwCn/TG63mefT1Gcwct5bf root@140b5dce-4dbf-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDU6FZoqWPYbT8tBhN8h592NbdDTnJgXnZp0M3owWZQvffohAyUg8c67onWXKLOa/Z+v/wU2xZcQZ+xlUTSR6c1R47ZRe+VQES5SXIUrUaAQIOQyrwbVTdHof0lLRAKkHn5lg+Y4HW/uP9IVDqQ8f5y4y85plCnyCvc3fIz/QP+hGYhxQD8eGI9tFPHs8/FaJDXQ+pFl9npXKg/p/+ZkxpTU3zfxnRy09boxJVi92SO84w4ujo+62yaVOI/VIlPKr5NvZgqoxiQsnEBN5cd3UATDUIGI4HD+je35W8RQZROvhxtWkii0PAjTDcIQWBs/T86XFFOdfYLeyePbNZC9eml root@81d03151-5050-11eb-ae25-d6360d0295c0" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T10:30:30.606-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "430461122234-compute@developer.gserviceaccount.com", + "id": "3959177568038173401", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-092", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-092", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-092/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-092/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-092/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-093/description.json b/audit/projects/k8s-infra-e2e-boskos-093/description.json new file mode 100644 index 00000000000..9d7adbc37b2 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-093/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T17:32:21.265Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-093", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-093", + "projectNumber": "64000581688" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-093/iam.json b/audit/projects/k8s-infra-e2e-boskos-093/iam.json new file mode 100644 index 00000000000..af702f19fd7 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-093/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-64000581688@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:64000581688-compute@developer.gserviceaccount.com", + "serviceAccount:64000581688@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-093/service-accounts/64000581688-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-093/service-accounts/64000581688-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..b6386306d9a --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-093/service-accounts/64000581688-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "64000581688-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-093/serviceAccounts/64000581688-compute@developer.gserviceaccount.com", + "oauth2ClientId": "109554227521419545776", + "projectId": "k8s-infra-e2e-boskos-093", + "uniqueId": "109554227521419545776" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-093/service-accounts/64000581688-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-093/service-accounts/64000581688-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-093/service-accounts/64000581688-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-093/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-093/services/compute/project-info.json new file mode 100644 index 00000000000..0133bdb3d40 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-093/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7yjJLz600+DDwEocTIsRL0ZbAYQFoL4NZsV60T/jAmebIv3AhWzHdZKArK+uZ9cDyapV+maS/Zu24Zr/TWpBbJr9TLOI+6J2GohWcsdYfnI3+7n7UPWyD9WKDtsolPui7cueifTNDEmlia3yFwTiXw2M/+A+APtMO5QWkb3rtVx6HhHzPi6qcKOdxH9B8AG5Qp1r1pbSksaPbXLNrIj8r26fic8WHefu6QNbkNRGHq5Dxd68/DjG22Ld9sUJcc7qTQeRgfhXyzqLW4WZuJSC18VONP5uf8640cUptn1BArGRCIlhiUWcK2xJAjyT3PPjsQqcWC2+UoQH8HlO0SN9j root@a6883f10-db7b-11ea-82f4-1a238816176b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDv+8grRYd3WOs5xfLrxuzG7ycWDahdlAXNkDG3Rl+ophPgtjod0oQze7lm4hXY47NAJ5DMOjky+t9WmRUZpneqQ0u0QRJgf5V1mI9ASSLQ97APto26f5a4vnYsLUjrYafRKlCKhs22ryVoFlaw8euFwqVFDcHqlxUdVIFJtUQ2n+vjwOZcWTUnrULT+zjCGW1elBY2j0UH/fgBs62Vuyk/nmo5S92jgYd7Su2LqBM+teNuHPsyAHIJxxQh6/XK7Y9vJpr3YGMEvP2MFL1kNPV4RzzgwFDcu3yHzFmmZICYmWM4nq2hNd2PQahxidnTfQyBGlNj+n6sS9jetfAzCFxt root@d36c5d32-e135-11ea-8c67-968ff53f47c5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDRBe9PzXQviaQKKmwiVvtF45TzB10HXieAHltiCaSXVqyi9Dk1TV0fkRMY7kNDERW96AYdzee/uhWfknyw18TD5mkcYqoILuyybyQCiJDWveswJ/NUtn52Z5bT+g85JQUhS5Fk8XzxOB1u04Dx6Yjao3ygvMeC5nKge21NdyxQM11ym2ASPuP42GfPdLp8x+SL/2+fWmtY5pekniUHqWtC4sWfLJOpQH/zCwJLj7rPHtljoYRiP4B4QPavGtD2dd1X9ZWNHqWPf1BoG/frJG67HmIdrk0l/J53G6Qe6Ok2cC7gD1QMsFEyD8xnLCYGY9zSvgSZWaaIvyllpK9LUBwJ root@53274789-e219-11ea-9eb6-86c455181e58\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCfkTqkSvFWO+NRtoU1tJMhdBr5xD1LfHAifjFhBnmX6aakoA4yOitoAu2a3warDX94S9YYU2fSHImbE7UUq9g9lrajXcgfPX4T1OTuAtoDlXfq3qvps6xCSg1p52mxoZlaB/tn/kEfcg3plUU4gnTKxuacBVi4cSnk4ToQSxefF5zE57iPnkRjzcvw87Qd5xz45z4w0ndH51/7IBwbWil5Nll5Zl7vMxsQ5n+UNC8vNOQ+Uk0PdoXrwPAJziCN6oxjE45RFeVb8jopk9b3akyWjm/B4/eBkJC/rr5BZwUTvK+bFj84wIMSXeDCaqtdE6MLfsGmxkD4EFNPjAmv4Zxr root@08bd51d2-eaf3-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC92Ea/4eoEVQIML5pysZ+zrb4ThpzfDDIlbL5dCNhPkkMYeWPC3iI2d8HwwMJJKqhLx/UivfrhwodXeslAdYN99/ga7/aWh2RrPQ3ecU1miHuFsGJaR57qBhFCjLljVnkuBO9b5umWDEp73K0C3tYSrq7hq7GFYhRnK/AvKh8+sFa/sDxmDlVmIHb716o2RwGJiasnMoQ3t80APWCpbBMnZg0tmdBfUielUqb5QYqcQy6dbthndmjpPih//00z+INSgzXds17Pm3vG9XQPGBQ+ZQjE/ZZyqIcM0tyGyhx3A12y4wV8TfqKwujLehalMGFy8oZF6rQ2gq0xpfzfABPF root@7e0485e8-f084-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDcPRbX3lnSJdmFXnDaZSk8+6y6YI67djvSykfwzPzU2DT/DK+bnnQFb2jzh+dyYelRSddICi3Rc75X/e+UNl1v19wgiCxhj9OdIq5vzVDktt+YmNoqd3XnuZEtnqGjdupeBeueIWVDd132i0pLOpwBNUHzQgGvuxgiQbilTrex6aLqQ+v/trItPKw59ykmUoJZISGT5YO0/mCDWmTfeIduoJztex1ImXVaaDVUAd8QIpqCFaV9zx9c2xe9EkNZcX+7vGdI0AqdmU3m2JWmb+AAIgMrFIln/F0wRJ/0qBUJSXGvkhic6Cff8cHg5/D3ifo+OEiQb5DY+WvLmYtCE1LV root@232a14d0-f1f6-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDA1ERoOPEIr5hBf73ABrlxC7fiV4sT4r+cEGPQmAFa/CH7KeVaaAOOkvDyd5qAhSDLumHmLeBHLqAlBYLwUPakKS/uUa96x4hCUS7FIUA3TNMLYHf2aL6E6RCEM71mNUT7tdER+MqS20AyJXjZQvFxlWU02jL2SnPlfKfZi4tQf4juV/L964TbG5g5w1K/lHZaxbOZUNM9cY+1/1VPVwdqC5/xpjOAAv0yEUmfnhMwPQvYknwSqHBiuvqtCEGDiQWkWPKn8DeynAsRwUuRs2/6JoMZYJ4esGH9CIKsJ/ROeSb0ik8RIy6efEoBEQG8VvUCdVlprOM+Je2LfL5FujsP root@6c353d4b-f8e9-11ea-926e-7e7ea190b727\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCrndhcRYiLx1MYQv/GGK+7eEQAMH4ruteAdTRttxlSl5BwvNZNWJ9xYh+Twj/ChW/VCN44V9BBnwYR57x7r4bkQtnS4JaJp5Ek0ftLFAkm+5zjO+fuToHZ4npiJrkEBQogZx9P5evdGvGGMFDOdUCruXgMExWlNwzV2leXOBur2nGItS0gheHPwIDx/UDy1tbY4M0a7n5Iv807craEuSFyZ3XBe8RxkSKpuNDsnhoOPv8IPD/aBkjXX78s5TuBHJhW0LyMdvoSP/TA/4p+Kfz1OkVEoFyIKr2NchtD2/0TXIyqDhP4mJ0C4k91BQaPKaaEdgs2uhleYjph1YdGWmXP root@e73ad9e8-fb2e-11ea-9c73-86173d37727b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCuyrMIaIxw/kaIVO0lgzZ75jcYdFgm2QcBiqKxESy4tKEtlhedfo8joR8j5tf8tQ4XWKLXLETAScAi3Vc6M1XxnE4A49fCagELaRvj9N8T4BnvNt36a0tclJFCos8GbA2rbXYsB0pcPjQOoqAKEaRHzLJHUyu/i2h2Ouyw34LZlv3VeZJfP2dxvjIIq9lcaL2d7+9Di9ocVjno84XZ3Vp+8IkchAvWnE6RnYIlsvke49/Huxwq/KvQMkZm/hFS/6TPqLIt+/Tf4+ivmC/louYDv0e3duGTLvC80O44QQwqq5bkzBOCY9euAakHs6ckqi42mKWGiemJrf/wAA3I5kwn root@39abb72b-fd0f-11ea-bf6c-a2eeca28ab84\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDFYZCaHF3R5sE5wMw/NXBc4PBmySeb+zPZ+6EslGjdxIUn6aXO/Hijd3fSBjfnxu0Wp87Mqql5kA3KdplRH6iQ0qPqQStK6C3tsUP3PLH+bLfA2n40/NBWwuDwsMO9k/ktyu24JX/z3+EF5iEoFToZMDLzFrS6qCAcuNaunQIQR/zg3Xn2law0FmHXjfvUpEoF2AZy0bUv2wzE/kb0X4h2uHOmzqobqA6K0XhLoMRdGRGXHVdo6SBMYLV7zGcjNP7v5FDriU8SoJBqk1/HmLJMgd1rZXIkHbOKWUCHsgI0nj7b7s8yk3d3lflV3n5rl66YlBnL7txdlU4d9L+yzlTx root@cb1ea43c-006a-11eb-b4e0-eacb7c15c8a0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC6/gRc/FVXxXefEMgmmlsLss0+I6TCl4zE0Pv4hLBrYopAAyZInAMkQvPu/0Yj7WgztpsKUbajwxZf3vWBiNT6a8Jb51I3r1YXcPwlgGShMdfxtBmO3/5Hd7cV0hm4bhAs/hCMN9M9PMKPB6bQpOyKTX52VVwztJESxyFL/NOcYXjSggF6sFp4bWccimCIpNcY9t5lMAnKRueYzq2x9gPu/vQVYoV+hVO5ehbMY1NKkUfBVzEv4BefeRgnnAspMk1tS8NVrVTjCCJ1DNQu548t9EnWYWdheQZTqd43GNyIHG8KGHXxUEwxiu+9oTPSwaGUw+rV+uHMVHRJl9DKeOWb root@b066091c-0cf5-11eb-acdd-663f8ab42c5e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDYrZmaWrOeJ9TJYaOLcyinFidpcq/fXzJHr2VkeORJbZpB8/x9G7J55yJMmSJ8NUiav8/EGvtEgTcWuXN9cEtt/FEWdVEMs/oDL7TM59Y4nhsfe8LULhK1o8cxYtFwWsVMt4Io93gDRdcDMcGgEPNXEKOgo06Yc6vs7Ti20KgUx3iPE1cSWHp0kwcg6ALJ9mVuZQPorzzVDYuV11ROpqW6kpcJEpkGnnKd3hT1EE0Q/S2oL3aGka5hvQlYSP/GOz/We3l+4/nXVaQWcvu9evwOEFj97ZsZ4trei1Al9weSjuFwpYFDO28G0an1j5W9l0sR3pxcv+N6HSQZBwnMgUKv root@f5365c17-1360-11eb-a3c5-629ea79d0103\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDp3HpHKEBQvt+QkRjX67bmnaRBPxY9CsXuIIOYxVX9UeCeCwOkQs83oPapCRnMvppP/EGtlIJw2IDM8J2O6fbCPgNGyoGa2jFD1fYWh4aDR4KDvZBdlukhNlFMMesaAXXagQi5AMUcQI+wdEMDJn58JgH2++dM2NS7xW15p1F6LP5TEBS6JqISZrEQo5xtYqYxoRCdlipZ/j51iqzlvOAZUeA/6BLhQGBFtuC6sp+61AiCGj0v9+pcMvc+7EdT+CV2lxXqxLKxT6+EVrwQ6sZTXxeMHcSz1zxzBAEe6caPJA79q8lEmPmwYt2evUyHgVxMDHFf8RTCimD9ycU10XBt root@8767607a-1393-11eb-a3c5-629ea79d0103\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC8X4rKXfo6xU3vxiyz/lWuSsGQehis6E8Famcw1r8M/MWQHSgNBo9CI9W6SJO2SQGxKE5/HxTGbWAXeJv9RnkIgFHZtnd/WG3+/6BsHUggiau7HN7bYcXX4mkgq6KDQ2TmICtHt6Z9NrVBF8d6L2lYrmaCLIpVRngULTX9snffzNtQqpCwRjwTi4/55Kk60xlSYSM/83+qdJZZI1GObBpT6o2k+NlUmJ9M+6ObuybjptnYxmSURxGJARZbHl8702t1yx0iJKDe/8t8LalDat7AsGY8LzFzYFRvErzH0zMHgY6xpkPOeUvgN50hgGfYylrifgfWx9huGYrLnqV2jBcD root@a9c3be1a-36ee-11eb-a25d-22a534811c55\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDk2mN/7GG/iokQDMfAEJfDSsYU1AqIFJe+bhLykHE7Weq/SGhUGruNXvdCtE3oRVPOCz8WZwU7VM7uqrkY5bCWSaxaieu+9oXr3/q+RDXFClUCqQZFd9nZLD02iqGdOPBYyXqkbJWsyMda3OQdY+TNJYJUEMR4DHRPmoITJWoVJ9SCjXZKcV1ksEDYcSu/zKCN2jqyfv6kfnoCVXqkM6xyerdyXHM2u0x5PXiY9/VYhsNP3PGHDn2vyxrP/7Nv02X5QY2877uglzThDlDPQwLYJ+w0k2EtPk9jdRqh07rh8nkdaNCeAXvRHlMWbZuksJI+OUnZ97sL58AEWvbhskgt root@6048c557-3786-11eb-a25d-22a534811c55\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0xGzdXDeJar5+o+0+gJFLnAs8Lz5qkKfP7CYy0ZbiAiItdVCeDegKVK456TTnJLyOKuFr/IIdYffN/qjcDq2LYAFOeRvS0KmRA3B4QXoCZdEBlGArXtNNyWUGYYJ2viPtRsvRDml/GcFfuQbLRqSYRO4/Rbnv2qlqzymCxvGjJygJ5gQTFCXDNFv/4YYgG39h6x+bFv6VLEvtYtD1hdf63AOLiql2HShuLqn6KmQlVToh2S2JmbKV40ylC4eOZncBafMWhlCEvDMMkvMh/YwGIL9CUieflW/cbNSjWx7xlGvmy4tnN3toADrXrY4OHQFvudkC4N6cMyY7TxWIbojt root@1df19fee-3d0e-11eb-a772-a610f2f25584\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEkGznkjnv7UJHqMW8DG9fopDnTrXQ7wWtRxS+xitCNzZ0qLadx0yQSvfUbmDCRVo1LAT2BzsGnX/+UvXgx0rJ2pN4LKdIBOdrpMU9LIYNiJOhGRQ8NJEopBVW5reqkQRqfFw1Fxxm0d8lK4nU9F5ru57IGQVToTYlKBAPa9FwYr09oWhpQbKAWGJAJv+nhH3AaJEaQ6nxsSU4jiamtNc7MIJXlueh0Rr6uYgItDEs4fo+IJ8apg1VYeof0HyZYwpffjWoBhWINcTeqpuWtDtcHI75DvAcURQHv3RLXpTzrD/fRJdIpKQDCB53sML7JpLYItJE1AgWkNUCY4PWXjr7 root@6f3dc122-5217-11eb-b6a5-7e8b7adfd54c" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T10:32:31.577-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "64000581688-compute@developer.gserviceaccount.com", + "id": "1663944407945853504", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-093", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-093", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-093/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-093/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-093/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-094/description.json b/audit/projects/k8s-infra-e2e-boskos-094/description.json new file mode 100644 index 00000000000..840adbb428c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-094/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T17:34:27.066Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-094", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-094", + "projectNumber": "172444340457" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-094/iam.json b/audit/projects/k8s-infra-e2e-boskos-094/iam.json new file mode 100644 index 00000000000..39b5e733801 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-094/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-172444340457@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:172444340457-compute@developer.gserviceaccount.com", + "serviceAccount:172444340457@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-094/service-accounts/172444340457-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-094/service-accounts/172444340457-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..5b243a9cece --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-094/service-accounts/172444340457-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "172444340457-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-094/serviceAccounts/172444340457-compute@developer.gserviceaccount.com", + "oauth2ClientId": "100670917970928967604", + "projectId": "k8s-infra-e2e-boskos-094", + "uniqueId": "100670917970928967604" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-094/service-accounts/172444340457-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-094/service-accounts/172444340457-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-094/service-accounts/172444340457-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-094/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-094/services/compute/project-info.json new file mode 100644 index 00000000000..72d0159dc78 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-094/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDLK1bjuLSk5cFGh/gt7a/dNOGp4ZgdtTJnipGDvc8xZ6j9eC2OFrwegYKzXKwhl0bLsE6chOdllNZnFJ5ewxCGIJlYfwO97VVGBWvSWAqGfHcw4pSMQ2lmv18J49/An0badUN12mmQ10suGE5NT96drBRPV3C5HyBaCV8BRCrrgCuRcjDTF8U+MhqulqM3Zj5ZpsrO+UiUO2PWa7R9405DAo1Q4kZo6KZpnpgaXSZN3rvzJQBdEb3RGPjDuBa9RsdYQetM3NHXEWozCl6aC9vCk1G+L+ORj5e2ZEHNx+dMySnRjcoVF00WEiZJjXx2k6dtwjn9hKgUXXT9HpKmA3zV root@52664bc1-e91c-11ea-aa1a-c6580c04344b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDk63HljF5nJCNL1BNv3kHlYRl2cr7YJogM3Zfp2PejX04E/UF7vc90VAqmccPPhMItkZdlHM87VgdLfTONfgb1Qin1L4mfzV9IOG3PUH+ZCHLq3DbWFrLxGz1HIvzpy5W606PAR8jOTMSo/sopQiyEOVEmiIubMwibun1avxBSSwbe0RRxNHk35UxFmEi6e+m0N7KF24dauUvnsn6Di+Wjra9zDaW/Jmvg50CndBRwe7jL8umuiGdUGLDWfSUUIMssAtm3hQyyS7e4KN3xcVgPSRrUt7C59E3DMwHD8DW4bxp4fsmHKKVtuWH0robNAfhC8VulwiXGsNTbj1kTFSi3 root@c9053cc4-ef3b-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDFluJscIEiQC3twW93fj1aCoQKXRoEuYr/TRdgnlZdIbdWQTpc0u7glIBWu73fFD+Nwg8Ms+Rf66pyBqY/k9HgwEhvVHSWBNIuOC8xa99rdvGmzrIzq92wRf4jSYtQ2SbAlqHBnpsOnVsCFOdnhWHuU/SwghuchUz1VP4pOvRu67wXc2gyLuuE5WmsGAJo7lqgd2G3Jce09/vZ56SOIw4gY9EkcxPOab/CVTfAzxSZQOcYRUMiSCIhGR5t6y56lA21VX30Dzc1tM6rZVbsI8mT4b4pUlmtQXo1FdFpkr7JpAfODEyfUQhY6c7rSElChcAhH8+mWc89QzKaYzL1hUV/ root@1fee4dd0-f46e-11ea-8508-9a96569b20f1\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/iThlMr3jbgA1jd4GIDXOESMS/ppgoZUyUzCcRcbx2AORzpvE+AK9qcuSkDYmTz81c2fjRzITbSDf+JiG0ZQ+nql/MeFKvsXGXUsEoRUUpAQgrqbbiSh5zjD3Bi46KR9FlD13fthqmrTZt5tm3DbtZqtRijKNvnLmVDgwWW3kd++kjUkyY0vu/2Qux+FaA++1Ww9CfMDUU21e34qIkIQq45tXusbCeUaK7+IWgxYgPvDQhTzMsdh2jPgdy0xa0fScGd8VJxa8J0cpHDRwcieFlU5KvFNW5lwpro5QQO4zpJyVFxklUzlTs9ATb5Yksc7H2H+39sidsEbBLjqygTUf root@c42e5471-2d8c-11eb-a59c-42dfb897bae6\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQY3ew17UyB2smkOXDtLLtNlW3eNH9hvHykp0HFfX2zedmcfhtT03MUSH15E9p01/VQp388FZ5hrlaYGFqEm3y1rUpHUobbkJVRWzZ3ES2sc+dv6qqfGHsCxOI0JY+DFZ3lRaGd3bik0eqRXmOj3CdJwbipne5G4jWNXa2aogcQgOwWTsKOsYITS9ih8EXfqagPJXvmg6Kt9Jp6+pyq7pI2kQD2+aHeaT89aSkKUf3deqKGgC93+61HDlxFZcmT65zrI0ZFmwt4rbvriYQJTkQMqPJUR+iidZglHtzV98WmtfpsWNndfSAfpDP9iiT5LGxbTVZ+YBxYEPNwwp70jkd root@a7420bcc-3a17-11eb-be51-2af5b2470e9b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDPxTHPVJ97FHBGx2OW5Y9YzCtcFf1PsaLBF2gZG02eqh8V32Ucy6oliXWKT7UIQiMtB8IoT+2qTzqqIcaMCqsncb9UKIZsIO9Q9Z4qITPhnQ+eTHFF1kCd4wYY0t4l5bYZEiDt1WB4hARm0JsZ/8KsaRoCcBQplW/qGKnGqHbElIszDL5X6laqQo5/2W0uQhDQqj+WicmWACNUvotnAD/ikj44kWotonykFwoNPkQBhW9C8smss/VbDmain8MzGl/BqGM5DU+Qcn0guxZxjDWK+66GZUtFo7peUb5kWZTflGj+KaN+BdZFDeQqlxoTBwIWvmSgfhTlYvWxKCNcgKDt root@23478e88-3feb-11eb-a051-06e11967f91f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDAGb4RWpIKNNFrtavMspxyQiXDq3S/Vy9ApozaRocviEcyGSJ0Pql6QzRoO1tMY+eAScrvYUDzXdUtiB5PJ3f32UejWJkndLq6UQKdjTUEH7uM1aTOhqW41CLkN6nNvSsz7SypINCFj1/Fj4IQ13DoUIeYvNGoRDTTUBBYSWjxK3nWxiqjEXh0+0DXHRel66uodn++H26XxmmWMug/lxosEk9seXDhxhg4TjlsOad6e4GAh+R2u3UC7wbaa7GWoewrX7puJuQ+lTM0b8ibo4TnzjPTmJrF912QEiqg2hzSURwVAkTXXs8YeDeu9oQSl6c/fL0KJlG92v7W32wJy6HF root@ec98a3db-550d-11eb-b690-769430c9414e" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T10:34:37.906-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "172444340457-compute@developer.gserviceaccount.com", + "id": "8679293149704371138", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-094", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-094", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-094/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-094/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-094/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-095/description.json b/audit/projects/k8s-infra-e2e-boskos-095/description.json new file mode 100644 index 00000000000..fc4041d2646 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-095/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T17:36:13.436Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-095", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-095", + "projectNumber": "116031661039" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-095/iam.json b/audit/projects/k8s-infra-e2e-boskos-095/iam.json new file mode 100644 index 00000000000..666b194728d --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-095/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-116031661039@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:116031661039-compute@developer.gserviceaccount.com", + "serviceAccount:116031661039@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-095/service-accounts/116031661039-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-095/service-accounts/116031661039-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..4f24be7756f --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-095/service-accounts/116031661039-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "116031661039-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-095/serviceAccounts/116031661039-compute@developer.gserviceaccount.com", + "oauth2ClientId": "109822514003937555112", + "projectId": "k8s-infra-e2e-boskos-095", + "uniqueId": "109822514003937555112" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-095/service-accounts/116031661039-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-095/service-accounts/116031661039-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-095/service-accounts/116031661039-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-095/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-095/services/compute/project-info.json new file mode 100644 index 00000000000..d27d063672b --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-095/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCxMR29Cqs0P55TNSktt0pBCoqG1nHy7daFZWm9MFgIKuBZca7IVC7E86QZVHHCdv9nfq8d4TN8ZIVsiVz6nRKJc1FVzq3B5CBaOElKfOwBv0QBNz8IAgM6FZtmTrh7mYK2DUb9nxiNoS0f7WIfBzH6gh/M91LMddsuq59FLeRk8+5G2/e7vj3b6pCmrNRBycd3vLVUlS0vLLPLTlq57BmHiM6XYDy2DIk8WFNKdR9lBp/WXCCKFcQ+/ic8OpnI1LoPKqXDk85c8ObJkwp1SNn4fWhrKgHXjWPcUlGMZX0qJeUkrGvKKhcWMz0kjB3Ks6INhEiChVyWYHzXb35y/AWh root@4e4f33a2-dcc4-11ea-82cf-066baa17f17a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQChOmxiOSmtvc1l6v1P/e8jd4oos8VQmAqOV0ZQffVAILxEcsB/Ws+PE3C+AnozlgrEm0FdWiuybhy48BpGxTXyEKzvRg7VIKlALe5eUPplCfRdIkb8hcp+NN7BCHNHXjIu0GX1hRwii8FgA9fegDGFiUo5ckVKOBIo5031Obw+gHtY60VE7kuZYSBgH/DKA9XVCJH7DuJ03B/j0wdpUbMPvdqpWRgOF+JoXs4wITQ2oiQ7zAvH2gd9SLFzdTjyuXAxRko4pyaZ6vFFGZ1f3ZqpmJOwyh/oGruHcY4L1DmoXhcuiHFGIjHDVgwlocg3ugmx5YRWWpA6sX2R4jm8b9dv root@d0abfbcd-e43b-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCpZGZebyVtxwN3KuPtzLFvxaegcNQyiLDA222PNzvo6dSXAQmwEi8nq9CyIvoMPo4/ViNM8oGAqzq0XRRt0ULyNhfl0gXaug+L7pgFch69n/ke0odVswqPmkkaH4SnL6qa5P8zIzUR0tvwZ3B2CBktc8ctSpxeFDTtkWBw1Bac/f+LPHTew5Rj9XikEy1Ehh1981xPRiJw80UGqS0IkLTLvX9wDBbNNzsgERpeOsmKbKtHVDqwfe6RRz8bCWQsXI0q5cqWqqevoySEN8q5vdt66TwG5WyS5YQgXP14D2BLAnpaIbkX/1VPM1WWQkDcy+J5NU4TBsyatN+1ycDYeFEr root@3ebbf040-02fc-11eb-aa74-ba383c228abc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSeIRhp86E6vcRr/bk9NeSF/sj+dYrAlQyUhUwiNdSnfmsaxZDDbjBjzDKlI7n4Qt10v1QGOoaFC+wtN0o2f6Xpvvh8kXdrnEDoyp3Ev8CoPpf1AhVMb1MT7952+LrZBAfsJaC+sKU3NpFWML3L8wfHdUeG7Ztagd3Lpdx4OozUbKmYTtd7aqy65D4fK88XvUb9kgdXwyGk49yd14X2PXXXEGywEr2voLJOrEx8BQn1vKaeMco1MNzUbxE8neYkAHPeigzItFuwIl8WKDE9l3oEFJ8PwiQV6cKPkMD14MAQ6/A3j47ZmyRNjG+qQUuoKXk0wHidKaAbCeFBxiu8vV5 root@da1e6a9f-0393-11eb-9ee9-2af320b50223\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDlNBncYafVkYeG52QwXU/rkRso741lDwlaiyuqPCBUYcJFA3xwYLD9yxoKnlWSbKGT60jhOWIiWN8G+QCuKHuYg2wnAKlc26vUhi82v2UUoaqJ6CNdBCAPLa84ckjQ/V/4NUh/TU/e5ta2GT7GwMywd/6RpU/xJfIjpULjakgkLK2aMs+QDAUgcvlzKksE/auMOj28M5VRCKkTQvY+XnkCJASAliNYfmtNYIXaV50mhohSo5OHMWVOV5pQwK2mXYrcOpyEpv7LJO04CUYRGQbxXKQ/2AJr51jZX1AC0lCvKmKPsoP26RGyCpSUfO4nZf0vmb9US0q78gsJKvQLR4lF root@f2bde3eb-06bc-11eb-9dc4-ba187aea6a9a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDLqr62H1ZnI2JJwoDK/O5idQUXTlMVkZ2b3lSD0Shg8ZhCHAnn/Jj6emt22xKpbnYfDdr6tpHA4rEdF8bvimeoPzIAg+ZxDMOYR42cb8ahVjzGRM14U34rZB6o9UnZ2G6LJpXaA/4uL8uVKrJLqazBefMWPzQFTm432v7xhg+z82/JgnE5MYIAKHElPVRmkbakg68UAYr1SQtaYysv2VqVk45uJ3lYEnG0wsjvAUSci7YGa3s/JzEi8EYPohVT75LfLd2YPaArQGzCuM/3Nm627abuAgLJPeRpgdqEYjUKz4pqdjvnZt+LQ6S4oLOb1mfHuoHAx5awk6XVNmf8Ebkb root@f879257c-0883-11eb-b895-6272783fc925\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDHnz3mVFhYd8Dh2NQ4+FWLZTzfKKzruBiiXylX2pqNYzo4YqSahGvBFlY+Nys+5JrZRyxpQZtmc8jbtXQGcPEbT/RS5Mfo5/jnHuHJKBf8vF6s8FYGsdRuHcIo7jFb1CKnDWHywKm6677fUpd0pIvL4B++q9FWhr3WwCR/pY4bGbKynnnBRA+abpcAuo3Sdx20j/oTQEQHbH9f4fMDvT25ZCf75pZ+oOYAnHGZ2sUmweWl2oUxbvlqz81Anc8o+XowLbg72ti9/gXN/KtrUoU/k8eNYxC3d3nwkoYio/+/64hVPt36N+6mNvLNBf9BVn5vLO3kplIU1fAzOuOr+GFP root@8b0047c3-08b6-11eb-b895-6272783fc925\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDm2QVavfupKcu/tnotoQ1/cjPhiEpSSMoXyGUzGmuwik88OiqpKeQ3drq9HOiazk9zO2Xi68m7xgxDlCiCw2uN65a/l+aXKWtRt+aEoXMdgs89Wfm4q+rL76fMQqtVFGesmC6Hp/SNKa3//h/VUJ9L4ZL2MtnkSalF27T5UVSSKgr8YWoX4tjz6gMx0PpGWcf2GkI9oUi6Ue8CjEZMvK2JmrDuiq5kwaOpeqoyBQZY3eQ5QEy8RzGQsEpcmtGCDnig3weH5DIe08butvSvm8t/zVaByzZM4V6F+9rYnctcafO4RNsEWellcTex9K/dGEYCU54P/v0spu3Rtc+/yr0j root@afddb040-0da6-11eb-9c65-0a69ced3f66e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/137DeFBwY4w3gaNyu8xIQKBXKCYL2h1q0E1gMvX3ZNYQ/AXca9igMr4EVe9p4wmfpqcYU5Ut2aLrRjePL0q847Wt9Fk8R1/PDaD7jb9N7t4K0dP/RyvGcU4fbG8+s8WqqO72T0T7+Ue/D5Yxgi6kxHwM8jmbfvBe9YMGK/BAKqWW1rvBTW1a68mnuYmqJR10EU2qdirDengrQ1WuWv8o5L3rE0UqDHMFNW6ipNl2SORG/oxMUam7AeMmk5+EGv/QFhz3UNX9rLBa28CrCBPLoGBQXGAPFTlsUmtnuILyVwS2n0Kn95GcRYS7EuUcIbzqLtNp6XQ1o0YWXrR+nSG3 root@26b9105b-1fb9-11eb-bb76-36aba4894793\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDFpYaOyBUjBYOaQDaDyyCZH8foTFD4pmrdrxd6Li/GrgDWp+x0V6doVu9mIHmNqrrdoqFwNN9atS8Rc4QeflcKsQHDFU7DdKwYjDA9EeV6PT5NqHZXsIWQbezV67JdiC9WxQgc0tIOBxwOTeCN+QFHJ/duzWxNzaQ8J3yfQZvMH4IdlcHMBJf2d10PH8xcgUlQBqe8z6ApKbRbAuqoJV2X/tw7MaprptoGHWXS/cw6rrduk79qfczHBbE+bsFHYECMvS7aGEzesS7+NZZTVEFmRIHdG8EWW0PpIuyiHoK7bgRzGnfaUP4W08fwcZkiJwsFOpgOwspmsnT0vfkzbvrd root@819a861e-309c-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCdKqmmd74v2g/XN/k6yp59R7hhxLfdmsexlPzVDbJ2wtwVOQaBllVwYypY4/7tKSSdZo88nkZy7PiBK/+iIr9EyFk/0SxaEgnS/kICQxtLBC3cIBqssVu02LIRiq9c7Py0vrTDpKdRv59qVqNGE8hHUXKngZsTbqW3MsMpe5n2haa359BTAHpJRCmD5zYc0XheKYCLHtAc0Dr4dun5i68GAaO6iTUwqgmx7MZBHhH2NZd/+/jr7LI2MP7QKmRpxE0raqWQfEK+IxjlQXK7WL1iYEeqn15goLnKvjvrNdRkCosE9NOSuhHevmDwJeqtXETTy+yUpuvLOo1x15kR9o7t root@f261b667-37b8-11eb-a25d-22a534811c55\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDpmoUiiDwcU1bCQ8QrVOyWERoEDMzSPOm70MJKBieFRTBfwW5DVBNuQiAgappnB6NiEl/1DvatIWO2zL9105bIWnVbKDdA16KyUbwpDh2Ql0VHG8iQobLHT8T2D5fbfZq30Iwdb8aYBsLd7iAOiWw7r8pdz7fMczvxw6qkBiZ33A/LxcVLRp2pbG81rKiCOIIzRxh0QSHcCc6GYIuruZgLMv5Gb6EJzln9wGWvn44SOyHlimjnYiMnOVHt7Evrt+azROEokMH65bKwY3b89mIxEd0JzDR3IWHjjEowxPU70OQX3uiLqhaYMwJERA8hHKAdZ4qJ+VVSXnmf/0DBhFx/ root@7e9a341b-3f53-11eb-a0eb-a663209ac437\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDToAJjLtO9LA6A6ksF6GgqkhpZdBA2d7+msmyD5A7vNG5jUpXQGxWSXZXTPoohRbEh46BYMtrjj0S7hrLv0l3EpQKulnDy7wAbntKdn7T5jwCtVxMhjphHeR53p9C8zA/xWw2JOfb2Ab61Z0gEdAEYTKuRT71klTaILK5ZXKi7hBLWnT6K8NCQDdijBeMi1EUxYBqugy0zetht+6a9qERqbuLJfx6H/0zwsx7TDtcZxH8SzK6zJD9tirn7+/aeDSKAkqbi19pFYYCCG3OS1/YNLXhpehQVdpWITCvDA3Wyg0Lg2ciNUaZnY37iK/S/VEHR2oiwlHUyoukEIwMRKpbL root@fea7add2-4036-11eb-a051-06e11967f91f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDjlI2TOfyIMou2qIohvmm2N7DhmEUxQVKQc608h0AhwEN81cB/9WnXr/4AJvIJ570bLC6pBdfOYz0/xk6HxmhRU6/Cp+CZFt3fXYtHjClvPD/vrsvXbhJUhFlnk4Ez0OLX2wQjSU7j/6ZDFJmi1+urLVpudntKW4I/74DpScsDYbrSYMm7bjLfQlyJ+kHgyX2x0ViGi79U9CERX3+yBQOZhwAOfZDosCsMCxuilWIzq3hDHko/ibPoWCU4YNZI4RhH4M3D+a69PWrd7r/M/bAAuhWv8LnAc4x2HOxMDbHvk41tZoZ8iqQG1HSlFvVWxcUkiV7AkhhwKqnzkCIq1YjJ root@907d5d1e-4540-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDXsW3VGi2OA1bXSd2al+kyNQ0p+0e+Fcrbs+Er7A9WO41zqYnnSsJvLONeG4xANE3N5JgZOXzLE5REP4+r0Q5YFz+SJSQZoWRvYAgrsVpuZtqOPYQHQEe4hIM9cGi7zLsQPZAKtpB1tR+BT+5hJvnzRHjFdMma3UMUydZwVURo+8RipRugYzyLNCBXcraeZH0DP6ecKwHbi6Bq9bs8h+XFzp42W2PmJ2bOtRaF8vMVoDvSq34E2LZNGv3+j7dT3Cy/ZBkDEGZMBnhvWWTeBGEE7Y34xLaJBG70dVoiX48t/S9MJ0hAxFIDe++cGBZADHCFtUJjpvTxnp+7rU9kFM+9 root@687ba2eb-4901-11eb-acd8-6a2a49dd8a76" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T10:36:23.456-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "116031661039-compute@developer.gserviceaccount.com", + "id": "6157637560104139640", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-095", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-095", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-095/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-095/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-095/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-096/description.json b/audit/projects/k8s-infra-e2e-boskos-096/description.json new file mode 100644 index 00000000000..0141f7aed8c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-096/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T17:38:19.283Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-096", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-096", + "projectNumber": "874649526990" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-096/iam.json b/audit/projects/k8s-infra-e2e-boskos-096/iam.json new file mode 100644 index 00000000000..9323f8cc939 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-096/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-874649526990@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:874649526990-compute@developer.gserviceaccount.com", + "serviceAccount:874649526990@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-096/service-accounts/874649526990-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-096/service-accounts/874649526990-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..57f6ba5d216 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-096/service-accounts/874649526990-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "874649526990-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-096/serviceAccounts/874649526990-compute@developer.gserviceaccount.com", + "oauth2ClientId": "100981573554579768119", + "projectId": "k8s-infra-e2e-boskos-096", + "uniqueId": "100981573554579768119" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-096/service-accounts/874649526990-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-096/service-accounts/874649526990-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-096/service-accounts/874649526990-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-096/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-096/services/compute/project-info.json new file mode 100644 index 00000000000..4a966917eba --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-096/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDPe8xS2ZE59/uFH3MqxR9z8Oj4fFDHh2oA7lUwebt5urdSIvADbCzB1OTE0loU5Nr5k0Fumr/d5aeNNWzgP//Hr5j0qZMtLE0E4l8j44OC+d4ZabawTM44iJpmRmZDV0sTzPyihDHO71LAjHEECoNFCItWFihKVyqHLZtQ4gktLpaI+kWR9Vf22euuGYG4sGV4CrV2nRiCttF3J72AnTWmRd65BEVtpYtnxQu4WtPp6TtGGoaiceYB1CP2Kz481bGyaCRI9GcNXZsLn8X43wJ3BuUKWgIcDyETFrjGQ7YCsKUMWXOJENIv2hSg0hNgs3f02K5r8+jEO0IZC1+SPOct root@c22c9f37-e15e-11ea-8c67-968ff53f47c5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCsysHWLi0WK+xQcKS2t0Kj3ScWuDGlVuci7rzdxXlrYoAmZ+31pHd2Ko9nSIGhSqQqxJU4+Qnok7BoRBd/lKek/7R+8/Hq+4+A00XHP0KH/vAaVz+PBNCSlEc41v8eIYprkiXJ59FiVDiLIqVKCgm6NrsdosxynBi7KZ6/00+Zfno6W3Bw9YBllB0C2niLJb3UyMFg40ilLjLcEsttAaRrjsqWoVeYCmjfSRuGcnmors1y8a+WdAlUNiecXHAlyhsO2iYDQaFhj8B6ADOZdYYDdiInghCs9eoHO8IG7UTRum6Zvz42GUFbOD2FedfSnrx36AZjoYS9HzBxgHXAEsh root@065aebce-e478-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIWLHHPp8sldDlDSS+91BArcJlUEEefpgg/VOB4h9deQvAYC+cIXQ9Gk0JlrnyE/DUBwhJv8GnXtvDP88hYxmNqrT6r18HCCjq4H6MTP6yuV4gZ2Qsumm81rjTxIHFKO46K0Rr47fD/ja4eXBF86QMGs4e/OzD/U1gr3lD6AE43h+wiRZi5Zh7RpEl/Xmg+cRVN2O307qxm2XH/hb/RlzfgrvtwW2QAqzHCSaEAGmUIiLyc3wFnhWLdo9YylTUf4LPTsRnLQDle8gKeoh4tsITRUYPPcagysEUordPCDemAaaiGriIzz3tmrn+sSpW6h+cjwTn9pgWl+5eRyAFyvNd root@8c327770-f274-11ea-bd49-066a8cf01e04\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDLV0Z2xFq7kcfUG3+8bmx6C8Q7m5yZG1oi+ubEEmRJRD3yJ4A7AB34PskSGdtpSDvbB21wLbj11uHS5FsgihXiaBnVIcM+10kU/J2KWx55hYEsIUGPSFeKciL1KjIAynEpJuW0rsvVSYPmqnBerAlGGiaMTNKN5eslUwmtecATCHANs6OT/uEN49+eW3HlBmM3Sh0SIFlKP+DgqqjQXDNnN9C9+hvAXFhcrxmMcAfPa7Uwx7bj3AxNKd7qH+cB6u5tny9NJLDHzvO8DuXNna9H2YEHmWavJdnH9nWAFhS+zFcQkXeVfN9K68tEYQ85dwEqO6BtOp5HDNTtq4A4c6Wr root@ff15ea3e-f2f2-11ea-84bd-b6fb6d83c68d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDGXsssRAGZr5lD0GG6NTpbiXFSMJGjgZMA5xXGmGl4dQ3BW+WsfhkjqGDLCaTb9E8BQihdIucfWprS/mtcNzpYyazGC7RQSdxMwU6Pn/fI5Z0o0XVJN5r5Wrq9TqLHYfImPUZ8ugyS6n8KcTdVp7dvLh9ppXAKkOgek7jJz3Vk7fNA+GlUFtZzD2RZ+qmpVzq7/SLppezaFEIscMV/EfYdoUWRxi1Z+5eSkemex9F3orueQv1fbbpi+1OyT2P3gv3AYeufYUh+68C2p/lLfmc7X28HuNECCepwoYSkDYhQS8hWhCbBBhmvOS7EEwXFxxHK0mYUxYP5nL9qTt4bByrl root@b90d4165-f5d7-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9zpl6dbHcc4OUi58zSGWt588uN+H6KB+QQhEBnRTYwm8LNRsot3djiNUkEWwx/0N63QkqeXKAxOk3y42nYfjMJ6halY7YG/tVw388jj19V/f4x9zUIuL+GT9Wlbml6w0+0ymwK0ON+sztBWZOOMqTcBjsOb7eLXyQfk9gPbIjuJOKX3QhoZQsuFik2H8+Pz6HLxQdxciLRgOOPY4DqTw8pr5l1NunPxMGp33i2d1GomLgt1K/CdojaukrPVeUu236XOPQ4aqVPN2dwGEiTiiOnzwCATJpVhRn/zteePw9Dxf8L1is90YlSOXLmsbYi1fkcgDWAKRV/Cnxnp5jnld/ root@cfc0213b-05a6-11eb-9dc4-ba187aea6a9a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCm0X/GxsTXepEFcUYQmFGTPWN+UkUCiQYmS63s3AR4NGNSBs+1kZzrMUWImPz4caLzUzUcGGgiWoAsDyA1EBikUSyK4k8R09BmbLokcmbbSVGqx2uUmuzvpw7skoES91FNRC3/L4/CDYQkUnefxTziE+333AdBRWszpqiIc2n1wB3axXKy+DNnrsmC0sDcRX2b4odltyQOvV76U5SxFkGWRyslxaf6FqL0541UAzhN+IvknZP3tLgziMQspQbtdlC069jHWyOG7zVbl+miw1Od8Ffaksdg4r8DitNM9PmHn163qWy868R86TbGGLo89kZtXlu+KIvdnssHjucMAQfz root@1b8b2ef6-211b-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9JXjBUPv5b81uI63ZX7pDVJniR3QyndXvrRRieFk6ItXi/Vd+dVMq53MqaA7hOSuTxSrHHq9xHj+cGtInzfTLe8OY8CUTajvK+X/XYwjp1GfrZAVXz/Zo2ioKEEryYIaLGyovduywn5a5C1XneU56dyrG4konH2RRjKw5jbWD49vV2W3nz3yKs7Nesxq5tV7/y5yc/m3an7ZVpyPjV0zh4D8d7Euvpb4KbDmk0slYIlIE9G0kNzSsxC1PniseGSYl/FIAmPMpD4QF2jCj9kOBY9AxY7No2MbwAGP9OMEL9YKdS9IeS1mpQwrw9eWZSjDoDC8gMCLmUfZRtodCsi0H root@d5c53e55-3c43-11eb-a772-a610f2f25584\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDW59Al8n5i+qQZc7PXVJDVegwZydd6E55OTyS8wLt0tPvrHfhhmGr32M3nbdgQwuBdW/dASo3IyLemz8r7iWFQllhtd/7MQmKjHZSh8eFvOPi1IbrhPCR5/+9UkNbswMm1ExvfEq9EgTt1QqtKJm7L3rMsuwIbV67a5TDt1eyPSPiy+uz96yWWln0TrS5nK9y+NhmBiUN07VImqm6dN4/kGEDd9wwcA/jOeWD2xwnjn0GCVHhTkz+LjZQoWloxQKcqGxBRZeNFQyBqncm+sAS4+IR+7Dwg0s4eMVYsn+UM++we8wm5skWlhLzCTM/vLsshJJ1dsUj9M5PhWse8MS1p root@43afb983-494d-11eb-acd8-6a2a49dd8a76" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T10:38:28.829-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "874649526990-compute@developer.gserviceaccount.com", + "id": "8619499942154352891", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-096", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-096", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-096/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-096/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-096/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-097/description.json b/audit/projects/k8s-infra-e2e-boskos-097/description.json new file mode 100644 index 00000000000..1f38eb5e256 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-097/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T17:40:14.708Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-097", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-097", + "projectNumber": "847658742492" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-097/iam.json b/audit/projects/k8s-infra-e2e-boskos-097/iam.json new file mode 100644 index 00000000000..210fd592292 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-097/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-847658742492@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:847658742492-compute@developer.gserviceaccount.com", + "serviceAccount:847658742492@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-097/service-accounts/847658742492-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-097/service-accounts/847658742492-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..1bf547d0835 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-097/service-accounts/847658742492-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "847658742492-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-097/serviceAccounts/847658742492-compute@developer.gserviceaccount.com", + "oauth2ClientId": "100645573652842431765", + "projectId": "k8s-infra-e2e-boskos-097", + "uniqueId": "100645573652842431765" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-097/service-accounts/847658742492-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-097/service-accounts/847658742492-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-097/service-accounts/847658742492-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-097/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-097/services/compute/project-info.json new file mode 100644 index 00000000000..b470b3d1ecd --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-097/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDDp6QBq06KGJI/IZTvWrOBnp6FBNQMIYfy/DBK9y25J85fBuPuHTldbVIanoUw5+yAbgWv5wu+tw7X+uMD34BkUeCGqDqT2gd2X8HK47LoDX0v7rD3eLagNwIcUB8S1XLd4VfAosmshAcuKKO6/QluL8gEVMcKg5Wcg+5CRSuseF1CUfgA/Xu4yeL/4v07PT04rxSMzdCS125y0Hmf+pI5sqilDFtL2JOR/heXEdtb6eozjtJUfaiWjexY3cWG20wNEe2SOm1mS0JNFLl8zVB9ca2fdLwF2JDRX8Bg3mYHZy/pjOZiuqkQfW4OprZbr+pDC3tcX2uq09BMtlILpE79 root@4939a7a1-ddda-11ea-8a0c-be937dd98cfb\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDluuSibCrYIKHvD/QsEyvJJN05K8YpKGGrY8ypPbQJdyBemU8Vf//eRIUjDVkiPiJ//TuczV5EQSreZc3pmrsDhXh8Ju+tqoHOMxhFbZilc6TAvB6+pycXpgWC8VGCxRvMXim+PrrTRRHimqlKymtvzgoI7jdQ+h8jvKvHJ7GWPDMdFvVZv5dkaD4sz+6e06uohrtFZ2OPatJxgSnI83Py+huCKOFsLYxA1zpjJwyEDc7s0GVgyzDZyV8hm6KFiG66bUoR8012Wz/iTxeRNdiCPe+Nmz7Dby6oCY66Y/kmOaUGtw2bMuwrU/bDfCW1ixkTUcJ7jKuePndxeDWFt4+R root@319c8460-dfed-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDvXxNhWzeoprxVjx9aCXNCtFjPg5p60yJWJtKomL2L2dwcyIH36TcFjrjOqdGvzaSRz6AfwKx1uhKq1tVRfe4MDmRyYiqYBQzneBrSLJ7Y9j2k5bzmCU9B4CaoQiqfjxwl7Yo6nOCEG0eat1egjoPip8V0hkk854g9jaiJesQKOLc+ICM1jrf+jjJcxbz/ivMyoBZU5zdm76X/e2Dw2G7fgP162bfL1iQ9VdgtY83dA8Wok8SeO0bfTwxVYR9+pvCu2KdJSVbiyXChoWLFwOoOxmMrckCNAJgvIUIihU4zUOMgCSxnVGEj9zLP7idOcCpTWc90I4TiAJeOb/1dRa+l root@770dd65d-e8d0-11ea-aa1a-c6580c04344b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCon5mJSObu+ZZRo0QpeeVL7L0USpjUDitLjALfk0SNyoY/m0R/kBNwP6Kdes+pkiHx+hdoKv6v+o3LHAC1c7E7AMYQI1+zgg/QaT8ibJaZSLXIuGsKzxW5Uq2MMh4H2/JlNx6q9qJbeWBuKHo5suVn1J2NpRj7WZkrNFDlSp6bDCETgJMSKN3pMAixgNhDAVtD9AE19QoYYzoYWz0brUwEFjiLFBoW+wDnXzr5zmTrbkKd5f8U29rDNF2+4ofSgBZ0rXngDxNbESGbr88dkyYocKkgHr1shUX0L0bN8Qo+s3RzDnDv/FZ1wIYDadj6w3IWhoRAIcyBMqsNudDTi4cf root@530a0863-ea5b-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC8sdErj4tj0zqvQ24/ldeIXsa7Im8Ku48TDD/79g6uwj8tt3xEd4r9Dnr3TPHWUiPjrO7c0IZIC90qBp6h+dwZCh+GcjUbS60FIknLhPcWbokG6dZhc9PAK1A6lden9+ICOxkbzOFDoIJcDULIRRcdnCEM0zgwXAdWpv1Y3XFXaSXx2e/1khTYqZZfh9zgTpAZtyJADoe9WBsmaemavqjBwY1w9CtAFl1gePcjloazergjOiM3+ZTrhj/xgrFGr899KXqajbO0Wp47FdI2+paoHXci8ypyowipkyslgIOnANZVqwSGIurQDXvsY60szxphUUXFqK7yIgtCmLgvdCr1 root@ac6e0c21-eafc-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQkWKmTgNHalRo7QkSthPcIn3PhIaRKghJT7/LM8ZxyPK7ksNwdWc60A0QkEz4hfMrihdyhpA+V4XPxIpb5WGxJOoJJloswWE1i4Udd5q88pLlENaj97PqUceXHip68WlGp3nrfuOS/5VVW8DeKmuaKOy44TV9pt4cySZRuoBaXL7W2cMTUuE82+5MAKv5ewW9sU2RHV3z7POScTyGSI3X32VZSo1PGI05rFEPWYJcft6QBwZnvNByp7bOUu0UL0EmOcO5a3dGjlaJJmH573RuJZaJNuqii91jYxxAtSKn9BI5XtzYeZD3DiKg6o98EHKLWShG28Vz7nVybk+wHVEJ root@a216adb3-f19a-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDaID9wF4GVFR0FBGFNF9EM8FhPzu2BDzrKg+K+LwrbW+PKghHXmaMz3ZlIeg/9ELKELsOdRYluSRKmG4AoxO7eATL4JEMqemgfmo2kfWpe/5/30cGarXVnksu6p7Rmed7ic5RhzLTna7p32AyAh3fCrWASWKgMouo67OGJqxbs1nVk3HCylyP026BR7LEJW/0rWOpY3LIf6IvGtR6ATOpN/q01+sjqyTGuPSlmUTJ04YvCVrOOxJTy/my+pcgbQ5SdubVCGww2osLdzVCO8uBJLSVyhT+xhtPr2JxTbTeMAmcgyVuMqnuKA7oSSn2TY+Wd9RtthI7YwDO4Sqy+PcjZ root@02c1ed07-f540-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKIbdcpdWQ6FwEaSz/bUWTZjKQJvdji4liptGY0gp7uTt/uDDzJmHU3zMdQDCeyk9tmlxzNiKj9ZdOjOWHTRN0/bwtEXJIrk4X6zFjsQKfn14a7SW/jhcZKw69ksRPUx7SX7z14M2R6dqTiE+yJUrrtTgm3fw0w7lf8ujAvLzYw6c6Cm0+INCtXvTUkSuDaHeBZOJg3Y2D8rr0aHfC/HCeGfKTlHJmxcd77Br7HJn6Hhi18EEW8fLT5z+iLIZrZF/22VxkLcgNJEf6ppY9i1C8JRSKX4PecHgmgq2p82qLjFOvX6IHDG9a4UvjlQEI7jbdJEkcU8OPwwg9c/vSo6pP root@5d20a5fd-009d-11eb-b4e0-eacb7c15c8a0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDmcDdr3aEcByF/Q7plrhaBmvl6ZPLHHgOFAqaUcvNBgjooNHVzUARcha9s+g319DtNaQgm3T7v9HepBAffr4rMji5JL+j8PFYxc6FSMMESuWDiZ07JlHhYdAjQ1LE8n8TDS54X6WiXrWfce1X4bsuZ0kFrx8he/xsMkh7dBh7zgO+EpB0lBiLiCkdKEca3rJXelk8PU8JKm2N2T28ii5MR2OizMufOqPNVcx3Vv5LCkvzpu9CSbFg4FqY/SHT/wUJSgqpIXqxoMTglacwjXBcxCPMTawV+gqevN/xBN0o18s9yj4VOUz/WNtV1ZF8y3/aDuMYly7c1F6Gw32Vba5Ej root@f8c9f17c-0dbf-11eb-9c65-0a69ced3f66e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDiCG6qhlT92JunwzRgcKoYhTYAZw0DfwFwOkuxbMs/BSTyYy5ui9Juw0Tm59xYKoe5o2dxUji4X6QdjeFRKESh7k7Xef+bCclAwj0Q+KbCzv4tSRwMlBa/lM+C8Tk3s+C4ToBfnmNjxieFsWovXobRIm/Rf/s+fN3mHJShaex1iFJCWMwFXnQW26ZYsB6+smEEeA0VLLAKNYSRUiqIU8I76yTQdO1EHoZllhORxhIOa4U6q+LhGmDi5pqgUMDLXajadFOydLQvw3Wbe5ZiOG6g817thEsKhhv/ZpDD+6ah1mO1jo1XSQNVtAoN3Wz6bDNXeuHF67CA0g5GtPhH7y1f root@c90062b1-1134-11eb-9a43-0aa5164aad51\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+KU9vf3N06cKwSgTlzLg9+Gv+B2o26qqdEIp2jL1lNYR8Wx4I5+UcHGU8vexi/sPVLVz0nEGuz3rYyVIYy6SguwRezC/mXbqFyUTmwudBDvc9Y7d83diO6cUQCVgcK0QaVAuxMyWksjeXycfalSeDqIBNYIU+C2XWs78kgMihzi+G4+IFpaqkAUba9OGoD8okCdIxHSKIEAmU6XqlMP4JQrDmg1EUvbu6EftKpfdjBBElUc/k+7IYugWObcpX686qG1iwGbm2WerG3BVC5IcaDwkFzolgRrMhRv1aHQ+5LIkUoisvTCB6cgAcJaZcDTkJo3u9ar/HZ5LI5Nq40uRv root@40947de9-12c9-11eb-a3cf-6ef374375bd7\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDTT/+jgV9RYIbJTSXxEaxyJg+mQ1Utbm9q18Zuw04mH2P/8EP8cPYnn3nd+51iTgBzWCxjYy2fO7Ccd+Li44JJ/WGmtR5GHDbK2dEH8ayS4YM5nAj22tnozRIum6xHCLedBT979Lo8D1F1/p+5GTsdy7v0MFAgq2do6bDPVfHT5X3VKnyjlKI9FZ/QRp9Mz+CVc61ymmJYl0SE1dpJToLV00/dDHT7v9vORhPSageLCNgCtY1fsUjzsg3bJXnx3njCnEt8GZiXpnLZz+8fmK13rWzxhj/1crR+iQjkZYxj5yfA281OcYIpB5eJ6gHLRncbgsvyNFSAejXHMidh6ePz root@bf6f88ab-1c11-11eb-99f1-c6d701d1e283\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDWi3oGOy3mwSwNt/5ZAQ39Yp5jcFDlHrOS4yAtbjolkQImfaA5yx2bD1ynI88QNSxCPNt9OMYb+57q1XLFLULPBg84oVId/himH6nRxdOly+xp7G9mOBcrBSMeWswxgxPfWYM8YsVujaupppogejkFnNFoai48wjq9GOihrcxfgar57oljESLdl3Q1EqnAuJKk89eSROe7Lch6vFMtCmaDTT7Uj9PqHog+FTfgmOPlrsOvSKNpr0wxKZxBeeZVtz4XDAbSNDs3LVIQiy33XJjdDQ09QuhYPwUfKEn9frNihrZp69Q/fhtE15Th8HM54neafuI+APRRZEPlAd0b2aIx root@cdd8623c-3804-11eb-a25d-22a534811c55\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDsJhHbwcI+HS51heRqJCfp0/1+gO9ivzkmsxcb4MnDz0s46FLjngLf3X7jh1I2qKdRd4f9pGyQkRcIy2pQOrcT6r3Cf6DzaK+bkS6snSMroieti0K9vLn/C1XkXOdVOsX+N9gBpsfDm57XtrcxpZGZWHeGbl2H/49iWW4X0boL5DW0c2hqRoobUjyEvSK1+dbq2VupZHVLPfkIjgFw0xVxE2ESNffUn3vrQKZBfcFywfSFZb0a0A0iwuBVFLy376jja6zID+0t9OlWNahkg2cfDxzQmvPLLjMYfZhDTcDihkIfZm8na5H+zDXSkeL46hfPVmjE95DUazYmq9IiJrQl root@43fe8499-489c-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDMPiUhRCp0z400dIW26KiNNEao9Ey0I/az2HAiVmHnoGByTEqQqlMVo49nIH+FLM0mMBgAjtmDRBGYjd7ywLqMYmOlDx2w+DLMSec644Q8N9ehi+KC23tZ91YUgspv6PGOZKiqEtiWneSYHQ0sch3oJNiHOwc7dkkYpf07zAHxeiKjRjXqb1K0XrOyoljrvq5bCBzCHlW5Cnsuma8ziTc6zftjm+uFFy5w+/cySb8mvANLwgEcmIdDz5BKDsiAyNVK0ZgGdPlZorFr30IsUrw4F6gNj4zbrcDNZDAmZ5Z1SZC27ttqZDS/D5NhhtifMNoJm/5vQcFiPr0k89IEMwUH root@14d54188-4fd2-11eb-ae25-d6360d0295c0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKCAQJbgjUFXfVRMzFJxBQMf5+oG+k/SoKZHsvWVp7184Y76Ukash+b+Z0tWKcHXHnwcvvpMv5V8aJ+gG2B3se4smfHUkg1ZlcPUkVsOgDn7mm54c/RFR9WN8niokmGlb7uX1aAHGJlgdLOArP4lW0mo0QoybX4/oGnTf2lSie+Z8ScR3Z015b843cpvFRqxnKzeQ2IFL63W3Bu+KWwphMFGxp0syfu5YKmYqLIZQk8IpTCJ2+vrQLHgVIRH87xMfi3ASzPx2o/Fg1iHA+c5v0iZ4oDhz4xRfVES3lCKSct+4Qs5D7db3X5Vr5xRrENFupV0jGX/yMbZKRmnrKifN3 root@244a989d-5360-11eb-b6a5-7e8b7adfd54c" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T10:40:25.792-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "847658742492-compute@developer.gserviceaccount.com", + "id": "3308944529018337382", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-097", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-097", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-097/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-097/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-097/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-098/description.json b/audit/projects/k8s-infra-e2e-boskos-098/description.json new file mode 100644 index 00000000000..eeb5bc8d229 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-098/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T17:42:18.825Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-098", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-098", + "projectNumber": "108849447085" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-098/iam.json b/audit/projects/k8s-infra-e2e-boskos-098/iam.json new file mode 100644 index 00000000000..e45d0aea526 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-098/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-108849447085@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:108849447085-compute@developer.gserviceaccount.com", + "serviceAccount:108849447085@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-098/service-accounts/108849447085-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-098/service-accounts/108849447085-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..c7b748dc21c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-098/service-accounts/108849447085-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "108849447085-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-098/serviceAccounts/108849447085-compute@developer.gserviceaccount.com", + "oauth2ClientId": "106141427787384791149", + "projectId": "k8s-infra-e2e-boskos-098", + "uniqueId": "106141427787384791149" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-098/service-accounts/108849447085-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-098/service-accounts/108849447085-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-098/service-accounts/108849447085-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-098/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-098/services/compute/project-info.json new file mode 100644 index 00000000000..9cc5e49fc30 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-098/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCyKN6Jslqju1d4B2DSkTCESB0uZUSDME+WTGY4YZv9dblGLQi43s4MYJc0+uKCv64c/Da7lsHQUKsjvuK1WiY3sv98EDUYMB4PCSiy3w27+1W5yOz26ooB6DgTrUfv4Iw+PftMvT8FmEA8/60ZwIiVkQCu+iQibHGMWsj+VEHTWhM0lovg2sCzutLkgsUX7YPJvfh/vN8M1vLA2imrlI9G8Q85q/EMNNM/mgwAX6q314kvfbhoNKLR1dn2gFM9QAVVkNqlEW52rTJUf6wYYDRHkQXRCnjBPZfb1YJtaG2k1IGpl1EEo9s9Ec8FgZ+bW5U2JvVkfFN52wPhkvzHTeFx root@299e26bf-e63f-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDLCea0uosz/2g1wwmCABNrrlK7X9ptEcd8BYx+4bHMiXaY0vHy7pWkS9vmBRJj7ahKz9Qh5XIyeffOtUOXt72LL0yrt3iNssmAVj8v2B17ZLKdgVzLgBmpXz2lQGvBV1Y8kEiTxbbP7FAENgyPkNuTNmTCY8igwlgNRApqUSGq2DxUQATM3WJ+Of4F2JNXWIwPwhDi1Nz52SfKkyhR+4bENf1pq9V6pFmPxO7YCQP0Riz0CPwvftYaQzHaHjZJll41csI9jdKE+gxsMLn2ftHyh+LFqqcYDv6V6RhbHDJdqBx58G0kSzwWKNZAL71DqrgmrLgPHWEkPVH6lcg6JSw1 root@09e720c4-ea42-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCxea3RntAXhFF3wi8hYcSUDuFdNYYY+JB3lWy7xysjtyNrrALpGlvGHqxu9JMsWv21RdHk+Bke/7hCjZ2aIwqDxicKcgnKXMrHIAHCYY5jmF7LtAsIhdsJlT4P++6GP2GoFkQ4HHRvlPFbrxjNP1B9EbELLHxSNcLnBCIPZGbtEFiRrr9Dnmk9HzS0sUX3Auz4sp0qev39hYX5tFxc7e88uzxgeOgx2XRpxV5EZLeYdpZ8rmINnTVyQh3n1jWXvtRd4qta97fFgCT1xO6wGwiImjhB7e7rMbz0zCDKOmL2QfsvrbWejtOmnsu4vkCtT2JzH/mxAXoqGSmMP4VB+Fo9 root@2d131309-ec09-11ea-aff6-5a14b0d7f3dc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDrt8/HhRYCq+Ndb3AR4mFN7eUqWw0VYAkHWZqqalNgGJ6u3uz9eZYLDR7wLc2YIwkZDCxsdOkY1NDUWJQVcWqWSQIKPD5a9IPvI23bmgOWDat898CxnmksxVIPwSwRurkZO0+V8KiFMHiB/BhSa0BzPcFQRZTs61kW/skyE37/k6ZRXEU8UbuhMSiENkAq0+95+yxrNOxguB16xoLDRmyyprBL0jfeWp6HuUJ0c5ucSQiulie2M57/wPckQo7FtcvRAqPrGDq50MsrWtcmuENw8+kDudczU15U8E+y0NCBiJLlcLtN/g1S0MhrXfyQ/ppaJxG75pxujZ7NIMQxY87h root@8f3d70f3-25d8-11eb-bb1f-6e397dbce9be\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDoxqAEIgoreChmjN1bi49iNgada3GXjOMuLGkra8+cz3iXYuyeZFMHQA0KRkdrU/JOqtO9zvgzRm78iNUJvdetI4yapFjPx/21a9aHgn/G55m+HHuAxcgb0HJgBrqEQgG/vYMU+yFCahPNzpsrqLQ5rRiYPgAgs1nJh5ThqV0KwnTAHpAIGxXIDDSZ2QwkgfLrpriL2foLw/pOnKkvrRxbY+3TYrEicyzLqJFhvertI7fx5FWr5fCvHP70PbXT3w2bVS8LtmX/+BC9LjTl65xcLDyM3s5msb8Sl44EXn8zl/DijVn/qHIHYWJ7Z76WJNUxPNfWzZ3kIPVhAnJMsOmp root@22018aa3-260b-11eb-bb1f-6e397dbce9be\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC8DuRxmkOzsjPJUunNYJxZJY2kCtG0p4BZJ+PcLCa/t1LZ9CyBKbWY97HJsHmnEzs8ybiICphcgnpdheFPzwGA/H0gVGqrA73CPx6zymBtR29IzOIC8A7l/XiMTZZLVQqcmipEqRTdI3xXkgpizVwjLTQ1veKS1sVibb1t8gECCy9wP127hQu6elWIGNjrc3sFUtpju5D7OfoUnr3w/4mCXkjoMYVfjd4KEpJiC17Vn1ewYxysRIx4cmAXXgUWviwZ2gj8PtZBnwkhzzhq12k6g47nNWPEzLv4kxYelISUfQGDagc5SNUuvg9POo6PvqgihVMHc8TXHPDWI6ZFQbix root@1d31ad7e-281e-11eb-bb1f-6e397dbce9be\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCsWY66R95s3b60k/PivPYTEAOluwEiqEP6mSOyDmNIgj+L0Dov6BHg2kW+46KV1bZi6zhtd0V250qu23Glw73Bl86R7fRFlPeLuFmewWYLTbeEcjDKF+ntgLsnhl9lReTQ23PxZOsVyD0wCfQKSUDhuXVe5mGnocDkJKHJMFa9t64Tx3vsGYaVaVYYrYaZHAnyWv/rQVZtC5qvi6FjC93yfXCC5UZzNGLVpsrTTxObs/Y5nLosh2HDqPQZwj8xBVn95KF8Xu7WYMJ2arXainX29pjM/zTrlv6d9WjPiVnLcyjE9ZjFqwLFZpvxaFnABsInnp4eLkaukW98LxU6Aufb root@6571a4ca-2a4a-11eb-98a6-ba1d66ad0079\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDYHIac117nzdNZakR/rwVCKGantL82izEIKowD1nD+mCoFkXffekGVQgn3tqXbNq7zv9s1gjwAknHHjGjnOUN8HoPVCwLCTfaXX3pTs5svAMeuzsmva2NCRcjYEQBWMpe71vdP3QCGAUJbn1vsWUlCtD5pDssqeVWbGzYCzO3WweNckmayyE8bD66BZLtSaypSxHTbpW8Yft9/NyYnWI0lrP+rT86VZHaw9hSxVbe0wSv+Spe4EC0Df3m7ql0LBlYa2uetJmr0iRA+cV0thIruo1EEYr3stWdUy7V47lwgJ1Yk8pSwYeIgtxqKUxSk0xMWbs7kUslmfTFqGQVhB+1Z root@3c76ecde-35bf-11eb-8ecf-c2fbd71c5254\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDc2MBfJd7xW1byl1K/QrX2XNMeqOq8LAYovYWdGDTkHZ5Fdtdkx6H2OZQYHGvVWlPzLLF+crSidIcj9E7RhJ0AYYZYXJU7k+kKzrN/qw6qFHTJLoJlnuN1PstHixMK+JGhYgfs3DEy15Mcb5FBzrCO0I5XYuuVBozUY9zJVkoI0vtQ+y/LLzhzaZMqF5zCsrx0UnIYLEsXM43jx+pXWu1lkGMF9PZ0K90ruJ02QKYBY/zsd9ebFwRaZIFBWXtiuSn3gmh911FnhvOUGPHNo0Uyp8Z/URBO+o0imm67sTPkfVARix6sUX8xN/Wm3vYP4fiDxTlmG+xgO9tRZetlCd4z root@2275477d-4573-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDT4wBu0Rg+L5oq4NgQjxR3VLAqxom+sm9dMQnZ5Bw0MB0+eD9q5HE9jAMPsTA6eVWn4lGcHVOIsXVdZ1T5JKhjuh92/CwvSUDJqRY7uuMVzPiff7l4Fp1nPe8ibwG3ptEbn1SU8cViztIEivf1xrPo+C8He9jbbg2qiAYLyCy6J1UYziJCLa+JIBgIiweZROWRL7eaV9lZmE7dMrN66zvVInbxpcoR9vp4r2TtZp27SwYFTwJmnYHNkTuZM6r45MWdRFye82sXrCYLE9DFPpsSHkqJC+mgTAAVfoKupSMWJpGg5MWxJK+weJCaqQiL2/unmuvps2lseY6dmf1knhAd root@82838211-4cdb-11eb-af93-4e5abfa0c065" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T10:42:30.749-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "108849447085-compute@developer.gserviceaccount.com", + "id": "5714553250491677161", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-098", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-098", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-098/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-098/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-098/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-099/description.json b/audit/projects/k8s-infra-e2e-boskos-099/description.json new file mode 100644 index 00000000000..3925c2542e8 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-099/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T17:44:06.769Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-099", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-099", + "projectNumber": "850929155353" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-099/iam.json b/audit/projects/k8s-infra-e2e-boskos-099/iam.json new file mode 100644 index 00000000000..08380052a5d --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-099/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-850929155353@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:850929155353-compute@developer.gserviceaccount.com", + "serviceAccount:850929155353@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-099/service-accounts/850929155353-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-099/service-accounts/850929155353-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..d4d5d21404b --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-099/service-accounts/850929155353-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "850929155353-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-099/serviceAccounts/850929155353-compute@developer.gserviceaccount.com", + "oauth2ClientId": "112957261437927185148", + "projectId": "k8s-infra-e2e-boskos-099", + "uniqueId": "112957261437927185148" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-099/service-accounts/850929155353-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-099/service-accounts/850929155353-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-099/service-accounts/850929155353-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-099/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-099/services/compute/project-info.json new file mode 100644 index 00000000000..910ad3b3e36 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-099/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCa8IfabflaT3YXHN6zw99HnWJYk418To3wm9NH8poO2AcogajKaPit+DMDRqBjcZOqPZIJAgcWnM+YC97aMY40hN62uxIhrLT0m7E0/45IX8IDjpA6JDlbeFNItk5GT4Z0TzhFWA3JxmBkPaRfmc51eT/uNyYLab77hfCmfwsFEwOSu/jjMCThObwHMNaB08oSc2YxhApWmjyMP5leo0d0GqBvN/Vke0aFBXHtMrIfeKA01WkQ+fE2bc8Dp9xpY69JXok8oVyadsnSIDTjqZ4+bVYtA22gWBoJ6ktwB7CmOKAFbyH9IOQ5YMF5iApx+596p1SwZjl81jAUManRusHj root@2494de16-de26-11ea-8a0c-be937dd98cfb\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDOpUrk2lmtfuCxNpAFYbE5KekW4B3XBNBq1de4Xz/WMYa9jOHZJsNO+BEyxgu2VXhbKdrSHE6tAV7ryhjCmrisSU98K0fYkNjqE1DQgJhogBCk6Hm+cVN3OgDiGQiB34V846gYcSaqPQKJnttBh2zeQ3c2F1XkyrNwFB3/u7tppH3RpfwPQcjHqO9rUMbYrhELvFyLNjs3wvEL5EotgkjS0fGQvJ0QTKWotpehJ8d97I7wxgCxLGPQTusUU2bHsTBz2j+vB+6VVckSMXwzkPqY2zsyPyWdLWLX9lH/nYIAvOJvVDH2VKn/DKbSgp6iFfsOk9kjoWLKCu6KsfXvIjCF root@a01868a8-df09-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2JZxCgARfCvIQFMWBFMXCHGPIWdsDpiIuVtiAV/jvccDDne9WyiUqzYPEoKOiMxjZhA7s5MpimMY8PZoNeH9kq8KC5pcVaBOGVlUXiOSf0yqPMdbqLEhmYqcPe7EyA+ly8EYdK2T7uaMQiE3yy+3BTTBLIR25pWpvd3pX4ihu35wdu/ylbjKjkNIm+7/KAS2ChzrBwAsz1dp3dJgUJJr4N+bOCjzh4jPwzdEWOk9JkPPI/M+CLazjt6iVI2rnDX/ksDDWtSEWQoxb9NdRYsvwGAJjFfE98MAguAs/lSQGLlfLn/oeuV39xCCrr9gobG7ol8IOTOojNE/AsXwkYAr3 root@9b69c4f9-e935-11ea-aa1a-c6580c04344b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCjB8kJM1msnoBAxHjz+EyZ7wqQdSVoHUZ8dsCZyEqvffWJRNXvYRBN5R4SYqEpQLL+O7uFSu0+jvRhdcTA3GsgQ2vCppu/QlCiCdjGiCdFJhcVje5awpou0o+QAyZmWPZU2Sm9b+VZC8xObOUAchLKkr2BoRGI3tswLjED8dUGJs3aGY/k0DJfKfk32ttZoa0zWBWEZOgMJIhYFCSPlQPU/yIUh+yICFG2x3gqNNTX535o9b5TRPgmEzfMF5P6SaFEUsOtZLWnEP8FMFeE+MgUItvgt6L+gW9QB/Nws0XFECWffkqo1vZhzpCvOLJuE0zJt9jwYxM1TEj/ksIp3DIJ root@895c16b3-e9e6-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDcMS+XucUIHjWTV9JHQEAKtvBalzxcoEaIeNqTN1jL4M8eKcPf16P28BLk1/O+GL2LvIyZGxlkMJqKTSC6otBz+esaF522zgsM4pjLjV0inxrxX4Z8wzGZWMcHDuFyLpoG9w9ruRT3YGMVSyhquSYSrsdZ1LsnGfwXVH+rkKFAf1/x3maPGMrMTSikWO+5jskkdNSawK4McooVt5HKuDZaIM4EpPLtQbRZPjLfJLF5JK4uPtb6xL6voL+Fch7pKChZAITDf6XJnbU2qBpUR9BDhJXSzoCDzoa5DjzbwGxUUNfzse3Wv2FvCr0aLjNJCiXrU6835pMKSITaBqpZb4wH root@b76ac091-ef64-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDuA52BP77ehBU2np4ItgyDjc3VhI0Xzr0hBEWPjBPft8NuZGmNhRsRIEP2/O9TKafml3fMQnhVb7ISWj3l5rSoKB20xKviLc6Hovtp1QuUI30xcw9wQcLZS7rYo1NWAEN1BpSgUBOhsGuAkb71ExVxOnrxYKOFNi/Hc42ziFaLO0In1Eu7mLRv9SOWDiOWpq8U7eUUcgBtD6vJBKytFOA6f+j2TJVlKlhWk2NzzXM4PP1JrJGe0uM/YMqkmhew6omRQOOFEZ8QKf/YlvBadfwnkn2/c512B4Zf8JkjFP4mfoC3GFe4P82NYyxGfg3USwxTji5ChggkTCOUS8pSENdb root@fe9abbd2-f190-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJ+YNVEHWhQbkn0poLe/5jc+WQnn6RoGKDucZhFd8JllMI+dVGYNqNAQWJykTe5mZcxb84B1QPVEW2SulxcN4/qKpnH/OHVqcDPW1hxO93pHFasPOuTzRNYf1wIFP74lcPi/H1F5RvtAMrTCoI8yuiZYYyapc4AIt79OgMhPnM1zmQFvAQPx2G8QzO15cFdyMX+IOWS3RDggNWq8Nt8MeUg6B0t+x6PD96A5cIxZMrezybu1I/FgKatBtg91d89HE18+zVR9hnXyBtTDZ6MmEBqqH0yRWDFwe/ZuukTiUvMAnnhbkfRpe0AjggugjwIaOea+AT+3xxmovR22CqKe7p root@5ca9c8f3-f7d3-11ea-872a-bae3dc204648\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSYdhcotAUmA/RDRhFAB29ASCL8IcoVKTt2WNwJyfhuSZ5uIqdv6WRb/tXQ4prr6NeNkzrTSoIkzfkqrMoEUxdV319bVZYP4kWpCqDe47J0pJqkAmta0Wvd0gjiGOXIRGTYPabqEreUfcyrZGtOGXpsMRkhXwGxShIuLwpAkdYetbC3LGTcTLPIgGg02vE9wBOEdCYzwLB6alC3i51zIMuchVa+I+7peEbqlFLAR9OdDJtIAxs6cXMiVbfpHAlhd2q/pKBPxFkqw4jvsQZM4CelWW5XtRMhr56psuE4JK3M8iMd1jAvwCtl8KWBLjUa2rlH7XwnKri/JWiEXmM6NG9 root@7c2b051c-0b7a-11eb-82af-de22b9665164\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCvF0wQIdhn8puO+H+ra1zxtyIpe83egEZh8IrqWVEbuPLV8+EFTWMX37C+qtxQIxE/ssehqoYTtVWk2Z7nHDf4/rpJxR941J5bsjTn5i++WIYEWGIw6oPU86sV9kZc9lLvjg1AMT+qh+54m/HSrrLf164RCL0mw86f5HbRbi00DoXsx7z8QFswJmb+atwvGiIWAxFROkowJqL9eC+ReUeWqKJuiJtSvDsjMU1k8zmbWIvWunFg6aOd48bTcMMvfxpUDXfujqKw7+dT0B3E3oZqDegCwkAy62wuWWLzfPnoAjYsMHTO+MfL0ICKjgB+RVqaTpmp+i3CrBoCj7KlWje/ root@2c631327-158d-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJgGUOrtXYjFHNn68vFTnomGGN9jgJW2DWl0vGu3WOHPksWAo/AHYaFuFWEAWRA+A7KCWd9IezjChadcf6KaksUmXAov38zUSoYT5dEWJlaLMAE2EjB7pOlWLF1Fhs3wa5YH3GXTy1Kurvk/TL6MmOvOynR87q8lUex8mkLlEhGShpQPMmXTQAEPZBrTcDuDo7bryrrzPLLL7W1/8zywg7TSGOsQh3ADeD7jKcK+4vY0U260Nvyv0egjh+vkzbMzbWoWzNf75tK++TRX9MlkqvJPMW4h39t2IhBejAyAq1/7/5Waar3/UkmUmC3S6MI+tnebFOzBOS3CRqnYbQzgAN root@0786f7cf-15d9-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEE1VWuDF+Svn2J3/ZEm0FERMWVnTdwISGoA3YfwL3Qky//aN0QPq3XdrEQKhch1cKXqg+Lfdpc9x7wT3LaOzyuJb1p7fr+7dzEWZBsM3DX44DjxGIx32nWWqq4ghledah+5/Dapt2TkU01PDOjPffkIgLSa7qa/8eHov2UyoIAYQndn9EF2hbK8JoNCqVQN3ICNcJQmeOy/HazQEMvbvnfkEHG74aUS4dEyMsP+LYp1h8ZZnpQImMhHaZrKq0zsOaPEXj3o1G+J+9GMZ4B/0r4BecKEtNd/0Axn7yET50qs0FtQl/rpRMwULI6HbQh1IhWCOH/HcDJSw5JGVAKo6T root@2bde9439-22e2-11eb-bccb-526de22ef413\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2i7+LSce+KoRb6OU5DyFOCJsC+rkeNtGjUSylteLB275Fwj6STuJwaMmWSD4pK2H8enxOAJRfXR6vhQ2maNlUEKTrVfBNCfFdLiweASUFtjuB8LSksGMIzqFmrKIYVky+zPGqv8vylxs0XAtyoTRJgkQF9/5k26Tt/1TrTPLyip7mzthe1Z2V2WuGcbLp55+4ZErqtDJaVIuGC5F/IY6bABJciuAud5H0bqPGqcMlE4Ar0KiRcXl2A5M1f29bTo3MHxRmf72x9NOoXixQm//1ng3KY+u5GtVBzdLr5JSOY5sV3y7joNSLg3lOPIm45Qo3yYrGDQFAcI1WC12EvJF1 root@03bd04d6-5199-11eb-86b7-56818f023517" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T10:44:17.133-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "850929155353-compute@developer.gserviceaccount.com", + "id": "3710014085561858463", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-099", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-099", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-099/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-099/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-099/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-100/description.json b/audit/projects/k8s-infra-e2e-boskos-100/description.json new file mode 100644 index 00000000000..faa469b806f --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-100/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T17:46:01.650Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-100", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-100", + "projectNumber": "372715348529" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-100/iam.json b/audit/projects/k8s-infra-e2e-boskos-100/iam.json new file mode 100644 index 00000000000..e226a7cd382 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-100/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-372715348529@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:372715348529-compute@developer.gserviceaccount.com", + "serviceAccount:372715348529@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-100/service-accounts/372715348529-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-100/service-accounts/372715348529-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..968287a4fc6 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-100/service-accounts/372715348529-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "372715348529-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-100/serviceAccounts/372715348529-compute@developer.gserviceaccount.com", + "oauth2ClientId": "100548809679589908188", + "projectId": "k8s-infra-e2e-boskos-100", + "uniqueId": "100548809679589908188" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-100/service-accounts/372715348529-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-100/service-accounts/372715348529-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-100/service-accounts/372715348529-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-100/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-100/services/compute/project-info.json new file mode 100644 index 00000000000..3f4037bead1 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-100/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC3ZDyPr5guyd/nHclAuWOgGIexYlQYu3BZWlucH7X1NDvR7u9o0xhG3XvqnHuCdmAV+8u7aJvjranERqXF7r5yun2PLS7rkcWE++t7Rpr9cf4n0MiNl7Pa3Brh5xLlvyt0mehssTGprOX2hYe6vzsqTVuf+H3YgthJusbdTxZSkKdn0Fi2MB5hB6jwPS3gOIDbwCQoYK68tEBOMasT1xTxB4Z7NkITCUp83k0z6jzX04VBap3e2zOGryeDbGpqo4iC4AIFR6ZqXWWEAg25BeaVTmjdcslD25/Yoy3ISC+6TXQeWVlKrdr5+JWnQXEUjZFs/SQFtH+o/cz+TWlu9Uap root@4658ada0-de68-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC1wjlncrq2st2PUy/xtyoXU+mBCpX1uma0/y+2tNBOiIWa43RpSa9ZW6tQ7nceJeWmo9xYgoUmBuEmOeMrtOzdY+nXr54OkmIBWaXCBtFnbMQN6p09eddJnveI9Jl1rv5jCRBuwIQ8BB+DJ9fRWzO6sxDadNaMVEeQvmgYoOg7iPHx3ozOUmBm4A6cjbimQ/fW3eSs8vdtvgMt62WjUNnmVvVeS3ZV7CiUPasHMB2m346+UvTOQ5guITwkFsl4pX+82hBgOoLH4trXaZx0xuHtOILiyDU+GYKHG0BoODbmcR2H6ErESlENrrfQVoQ4bbeJZwz5pn4MVCBTIhCixYAX root@0b1424e7-e991-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDF7KBgzatxXe+L0gb1d57qibC5FknqBUm7NKMpKmBpdOC/23nSo1Lesi/jwGwxBPso5sOAwuP5PTenIQPL1WiNslWJ9DSnd4g8sU0+qPzelcmRx5JB8tJc+UIZGeM1eviubZouh/a8bn1npZPIsM1+D/i9JSYbC/3LBzSdNOPHF89NCsiejY0CtMgv1zZFnsTDF4IpqrfhFQ5RLUEdz+QnRwF3cJVxwuh/tVTj8uPNnQliS/VsuJ0Mf6wIbYMfNRblxEiuNGPeQQgaU1Ujwc04UxrIhQmAy/GUmIGyepigWM9hDv8dK1tqQYCIE03EI4o5IrOCqyNpEhRcxjenmmGb root@0149d388-eecd-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKAjXOeSea5FWFN2zfEbcOd/ss/lFIyvaDI3OazxBd8UPWN7qAvcRu7urCgQeh3LAxINL1ncLigRWzCfp8Mqac3QyO1AbtEwVBi3YaXWbna+2FNGZAyujjiTS8Rti+T1NTlx8Eyr36NlpHeEKweXHxDEHNYiR9BC9UG+hcb2GehghU1ZDEepgV1Mjc+EYXwKraA4R/QBO482qMg5rrhe6cdCHeNwkrJhObCaK58iD0HDCXRWot/jFfGYQErC1qi29DD7+c9BpgOy4MRKgMFpotp4w3Z/QIsCnfyWphSjaEeQgF0owF+nkZXpkRdFrVbizJ4dLJN+rtAaahAFyOaPmd root@9d647d96-f24b-11ea-bd49-066a8cf01e04\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDxNVs2ZMkKS2qe+rU9GsnRwLz+jFbajx9p6mJR4nmB0lCIBBdvlp8GiboohMjItSkOODDVq0gnDHElkQ/RF1xMyBTnNDII2/Z71bGv3UlRquoxTe15l6AvqAlUIEoMKQvKjJYEdj5jGDUTDIiEraFMr+wQ5O6NMdpn/P8bu94MfjpEqou9Kji3vRdsqaNhvZDrtNMpYwdg2RzphNbGTmgLPpQJmCFyfi83Hu1sl4IAAONe63/odZNLu8ZBvg9VPyqHqDqllQMWAuikIs3SzHGu5FKs2NzajS+jxGRLCKMxDjVOqEuQblN3mRhyOdO8WZSIUFpJILTwEi7aAep8pU6l root@c7dc760c-f361-11ea-84bd-b6fb6d83c68d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDDwzZ/K0F9pqK+AIZUEN9haLvjKpKupdBys+ENST3ag2BWRpeACX64UU0twQzUHyPMoO2S9kRs0SzKnob7ONPZA6vDjDz9WOouVTaR8EVpsRvAx95zTBiPXHz72nUXi0hleo8eVkYj+YUdcfVjX6iBbVO2cbbAKW7Hifpo895BzTFz1hHKZvQ9uH+4YNQ9S/kaMXEUM0QnMB3+3DKseCf66eJx41kQGhXE0rrfSnJPlyqXt4PYJiS7q17y5OJLA4+c3M0kT4Z+0thYh1uwPXyJ3dLmvpTEjhzmvl1oMxVSKs6IdA0YeYfqE5BAFGnJnnfbyLLQOb22RtY2xIIkRMnH root@7a6e3fee-f45e-11ea-8508-9a96569b20f1\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDRE9rH4scXcIczKHFedFjWUEB73XFSEGEgnv8+0tBb2/cBJFCaMLjwcXrl92XbSw1edLWySY/3Px88O1+CKZuRG2aTIb2xzpfnVLntbzeQ7kPGqP7Gl/5hlUnqIMc7/B84wOzavgAzHipo30kzmyseyS5FmHqw/ROZ3bTRVw7dYbxi+E579f7T38TBnrRPC828gLxKbvLwR1azTNDXEasnvaeO1X/Cn8fWsAXPwo82q/HFtetndQv7XETI0S4kyCIZZxid9unA8bZTgLI9/siIBSk1kdSwABbti0DU1LQsl1EFXZk3Kz17LsRZNpEFcuAh2NOA+WzIk9a/rPcczP9v root@38553122-00e9-11eb-b4e0-eacb7c15c8a0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBFTCg12l8auCo9EVZFeyC/TpnpzdOW8wZGOnzu2xyePI/S9GEmt7yLaab8sS63P2ZQk0rHQ/Z6v+AMQ6XHTMzaXDl5+8j3bDSW3EU4QnH1yBMZGRw9cDX2GrNuR2Nj4wjrch61NeOP+1wR1DEZYKtlyDW0nhkCjEj5nD31a2RKCpo9YMrIMrpV6srZw28OCtlOtaCYWVC0BOSJBVI7bdxnQ6Oh7/W4vs1qIA3cy7GJmM5Pj0z+4ZTYSWZGHBAOHL5MhgA3rtAoeX9640c2wN3FDjcY9fWUrbP4lDR0sBg2aMa0nW0wfpE+SHCmZ5hF3X6+R4Cf6xL6QsLlgm0VBnD root@c51df67c-0b93-11eb-82af-de22b9665164\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDDbcNEMb96xFu1tFmEC91zr06ZGUXabhHgVu7xcnZJ4yHoenGkixsV7+/TMwhVDvpStEUm7JRrLCuhmmIeMAex30PLoqnHWBv9iPTPkDF9jVrTMZUbULCtbwY0hvEZ4xm3fy29p9plJmvmM8j6yM1Tt8R4ZhI/jliAfUxZ4FZuI2VAytWbQQtLSq5A5xFtbvyY6O8msWz8P/WMwXXFmAouPPpoZnQo7tuV6AC6Vo92XiTZ7ODW3MsjG3VF+fQDBcK6Lmn+bYL/Ay04ECRpMnjJM2B/j03TM6SLdWeBaKiW1DVlAqgIga+EfqIcXPS6ON+f3jUWGb5gQYSdn43v1nlF root@36e0a265-1102-11eb-9a43-0aa5164aad51\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDmxJnEpdBZiMywoDG1z1z1C0mYkZLn92AsP+L2TSjmCLtjgtOfAAKjP2vtVDptsNZUT8hskS1gxhxvcvblAEQbjTHAKCYK0KR3fmvdsZqwNnIoy2WCRFsGvj9v/Xj3KS2xpSXSCpqfkClk6QWasrqfrob4i79nsVuTE26CxZEhOWGygZAobOW3Mnp6b1Q3saH5jsczY1CJvIsfQA6iuu48XN3q6iTxbLRi8FfPmw3D5xhszuqjvmL/tmdRktsULq4TEzQuU36Vwv8pi6FD41S7JjfFjbmmkAnc2ZNcioxNABKzyw+JmW+5KqD8k2B1xfPUKCbmL+vpfSOqP1UC7RIN root@7eecea81-11cc-11eb-9a43-0aa5164aad51\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDNNS6B/t3QZFkKzDBwROS4MD23zFUbENFg9rznvzQoTzRNvtnIjBPibmN1qa1F143uyxpCKcm44uiAqSMiJJgN8ENJCSGVy7xW6yllWbQBz+V6I1q3NkuAD5xJ51kGfJaE/mknIlojJdbvH6aQzdbf9HmW26p3T1hTTO4RSqrov6ykzRMWrtIYLgivzrfO6/AbotRKCcBMSp8HWxlUWI0xOMq9+N9EMfuCmwnHlJT1GB0YQZDbVHnHkNfY5oLHwD/TOwiEY+WCP5WXdpi/TFYW4awUmsalHEZ6HSP22X3xLNhKhXQNAaCioxfF1zqTcLlF6BWS3LbwpmaCqDchj7G1 root@23fb0650-1ac9-11eb-8779-4e6ceb30be03\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCt3H0GcYkRFkyGwmiSseTyQkWeE+nt07WqTTTJdUiF2UG7HzJhnKhQfqmf4d6C+yvihB5taGUs3eePAKfIZr467/sOFzVmeIBLgcm5XKvYXO4rKYOfBdjBtTJ5F1JHky0p1h5CWdnHF3hZi4sbxOdhgB3vAcOHDrc20hnWx2Jo9GpTmx6H0VOiDUxulGpYCtDfFIAOLkWWBXTL3r1/fCnqpQ9LT4UCpueT8ZCzCH4uyKgTL8eohohwdrKgrpkRa3rezeg8dreYzc5zDlc7eiOdRTeIQe0TtuEh4nz+3pnjf8MVvkqpYXLJFo8vhdSEIjPRbaPkRCZmypu9O5soQUKX root@e28f6e40-22c8-11eb-bccb-526de22ef413\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDOkLyVaEYlRSAPBdBdGfm2DWjp+VaOsUfgB+fLud5279CZPn7SQvzq2tfLGdLKFYNpxNelKjchW5xhQeBrwca/JxfeoXuJ/b4/r5LYr9bl5B0NjXNHHlETMO47zYK49lKCf9/B+zLSIY+4xKfRJEtcZ0afAStTaiKmEOMOMOeBf5vTFXTa5+ZsatWMNzN9e6mLMsrynrNU6bcaxRQDq+2VtGs/FYZiK9f7z8BSNBMddUKCSrNo0qzpblSOkBMlqxZJj9AqwT0XUthocXIFmGjqKYoPs5YmZYG6T0x84H3lpfs0gNNAUs9UIltCnS+Ax9xOdO0/vLpTPRQSR7ey6EiD root@efd74031-248f-11eb-bd88-f687e5d66392\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0/2DbVEd7sa5Sg38yrOvE6a/DP5F+Ul9/1l6cU3n3WoJMQ4uk2AUwrfhRM8tq2K1xeTgAg8thQH7WXPlKBRk7K3hvDVzg6PM1G+IWJIo+YMDqhd1UuX5ythPtMlArd1S8bgfOf+lA7UAA7+Pc90xkBv6NlcjSMvUpsOHRxkCvW0OhYQcoctOy5SapRErueAJ1g/XlEyr6UyfUz2kPcgBthte0Xf/Hwf0qMn+V7C03paTOvLNacTcNvhlCOkLlwhzSvw8u7NYTgTs+e8f5niZ42ZIWPFAglmU2C7APph7kc4MqY9XmakLRdfGBQsYE9Aua56kfpbMphIa9vbQt4d41 root@45a1972d-2934-11eb-a35d-7a1d48297fba\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDR3XsqAfr/uCQ2jo5MHu9kHVHrgvNg4bn+EoM0gQt33sj7Y0bB2cFub5jlR6tAlNzAQZqgmfSmwX92fKIGmgNTCTza5nfKiXWuxvkyVo+yTLxo7A0FQKGBBKAz/VuRZjBYtViHOI7gqrZIEKHB7dv/KaxAK4wxAV8UI3A9A/UquOJDfOgNtuJfdMoCBWTGRcoSV8y64tA/Qgz4aWBfMie56NyZ1dOCWX+DP9FrvMpVfiMHxhqMd64llX+STrRLNhvhzQWcps6LFtJxoXPTAbadaSgNPElgho9j7P6h3wAQAyQtj15eEorhW7+5VLUFdLINRWC37U53YgMnKsYtGsN9 root@efa17cab-2fb8-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSlPGPkUWtZDJdvZMkp8HMebTxvIzRc9qFvH8c/otAlDQLcEtID/1+zlgYy7LxZ80EVNsfKPUrGz+2m2vxecfdEpVcm8Na7J04bkbRUCU6rGiD75E/9dnzZeAVZZsbXfXdvLFhFpa9R4ycvGTBea33JHk2fgUwbasm84aX1WD8styHO9Zv2MChvoAeJPaTnEKpjU9J9YOl1oTbo6gpxTHDXHPLkgN1FgGDTBlKzVYzhGh+QbHloqyD2nv4dP5a5JEaSyi5ZioaX6wSBsAdeW29ccWBsbQtLsWyOFitQdw+kbMHtrgknIWGtL8uQIbkXg7Z1Mh0d1VuN/CyQHsGv3dp root@d96f5082-43f7-11eb-acd8-6a2a49dd8a76" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T10:46:12.669-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "372715348529-compute@developer.gserviceaccount.com", + "id": "8703000213832087819", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-100", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-100", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-100/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-100/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-100/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-101/description.json b/audit/projects/k8s-infra-e2e-boskos-101/description.json new file mode 100644 index 00000000000..ab87a151506 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-101/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T17:47:52.283Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-101", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-101", + "projectNumber": "690664424148" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-101/iam.json b/audit/projects/k8s-infra-e2e-boskos-101/iam.json new file mode 100644 index 00000000000..cedbfa7ba7d --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-101/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-690664424148@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:690664424148-compute@developer.gserviceaccount.com", + "serviceAccount:690664424148@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-101/service-accounts/690664424148-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-101/service-accounts/690664424148-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..8ccc7c17ffb --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-101/service-accounts/690664424148-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "690664424148-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-101/serviceAccounts/690664424148-compute@developer.gserviceaccount.com", + "oauth2ClientId": "108923651818906050619", + "projectId": "k8s-infra-e2e-boskos-101", + "uniqueId": "108923651818906050619" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-101/service-accounts/690664424148-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-101/service-accounts/690664424148-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-101/service-accounts/690664424148-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-101/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-101/services/compute/project-info.json new file mode 100644 index 00000000000..2d78437c791 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-101/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCzyKU6oqhgY/F+J/xfLiUxpOFnuT6QgP+icCkfbhzDAvylacN6RUWOV0SicHCguJ6HBtj8pgbzm50lfScKhvZJFpId6U93MwL/Ikdte/T/xJ8zjOW2joXmSQhvzjdv2lclUQaHLFHoACBk2Dcmnri3vVQNeJ6j3ebRJTR9eYGmVrKiN9oY3W1Se/TD3z6+ih0ZV7Rev4/1xPUOMpen0b2Cz4yGmVNO85+Bu4CnC/LYmJUDwOn6/7ch3r5ZnNCbxxCzcJUR2J44RGLlFJgZRfU74Mz8J4hhPQsKyAIh7XTaTN5TCCPflbZisxhgk8rbOb8uP6J0pyvaraSlaXdPnK5t root@a117a746-de58-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCfOiAVSjX0zAQ0aCzZVL15Ue2mgNEiUeMK8vg6uXFcf1Z8xjruM03RBNXsf1vHwlpKh+k5DfP4CVjQrTBm4e8O8UJwv9U5gUG+lgvUMb2C1RueLwVakL6fObrrI1xBR0pNY9xUN83Mhv9mozNEd0gYg3YCzkEW6FwOCBZOnJtGx6n6p6FXJZP7msyJ7GUZGV6sW3BXZScMdsJPciwkuvlEVYea46ZFZLENBDNC96NLFuC6malAm04rIQ2GElS1rJRZ93dk1JBokputIbrmMw28iAzSiPCJCDKE1dpesAZP5MobTXsmcUL+e/PNDucpn1sYON8mKLbboUN8NyQJAdNh root@9d6f5f0d-e0f9-11ea-8c67-968ff53f47c5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDqqa/FeXd2QXW99H94Vs4Rkckk99F1M6LDMI4WuooYSmAFIrgVhPPJ7U/TZBrmLAU8A5ROFyaA+C62lI7HcPYn2H+B4XG4y5v3da2YnMeEK5lJww35hfZ4ro2AtcIDxMQf9VKFBFFl1J2djKLfrkvRpQLi1REbFrP7rqaeEqcECGOZ2Gfl4O08tVv8upi17PRjQc5cfcDl6dhMKTNVAR96frjwYVUD8b15TR0JurvO4k/GsrZKdYE7Y1kMUhDQf9s69m1uIq88dI0IZ8xmhW89lOkLzHCYJQ6WG1UWlfDbsYZlSzAxSRJ9FiM8Hp1tR5++jG/YtBaYJoA/LYw1SC0n root@06e5be6c-e3c7-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCvUxdTfkeNodKlBCt2PPB6/Ur5gz9kfLdzApLum7R1yBU37mPsBiWsOkBeqgdhNwieXyHlFrIIE5ntwLDwWlRbB2LMjHdcOpCdP9imOfOaP2sl1Srjd98AsygdWyWS/dZdMy/Ur2habrxbL+ny8yDiGn3QLi5i/vJra/LCzke4nAsN2AlFMqqRnPEUJZh0zZqHDo9vZIiW7Fv0qDFbK2ipO0E1c6gcRxcoGa8GHGUUVw+vgKQX8wnIwc9dtdMt53JrnYhB7Kvyw6Fpaxr16tfUySefO9KsYplFE0mM5O8p0BMfzVZeLUsv7GTPGt/eGjTz0eY02h+A197XLD/3dsbL root@aade7b8c-e5e9-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDxk35xKwkSg90vpLYM5cFS921WHgFpQf6/aQfVuqReJ1/r1RsUbWZREYK5RaVAoejfXN+8tYitLTw537lOklplbW0xj0RXgJ8An9n7QLm2ilKtERS/5E8AUtNoKn43Azf/Y/To7NYfAR0NgtFDgyud7VZCQMtHpFwlXUh772xsdZvQynQIUs/Lk4v3qoe2HG6+rMR6+USz66F5DkueCcXV32bIzNFOCfSn3H/HpPG1Xm9RjXvN7LXkTGvWtdKT8sNY/jxB/BYfhFo5OvhWA0+CrqOp2SCMS6zV5Ba03ybW3dqIacV5SS8k3SNmSa2dh3LJ/YLUj+P1JJWCdMqEvPF9 root@ae8185e1-e99a-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+wHnPkDntyUrVzW7cpwfYQlutukex0CpBvECDpDjiK46qCPcBqnImoUJXFfWx7aAjNBiF/1R+UuD3xup7VVoN5g1kmWQ8XbxEPXLENzgzJ31MQu15kaZVzQ6aX0ved28/p5ZpYVEsBnQJD/2OTRd892dGTngbpc5A0K2ibrNkqv0+iypSYBgoCCBDGyYk1WFGbSLTWmEfIPE2w3ePVbTnzXjBiuBODiRbSBu56BaCzFpM4C3H9UuU2E1lF468AN1t9YBxw5udPln1HbjjXYycvkBFs9sTVVvbIk6+gCLxzzkrrTqzSqqL1Hk/cJVF4QSONKaDKF7b/XKOXxQShPuh root@eeaad5fb-ee3e-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDdrWC+yiR+gdhzlaRiG983VtjfJOvxGWX7MJwgSx61IzlsbGOkY134+pMS1fxONgv7NW62DNNslyYGnJSoJAmu2iGJXQtCp1RALw1w0EljMOY45u40hel6ac/+64WPoQfFtDj11sSkNxkWnLLOntn1fT+7Ge7tmaG5893CI71Ts16fn1Om8cpQKB6Fwh7AUaoiAiDC/9EYzuXRKfD4woi58g0Di3M8I4FmiQUY0574fmvhgtkU43o4X5qRSNPd/LNhS2uhmAdBxZWBgzpwPi30azN7YnmqWfRv6qW9Q6566POKz6Zz+kjWfVacWX1vhThr0T29n13bJTPiSkvLCBTX root@3700adcc-ef09-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCk2MA1smTiT1/9pBBiUbZeaeEA/2ATg/vQ95uVBoI6xDeKoj7tb4KFMTBp5+A3vnjxJiy5TxE/UG4EzC+nmEBHxniQY6zfCeG9l/Xj2IVbCS8ln/wMcfuXVtdOvcsX+WLjufY038nT9A2MYtrjvFdC8Z9isyvrQc3n2AKY20kdTuQZLKvWnDizDTIAbEf8kS5uqa3Uo3Z4EWJV7iQ2NMiIbG98ejGB8zcpk4YN4A01gkmdpUgfg+OlTQ1QayaCBC++kkxPclwA3pU+RvZAjBwWx0fVd8lEq9FXUEX8JNVfiGvmtnnex7NRQa1NVTogBcS/v0pb+AEsaGoZQWzvEifV root@35c45d96-efba-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqIE63/BTXlOqoVVzVln1o7uw5eA13PB2k14+zY12PvP6ggKEYln4PoAg6OxCxFqD06z5kMte1hrD1X4Yd4c5R6XhE5GQjl/oJbSWSQIGxe7rSjiqyUNaOxGyrHDM7KfWpAiv9Am2Z+Je2skEeKkZHEc8K27kMFmW+wNYxgk58tAiJ0r/dz5DbjYKBB6HiS0tRxqYM4OMkEXEvuTkcpcNGVQFtePEVZn7omEjqzN13TFC8VbKyqD3fFNioPzGDy5Qilqx0ryHlUeCW2PuG20IpEsh1aumw8U5VUDNNyAkqY18GN6oRg5NR8Nh8TxO3dIpFlfAVIMNyhvf1B/TSSKC/ root@8c8b1457-f6d4-11ea-ae6d-8ed64f3416c0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCtqAH3Y0SalPli4PV1xpeeC642EpttrnIY/gFCViga4S6AimqeHIoBx7yeiso8s4gxzfLVV6XE7H7aeZrtDMldpWOPVf3R4ztvDf7yiTLp0IPK/Vz5wS4vXVU9szvYB7SQbXo9ebLyaFmI5hBDga3TE6r7A2rgPwxYLWdxvVA8CBQew8988BL5U5WMVFykphvLjDHdj4jJmhAN/s9ck7xw+7Brg9S/sJbcb0l/gmVz+9grM1josCLocpbEl1Odw2dq8yyG+d64gyiDct3CTebqvsHpAAcwkq7Kj/8m1l7gHBO+IROJU38YNN5GjEbOHo3i3sfWmbPi8fv+TR66hyCh root@3b3897c8-04c3-11eb-a932-82154e1dffc3\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDbjls6EmE6W2z5jhFKEevkxkAoov57IPnVM06Ojr4k2WD04Z8isrKDsei/q4TWBUGlSGg9k6ZtVGw6mAtyHmGZ2+q4SecR1K/w30Metb3Sa0NKPKt7Hj+89OI3NSXRg/mu9u6O8H90ulVyPCOJlgK/IX9KCU5PK1kNIVtp44x1SqFNuXxc0EKMdSmW3UJ3wt0F5tbuBAELKjXyCGudolCoklS72Wk1+AdOfY0sqHs997e9y+nXOwmZiE7IXS2vqqTIvfh56HS0cZrMEk5fjBqb8bZcLqObz86sDk8Uw/MGxA81hAQTJo3MZjKxxYuGoGZKq/b82pZAc6K2mHkLwRoZ root@0db36ccb-0c5e-11eb-82af-de22b9665164\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDeX3wWD3x4Xv7wl81Y4eihMdf/6gICAp19yw/UvP1YVimzjFY/qj9sTBHNHV4ACZ/oZ38sk5lTWHr3dE+3q2LhzQzjZ7aSoez3Rf6bNWyI8//vQgl94mtKoacHhBXLPN6uPEq1ov8Ns+iCo8rvVbaxclhKZH2JQPtKYGMTueEWmR3n6xg2EZQJg6IUmOcnsRJp26YwPZ6E+E+aWSW0EblEhhhwybVkOPrb4PhXLq/RpMiwvmlCOrwgCeqIks108BXl10ylSkqeAiOUoVQfeMGsiQuX8iE3LpjWMOuimkgu7zA/OwQvYjAE4epxW+8bl5Y6SilAyhsShZHzKZurHR5T root@41ff6cb4-0d28-11eb-acdd-663f8ab42c5e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCxSqx4+xQwcAwmiHSbztXDR3DVuukgJXdSmD3amGuCaZGGjxl5kD9G/dx5/67valybxxeFZ49NKoCYbXzjqBSLzi9kPd4FeVuTQxgd48EsuLWkN17QvYOaz4lG5EFFl4AJqB2jRxMgIjH/dWurpd5HHftpbvF/EKh2AuTptb8rkL1sggxPoIjbvA5/+UnugpW3rAGZ65FgKFbquKgRojR/mtfSaWcFpt3t+qak9ykxcx+rHvyAh6dY4ULTclZ0nOyUuFiwF+RhHiJtLFHwgaSIk/jdimiV4SsjDBtFlJgWmXRV+FHzTzcsorVUpLiiE+RaRZfknMdevpvn5QRbDnUD root@2eb60612-1b2e-11eb-99f1-c6d701d1e283\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDbc1aveloR0rgHV8WJBqaomPC007Bq+Y/2+kgSRJHgU6XbjFaXHrKa5bpHS+o0ashuenBZywVbBJSyuHhZoOOjnoWbWJGGdx3Bxg1nmPUMMwWc3rTW/sb4e8/6O8gPJU2EUqKoRmw+aeKc6vwDsL6cPP2p1GoFfAUnku21OnTBUFMCModBdJDa1EexM78rYKi9qsyrjUI1z1TnW0aW24sAOF2P4MBLQGuSqWeC23//OP6Fpp9VbLHn+1d4Qz3Kv59ITKutKEMmi/n/ywQD7vKrVr/P6i9Q8MlScGSZ+C0tznGd3oO9ChZuLlUqi8fzo7bE/AyudKsLk6WYjF33Jdtt root@d389b0b3-2804-11eb-bb1f-6e397dbce9be\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBlxpAHNP1ptaru73XJQW5jPZFClBfHn6Bc5nnAnM+sCc8k88LxgxCdQtHSMWzP4CpJwPYrFSw3WoTXKv26yZBTuq6lxy0MMXLovCf3FrUbG7sgqHLLLrMdI2R0Toh2jmflesM/59vELZMJtrPEDwTupaC5sicKwbIhKXnt2RxxGyYvMhYipVVQIvOrzwUUgFdI+Za/RNqQVdzETjdb7XL/90r79A3DnRomJfvI/3XXFMj+LPtNCDjLy1UCrTiL3L/WFhul6n+6t+8bdKp+kJLGdS0ujhjLqsRcRATRb3Fa+CaPxIt7wxLo9/2DGRVRoXql81aIjlQL1bighNJW9RL root@89909963-2b60-11eb-98a6-ba1d66ad0079\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC8wSmNz6X/ii0gokKFCKuqfhQ4dpfNw0X1JjZlW6x58x23hHxJUkhEvIgON8srMBM55w7eSnbK9ieGej9VfIYVFFNky0mKzcsQPnPWmLpFrSuRG/3SEsfxlhHjua3zPlgC7iB9zBOht76dnNt6ygvFmZEkMD9qPZo/nWRVfm6hB+X+5A5ThZ0G9PZcw29rA/7tWmw8LAEuzOUfroieNpo3CA7kBWqFEjuAJA+vpePyooZPOukE7+7+eOjBaJz0byA4IZcryLX9zZY2U+vykRJqDmzgidzFzCQF2A04o1kdAZ7NGK5K27gbaBjurOl4qCcXvlRbDIeuFAzNf2yYLp5j root@ef680efd-3069-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDHq0WrsNPS6+7CRg0FZ8FQ4cAVrICyxDXIV4rNaoEmoJM7eX6feWcvprr/Qwgxgh8sqIRZghYGJ3I33DZ5JLOeSpMEYKoIhYbrDk99KTqr4oli1Awv162MSdTz17yx/JUR4jKOR9vHQJ615xBLDssIVN5fgFcj13XGaoysmypzuXjJiE6jxEG3W4Dz9/MtZLrstL8Uk+QO4QuJO2YNhSDzo3U/weE7l/pxuRd7PWUlac+WAWauDl6XTna5rmYO7c+Ku0xthJHpnH185j6Ga/MVA2yQ+lOFTBrJtit4obDoSpz0fzqND9LkWqlhCOu5QVS4Z1MVg5rGmnC32tEbnn+B root@dc710ed9-4133-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0yYflI8WDQh9lADPKy24xJxomKG412+6/rNm+U79ifcHkXywPapZr4eFYNj+edLxcoExqLuKGqU7HUGXiyb7NSjr9adk4R0JiCBJpUCoK+HwDgZ6zesTVDOi9SwZQ347EL3vhFKRQ1Sw+86C6sfoim2KrJk97uMavzGuAmYVkOtLASS4rGraGGeZGpyIvwfHrHmeAySZVjpg+UjReYR0ODI2AjxAHgi/CdxOpp638y6VKHJuZQ2p/TSQzOH9zpWs2biJOULT84z0JkWIxY02e52gy08KenqHhwbKUNKmALwWBekrdwJYoajdkjK+sZJUe4CP+dA6to2BkszCHnzED root@915ebb73-41cb-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDHjypeXDwd7I+rBh3P4/ynxCGjC37gva8Mq7jv9htg+J5emeVQi+zLDHK+zw2tQMWrKIBENcKfQwIk1ZAIgWAuWcFoPKUyt+HWVzMGPjYIugOv6x3yJOPzsNAEFrl/k61QDwhTLZXGY6zTge6ucdGe4pxIF7i7U8Rq6aCAD3lSocDbOpNWoi1JgiNnS6t/rW5eYwFMhutPba9Zy+cXgMAkmN+Ynx1ZD5uOlOFISf+G6PGyHe0JaGd9QuBgPumO1DsdAD7rdqtjtXCRLagowFI8phT6bfDbdRfzonHLOPpDCeWTA4gJz8AlZ07gplGSXnjgNONL40efRefxdmxdLTWH root@fc864d6a-466f-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDNfErJhNsp4pdRSeq7b+UmQhmP+Z8qI8K3m9ZCTZbWPqI4LxQWHIH3C9Z2nmW2VWUYtnjkVrgIEevefs1w1SR+2kx5ecxPlyNRFW9KwX2uXyUmDSik2na5iR/cAG/YWkepqHuN5F+iVpRLgGdG30xyrM9d9XLFpZsrsNv1yfPGzlrP0fQaB1EJZ67rqvduMXJ2xqbKYh4ba3YZbR7B7sTkbUXBhamdsB8kImcB6XN42uPqnxJf1EGIGq0n9e0mcvgjmXUOd9fGO2a2Dz5MqLLCJDu6xGphfm5swS9IV1B/hrrlsEoS8stlM87TVOsoQNpiXlB34mIpjOVWTh76CzuL root@3a31c861-4c11-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDfeuao58UNve7gb5BGCtVfpfdXoxMZEjUPXgADFCxLAxyiJr2l9H4lBk8FiaXkHnz1pIYNSo2jyylYfksd5743Of3JTXfSYWN0CKhUgUAG3kU8DlV2i8eAFW1RT2DJJ+xSYNGs0xHVJPlze823TRItgU7tgApC+3iofUq624mCpou2wz77CjNx7C63aCtEbSH1PUKLdonVKTZWGu7wVLKbxA65fEIfj+3E3hBhJs0Um/1kNUdAJIU1yPzJBQHqdrw9pe0S7sDsfcIpbCWIiNdsBXD0ML2nRVJdIbLY1KJudoLi1wiFkyWlpV2009ACqf6Ookq7vWvia7N240qlPJ4H root@2bed71b7-50e6-11eb-bf1b-5279f1a59a83\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCzNYUPn6MgVN6lYkXlxS4pkTsdYXHdd/4SaU2DxVRo3NB/g8lnIVBPzU0yskSF7YSwB50AFC2vnK3WKkZMm/P1ilGkcCzU8k+NflHhyCb4eT8HNSlU8PhrFKDEIYNHbVdGg46YoE0fPKhw/n5r0iwOJHeuhqZTjAi8J2x+rHkyy+nJU0BHOEbsxSXpDDrXZyEuyFebWNMdWOuMOaHV4NsO+MJvFbCuwPs4PTSJKymusW/IBn9nUiWZkiU6aLwCnvOWWeISEGqGAQEd5Dsvz+D+++Vd3FUje0PhJKBL6rT0xz5HuO95GvVyK1t9B+quYYKGHqSCRSN/UBoZi5zTB/VN root@eb15b277-5131-11eb-86b7-56818f023517" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T10:48:02.190-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "690664424148-compute@developer.gserviceaccount.com", + "id": "5616517727152518846", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-101", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-101", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-101/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-101/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-101/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-102/description.json b/audit/projects/k8s-infra-e2e-boskos-102/description.json new file mode 100644 index 00000000000..0f66d205939 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-102/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T17:49:47.311Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-102", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-102", + "projectNumber": "562968761079" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-102/iam.json b/audit/projects/k8s-infra-e2e-boskos-102/iam.json new file mode 100644 index 00000000000..954a6ef865c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-102/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-562968761079@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:562968761079-compute@developer.gserviceaccount.com", + "serviceAccount:562968761079@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-102/service-accounts/562968761079-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-102/service-accounts/562968761079-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..792e0090c43 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-102/service-accounts/562968761079-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "562968761079-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-102/serviceAccounts/562968761079-compute@developer.gserviceaccount.com", + "oauth2ClientId": "115303862582377465529", + "projectId": "k8s-infra-e2e-boskos-102", + "uniqueId": "115303862582377465529" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-102/service-accounts/562968761079-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-102/service-accounts/562968761079-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-102/service-accounts/562968761079-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-102/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-102/services/compute/project-info.json new file mode 100644 index 00000000000..991b63af696 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-102/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQChwNLK/HDSii0OinshLmqcD6gjNaoYpKSMCshu18hnqD3Jzo+NjDSdDQV+L0KvHHEg/TtJkSBf9HXWFpoiQ5ENXtXpobNvjLqR4KLZTYQi68K8UE5ud5qTdd/Wgzqpuf6vhOeYyL8thCRx5ogjwyMeLwQuYotGjDKC+GgR2LAmVeskWbOHzZvpBtc3OfOkDx0PZHXL55N/6VisYVdi2UZlv5yUSm/vqWbVK7OtJ1aSXF4DNKO0wmLKW3P3NyH00Flsd7XJAmOnZ92PeFPKSKJHhJCnXwxRa6rN9/dzMuYXy8qkXKPFlRGBT7cUBGfVnw3Wc0k6XXcCmT2FO3L5SPUj root@cdc3287c-e24b-11ea-a87b-7e1d84ccc038\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDINRk0L93FBaPttelgaE2tya1Am+o8Wv1VGxzyFxXzMlt8nrvqpeZ9MqAn1RTbmE2b/zEOm6IsGj8MWBHxLwLkDmXOCMDGuuhffukPnEJxPC4UiObAPcrgXMt55FA6DTnTx/zm3N+H71CHyvR4IUK5rj+10WboZH4Zlk8/N07A9pNvrj7uUOITWtdJMg5ZFhmfhk0PchBP1Y6fugP8+sRxkWVubg7IyjcmhU5kAX1k1pl6l+NtAvkdgdU7eca8LICGYldknL9C9RmOhjylkEdqmGOPFTTtzxjGBcvAZPvAFjtpeGdIJRXO8D1l11y0kmmFT58AdhdLjHx9oYav7ci9 root@e34d95a6-e764-11ea-8112-a64f894a1815\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZWXVEXTx728+Q/zigBGehj5JSUIbu8huBnapFbs9uYfi5B0rNZx5AZryV8qYu+LQo62tRo+RmE8F+VKNxCHJ/IV/i43ds3o7t5sKDOKc+o21BjAMUuOxAH8xloeIhMrwd9lqNt2GFrqbBiw8ANKOMNXkXhm7UUBbljq177HjYaKldJlAgyNg022s45Mqp7Ce2CfgQ4z/xMOt5IxmwNbi0pq1oqn/StAEiqJOtIbh0jwC+5q9aD81qMTWxuko7SLZMBN7HFfEcfCZZSXBM2ti31aV4jM/zmH5bTiDXFOfdR9bWgZcy6DRsYlNLNK3miXXnAAqmUdpDAGADiINCb40H root@257d4137-ef32-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC4b0w/HBeAhkkywZidlgwVTstc+/upHZlDFViK4EHTryFxYeHCZHjonrXY6cQRuCVngMLOHkFEh7d1iYxip+8oClCdAwbwOrdtZCA/b8qw10G4Xk2A42dbO5GI9G4xrc5J4Rdea63LsPQrho0D0Um9CWpCZSOfcmmjUg/OGQ7y3m7GPJNgj58ewDGeE99iheRA1mhYpkjoXGyPEFtrZ0+CyiAH57+JASMjNrNsDniYMd1tukDKblf/7IIfHdlGm480hv1suE5+AvSPsFzTxjGUKDXR+6Iw5WlwddU+8fGBzAgN6CEMlnjFK4Wxwb8/L/YZbYcjqbIqfVLjy5g4dTY5 root@348c0409-f1cd-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDFvcZxnVESlWG/n1b72lC1uFto7EatmTknIE4HEaCkLSzVcla3oek/XbtuqfhcV7C8TQo3Kkd0d67C4b0S3GOJNRHr+aVqSuDHojq4JMHfzGoorSB0G8JC67hu0yl25nF5JKntl1WYaO/Jy69ANsqBUSq6iXktxdIjokCd6dUiB99kzZ3JDhpCqL672ukoIFv1EID4krIupudCwSE+W/UAKv4sYIcgDNyjixXBABhZX4zoj99rrh9cSjnJ3DnC06bR3tX2Yz7xfn0gkRix73g9v6I6XwjtYCqiU7YrNIO2aSksXp1sPBbBOZ/zbxhZsxFUuTHJYLNoO+OjBCtJs9hv root@8231d586-0051-11eb-b4e0-eacb7c15c8a0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDbh7Mwa934NwGMYAQKQyt3aEF2l38h2JZrOhgp6XWuj0HPGMtZ1m+lOfbGzecgWUR9i9AgK4Vq19JjG3eMcKKJkSahSO+0ieU3EQVkz0uDY2iJQeVfJRMjGVNGs6+5JXV6SZfc44Wjg33CQ22Khc0xJSZJajvqk/t406eakj8bh2jDYiNmpqw1Yyvigk80CfX95bEQPFvtf/HkjXtaXaMu35pSDNrW8hS+xv4nLUi+agqXwnMGbGXGjBfwQdovF4f5tMPHOy2sFr5ClCFDluR8FlCVTtYhOqS0DBzTcj54XAHt7xpEi4El28SZazIE0gMbUeHjA/NS6WD3MltjFwcr root@6fa1641d-186a-11eb-8cf5-bee87f5cdaa3\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCo4WdHcjV2uiX7JwBMyY/eQBmY0zH3Al8pBXwOOR9z5gFTK445aD8MUKRP6lAczaIwuxutxQI5peoldh6R5EN1oPCWtDFIkvwwULTVTltqFn0Lf2iGf3VZi2/eIuEwoo8wI425PpBuKvZ9U9VeGmIcLT3rbqddrpzt3tR/LXP8fPYOqpoY/YeFaXMwr4EpsuIA9PXCuTjiDOBz1E+gGPuVn6ken3bIfRffrjkkupX59o0KUV5ysNmZBjh6sGmSrq4oiFnelCQoVo4swc7gszjRXeSCpnGfoDLLodrMeJOHQCjIVEmiHsXGPZevNWOhA+3pN5SdSQgt4HJfM/DvGlTn root@fb3570e8-1f53-11eb-a4fe-eec30b56844c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDbzs8M2I4UZoKXcCvl85TddklwGAudmmY3XP3hnlY4CabU2NejAS3a7+f7T9PVXVqeznX3aZ0vQGZHHG7XdriwcSkuAKF92gG5y06K4juobFxZGZZD9huzaX+IwPHYlUl8bywPt+W8p7A2p4MPN9aE8ocaCaYl2eYh2qDLaZk54DHKgCQHXMYncvKhDtsRkN1YNStcoCnPHpz43xwWyKvgGnCDQ23mTugiurVoHwa55QQy02vJFlD19sw8eadc2zZSKyYuYjw8X/2v+9FK0QTo9VLOnBDEWaKuhsZ0QI+gTqqOYRAyn0g4en+LzQMf0fARmeG+tekkLWydXu+NvCbh root@d69a549d-26a2-11eb-bb1f-6e397dbce9be\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDv4EuFKuKaRN4oA2/h3tizRH7QCxjKklx5iQzhwQuWRAMd82lvvXyQgAzSaC+oKllyfvH/Usz8Cd6O+Y7j8H7TEyH2FOOD0lgCh83JxSriwfCxEs4ujdwFpgBuEnU5CBmuPBM6jQPHFFaEm09XdBC1gbqfMYl/JVg4ACvXuGxweey1WHiLWibfUJb4JOs+FPp9eN/UY7pjiynxPHxcQy2QDdU3qzipeur9uhgFGU69xC2j9KJb2cqAnsCCK9BdCCHR2VvB44wW6DLKTaeTdwhlyH/vyXErzOWZWs/xeOPdrNXbML+5zunOngFbBz55MjBVI5dAYcyXAb6IgER0Pouf root@2fd856b9-2e0b-11eb-8da1-5a2e729b6dfd\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCl60P0rRSgjWVBtHDuQ1kiQa5ltGJD/IjCUxxwZjlnFMrWaMKrhjKgkkj1tlx/mLkEwoxZKLReto9w8nu8t/gLcFhI0sjwfCoU63ah8khG7Qq4XaFYb9dJ1Dio1qgIa/YhTxKr1GxMQ15AyOOCcGoUwPIMpN3Qz+SpWf3ZEhncw9akElwrK2th0aE8LSEL+2x563BGl7z0RM44K9tJaR2sDM5igsZlK+H9iTQ7PWOSd+xzbd3WFM5m2RZ46RtIENqdR0QocSKno7dLvjDHI8st8+DXynchfGKzna1Yy98lvrLrxzOdQfB65bpQ4onV5evo9rFAGqmDn/uhj/hNYpUb root@e8a040be-391a-11eb-8630-522871d052a8\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC5hFUyrXG9rDvyKavhZwzZDg9SXcFgeOrpfbhM+pKT0nZjDvA3dl1FiogBiLEjwZOeiEvvE1vGrFSaNZ77KhurY+Z7/61iK2YjaiwBEO4y9z34KjhndGw3S/FrfEJXKHPc3c8U7rIzyLefizj7y5W1VntUR4xL6hox/9ruVYMYuwBA5+OIG4ATbxmTATw3XpSySJ+D8Nm7OufRGh+rdaKz6mD41IV+8rRcs/XL/QMTcsLfbGbxsqn2CPuI2kaU5Zg51iBuSsskeYkqL1JtbK0TyEHFb/Yb2jubbm6G+ZHwKJpHMbSkNjyoBI0hUSWr3RNFB7UFcsqz4YgR0xwb6HHJ root@f2eec5f2-3ae1-11eb-a164-f6e7f2ebcce2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC1F8JC16LyRoMshoAPjshkEyOwz3pA+G9UYncxxBvN9bGqjLvqLttNGutQ2eNa6vajJmiUW0Zc4qUrCDKfORs3UW+p6CZHK9nt4Es8GrozGDOsF1hF5rAAC3ZACV95GZ0xv/AEa4YsB+k/9Mk8dVsUUA7JIW3IB2qbcsylzBmw86d6hPvD8TSZduddGTr2Gv1eG+5DHSHQHJuYWNsKstc1phHlHa/Ou2tqbKYY6mZ0FKvaYaibReXxvyOj/G8ZFuSAsTS6sDKf7twWHRyLITzrBDxVkOR8CiBnjCp88tlK24gVtwDUAUvq+ylL847Cvc8ZzX5bzGzlmJ/71xuujE5T root@68d7ae24-4850-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIaJhGANsnniVfWFHRqpsFU6hX+n4r55ZwloA/PyQJZp/PL/wZ0CRNl+vd1IBTgKo3Ka/TNlJAXXXIcRufJ5bAnGJvL+1UywHMMK/PHfgR21AgZhNv6gfwEi/noL4aNCEkIjTD/8NGWBsPQkp1lKrATkQlogfaC7lyDD/D/LrvULnH60RNHzoIQcbhc0M5pvt36R65GyXzft3BEBupfptlSojcZmDRdkSSQlxoM4zZvPm1ObkbA+bziEAPz+J8mQkG5KuXnUToDwGHabSFWknrgWVx46QY8tmjjds1tPDEzRhzNWPdcMfwepq47ZY3kb5T+6hFreb2WiTzMOANcRuR root@dc317605-5295-11eb-b6a5-7e8b7adfd54c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDAzKQ4CZi1MKyJF0FSr4+pNLwu9jzM1ixQepGYwQwZarrVRTo9+2LziAtmNSNDDPjruFzEMqw8EfWmm3a7Mofw1u1DQnellwA6myVinL5w1sORKT/ZYLRJsY3bK36pBJG/sA262qHe27sEU+zr+ebGO7y9Yh6ronNtlilg12/KUuRTK3UOmQQuapKphP44aorZCQ6McLP6nCzic0IqCZmsHnRBuym2zvsb4ajTaq6xHICjkcf+If/y1zuFrQe0RgQMn2WpAo8dZ9ip4Cexy/P73ukV+eUibFSJLKRMLP9rg41NQM2T+1yiHqGS5sYeeZuS198TkNRkFxXTvBgT2zXz root@b57702c6-5392-11eb-b6a5-7e8b7adfd54c" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T10:49:58.342-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "562968761079-compute@developer.gserviceaccount.com", + "id": "2037675200570209833", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-102", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-102", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-102/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-102/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-102/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-103/description.json b/audit/projects/k8s-infra-e2e-boskos-103/description.json new file mode 100644 index 00000000000..f82d7a3a7a4 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-103/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T17:51:44.464Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-103", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-103", + "projectNumber": "48099424019" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-103/iam.json b/audit/projects/k8s-infra-e2e-boskos-103/iam.json new file mode 100644 index 00000000000..c29c2f4b91b --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-103/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-48099424019@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:48099424019-compute@developer.gserviceaccount.com", + "serviceAccount:48099424019@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-103/service-accounts/48099424019-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-103/service-accounts/48099424019-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..41b51e04178 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-103/service-accounts/48099424019-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "48099424019-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-103/serviceAccounts/48099424019-compute@developer.gserviceaccount.com", + "oauth2ClientId": "108393174556860532290", + "projectId": "k8s-infra-e2e-boskos-103", + "uniqueId": "108393174556860532290" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-103/service-accounts/48099424019-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-103/service-accounts/48099424019-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-103/service-accounts/48099424019-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-103/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-103/services/compute/project-info.json new file mode 100644 index 00000000000..5ccbe65de41 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-103/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDmWZMOWHz/IP2I58x0lZo6Vx48t6Eg3SEk8+1hAIPfx/tqR8LkFKZhNjNK2V2VHxTk/DYJG+ZuDd9r59tIulX/zlZrIADTtiXs714OoNgwLHwlaV9PFfNgFH4mtJLfPxILea84VNYWVFAHEOKTE9VprPIB80/QCoFPVvEwnU0AzmdK57IzWYCA8CK88JMcUvJtRvOC1S39NfOEkvY2JqB0GORzysxlhu7oHrcngu2KDAvWsufce3VzCFZ0vQdAXl/F0jaV59r3o/5S68lM7RWPCRpLodu4HS4JjNp89UtPmnDZZF+3XRCIL7VGdXvmyyJ1s9+E9cniBpTdIaO/CUH7 root@758363cf-e797-11ea-8112-a64f894a1815\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC8TXB9pOwJVMjUIkkOgwj+Vf/QyVV09KL7avlpFrabAue1UeVZFMw36e6hPe5tNbuBZUsRnu6WwuYPEEuv3E56mfFqKEnpIR6n9D+DR5NXpQUNOpKG8srAJpPjoeVXPkklJNn64vcud0xgKvAO5uMoGUIBWIAo41+JddT4Hzq1Ldq4ESmK8I9SmClnI3SChms4+u6crPq9WXhqaqtfInzFBLXa8LGnhXbNewz5curM84ks6lnE4a2JmP08ocPe0i+furvVkU43dMIeQBsyBjqzIitKkt3foTCqGBkEORiTmUOpK28Edsw9Le+/BqSnoK9Be5CCmOK1d7+HTC6JhyaP root@7ee79d0b-efd3-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIt1q0ztkTXiwLQhomDuM73r/D+bLO7mkLMDjOeZfCJfDloCce73Oq/Poh5kGAC9wL0FFZdedO4T50jQ8niR+bofiHqnEZArT0Bib5m1nDKrO0whvsOOt06wcxte3SZ8rb6Ksg2hjgFTqrChC8E68V1XzZ8rnVFFSoSkps78chdKDPyPoq6HEZ0x0MhEHDFExvOG1IV2fXAsF5QVe6+k7bcXmuqZyD159Y1TkAuyFbaYtNjd4aCgLeWPD11Hv5JlDJYDj6Y6xSeyraAX9HoDU16yCl+oQJvA4sImPg2NGcNvucym3x7rwzv/IvlVoxNTV2V2nyl5dtljYH0LaRAF0Z root@a5755062-f43b-11ea-a379-bea988342348\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCtW7AFxx6w81o8WA2QgG244lM9SVRoJ17uwVIocV6MwFxQgNsQECWvL2HiHJghByNRzIzzUsiaJ5YbCscWbcG0hPJPLyT1ZI4dEY3x6Ph+OHhH4z/0whLAb5bVmfTywFdq5Px3dbJDaN71uRxRtDuEqm0o7DKUajVIECCP/XG7qblkdrBHiDytvARBplO3rJBZ2TOl3zGg6R8py3qXiy8Y3ys2hdRdh9frIZWhKSeCvwFyWSmEoVwY4pgJ3olmK7rKEMRoktLijyPncihLTa4pRtdKSP45c7zwDCMQmV4QmZB3TzPD7ilEa5rhRaPUeesjDmcDj+f+yYz8qbdULp35 root@425dc066-fc5e-11ea-8986-ae48fe2da37c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD0E//pDrt7HDd02ONwTFjzN4WgVHNBk8k4yltH+kNsupFtowan7r+2IbxwN8OxGxI8f9Ifes3pIXyNUea1NMY4aNpzn64Q84TuozYqq0wYufK6ctRaEsBamyH4B2oYqSWZnClWaH8itbGtefN2lAMmZkXnbXshMSq+NJawPvjRK3AfjgQwSmrRjFE5pCE9yIVKNMCTz3FLn/FnZ0PWsp2xtKC717f5dZvm8ASbgnneNHEoYa+kTBLhiRyq7lufNAFqeVsuHwpl3v4fOCdMakIkLqcNOglUmG3LEbM/oDkoiSNUwQeL/IBdhNdCJZf1Lwiwd/N31MgExnxr8JbfYbj3 root@13c37c28-0fec-11eb-9a43-0aa5164aad51\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDcanUKE4i+ACnK4jLTXnxQ/gKE5UK0pYh6/go15Mw56qlSs/f+HpHUtZrXdioe7FJ522/z8wa8k7zO7ovz44hCvmsqPieBJZD3BimhCpWXWeMwUX/e7unNJPFslA4dYOiUYmcw2U0ydxdS+8hj8sdAVO6dytM3ZTCrvwCw1Z5Av/URBL2PXD5/7u+/CC54Nc2jEsiE7hXUD5pzIrhaa55AeMulvCGFJuMhK6ZASDDa8Um3zrVebqm0z57rXbDRH84wdHKHKwb9p8Bt4QwoEj1A8pYD+L/V1k3EeJPoQhE4iCsVIkVVGXsrLmsRykRtkvpYrlAN08pRjvmDH4FJCIyd root@d0e88663-13ac-11eb-a3c5-629ea79d0103\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCiHNn233Vfjc/P8YXS+hVpAZuElTn9xuxqeUAk5uEVJjg2KHlFezhOIGCoLIpT0oLAy6Xgjmqw6TRKTxL3yeTuJAJY0Ugt42jvY1RqDfFuQNmNn6F+q4KS6FUED6KRPkqcQdQJ2949JRkgvlqkc8slaZe9nc0emFACMHKl3gtlIsnoyn++yiPxqbkbOUEXNJYu3V9EA57TjTlLCB4sekLVYTbAMazjyZOGF2A7LjJdYjRCG1Ya4JIaF+OGVik3IuuOSvjRZXhrzhzwJwtzqsTC5JekLDMyshoxQoXotGIcSx0ooG4cnZ2bS2k2TX7hyiYS2tarQny6TPfu13ixu17J root@97572f1a-176d-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2GYJmo1F6Hb31V4vNTO81MdrG/p5lZT4/uUA1BRRgUQ1RYxu7Z7ypaEbI3CaDQ7UkLELLtVSaKv1iB0Up6gCiNvZjsBJr6tZglVUoet2NS9YSzbAE7fullGWO9drJkDHC0N+sSiazTuB6+IOXeNSCyG24z0R7LIVEYBuPVr3wmtXsHGDY1t82yv1iM3bqFl28O7E1MPGPIT+BJYMq/rKHx0fgapMNqAgtr2D0dQ1iB4HxCDSb0enaWf+2KHZm1e7NxPhe+cPFefWUu70rc+B9M+U2DqZhJSkGP6CfnfcIjf4lBGTLLA+WLDEW/pI8qbBTc0AzqRLdXBjZIZzGucDl root@0dc9836f-2da6-11eb-a59c-42dfb897bae6\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2f1WhYHliBXscugTm5zRMz35YOy8B1Nb0IkIQgj2y18Ghm3yspIITMxuuc6BSDsrDt0i5M4C2A0U5vKm+ATnvZXa8T/pWIsaBjO9VvvruFyfruDaP/cS39RC53FtFb5TG97f9N5ZTVt+2SRHd0AkOYghE++ETYd3UhKnGssrPo89RUq1xlZZpYruTxgFy2Web4002udi2UWkV2HRkPo2/tiQryXNwdoMo7goKKEQqYkY1fQ8dM1tEFEvMYyLbrTuXSVqNGZsveXW+GALRsdBg9hE6BDP3e9Cjq8gYmnkc+o5nAFt3BKyBFDaWAC4vanAnmSNk96nmCvDxZuLc4a7n root@6667cf1b-3dd8-11eb-a772-a610f2f25584\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDAvENKUhxDIdJJhVxn5ND8iWOJxYAnZh2YZ6780/E8dX8V64eUMmlkXp4ok9/8pTML7zANtx2dDnOAzGnS7jPYfpuEr6Zun64Dwg+2faSjwqpNCU1gB2Ocg3z+LWBOOrTjU6RYElCVSBG1lT/paPtZqcYORS8AsoSzNkmc0DgE5dMb5R3l0TeW7wswBLO5ydCDMoUhyXW/49y6g2/1+uK8T7HwVnawROSpBqSHtbDFEnn6zC0nrI1Dj9uc6VZic3ZpmOHlgJqAsk+PgdHIGBoxWYFt5XjfTMO/PSQ4UFdZvCqctNf1Cnd47SOE51hHohQ914evDDpYwJb+7VX2nG4r root@8b2b788b-3e3d-11eb-a772-a610f2f25584" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T10:51:54.874-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "48099424019-compute@developer.gserviceaccount.com", + "id": "5121439471167616981", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-103", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-103", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-103/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-103/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-103/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-104/description.json b/audit/projects/k8s-infra-e2e-boskos-104/description.json new file mode 100644 index 00000000000..7ed4859e614 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-104/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T17:53:28.699Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-104", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-104", + "projectNumber": "939613538320" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-104/iam.json b/audit/projects/k8s-infra-e2e-boskos-104/iam.json new file mode 100644 index 00000000000..0a678570e3c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-104/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-939613538320@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:939613538320-compute@developer.gserviceaccount.com", + "serviceAccount:939613538320@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-104/service-accounts/939613538320-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-104/service-accounts/939613538320-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..4d4d1c7aafa --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-104/service-accounts/939613538320-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "939613538320-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-104/serviceAccounts/939613538320-compute@developer.gserviceaccount.com", + "oauth2ClientId": "112951416556549082751", + "projectId": "k8s-infra-e2e-boskos-104", + "uniqueId": "112951416556549082751" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-104/service-accounts/939613538320-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-104/service-accounts/939613538320-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-104/service-accounts/939613538320-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-104/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-104/services/compute/project-info.json new file mode 100644 index 00000000000..f95c6026c3a --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-104/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDnZMcudZMSr6TDYa6y7+cPAcEEqOBuuxD/espKfYPKcKKuoODE84VnTUsvlIt2YH0Xh4C/dnNm4UxZdwKeG9DeMXQqU+xPL8kEYIL/v/g6rgv1hUgnfJtyaMmI2iP25Pun95P9vyx7qWQSuJrfuZQuxjLJa2oC0NkuVYiYPIwf0PIQ/FjqcjUKgR0xL8HnEBjVbmMU/UrZGm6QREMTmT445jbaPmc/n89+9GSXVrCkYWM/mlPpSJeks/M1mep4mFY9lReTBRVuYqvZoUSjj5T/fJQCwDaPnKScesIDxYhsQ5pMDgfV9EdpOzAC6gHAufMalnQrQX6t2Y7jQ7EUjXib root@72f68607-dc78-11ea-82cf-066baa17f17a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC41U6jN7dmPHSp1CptJ0QotlyhUP2xTVui+YvCXvwKY79D82q2wDjJN2PliBp9ZdAJSTphPl5TN3RoKwgYr9gZ78w7KgciX5gvRGi2N+wcM28tu/Dt2RAwO/GsoKMynY5YSo8LQi+4CDSvocHmjf3mwuhAQKom0z36pYhLmjN4UQaUkFYJGJr5jirvfSXgpOWDW9582E3RUXllmEWIzF8+zZZAT0JuTWtbF//6t6tenpUQYB+iFkv3Du+Rdc+VxbCpOGysAoTf+XvOHCn7CIEP1Gmrok8jByjq9xUbUzKrvCZ8dhG1zrKM1Nlr2H0lN2cT+92t5VaOUp4yUCqQ+7nf root@cd8420d7-e2fc-11ea-a87b-7e1d84ccc038\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQBze+f3YRSEN5q4ToMpvl9TLGltthqezxDhkCh5rqcueZG8rizqcX3BM7SHhjpNREEoXrlMrsuzjNeRXBbdkpLo48P0awXQCsb7ZO+PdSIkZlTm86igPUWb75iFWaancYG4G9eNpN8IRavIegsWc7MLVCERMdj/dfLcCa3BzbGB5P1Xcaz7VIy3+5JIAj2YkI1/FgPKlI9aZuFylA4TEhCzN70O6aB1OXgqMqhyb4j34MnLZcEKLlljphm5KRjIZx/UwR0Cb/di4ZJXuWbywdRRTUtr6yaMcodN9sz4xU7YIqdxvIP79nCr06UOL4/SdwaIo6nB+IA2WZz9KtLryp root@51f5082b-ec6e-11ea-aff6-5a14b0d7f3dc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDVf8MvXtjIYcZyBcvHvf9GH/GWhRZggeydbMWes3CIAK14fSxsgT4y5JBWGmqs5OGKIuMRyAgLLi++g88nrhn23Yrs1NmakXEeKIFVKFF6re8CQVrpsYdawO/CJp0sHFCi8gu4Xy4wANNenMCorAtjdnRnx9kof9Pbp3GIPu6hd25tuDEHN5S+lB+qxbE4BzD34iP4DEitIO5LInXl1gsArrx/2GDJ/0YO8JjBtdSmTV2NyMwTsg7Zpb7Uez+VGZPljZUEStl/2pSofAP1oPY5jEClJ7FX8H4akLSq9dfXAS1glQHunvI7YSZYFvrPSairW1eaI30UcdlBc6KHx0gL root@d1029833-027d-11eb-aa74-ba383c228abc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKIFMy6OTr0IjLo8C9OrvkeWNdXfVpoGRRbIg+7h0FznySXlMjXsJ1L/N1JKTGSxIBBHl2l4HXYHabw6REwcJOwlUICV4i2a1G/xSCl16eFJ0XVp1lfQw0yvBSxO/gwhpwdDV42dVF5kYq7Xz65xJmG1KXxHJjDmyRL6BD9Scq4LrZQuE78g9V2l4nu8PKRC7ytS0oVMVSKNx5fmGg94E0p02yYwcxLF/vFlCaRPMyCP8SB1JgVhcE+Zxsbm1v6zyUUAUrkgKhFjrXkN4kgJdvS9l1fi9XecuNtntzB1huV8IyCXb2wlpOKQWuCR0g7Xx/7PIuqR7u83jbAEGBCfov root@52c5635c-191b-11eb-ac0b-9a760af27878\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCybOJIQE5Lsl54mx7uibBJpe/oJxu7V8sab0dwSUSlOzFXTmHJH1r0Xd1unZ7QbgMuD+gumnwbOxB7NV7u8GH//HKYVgqx1wszI9zQWgp4NnX21bDnnXuLWrMytsd+P2vL8e6J6J54/RexyjHQWdp/WDcq1KZEy0++sE7W+EpjkRCa/7a4Scj2raVsPrno+tivVowDoPvxMniaMk+eC0Cnxdp/9Ad0QvTKZKgQv8RoUSVNyjE5Y5d6pVzT8lUjjeQiSd2sn8D7NI5vIorItwPIBstl2C53InsJ194Vk6Po7u3EDDtdmhd2LsIUxpqIWFa9igp4lwHhOzf4QMhaVVvX root@5ca959be-30e8-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqZ7HJWv4YGL8gzXvLyle1APLHNDdXh9HlW4WL3QqCbiEM7YvJTEwZe421ehojjcEPoLX03gEaRlaNMS55ZdOrIx+ch1HYTUHAeJd9q34fHhUZseY6lOUi2UsLVR6iFWvI/ij91I9mbKJ2QC6P0tg+4Fj9i+e67wzPoRdZBMUKkLAMUyYO4W2T1fWXvJtKQDeJ0CPqPHZnFVI0F4isqGPE9KuUU169mu+qf52S6KOVx7cVTx4o4Y2rxDt1TBmpOXtZFZv4q9Ca3P6Nl/uRPenN9ADsUAihIWUA5FJqFixwpNXH9cIXZeFuLNeLfUVQE8Ni1z+aNfrZ77QBffLjQVAT root@ee70e4fc-31cb-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC02BtPqWR4DjEFT2mU7LFEdcy4DHQypgs+VKsxz3snUpGTzn1f4TOhsZrXc71j2ATCZp3ckMh5jACbq8LELsvPf0pNnqOpbC9pOrUQKKyekWmzT8ADh9Sm2KJwNPEmYWpmK5oVLEYzjlCVoevSYws0B3O3h5951HjK/t9LHXfHe0f3g3DkvtZlwjXRcU+Gw0mHh+m0ldbJ4qYgO1IDof9luofRmEajlGxlweOGcLT/8o3UTri35TS3Y7Ni8ya8PiHc0ElAO9tEa1G1DCLbY+xlrbKHj5plEHE3ArGCtOxMO5G+PgZ/BmVqF1YMjoZPpE5x13d2X9Dw5mhFjx72utTZ root@fe14b7e1-4249-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDpuFOkGry3AE40+MADfbSQaUkpvLG4lY2f5krCL8BQF0GF/VWa5aocll1EkuUhKHK8teCj0hkO+H27/p+MhVXifNsK6ebYWE9hdMUEvV2/QziFkto3ULDV2Hx8DNmpwWETX9vfZ4oahzLFsY0f07of3YXcO+4RLllDVJgTK0J2eNMMRtF4+j33EWgaHe6zRsM1t+H38MSAgqE6sXCKY+YrSsLuPfBjnBfK2mYJ/wwT3MB7cKkpA2RJ4CUjes0rQFnbTXYAu7SBDLeh7V7ge5RWzHA0zz2jHjj+AZkUYGSpvxcm2bN9orm52G4OBLhOxKVvwq8nFKJ2qVL0zKFV6iQd root@b5908e3f-42e1-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqNptYB5DOrMW7d9k+W+/G0fnS2jttXp6LhRh/zTN+Bud0wlnCm6ELDuW8PW3MP+vGpE812PZMptU5UQwjV7sWkUyBOqKZZm8dp2KqCy1PenSoAbj3J7wUjg8U72suhKZQH3AKjGdIC3vK/qz1Xb3rZNu9IC3hb+aCLvT0T6exbvbfAoMN6IGcmDDaab4OqaMvZu49oPxAHzykY0SjMzStKuSSp89twJYOhtnz04aEpqOwYhGouA7BqQDYhYZZJwyvwQrO5FiASRaotFkFRIU+YKVqJ74HOvF+or6HZw9fTd1yMif93PmA56GLYX1cgLxdiLfrvtqwya8VzicJhycd root@39d8c9df-5037-11eb-ae25-d6360d0295c0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDPC7i3DOqXQOEORB4OmVcFMpHxIwQxFsvBNk3oXahmWiYsXqd5GHb2sKC03TWrFjTJYKhWVvDXdXx9W2S3W/fiko6PnzTZ6vGW/5ImIW3Ktlg+JHwJCN+F0rttyEPcCF5tOCnuvkjo+L79yeQBCZLSklt/qtyQg0nuA6PLMtUPqclstPR4k/8WdKWb9uHxabBuWxiaibKDbE9iNJ7BABgg1LKD3n7t3sSY5vt4KtWmvmxoIeH7FO4oBRjPXr39l6Alkfcmvw+D4m7+zNCYRtQMC4OAPJCkRm1R8k5DECYlVfwpYNzHHCfa9styM8ZcY0TinIGZaWm0wqov+VVpE+DL root@342e4b72-514b-11eb-86b7-56818f023517\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDXBLeY1mlsKnOJ3JvSiJyV4d0998MVI6Y26e3GHgivbztZ29MhijiSZUYFTs68pYPqkg3FPm6KCQm0SNmjNOApg87IucyHPyxuyi/SWKT2f1CcPfTVC2nE8DeoYQbh5LH+f1Sa6kKkfb9LnMlLWbhtIQ0y6rqdCNN4eD4EUSTWomFKDbJNa5L+tYCqM0+oZSBJhcLpNLqQSV5PAMqlxvg0C4e4s2R8lyV0G1rHZAMUsbJX98YJeA4TfI6z54Y1A424Ne6GDDQplVOIh0iEczYOER/oV39ZiG9bV8fN1QEE/9ViAhCnzF+417cy/vtD/ntFob6U4AofjW2w1MPlLOjf root@48d6fd77-5314-11eb-b6a5-7e8b7adfd54c" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T10:53:37.836-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "939613538320-compute@developer.gserviceaccount.com", + "id": "6544774478962636622", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-104", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-104", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-104/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-104/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-104/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-105/description.json b/audit/projects/k8s-infra-e2e-boskos-105/description.json new file mode 100644 index 00000000000..b4d08e88f2c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-105/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T17:55:21.814Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-105", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-105", + "projectNumber": "521265359230" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-105/iam.json b/audit/projects/k8s-infra-e2e-boskos-105/iam.json new file mode 100644 index 00000000000..a27c5e0b415 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-105/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-521265359230@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:521265359230-compute@developer.gserviceaccount.com", + "serviceAccount:521265359230@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-105/service-accounts/521265359230-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-105/service-accounts/521265359230-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..9a8aa48e82f --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-105/service-accounts/521265359230-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "521265359230-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-105/serviceAccounts/521265359230-compute@developer.gserviceaccount.com", + "oauth2ClientId": "117530889756119114572", + "projectId": "k8s-infra-e2e-boskos-105", + "uniqueId": "117530889756119114572" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-105/service-accounts/521265359230-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-105/service-accounts/521265359230-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-105/service-accounts/521265359230-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-105/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-105/services/compute/project-info.json new file mode 100644 index 00000000000..d139535bd1b --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-105/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJGMg0ttGr2nuR+UcWal/+nw7OmeIACt/3A6dvCPANCqoDDkpoEz3vqicw7IqZyFMJcPDtAFN6KAfNVFAI7peddr/w0nxy5NjiE1dOvX1FmKziW8A6uczYotX7E3MeHgZxycnmQIYYJ6J08uCPeEYCZtX4WoBelz6EEboDh6p0pZ8sT4qKmsjTBmMGZPqpMdUH7ty9ZyXcVvpOJ+gpeD1jDkRzAYfwGUbT85+71dZ1AdYJouMo5z/RTd5Wr0Iq2UNjAIAmtas3BWGAm2Z6V3LIhsbDz+MUNvj12RzwO7D4VxriZGu8Kh4UdKCZhIopeGmEYYDYB7sWzZtJrzltmeWL root@0d6a1314-df88-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBlxoBrYfo+d/qeM2xClvM9Ic8EY1SHeOrsXvAEQYiZehiTH2Ldxf07kUPwVLShIbVDnJIcGIO3xgGQ+/Tn9Zo3C1mSGyL1xGSu+P6e8gA3l2AV0o3L6oJ4hyxLpX46XryBq7nMDyT2cK4UV68LsHOJoJpeHwZd6YUNifnqDswhT7M+jaxzX/dudjxCnzIWTks8VLAaywUEiZdL8jf69SwmuWOLFg7NYsAFelj7+QTqyejpAZCbuFTqSb3dxqPT3qLiexuwq5ki+eIGNJYMjlwrfIJu6a3oGIO0JEpjfDz+i40jrBHQg7bpe+RYghJjR/f0RrpvNB8chztqeQS2ov1 root@8188bcfb-f838-11ea-872a-bae3dc204648\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7z0gjj99e0xR7aiw+TgsSzViWBmDoIi+yHS+gRjGppdzSq876TSHIUn70CxK4w+EiL/BKBPkuNyKsuUIPdfAt0fWP15q1P74zCEFyPOCRD66hUxMtPZHh93VpUHUu3pFE1phZOzcRWN1i0N5WFiw4fTn74IY9pWyR8QPuHyK2Ke+glfdVkNXV6Aa2Pvjb2ax3ecnSNs0IyKF8xywZOy+BzbkgxKy5fITEyp0O5k2akDo2WTmsaUayBI9dkfNizIegP5PCObbNQkhWHPv7TRTbRAv7LCIcOlG+agw+d8SyiAxhcKFcIyzPrOeWLvTbJ1zh7epxQvxEYOBmAs1gV/jj root@ddae1e22-ff08-11ea-be1c-eaa6cb7654bc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDyBCNtqDuZZzjUP2tqwrV17gZQsOxZX4oPJBjbZzHn7g8Zfe9Lc7R9Jpe3MTaJ/+oGEgWsJlYr7F9a+lKheUvWWDKxU00Tff1Aa0WwlxzB8UeGDY7t8F5fX3bA4yCzmhg96ad70aF+5Gv32iRziKlDn3lsesW3xcxiwRbNFerD+smpA9Gh6m343DyZfyaKl/CIhD+NXxsc8cfFDs/UnUdm5V6/Lf+S+9dbUgtNavT/f0mR2wwa8pTxfe3AdcnGm7SBfEltLDlqo1Pd/W4KaiYrtufmNeTd/G1IItlKMVzBt9RDem2aSK+KfxKIy5/yuaxXM4kdo7zhIF6iL0Ay6uUv root@99c813f4-13f8-11eb-8a3c-66d0ef5d093b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDW5z4BRJa5ddiSo01vxJIkN6v+fDiPcaHzelFTj9q69ruIJJ5glbsUgW3GWB58TWdraqqd14IteF48psRv3Up24Dkus1XCh2wc364DsM7Dvtv8cdS5CRi097jDwlyAzxb+uHCXj2skJpydxiJnhNpkzEJw1XHF4ZfbXGTvMhAtQg+pfg7rDQl7G9sHnJiejKGwRiKGbW9x4B2tU/i4JDrEdcFaFcqFHSypF745FStSlNE6zWFo8m5XQ7s8rBkaQz3UpoLbGl0Ixp7i566i46StzQK/9aoGMy3BEYR8kYwWeS0mcfYIU944NfmDYRKAiCzOMgI1VfhKas2pvUduEbPt root@74f3ca0c-1ca9-11eb-99f1-c6d701d1e283\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDN+3PEIYl4wyfmE/Il4qxblZ8eo7DCWXZWZdblLm/1xpZcjr6sxYZRDvkdFi2hGss7YJR4BZguBUmAboIKqw9TJ4W2wia444hjYMl8pfcrqzSMsUi0sPMSTTFgPhOoqQENwibFhTe96BG5AXnm1jXMyxEF2wwda8A0mUXewfJFgy/o5ccN4rIKMaLVIsmlzT0ToCL81RBN0Sebh8+3y3ZbGv6MMIi5AUmuLCooqHvoj0S1g2ua4l06qtI/05bTlsvityMai0t+2RK1St93Vm/y9m8ShResQqSml3H71O0gnbMHXWjL5NTsz7UpQV4s4lp158MHqWQzQQct5qcSErSZ root@8d832257-1f86-11eb-a4fe-eec30b56844c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDMzJr/H7Fm7RZjC3YWxeux+c0jnD4Svy4FA9tjIqczoLh9aLSHyI7OElErgVkuoLIVd0sSxkH/5IbOlWR2FeoY1kYHwjhbBf32zHlnVi0rlznK9P8GEX8QcJAqXWa7n/x/izcKtH8BKuuAe81KQ2Uyp//4Ils8DD5tsWpEP4Dwx4pYItGbFSnACPMY55EmfwLXN/thFC5O9fyKkfw7+GlrHiloE6qORjNaq9vFTuDWakDAkHOpxMbuD4yftK1n9uuIYAwZrifwfUGpMxqm7mNOmQC2NGagt6nJx0D1LQQeJqETS0PQ3oQqqRUfgTn4vBUc+6PczOHrZsu1oZp/YNAn root@334ee0cc-2bf8-11eb-a59c-42dfb897bae6\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDbN24INqO4lNrkr2GNrkl5Mk7UkLBMCMoVLBo9cOQLGaHt3I/Sf0xJZHmiiPoyG8cEUSm20xZ4Vezp256OJU413YdwfKqkxstYlVPv7iI2ZgD2WattRAi98Vz+VyAnzVoHW+tfD/2S1hC0mLghUJBRkk1p1cbqTxKWpoqzClR9aO6iShFClmfWZWPI8w9M3fF2lcj0uZOdIxfjnGq//Z07ngx+0x7XkLIpVwobuDlDn+6OX99P1f/P9vTd9IA/V8TPzlg/OKp58yQs0GUVE42XzOOtBaeb6Jk7L3NyXNtQM75GJ/FRrJxdbSC30JF9BgESVyhZUi6X02LIy/d3/sUn root@373cc664-3f3a-11eb-a0eb-a663209ac437" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T10:55:32.436-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "521265359230-compute@developer.gserviceaccount.com", + "id": "1944416496907990267", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-105", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-105", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-105/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-105/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-105/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-106/description.json b/audit/projects/k8s-infra-e2e-boskos-106/description.json new file mode 100644 index 00000000000..b3f393fbe19 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-106/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T17:57:18.701Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-106", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-106", + "projectNumber": "749724153407" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-106/iam.json b/audit/projects/k8s-infra-e2e-boskos-106/iam.json new file mode 100644 index 00000000000..ae9a9da2edf --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-106/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-749724153407@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:749724153407-compute@developer.gserviceaccount.com", + "serviceAccount:749724153407@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-106/service-accounts/749724153407-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-106/service-accounts/749724153407-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..c7dd73bdc72 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-106/service-accounts/749724153407-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "749724153407-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-106/serviceAccounts/749724153407-compute@developer.gserviceaccount.com", + "oauth2ClientId": "103750239521813531251", + "projectId": "k8s-infra-e2e-boskos-106", + "uniqueId": "103750239521813531251" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-106/service-accounts/749724153407-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-106/service-accounts/749724153407-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-106/service-accounts/749724153407-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-106/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-106/services/compute/project-info.json new file mode 100644 index 00000000000..68b052e3190 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-106/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDV3Ped7ELj9j7GJBxqW1EgiLBSBXpyanHc0P98WvLIBUybV5O/437drtutoUEsgrfE6OJcxCVr0IcuYaea84wvutYlFE1M22AE7O/p+Ng1R/Ck9tsccgDI1lkY1m7EpNYSPD3WTzmp+QeOufQuvcaOPKkUILmtOJVe7dAcgoVTkzSKH3lYZVTEApR9iFpuyMERcg6g1duAeg3Xocuh+Kr42jFMOl1iinsxA6A7oCv/pvq/Gzdr3pq0/2kac8StqGcoYR0ssWW6g3ySz5nwc2uTRTmESRJHPXkcAE4wrrrb4kCq7f3eBJU7bslmAb0j/FfuV4XXMHjt84YzM28Ghfix root@56578bdb-dfa1-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDWjLxZKWJLy+s+hEGqJt9J948Khs8KFIXbzAFw+zBktacx29q17t8QF9J/KcyLwKsKzQ0eGqfWbmGLOXyJ6aP33RnhYNSqmDO/Is6gpvmstydbsnfgfPb0G6PdWCKgnzDYGUjPkWCDQAjJIfpnMwI7ihUaXAztn+Il5nnh2l7qZOtQ618d5BqRR/48egUQkbPkwzCWV+m7yPOxo4VMnIB7arzR53ixrbpAqvBpxnE/YK8/xoBCv1pIb6zCtIbws8kzTILm5lhF2nsFrLRUrlSDhWRsyz6NE+UJFa2JKZlOlPuAbAWH6taxfL3cgxiaU476NZeJpZl5Z7I0HbgZdV5L root@41e011c1-e191-11ea-9eb6-86c455181e58\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC3MZU5dk3KPTpUG/8nY75V90tTWxeBd65Gx7kC+IMYtmRZ4tF/Ksz1bYym2QJA+gcHGuj4JbyJG46NJQs6h+zt4SsIqIOXVndS/SW7C5NYwgpRT5hKdN0EGmzyoyxcNt3IIOIJAbWmkwGd/8q00/CTarZwPqaHjQqgRkTjqccvYemDF2KqxazNex+J9io2oRsmfbsnL6r6IT8h1cjkAtchTvDK1fCvJrRvIoelKHfOV8gIoU4MQvtBkulXXj+Mx+NFdMoh+705LOD90359bAYHbZRsgJlMnZj/MNe2b+SAWLGMllDv7CkWurg0M4hmPfbKnAk2t6VtY+aEkPyiIMd1 root@4e4d4ded-e5f3-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQ5DQmxQZxWKgFjMeEWjHO7MMrtnAWYnUHJJ9CiaVb/Pnt3H+TOIf3l2t1w3q0mK+RMMcTOoyVtgtDbzuCGP5bDx1kOU06VryJ5ALO4iNMcMEHCsR9SIYMhpRGGAYCTea124dtf9qpYwft46nmkbdS6u0DmuviHfD//yKxw0Yko/bt5N3HSWWGkQVkG9Hg/Gsh62IoeNsL+jANkTI7CgY5Hhg7G8t4JGzLe1CrXzpuUL2q2SwSGz0P9rWMMm4dAXl61inFs52F2OVyuRsOvo6+WPiT6/HcK5uWSQbtEsSpVUVu7J2uRAwO2SVcXSBAbkYQDuomnfS5oCD2Tfbd8EqT root@b5c9296e-f0c6-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDXkzQBkK2kDAafxVbN6B528bTwGqZyP6Q5p33xCvbAKHJ8QdYnUptlp111p0d50bEtt9AgSn8hUy0VVwHARbPrjY6pokQfQ0QQIhyKnVDukfQ5hxNxSyHGZ0eTKsJXSf3FtsiEM487vmaHpnBcqVw3J/prX8yj+r5tbhk+isNayOlgsnjqwBb14gF1OmPrnhv7/EY/S6nyY+uWeZuXpzM7ktCNMzV1fz/XNA5IoFZZt+lGDXBYtotPaujkT5ZqiawOWfbp6u9aN/88VCS31GLMd9F04gUUXoLcul7/rw926k2k06HuLUwSoxbj9c8l53lDxe6INR3HqXahyzpNo7+R root@37753673-f3bd-11ea-a379-bea988342348\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDLHK61JtkpYcwbM/kNQeokdYYREsLSXmLNgiT9gWWbAfvXIHMVmYyzDDrc+Dlw/Q9J7Jf+NCUxlq3hEhRhYXkRK6JiFUuLcFXSl1n0DBKGFvms60QLAPdZN0JbJ2BzGtEQ2n3Zn2ZRqgNv9mO6fmcSurPS1QN+MvIZcmTM6dbk53XpZm9L+FguYlR7E72Z0/+y6lHD61hlCgEgHq2rxQ1Kai9cuyUUeqZhJP1oMRSsptXkyf1B2QA5e9LOuamSzaC56Kj0kM4kX2DmcR432WliZGH8/zR6EVfnpHQ1Ybg1BzJM1pf8LjyauPhmUDhf7rRUBjJnvOo4o1VlARNxVK4f root@ab966103-09cc-11eb-9ebc-160f1a1b7fc9\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDiJOrK39ry6r6tEIp2KzGqE3/zf9WUUUq4T9HVMyoHvEgp6hY4fVJ8PiWQ74c3JhfABQeI82p/qoyAyxiOdmPRhEwYJgq9evYczwPaTl0rlcVWByN/eRZxrIXUNtmmviR8ourd+M9CYL9RWzrcXkhMhg/Xahv7DgnGErj521xeZ8/e0F0JxK2pfw8OFk8NEbKE1mDPdkz8Wf3C8kDhwmbF8Z/HvqeKmuji0BVEOkrozbxMzsGKRgMbSDhVC+UFg33RUvrue9ArXcKvjdUg9cqGkqCT7eEScNYli2fcewgFcRAiwnERIk4mGsKNLlrMlIntT4Ye62fHTDGHFB/GrAX3 root@de3f64e1-1f9f-11eb-bb76-36aba4894793\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJvKOgySq8KkI1mYPAv0iTTdjlsxiWIhKWhETgcaKfpCrGJ8F6GUnFMVzr6vL2X6d/YYk/3XeU05ToXQhFY8hj1MZXX+LWW0U3COTbTKGaaA3BJuVlAWN6yYxoK9UqG3c1iGr7mS1fnzsOMsqODt6FTUNsogmBtBD5yH6doOyQ2vD5XnInVh9jtSDQM2yrP7VJyoUf/5iEeI8bsYndNS1zcUejQv8QEKYYEYdMTnFAQ8gVDrPF3R+Jd+CPy8TBH8uZWUG0JKIU0I2bHszmiYGoSMRx14WWMKO6oCurBBJhpDjaXgH/4EycVH50Rn0ss+biS9gWFPqE0I3MxpwPLBkr root@dd6cbc18-2540-11eb-aecb-aa862b891259\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7wM17Z3hvD/WMrdv+QrjLYu7Y/3IfWf6AjKCGWHsWetPV7z9SFCO/dExQdSSC+hWFrkls8anTTYANiQXMzggZ/NTJ4PrKiBUtsHh+atrGUwTqs2beler8ZBQrmfS1aOqMet7xpCqq700ROr07Bws8wl5wZ8NYixu6V9H4H0tu1X0g0DPveGa9nSnmgS0xHrjR4Af0KcfU9rlAW1PACIhkvv/NqZcJjDtn9o64FEoJie0hgxEbdP/n22hh3stSkcwyUI2GOCG5x/8eAB2W62CRhOSKlSznAstIVsNeHEbURgxlVnYOFTPspEexQahQ0VV7TMT+fqCmw80osSld541x root@41a26498-27d2-11eb-bb1f-6e397dbce9be\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDXeqYKYTFnUR5+2IFpuJ/EJVNLszKEb+HQ/07wQZhHTkM6vN1PN7eBLa3rD8X5PD5K1TnJgAbeVs961FUayiNu1KSN1bDH/QdpoV8/2TzQ8qaD2wGcZ8GBK54aXEmnYjqRGAmKNvvUDXb/kSwwdCiEaSqpOfkd6zgs7S/6RhwD+8pJpJTg9g9Ex1iSdtPOgmoM4DfG2MBLVfMkbnjiG71bkBkD11SX2jziKM4Bj9o0INbSx/rFUgQ/duv1PLYpvJNQ4t3WnAGdiyuUX0BKt/xNQ5yU8iGicgHXIDpLVvg4pFgfts0EJa8ga1MqXferqMIJMtpjSDoyqTx2sraVqX/t root@c9c1d940-3217-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDNGPKisdmBD7J/c0ztWaSJ6cCSQrJFQ8auInF60NdZ9MMSYOYyqxfDyXQeMIKnbLHM+Bv5H4TkqiA2O15f29G1XDLNrdhN77b94yVGPsY4QjNQ8co/PJvd8pH4LRyNu17Vj9nj/3W/XsPTEt7J2HBg1rzkv9Q9JXNAdG9TDnIhOk7fIyp6QxrP8G/eHiiNoBCNEZWwFHGbmJSxiMl8Nzx+h9HremtTGrNKookNV/vPy6aMqbPyTaBp1oLISeR1DVVbZ60QlmXWRNUv1UOT7C5cjzR9KrXHIQiqNqTKIyxqV/7pmQh5kY/2Kdz5Ba9lsAPV0HY5Q67u9ikoRBrb7Nvt root@28c48a60-514d-11eb-86b7-56818f023517" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T10:57:28.749-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "749724153407-compute@developer.gserviceaccount.com", + "id": "7036813517304640615", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-106", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-106", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-106/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-106/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-106/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-107/description.json b/audit/projects/k8s-infra-e2e-boskos-107/description.json new file mode 100644 index 00000000000..1fc805a5c2b --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-107/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T17:59:08.054Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-107", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-107", + "projectNumber": "119968166209" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-107/iam.json b/audit/projects/k8s-infra-e2e-boskos-107/iam.json new file mode 100644 index 00000000000..51fb61fb826 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-107/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-119968166209@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:119968166209-compute@developer.gserviceaccount.com", + "serviceAccount:119968166209@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-107/service-accounts/119968166209-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-107/service-accounts/119968166209-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..87c83601af4 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-107/service-accounts/119968166209-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "119968166209-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-107/serviceAccounts/119968166209-compute@developer.gserviceaccount.com", + "oauth2ClientId": "108549459589724284103", + "projectId": "k8s-infra-e2e-boskos-107", + "uniqueId": "108549459589724284103" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-107/service-accounts/119968166209-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-107/service-accounts/119968166209-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-107/service-accounts/119968166209-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-107/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-107/services/compute/project-info.json new file mode 100644 index 00000000000..4d87714700d --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-107/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDT97C8gs47KqpwM6TqPYrVQaHfZleXnwQNZ+DWMFNcAzfm2gs+KDwFLTsGNbYBD5XJyLuJ6ZcSpkHozLcLDKRzgQYHPH/L05YUoUcEPyqwbaRp5fjMahJOzsU/8kLEF+6J0B2rP47Fc/lHXrLhAxoFTP71a5uzTTI59mFh8UohhOSGQkx989iOxFY++joHBv2j/+KplbXMIm6eCnIavZ8o9m2T2D+sXrbKW0nKnZFZvVQCSW4J92BFukMGxi7Ory6RTO1YBowDKlcu3OQbHEhGD3DVDp+ghA/LzAJXwSeXs6KvbXAjBtWVcWFBXXLA8ISgsoGJ4cdu9ROhmDh//GOT root@85ef75e9-e635-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDAlIJUCnKoyWLGbtdJs5LZRBnNw2YZxgTATYixVCQfI7uPcudA+zqkzQNEkkuksvloA/5meZ+RUa9L3EwOJxtopmZcJ8tQr9JiywQtNAp1qkmMgXCScIyWoydO7FTMWYeubIskyFqdivYzpVNjj9kdyYSUOX9uWdXTChvIRQ2TQQ/383iJsqyfgYzaUIiR4rHsG/+Ug1jqR5Xdb6msUKz20pI+EYUNceOqLV0c3zyELopShaNoWmBggPBmEUrNss/DbEPIvNxAj58ALb0w3rSL3fwqhhzU0+wXgr/5zd99bNT8chJLfuuphq7QS3OiPmCPQQm0DDWnCTuUJIzIWFP1 root@9c024df8-ea74-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCyK7HHnvAAUDhnxMNJIbR8vp44UBCeq2OOIJbhirebq0GQXzM3a5s1NN38zwJUGsLM0vdk17KTYDqSvkiqIxkmmH7Gdk2b6aPhbEA0jgQ282TxCft6KlObg/KgfTE1+XS8+pZSK+Cb9tW1ZVOjkymPudPFeT/s6TX2I3XbKxE52Ka9Kb6yfQFwfOB/3kR1rgazJoz2Lv0Ug2LTQ51eYvr8Woc72EoT4UFyMC5b8Eu2YqiUjaijis9bAepDG7Qu9MJLTH0U1Ht/eVLTb871blwLWCKkVDkP6Wnanw9Olm3Rx2z7HFrQYHWLoW1ahYyFyrvhKJZzPWYI4FVlbWzkdQxV root@ddd158ec-f58b-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC1ALPJufngt+p2SdWxePdwNwMlr7HWyTVsvADsEBfLii1e+q/Hxu42W9xc9wAhAK+EuzQ5L6g4f1ideZ/5r//ayefVepZ/N4ixCmbclQRECr9YPjBONs8S95pX9w5TqLchbj2L7QejuyiBCjg2Q7CsKNyXYnLnQj8enNDS+zKKan69isO3bnE/b/mpBehUPueeeLM9MSzhtsSzY58+wS+gWlQyVnZd23wcaE18919nDM8Q0ODJyHWP1ah240GgQ9vN9BoBtm6v/A4LsYgZfWk4pK5osh9Zra/8NnkbUF5jMOXlESiZMz0yuerhq+NF6ooYVgWlYFeq16ROLqv4UtQj root@5c6f5fee-f722-11ea-ae6d-8ed64f3416c0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDyMib5A72PAky5Y0T0+/SEN347YwmDoS+8tWeGKZmttIgLu85OX39BpiYsnSAdq9quJeeHDG51WTUq0q5P594GjkTfaLNpJgOvdNqQ/f92ZDSDkc8b/cIrlwKX2AOZUPMUaUYrFA7Eay2mtPJpewitNm2rzjuYnLNgT3fNuj1YLBXCWWarEiz1uZ9yEK5Pnggbu19fYCZIe7BHRHgg2vAYEVDR+aKOeaTRyh+XP4vSemGtJLVpqvoYnQD2XjOlvLEqfhbo7I2CFo4Z9+TSu2KL8rbu6BpPYquniKn+hCMpgwJ+lYL63DPc9D1PUV/XA24WiF/J/060Q2uZtQeFh9+H root@175a3e18-0722-11eb-9dc4-ba187aea6a9a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCuADLdTuruNHyCgTd8bjX0ogmz5NW4qfHCvmBNXw3xYGEVXfH2/PYSPp/Gh7bZITUsF/OnOWQhRpDH6VCydgvKv9I4D3TYvAgAM9D3HnTkZKq7x7EN7WhCr8zhtEF+y1ebXwx/rIOQe0nVqR+JWZGk0hyFwRBLPmaUk72dimZTAHCyLDDfEs4zj14MpKJzUCyvGU3hYWK6OKclxLIUAhpLzAMGgIJNzF6ayGC8fFXrosQA59fi8vw82J3o797PZtuyh4ytBgmqEJI74s0+898O/d3o1VTdSj+JUoLbLoC/wrByTdINJmU1HDGW0gSbRfTYDtSWszPMafrrI62oeysl root@ea8dd52f-076d-11eb-bde8-b2e010cd58b2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCrTPTZuOe3H1TiuVZr2ppVxIsuydWe37GDoDCew6TL5ggdhX5kPMHjcKRZkoZgq9wKsGSTGvcsJBbBPHK1J3dt94smdqeJQh2cD2ibg58M8Gzc3WBIuyOqdBjM3zfPZ3XdHd1Ge/qMwhH78r52phICNOOY327ggFAM04XIN8g31KxSJoaGGfWghv0V9gXrll6lKlUVOHmq83tZS8HpPyykZCEW++7M4wAiveYECNQoTYmf2kZToXkS3s3cRnTsZtR+YBfLJtunm+Me3jGlW6OvIupcvkbrDi3al/cT7bKgtSXCcg9ai4nl7nLMoHQVH+OqaddnniDHkNOVxE8v9a4P root@f92c434f-0d0e-11eb-acdd-663f8ab42c5e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDV5Uie2OJe/NyBdSR2RzEUPDlDzg60+aqNQnvq7c2+bGymehochxRMBPoMJmBNByALQsjWCbKecX7wXO7VPi1O2Zk4pA50+EgQlM7o2VHHdqinZCb6RHGGT8MHobrVP9l0927fWaS1ZR1SD1904v01jp7E4n9k+9K7iq7FFBGGN7AwApkqq+AkKAz889spo/qSEciFktkH/WORSRudGENx0rZJgvTkCNrasIykHNHOvE8iy7GGLLUBybEgzXL1MP3B5jxEpxRzTksuBjdqubJdPrvgmCfbf3x7WIUx9du1phcqdsh+jsH6pPQd+hUxkyyt6ScqWZJxMKaUhfLgpUgJ root@7355e91c-17b9-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+JyYflbzK0ier0MbmS0sV+fUnrEOIqwxH7VGj29KvyCYT6W2WJAa8kqjF+gvG6SbNxTKZ2OYhLY3Z7vJagm9pNS4xxwMCTtTpMN3przgbg+AjdiXriwMADNukw1ZL/An4cmuf+KHsFiEt79sLPzBIVEJq5XgrC/8jQRwm4zZyzZ83GRbL8K6jP527MebHwbOzs8im+sMSi7uvE/DsrAyllVbU5m3Hgkf31LhfHZdxba3R9LE+y0Ev9u1I4UzmN2OK/POr5rQuELVGq0MgZn+O8K16X07F3c+BHQrmR3kN3iyvv5t9TnJ+JSTHufC+oOgh+zWiR9VmXUtsH9ahY9PR root@3f5657e0-2180-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC5XB0nIVXiR1yhgCxsYVtlbok2cXXYdwmBj/3GKXsG3gVTDcaIobqqaPGDpMfO3WWDhXDEGUAOQ+pUinUGyVX2t4oFjsNg0dOjgHxCFp9yZfU3vmmbEejSuoxn+tWFz3SA6HgUc9zBP4OfKcbEYv5hTGBFZ+AsFVO/65m/GBdn3YQTeyhHeGGUO+gg7bzMxljBCSoyKccT5CzuHI3ckUK+0F8SFwfa88dD2de7ue0gisMmqDJs7xNwU7gWO4jwo71INaETLbMMvWR7jSDoIZhvrNeSMpOxj449LxNwqUYfMr9+Z6xLjrMiiAhJRSG08Y+yq8nTClMKeFMblBeDN39r root@9fd91e5c-2d27-11eb-a59c-42dfb897bae6\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCyuZG4P4KVzCaM7eVBTYsOd0qn7EznthuyOQAzIUnIaaRrLzzsqY8ZS/NyJu4tJgkKkzciBi3kKf+Fj56wRUwnLlxfyDQ/k1YsjFJz9p946fXuT6qJ1tgJTv4oFBrdJvCyrj3YSS03XrJ+4WLlNpqmphBqCxn2we5498RlHHl8n0UJJwbsKiw21f3+3jItb5cyV1AOAU7ZLnMFD/7es1GT5X/sKkfPSgzysA1+Lqn8qlu892gRGdCzuNPEp8mcsfRBK9eVz9fo3Q3k4VCQfrZAqOk/cYEBieY5y9sbOdPPk99u13KdeSpnI8/lGuWdM9ItRSzAAQ/1OmQWTeRWmUL/ root@7b0d1d8c-394d-11eb-8630-522871d052a8" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T10:59:18.122-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "119968166209-compute@developer.gserviceaccount.com", + "id": "5881076683110102042", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-107", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-107", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-107/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-107/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-107/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-108/description.json b/audit/projects/k8s-infra-e2e-boskos-108/description.json new file mode 100644 index 00000000000..c7e9f8c23ad --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-108/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T18:01:23.091Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-108", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-108", + "projectNumber": "333406438630" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-108/iam.json b/audit/projects/k8s-infra-e2e-boskos-108/iam.json new file mode 100644 index 00000000000..d7d356af5c8 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-108/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-333406438630@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:333406438630-compute@developer.gserviceaccount.com", + "serviceAccount:333406438630@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-108/service-accounts/333406438630-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-108/service-accounts/333406438630-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..15a86b4347b --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-108/service-accounts/333406438630-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "333406438630-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-108/serviceAccounts/333406438630-compute@developer.gserviceaccount.com", + "oauth2ClientId": "100075785528758391238", + "projectId": "k8s-infra-e2e-boskos-108", + "uniqueId": "100075785528758391238" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-108/service-accounts/333406438630-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-108/service-accounts/333406438630-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-108/service-accounts/333406438630-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-108/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-108/services/compute/project-info.json new file mode 100644 index 00000000000..54cfdb3fbf4 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-108/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9Xa4M2FN3T9W1nsUo65uf6OPDo6CZqj7JW41baOpXAlAZb24RA4IYDQXbfQsqh/nI63u0AuoftTQxyGg5/3hLX4gDtj9qi9f4F+8fgjVy0rppqsubF8siM7KpgG/sbNQUw89ZM4Tx6aPNK6XCZWXnTcb4JuDivqMwmdYSgfj+GRbu6xGhlp0ioQ0A0huaL3EjeOOAWNT0Wa7DWlAw6QGqlDs7TVtZlt0nXPWEW+JU1+atx4fmvBV6d0eeDP830PlLzH837hTX660ap+wM5axOcPdkdzL/HoTO5FFl0e4dgk+K5eGw+nUHHqO6Hl1hKmxoKTaJg0GAZFh/aQCs2h9p root@5cce6f63-ddb7-11ea-8a0c-be937dd98cfb\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDTEGPY8kGj/7m9BidJKE6p+NSmJvgfzAb9mNXU6TeYaJYBGzZlYXuTW080ddlbZI2LjfLqGvlCYeatfzQIlwFmcZZory6HQVPwp1chYlyuQwZzwZvA/L5WSuFp5VJANKY2OImzHycMRVMTJfNq4NrS3hxFpDr95N9rBS8YJrPeEr5de8NTe5yldoYXNvnzlO/wKXdTdKVa8FJAUTxYUc1CslO7fT5vvY3dt+GI8RktSA7Yw6zYjpF0Qp5lSkS7iNYgaMphhCwtVDqyGG8ET9OD/BMJUgxEggV4x8OdXlMZ9bEKm/H6DmkzPTe4rT1CR59jUS7YUVAYkPH6jT5JBzZt root@a5a0e2ce-ed74-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+aaVMUfdiUqFORXmXd6eSMfUTMPGKOR39sUj1VwsHlrcbTngVFxBjJx3kC8gSnszKSPoWNZeqTyHGB/iBf4T9UVnQbVNza/FkPfVA4/ahSzCBo0VwwOPLRbvd40xOhAzWTlpMXRPNN6cF7w884bbqjTVHx8PY4FnDG7pP6qQJrBG6a3gkOF7PrMY+maQloUqfCwj6Ct0A2+UxcE4V9plfaoaHR17p3l0CuwrS3YFP4d0quDrGi/mHU2m6bwLj6Ph8pCJngHWpa4eR4soQoqSJnqSut/zQ7i/bdI1VbXbMQU8C1rFYb1RiN6k7DGIyngCBbnC+0rGp5KUjprIsczPz root@9b59d68b-0e57-11eb-b727-faf44c880cc9\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDAbKc2yFh13NUdl89yrczqa+KvzbTgG5OM0ycb7OohRx113Ixf5i+IXHJ5buOvBWLyrLbVkuJ5r8Z14b+LDMnSR8yfG776w8n1X+JHeZ7L4LkgdSaJ3cGpVxdFTL33YaZIlyrRWs/UQcoEj77yMfrPqo1tGmvQlrucqpSIWQ+SANaTljJuyvKmXH3fpuvgbOjjxQUon6FvtfBGTPYMy2/sv93Kl1Lx8MGde30iBRr3XTDdwdmXVdtXe+86IBfmnCnfI6K3vLvSA/RVHhZ3QKfHUaFCGnGe3Y1y9WXoqGwBGfijMJIfXfI/Rtl3lo/FwZseRczy1us2Hj5X4wOw7KE1 root@5df71056-39fe-11eb-be51-2af5b2470e9b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSQu6+zFvfuoWWmDI00xPPICM0jproIQOPLvo9m6TV5TMS/PJAc29ruVXQaWX4GgwIm1IFd8DFkckCyISQGUV2gd38rlT4wFVxq1o/54F+Voz5oqq0Jx1wWZLvaRUZ7ewXqLhy9cA6H7a9DrVU5MxsMlF3l9MmOm7vEnQa8MakVYyapqdSQ3Z0lT/HVRRg4G34qCvWbQxKJHiy+i1kIlUSQgETiBLtNQ8XXhudmqOiAJt+0g+9IsF7/04ZvcdmcoMzXAltcWxmZeuTuGFVBFLuPK/5aJ7MxliC71E4HK2jRqei3EDXXlI/u6siSOjuuxVRsR3kaDOgt7fp08rX6Zgp root@4235db98-3e24-11eb-a772-a610f2f25584\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZ7GQbTTp8zldkxwryxSC/7Yyf0Kp0KShnCKzw+GJtk+uNxxg6OLv5m5Xxf48jLIr2vfn3cMPI262Cy5XBOAYayYUjKr1AUb3psTPvUm3q384vdHNE9+YJy07ciypCigCbpeK/z4W9EIoFbAJbi8uj4Ir4H9OsDel1BMz/mWUqg2Py7hwm8WmW3tALuV3r03BQWTzm/5t0yeds7lllBW4wwPI5BQ5LLw3mOflGOPMEgBXqginNHhR7YFWj+lTLGJgBJ8Vc9fWikbsZ5dxbOHK/YVuiLpzkFRwDTS12V82bO9hcpKAPPZuz1zShPnEH0X5x+B/eXxtbqWjVGLtKRcUV root@d96e6a24-4559-11eb-acd8-6a2a49dd8a76" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T11:01:33.817-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "333406438630-compute@developer.gserviceaccount.com", + "id": "4222755897062733202", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-108", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-108", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-108/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-108/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-108/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-109/description.json b/audit/projects/k8s-infra-e2e-boskos-109/description.json new file mode 100644 index 00000000000..40d7116e991 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-109/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T18:03:38.047Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-109", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-109", + "projectNumber": "326288608062" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-109/iam.json b/audit/projects/k8s-infra-e2e-boskos-109/iam.json new file mode 100644 index 00000000000..a8c82ac4bb9 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-109/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-326288608062@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:326288608062-compute@developer.gserviceaccount.com", + "serviceAccount:326288608062@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-109/service-accounts/326288608062-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-109/service-accounts/326288608062-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..67b1bde62f3 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-109/service-accounts/326288608062-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "326288608062-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-109/serviceAccounts/326288608062-compute@developer.gserviceaccount.com", + "oauth2ClientId": "106375830807226702471", + "projectId": "k8s-infra-e2e-boskos-109", + "uniqueId": "106375830807226702471" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-109/service-accounts/326288608062-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-109/service-accounts/326288608062-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-109/service-accounts/326288608062-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-109/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-109/services/compute/project-info.json new file mode 100644 index 00000000000..927ea035faf --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-109/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDYYXyvEgkn+ySTEU/+sAMF/uEFf1/32xiMigt/g9UAH6YnNPZL6Ihos3SjxSvGpey6RqBFdB0BRbHkjoc3O0ySesE9c1GwwySF0vlJZc/UQ0RySZCwQhc7pHlO5cVVLVa6QlCoEm5U8FWgYT0DIOGhcdSijiQfMSfxpT9jEc/g3rSm6bUZmrJAs2p60KDwJ2wXRK1F8N/BFi4eCBk5oH1IX44/i09rlYssZykOJhVudquZxDVipuOvO706NX+ZbkAeXSCRC+4Sd41c/mG+3eBm4zzCQf4k9FJzMKrwDZox8I5PQIaPjM2JKWHvEnfa5YI7aZi30bvNjCZSE7q7zjXF root@aee0247e-e0d0-11ea-8c67-968ff53f47c5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCYUSpu/N3WE2zKFMYKQR2wRh2/bZuik1sr52sWL980/cnDoiqaFN0ZRtd5pKT36Jzgh7XxGuTkdbR5T8tQPxC64Zhj3MsPvXPPl729PMWXepQcDn3uXWQwL/ObprZxZ7IO6HWDGf7gatjioNwyAuMs/mUATAzdrg+/Hr/tkUaebZt6pNSKelaLORdvWv8flPOsp78MGNoLCVzZRi3bWxDlMxcibf2EBtoJdtP68bHArF8fX2GN6e1zPilCqdOUsv0BbRtVgoVEaBBqFO/6BsxPy10Wi7amY+Rk1AVYgzh0X3toVlL663rjtbKsN7rhWUXafqQ1Y3c2n5wPH28vOt6j root@5c6b8812-ee0c-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCrLq//prSromUL+PnCpLuG4rGHyV0c3IL8Nz+nVsNX4gPzNN4DdFHRrt0IcD22anKh/JI5NwS86LmbtmiiT9/I+4F83HfUqiXOldWD4tiiNiy6fpCpXlP02LgtynuqIFB0zPcm+vF0KWKJagcJKtLU7xqz4wpo4QfOL3yMRHdDnieUTR85A+IUYcprPkg9O7NWSPCPP+40ioCjLGE1a+7C6L1CvCyCGhAu3tRCHUnSgvwhr+eVCcNykbtD097fNktjLgS03gO4PffkvMc/l19QMNs0YFVSYiEham/eduQGbJOaaUPFH8/EBnoyJww00nNtRob1q0mVOdTqdeipZKvT root@27ce3c2d-f4f4-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC4zS9YWmRzgnZxgm/pf250CJHT84+sTYTP4fxeHUWKutJJeqXE/qhAZGqf83nSb+HxEfhcKtVjz8j7J1WgAa9/UKtwL0rjPGmswr4bvrlVr7aBtdohkRVRD9eW5H/PloMxQneFd+gwS2tpGelRr68d7sCGykuSKdWTFcn7v3KTZ6skv8L0ArBSu7ME66hlEP6SxcJeB/ELsd5JTm+3D/IhYOz+x3jMyGeU9uTOKMAVxrPopfVNiwLzrIaAmvMOCDjZxmjzAPhcJPEL2kY0dWQtftYBRpCCGdh+m/91sSSfL/UPZUzKJc06ogaq6ordU4FrHO9gDD32bd3szL6Ssv0b root@a6f08057-0005-11eb-b4e0-eacb7c15c8a0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCwZ3lP9MbKl5lgaFBFFyU0mKQHEG2AUZTZhtaQLrDbyrO+CuPMsLuUzzJghJ1Fl4STNe0qZMbTGW2M6msMbRVJIeVzAlPO/X/6q4M5Wr32PijXAuKvOlePdK95mhiSKpxvJhNYztC82vqiBfWFneSCCK6E1HeDL0GAjVFmwOu0b6YxXL9ySFs8jxh8/K0LRDCN1mP8JzgUMc/D/5Xk3fDpCEp8mcnMagPrdraEE4cx4K+T5iIqmoDwhFhQZ4q5nmTZ2zUBFFwmrzd9i1i1yZPHpKf4UpSvcyTmUn0cdySPdWkrDy5JmrixnlHtZs3/X1ofREor83Gd49eVU7p/CzMB root@1424fb0e-0084-11eb-b4e0-eacb7c15c8a0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDbcxuDkj5mIe0GBzeKFP2R5PlCfhdSVuN9dh6fpInOxdYhRsNnUPzCsZR1Nj78Gkmmd5hVUz/L0dn2syUlyKmJpVmxPrmnpS/XOJ/NyxAFKmEEEPeSU0ut+bsdLvjJW0ZyzT8xdwDS+HESNYExDM1RGJeIsyQLC2pmHlYDWZ8zBo9hck5pm5LV0HrSphRxeGwVjKy2nvArBhADvQISQLkF8sRTbDvztNFhHG+ev69utruZ0ZFyVGJhlIXAwKPd+E9h4aRmiJukZVXVLfT7cQVLzsQ6RfJBmtjLaQC+kiVkIrOb/K0irbdzORbdSvXg95KyQk3ZMqRNRpI9S6C8gTab root@c610dd17-0ae2-11eb-82af-de22b9665164\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSvLO06s3DjklKHliYFuZhP1uYuHglncjcQ7fTQ4Py2/E/PHH7zGV8m43KIoBmprE9Fz7HUnOjtWDgLsgb5abAbo65USoImgTv6zUWskP8Km5cFc1C5qzEGKIcQ/a2ifXvN6zwszTjEkPboHbQAcuViZPk9u5kyDYdLIJuKfqknhOYh8dVVlbF91o2P3su7JdWziOwwDOVUtD7+H8byTgmcbMi6YKyNYygM1dkJ7oHhf6n2u3s7UzYtwLG5MXosHBjDCKPALK8L9I4c8xYGOXaiWfK7BBSmHtqWVefXC7FETPMWvSLnE2E+OI1b467qAsD3UXj7pqdHhVX9e1aFY6N root@4f1b7213-16a3-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC6siKJuOXlgUOR865TcJJhw8hEO9ieZMUOxflJ693tACh2CnYHJI2mKxPVjo6u+vGDgPU2hzkrOFAAVUxIFPOKOx3CcuRXrJEEElbi7obrG7VdzyayszO5Wi59optXWusgr9Bphcc/2OedwbPpPN84XOzP50Nt9YbxVDplS3UQqfpWNrDbeIS26oYnxksdwtTNPCo4o5p3bQlFAPEB7SfRgUh338PRSiaDECqkshjXoC6hT9ZuxsjKePLm/DdG0ApV+Lxt6s4LL3oBm7671Ual7wEwz6PtplhFdnKELIlueK55xQxwP8psaCY4Dp96KqBR3VBRiotpBXUWZ/L9c9xx root@b20c47c6-29b2-11eb-a35d-7a1d48297fba\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDc1gR2J6Gotla7WZ/mhfrfc0HWVjnWo/wugH4dxGIV0TAFR4b4EdqgM/EyaubzauILpfSEg7Zcq3hQF3d/+RNFYR+/QbVhzwlKk5DT7zYY11PcH4KLAlytPXyRqNso7f8cGWTH1eV4ya1jaCmJAMbPPnp/KOnC+NmKQzxY11kBUQeB62UB/d+hKQmI/J4pPKEFLCI6pBFKtMDCVlv8DAd9rh0+m9J4i58RM9P3Jhe/4yKSzjIo4L5jThCzFm4oblQRe6x7FhRQ6RrnwJRIIA7QtTgBswHH+xk8jh4JWm6dBFoU8sGVU407dUzDbCuJxx3sp6L5R4HZpjV8wlHGlPOb root@0ed8df4c-2c44-11eb-a59c-42dfb897bae6\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCwKZz2Maa0DVPZdNemFTmSWuYt/ocXoTCyTarj3ElAF4bZiV8FgTfaKcrXlNYgvJqYqb6/3NRIZtvoSfGIzBE5ul/6MeaONFGRXzP4WSTyBSFV96FUxGzSV8Lvm6h+Bj2YftlCe0TzoWUhQl58l+WOEymv7FDZmCKxB1xgnpC1lSVFjzgE75yofCWryHIafaHWToDtbiIV1RpVdGJNiXit2cSYVDFF6nPKBJDPSwQaWJmxLg8njT3oOeuMrRaxtzi8TP7MIMldIVaodRQWv6xw+fUoqVOjodYxJ3vM+pBdV0ajUfD3sCchN+6x9nH4iGCRFLEHD4VOGNtMlLL5iaN/ root@fcb56dfe-2f07-11eb-9b0b-d6a9455c8be7\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC6XWc3ZHz24qlwFOAAKYieQtl6jM5YGx+c9whjv5CYSS0lBYGpSh9Ts3FR4JV1u5e9p+dyqs12gfyKGYx7ZRuuW9j6l3963VdXky1AxSOplqog2EbHOo2jpIEiY2cnRbGGG9nuhoPPZO4jLoau+9I9mN+gvXXk1hjEPdSoKS4fdzJOynI0Xo+TTgDlSqWQo7v+RvBZKMaN/rhMU+h9bNacb+EOVEL/PrpZfRmzwulOEDy2oBZLHBWVir5CY+RurfTFsro6rFRdFP0aLi4INaWPR37qLbxNKDTC+E59k/f/ozrjo/iuUEA92m2OyZ+8nE3UX6NyC/eQ5lQJyAn1Mxm1 root@5be9bc07-32fb-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC3GufzQZU7xOrRNBUGb5TfuC4sAthjs84LzLXDIHT+gqRjTC/4rwGYULfLyXs8l2brIOi2ckY51tm0gJK6dj9Qb81AfiDKze5MdFg3GxWNyi5pJqIR3N0aYdzP3UttWfrtIRkPI2kPe7SPdYOQ0OUeSF65xIVUDJZM7ySwECZ6RMNJWgaRRWXZ4ULtRD06rGR7GBjpPPJenxJk+38S3ygUHirIFIQukXIhjAotdrs3a3ijTO1Mj2UjnbUeNXskl3LTxZuiIP7Eq+bPuhN4tiTEke2ITNRhOXR/6NMpcCC+IAsx3WZLa1lKSJB9UzOmmVOLWmQnqpdQDLuEAxFNJpY1 root@9f6bb7f8-3901-11eb-8630-522871d052a8\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDAINC8FPzH/N4NQ6OuhKqsO0NJoqbcjTdfHv8nxMqMA3OVYxVDMBK22d9LDw8KgAF+1+ne/XCiHC1bJiSQYJPwRCwsBz4GtkXKuooVUsB3v2B0sVEOAAvKxha3dfTrYqoWHote3gWblANEEseonehe9yg4o5zx6cIVEega/l4s5dSeNP08j/KG/1hTxQ10jTRS6VHrbAaj5JD5MC06tSqAm3xeQqCfxY1TpeWqIhmbREz81V6OH1wndyvJgh/f5qwzXdv878KeBfH3gwvbjss0POu8q2TLd2B0ba9nOL//rzov27Z+l7+xKE3MM7J5ffV2vpLo+HNu8L5NU+AlaemD root@82aed515-39b2-11eb-be51-2af5b2470e9b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC1kyr590VDy174y5lv3wR3kzAyWxyAEhypxGXcpjGHGWFvAsMNIRTI6CZcK/OfM1hvRgAdrZn0JcTopksdkWmvKDwkaYMhyttsWJttXvCjzuLwXZZicFlH7rFAUdgokfMxAXlnGbd4BKSqRsq3ggWMGnElD0PN2Yi1hZ9x0AbN6ujG8/yA97EPHmhe606zHlaiBoArAJCF8ERqMp/3pqdRVgFNdTGYH4aK9ULivbPC3GL5vnPF0wUlOjEEg1X0OtdzQZQuEMc6jocDAf4KhJ5WJfCcm6mNpX7ZXapEA9hsqg2Lvos1MbTcOsiKA/BDsvPPy2FcXFqxQO8qO6fkZ2Yf root@13ffddd8-4e70-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDR+Ju2F1f2u0d7NPkApWAHGT1HC/CFIkoDLIfp7sWU7iwM2piIj1+yxmHp6mk33iqo5GyBRrT/lys0DzMYOKe3G2+dtrl7XNIUryKzVnzXP4NI2IKXtDNO/1+0UbC1bkaHDhQbR1T58ueeLX0nKkNDx01WGXiHlIP1zTogD8s3GQyO2cKbmLb3Wbuj7mEYp62U/9Epd58w+MPs0MJyVX5egvVZakHPPKt5kSWQ75k2zRH/u9sER2A7ITge2qv2jqa4s+jOyUM/seuqjXWHXeAQeNxGXJoH99z2uQn6ZTTfC9AtT94x9UOzoWFVcK9Y1nrSUzAiXMVDs0L4H97Ta1c/ root@997de036-50b3-11eb-bf1b-5279f1a59a83" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T11:03:48.244-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "326288608062-compute@developer.gserviceaccount.com", + "id": "3196246734654943980", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-109", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-109", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-109/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-109/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-109/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-110/description.json b/audit/projects/k8s-infra-e2e-boskos-110/description.json new file mode 100644 index 00000000000..dbde1da3107 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-110/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T18:05:50.633Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-110", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-110", + "projectNumber": "117315809279" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-110/iam.json b/audit/projects/k8s-infra-e2e-boskos-110/iam.json new file mode 100644 index 00000000000..5ef8328f686 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-110/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-117315809279@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:117315809279-compute@developer.gserviceaccount.com", + "serviceAccount:117315809279@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-110/service-accounts/117315809279-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-110/service-accounts/117315809279-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..5bd1aa62511 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-110/service-accounts/117315809279-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "117315809279-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-110/serviceAccounts/117315809279-compute@developer.gserviceaccount.com", + "oauth2ClientId": "106446084968570029378", + "projectId": "k8s-infra-e2e-boskos-110", + "uniqueId": "106446084968570029378" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-110/service-accounts/117315809279-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-110/service-accounts/117315809279-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-110/service-accounts/117315809279-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-110/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-110/services/compute/project-info.json new file mode 100644 index 00000000000..017bf729151 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-110/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDLx6lAFussdWsFr0tJ7DIFj1vKppgZ9X/Q2aOkHzbb34sgBl32K1nsiivlgi1YziggH8IDDcfWVxkjR577qm3PFM8+gPE/t45wAYRw8BZCvhFY7LycnI/99z/q1PDY2q2U2mRqpRQakZ6zAb+lEXmucaNLGdwCbvR6sqCgHMBq6CyWk8VDOM8d9v5cexAqxzEODxTosxVZbfSGcqZdQrGBC2Z8uzrV6dVfLzqhrv4qk+iwUyXEnL3Qz66HPmoN7GdvPJEnAcjRuZVpVHit+9JimwmuGrE2cJIWX3Ma4ZD9PBZxcetKdoTQ0pgaGSMWC5DLW6QHpMJ0wqi8sSohen5d root@7307fb60-e658-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSy3gxXCZaaL3WU2ON52FFGFCcOx9KVzVv+UXJ/0MAVEwiy9zqShuKQNejWxbuc1g5dEO7IQG9804QP8QkE+WUhaxEusFEWY2Vv+MoM4JBSA6mcu2xVB19yMNzLgil/IC8DpncHPXYMj1PFJGTAnQvs9Te3qLlhNsf1d9y1KvBqDT2z151aFNHf6SRx8Wup0WsYtEbrH0jkScd8+p12cQw8AHKvWTUV9dCNmXnMSgLj1D0KnhGgA8G9Wo4+ulalFRi/R/ooc1HtZJysPtAH5Yki2rQGthtW7+X7CDxito8xuTjhqAFpEv4SijSuBmmA1OsFT7ttNsyP5IZAQeeLXdf root@feb42d7b-f0df-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDHqSX6VVuFouZ6ulxDsj0I6zRlI/HloeEhsBzHu8UWEUA2bHoXpySJ6VL5e1P4C085nFj5q3BYplqjaNAgHXdn5/GKuEimUT4uLvPk4N0uj8ZUR5el6Bj5BDg3D0bBuQ+u+hK5SFCEYhFS09e1MsobkrPaeKWlBBdqjDFp7ft2fVm+8//bcIV6w5xhrm01RtCeuPuBAQWDJlK1RKv2xe7zV8ox9Or3gOqgHcOg7lTYEcd+zxnDuIwM2luuuQqUxdx8wc/CzZzn+toDHSD5vrinABk+65UhlYX8f3H7JqnfJ8q9KGPqf+06IjQDjCp9Mg4FSr3yAy9v0Miq5w6adCh9 root@9db43350-fbc6-11ea-9c73-86173d37727b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQClrFT8f13Ivkexy/KJjoB9mLa2kv3Ka0CPq23z5rRpHMDancOR/czP0HVuZAOBBH9m1Z0sHXQ1g342rWrtrS9H5fhnzTsb5PGGmL6Q5B4/E2Ha9qwKnfC4G9QLxFn6Zg920F+n1gDl2Qx5W4fq8k/Qb+Wp1kTySXhfR5cxChaxS00rwe375K38uklcDMSX7/V0wak6NXx3sPIYEk6RVsLQtVlhzgMXVSc7ESRq+mx4+SCwtvt036h3UdRdLYMODAfwqJXrrwUFwIdI/Tj5smafXh0XDK8e4IWmw5Hm953m88XstTpojCbkFgGKO1qvRv4zirkOFaVVrIvMSE/q33cd root@5f6ba1f4-01ff-11eb-8b6a-ce996ee2646d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD8c2+0Zy/5aPF8XmMb6u8NR0sZ3wTvPqraOAbtWtS4OkFKX1K+OfINjLAXMpw1EMYOGUkMQ4btkWGpTpFMcZtcWB6Ewx4ZVKiyAN8t+wTDiYeoWfGQx/7WtmkZAo0HqWZCAJPk5NJ+TdVmc6RbA/Q/R6OEWeymFY2J+MOwgpa7h4D4dSQaib8vEZTfdFBioNpUY94iEzb1uVVBq4edLMDG1I9z16HYrXK/fOcixyXlsND17q3AOsGAsMBaw5aMxAgHf1Z4L9nVoExFhGraqhEutWdDMCUkoXYQl9nFQH7HIQa4YYDEH3Zy+WFT41J0U51QcjtdPcM5LdLvK5qml4dr root@6230d5cd-0528-11eb-9dc4-ba187aea6a9a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC74qhzMRmhOSwIWe7vQ1+3cpywzH4rEXoDmrQxHbIf+VLUGeRCboog7HbF33fO3s4E+/Js1h8/oQnQad+lOgNa8QZuPFk05+7i4alcL9yck1FgAVezl+t0/eXPWBaKdrKWCS0FKS1O/NJFoSnNG5CedryYzeLHTJSSYcOd8g02QebhoHA6FOCRwBJBXkQkuW7ecv4cR5NEDvZb1+0aLO3edE6woFR5kB19x1algupH20Y8ljoUQSzc8MsmPqgLKh3MIX+XS/Tes8iQcltZRKBZlo1cAhxAVqYRlsj+95wV6CfjTd+/Ik4hG2Duxyf5azDobo27t7KP8YK+Bct78aP7 root@22ec6b45-1df2-11eb-8e42-66e2cea7f923\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCsIqbVcuVZHWXcScuO8UA5/EfU4taPI1fNOxLJ0aLL+g/i9o9Zcc0fIPuwfDaDS3MZdhrtB96wYLvSLfNy7A3KeBrCkzpFYMBEGilcB4GoU9/uuwglQ+HOv0bLAc7mK6sH8OXngd2zOd0XmkCfEFC/me8ahsNoti+9w5jsmZwOWiz2Q0nT7SPvieY2qX+JtExJIcpEg8VEMOMn0R8Ch8yg6RoVV6dK8wVDxq/CcLRZ9T2/2Yl+lynQhNAE3OW313sM7dF7HpuuuVFQWo6ne/nxLk+3YiE8Njyvrg79ugUlSU5TC+8BQmoQcTqkfOoGBfRfQ+sk+HLncw+sLh8VNjxZ root@b1f51b24-1f3a-11eb-a4fe-eec30b56844c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDNCu6pP0t4oz8TwYh0p9Res26iRZob4Tu64nz3j/sd4FJ7d1NUff7wllOPg7au6MFQ1/ouetd7Y8r+W8PWlZxQ6mqsvakruAHDlRThuWnVv5IxJGZ1P+1wllnQhqkBjvHaOUeDx5KPGR+mgPC/aZb5QE9XWLDoJ2HIi3YBE5gPF7jFDS1qSBFxVruHhsndWFIwwiLxM7myvR+LHOMmMoMytVuyaUXijOwyBpvdep3HM7oZ36Vaov89uUavCZU2+uqQLju04bSfXIbE4SJB1QvdKnJ0R8waynjSnAd51siYm/05y85VDP0bo0biEaIYTFeS/JjYEhsa+pZO+5ks0cFl root@4ad6a808-201e-11eb-bb76-36aba4894793\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDYy4FncRD+lTwN9JcVDdCZUIBH5XKKUmuXNzmVmv/X9FrOPN39o7VQn9XM8g+dGlMYx22O5CsfLNXY98DayYGS22z71QyoKKRLSaUb+P4/+5z3k6nEN1oFPIqLmkxPfivB0RQwJIRSZo2RmlqNIv1pTTTWURkyVDmDyo5mgBb6hltHzHGpIituhB1KvVgefqdLbgvjnCQXm/y2+a3G074F4CHamjluOq28djPNYLn61s5S8y3nHautfakl34ZzZjPzQCA8PvtsnljQaD1pT8yutfc9PrVi8b/7Tx+8pIKQwTzFR3UFaWGPj6k/pjDtz9o1Qm8Rc4XyD8CCggBh7vi3 root@f6645a1c-2166-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDcOAWJ9wT6L4pzyxRBpyWUNJhtMoIk530QzEL4zFeAEL30cyq4cC/kNFY8ogmGtnHyXpML/AVvR1ArtZqcHyl2MlcJ9WXIPyuaWKy2tW1dWs9kvQyBjSZSHH058SzscCsXe2AgMhatCRmC9OTW2pqHAi7ePsSFRcvXgfr5Z7+gXUVBLT1tSVJQSvYOyKu5Cx751OQ5O02EcSqznt3z8gWEha/Exe9Buu3QfKPMG/1y5L8fclvYYHgwVzxHxIzF1GNQpQTkqLKcy+dktIcxJZxZ3Hib6rcAOq9XzcdK394SuhqEtIVg/OcHBgXOUR3AQ3LAUWgSDHcZAN7pKtH/ldlB root@0e15fdf6-2cf5-11eb-a59c-42dfb897bae6\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCi8FMxxYX0AFBrlTQvwQLAKEXyBPqLR5L0pyXh6KjaZ28nlBTqNYGwfJa4ZHR38iIifiplN4LMsUqb1ojN+QKK2JRBMaFTHZy/ydoyEXNmaOczK15OxMTJjek1X5MNq7xO/nQx5YU920OeCTPgVvIMiqVO5TYBN4y0mo4wi9blWIJATDVnu0QZv0ddPhJFl52WduC3HFuwcnllFB0MR2HdWhqs4+7rczPyaNst9qGKnV+ifUZEYNBgb+aahYI7IIFIOgs6EH63AAWtZEmMwP2NYPsP5QHIjcHLhR9Y54mraeU3CVtPqTI4qbB8k56XHGDabzDjRho9FSJQ6Sxq9/pv root@72facef8-3573-11eb-9896-aabf0c108015\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC5zHGaA7DIgM46igg5NGkSI9lhtZBNrpql3hUr3/w3tVJX4eb6BS5e3wz3Cp9RQAzYG+CdBAIEDN5OEqPjZRHxkXrsryfWRYhimcC/jSXUaq9Unob9NoY/9k/MWd8khu7I18++ZyvkbnP7Jw5Kw0F8+O4zVW0PHK6j+yXuyLNE50/6XCu0r6lOTUrDXyv9t0pQdeIyZeuAK2d7fu078F1F8rNyte4zI5oyKShbcfxpu7o8k2uTg+AzoJZrZBBJXj/bLAA2WSDW/ltr88xeBfTCGVaYH0JdZlaNOlLa3gdeNq9/d+PnZ30MXpBlT1JbfRPj4apPbNOqnUhev2ZLXOBx root@6008cad5-3837-11eb-a25d-22a534811c55\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDGopK/imRrfrO0kolZj/R2I7NWCampsItAMd2FKuDS4NOy1vO9UpwiNBEgVc+SOEwmm9mnmK8ZG/7CBrZI49hsK7so1a35P2UJKTr+UlXpwIUbQPmgeL/s5EAosec9xHN+in7JFhkS54oQRDoK3X9Whz99OJQwcACac6tZ6FbLboTrLgwF3yw4ix2/a1npURSJhZbjKKYQ8es0riwpkHTiTrY+FuPOyWo5YZTm6hg17FZpz6QGcUaDoZGBuaoUeckWGr2XeUYX63IWNbUUK9ywxpOFbLowlR1di1GWHyLhlh0ahpo793fuIZ+jJue1ExrH0ApZIrsKR+kKfONe//UP root@2114c9d1-4624-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDPTa5mXQpHvftC0j1D+kEXghcTjl8PfODaj6x6dAEJm+NA0R4AOsRHBhhkwYTKs23GWcvZhMB0LnwyAHDkwqLTpQW//Jw/iEmgPD/tZFqMgDia0nkZPXZhiR3secPfirb5BqKe083jsxmvV08uUUhxBacYBPFBGrZN7c3r18SbmTuMcZio3o6gdO57LZr1m8WfqmgdO3GPuYoaWFQIZjtYnShG397sZzH4qsdthWz4Q5XsG7UmFbw1724VzuO0b/jQViNFUrg2v5VaiqEpPLyb6goPiv2hW9bDeB3RQjysMnAzLn0F1aK5mP4R2nFSmoTD1L88ADb9OQ+T+WjcvuH9 root@cc4b6402-4c43-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCpY/T7nbg9yWj1vA/Gl0aIdXAxcPg8mopABx2bLhb6f20H5ll8qj4ROtQhuXxCK7FxrqyM5JE1JqEAb185u9/UmdQ09y2YxAQwCgQRGibs1nrR7f8oNBHI2YwNlpawfGy7dfDXuE5XT7giaqx4yXi3yz5cN4mi98I95Y4S/FewyEGJdt4oEboBSbj5nbPMmfl8H9y98mLVeRPrruL/MctyuLBTAt9H8SBHlIBp4735HgpUv4xVfOdA5XAPVG0WrGJhHirx4b4xNki8SGE2m+YOfXAy3EZ6UndaxSPpAKEgmWPi2ZqxbLHqkj7rcKUjpwDEtQwyvw84ayLzAu3CGBEb root@39b7b8d0-4d73-11eb-af93-4e5abfa0c065" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T11:06:00.937-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "117315809279-compute@developer.gserviceaccount.com", + "id": "5864911590144094823", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-110", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-110", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-110/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-110/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-110/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-111/description.json b/audit/projects/k8s-infra-e2e-boskos-111/description.json new file mode 100644 index 00000000000..8f430b7d136 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-111/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T18:07:30.915Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-111", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-111", + "projectNumber": "585851919485" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-111/iam.json b/audit/projects/k8s-infra-e2e-boskos-111/iam.json new file mode 100644 index 00000000000..111aff7b23c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-111/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-585851919485@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:585851919485-compute@developer.gserviceaccount.com", + "serviceAccount:585851919485@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-111/service-accounts/585851919485-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-111/service-accounts/585851919485-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..776a9d62221 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-111/service-accounts/585851919485-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "585851919485-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-111/serviceAccounts/585851919485-compute@developer.gserviceaccount.com", + "oauth2ClientId": "115609119824655636323", + "projectId": "k8s-infra-e2e-boskos-111", + "uniqueId": "115609119824655636323" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-111/service-accounts/585851919485-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-111/service-accounts/585851919485-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-111/service-accounts/585851919485-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-111/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-111/services/compute/project-info.json new file mode 100644 index 00000000000..24e547ba9a2 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-111/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDly3xXgWGSGhf0TT7KRMxL8tHKVj6WUpeKAOsRe84tT9tN23Ic19f0NXiNddVDerqwUw2E57sKIXcSE/t6VdnoOtm81TKIhQPX6NrjTLo7TTqvZIgKgxhBy7j2aCudk0FcslhKLi85MjMhXayZShE9QcwrEr+WVj0WmcjUMGnHF4SHcn6Gy+OvGudq5p0XhdWqzrHgP3f8+tNqoiL6pCRE6qrJHW1twBqjn7BDQiLNfVfFlQp0SYqAVEQtv1ULeqWDOwtUX5+X6P0VMLzmFpwGNaJTyi1z4poJbM2r4nacrmD3UVDn5oZIL6Rp6l6J7XP781rsfp02+eXeoaobzZsj root@55c1d11f-e052-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7TCyGnsgeV153Pa+KoWPF47KmJNF4kQMhH0xWhLuE/1VlAL8t9Yvv35Q0QRbs5aBn5i6oCZXAe7nkJrRIJRiuPCVTksVE110gC/VuCfRZmVQgqNFm6ylRs7kgSiw8gdIZQPalYTOVjswU63xLxjUTY5K4CL0PdXCj60xGFVkkK0Spbz69OH4B2Euu48+oSQVvdzn/fpp0+GffODW6LtrEn2R+dc4Frw059Yk5p3B3AXREo3QLonljohGQiZrhUuf5cvjUiEZhUbaH7RleZF7oEMTNwWMSIIa00MAUilxekoQvklE5W4XjioMFecN0cXsx1CtOU2J0HznS5c9iYYeR root@cf20cac0-e59d-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCUKTeCuOBOmCS3o00Ph9rKG6tEfaGMw31MZYR6HNGkAOyRv2V5FBJZE2cCli+lpIJrsODDgDjADaYEnCrTWwEBmZYcCDJQWDEWEQBIkkAmWzWNxth4MmfhqUCqwXiK6sSGetMhj9SUPL+c2wSCSGbh87L8a4zaTDohHLVjA6RtD7JDBOwq2cNU+ItD9dIrtDAMVewGAx/w9vjJ9qgpicQzPC3gJAd6Xwo4f4iuBUiK6Cu4ZtXEpYXaP/oNl5+xEZUgeh1/PPWNzonKGZf3f2oo/DV5CfOTRSBzC2gAdhTCnvxBrD+oS26nGCBIgFjRVSSpFtHu6VleDD8weqoDEkV root@f393b8c5-e602-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCWBcapyzd0CSX7ya1ASS1nu8ej4gEjN0BIl6ts1Wio6hcMOLC7yX9M8FTsd/mb4tDXXSyPbtyX2MPpeAuIU72odWeVUz4Z5Z00KOhngu14+ojLPvxb4KMaufuWHVOHVeJMjQTPHAWT5WhpEsIExPRmg/elK1hxMAOiwI3HIa3TzoJMp7BalwJ5CJJ5TBPLQwo8p1zdXDfVkM/6cLobkY2Bsa9iOc00LLormiKVPKdWJFIVMhjZY+HrMP92qWWRQJD19k3pcLJF80lwDcCYbYL02Y8+ScUHhV5nhIIv0MQWaX/0cDplR9iCCw5Qd1FjUwp/vf5Q2UzjmTvWKgDMXVjr root@4a657e39-eee6-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCr37ezzC87hxdN+RbLKBResKvs2I9APhhTih6Zm6Wv1lPqIP2ZfTzevY8MzgHBDy4GA9zk2POqykkqi9Ug/WycLIUKZNc78qoYLxgiOK+wx4IfPmwFyu/0i7ukNR+Vs/5x5RbhcVf64V1ZQ2wyrZdkMltJGC4uERAX2ertjO6KrcMV3i77zOelA4I2FGUSzBO+a/bkpHH5JS0uw2B2oj3E6TZJmdiUngJITdf0i/h0IbL/eybKB5PAKRgMDny8IEPw2PSAmPdR5J+HWDWhOZE9bImwO0iTPXyYnG77DLy+bUGRRyr0sg0bh3s0X1Khb1AF5MCOcwY8leFArnkyykDJ root@356e25c1-f32f-11ea-84bd-b6fb6d83c68d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDP31/jrMbeK6mV6O/ZV4zFec1qtyDHw8oFalDaveIJ6TSAg3oQlthyo1cd8h2J/v5p39QKq0/Uki2djxWnI9+ECzXnLzmdu6G6AWk4NrYC1ehXsImsdst51Z6xhE2D+QH77dkbnADNohIPmHT64ahZ9pqlWvQoRE98BN/Ri5YKHq8rILZJFf3WxIvvmxglcWwVTzZVBjqLCk/BZH5wPeEu8mahGEdfna7uNEzzPO5zf3CoRtDhWlrmBGcEK663Iq7dttaFrHWLzs6oPwqQOhjrabeaWJ2mpTD6B8mVKuSyiVdQF8lCXEnk6E0xrsG4MCQ4Y54imcWu0LS+rVi50kKN root@6feea7f4-f5be-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQxiF87KPiN7Tu+vE3OUA/ZpDUteMvFgNNBh11BFjW71pglw3hNccsKWHzseMrFWwTYbklJV9eHDexMUTNk+hjvKQnsDOkSVCTeCIiVcaD/Lw+0Si0tvsyX7beAn5w4zU02uZ1JbDl+QzwfWpZtqqh6Yb0BuE16UU/FhLOXXGCB+9rdkjuuPzkgbm3J3v5h6oQe3w2HWKILSZof3vbMVCLmBW5HxehKXUr0i4WIaKGJ7uTfWIFxDVIc9TGxfJ0OWwdRIlE0N6q7m7qyGoaNb2x2mYtbPHVC0wCaDqvaQAYpepDWV8wGS6Yj7oOdAHBax0lRxx6AV/zp4wg/88PUexn root@6bd01455-f99a-11ea-926e-7e7ea190b727\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCWWNEReoN2492NtZIFQw9nyd6l30QIAAhmj38+brXz1b6qWJ/mUuq85FoVfv4zeUddpTgq0X6HZZvLPJwgtnIHJQutK8vtfiO6dogNN94hOLdsMzbws/SMcO4khiYWJXfxlbgwO7VjcyJmtnkpQuyi9KDlyH0aWjQ7gvUUqlJw7zsgB5E7iSPmWVpoudWjqODRR4MAdL00io75TRF3kqiHjeHw+2+qDMSAELzH+18VYFz+kiqjLTBX1hmoytmqoVtW0gETzQAoPZYYcPFPWA3QuBGkQD2ywxRS2YmOkF78lKvoYChYLnE5zaqAYszBbqeq7RON7UtbSa9Tqkh4qLIp root@880c8809-0315-11eb-aa74-ba383c228abc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCw1E7HMRffp9NpLlNuPXOT9wh+9ZWHXM31+wK3kSDVueNR5DLW/H3iBB9Ox4YAjVtnAIdtHCBMR5QLsb7ekujH6Lc9BCxWEUb6de0QqpE9v4mULENczIZ/nAxmCyQKFgwuWga0cg+XBbrZ7ZJDVuesuNrTlKBsVHdEBvIU1ESFpiq3pL8dFkwZOEpH4MlODlVoAfNzgMBbBno57lXhktf9PJUU3IofxBycJe3dQWgXEhb4spIS3rttonD6G6GwD4gf4InLXxlXv3n+1V1o/rREe67QYAxN1jqqCcAx4/96wIFx1rS+ZhXEon6QduPGCZhXeUZXsShbDUKcxX0Yzpeh root@47ecb45a-0361-11eb-9ee9-2af320b50223\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDRG2szv3mEF0eNmJ/VQPpa3hkXg2ZtebdcXqx7yeWDo6SN/vgIqOcYQSb1cQnTF+yDFhp/Cmtf5v0Qizw14KjDczLVPC7AjfBZqfaUKa0S5uYefJhPKMfDXCFE8MDBw0Tpg7cG7upXxUniQjoEuTmbuQ6IGGH3ok9i0jBdeu/WaF7JSoSshh8ve7KGKJ3W2b/GjFMGrXX/2EYLlsiXM6Z4TRhu/K82Nmhkkb04QqyrcZmGXAOYow9/9BLM7sCac0G21sS4hRBCarI1zZjRjivZBvusNalXnVejtwSHTT3JoymHW1vVPCRqVPTr8BSZaZ/4nqZLM5k9jWq58FW3B1iB root@524ef5ea-0eef-11eb-b384-ce16c16e5d30\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDoS2K9th7RIA5mg42rdYDmVvx6wSmSEuMfswr0NqYtQdLtFC/HQosGIy2JpfgmEQhJ3FQdNjZJZ3ghuLKm1xR5I5Sa4FtGFnaSDWNy+171CSwtFN+aO5bDwY2YZ2incM7axfNbqg3PtEH7quDI8LDO6l34LI4MS9Brm2NlABIEXBGo3v+QHVlVh/E3N7xNnUD0vfBpH9KNnQCBf5J2g6hEb3yAFdPyjV0IWNCdbuXVYm0XXcLGKdZOq568SZK9O6ZO6UxDtGOlocZ4Y9rHS8VeaHUfJv0IOZPN7RO4nFNMo9h344cpsxYxVoLRFQhMeOa1ug7fm56hTJaF78G5Wpdv root@74169ff6-1657-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDgFT54iQMpVFEX4ldJedI8ueq6RFSoGlixYKQqbbi4ktIhmQ6skzQHEqO+aaMLZUOYUvfgnB8XtgpHrmHHLrd04x6utaZqu24JgNRTL8e2W7HEa2rnWoxepK3MUcFg0Rv/KUwXd8C3y449cqYAUsaLL1tHVKWBOeMZdHfShneyMU18PxBDTDl34L18idqeGiSEwTmSyKB/Uw1kbj8xkQ3CreaxU/n6bIXY3A3+wjYYzqh5ucUWhjUVOCX7gn0y39r4WcJJHV1+JcxcFx2lZQDNQCAPvbjt4mP/Rpt7GWdMJyVoCgu4VsB945Ta1tEJngngM89vI+WIWFfAAKR/gd15 root@68daf6ff-1f21-11eb-a4fe-eec30b56844c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCR9VBWyY+QEJ3IBH2Bk5xgXwrjJ182qgZG/TQauVO9+kgVvybiEGsk4Nisz1qdxuvZBp7GOmAU1XquEj64TSyHiQveen8/GnPZBT4KcHuQ9mhURF0eohOkPM95WxeAFuodCunAbxVh697+LEpVT18E8ytyfvKH38bK+HgRHTAvOTkEBBhbimGvoH00AsH8Xdl/PrO8dBNrD5r/2CtuBSUc7etZfqyCfGw2OP5mx3UD2FLDVdThesu+zZrVp3NPsI3xaiaki82ZYGcO/JXXyu7/HqKiH7RsF1d1hZVUmkYgVbi6uFlQwxCdlEh1EfKpkUIAKn9v72V2/jF1Ik6/htQv root@cd223c3d-4ae1-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSO8v8yKqxaX3+woOHsvUj3uVCI+1VqvbtOH6I4f6+EU1dvnPPJapHjA+3PmVYol6/ECsxi4ow1gDpNyZYdN9H6GwoCkk+Fzn32Q2k5oXqAc3IqnRnb9VIIxVn4WdfCh/2TmUNW/1iwPrf+dtPM8m2Z9yPwmco1m2vltkHP8klh1NMgA5h1zmzLIYtiJ3WF8CqvSkYzMgBcFs99KetDor2EwarUc2IgvHdoTYU4cllV7dpx2FanC6MwRur4J7wj4dpSCYZ4ZC2zbggUSlpPvExH12yB53PsivBWIAdBlPWai0AfiwnadkyPwffZIhIApy7My4tbT9/+nNln9tSHwml root@f05d0b66-501d-11eb-ae25-d6360d0295c0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCgOAK901+lBcS3sFDMPRiXCdcXvwJSRIY9m0hT/BpZznVE94sBc+ZVlc1BJphKHcWa/qQmJradxQZSh+ALTHkwXDo/C5nZhY3Ma+eBeMuFHR/fZCA8YPl56URZ5hhAkFOWJAs82WVOHnnTCZOMIM/ID20XmrD/7KtbEQbxkWd1RD+2Gv+H5tN7EXmVZvW3Xnj7zRxfPZ+pv5/pU64Wg+Lrr0AegAS2K6pd9kjBrPOksoK6422BvNR5E107BPfRzuFXf7dab4M/o41iEPqrIGHTu/HQ4tIQwllmxrqQewstqPO5kzVcgQ8tcIPqpHHQ/jjnDh9zSEP0QhJhRKtYREDl root@968083cb-511a-11eb-86b7-56818f023517\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDYWmoJl2mX9JhyKwPcyG27QM8pZ/EJlGRepnKlp1WE1FKw6oiEqIR6jeMefzzh3kKWwisGIfT7fhYVIMKBrjr7arooc383w4S9QMX7fKj1RzZRRNlaS3vEVU/h+Y5kARZoeFNmzfrqWSIczQwVw8mTGfzMUh/fW5GSftrOcQ/Ns7OCL98v2SFaYxM461fDRtThc5hSH1J7+ItG+ajLEpjbj76z5wjcH6APCeTMvm1JotwEs+lCiLHHo5gdhHclgWWMoqE+rws10eDAbsbhHecrpaB2akn1sycSdMd2W4T91BEAQNuQVakbz1KGljZ7q7i4fd0IxbvpCSy3IS001Ca/ root@fe77b5dc-53ab-11eb-b6a5-7e8b7adfd54c" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T11:07:41.251-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "585851919485-compute@developer.gserviceaccount.com", + "id": "4043530841695728130", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-111", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-111", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-111/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-111/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-111/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-112/description.json b/audit/projects/k8s-infra-e2e-boskos-112/description.json new file mode 100644 index 00000000000..f774ceba041 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-112/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T18:09:25.620Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-112", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-112", + "projectNumber": "8471863207" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-112/iam.json b/audit/projects/k8s-infra-e2e-boskos-112/iam.json new file mode 100644 index 00000000000..8ee2d09d7a7 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-112/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-8471863207@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:8471863207-compute@developer.gserviceaccount.com", + "serviceAccount:8471863207@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-112/service-accounts/8471863207-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-112/service-accounts/8471863207-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..855f818f040 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-112/service-accounts/8471863207-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "8471863207-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-112/serviceAccounts/8471863207-compute@developer.gserviceaccount.com", + "oauth2ClientId": "102751798743862130439", + "projectId": "k8s-infra-e2e-boskos-112", + "uniqueId": "102751798743862130439" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-112/service-accounts/8471863207-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-112/service-accounts/8471863207-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-112/service-accounts/8471863207-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-112/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-112/services/compute/project-info.json new file mode 100644 index 00000000000..f8a091b3e10 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-112/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIoKsVAqS3P1Kvo/Ub/4lUp4NCfdp3m9e3ErkTOlEehe33NvuQn2+DbIrf/xiOuFyIsVWTyC/TbAOlmhc7EpO845WjCFfk98s42QA6HDZFt7aiYwJNFpoARde/8a23dLYTBK7OMzeD2INkm1o8uvHBjmQET5yhhx86REzQAxCho4pIWPOQQSw81PWwYyZdCTdFwozKSQlJxrppCV0lFFtUQvFvc6MWuDjzGEj5qpleq/g+p3OPll0pSU5qpHECnAPn6JUV4OC36aieaBBJ3HAVpB0zVEz4/YC6qJMaB/kBY6fJJgzthxg5wzDAV94HJtW40Ig4KurHy9Tx9VWhv2oD root@aa8360a7-e69a-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCy/ImIlkI8L2P5dCvaMXAbM7YE/KT11ZMJI3gC85vzIornKxsu5GAVsGZN7x1h9dLLzoJtO56MIAAhD6Wfiyxi7NoF+JMMu+Ur4G2zSXX5aFwWHml2MFE5BWus65llI9g+eui3nnxvartOhwDFYdrLWtut5wkD7GmqDjCVZaoJVkfLY2bOL7/FgcdjtjlZy4dI4Zn2qmLowqngkEHxjmpHblCOks9UEz+TFnUn8TkZEd4TQEACkmlILOqg7KKtfdWqbhXcS/41OePLHVgU2S/22Vzc6oaEmPU/nBtgkQhl3wBKuKaX7sIIB3271IvPA22jrbTF6x22hv3KJD+wvoiJ root@242ea199-f358-11ea-84bd-b6fb6d83c68d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCuzqaamUZwh+6bDptNxNDoJKAQSWHzVFJKijNwGj9brPKYPQbvxTBMVRyQOW+tCRshKbezyhemQByLGPCid4IHOElvQXNAxEhqh30bvCGV+zv/nTpXiEUwNGNJgb4HOZz9Et6AonRHo/ElLbT0fN/K/rZUCStjICvt6RbxwzVP4/z5auS9bnJCfH/kshz1MYhEwi02CdXQplBmg6/YGmW0qxFkizZqIiPCZEsM8STUApgk9P0SbSa1LUWjzkqIbf5ZIiVItbNOW/JfLdJNqJwXzRvZwClIt3GC+zhBvsyrTlI4Vd1JyTAIaA7OyrVNI3FFYRBQb25haiEE8HVCMafH root@1137ef90-f37b-11ea-84bd-b6fb6d83c68d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC8J7SGX8yXsCp7VEXw7egl+c6AplMso6Fg+Xc7e/H3azodcwoNXlOgL3zT07wxJAZoIa9YHA78Md5vIVdAST+LElifst0mW+RwqesFQEdSIzmx+nqQB+tJdy0ea5MntLTxJlRXJc8LnLAeNROIXX/8aLyK/BulwRr3iZbko8UbLlTNtmmZf1Dqm72ZMspczvZXMkixyonWJRsNOHRjQ0Dw0E6iSUdaE31yYYmFJZKIBUtngzBckPEcgt3dTqd5pyOsptU3lRX1iMyMpR5XTK3XAbEN42XXNfErKFxpZl7yKrSh8PbPup8mUMsQu9qq8vMnkNUVlZszAYp+m7mplwCv root@abd951e1-21fe-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC4BDiISAqmxjtvZaInKR6B9OA/oznYZr17Ak/y4g90Qjmxh58k47CJS2gdoKZH1rFJEeVxIKMVOFAxY9/3MeqfLBLpqjMtIQldyQwelybtqUWZPklT1TqrYOl8daw0G0xYzYLt99iSQsmrtxFSMCSsT152Y98/pTq6pgRzc0vtUSe9UdSY/UKF8QGgV5O+c82w41mYZ+CVkNEd2Gh275kU17eQ9akXo3v5DsHNdx7518hkpdgnpESgTS3nd4drvRNs8awRPJv9dPmxTjnXkoWiNU2JmV/w3WJ4xoYKH1ssFaosVGZjvrQKImeb+q8vOuq521JfwZy+LXTgIj9ZMJBB root@5e00b495-250e-11eb-bd88-f687e5d66392\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/gy/76AyYYpbagtQK/4YBNYpQ2BT+uWF3UNpwZPvalnGaFEbklxnaNp2cwNtnEn9rTKXUHPZelXSTmaoBW8KjyLmtXHbjUPBvBYGjbhbAu49HuXeZ8B6eGiVqhhVQZz+JSUg2erMvL1fvGs/Qxz/eux/2hcPBcNMMX61msTChvXK3ejsW+pC+Cz+X7Nv4m4ljEInOWfJpWlWil6rMMVfAFXPAgFCaRLqD/ZybbwbXB40jkmTfOWf3rmU29MrH1ZmcA722TM0t6LI1FoEHkyQVw1RCbL6DcKG7/rKbxjhJsag6C5XtQAauootvKlVtN+cymdcp8eRJuxi+3B8n9a8x root@6abfe2f9-4379-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7c9pwXy4D3NHWLitoDGWajEQub5g5piRpLMNRfs2qlNMCBV5rGB7ejzerBixI5+StkEXQTvwGdpVOkuA3FtV1XPTbD4uVShRHrHnvAufkenQwYptC74s2D3H+9aHh1d8LbMUy2BkPFTe6LSVgK/3Lyln7F0smAQ5wOxzqHV8Dn+M6NzReLCMFx0cxhNUxhiqqCtfd0O7DDg1KKoCyeg8EUxu8YiWlzwSKiH+JAeIGEt2L0sl1xggGuOZ99pdiaCIR6cCYszWK3XqIQaAxD//epN7NNoW6WknQnlOXBijxeR7d4hJOo9sF9cUVTmmcInurvL6oTTETXtO5O7OcL36x root@508c043a-509a-11eb-bf1b-5279f1a59a83" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T11:09:36.732-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "8471863207-compute@developer.gserviceaccount.com", + "id": "3850798114182804367", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-112", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-112", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-112/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-112/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-112/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-113/description.json b/audit/projects/k8s-infra-e2e-boskos-113/description.json new file mode 100644 index 00000000000..0d2da3e814c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-113/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T18:11:25.359Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-113", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-113", + "projectNumber": "464129907606" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-113/iam.json b/audit/projects/k8s-infra-e2e-boskos-113/iam.json new file mode 100644 index 00000000000..c2d56a87233 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-113/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-464129907606@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:464129907606-compute@developer.gserviceaccount.com", + "serviceAccount:464129907606@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-113/service-accounts/464129907606-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-113/service-accounts/464129907606-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..201dec1d01b --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-113/service-accounts/464129907606-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "464129907606-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-113/serviceAccounts/464129907606-compute@developer.gserviceaccount.com", + "oauth2ClientId": "102489370968062049081", + "projectId": "k8s-infra-e2e-boskos-113", + "uniqueId": "102489370968062049081" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-113/service-accounts/464129907606-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-113/service-accounts/464129907606-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-113/service-accounts/464129907606-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-113/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-113/services/compute/project-info.json new file mode 100644 index 00000000000..63475bca609 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-113/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC4I/sjL67+fM92zCEq4r7BQf9cVuG8w+MUfFvNs5LKtglgn2iuPf0dIwbxvsYTx9LTqvWZ5J5CipzpPU36X9VfRGE4muvRBOZeLHIsAUSH8Vp+nMa9GA6Yq0+2AQ6jzdR5jNNfOFrHAYBZ/TYohSu61LceVHSJtjkU+OKaCLNlvRpI5M2BkMQW7fMQ7eFEyUr142FioZQSHS9CXkHGuGkDD2mtzeWmf1CxhbuCzeIkn0fQV3jEELhvCvrQ9+aVNh3ZRx8Uc9KKg3bCLBmlYIYCIRcpbmq1BFce9iN8lgfi6yAoAmUXnUSHpKEjlflcTsAAoIoBg5f1yd92+Nl8+N1J root@aa51d977-dd42-11ea-9424-2680bd79560c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDYaOJYG8FngABPE0RYtV7s/0dGDwEKuU/12Nh+XcGHpZNu96ZNTFCVFfDqnil6DZHL+7CArJlC1xtDsXN8B/ThJsRf3feP+SVmVt4i8gdkRgE/X91c7i143aYtfIMBDaPqk1j1SULGiOj4lVDHEmKdc4tN36WDV/WY+bsTH5UuLfSRTUufYAXxCleJRr9h5tLYnZ20z2lML8sXKMWzQNe0YHJtSQmzoIjguSlPF78WCvSuQu69ypxndIjLAITB2xHeE9s5e4/+Zo5E2pYgYHWu79pbUMmLMjNtfKfb/CcvX1RV7jUF34vSZuaWNvJi23x1XoGdD6PJjLmUtYxKYzo9 root@eef8f9a5-dde9-11ea-8a0c-be937dd98cfb\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC1NNXv56S/HRUPgGVka2d4lrZarSCgBsz1ngRt4vhEJcpUdXxDVfWHnP0vyvpjZo1kK6CxASQ0nBev3FZCy0CyLNJ0hlDGOR4yJ0Z7pbDQBsEyKaXNFejkrkOhpTRGXobpTZaw350NjqBKxrQw6v9tI7IBQJZGHyS3wpbWpze6GV1+Gxb4SEw10lgfAi8OGQB/MokAD/Xy+fjfJDMCDk6SJvVG23JZj8cEIwBk3RZyj+R2XaGRJ8Je9XqUaGzGA9skyz3biNJAy2jZCxPiL5DV0PQCLR7nX67gLXj91Ls/T6SJoeh4/eiau9mtbTxWV82PAnbiXfj0XCOHa2MDsS3v root@2b9ef929-e37b-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEeZl9oLQdgZMQxemOlqBk34+jy8cl9XEkTrxZrYIR9mJwkkBILm4Xb163wqYJk/G1+M1npQEoqBHA039tYtZwGIRjtc2IeHHx1WwAji3h9j4E/rool9lT72oJ7diR5oyVWghQaUwyRz3I5rb//sGxPaW90FvRdhTayTh4JYPMj2CVsPTE6BJCWJEtt1iS8sZ+xi4YpAWqCPOu1XqjinN718K6xh9pD59SrK13+ECHgGTg6TG4rEZuBA/CZddu5d0kMBW7U5s5NVYZHa8N7ceH6OjsLXmXxvWuz7mfjyAqZhtImRUsKufRivUNNA3p5X57LbV9YkDsw3JpNc3Us80F root@86f7fafc-e4d3-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCnU6RPT529+fTKtRzuyB8YoZXfh3iHzSEt/3P3lVnEfjNJenDsvtMkQhokhAwaf5bFONIw48z/RS8sQGu+KKI8PciVHmj7H9TdX/T4cRIMM0s2feI7REqPSJqHJJFe/Xi0otXhs9Pu5D4s/yJPjadCFX0I4hqHCCXNNuPh46Tlb/r6LBLhX2SGiFotx4FPr+GA4Zf6UZGXWyCpYiwkt8dSRLwoCnbK/5TgOOpaI/8xbDtAL1BVHSaoYgY9YAFjXIlYuug013E/RjFY5Tr3vacDE+wch9HkVACf0cUnxriLzd3O6n7V+Mxa1yrQwQmwe/kZBHkHxC8DpxL8Lc33bppz root@d3246681-e8c6-11ea-aa1a-c6580c04344b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDzTEhLzgr9SdPurYd/v3ioQLAuc17dYjiAQrbkDsbw5/GXe6uIeXl11gRULPdKUR3ZmosQ91ExcCGNATZ/NukYfLS8b9K6zPpA7ifSOyi4Uw5/1W8ObKqGJgk7QnTT5qRwmV8ME9MGtXSd8UXrNQuaURILfYOhqpItpEH4Eybk5CD9teYT1LZuJKpBcrrBIUPRvuXKSWZW4o6IOo9P7duS6d/pfEFKN13Jl3Qh3qGeb6u6ZlOD8sdgzrcnSaXRoaiQXprenLzIUOnx6u2V14veGye25vBOheUpYGw6Xi8TpcZmyFu03wUw1cM5kUXfbtJS3ByPT5iuOpmGTfPyHg01 root@2d13a20e-eb58-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKZNjt+/4C3UZEn8C/rAHz1bKgPHrdnUy7f9QcNsfGh9znDC5lXBCRd4dklm2jD7lCodj3j7y6BavoUF23n1DcQAxx2VAh6ufRKKsz/SY9brImsCHiFDhHoYqPzqZuxiAC85Gc5Yei4EpFdRx9GUI5Gfi28I+rulZnvGfd/KuDnppyjHZEbTx6lNsI5toKC9XZjPbrVj0uSCa8vPKq+CRazgySdoA+ocFYYjt5/xeD2wGcmOJ1PFBoMuiINtJOwaSM1N9FSvD9N/d4+XYi+n3XwYq0XpTt415UViGZntZDhUXvN8QeKApdEc+YwWLXpi6hdoOjrFYq4790AANg1fRN root@6c36cb2a-f15e-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDVtfcXzdXeC2chzIOAnDRPDWzzhkK9i3wpCw/TeFN7WJjJ/8zqtRRkfeDiV0lltYQe0zcZ7PZpv6FaiycDmcZ63zxJmuHn5kUx4MtpvsugCs0frdzCLqdZh92t90gw79EqXqRZzF+nNq0+aHXaDavrYQKfgWGpy1E8Vy8m0tHmE80nbq+gXilH2w7LGlaPMxi+jjNMZrYJLjvlpV3Mq/Eqa7Ej2OKUtLm4qUXMQ7EcfI0a10nT/Tvyfnb+1GA7zqWInpglIsJRKUDrrM/IBr96mL144uS4qub+zBLO8eZR09cR2sTtRK7TNs1WUxFUZe/qxkCcQXcF6MSr/rNjOegD root@43b39d61-f76c-11ea-ae6d-8ed64f3416c0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDfSaxSKYAAcjn/huAvwcpOrch4UHXaOxVPjQnHDjkO5fjtd20wktMhddRyToC67Lx3xxt4xM77fv70CQsU9UJkbDvlB2WGYaxw40O44zGj6ptC57KWAczoPjBavJfNT0XHdIhbPmbhJ5vRYjhjn7jHN+gtGeDwLdX+fBbWxntI2vuNKE8Po10xN7wuxDK31iekhj+ovKyd2Qv9gyZsSN8DS+eDJCeLxXsdEG9bpN27BGpZzTglcQaPwUxdX+jbWXouiR9ofKxSwvUAdLUTkNZcAWsz2Ca9HpAT8hh4Rl3+/lybnBNTzukMsdzr4hCCuFd/bv7CeSG0Dd3hNvDl9kAV root@6638f2ad-0851-11eb-b895-6272783fc925\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDkCsPq6UFYMwWk+WY7Gf9zjW0V+M5gPXWWjvN4ftoZuzDlT83/UhQlv4t/ukJVOz14EQOq7TMKAfri74DpASPu5DkJKbUgyUpm/L+TLesjzFsb/Yg3zmOVb1gmqQ4TqgxTu09+ftlqwpTVLoIvw3AYmMU+uIKWuGW8HBWAkn6vmNHYBIPYFku9SVk7WMG7/cx49uSSqS2aP0Ni5gPbCmqSzwEMuIfK9RNDAllV5hV6Z24Mg4dzrwVe8GLZi8soS4qkceOK5oPhYxxL2+MrSTCkIq03XM0xZ9zNQugOgEAyJ3z56vguSeTrPS4io1Z+sc/9LtMv1qcCXpmH50MYkDFj root@57f0b7e5-0b15-11eb-82af-de22b9665164\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDeIJI7PgLdKwXRIdosesmHTBPhbVB4dMW6RmxLpG4fcTPk/RcpFZYtUGbPgBCb/pnInU9Hz2bO0PL/ioElOzDLeipcFkdJrEN94lzXi0Z4snKezvLFhDTbtylxt0o8PGLLAGAp1ZVshyPQHV/gV64lFiJuG0gTtprwoNxiGZ7zN2ylom464c0cXUC+tfTtBeBxP1ecNq62hybreRlFedK9vzyJ4HtVDlExexNqHCDeN6xTxVFs5hdeXDxtxCNf1BVaeVa3+U8Kyjda/ksRXj7SYGbmziE4K8d1ZbxXDHRJoUZvEMrYRj+KXs+oKlIGXPq/hFg7Zc6mUT6xXtJDDyOh root@c77c06a9-1e89-11eb-8d52-9233771f1447\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDNraXQXk2xLpl8183fuhx0dv3LRg2hlmrl0/YlpkdloTfwRBEBhVIRvpEouU7ZkkQfEeBKRFvL2wvbD5jodAfwCUt8UXVaYyqf+WwSE5KwoB+WFAZNUXLEAH83N7Ux3F7ZCZnYj9osATaw92ONxrU56d76M+t5L/sYRutgSZROboBxY37GcUhAClnZtfzoMj/OSnPu+IW17NUfKnUr/YQ+eg4a1Mck1gTqnwylXW2BpHPhk298H5JmXpOGKYtfFiEQML2MAXWRL7WdNMkr2P4kSqEysaeAvSX1l4h40tHu6Ad50OrVWJ9/7Odnv7lkOnnHDwg9G6ULPToGo0/keF3F root@ce1ea1e5-38b5-11eb-a25d-22a534811c55\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC8j9aFifPM7+HZgHrXEOgBHpWEAT84SGcxTRWp1wf8AtfV8Jt1zIb3TAWfN/BUKn2NRV1ybUrtUSOzqN6SglH0UeN+IUMXd37vCxiBKUv4Q9LhX4rAED//8wSsUDFECmX0LWwG/35lvHLP6lu2GTxtinpUVfRfS7fgejexM7uWTlWkfzPI7StJYBRc6ibhV1uLjft+Ptm8Wpn1dtH6zXvGxDVEsVH6H251rK3gXdtDQX0Nl9xP/0hpkUPatjZZJDRpDt2L29n28SClQ+vpFtZKFn5FJwqig+vMUi/2Sw1BI0dA8epNLo8iov7Bz1vPsBY5ROomVtpY4pPYjTUqeOLJ root@f07e173a-4d59-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/XZbmE/ouD3LPMAASbQyn8berVeMw1NPxGtpLDqeK91AUhWUGhJFT8+WEyksSHWcy+ODA54PHzbvs6p7RF4RUbOH1WetQAewZTpVVo7zxvUp9ITPJVliWuz/w8IT6heQne6uFg+e2oX61NHj/hLx0TdkJ28+NZgUmR6pR7u7AZ6DuCtTAxKuw88wZI4dZX7uhrWHl2F4i1g6g1+zMdsu0FGd+4F6rxLUxMXJsmwSP5X8OLw+lhkD2UFLrRaEcVmeL+jy+oE4EEdkcQXGjM98dDzDE0Viye5t1mrD2yZ76GmsFwJoKmiJUN+JIO1DQ5Fw6v8CRBZl0dMOtjvQN49Ax root@d6f640d9-5067-11eb-ae25-d6360d0295c0" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T11:11:35.735-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "464129907606-compute@developer.gserviceaccount.com", + "id": "84681892369806136", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-113", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-113", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-113/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-113/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-113/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-114/description.json b/audit/projects/k8s-infra-e2e-boskos-114/description.json new file mode 100644 index 00000000000..4f0ca102e46 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-114/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T18:13:13.205Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-114", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-114", + "projectNumber": "565211337367" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-114/iam.json b/audit/projects/k8s-infra-e2e-boskos-114/iam.json new file mode 100644 index 00000000000..0c118cad7fb --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-114/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-565211337367@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:565211337367-compute@developer.gserviceaccount.com", + "serviceAccount:565211337367@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-114/service-accounts/565211337367-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-114/service-accounts/565211337367-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..67fdc388b04 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-114/service-accounts/565211337367-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "565211337367-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-114/serviceAccounts/565211337367-compute@developer.gserviceaccount.com", + "oauth2ClientId": "105407025563460257626", + "projectId": "k8s-infra-e2e-boskos-114", + "uniqueId": "105407025563460257626" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-114/service-accounts/565211337367-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-114/service-accounts/565211337367-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-114/service-accounts/565211337367-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-114/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-114/services/compute/project-info.json new file mode 100644 index 00000000000..f084b73d83f --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-114/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC5FxcsQK9YG/V6HqgfOfrT1wcAlaeX/XT/K0tVaCM8d+9soRGk44GUjsn/YLoXsRA6IZnsxqCAtMYmH1PqIPuyAaKpymZ6VjpwvWDWg0R964i76TnvPUFmH8o4lK6TYloN9IF6FruVZYjIkjffcrvqC2syRUtTV3XFp0ZAejILx+emzTjdbBogXONqoXbsJmRuCYkIEhyj7+YEC0udbUKCka4o3nAZmnp4KhpMA8juh3W5mVf81BAC4NAaiCVTb8mBofG9PI0k/3bKxSAzOFhgnD1DKyKyhmeCJj0PgLEURf0LKVst1IachjO3whpSDIjOegDgXLqTELnnra3Az43P root@1480b9ca-dbfa-11ea-82f4-1a238816176b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDY1AGXIzsCg6fIneYpwu0hHG3fwnVXUjTlQmcPy4vxHTkJ3vc1/L1070DXK2kLR70Kk9fpj3o8hMn/N4ZfUtMzGWmKIV1oeJA5nAGBUACrv/j0WWY0q+zc8cBctYKWUj6FjUOgDFdekCoy4k2+aEfgIjo50+LAGsjU9CRX0dU9YwqXnkHh4xPXtE6WTAQsfn6OZdlBTUTnVWkZHK2wMjKJn6yd+Fr57Ctw0Oe+yuKNE73n5g4zMeqD8IfLuan22b66hr12RDzYfFlt+5oUY1iGAHTKEdeDpaW1KeID3dcQ1xhD7e0DWXM2soO7Wn8OkXNO95Oe8dA2h6SeLoekHtbH root@bdb369f4-e3ad-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZmCb9d3r2BZLi1jTpPRwf5gpvZ1vkmwMEEV27t6hblzbAfzC/KWfl2jMAplPYzBi2j9Os3qed4LU7sVBHnl7U/GUA0exfg7uXQCqKvJgJuA6rvqt1EAUi7Vn8ejErNODKjU6QJ878mZTwF2dWZr/y6nUBmZWpcFsC1eQee0gINWmEp71mUuzSpUvhwjoOs9ijyVJuV12ugk+0/1R46WjJvdgrkY9/apVUm0pUB/6koh/clpQGJej7sj4Co2b0BIeVpYSSve6IOvXS9GNaZOoRLfiWFlTEl1ZH1f04nw/nwvvadnQ+zxnqwVtpJChXR0117vOfQBSWlWYOsxoXL7aD root@7449920a-e445-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDISb17HGUYE2g35w3nEEG7E3yLASpNhs8Bwut9AosIHUDVGpHp0lD8vXnomZL/02SKNwyPVUrNudPFjpF5x5szxxR7YnuYf8sbhASvrGU9abFGcxdgaE4fvYh1nODQqVADaamg53qodVJWuq1oCzlEE+0eSThoCqzfIJa/6DTShAsmamUQhuOr+MlNVz44iAErqvRWJ7gal8XTKovgpuUvS0r3XHlDeVhfaPNqDYb/Mbgv4ki3wdnG9ztXV+l02I2cl1KDhWOo/hehDj6CtnAKgfKXs3BIuny0J2BvXp4WH4FDN+kvWx+k2ZRsgRF//H8bOJOfPhCXREGTqrkcWDwn root@862308e3-e584-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/Za5fhAmOJmCvdC1dq+P2FSBpDssdn8qE0IKIYihOngc+kdPbkOkQqulHyyemaCG9NhjwCOq+2BV31WbrBrGpzqVPZYB2yQCRZjzN+vfz/aLYcho8c7wH4RsRFF5pgfVvxtLKis8GftlFuBYMiafpauxTyYjDxnir4U3kURKE4p85ieFQuDnKOUx9lI7AK6dVKV/l19/r8JubmjIl7LjkvvkAbWXaO1hx2341oea2riFLyueUQ26meVXqq+ZE1UYTeuvAJDeF4dPDABzwzk74tp0NjZ1bO7nLxj/H/UBWku3hXDFUztHPfsqUOfeN4cqgzhYxCBcF1EUB2da5bGGb root@62887690-e709-11ea-8112-a64f894a1815\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDwu0oE0HL7/Gax7uoER6IlQfIY5m58bhajjEakG9BrddNEVTR+XmICB6Okpy/dtsQVY9SbglxWo4LCyLVNgw0EeLZQEY+gz/d75WRfIpsiXnwBPyUEP0hSkUJIH1U+aehAfoh6ba91+HVgwto8alJWflNeWlWW37kobnKLe7rF/RsGGD0qHCKD7tLz8PMrb/erYKWdN7UxFDoTFMb2FkAgz2wXfG1v8OLU01DJwbwxIDs6VVdXTfEgHbEXR401vk2UH/VaJ/3zVg3cMFWGulu54xhP1AXld5gOEdSylOjgaPxEkp7s6xQSPQeKo64fxPAa61oN1Vq2HIvjWXaMrJxL root@aa1fea8a-ecec-11ea-aebe-3e85ddc86bf2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCbFQGcu/ZN4t6tdacVasxksaR4jNxTN867RtHxppcOsNuH+diXo7advDPT93YrX988NUAVnQRizAiiJ4oqNjtgJGKuhw2SXRn90IjMRjXzuNOqguqdxiwD2ddcd2QE/qWEbqKOIUH9xayiph/R+d9rQKOTJcPkEAMKV/hxIMFSEXtIukCvQTxAUhUkjNdMusjxU7G98tmdrzkDsbxzLq3AIHyUK6NRwBudgSKxDyLTeo6uGDpdgq+xut/eX7KRNmrP6snx7v1qSWUCtbmWX248C+tb+LfUfEOXPAZHYWkuyRSZYhGmPHbeuk3CJS+qtpAvC3T1V5+aUTYvXZTiuRyn root@4b31f42b-f6bb-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC5g/rw6XW85SmgFFj52YvGAniekVwPm5nDbQVLeHXnMvbCYoHpDSXH/0b6Sbs6OE2nTFjcCaV/nxJrvmYdDjRi1AqwQ4WeVGVZtc7M96WxeQA39zQ/UKmKQr7It3djt7h8VyXnB0Ipv1tAL/SnG9R/r7gnWMFkfs2urhbwfszJmVle2TPDmvFDELYYECxEAp+DxinR8XAYQ4/mPBiAZeOQO+DA6po105+2UnuX29SKBpDTIcMKF18alJVj3K/8B7FybiHEKnY3dMj51AvXfCWJqLY/sm9Qk1yos9ouHBFn0GPIS35BSiTWecX726hmABAxQBwWpzUmLjKspUKqj5rf root@19a607cd-099a-11eb-8b01-e6b73feeeb4e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDeZU/UiFRkjFUu5/dSj2LEI7uK9rX0Nj8zb8uLQTE/nH7gpHCe1DCSsPy23Vw9qYDlrvdkR6tJY/CKCoHOPDGM0yxPOW8AbPW01ihbi0i2qs6w5bRxJO8yWyxfnXbNKE8a0z7mgRc2KSLy/icjH7tWttLnUOoufdXMIzAA5TD+8BIc8T8vCw57ivsf+uPq8qEMhsrnA+8SPL85Pm1vCS0F/cgliCx5oK3obv3A0joGGubcTqNCIKCjz7un/Vi608GD+BeaCP14VLg6+3SlNlCy82TDgiS5KF5IA+7jd4y6vG2VcgsfxylCAfHgk1qG+kSuHl8JeOmv968kPiX+3Sgp root@d4ced0ec-0d5a-11eb-acdd-663f8ab42c5e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7pRtmiV2RWGzRNyL1CK1m+m/veRyiSzfQkxLblpYypFnUGyAKrprO11hOCYaJI5yAouCsPglHrenZbuRjgrQqYDZT9GlTIyFxynKKoL+md/n+s8fircNcofzm5euwIv567auPLVsQ1+RFM5aS9vYQqIAndtcRBWa4uJFS4U8R+iqME0o2Y2QoNwCf6j0044tXPjmXa8Nd+lxNThmoSOY7xygkJiQT0LMIO0qnECRpmn6c1TvQWACgW3TdXz/yhw7thEcA7JVM3pkLOpnmG3ahHmGHM5Kp18Ef+xEyK86uN0aiJ5+T4FD6T7kYWqwITJqbsqC4dlPK0frKEkZ6adF3 root@74d45a61-1444-11eb-8a3c-66d0ef5d093b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC58N9GQ3W9aIr5UninW1fTZGaC4yAiutYBkAFfpDrRqDYcJHnOfELI7hgB7AshY7mQTGD4P2lPMlngmQqxQOc3BTvynvQq2Bj0kNH89emOyRcskMMsB+fA9P02SeB7vmqDiqApdewGzA/lIptJHQRi7f8SBAf2cINd+ZEd1L8eIbfeajyXCz8uWoxA4wVjROuDb5fI592R4cjMzs6rVcziJJ4/h6MIe5rYxBcgjHf7lthgq4S8K41QS4+epaLujIYrZ598kfU3qTaRXC1O37rrxe0ZcNRk0Rk7uGV/6PLsgZXj7SLTDBdHz7W49ZFpXMynR0STchn81WqEDe3MdpqH root@e35e72f0-1573-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZ7jqZy/Uf0EGqvqi2tPZjlJ3Q2XaTCn3njdRoqS2yOmH/uX6ah6N+bvxXYF0KipXjmiSjbcl3jEYVrRlBKttizKW2+dCz6LHycipZaLt68Wy8R5eS/kKaneT7ItSc8QGuH0MfsEpU6KQe5hLs29wcxJdjrQlrBUW1YUHlG0FeXRi8LbwGLLAd7khUew1fO9MjV6lvkjn2YxVgfQPFrsq2uGa36y8un9P84E+unHKt7yPvP7LtNwK7JJZkn0bnfH6IYG5EAnrpz39p6EuIWkxlVGWNqh42k5CNxmzycY+1Ot6FAKdX7CGlObK/+kCO1gt5kiMSRTGNb53GCkKeDHh5 root@4e3f6c09-1754-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCvN0Srtf7fkybWGUnXZBMMzGM+21haN4BsEXj577MaJcF31uRi8Y9Y1QZd4GtprX0GO1Lxxh6o+A5Vz9OKUEYgQePXuj+mCpczdUS5yN+ucQHKvTO9j+gQmIQEPV5St49fhATHHtZbfFajW5baKYfLfrvIkCLqjGH5+vHj5VQHoCxLFrJdeFvkMFCm/KskN64JMspqXqu2TdM1adHlakOfZMMNq8YTmQt1GMHN5xChV9X8xdWe/LwGRqG0k5mfXqa8y0V6NObht0YCoW4UTqvVrY7V0Eg4Ae7ddx3TMAeORpU9MghYk26EiH9BHCJHDIsXFz5L/vPbpW6B1LLfdL6l root@9c4bc302-1934-11eb-ac0b-9a760af27878\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDGs9aD7zvnwgU9qIFMfLxSRbGfJvKaSSRbjyMZpVswVSfjWAZ1cAoNaYMzgVE2SgT2ZkR5IsDjQQuL8ucPi4ndXZPiTMKi5ByIX5TtemySCAI3TleTNEa/9Uh7zpy3KUKq/4k0he7ceTXkp511ghfc6Yker9+Nubt8IEFIRl4Wlpw/YEkdHlXvmWO+MfB4NI9VsqWCvipKq6U8hLCBnQN/uWEL99/0KCrUY4bHf4rhk4VKeYI6KT9L3msHGrVVbvLZw7cJqkMGc1spTn7CQjfkFWQji46q7Je5GGcvcG6QnAZnEzPIhHHNXV8wl8HqVdoRM/KPsUGJ+m9sdWm88sOf root@e4c629cf-194d-11eb-ac0b-9a760af27878\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7yMHq6BiJ3SjygzKd/ybMrX6fcr74Mogu9hCBYgwoQWJvMWqC6OvzBb2yPEtmwZWjpzhg8CBKIQq5i3DYFk1z+XArTjs1oXzJAHZjc0Y7nDXumEYpgxkZ1oXjddCtQaBpp+OqqxUfmlFisn/CsGbL9AtZzyraJXV0ALuSkonfLfXMmiV9q2govooWFRfX34T+2tLm27TSkyU18S8Syv+NLcC+0tjg4yHSx4fLbbBOamsS4tRklQgyxcZwEzo+bksJnsQoGKo+Ba5c0onfcAiyetcfN4VCS9PWNTKIa7qYRT0t3MG/p+96w9eN260RcaIIlomG114I1L9ntb8fYsvr root@fb182b3b-4720-11eb-acd8-6a2a49dd8a76" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T11:13:28.830-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "565211337367-compute@developer.gserviceaccount.com", + "id": "8700029629766578343", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-114", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-114", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-114/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-114/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-114/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-115/description.json b/audit/projects/k8s-infra-e2e-boskos-115/description.json new file mode 100644 index 00000000000..23502a90114 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-115/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T18:15:30.760Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-115", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-115", + "projectNumber": "738548589916" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-115/iam.json b/audit/projects/k8s-infra-e2e-boskos-115/iam.json new file mode 100644 index 00000000000..82d460c2d84 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-115/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-738548589916@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:738548589916-compute@developer.gserviceaccount.com", + "serviceAccount:738548589916@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-115/service-accounts/738548589916-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-115/service-accounts/738548589916-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..91a0bd8bc0b --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-115/service-accounts/738548589916-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "738548589916-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-115/serviceAccounts/738548589916-compute@developer.gserviceaccount.com", + "oauth2ClientId": "109371611060981921857", + "projectId": "k8s-infra-e2e-boskos-115", + "uniqueId": "109371611060981921857" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-115/service-accounts/738548589916-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-115/service-accounts/738548589916-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-115/service-accounts/738548589916-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-115/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-115/services/compute/project-info.json new file mode 100644 index 00000000000..aa91239c47c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-115/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC23BxaUTFfxY/GEO5w2sn1bGesQSHC3xmmJJvHAsGKeCa4xlMMFpCcWFDOJiXFiLDIbCa53CKXL9K9ZXKj9s7S905kSeM31qZcnGVNvTIHHeXW/1+FstL5I3hUxP31Q+WbtBMxxqW1Qu6D4iGtE/fsRSXpIEnxApA3Pnl1BWlRAFF2bnWoKaLcX5ZKGASqC72ggzy6acrLMi+Icz9I9B2l0Dh3tPpYuOa/Me+QRaVC+1Y9sldbSF/P/NC/MP4PwQbmYUTzLctKuwRNHwnyhSfaeG9G03PM4zioH+cF5L7j9fNRgzLVmV4KRxw5TjmsAQ5POjuWDCvuTOTcxeBZKCvX root@cb5c821f-dbe0-11ea-82f4-1a238816176b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDc4IfDQE9K2k8125CxeDOqbwoQwQ5pROC/vkKuedaT6sQNjRewcu6VhdU4/fVorkHAhDIBhl1b2Z4VWBKE2wh6DHGhrv7aCcFi4eCLsL4dsNZ6xuWpn4N8/xNYX5Tnqx5uL0kx6n+bVWnwEnv1jhZLu6Ton1d8f4ffA0qTjqP4Y4kbu7lyJ7EhO1e7RvnNXNsw65TOx6g+T4t+Df/U4MPFUhBkpRXtn36bUYVaY/Fc9Ea3Gfja+3sjZHfWGOsnUxabAgygSS6vapdxXoWKeAtVpaeZx6xYGnmCsg50CteWkiox+5L8lD5rwD7oDPsK6bXHM+aqea05D+ZcSKKYrqLt root@09332425-e316-11ea-80e5-e2aaca28ed6d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDXFPVKvmnHCQpwwCesVi7XWWO6tf/LtCWi/ohuNDcVeLVH/CymORQqyy7i50qwZt1rHVuMVGYlbj6sJUU+vSVuCTJhUdHvq4zKmKb34PSgXQ//AmqoPQ6N0lIknk00UHPETgEsq7vLPU+Jhkemg1pe5ZIDwhF6JM7PXmCGK6chObsaJvMs8HILZSziuyYxFFDYlZJyYAWDqEa1BKTut9eUweDiO5su4mkI/vbjTtyTLkqoLWlGS51Vmi17tiHqr9D6IkqhucTRyrgjVPZ4KCsdF74tmoth7O5umtjKxCcIQyGNZ86fijTtbRm4aQ1aSvdmSIKl1ek2TV9iOCWwcY3l root@404415b4-e9cd-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCzxLw+0OEjMq2HVlItYg44fo4JbopwscgzQ+fAoBYiRe/9Zli6Qe+em+3SOkAijnp/HeQjCW76cQJJRsGsFad6XE1Dy0NGaocNiIm+dhB7xHos4t2L6iMvn56Q0g4XnYSNArL5ZG7HlosjoMU9IDuAkfrkDyFcIxJRPO2Y9cL6mJr3A6SCaNFX1wL+SAtvQXql0FT0mDoxtQplJXGhy1xdFpMfArd95iNViZyrgFaeZJDClpoAzuUGLIvxX9Ud8Wg/CXJ7CWeZbqo1FYYSA/5dJjAWQyJyoke1cVRejIZVfpkUlXmzNOahrg0y2VRjTW1nBZHpp2Pe39J0R9mym4uP root@9b1f1000-ec87-11ea-aff6-5a14b0d7f3dc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCeU9JDYw0CRd7oYX+fkOFlknT9xNJr87MfrJYC4TX0wPZBYlsiFvwKuFLrvfjSHmUTIUo1GMiVhPM0zT98JX2oVkmwKfzoY3qGWu9m7reNqZjAIscBbQe3D70jiwnsg3WJa1zEn1iPpxqoRJl5rHeQy1Lb20ffp95Bi4IeWmaPy3YwepqSkTy1eR9hy91Erjyv/YSalghEOy7oykaE7CBPLeOiVdsQ1Kqh8KGSWKAovys02drk0W1qH6f+gG7LIx2H5SwS2RhLO2ZCmED67hm+xJ4qS/Jxe/EMRkeDSEeBManKhBBC1oasQ4M+A6ewjZZI6fC4xWuUzSkZGyYZQrX/ root@f34b988d-ed05-11ea-aebe-3e85ddc86bf2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCm0XvBItnmlwvKGCTLdCIVeOXpjDDdLeKW5hzWTZOtEuowoAWs5cSlnClDeuvAiQwW+V2lvGN65RkwQvWA0t9twjId0qZNZo0IUl70sZBwTXuYkBxvH5i3LGGpatHcG/4SL09lJOd3WmQl8VlgbhLcfF9jP1lmrrhf5dkAircuHlkOhljUvWF7qJB1I7f6v3Qi7RyKmJyTaXuBvuUzILnSadGicPBKUxTirH75iUcX+dMF1JR6tJ4xx0Mvzj7/3LZJmK9VSj4h1JpMhrvRriI8HCBfwP5ZC7MmE2p3UfdrCg2tgkHr5pG58MGELHbr1FKM9TGmM5YK3ZlH34nVZMwb root@23604c94-f094-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDDxry8blO5xhdlRy6wutYPdTTy0PzZ2MZH2QZJStW1PVe7J+2B7x8Q8M6vFymmvSrOwoLQkHH6AByn84INl0YusCyqjO3bharTjxYyq1Do2NBI3mmB7a/KMLrGEveiqyQPUzWSKc4L22Jlp0mmHjEUnqeIaaMrWl9G90GBelDms+Te//ZlqFXEBlrL+GB3/y9k+dXaoEbTrA6XdXRynZPZRDnKbiFJBdve5mzgP78gqoEqCBov5bA515wGfKCpTfPhRPuIji3AziIcVnpxO0EDk37IOgvqcXUHo0dvlUKaK8bDVTToFx3qHgUuY7GhjKPZMVFRSmdFzPP+Mq4GHpWX root@22a0f3ea-f981-11ea-926e-7e7ea190b727\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDWC0/miiu6DNH2+6l4CgHpQ8SJbuBZ0cHVxzoz1FhAx+addmJj8rNVBaBTQ1lhSINShacUQrL48JNVlvzfMbAFDZN4nK7XtTw3JRcCnIc+HhQORc62uIs4tOP3yYxh3bzwMPjgqboitafhQjodvP1skPDr0Q1DH941bteqLykacO2SbS645DbCS577fpRXIW1I8zwXYa/7irECxs1RiWqNHZzZ2VN+HiHcFDRPYsit2p2MNOK4lLZF6tDoKwUI+0nR1jaFDWz15F4H1JqvbHLS3Us7pTa27RUVn1gQMaxqGq/2f2eMD0ex5L87nxUndS9GAEaQ/jq7UvzzmKYDZ3Sf root@d07808b2-0980-11eb-8b01-e6b73feeeb4e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJciMJ/qFv9OjokI7YvUOnWibw6zXo3ZpPicbDKMwrP2HKdpyzSSmDq+p/sTnVyFoIlbOyIxTCMjhVBKcjiZT8u+ucEJIsHttaG/delBxXAuLo679j44Y22urkmLCaDuNdDCZqHblvwXkZq6m9pe1Di/3AmbmEpX+wteDG1Rz4jCHBu2rFXd9+lwL+F9XnnehTR9jB/jdDdhi1tyXJhSemad2Dm+8CX5q83D0uk0R5Eq4jHUGc3AR9cAWKzWjbUWIggMFjrm5EvzHbbtqHBjgMx/O9W5OsHLhigTQRSajLbj84yaCANs96vniRA9Uk7uo2WRHfFNNffgwjVI46zRNp root@62b2b57e-09b3-11eb-8b01-e6b73feeeb4e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDeFKL+OO4aUjKK4fXsHHIygz/XJ/1IcWT6v4/ZfIIEKvRMg9M21PrYbfemRn5r+yMu6vfAyaiqSME6Ziz7CsCA4yyabSFKqjQPepMJAxbsJBp7XmUDuWlccY/vLrlBAH4jv4XZpCltJxD5CagUDZyB1eUwZrPgbrPOnFqWsGHhebR+PGm/ohAQzD32geGl+rIcYriZ/BKdj/ZSlVHX/zanrrzWjie+euuUVdJ4OZcYMn4vRQ8IsfmqatIfSgBN9/9fHVUdptvS4ksqsrNbZTuOBcupx2rGsL67WftlpTfCzckoC67CDfPIuIGd9gVGioh8C2A8YFb/ucE6CoG8CE8L root@6cfc031b-1a31-11eb-8779-4e6ceb30be03\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC6rR9p2ObyZQig7m8Ib+EFp6w4na0+jbODDMrZydNtAY/xtF1zNq60mkE55cL3VS+AjtAKYTj/POSfl/JEUA/MEje2XE701yJam7kQMVLLnDVwYhkKyLiS6ZTzkCG8mFWB/gfXL+m2YkPUpeo52p0mC2dFlfgii4oS9Kxx2Ry9IgjPR5j9kSFkIsMcl18nVqVgHxssLtCOkZ8ZZb0jdwjCZoP3lThtXaTmAgxNNGEzNGJfhZ08dX/0ZzF1qt5WbNMxBFUiZjgxgMTzMW8/CKnpFVlTgCud7ICJhoPrZGGiMPvudWBZnaL6b61c6wOqkeWp/VWzeY5xe+N9Xq/JK/KF root@2a768232-3ed5-11eb-8da8-6258f8057dc0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDMXn6OmG3+ic9gDV1WORG6dd9QTqF+jSWdEslzGUQEi7V/62swxBLNam8741b77KYxpQM7s0RetMYwG8UVx++9sQzQsb9LpN8zKOkuEll0cMMt0dtnilHOmZzfTUulx/Fe9jatxzORoa6aBaaH5TblbWTf0CRBHT2Fq8Nkb/8N6BwXvx/Ax9A+8ihIHMGv+2y+H5l0FQmFwdeZE2gS2rbnab2nV7WH0BWg+nBie2ddTdPwXD1x6KlFb1oi3GyXjDHmff4GXUDV+uJdAKqiu+PtaQMknpXPo2J5vikgBCzIdwyFZkYWBfAu6cliPTF+GGTYwyCXugEqncExWg0pKxiP root@8ed5aac0-45f1-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDFKD4SahFrUkRjrXzuKyyvYxi6umlVVgJ4askS6YkTY9LWIT0R4jJ3IZC4yPz03+HHlK+tH1QG5QWOK+87kqFbNN4lKLWqzD5OLelf8/ofFAzoDlO25D/DlKGKVDDFKCh2Qxy9n21AJyHSjPrYmotftWnmmkRq0891Z3UzK3saK9S6V0DNttLLYXgKulj15fsedMErSMF35c9Sun27QDwvQ6a/2PWADnf6HO2Lyc0r5apcV9lO/hQzDUWMMg6w4KjClPKFsX4iVCzY6dZvu25hxen026BKWYzB5l2YEiQZZtrF//RfagGc3NN+9YlHhvWjLCgWBnz3zd7qAiwcmUoR root@5e5e224a-4d27-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDB1hPwbxS5QVQIUDps6UW2dkXqyCHrSUJCEy/mdGAS7sxfAL+y2e9VchsLTLIxeFTGOh6xTVv/bASUh4jr8bqSMXHB87bPvzpgRhFLJG9vH5k4yeSUxgW3lDOQzcy6QVFrP0h9XZWZObRyoQHSc4oiheZIH60lBpBAJx9uIOZreN2EbYE0PFJCwHoDcr4meD4e/F/vcuKbMeoGNSfQEKV3om62siX5SazRHfz7l5KQmsbyUPFnQ7U857zbJ4GDjNbvJZkSOcRd9kgkET5DAPJe8wpZobgLlzuq9e9eiiKM9UjaxioZKFs6ilQO02CUVUD6zL6mb2GfWmciRMKndwhP root@4811caf2-53c5-11eb-b6a5-7e8b7adfd54c" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T11:15:41.524-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "738548589916-compute@developer.gserviceaccount.com", + "id": "9020285730208624674", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-115", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-115", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-115/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-115/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-115/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-116/description.json b/audit/projects/k8s-infra-e2e-boskos-116/description.json new file mode 100644 index 00000000000..504047ab0c3 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-116/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T18:17:20.693Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-116", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-116", + "projectNumber": "965701708155" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-116/iam.json b/audit/projects/k8s-infra-e2e-boskos-116/iam.json new file mode 100644 index 00000000000..1e14977b338 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-116/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-965701708155@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:965701708155-compute@developer.gserviceaccount.com", + "serviceAccount:965701708155@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-116/service-accounts/965701708155-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-116/service-accounts/965701708155-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..4a34bddaf5e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-116/service-accounts/965701708155-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "965701708155-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-116/serviceAccounts/965701708155-compute@developer.gserviceaccount.com", + "oauth2ClientId": "113269482307822889643", + "projectId": "k8s-infra-e2e-boskos-116", + "uniqueId": "113269482307822889643" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-116/service-accounts/965701708155-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-116/service-accounts/965701708155-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-116/service-accounts/965701708155-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-116/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-116/services/compute/project-info.json new file mode 100644 index 00000000000..e2365a65344 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-116/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDI29iHeZBIrrIqznSVxzsi9ilzsySHdc61iLhTNMkajyqeySrxlF93ayJ0NKM4LOTkCL2k/VBKMBwe3dZ/tcralaWdTHmeQT4c5UUrSfm62At7dS0nGm3XqGFvtD9PIRue67Loj4FTAGl5NepNrNmWGW1h6xSUj6MUNRIV3OsYmrx7jICJLKUg43X67z9VQTzlaJcyfBR1r3bP8gGlExrI2Uoy79sekqkQkDGIDvMneL1XdB4AIQhAdBv1nzZcJrstRA9YMCDDa3JcF1Po14V6x1sWVC96Um4XLkh1NiXjI7+1Jgv+A00gpYrhtKfDBIzKeUBurOp3uORRoqgSYfCp root@6dabaa92-de3f-11ea-8a0c-be937dd98cfb\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDVy67xVcTQkzCA1HCaQMat48fgl91NJn6XZ3fr9ClxnKyA6cOz5/oVbdnXy629efBYbolHML0fhx95XeeNDWgEMZsW8h5TJCoUG2V5h3hbv0KSldMIwYlXQQieMdbgttdy2UFATfypQBZKPYzBnRoRcRi2ijigC+EJjWHqVVWlqZn/wj+27FBUEBGu2G2mLQ0f/KrBnaxCHSJTeQxnTpY4FOgBKVebGtudolRcV6GgCNyCqIRSR65OxJauR3aPBneWRRY7y9MAmGi+5jmAFLfRbou0CqenF5TmGzXFByQ5wfJdLPvBy0Why7gHhRFziLueZny6yZEj7dqp+A6yKQVr root@c51e7a37-debd-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJnwmx8B5KE55mQuSMbD1MgHgf+1h9o7qgt4cbreSctFq/SGks8xcQO05+htlNmRpHqH7GRnYhzFkb5apzwUPeGX3Xzr+R7JwKxpY3TWXI8gtI3lMUyoAnP+BSxDaJ00daXi78ylpe0eBv/4bjEBw1zjjWE6c0sQqdrWRgpPc8W9MiUdC0LF//tVyCdWTmnu978yaof6XqZrSUaqp/3G59PQWjV+si3UlZ7/nAc0WsQazj8BUpyoFNHckniKbfC4+xKxMggYpLTv/fhoxDg+vs+iHdKR49yyUABbS/lT77HEciJLXw6ife3A9g6JhPkMvOwKz9EhcDlWnsG94vhdil root@e7e33a51-e084-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC78wNTIAE5/isLHdK7ez6z4xXFjOecN1ueLyU/xwNknHSoyU1IKmX1NQUNmr7Zw9BxkvdCb+qrT651PlDNbYlRsZ863+klG2DdElesWcmaejUcUpzLqazMylacCBTzI5d7lmL5fgwZfAvKAoTTnSOD1fFmcdcGxtfLJZu2EVLB3pwWktXVvGr5RMayt8TUPLMNm8of1wmIB1Am7bR9V4O1jc8aYdpMqMQAzFWEtS3r5rYIlV4rGjkqgx1yurOq0NEpBWapy8oMLDiWK/9PTBhRDkwtwv6m2w+dyjDv2XXKORWUgioACbWrSWl8gDsetlk21eGWvOjEkC+FFQqkhqaP root@dff0bbbb-ed28-11ea-aebe-3e85ddc86bf2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDPcB2bIL1KBRVCEmA2QQUqnZWqYlrMOd6b/e8orx1TmjNaSzDvq6MHsNDqB8hGbjFkBOJ29rV4kx6r4ZsVDXIF3G/s/U8dkpHDT5Sk9TwO76Wu09QE3HAD87IWp1m2tgm1jsCtzABSbAXkd/G26VEHWxdVqg9nzBg4IEWJFwDf5xromhgHoWG89SYZ8rWRF9/WRTe4sOZJ/rlB1N+ewnTn3GSFITfaN/9tn6fB+6otXRlWXrNR5fW7/jAic7V8Ojmu1TSkUpEXvpjITvvs9MtFxA70yAaxrZMVhn3Kq9GkLqFF1kg14ls7qqJqUdv+QwcDW6x4/zlponnguj5XWwHx root@1ae5bd84-f658-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBFS8QQjQeW8dsgYF1XFmKHCWYNfkGBkPcLuUewMrIRshAt1LvWsUSEOY5oVlDFzZwbssB5BCvvGpMRcbK9nOmAUS9nd/sHs+AZKxI8qxIVTrEJz/LumTtGBsVDI8ibSXHLKL88RHKF8Wq9XAGm0EGEa5gNqlLmVqDAK969n+EbEz6cKSguwbqrL8einP+0xnXD3hkJUJ2hZe2jSp8OFOq0CJmwkrfn2OqwfGSkLNdwPfM/HNWzC9Bughi/CEUSuupkWxN4n+Uw27O3KZEHbcO18sgx04ET0HgsvQ4MR4II2O/WCOlTwU+hwn4/5cv4pga6YoSVxoEuah1juTB00M/ root@a63f1922-f7ec-11ea-872a-bae3dc204648\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQChYCD64/cGt++o/hyBQyZhQnn25YbJf8cOT5uQ7DrR7OEBC9bqXUbXJIcUiWzapZGg8p4nAwy5dIJbR810vnPwUrrRcX3mlSbno2qL2zcYkT3NNqB3KPqYzBChcGTkCoPmwVr3zJQRdr/J3QzjNvBa0mlOs44Gejt97Z04mlC1qfOWBqHsoHAd9uPbCLQz4KXnt53MfyVu5keabZsTLKuhUNjv2IXdys19dPZumwHEseFqVbBR9tH3cioAItJhc6u9uqDyjyppCJqaGWsW6BnG6+sd9YETr9jav9MWfbzzSsDSxV3DMYVwrHsB2+98f3O8JFqYWvC8Gt38DLEUfsgN root@c497e9d7-fa18-11ea-9c73-86173d37727b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZ/MWusRocproeYXzwBBwj4J1KKnoEu/1j7lC7qWMOVsenNKenl2H19OBw0otVk0SjsYupC5NdhYQWx7+MBfsyYWX/57YNEDiEtbZFjvnOQigBEcB3qmOSs38v1e4jPO48zWyK4EKLLJkYhPGk+5DQVelcMi8aaCMmudOLrYe3frSEXKiGQoDJkGE707704o2905F9mxJmDknaHrSwTYXjgXXO7qj6VVuQu5hYAmCQdf/j5jf4a8yjI9Sr3z5EbjVo/kj2NgjsL8oX1DKpi+5u1dyI+fPL+kZNbxkGspNd38QI0XItUq0FPLIcuhWKKSVUgJgEVdtjT+XLo584o0Qj root@1dc901ca-0e25-11eb-9c65-0a69ced3f66e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCv0/cLh/mIydJ/fd0bS+qIEV/n7VFpDgxcHoS72H+xbEygTl2SW/8znbx8ijeXu4HGEuv3IbyZG0IYYFHJwA/0G739/eSi2dGdabJF5px5R+xUdYSTq+E1nUBeWllIISKRij9DccGDSTqCyUOy36XEB24c9NCVoYhs77gcWPImIO/ljCPWUejo9oDEScaGYCpvDrRkxUv1X0Vq4ckzeTs7SAs5HKdlcwGrdjzPa2/83YhBV7yJVC0KoVeWrO2Y5MD1CgRO/DczELY8oNo4j5Y7D/WEyNapooxGdUAzfN7/GarENQnjQ7GJQF6J8BW0FNISYPz8R4t+39a4ttgNgyOF root@976ceef0-3527-11eb-9896-aabf0c108015\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+5revjOE8mHzSSTf1elH9NpgS10s55dUwk+U/n8/AUd1NlQDmYU7O9zkz6dF5VWH5MU3umL8P8+y6R0UebCWJ1G9s0/qLPv3RDcVBIVy6k4cNLjBup1FL5X3uABRuMQOGABnthpHkeU/yIT0mOEALSljJxG7pxm+iIx/nD9lTP0/BdTG1fHSk1Np9Dv9D181ofkyrxIGmXReovVrLBD47MfqaqT40LHeFl1hHR2BKd2esaku1YaNVppz2Gb6Pt2OmvGNCA8ETbnxUfiX74tEfdF6w+PI7zzR3IWaeHnIBWSDG2fLhCalFukgRVKRm0UqGk0yxyVAiFYoIaC0/J2jl root@3c5caee9-3670-11eb-a25d-22a534811c55\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9RRODFCtX+zlJM3wAyeu6u3QBPNb+5IUhOzZzL83IsPR+m+GNZFHtxkCDpnEvsPz3ovmlxprIrqH6iucWwDxzYK2gGbXk3xkvbw8SxOZB9rdzuYk7Dcvkz7kEkz9hAqQvRSsImHxvTCcZYKXxmefECoBdiq56YihqSv7Ki2btbMvYWFvPVyThElAG6Q3rCAeDUS9T3ccRE5G1DYftF0H0snKX5F3NSUMb34K8CFYtqdsmHRei82srepsa5fRjkpe4r+bkpO68q9G3DWazeDY7Fu9qIJ2zLMyk/vu0bID0FCFmzeIStKgANDDAMem+BWCy1jD/XVCji1sS4qT8BczH root@8ff64f20-448f-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDfSQq56IxDi7T+aDCK75c0HfEq3gx4g4EvIUm9Q54MnGh5dpQRZUMIGN1HZll9Ye/AYYjVbAmwxDbogMoXEJtq8SdU92TEjwhnwHWoBupWwSRgOfTReh3cpoXLEHz/BW1eaRtew5r5BzP7Zuq0Whky4+D/TLCjDO96HVIv5FqwyfWO/ANH9IHNCnQoIl+8dNZlH9rZjS6Sll0vmXevwh/vfogG2pkkXo+3JCzm/rUaj2hqOA9D+c49VADD4ZdYTiu4T/+tf8KNZfU8zFq1nFw+xlOjJVuYiGw2TdbrXA70+0DEUoUlN+jqzfdK+pENZvAFYKtjYvi0vtDy8CeqMcbt root@cd3d02ab-4a30-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDXdhrAKbOksf9pVOl9/IOFR1QEUJya3GrYKR4RHcbfe2FYcEhtdd78/B0KP/R/4dQA09KSicoCtKjcQGnL6x/jE4XzwuoeWkQpgFrZtUT/hg8sCuq3AWOxVI7I4RAWX6iCyIoBWct2wdV/952lUlvs5TxTN3TutXz0f5xoH40CdT207I6oufcg8qdeOKBPlYqKCp/GW1436TazVA2rFGwq0SACFuM5goSS2TpANclxxJK+HCYOBpZUW99W4b0bJfHlqbd2M7wdWNDb56Na4PEUynBcTYp1SRxQ0Aznra8gOF5ZgqeYDwhRCQLPyBiY8XrkhyBNrTM2FZSQ2gU1NJjb root@bb0f9907-517f-11eb-86b7-56818f023517" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T11:17:30.948-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "965701708155-compute@developer.gserviceaccount.com", + "id": "1741544459710771669", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-116", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-116", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-116/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-116/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-116/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-117/description.json b/audit/projects/k8s-infra-e2e-boskos-117/description.json new file mode 100644 index 00000000000..b3699a5700c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-117/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T18:19:16.266Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-117", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-117", + "projectNumber": "1086176833217" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-117/iam.json b/audit/projects/k8s-infra-e2e-boskos-117/iam.json new file mode 100644 index 00000000000..6e4ad539358 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-117/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-1086176833217@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:1086176833217-compute@developer.gserviceaccount.com", + "serviceAccount:1086176833217@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-117/service-accounts/1086176833217-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-117/service-accounts/1086176833217-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..227f88a65da --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-117/service-accounts/1086176833217-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "1086176833217-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-117/serviceAccounts/1086176833217-compute@developer.gserviceaccount.com", + "oauth2ClientId": "104857034858792971801", + "projectId": "k8s-infra-e2e-boskos-117", + "uniqueId": "104857034858792971801" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-117/service-accounts/1086176833217-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-117/service-accounts/1086176833217-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-117/service-accounts/1086176833217-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-117/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-117/services/compute/project-info.json new file mode 100644 index 00000000000..bd1740cacdd --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-117/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCyATzV2GcJvVKHBm3CFY35g2ydaW5jbalnEQOQcXmeDmHO1fG8HbBX1AM7ze9eHgpvu0N/5Hhk9//MWqW5A0MfUL1fDsf7zTWEmnbnn7hQlMYUuao5VquEoVQ4RNaT9poDNSSwxD+x+arag9GCl0qdMLhS80ed2O6B7wab5KtrkKTp6Ik2CM9eG012aT/FO3rgVXT1tzV+Mrqv195vYVwFnj+v2tHzkAKyP/ISt1Lh8QA9f2tcDpA4/CKbuvikrrCBuytn7YD88OtH5EaAB3If4B6XbmLuhHpmQGmUpuTp1du1zWG93i0MGQ7ZnIlPObuF3nC23OAxCxk37H9q95GT root@573bb474-def0-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCragDote3Jgwc4UvjuX9gu8uO2N7IFeWHn2ySPIFv6hyOFofjYFBSbV0raqf+24UcDpmVUQ1VD3cUAHrH+py7vEXzqN2maDZGT7puI/ab+73Mo1ZetGvJQKnqfNNFaBYtCuQuFw9EoP2TUt2oLdepv/RlJEgQ8/BpRwHm7+EqbpsB78ubfINpNkn1MiTwFbl4cVl4vdNV2wTwdlt/Is+m7gOPCqZpNWPsSEg7x4ipHhE+XW8BNEuKPpRMhQ+u+taLCFNJvK//qT+7hUE4d82OzZDPQ7vJlQmH3whXL/zrSetrMj8e3EkjyprIJP6ES2R4pj72SK+X2uK/CWfjYFX3V root@44bc2d94-dfca-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDdAU29Pz3rMK++OWStKyLVkI4dvqTeTUSPxJ5y3WStnisO0wmOYUCB8sGOzKYiIDUomHVAjkspTBF551zcB1lNVnsxrMjZX8FwCCTZprNZRtmjMehvwqC9twrGMYnhosq0wnQLujyoiftnQ1zojjM42Yzapf7bs+UxZU1HxV65GijiClOm8Un1pl2Ff95jtZE+PWsEi+bGpAJVpVXZ0AcxtHo3SvuH/CdGoW7lFLZLfonPXKbxB2WkyDFQ7eil7CdeXU9kMBFOrKD1cViGqRz5S7QHj4OqdxIHdveA4DiEDD9hFbDydxgHAWql6rw//m3DSb0wwyFZacJ8AZfg7yyv root@fb1d9960-e061-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDYEh0kntAlrDsDP0voMfFLg3WokDjyx4kMMtbicSkouvvaieuCcx0l9V/gjtD4jqTBhxSxsUVRhIVLUmp7g3Z8Sl8AWI+cOm8GZzVkRROwAxpiB6HRqiHS8AEVkwwd3RSpXqIlYlyi+PwTcRC7pL4it66T/1Twjv7QjUnKJpS10h5DptGgq2wT38XohJE7OJ7BdIMNYYcherb2gbqy1w2rACxkmpxDUS9uITKV52wKkfsv5VOh7n5sVDz7NKHZ8ZyjN2uvQU+6QcgX2lbwJl4P86wAUKbik7m8iEB9+Q6rpIBKzThsmb57RJwQuj9g8qO+8QI/T2D/Ui9CUrM0EVoD root@5129b7f4-e732-11ea-8112-a64f894a1815\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9z7H/OSht7dZQ3XaBZ4pUtXsEsgeZ+HHHz3uQdZ9rFdEEMKjl0mfoiqydz24WCP7NGa29xDGuXEdXDiZxkzPRrP8+zgwOg3TsuGjsKrC2CV9OsELHboP5/elFagJWdjqrIao5nwVPunnBWPGmcwHdfqd7XJZneoT1P6Itzd2UUVIRwItqDCGX84mJBVdB9X23OrWNi3qP0pwXDJ+P00gzSYVeMjOVwzyBK29jDYDyIVzUlj3PVOyb+WkGhZnjR7UyYTyqEaVl6XJPy6WgYpoZDDdRudF+TCL5xsWEYeqXD+s7AFnPB+jh2sie3BxjJxPsOHChFYwE7a8hS6U9Cw2L root@418d8687-f4aa-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCyboUGIfEFTS8XOmAJ5G9eazhbr0w3mn3R6i1lk+Y4aAfX3H3xq5FWBX6biDn5Cdj+H03Upv8mCsCzSe4KC16vLtW9yifPr3SxemaxJtGTuXDYu+NQm6n7f4rYDrN6/Umz4ZbO4so2njEUsWEStyl8iv/Ji1uRvczFoVMxJiFU76dgP/DHJtQ2cNGpPJCr1oWaWzAu0ezFtZGyswzNh6okI7Q2vjkb9yyZQ9pQCbADQ0U8hSTnnhfXyz6PjfKtWRNSMiMki7OWdO+r4NrRSXRe9qlHpPsE8QoMbh+pfFKDQYL6ou6/pR7Os0q0wTMIn8HhfJrDwzePi6XNGdF5AQU/ root@b87c461d-f688-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC6ozjJi6B+/sCQbMQ3Ze5haRnDfXMyTiHWFUQxJXYC4/IRRgNGEZDj9hMVNLUGVGR0M8tyMwOFkGleouXKXTGVPb9BxNtZZ7rmYWqkxvUvTpvNctgiwLdnrWku75Gt8IJ8xl+cowrGi9mw6ft1Qc+BkojfZb7yhqCtpgEyrJF5q+yOTjG/14ClY6YOtj3qHypPlX88SDsLj4+IBclxw4rKzPcM35PCbHuL6DRd1hEiFq4yeZSI2W/Nv0YK9xrNWDyWJeBVQY+85fTw92LVdBNsKfL+8fiMciJn7DReZ+x6nATj9Hg23tcJFJVOdhF0/cqL6KlHl3p1YEc7LJNvWAo/ root@d0192688-04f5-11eb-9dc4-ba187aea6a9a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQvPuOaJQa1iA5nC6PpBmvhRqc9EFoQhhNZH/B5uuXn2q22t6faNUPnQD2Bj+0uCkDxig1pQ0MJevCb9Zff0EenU9C1JKefvQHdAeuayMP7OJ7ACWGQff2V/6y0s771D8fVmZrUXGQl3xxV1LwWJJ2O+9yZ/7FqniXsjnaF9QWc4dHsr3ZIgl1B52wcS9ReASKTPYQLCGV1MGQEGQSa0lXFVu2JD/v5igU6ekM3Djhzi+U8bCmtN3Wfvt99cbbF6L5lu7YYR9Prn8Ogkz8fPurdphpexKmcsFA+2w1aYh4T2AecPCmRLM9SI+o2GvZ8LoHXSm1YrKYJvFdUC4UOTuv root@bd5cda80-1670-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC1OS5c5WBvvh96m+K+3HcI5JdGu3i2DjTxWjNXuengzwmllbg/KEZVFB7s1YpKRGviwYHEvLu3CR2vPEqIYbqO73Oz8sYBQNQj9W4qaryhNWvD+lSnAFwMt++7nww74rjIhQgq3kimJkoFmm/eJaCVySlaDM0SveTgzt9U8yBzhuerPFRJfOhL+s4yYZUstD5YsQNmECFs9nMrQkjw1sQs+J115A7qBjuUjIom9nV4kYkSDSgD6eZmcQC1k47LYuiNrMVbWBfh40NAkXHgrBSSdhYM8TYfMcQbIQ0/CCjEfUBEgI71S7gfHZINR3AGaxOKT/+WZyHfDTT8YTnVoh6b root@8ab6b9e1-27eb-11eb-bb1f-6e397dbce9be\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKSbezceP3rwJnQToluID7GJSE5tlIxFbncxOD79gOemoG1F7qafBfWR1AXy6Z2zheBOkpDxqe0+9cwTblugET4Gp6wW26o/vssROSHSrd/T2MHSu/BWXi48ilOQAg+JJAIcBe5mBlT6CieYF3hthQYIgA2my8KnbaUtyGeRa3pScJHpYnUAXJS219Tnujh2cZ/6dUqeEHghB6+reNutQ9PVbVObGHCMPAoiLRUdpB4K50cp3jj5ZWMs6Kw89ubMUkBZlP1NzjpFaaDsz4HZUig6HN0b3pTjiqwS55mLx7CwS6zorFJdJ+UIdkXXuuY1rSGLSCi0NcuN1D5zgrad+B root@2034b41b-2980-11eb-a35d-7a1d48297fba\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDhA0oY8IZmYjtJncjiP4fHCZTLrIKJEI7qupMtioZRZ7GEEgk1XCwV6Z29gQzF474JkBjlrSX/c9nqmQ02RuwC4kF0hgbtTfng099uq3z32duJZ1Gm7BTuANqerg9x6URfh+jyC8U4XKZfsyuOdlzSLFM1iZsKcK2zBAfGptpysWIiRj7aPVmw01onkSGkvmL7d/UqkG7AEUD2XdYm/ceyTaHLie4Uh3uVcK+xoUF7EfXyZJziqvsy+r+pMqqWgQ/iiMPLXKZ+S883cY7Yw9ggzMJc4iDs8y+llhGyqhNpa3jDo5TamQavStuKTk1rIDg7QUZvpV6/4rdnkgUAuPq3 root@2232db62-42af-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJSB/gdQHPj+w9NIUC+8n/0LDMMtxh9/hv+qmnnSGam9ae9Tm2M+PMKXWrjmqhvEDT1UmvNvylDgWDGEZfmlYXCIWO4p8eKzvvG1bySO/HuiIBsVp4JbA+3nvewpPITchE3Gsc48WEvCU3VJaPljTHZv4KSCwsDtnQ0aV3WImUUp/NEDAifVU4n5gwAomHfhIui3Bpl5jbdhRxw2BYMQkGroB0FTv6ewnj3lkTWLlDIVg41cQb5+R6eDnqFHN+/36jiCSfLCUs7uj3gTPb/blFw1z7RbK7ZIGdGFouH+B+IOOirwjaty5ouG+yNsQF8WlIIWEkCeJJvN5aUHgqQG2/ root@3a5a05e1-4b60-11eb-af93-4e5abfa0c065" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T11:19:26.628-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "1086176833217-compute@developer.gserviceaccount.com", + "id": "1289525059049500993", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-117", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-117", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-117/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-117/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-117/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-118/description.json b/audit/projects/k8s-infra-e2e-boskos-118/description.json new file mode 100644 index 00000000000..89f4d368796 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-118/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T18:21:28.466Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-118", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-118", + "projectNumber": "600851906224" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-118/iam.json b/audit/projects/k8s-infra-e2e-boskos-118/iam.json new file mode 100644 index 00000000000..b92344315a5 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-118/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-600851906224@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:600851906224-compute@developer.gserviceaccount.com", + "serviceAccount:600851906224@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-118/service-accounts/600851906224-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-118/service-accounts/600851906224-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..ed346904523 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-118/service-accounts/600851906224-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "600851906224-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-118/serviceAccounts/600851906224-compute@developer.gserviceaccount.com", + "oauth2ClientId": "108430648704728603418", + "projectId": "k8s-infra-e2e-boskos-118", + "uniqueId": "108430648704728603418" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-118/service-accounts/600851906224-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-118/service-accounts/600851906224-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-118/service-accounts/600851906224-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-118/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-118/services/compute/project-info.json new file mode 100644 index 00000000000..ced0c5cec30 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-118/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQIIA9VKkDkLMEFxbqxFXiiQDXWgW0xm5Iyg7s9GaUb6MLTDDmHk979j13MdVirY30TdmDW+stNvFvLbgdjqqoRuVQOzmrvKPB6NJtVnXL4u+dwYSGiRlFX7ahGPvu4yYaiztaJnxS/b0EqJwv+6UbYEds+15c7zIKfL54kVH7n62sJxV7kGbRnA1t7e//kF8BfEGGFUnC4cmT4Bo/Ro3N7bEwIXhu0j2Zv78brryYxQ/hU5C2aAbKcYPgVBFNztSKuEqMDGP0zbJ2SR4MlpQbs7askyrdoySBA/33Uhy1AxtZ3yL4QVTa0Rb+rKRIkCxfX3eEcR7wvWrZ3Jhg731v root@05801963-e28e-11ea-a87b-7e1d84ccc038\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDhqIur0U7QRtV66RqyTTAQQUgR4VOxVIgUzTjJ7W2/6r+/R36CsTldgkUgZjOL2OdxIgRHjZraRtTUUllSy6MuqM4Xr7q6qEh/YBneDikiWHtjV3QbIkueQwJ0dRxDl0D5lcgZ7c5iFYivEz8Tdbft8EhwT3Dbr160jBfweLJIljsE20zPTL/9NNHP1PXcaiJlIyUDw6eN2eLV8/ghxpjXprRol4xIdp/JMa+3i+4ksd+bzdizQEtyP0c1rCcQuzWKbQzdG5ysbj9RhzJmcxlhKrtZaZ/nIC3LsXGCwfMStMZStPOeouvKeqj8ONASCz/kqG7A6TB6puS6R+Wd9TZp root@110ce9a5-e852-11ea-885a-2259550e0d87\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBhr4Y0EWKFr71f+t3dpo+1M+UP0g632/le77VVlzkp8OucwK54MLFgYgz4n+oTncHBjyJPrrqxnJr0Nwz+PNXlVHS2lu3PNqbpDovy/oga4ccP9p+7PKqpCRe1ttMf9fQraPXW+Anqp0NboaFCjO14zFCbCdLvUqcxclhRHC98RHRJFp7bmvwIge5QGkcdCHFnNEwbkC+hI6oevDGoxGqaGZ9df7rn3nWT6s/F2oBrc57i+YQkAE51FrENSL1FZlcj4NpGBGvmSzSan3xNQWiQzhqjaCY26Q4FPEBZVvxKfqTszjviT7cpa4yrT/O3VdBH0OYYYhP27y/KmLLjXUT root@c6f1ffa8-f1ff-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDqHTAXDJpVoGskGO7tJw21jrdXpoCmCNR9h0fonJUOh6orNnxGCdl2UrqdKcUjKvMK2TLxcKTKRvMmE1zgXFUzy1SvwNqM3MGOQaIoYe89qZyJoA2g6PF3pGbfM7Ki/zln0eyvqCsoV3E9Tq322D4eqsWdbx2SLvOZs3Tj2bdf2xsIokf3aNtvidXwknPFvN0iXENuRwficGC3nVnpIDJooot4vtergUgcGTEXA6FYn+KU0InVEI7zHa1G7/JHajiiz7JEPAmSdIhjqrGAJnOhG68ptWGf5c+J1saQ9oyKcIVnzOyNxhFvIFinRQ4JdLTP4ST9kJZ/TZTJP40Y2u7x root@c3393490-fac9-11ea-9c73-86173d37727b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC4kVtbJ2Xr2ytaxfXr4DtrynGwXzI/IZPI+5R/+LfEtoJhAY5VJadXqwlAjYMt6vdfTVeZhPgKJ6szHV2uhAXcIgYM193PZPgktUQWOnFf7XiFKZX4QDQbIFpdR/UVkxp4HUYZf6xMRa8tyH1eQl32iOG6YPbxuM4YHWEVVsv+uclElhGeya1gdnwDTMUO9LCHcWSo47zcUzh2wZDBttrbfFpl54FUKWa2Y8ZL+NxcJL1UicEdoVGogDSRbZFirOXE3nScVP8/2LIsNMlo0TJWf5UPPa2d9osErktw0N87iNezpR8KCERp0lEbD4SqLifCNuOrBEcnMTFBUGm3YY1D root@82f22793-fd28-11ea-bf6c-a2eeca28ab84\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEp5B968uqUW8dOwW1OuUw3OEArQ+Xi5gh5ir9bcGJsrGh8bbxPmbBfpL5NS1uA3RexLmQXH25WSozg9bnWiIroIxZNrsiNk0bjeWuqfoAEpoBiOzogWV8dur9yUQii8oVgqgRz6lwsZAYDKuLi/WqeuqotBdu01p6VeSEoSYP0iHyBANpE9iGu12Mn64/sRS/SqwDMzRuODrEG9DDUjHnkb6L26uP3jID3oXgZe0Qdrs1kkkf58mTZvN15Ul+4c227y2OXKf0PO4jSEhugfSmi2NjrFHK5L0VLoBCMcjQrjtOZdF6j81CU4qQTCJMEri4WBy8NRy8/nalFX/SjZmT root@3d50b468-0574-11eb-9dc4-ba187aea6a9a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC63BDmmxxDGs/uEcF6gqrLN9h1wC07mjVxLi0f366gbEMSSeZnpDFCCmTcn0OYTNTCxhLREq8Z9Xax1mBnwbN+mDiOlnVy0uRTSgw6BZuRuC91j45h8DhJXvPSWCauFuqJa+nRa0c/g4W/tMYMsrl5GA3sLvWnBj91tuw+ow4oEBx9OEG2nIWuJVs5q+8FzyxFGt59fYxFNLA+PYrTM9XQfo2uzPkWb7ocirZI226wHeemSDNp2jqDzxpV8Wb3FCUsxQQQDIKZVd8Jsd+IlWDxGiDebY9EduWeeTym+eCOxNBb6kuET1CvJ7HRd/+/Mpw3NVrAM7mXnEdXUG17SZXb root@9fb2a896-0c90-11eb-82af-de22b9665164\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC8mAlUcOnsA/Nx/Ui9h3rJf997iskO1hrH0sDpYp+hmAhCBi0ceOdsfu7SlRjbXlC28mNkXE//ELFnzz+p35aEX8L0+hijiTA4rUA3KODVo48PzXQARrdHOGsrr7yaJnpK3yrrc+0FS33Lb17VueRotNG7AwZzsLfOhP6c921X+rOuilZknuDNxtd6DWM3MNH3DHT+0oM/Ls5XbIHOcYRP4qQVJ6/rkTSFT+a4eJ91OzUBj6V8hVAsCh1jszQ7u9kjY1GCHp2oD/R0wOmUU4yFXnwrgrqtAOtaHG/o8UgHf1fWqztffjWiGgWKV5K+pHzrrx+z1HSExU4kp8n64rGB root@650f618b-127d-11eb-a3cf-6ef374375bd7\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCjNOK6sh4Yytr5hS6FGJ3IfJ+o5kgPdnqy614H6YhjuF/+dYR0WjtQqNCdaiOCJGHfRo0v5AfyEDa5l42zPQdq8mrkuGMltGK2SJUuojwLo4uqS6+9JSHO9lyOAy9hm5QsVHlxpVI7mzqrELxtZSALsguzzyTpsx8Xm6Qz4+ZA2YoIjuPTfWwxrO5ITMpa93FXtgxhxpkzYGY5nTMbk5M9dNtZQWwmgUX0QqUwbRDm540EuZUU9XzAE2LYAqkj0aLCuW1IUck9wB8B+nKO6QMY600oGtMPq9unoiN8ODHvXsb0jfYBorD57Zcz7qQ4jHPoVGQOGNuY8YuqcPl9fJMv root@240fc18c-1a18-11eb-8779-4e6ceb30be03\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZfXUObft3kx0RfOz1AdsfbXMIA8EubC362cJgr/QLgf4iE4DkxIyf4Rf7xzQE/hXhdTvAA3kpf0kbIza75pQ+dUIAy+LXSjt5CHqKjkYr/Cq1RXhwp337DrFiLO/zlr4amyo0IaOdsWuI1iC4peSoZnI9ulRsHM4aemnZOQMLtFeAFju9JumsPlM8To5jadDs+5gnwqQ7iQNzBMV0XSKo0IRCod5DH3X43P3j7K7zv+sj9zIQvv/IAI656JM8SxEv2enFwmvH6iRLXpQhC7ZyYjDIIOyB90wjEUFDQikurQYnEe2agsIoNNtG4km16IYyFaj4EKRZrNvvMc1/bZ+V root@a643dc8c-4df1-11eb-af93-4e5abfa0c065" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T11:21:38.796-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "600851906224-compute@developer.gserviceaccount.com", + "id": "3750982425683701469", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-118", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-118", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-118/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-118/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-118/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-119/description.json b/audit/projects/k8s-infra-e2e-boskos-119/description.json new file mode 100644 index 00000000000..78d1e4a0e77 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-119/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T18:23:36.597Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-119", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-119", + "projectNumber": "329234377247" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-119/iam.json b/audit/projects/k8s-infra-e2e-boskos-119/iam.json new file mode 100644 index 00000000000..2a3f96147ae --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-119/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-329234377247@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:329234377247-compute@developer.gserviceaccount.com", + "serviceAccount:329234377247@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-119/service-accounts/329234377247-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-119/service-accounts/329234377247-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..4ac4c4630c2 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-119/service-accounts/329234377247-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "329234377247-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-119/serviceAccounts/329234377247-compute@developer.gserviceaccount.com", + "oauth2ClientId": "102904612941735274226", + "projectId": "k8s-infra-e2e-boskos-119", + "uniqueId": "102904612941735274226" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-119/service-accounts/329234377247-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-119/service-accounts/329234377247-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-119/service-accounts/329234377247-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-119/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-119/services/compute/project-info.json new file mode 100644 index 00000000000..01a5d7cd558 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-119/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDcQT0I98BUxdHBslCSw6oOqd4udIkFhUVLdkaMT05gG1qWLrAK3Be9l96N2LnNzpr1xL0jw3E0SNGRcY+9xGBvXndlVklH/k3dOCzUs+Dt+0kq5Yqc1RjC/vbkjUBL0thwAwbZ2+tMmbnM3r7SD+FgAIvEnYG1G82X6UeVgLmdH6F4kpEf87rNJT6oG24rPWHhfHnfxh2Pn02U6DczXRo0pTSnV4Z/56ov8yf0rYB0+u71sDRcLjtJ0rexOCM/FAxB6PMV6IZXTN5syXhiGJCGBxj6Sm57jToJblKn2Umexg+9962UDMnogAUHlZaNnd7RC9LkWtnrh38nfDAQ2M1v root@38da0fc6-dbae-11ea-82f4-1a238816176b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDvIs4TXU4RlFmyPTCwRYkAgnGx1QDoYl5gCCA8cOjc2t1HtJLQbK3QsLIgY8/UIwpSZ2IzKirCUfmENvSBcxA1SpuOXvHThPXKCxHYthqxz2ZO66rGDsFuRulQhaUjLcUh6B70wx/hI8i0rmpSWNkeH5YrZi9MhRW2XH+uDt1W+Y7Y07WRfaq7hS+cZ08lrh1Z/lGIZgzsGSy3jLAWGT+zWHqxmWmHJEH+ZWY+yt5H2ma5hCRYVOU5WDwUQQJ2/Beh00kw08gzWfnpyUsDYgQ3HhABuWCzJiBdjLs/0C7wK4CDLG+s7CE5xYlHV8SSP0jagILV1mR2Op1SH+9tW6Gd root@fb965424-dfb0-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDE9MbIxGn7Ks/XisIYFFpSXAbC0zbxrfHr/jIvMuKwKkBbIAdo+kIkmLmZbocQn244iGQ25QwD0qkB0gOx1WUV6Wse9RhTRit3ngoNiBjV8/pYniYLLvgNXuYRGayGmOMsi++9OJbc1YbazvIsQP6cApAQJTy/Z9TLMEfpjAPQzrBnomlGTH8EUqi0KiDVK6HT94m8B8cFPGeoklE7b4MnJ1T3n/LWkbMYz1FwaLBRif4iED4E5giMAVPrFgWerUnFBbcLs/jgI4xoGqvXUPWltvHwYjOnE/+DtKsrTINL8dVBcE4DXm67suGF10C9iMCqYz93eMZb3UKEWbSh4u4h root@12b31cf6-eea4-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCyBWE+2+C4da/pcyylw3A+tyQAwr6+aa8QVus1rKD1mNeOl2GYhkY3R5cPEL2ILhfTTewuW2ekXIdbwhu2C08emWROvKCrHUEXIYoabmpOxbTWE693AsfBzzNBoDq6QI6CHtXcvcatx2g1GkGotCEYmgKZ/F1P3ff9rc4qpgjuAWkxdtiBpRi7MNYMhOhk1dVBFpnd8ULtFKyUekHn+sus/XwxyFHcjH1It2s7OYA8kZUo87vJGlEpURPQ4G1SD7gVacvZcTZx71usPu+MUgqFtqcPXvw79D0bWHPp8Y1eiWRwRKCdo8TolJ29fj+tvcb5GClEAH9j7umnSFIG207P root@ecf5238b-efa0-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDi9OMDH+EYRQ6wcxOoZYeC+Rnboz6OI5X1/nB8o4N+FTOeq0rg0PaOVwIakUHtNOx4HYWmSvSfMvWKm3uxdHnIpkPUthVn5kz8bzGl2nV9EnWCNe8naDIdbiVxcRgGl38YoW/S8P+bG5L3Et2fegOy4SoRTABy4fwrzCLOR6zCkIpOc9HCLWmxlzJQ4MakegNgL7lx5WTWFadY5liHZoh/uyaHNEZf21sg9qlt1Z6zgEk/j5OXjOmaZyh2oQNyPqKEWvHax+6ZyhFQQJbcXQDgR6pGhnWZjxQ4xpV7acRfotV5yZa6sq6Zs2FLNnzUrRHR0tyTxMKLjlmHJe7EVKpd root@90b6da1c-f1c3-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDGorYIAKGaTYB/lzEvBkePlwqh2/taG06RlyIqEMZjQ7USfR+MzE7tb6hVoDJMbkXd9qS2GDgvVuUs2oxC5pIpcmx2/3mZ1G2ReD9jaEvDgk/TFcTKoMf86FZMr7o8ukFWOzpWGCte28XjlKzrtxLB7hRiDUjCOsx6vswguwYd3o7sgxo4zj1UFPxUNS9bnj1dFkcDAHxaAKMaeiIa5ru3W6mdisqsIsxI+f6tWAXVF7vCZCAw/cfOaZpzXDKbYLKSAolcv6FDtPoTHcgosCxjm9Y2XqBJ95BSy3yNJOejpGR4HU8Y8WpBDev94He5n+KfjinIOT5Ox/2kUyf2opYV root@66f056ee-fcc3-11ea-8986-ae48fe2da37c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDAxweXoiwhqse5ckuaem9lodf2nc1kKoA5rxuJ7M6ecQai/C7gnHVlPn4h+4AsWJN5YURMIZ/8Zv23kfvCIs6miIrKUEHBzMpT3DGMmwmnF5z+rE0pov4fVxpS8Imig4k/w6+po+XtokRL3OlWn2iLw2MoA9k5JQvj9K/tLw+feN4HFbvDeEJUbVCletdWgHJJq7wUygMCLR3+0pkaSfb7HrH1JFXBHojghLJ78wvsOQf65kHzFNXesfiOrV8K52HLjjE8jU4d8iStp9jnqfvXuIZZvyBiHQ7fTFxVX8t7Sxuko9sCWfjadfwbpNK2NtIUhlcbb/5aTQAsNowL+Fob root@55c2631e-fe25-11ea-a78d-ce9ca29dcab2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDTsbz2dZGLkmXmt1X+Ac5keetzPqK3k9gIEElTjoaFTnTsFYlk9q/efcJP6F7048U99kN3c5lSdYVtRp2aE3gQ0icpv8nrE4zUhib4moN857HGmC1YIa+bk/T2rACDrIbO+qJtSjLl2UuJ1grhNO2eFTprabrELKMbi6HvedXjJ1fq2i0HmwAK9rliGeqKxDkTVnKURYbcD+YtvqcS8c4o1jKKdMhwZOCZKAWWYiEo2Tqlc9kcCRxeBq4MZhXbBTzjWQ4PLmfLiIRTQY01MLdQXIg4F7TbsrlkTTwCMeh5v9oKQeVXBgpGP7pdMaw0yKWm1OE9yymEJgsliTTtEGDp root@5064361a-13df-11eb-8a3c-66d0ef5d093b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCexCM/O8lpQSgntkqjKDNf5At8lZsnEPRt652kpa5h6VloBteXs13UWzHDFnPHQ4h1D5ZK2rcNDyrYr48cm/uU8e2Ft6J9eK2DzQ5POYgAGcG95kDJkW7hFPrZ0Lq+wCvn03Y3YzOWu/v4V/lmHZJ1vjnJmaNectSV9NQEMRhpU3M6f9z5zfFv89PsDQIym4TOTw+UzhHlzWzgxvPYAL8PeHrAb7gJjqQFmzoPP9RmysZCdkI7gOw4o3a3+vSQLoyeRt21t0UOZrxT91Cu1Fda5jq3D7hmYQQw6W6itlf5xIyPxI2fdUjgCo+eMybBVxAVJ7N0zs422Qjew8LHl4+f root@26987c3b-1967-11eb-8107-96bdcb308f91\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCuIaPGA5DrcwiZD+mpah0VswrX2gZ31Rs+5OfzDtTQfACFMoKHVfzsLlqFcStrMAC4MX7XRYYrtBe9Sn1GgW2CM81FZsGpkRgQxMibwaiOCXLT8sW4GfQRlAAOnQn4GLZQvVIFxJHhXuV8CcFLmXfKrgkDHR/di6+h4xOLC86KvuRrxXVKYr0gO/gCMno/sI2uXwpQ7GKz1FXomr2FWO3BF2SYk9f/Xfo16DKeTf2ltFjNUH8n/RWkKSfi/UwSMpvxYpiBSPFbwjuDmFGzpJ2VlLO8mSVRMkZfUW9xDyeHFCVxYNb2XkJC5d2cxpFhvyNJjM3qgIPTg3nwv/CyHzNT root@64f795d7-2afb-11eb-98a6-ba1d66ad0079\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDmMOcWsZ3JxxYnL2DQOBL70IGu2dLQidWKb0t3huBDbCx8XfFnQjHPOM8LNTJfeYjKs3zqgjpQRnJPKx7OCbeOv7QZxoTd8q3Gj9pCm+2qJFo81GkjCJXhw8oB6WpTRPb+1A+lEL1qXDTclt7pxRg9hFf4AzIzjWh9Gb2/bhdL30vMrO/FBuCu60GJMF6dGVtugBMbBfn4A43y26hphtbTPcMsT2bNRdoUxJwpIthM7SGaJu2C4FO8pMU+WKawlYkQbTzieM6aNYO3cbIqDRpLvb88VmZWttli/vYKdbX1bH9VoCoTwPVYHlu1iBkXkmXP463mjqsNad7FHhU5yFI7 root@c652079c-2c2a-11eb-a59c-42dfb897bae6\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDH4rcSX75KB4Jca0bfK/iJBnd5u/UM9t2D0DDaksWI/lL1XMnuZmhm8aG0McNeRRu3/tCMCGOT3CQKw5LdaKihVb7hikSEQIG+AJh4TB85BlBzJ1JDHRiBLTearzLJuJEBydxHIKdoa8sNJHfAoqT1WIYgFJzG7JuHCyWJzREnKDIdPXRS3ylmB5R3f69nBkuMv9lzVMgmsx+QhuKPcgfdWhHXfyyqF/4dAmVK+u9mdvJmhTrjTlTc5fq4h2pGfpis2DbZhtzRg+ITH/bpwX/BkqpbA0jCzzCT2SLlbKrw2ahNIFUnh6poW0E21+LbxWzmNYIuHowYA8Tkr+opinhf root@5d60626d-3037-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDF27dQet9fCEjggbZ1AQizBtZgxz8TFpqwPzyYczXnyWaz+15phsuAmkVQJTtO0Lv3T22j6QqriO1dR4mCRRdklwDKA/QG1EEynvn9IPDX8SKedNj6fQljN5VAT5EAGvvmXF0HdIUdhu0VjYkc3NNZc+pphc9ddMqGqnrCG/XEcCRZpIGlCLmSEsOoyDfHso8JU1U842F5dPANCRdSEZnTgvdxguS6Bb0G3heJkJm36cfET+CrU8VH4NwCuJxWUe5hHjI1vDDWtc0hOc/a71AoioHQ6+Lw5La/YTlu58G/WiF5HY3N90mORLS3maUB0NYIe5viDA3J0OGb+TXbFMij root@6953223e-46ee-11eb-acd8-6a2a49dd8a76" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T11:23:46.945-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "329234377247-compute@developer.gserviceaccount.com", + "id": "8782888027171860061", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-119", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-119", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-119/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-119/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-119/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-120/description.json b/audit/projects/k8s-infra-e2e-boskos-120/description.json new file mode 100644 index 00000000000..09fc4243002 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-120/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-10T18:25:19.524Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-boskos-120", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-boskos-120", + "projectNumber": "191832892243" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-120/iam.json b/audit/projects/k8s-infra-e2e-boskos-120/iam.json new file mode 100644 index 00000000000..19bdede66ea --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-120/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-191832892243@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:191832892243-compute@developer.gserviceaccount.com", + "serviceAccount:191832892243@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-boskos-120/service-accounts/191832892243-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-120/service-accounts/191832892243-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..9c6606d6c5d --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-120/service-accounts/191832892243-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "191832892243-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-boskos-120/serviceAccounts/191832892243-compute@developer.gserviceaccount.com", + "oauth2ClientId": "115161880282253964273", + "projectId": "k8s-infra-e2e-boskos-120", + "uniqueId": "115161880282253964273" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-120/service-accounts/191832892243-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-120/service-accounts/191832892243-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-120/service-accounts/191832892243-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-boskos-120/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-120/services/compute/project-info.json new file mode 100644 index 00000000000..88b485ffe28 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-120/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDeSGyXeR8Lb1eK+YvUmTh+j1J6e/EU97wwH0B0PfJWoMWCZvieB13ix90griZ/5HWInMwPhj2wldvhGSrHTrmPUDZ55rIji9bOKJ5hd8HK0Zr8cu/cuwMEY4xmCVxXVksCzN8ZxQvH4l1kIV//qreSYMtPHAT9JXDQs/KWhZlRfcKNTjbH1gUeNFIDK+NV0Spdovcbb9vc5YE0fjh9ZSdob9xIZ5R2vMnjhv1spkCAkQA5H321dhfGV91j5arMCdYZ3KNT0AnbFV3A7LMuhbY2UgX9Y+r72TAOv4ldteZYYxdUH+W3L1onW04al0SWf06em9O+MdGpqisTTLzqm4IR root@0e4db416-ded7-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDoWR9XC9/Id8dm/GTEUlP643gr+LT0Q64S13QXNOxLlEDzKBEW/IcM+Xg1ckhhNQ/CCpBTgLsvRTnqdZdeHqDZDNCqCOs1zmSIv8b1o1W0+QRvk5UnHlROWIJq4GGnbwx+F+bXSufLoy7rn7F/fzgRBaYDka1ILzs/MG48JBRoE5xfp8Vn+dHFqTRmjqWzR5V2jScRG9fBIGM293DjqmF2NuwLuUutQZEVnxOsxjJx3pCOrnObeEYokZFu6sw6rf788HE2WiW5vpyjbpj4So15ql6bDF2o5gESOSekmtVNAODg4yp4V0O2TmrqkZKnNZ6QGGsf7QJrVKMuCWdkk8Z9 root@68ee7be3-e02f-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDI0y5B7FsO9KGLvvEqW/BPtNxYmiUscowsycLOZAMY+A22WJz9e3TUC+/NGGqCtZ2hj8vdErLoIlb+6Qmz6AB9JP/3IYvt2q0vT7fSVIj1DRllze1SITqfhJ3+RRV3F/XcaXikFwwpsrpyIVSOmNqa26gjhDsMcj00iTdcFCfUayoBghDZVPhsdSPDsBwq9XBWDOaghl84OVmMqh77Y/ORCqH+uMALNAbo1YnkFfBnUNlErDKQmCZXdyyWQZXCyX8+AjurbhoBpb7CZRWoCJ2AV8XixC0MkJrRQGbBTSM1mPvCKUpQhqsBtb4FVqZfKMapcKBRmcsCm5oa+ELNiNkP root@d0f2544f-eb61-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDY+n2CKqMow0lgKGvYSsKglKwEimFHb7DHRslPg/xpqootXLJpXLK2TXQesBhXvMisj+4zoRMevDVsd1Dktlp+w7Z2TrG2BKON8PYxv37hXsogcZCqzvGqN8xysnUSbO5fwtk1CZCpTd+3dfBIPvXVTlnpZ7DSldYz0NTtd/fcAtgJBfrBQRvXvgneBzkaGHviDdmDFqDWJVgQ4katcHDude3MuUw68KmS9zbic1NhR5699dwqZxcl9Z8EMHkROOwjvXxznUZbf0unPxw0MeJFr6nyDMjHoM8aaY+It2LAaaSOijDvrZnzCg8//fO2c7dFWYB55hhIMyer0l95ee/Z root@7e92296a-f348-11ea-84bd-b6fb6d83c68d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0smf7TixagUV8N4RCzCMkLQ81m2/XNqUUPgCT0qzmsfcBCU3OIlk2OS3f7dbSBFY7716TIW8u4CjrECLOWFgPlpjP5StoBwbZMglafyxNJQ4YaSivF5shKJSqVeg2LqpT7kEqwFvf+0K+dHiaImLyiPxWWfBdedGfxcucdOSDQCXo3rI7tm03L1b5DBSEM8nZ/Ummq6TRKMhqi/hjZDgZF5NVkPE5dQOoWqctFBdyq1gIw2QwwR+kqbdCWTluzCGpXe6RwfbmiyXzhVTePjrd7vpuahbl5UKoMPvIHJLJpQaPM0eoj2rqfOS3zKK2/iGrcw8OwMMTvxfrqcvKwSHj root@2610604c-f656-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDUa17CThxpUbo9lPJ6TPo7+c4aGt9R8vxGF4DdB6zngE1jFEnYmvIKQ6jpKoI4ylmKcfjasue1/Gu834B+BbqCymjFMZ4sgvWSzvkUVgNIrtu+SmZhkyvQU1aM3uDjHAeKp2Uq4p1xu8SKEK42iy3iPaZHZpfjJf0a/YHaH1BloCVCqbYM8EcTCahDouPDuIxMa/VP8kE7oXvbBV6GKkFDtoCRwsgNYTRkc4qESrS6NnzQS4hJ40ffVnk/asMF24cAkUskGRb3mmMQOitDfUJzAVpGuhKST2580NVdrbBSYEIZ6bweKZRaz80ZyYL5OUJ1HXbtbmYOKXKoPsK5PqDx root@fe62e8a1-f91b-11ea-926e-7e7ea190b727\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC5wtU0dZ+f+4XeVK2VQzvBKdSzUjvrRJVWVGV4zTPvRosLoN/rzl0LPd8k1PwVF07QQSYvfTL9etr+uIM8o70/owP4aE/8VavJzdFFuMREhKoz6wifYUqr46eFnSbrBR2ve6jZSibG3Wa9vWoO/UX10PXTyhN+dJLAA7TE3jxxjQ9WawmwUF14OEjX07v09YrQHvcdYSsmWU365K2vbrU+PCDPG6ReyzOJ7Wnun0Rtt1j0/JyUak5q/1cj10+w3mJuT38nNSvYX6gTIp/0z9+7Xo0vCpstzSc3lFQ/wmyI4txEDVqu2gEu+ebGotEMGAL34CHeWV6MkKJCf5oIPg/T root@53dd74b1-1ae2-11eb-99f1-c6d701d1e283\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDnByj6A/Rne29JE7w/AsMWF3LfsjED7f4tBS89EaVSRTXWGqWtA/knzXXo4CPsZ+BTA7S5v/hYo/lmvH8S9J4NagKsMkl/jvcqGJXDNlnv9IBpdm+ArkYb+ywDKaHIihn3jKKQ4Ji7E5Pah+DkPANB8JFaxOcHh2obwW+VDuDLq8atkAE3EeaIWXsu38ATW8Nejl/KYHFdWTS1/7ITuzpc4UBYxaTGaOvCPQoTelvMHGgSngjxKCd3Qp3G9CuwqFWyHgqc4mE6R/KmoLe8eUGsaC5iv+ubx+YsidJ1NK/fXnDGa4N/X8ZMQiF+JZSbx4eiNSH+FzZr9FXnuTnkB1g/ root@58e6f461-1e0b-11eb-8d52-9233771f1447\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDnIOpawGzl4mNMe/kGwdNQjTw9crpdtgepWmFl9EA8OCuWnVhuvhsK1nV3CfHmcO1myzTcD7kDPqzBhRqlVpL3FPy5TLjNTIk4JIYXZ/5JDPnLFwQzTS92alKFl83brw0mNpeLd/oIwLPNTlgglPEROsqDznc2xUboOVOsOCZAThnaLOvdM89X1vKQmjaWMiNpyNQiy9smE6XsVFWCMF0cXh6rYG1OqeCZqea8ZF1xc+AEQkw4XQRhrVRZ3bIZXkgIkOiJqZID38LqIY1grKVKHo5QgEmqULFrumyDCIiqPr8uKPFkhI8S2R2VCguvAVO5y6euuHO/ibdjsMuc9egt root@a9520ced-379f-11eb-a25d-22a534811c55\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC3l7474t6iy/MEvC6mESaAFepRu/bWsRS09QUL8YAtb3++zHTJn31HYiG0VDcrVIp4SMosYoc4CGwtaFsQ6y6C8dNhaU18SrenMdyhOckDt2sHqZO1IVlaIcPvcjrkk5as3Z1yuLjdPrgsRxNa8+RwrCXAKJquhb+pqUSgKg/OeCOufyZ/JLrURI1ZJzzztoL9iRmhBNZKmx0YIOtO6TarpvBtCaftyokGBkbv7/gX4qzmtFuU7kScyImVoBMxA08UE2B0vPAqFd5RCcCaf/VO7ppfTeZrUiQVUxnc6qfFHxNyAJ++nyQopb7G8Lc+sHc1aWk8xnnz0gVPkPAgZ/1n root@84c9a426-389c-11eb-a25d-22a534811c55\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDPZqEQcEor505wwExiDBtAZDQc3xPDtxybUsc11h5b9x2bJ5ks0OTNiG0HAH0jRQMz1fX0DqSoaOri5DFfM9HvzoVTIep6nQcOSzes9OAEVveWksLKaWehy4kSk9bFogNq0Lf81qduqRp5DWJqwuMnQiNtMDQr/ud2GG0KLcY8FgwFmcHNZzTupyc0oPH4kNL1SEEyUHfMEc1R8XiI+yBEPfn89rGtV8G8AuhSzAP9jcTtBowWwhht2L+rTXRAWViMVyIKNWmay7t6xQvZsPvyPn2+2b80x0xoDckW/uFX7mgaB804UnlIHd9K+Tb2nrLiAuBX+J0tGoVN5cGf936f root@c7cd8a58-3f6c-11eb-a0eb-a663209ac437\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9qi58VJsPT9oP+8q7ZG/ktUOTrkQ7VReuzGT/LRvaF8bMyPoxRG0ay3guQNRHoEE8g1TbKaY/4U52lnCHyQvwyJS/JPevtQdF4T5zy847oLzfwLP6p1p+3MmxLVJSl+m3SnmbbeBcKS3fUqf0yKMpkU6EeNsX0IsiV2fOjyYX03wWRYx/NczsPmYIkiD9bHw0EfWud3U/77OrrHXYD0vsV/ikdsOH7Mv6+QQUmT4qNXmJ2BPAVDgrXsCR+t4wB9rM+1Jqu7n4o2Bcoigv9DS0kxkeQdraKP6TQsWBrx3+V+FntHfI6pijUw7MZefPyPrbYA7lFbqscU616hrIWINR root@b633527d-417f-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDN5w3yOC5idtvbKGGGt8+es7emRnr6ekxs//F4FC1yqYXk5RmUtO5ypN7S4RB0rEyFzR6vJ+EhqCc685k5HTKukJM8Y3ZGWdUQQmi5hvXIhs5YDZhejJAx5rd/sOFzv/rM+LeyMhPa778Wk6smcTgNWl3Gyx0yCljyGo1M3xmHefvoZOtBYJzYtjc7QjCvbZpss3l1YOS/kUdImik6fppeoJ/D92v5ZD91kmfRdYwX/pngEJkGrcVZIiDqeSGSSvtPs7BSc7Y7GhDq55Mv7UrAKDEjs5YvZ5vi65ZhLA2dVpsfTFuvP8rHps/C4mkE1TJqpV0hBJnP8XoxSiQc0Ofr root@3906492c-4e24-11eb-af93-4e5abfa0c065" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-10T11:25:28.921-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "191832892243-compute@developer.gserviceaccount.com", + "id": "8570512086342053879", + "kind": "compute#project", + "name": "k8s-infra-e2e-boskos-120", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-120", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-boskos-120/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-120/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-boskos-120/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage From 8add7de90a55e5742f0b69bc89a637a6c317947c Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Thu, 14 Jan 2021 17:34:41 -0500 Subject: [PATCH 08/39] audit: add k8s-infra-e2e-* manual projects specifically: - one for each "special" pool of projects - ingress, gpu, scale - intended to match equivalent k8s-infra-e2e-boskos projects --- .../description.json | 11 ++ .../k8s-infra-e2e-gpu-project/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../description.json | 11 ++ .../k8s-infra-e2e-ingress-project/iam.json | 33 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/enabled.txt | 6 + .../bucketpolicyonly.txt | 3 + .../kubernetes-staging-8cf5cbdf30/cors.txt | 1 + .../kubernetes-staging-8cf5cbdf30/iam.json | 17 ++ .../kubernetes-staging-8cf5cbdf30/logging.txt | 1 + .../description.json | 11 ++ .../k8s-infra-e2e-scale-project/iam.json | 47 +++++ .../description.json | 8 + .../iam.json | 1 + .../services/bigquery/bigquery.datasets.json | 0 .../services/compute/project-info.json | 169 ++++++++++++++++++ .../services/container/clusters.txt | 0 .../services/enabled.txt | 14 ++ 24 files changed, 728 insertions(+) create mode 100644 audit/projects/k8s-infra-e2e-gpu-project/description.json create mode 100644 audit/projects/k8s-infra-e2e-gpu-project/iam.json create mode 100644 audit/projects/k8s-infra-e2e-gpu-project/service-accounts/438213416405-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-gpu-project/service-accounts/438213416405-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-gpu-project/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-gpu-project/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-ingress-project/description.json create mode 100644 audit/projects/k8s-infra-e2e-ingress-project/iam.json create mode 100644 audit/projects/k8s-infra-e2e-ingress-project/service-accounts/741153779759-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-ingress-project/service-accounts/741153779759-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-ingress-project/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-ingress-project/services/enabled.txt create mode 100644 audit/projects/k8s-infra-e2e-scale-project/buckets/kubernetes-staging-8cf5cbdf30/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-infra-e2e-scale-project/buckets/kubernetes-staging-8cf5cbdf30/cors.txt create mode 100644 audit/projects/k8s-infra-e2e-scale-project/buckets/kubernetes-staging-8cf5cbdf30/iam.json create mode 100644 audit/projects/k8s-infra-e2e-scale-project/buckets/kubernetes-staging-8cf5cbdf30/logging.txt create mode 100644 audit/projects/k8s-infra-e2e-scale-project/description.json create mode 100644 audit/projects/k8s-infra-e2e-scale-project/iam.json create mode 100644 audit/projects/k8s-infra-e2e-scale-project/service-accounts/189277497252-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-e2e-scale-project/service-accounts/189277497252-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-infra-e2e-scale-project/services/bigquery/bigquery.datasets.json create mode 100644 audit/projects/k8s-infra-e2e-scale-project/services/compute/project-info.json create mode 100644 audit/projects/k8s-infra-e2e-scale-project/services/container/clusters.txt create mode 100644 audit/projects/k8s-infra-e2e-scale-project/services/enabled.txt diff --git a/audit/projects/k8s-infra-e2e-gpu-project/description.json b/audit/projects/k8s-infra-e2e-gpu-project/description.json new file mode 100644 index 00000000000..ea66161cca8 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-gpu-project/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-04T20:37:34.652Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-gpu-project", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-gpu-project", + "projectNumber": "438213416405" +} diff --git a/audit/projects/k8s-infra-e2e-gpu-project/iam.json b/audit/projects/k8s-infra-e2e-gpu-project/iam.json new file mode 100644 index 00000000000..16f9216bd39 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-gpu-project/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-438213416405@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:438213416405-compute@developer.gserviceaccount.com", + "serviceAccount:438213416405@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-gpu-project/service-accounts/438213416405-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-gpu-project/service-accounts/438213416405-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..7c39cd49b77 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-gpu-project/service-accounts/438213416405-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "438213416405-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-gpu-project/serviceAccounts/438213416405-compute@developer.gserviceaccount.com", + "oauth2ClientId": "107993938133854595799", + "projectId": "k8s-infra-e2e-gpu-project", + "uniqueId": "107993938133854595799" +} diff --git a/audit/projects/k8s-infra-e2e-gpu-project/service-accounts/438213416405-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-gpu-project/service-accounts/438213416405-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-gpu-project/service-accounts/438213416405-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-gpu-project/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-gpu-project/services/compute/project-info.json new file mode 100644 index 00000000000..f1cc385a873 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-gpu-project/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-04T13:37:45.315-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "438213416405-compute@developer.gserviceaccount.com", + "id": "3006934282871798262", + "kind": "compute#project", + "name": "k8s-infra-e2e-gpu-project", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-gpu-project", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-gpu-project/services/enabled.txt b/audit/projects/k8s-infra-e2e-gpu-project/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-gpu-project/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-ingress-project/description.json b/audit/projects/k8s-infra-e2e-ingress-project/description.json new file mode 100644 index 00000000000..484a79780d4 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-ingress-project/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-04T20:39:45.006Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-ingress-project", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-ingress-project", + "projectNumber": "741153779759" +} diff --git a/audit/projects/k8s-infra-e2e-ingress-project/iam.json b/audit/projects/k8s-infra-e2e-ingress-project/iam.json new file mode 100644 index 00000000000..e0abaa20ae2 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-ingress-project/iam.json @@ -0,0 +1,33 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-741153779759@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:741153779759-compute@developer.gserviceaccount.com", + "serviceAccount:741153779759@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-ingress-project/service-accounts/741153779759-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-ingress-project/service-accounts/741153779759-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..c7a13493a0a --- /dev/null +++ b/audit/projects/k8s-infra-e2e-ingress-project/service-accounts/741153779759-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "741153779759-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-ingress-project/serviceAccounts/741153779759-compute@developer.gserviceaccount.com", + "oauth2ClientId": "101670064479606026189", + "projectId": "k8s-infra-e2e-ingress-project", + "uniqueId": "101670064479606026189" +} diff --git a/audit/projects/k8s-infra-e2e-ingress-project/service-accounts/741153779759-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-ingress-project/service-accounts/741153779759-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-ingress-project/service-accounts/741153779759-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-ingress-project/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-ingress-project/services/compute/project-info.json new file mode 100644 index 00000000000..59b6ea63542 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-ingress-project/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-08-04T13:39:56.468-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "741153779759-compute@developer.gserviceaccount.com", + "id": "5169880856814451059", + "kind": "compute#project", + "name": "k8s-infra-e2e-ingress-project", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-ingress-project", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-ingress-project/services/enabled.txt b/audit/projects/k8s-infra-e2e-ingress-project/services/enabled.txt new file mode 100644 index 00000000000..385bd4acd0e --- /dev/null +++ b/audit/projects/k8s-infra-e2e-ingress-project/services/enabled.txt @@ -0,0 +1,6 @@ +NAME TITLE +compute.googleapis.com Compute Engine API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-scale-project/buckets/kubernetes-staging-8cf5cbdf30/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-scale-project/buckets/kubernetes-staging-8cf5cbdf30/bucketpolicyonly.txt new file mode 100644 index 00000000000..2f35f388a16 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-scale-project/buckets/kubernetes-staging-8cf5cbdf30/bucketpolicyonly.txt @@ -0,0 +1,3 @@ +Bucket Policy Only setting for gs://kubernetes-staging-8cf5cbdf30: + Enabled: False + diff --git a/audit/projects/k8s-infra-e2e-scale-project/buckets/kubernetes-staging-8cf5cbdf30/cors.txt b/audit/projects/k8s-infra-e2e-scale-project/buckets/kubernetes-staging-8cf5cbdf30/cors.txt new file mode 100644 index 00000000000..49a30f0789c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-scale-project/buckets/kubernetes-staging-8cf5cbdf30/cors.txt @@ -0,0 +1 @@ +gs://kubernetes-staging-8cf5cbdf30/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-scale-project/buckets/kubernetes-staging-8cf5cbdf30/iam.json b/audit/projects/k8s-infra-e2e-scale-project/buckets/kubernetes-staging-8cf5cbdf30/iam.json new file mode 100644 index 00000000000..0d3cc53abb0 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-scale-project/buckets/kubernetes-staging-8cf5cbdf30/iam.json @@ -0,0 +1,17 @@ +{ + "bindings": [ + { + "members": [ + "projectEditor:k8s-infra-e2e-scale-project", + "projectOwner:k8s-infra-e2e-scale-project" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-infra-e2e-scale-project" + ], + "role": "roles/storage.legacyBucketReader" + } + ] +} diff --git a/audit/projects/k8s-infra-e2e-scale-project/buckets/kubernetes-staging-8cf5cbdf30/logging.txt b/audit/projects/k8s-infra-e2e-scale-project/buckets/kubernetes-staging-8cf5cbdf30/logging.txt new file mode 100644 index 00000000000..cdc92ac3ec2 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-scale-project/buckets/kubernetes-staging-8cf5cbdf30/logging.txt @@ -0,0 +1 @@ +gs://kubernetes-staging-8cf5cbdf30/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-scale-project/description.json b/audit/projects/k8s-infra-e2e-scale-project/description.json new file mode 100644 index 00000000000..17167be83f9 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-scale-project/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-07T03:03:20.846Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-e2e-scale-project", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-e2e-scale-project", + "projectNumber": "189277497252" +} diff --git a/audit/projects/k8s-infra-e2e-scale-project/iam.json b/audit/projects/k8s-infra-e2e-scale-project/iam.json new file mode 100644 index 00000000000..eab6116da4c --- /dev/null +++ b/audit/projects/k8s-infra-e2e-scale-project/iam.json @@ -0,0 +1,47 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, + { + "members": [ + "serviceAccount:service-189277497252@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-189277497252@container-engine-robot.iam.gserviceaccount.com" + ], + "role": "roles/container.serviceAgent" + }, + { + "members": [ + "serviceAccount:189277497252-compute@developer.gserviceaccount.com", + "serviceAccount:189277497252@cloudservices.gserviceaccount.com", + "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com", + "serviceAccount:service-189277497252@containerregistry.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", + "group:k8s-infra-sig-scalability-oncall@kubernetes.io", + "user:spiffxp@google.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-e2e-scale-project/service-accounts/189277497252-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-scale-project/service-accounts/189277497252-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..1fc209d344d --- /dev/null +++ b/audit/projects/k8s-infra-e2e-scale-project/service-accounts/189277497252-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "189277497252-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-e2e-scale-project/serviceAccounts/189277497252-compute@developer.gserviceaccount.com", + "oauth2ClientId": "113062251711481257214", + "projectId": "k8s-infra-e2e-scale-project", + "uniqueId": "113062251711481257214" +} diff --git a/audit/projects/k8s-infra-e2e-scale-project/service-accounts/189277497252-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-scale-project/service-accounts/189277497252-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-infra-e2e-scale-project/service-accounts/189277497252-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-e2e-scale-project/services/bigquery/bigquery.datasets.json b/audit/projects/k8s-infra-e2e-scale-project/services/bigquery/bigquery.datasets.json new file mode 100644 index 00000000000..e69de29bb2d diff --git a/audit/projects/k8s-infra-e2e-scale-project/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-scale-project/services/compute/project-info.json new file mode 100644 index 00000000000..622dc981c94 --- /dev/null +++ b/audit/projects/k8s-infra-e2e-scale-project/services/compute/project-info.json @@ -0,0 +1,169 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "ssh-keys", + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-05-06T20:03:31.813-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "189277497252-compute@developer.gserviceaccount.com", + "id": "493078826304062572", + "kind": "compute#project", + "name": "k8s-infra-e2e-scale-project", + "quotas": [ + { + "limit": 5000, + "metric": "SNAPSHOTS" + }, + { + "limit": 15, + "metric": "NETWORKS" + }, + { + "limit": 200, + "metric": "FIREWALLS" + }, + { + "limit": 2000, + "metric": "IMAGES" + }, + { + "limit": 21, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 250, + "metric": "ROUTES" + }, + { + "limit": 45, + "metric": "FORWARDING_RULES" + }, + { + "limit": 150, + "metric": "TARGET_POOLS" + }, + { + "limit": 150, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 69, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 150, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 30, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 30, + "metric": "URL_MAPS" + }, + { + "limit": 9, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 300, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 15, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 30, + "metric": "VPN_TUNNELS" + }, + { + "limit": 9, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 10, + "metric": "ROUTERS" + }, + { + "limit": 30, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 30, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 30, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 175, + "metric": "SUBNETWORKS" + }, + { + "limit": 30, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 100, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 45, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 300, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 15, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 2000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 15, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-scale-project", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-e2e-scale-project/services/container/clusters.txt b/audit/projects/k8s-infra-e2e-scale-project/services/container/clusters.txt new file mode 100644 index 00000000000..e69de29bb2d diff --git a/audit/projects/k8s-infra-e2e-scale-project/services/enabled.txt b/audit/projects/k8s-infra-e2e-scale-project/services/enabled.txt new file mode 100644 index 00000000000..3b9386ef41b --- /dev/null +++ b/audit/projects/k8s-infra-e2e-scale-project/services/enabled.txt @@ -0,0 +1,14 @@ +NAME TITLE +bigquery.googleapis.com BigQuery API +bigquerystorage.googleapis.com BigQuery Storage API +compute.googleapis.com Compute Engine API +container.googleapis.com Kubernetes Engine API +containerregistry.googleapis.com Container Registry API +iam.googleapis.com Identity and Access Management (IAM) API +iamcredentials.googleapis.com IAM Service Account Credentials API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +pubsub.googleapis.com Cloud Pub/Sub API +storage-api.googleapis.com Google Cloud Storage JSON API +storage-component.googleapis.com Cloud Storage From ab02be37d9f57d998e8f8fd7325896d2eae9f7b6 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Wed, 13 Jan 2021 13:05:40 -0500 Subject: [PATCH 09/39] audit: update existing k8s-infra-e2e-boskos-[001-040] projects changes reflected in here include: - add k8s-infra-prow-viewers@ - add k8s-infra-prow-oncall@ - quotas updated out of band - add ssh-keys (added by kubetest2) --- .../k8s-infra-e2e-boskos-001/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-002/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-003/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-004/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-005/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-006/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-007/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-008/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-009/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-010/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-011/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-012/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-013/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-014/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-015/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-016/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-017/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-018/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-019/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-020/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-021/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-022/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-023/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-024/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-025/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-026/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-027/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-028/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-029/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-030/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-031/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-032/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-033/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-034/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-035/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-036/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-037/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-038/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-039/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- .../k8s-infra-e2e-boskos-040/iam.json | 13 ++++ .../services/compute/project-info.json | 74 +++++++++++-------- 80 files changed, 2240 insertions(+), 1240 deletions(-) diff --git a/audit/projects/k8s-infra-e2e-boskos-001/iam.json b/audit/projects/k8s-infra-e2e-boskos-001/iam.json index ebc30c9dc37..ed71a70353c 100644 --- a/audit/projects/k8s-infra-e2e-boskos-001/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-001/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-271867469224@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-001/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-001/services/compute/project-info.json index 1a1f3b66344..26809b383ba 100644 --- a/audit/projects/k8s-infra-e2e-boskos-001/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-001/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDNmod3WnxDQ9f7EJSzZwvclM5CCDYZZXdx5K9cUa6CW/XJIsA/zurPZbH1jHp3QLX1DMR49GR+P8ACm6tP91qbVtdLxDyTeeLlRmXQEri7Bis2uwUXK7QkxmLgiUKzq95QwkYFGUafEy+we+OR4+Rj2C4rrFOriwqfWEjbGVPPt6ihfUauaSWKBkoF+X6YjJ+1zTtrQGqAyBpbhqCEUkWTOnG7Y7Wycqf30lw9Bs6ngw8QPhUyc3Pbjxj2aPOpDQVMPT03TjFT5F8pn2nU9trQuFdbnsY1Bjyd4Q2/jqfSjg1bbFEaEjV1FPHo/OeZNsXRTAj0Hh3A4KapLubvdT2n root@5d02d822-da00-11ea-8c1c-d23af84fd26f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/mk6vRaJfkpfIWG0Evihh/q0x5W5nz943WE69/mk+Q1hJOJpNj7GJc0y0moVsiVaXXVMXRAoC/wQDzB+XRf44Js2lojJmhABqG/kVEAwgwgLk/nEZATGbwyGbXFcq267f6jTGNOY9HbRrq6gMOyzdRy1uzX286Uav7gKBDY5IP3lBLOKX857D0XhIQx/ry9hmb5GzIKSSL1Zmv6O0iQqiubbVCglKdIZ1AQoIud5tvzmghb7fAACkPfQ9kqwrbLFVUh/nKRhIQxeOr2QF2Uv0/YQFiULb/iw70Z/QI8QDnUrnPq9MMIHR2YpkX0K3qZeguqNgToiuYu2d/1RXxhGF root@1c7dbf9d-e14f-11ea-8c67-968ff53f47c5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIm/Z3K0oPSZa0eLXTydSTcJFy9Gj1bE5QdAJt61f6abW0SQqlcez+PScnQFyqU8AFFRtO4kXB0JyDcobF3qQSXTN3P/NvV2psw/lHBes7uScfVDvfm7nDK1ndEbb24wBzXdc4wdZeCW+NoDEa8btslsSoGgINsUeI/oyME872WalXQuSiIFy4R7P3XmCXSePb8b+4HUa7vd5IpB+2K18oTmf+F93ZSPRJxTk8ZCJME6LnN7LxJkHYpnO+hC9IMPbAzWc0LDWpCNDuu0LO2rtvP/y/opj4it6i8l+FUg6hAHPlUos6vd3DCjkf3ylBwCAMOdRJp27DJmLx8+U+jiRz root@1e8e278f-f707-11ea-ae6d-8ed64f3416c0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDpcmjugW/itfeCL7WeZnea2YOEfzZgxMPTsvuHk39woyTRxJdjq4v/zMLSOXNBrdZFyqdW+F2ySS2GxCpvR5O2QKxEiqCcGOPK3xdQNRIP5mHtELgoPvPc4i22u3+ipfB/CrdrjN/ELwpUZXHrah5bNxOivEbNwYvQ3bMq+WbduRRLdKr10fwdyErywnqex4PvolxR2bOAnNdhakoUH31pSSECBKOX6YUh+TOG2Hh4wpyAJxSwxg7o5IgglU+ok9i6lK8g42CSlq+NBRp2AmoXd82KzXBfqpbTMJd2A8EnZrtq/VKGXFpWE4BzlA6+H7y3jxfcvTDfxH7I7YTgRUvB root@d99b53dd-f8b6-11ea-926e-7e7ea190b727\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDtu4A2VuzGX/fH0HUjKcVqBi/+Fdd/kigCvQMWF3Uw6k8Q71l7ewcDDtfs+WDk06bNg50JsdaA+OcetrpL0yLPuKBvtSg/vl8msn8uxPbhHAgQ/QaaTLWYnztioPEsX4GHj6IcskwLGWNR+mIlqxY+cximmQ1O7hj1IGPNLuePysM9ZdpMDT7xOVc73PXd/t5+kZPjnKEQlsz5Zd7FtQH6QJ7ptKLYfcS062ZQlQJNaQPVIPk/TA9xLAEHaTSw0u1eJHuyXvbSbqvj8e/69wWMR32QmN6mKus3hQZjPMm+DzmDIWq2wt96i1eickCGSvpfXG4j6TIYmTVu3yTDe+ER root@1d6a8847-0838-11eb-b895-6272783fc925\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC5eYrnUmX0URxEg778N+rOLSPqYJk1nPe3ppy/X7zf6rs514UlmBpftsI+ZC5iFxJKIfI1+IECBydUmMtcMeDNq6TJ+QtPaQjonX0jp7Cm4fdOmTfiDnuY1qhepvdKN7oWmZeNT1xrdAe8qeeLIbup92zIlU8++nusMmrAyvmmSjPtl41YNufj3g+4MEryQ6lq43RdkXT35GfZPdWUD3ZUrsc2b568NzBCdCG0j+/RYWHUxnRWiReJzhcrZX+dFACNL7Br5UVz6vmWNV8hLfrVJAAjHNtqWP0m4VCUOX84dfvmTa5I1xOjrqMNMLdWhNCKbR8zOJfaM86lzh66+yQv root@91bc69a5-532d-11eb-b6a5-7e8b7adfd54c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2cYpeZLD9y25W19mQbvRxg7slzivZIV8y+p8XCIT2xddSl1HQ7Fz1Ir1iUzq0cqniTzHnmM8+RC47XaMMOaXaZjjPcpyNiaFOczCn9c4M5E48ipAa105HP9vj1yewWfgCbPxRP6QSweR8BOVLZHUpZwebPen1XwXUYrUBC0rhPHcFKPUtla4hlUEqI9/ca1yiohCUWDSpO9y5wazA54rZhkN/AHxhPCE0v8xcjJKbcZoUdyFFjY7kMXsL6AOpNwqpFzmhi01+ei3BikcRyKQnWAK15n+F0N4d1tYW5FPEAeepx/BsUnAlX3pji6N11c+sPg3laspWOvVTFgBWrpDd root@12716507-5573-11eb-b690-769430c9414e" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-001", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-001", diff --git a/audit/projects/k8s-infra-e2e-boskos-002/iam.json b/audit/projects/k8s-infra-e2e-boskos-002/iam.json index 7b2b8eb6cb7..a69fd0a6275 100644 --- a/audit/projects/k8s-infra-e2e-boskos-002/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-002/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-395811472440@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-002/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-002/services/compute/project-info.json index ceebac670b1..f8f1e48d491 100644 --- a/audit/projects/k8s-infra-e2e-boskos-002/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-002/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC6/mgA+HoI/URzKgNUO09IL+MRFtKAkXSxPSixv1GmJMslTckIZIHIvdR/fBHKKmqISSGtCcILl13sA42Wjiq4DQNOPmDdanyMUwySLnj/aLmmgnCX6YlIE3HeypSiwya4KKSNmC6LQB9/XRy4CGBx6dGIkYO2Mt9/yX9Dy0hMVaYeWzzDCO95QIUC2DzMLbWz2C/ltFP9KqGOVjHRsZ+leGkm0p+j3ZHi/BqjKcLvXXd8ZpOgWsAneuBnhMpYgznwBtq60Qzbjt3QrxVMPRaC89kqoIY4hyuGGxFKoS7nFSnPzZPhhArPeruGCb7JAMcY73+8DbistawHUTuagxxh root@d100e387-e38a-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKa9+LzzP9XnO0gvq6c40OKH3G28v6wKSSGZlZkE3BnMCn6IGo0YVSX8MgInOnCHTdxdRpd0zLL4khGr31aECphsoWGSNTTkUHj6hk0PJiOmhRXvu6U5IJis5ZtHRB+fAgr+Yy+I11XeW6Q81SnCiHNL3A/ONxTWAJy4zyMdLi9JM5UWys0eD+jN4znq/4Zv2OvkkRNNOtDk1ePrTNm8QXJShBQIoIdeavk7glj7b851b2zgYxVO7PF7ttzP+tpEMYmOzy1z15+8ozBFkrss8y0XI5sBIcIrGWePa8QVOkIrlZk7+UIUh0lj6/+Cgrt+mkdY1xM/IkevdMcHTDOOZb root@85a4af12-ed38-11ea-aebe-3e85ddc86bf2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDmHnrzoLjrchPN1xtrVYg36k9VsjoywnvLc0Oxvp831Ppsv4QwmkPFJFT6BdiwXxaIYyLNqh4hbemFMHDtUUuBhaQ2xahdP6rjoLb5oDnUxQ00r9lsc3WIAnhvK29Mdy+OunzMkevKmcTd+/u8xzWTGAT3eB+Il70g6KtH6H6vhPLDCZPtM6DuHGwLHji4hHq4kYAysLwgWIu3T+85Vsua4vylJfMMJI+Jj8uoetD1BaNVETfuhWSFVtT81OtO9PJ6Ot9OK66gMh2P0dcMgVhQy/zyZZhrz6k83uEo94sjnQ7MGztRAQrOUqd5g10V57/Z7Mxy5JIunma/8P0Yrd+f root@eefad147-f805-11ea-872a-bae3dc204648\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZXZiD6FcOjEijTwytqiEQgXOXTpV+atO+Lyz0MOVX9vs/H7JsBMppdWG2hnyQegmuTeinN2Sso/aMROjfiUdl6Wn4PIwuXTSuH4SVcQlksnw8LskXaARLlDH2zbwzktJpIhIBg1sy12SwataADR64Go2n9Hy1HMn5pASVZtFWxBW2pQw55BhV7QxCp4cWk9khXbCchY3afmwlORdPZKvGXuRliS+hxk+vf/TXzTvz/KIo7IvDHAABuz3wQyweLeXHlww90Y2lrBQn9ZCjDP19SFF1wC0UMkFVX/oPoMPmkmni+hZNSo+8oj3ZME4AIubSM7TKwSMZF3zgiusGU6np root@ab8a1788-0541-11eb-9dc4-ba187aea6a9a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKCunZZi34boNOwg4HeqfoszJQS9UVojNFC10C1NJG1kdpp5bTX6OXjtkgw4N+dOgYfIFPGyTDGb1ILWI0Ok0xPFoyEPwi7bRYl3SBX7P7K6cPRqhXuBATJEPrx80/WQH2XWHi43OPcmnqpJHbzEkDO4hG05yYwbE1I70hQLATT/SiTQ9yvRg1n6OOPPvK6BmUYzKZwemRnNk+hSla0jyN8a9o5oNcpMfcUZw8MGPYuSWdjeY5DvXMHxNqg4jPkBe7ez3Y4Zo9lJ66Repb92CNrzkEJ28dnFFRFxE0HDTwoY5qO/XMtNFbMZX0ZNLxOnFj5uf/30tbl1qt02cs7qfR root@e9171581-0bf8-11eb-82af-de22b9665164\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDVcSEIeIV9wTFjoMMe7P5/KwLCoFXKB9Kcx1R4g4lnHNLEy6ApGqKd3IoZPi7DTyWKJ9VuHgWWtyXiR736iUgkOfvImfNElRh1cNc9u100yaY0JoIzDxE0HAxu4RMUXBSrnm4j2cawHoKsX/yL68yvcAoL36uCqUG+a7RI+j2mnWSV9MZ3Xw8nRVWmUA4BPzk5M0tJqOjACHyv6Jmq4AmX03iJkMDx+d0YK3Iv5w/EFSOAgy+AUZBRcbs5R5FHmGXyw38oE7BhbX3ZH7EAMrBaost7uc49baLe4NfPIBGMir+L1V9kbrKBxpmyYWZMUCKacPLr6omQGH2i2CndSVeJ root@b42f084a-2850-11eb-a35d-7a1d48297fba\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDVexUw3IlQi+aI3HCLpwamvbPNDOc/fQzQIm8Wb8cULwlgklOHYB0J1+tmRBkp6pBxk3kQYDiTb9J5TdD9ixZ1FpFdht422OaIQImnA/VJmY6kwLkc2XfEHnUTLwoJereJiT5VTStAFxv4t8NtCfLyq8OEVrsHa7+1XbwKJV8ouBkGT0NNuqeWzUYkOJS9KnKN30ZvOG2yImsmczwKGmZmxr+zA8vr5i93CleeEJFQ1dkmnRlzuIhqKtrQES5rYEIhQCrNvKJHBnXGxLk/Z7aZPA/pxma/Tt2uTTbLfjz4uhHKRF4tXBBzuGECq69HpdyDscisn6KSpmvNqygCUYiH root@cbeff39b-2f53-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCrc5be9JBic30Sw3kZU8v047C7yIgC/V0IRv5OjlgUNP+TC1D9jpMluWka5p2FiqLG52sAXqOlOd45FgwoNLaI6mZUXj4tC8LTKN+8xkSxGhHP67BewbKqUKUmLcxKPkjSPOVO+5YwBMdI+zzdjgi/z9fuweckHY/wnCjqG7QqvrW+7xYetf8aIEhK7bF08XZtOtGXsSfU/4FHKboBoRRBeihhdpn6AuP+rPCW4CI8BeRgvGvZlWcOu9Cf0IJEExr8cnXcCBUqMWIJDSKDTzgJv/RfovlNOF4upqcD/Y342gN+Jkf93aT6ElEsg3mRjLEGPX6FqKtLV0FDT/Ozq9sV root@ee5a9600-348f-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9DCJFIGiCtRqp0C8hj0R8ocVNC/0jgOlMAN3+DDDWWszxI8cGgkg8TRQ8XJy6/0y0nvEgFmhFqbm6n4ELrsMyvbnwkpC4VimGOtDDP+GFlftLiVnpqFarCpAOV4rG/5908e+thQQR1CX2FPXPci1IWxzqGC3jT/m3CwKV+/3bHeulF5Ssd+IgP6zPhwVwpXK0sARhhYLz9rhydIJlalY/QBy5N/DER5Zh/p25k/UdJaX2Q0G2XEu38cKhJGJRJzs13jnr+IIC/ZEqpAt2bQEFh/OvHUARSO/4wAz9xpOqcNR5HfKKbJfCQHGWL7+yDD2Hj8s5m+SRPk5zC8SniLR5 root@1542b757-4d0e-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDHfeGFST+2Mwvmnw+xz6InE2vck0LBPchjHYqaVB+Yf2k+h5ROtq4CCCfKVlsG+/e9FNT/5DX+kv4O4p2vW3e8FbdE2iOXh8sVSHzvbCm95lwmKwlTbkiMHOdo96KvfxjOfUI+EuwKnpSm38t6exnEycrlF0lDPIEU+bLgVjamVH4ays3erl/cJiesWQOxyhXLUuLDGlGpMoR1+r4xyXL+BwboFaGY6n3oGOQJA1D2xnTF3YSF4SE+eAGsOdGIDhjrLGQQ9U/q+gR/y20znJD8VVewchYM5KM7fHVZg+wfDPNhCjmVqWkrQOfiukSG7Ajbe1BymEfPYKneeSy6guq3 root@b309703e-5069-11eb-bf1b-5279f1a59a83" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-002", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-002", diff --git a/audit/projects/k8s-infra-e2e-boskos-003/iam.json b/audit/projects/k8s-infra-e2e-boskos-003/iam.json index 6173c5bb624..a67baf722b1 100644 --- a/audit/projects/k8s-infra-e2e-boskos-003/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-003/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-117136280642@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-003/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-003/services/compute/project-info.json index e8ba98400bd..0acd2572bed 100644 --- a/audit/projects/k8s-infra-e2e-boskos-003/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-003/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDgB6w9JnhlBEn9jDOFMDKUqwpWrt7MWEnp2CSFZ2FxL8X4LMbL2gelqBow21N4pmoJeY+YhCE+NuvyH+lYOb9y+NWdpJT8MYyKk0yod3U+/e0qOtE4TpNT9nRbzpXsJyTS18LUgvTkivY513g1oFUdALjKSbiJUPCVOhSLiE5ip3gCaLubiPKJZxOgYWweUW/ecPdsRtk39kywRkc73/2XRCE0Z3CQvG4hFBrwq0hOFpFomfpoRw5/MRlfLuko89EYOsh8NxCJIBRmCRU0/Ixw5F/bqK+xzOuyo3Y0qAzIVV+FYuFqMIE69f3mZ+AW7i4XWIaWW2tipkdf3yOpLtrV root@2b723f51-e42c-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDRUpwKhLuL8hiPAEsxejNiWn27smSYS4tyapkSxfRDMqEGWuBFCXzV+aORbU+zv5u9IwM+OlH3rJCJMjAJJGya2H3kCPnSKtXDFn6+daYEDQwLcy2cYU51Bki6khhSnkf1fAcirBDezyvz5CPF6xiT5gAMtsSeoPmULWNO4kTt0xZMUSw5ISWC+cZfA/4XWgebiF/oS0Pw71fL1WhOo5oMayoeUVwkhcczwIlG1VtZc46MGi/BHQDESX3MpH2dcCCube4VmkqkIp92wShR9Hujgmt/TivVUhwuf3/5gs/Trq0xkVOHZdh3gmi2yvW9sV/ErKxmwd+S+GflR8TFuE5z root@08884956-eba4-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC5jKT8ziC5xUyJbj+JGtwGOnvSfwuCcyCHbWjz7lOVgz3rwktKyAJq/WzZGJ4WxR05gUPgRSI87cAhzNJGB136ncEt+qoZNVe6jesSjC9eqkTCvdB3W8l3fJ2cz+YLp2eo/GZOHZm1VeXgZOlBOB8FLU3VtPn9oRQg+sxs7tYJSzobTBQOiQgaLJFB8r23khJVztB9F9cU2TL4I/RSVbD/lWgZvHCnrKnJ5A4PXuc3NyVmZlTDCzhOB7w8wcqYz4tPBBYN3d1erWNax0T0wWZLr4etcvRH2TPeQtTXwEzrdU55NF/W+UkZmVuRx3j0mwMQDzGs8EdnHAAA0UGLkI1p root@7640970a-ec22-11ea-aff6-5a14b0d7f3dc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDjt9TXv9hKWbJHcHPK14XEGfUDO/uUQd6gXrlYGHvzesjM0zeE3CRNY5tOGM9uFlcpFli8Q4JqYyCyBl1m9vhkj4nN5Kz2ZKoVfZ11RD3ndc6xtXWc37cmUt/w3A/lvnWMQPT8NdBIew6hSr8ohu3ko6k1G5RhB3+tw8o1idHr5mqaMO9tFvAEaxuZndJf5fpZQseGnNm4hQ4m3DawnULlPdJz/T6GO2rXh/sEC4MDsGZrFvb9p/4B0CwhHcSf0kOZY6dVmP1b957Bf7om+VvInlaqmWcB/PBzgYq84hfJ7k7YM14dc0uq33FW6Vle9S2aomRmEzxwwQA40JL2MxQL root@484ce8ae-f048-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCx0vTWUN3d+kq3ngMqOzHnBLa9y9I3g2U4RnMTZG9YpNINETGuOVAz8rk+by/aXIHNwE6yWFsC1zRmOhMGgiwKPW/UyoIZVLQxC1yndYZ7RZNJMkkg5iCf1f397kFAy27iJs2GqJuhvlIqm3dvkMpQAXt3tHB/jBBW5So08X8J1gJJsBg6dFThUkPyQwiy8X9UIC7XYePsQqRnre2Y75hYOqmb/+Uj6ApVvvWEG/VWBtyR3FC2Lzhd5KBNBG/7r3nXetACp0WZtfc+ZuugH6lRWx7nlKw1IciWvcCU7Fv7+wSMJh1VewNpjLebaeq5lcdHqT1RHd/i28MQft7BTmO/ root@e7ee0b9a-fe57-11ea-a78d-ce9ca29dcab2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC41H9xMKL9lrJyocc1piKMMaxWtiI6FuUpbojDePI2f/W8NeJURor0XUe69So9q+Dga7DqYdyPD7cWqQ8a+pW6T6MMyaP6rajmrF+C+oySEGNHFoiZ0RviW10/HASiPjl/XyZ5FXUuHxCuyqLk9UJLZUXyaGLzoJkYtN+G7Q3Z01ikRgCqp0KL79irPRhOO0QpohuCe1b4rGtSXAtXWC/pQaWgjD7WLxWXqYpxorMIh9NWPtINdtRn/8I3n6TzVibWz3B7XoV5M+xQoSb2KJJd7xRPjSXmbvNN/VuC53V0ziAncUX/bmBjlN51+MXBcsVPML2DJOoa3D7Qa0chRqrL root@5c5291b2-014e-11eb-b4e0-eacb7c15c8a0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDWFTjS5FxtfvGS0/9ddUMvUnz3U37sfmLjDM1Qsnh/SZCGhzAk/Y8J2sUm9WgtrC3FprT7y5Jf9BQjDWlSfL+3/erpAvtZO9x/kG8TljQlAiBXBdtkRFsDgb/ihNcPQiGNPlLMBo8U8AoN7O9AWThiu4T2BYoXj/wbmoG3/uh78/6f9BDmE2vnxToCkKINejluuqqfDEWc7oN6CL3Q9xjB+PCz4FSU/wEh5OIcTFW/ys6/JxjnRHY26s5fy3Obri0PilHt/wGtetKOBZMvVxUS5aczCDl3fgTwrXrlWXOXolEIb1H1bkApCRwbKPs2Vsva7vlzMHAMPJxnikS4Ffez root@42a8742c-0dd9-11eb-9c65-0a69ced3f66e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCgyIjqHJf2PX6cZMDmsq6ccB9X5hLUi//5Z9WLPJFxTUgKwdnmUp43JgVbmfdNo2HfLW67Fe9PvvtEWEL47cGkktIbWzRjK0WZrNTXZ9lICWLkujXqtPWuQIaoc1zErnTGTBh/iyPVENbRZe3Q4Bgw8fzSY8ziinzuk3OCPK9zIwtEeQtUed/p+BiczYDHwhuW55PsqAf4H7asQsVmFhlJ0dpcFC88qBEglTm+BS7JkCfYMDw0ckXUubR5QFYxu/4pTMOxafmSkueuwmTH4cLCCaQYCoLKoOutplRFulIQnITQ4vO7HDQ8iO1VIApoZGa0zN+0h/D4pzwHm8zKVLB9 root@0a3f692a-0ed6-11eb-b384-ce16c16e5d30\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCpJfk7y6uUUI6Ez9yHE806aHb4Avgm7lZFDCx8jNVLrPduCxDevbqmJi5bXqEwSlr900Xy7ItObt6p4UB6E3xgwxJ3ovVVgiMqj9cq+JsiNPEDUzq8YSN5Lfwkbj4bIZViX/FkH+TQOimmiWtvVicKGIVYJJc0eIBXBxfxeqGZkmhzv8KTjeYZ0oRWTsvmQCgyExLzKhbRtfpcDU24JH8BpmCrKjyPkDuMOvVb21cTc82CsavoaCtPODJkXdUIwGrJeWgcVBZUYZb/7jVNQojzM2AuA83WVuMVHUEzCK8zK6Q+hCTJewTmIJ853FqP7d6XaaJY2CDp8a5chOUTL8HT root@ca74e4a9-30b5-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD3KH7pYgKHx8leLJa41k//xSa8McztI+hITruE/7fcwVjP19bB6HZE50af6yGgoHv3bjLTLoKIw/GFRC+BY6PnonuczOwHtxNNkJrwl8HafaFgodteuIj5KXI0R8S/pFzDGdOtCqRMU5kR9/v/UyJo8E/1gfjoTpLFIUE1IVMiRwnRZb1gAqCdba94dkwJsMlMSy/6+tnLpBDjDOeum4Z0UcZDS7twRDPS3r0++tU+wcxzeBygeNdCUsneT3FYjsfjQ4luiiEuKmn0IO21bx0hG5iDXIBmOJ86rOFI9ZmPvk77YeqkIn/N3zxGyCoZGTwpLsP7PT1Z4BVWU/t8O9pf root@a5952a78-31b2-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC4gCmI9hrkPMhhS1pbzCRh+L5ebsA1epXQsql5jBS+bjzWfizygJdX5yAH7SoVq8HkG567NsLLf/ScCN6ouv7Z/P6bHIbulfZoM2r4XI6Q5opXlICy+IcdVTdmZpDegn7uJX/6RNMyB2DRX740WfpnwzdqbrPN+H55r9KwQoppwPeG+XXLA1u1ewO3QbWWrzRugiQWZtL3OrPRIYi+BrjcdfNL7TxrFqgibpqsn9SVwil0Izn+lw3rYZkYS8bXywD96QfajSJ7MSRtxpV6aFK0xrOZLQ+cGdRYpgb6M3cm144ed5O+6ElSIP+oImeuRHd3corTMVJNcMaugznIizLp root@8ca38cbd-3c2a-11eb-a772-a610f2f25584\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCx4vG+QAw8Qilvca5DVyCGUkU8WLV9Cn+2781gsFDSZgRbcmcuIesVwwyZHOZL59u4DmdZBUjZlHPCX6Ung6WIQ5OdVL2UXAlCTiYys/uh5ppOQNASd5k3jG7ypUzGZdYXzd009/aNUG51ERFAbSXSn97BZKgVCNU9xc/6wTN8E4gDcRZhsYn6w6wfftsgRcLcnaFvEuJvthm9gA3by/Q36A+ekrXxWH8W8pUKGRPBZss3ASFJcOv+NnQrVtRADNXGixdMogaCqSqO5hEpcCqfF+2Jqrf0tgwxzIghTN1u5lFIiWsToWneLjdTmJk10CiDp2MXmeHmZLUvHhpEBi6B root@011ea59f-524a-11eb-b6a5-7e8b7adfd54c" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-003", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-003", diff --git a/audit/projects/k8s-infra-e2e-boskos-004/iam.json b/audit/projects/k8s-infra-e2e-boskos-004/iam.json index 0c25e45af32..f73f4c32915 100644 --- a/audit/projects/k8s-infra-e2e-boskos-004/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-004/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-567474418379@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-004/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-004/services/compute/project-info.json index 7206e0f2f83..aff09506ea0 100644 --- a/audit/projects/k8s-infra-e2e-boskos-004/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-004/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBpjAzephIDwOFglFFtBubM3tDfg0wNR1Kd3X9sxUSIlHFooQX/ails0LLsZpTeZxqJmc8deso5xcjyacQ6uFjRX4Gkl32hwKauRFgHKScg12iDj14OJJZQqhGLpDKcFBi0XD8w9FVtBcifzCK8qoOhr+bSOfAsZyR/t8P2N7pfGgr8JMQA/eYCN6eK9R4ehaEzqhavebPanMOc3W335nsmAFkKoVbE95WG/zuQna2LRq1EBXT6JL2j7+8TvEXlz3MQq3tL9yUi3Z0oyd/pZOcArceBdmauRphmc6yJxgqO1HEkNB2JD6Yo6pRoilE8TVlvucgV0XGoKNI72G5w/83 root@927c643b-ddf3-11ea-8a0c-be937dd98cfb\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQ6lPdhxIFFovTymYO3GzW2NQpBqX7RzDyXxSgF6rvNwq2M+7lgxpZnCXP0JVrywaZRnKHM+MPwHm1HfX2B3KKyClGkI1zunjvNHK/TPAudggMkJY73ZXYKy6Cpfw8f6b8D1po+7WF2agPtVPX5u9xx2SSFijOJ5SF8rJozrBNnsFz359qSfULYVGsGPNFSnDCG3Q9yhUr3GTUef+VWnOTKtRMOclfziAxBUw9DqF1VK3m/eZ+8bwMk5v8srcaMr1o8cD5STWwGnD/HOT+EeDXE+Wmw5MFO1EV273V+jYr44EA6caRSgbngpfw0sQEsNHJohKFWD32BP8I4PC44J6L root@e0dcf123-e2d9-11ea-a87b-7e1d84ccc038\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDMxpbrYlGfzO00VuNJrgIzbktc2biPRSi8EMYpDQeiBxzb5Pz8YeZpxR+kTtq7MPNzh4ZUe+jOYOkgK1Aah80D4sMNB/XSDhYXS0ZmGlLL5f3McWAyjhngbjveFfnfqjipzAtp/Mwn/EHY0iI0mQvb0uD77EwaU1HZr7rowbzV1jevr0Iv8QKwbc3FHgZdCyV4gQlse0g/taSlUwu+Ts6+tldvyzkWBJdxOMeNuKg6rNcRQDlfcKBmAFsC/xlmPC1XvjsGkr8mhbXsyrjfC/smlRcuvSZ2EqRVJQEwp0FqTZS/mc9auXHShv2BHTVsgPVaI6SoTI1Xu+llyRpr2TNV root@d43fa159-081e-11eb-b895-6272783fc925\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC3FwxI1Kw6xnCqAos1iJUjedHgMvSRlWWjUXt8R/Vk/hWPxwcRDjcmYJSnACSPWz7ymy+ne+xSsMvbuvotHOC12WMhRUIz0pScpkxLOe9q4dUneMAT7jF1ooJ2RJk2GJvZQQqwOR4ceC/FysI9rLmSj4ZllvcIe3S3lHEKFmF2p2v4CZuID659wrzXPm91f8TOPPImm6VMQGWRBS06hmrNhcQ4TWszpZzcbNyd//RXzclgXE5AnyrRiXMUKRGbZJgf7oIetXi5JMkmCvGGcgHNjJEYdblE4b9i3JDAP9nEmR38zDwFKves8MvaYRrYuEEVVKZwTzIcr2mMhxIvM0fT root@7cc358ae-0ac9-11eb-82af-de22b9665164\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDp/D8Hgqo7u14w7aX3++6FoVdTw/xPXNxUcLEX55E9wEl5G1/i3F2NgZUC00Shwc8lLReRDI8npBk2iClYSpY7WayQ4xuozKAV5MnDsFWMWKN9hkpAV6X3a98GUDoik+6+S84V89WtFhmj0wlxZi/NyewSb9MXibFbH85lrtZoBJSx3glVsYjdYaKe3fsDk+H5bZisc1fUE+WkgkQM7HlXyBwUOX8l74rvTBxtGhmJa+5B1LyPF6VhusMkQ5TUBxs7nEWTYA0G9pIVhkqTbbJcBtIOPmG3My6EA6YSAia+CS4Z6lut+loYtfeLF5LieV0Iyk0gLo8O5RRjN+ZJM0nR root@91b31aa7-1a96-11eb-8779-4e6ceb30be03\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDXhnINDtZe4c6KqXCVPzAYe+VJmN+HXVPvwItBEcrwio0K+fn545ZwIbeb4AzzPJkhyA5PaGeS7fNd1iIYweL1oc+5uOVYrvfQkr9hxaNUchg1zigZS6D+qx6kjN972OqxcSWyRKlBrYk6GochaEXTX7AEGrswcyy2b9G1wcJkKg+s5//dZxJKKODVwdwH4qhEExqC03VamzXk92QUlzkYioxFQCfCvy/IgHXlBjgzTPXBlXUllc0AFR5NsLQdZw5stwMmZptDIC9AniKogkishGOHi/cP3/BbCaOICODDRPEgPM7BV6TLWSR1/BdKTcJXyl1nT1T1Wqu4Vd65fqUD root@ad2a5860-214d-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9DjZQRU2JSyQFtCLtkwtjPVbzQHT6Vn187s97vr4/fttJ41v7rChkvB7Tgl2ZrmMgEhYjZrVkleySBf761i0bb/F8XQiFZVgU8IbC4U2UIl7gKZAsxhKe2tY4yNY/anDiRccWFcfPhDeid9R+hGYqHVmRlLpXftBRWpNSDgCETAMswW5eB2H1FaQ9gENre6lMGTCy7TaisezLyyB1wsztkvkmjd1/dAS04aIdJpJUDT1r6kG8RU8mpdVrDq21YHCgq6w+kNsdozCEbAYHJanGWIlLwFDRdoetwKi1Sq0UMuqLwOWMguuYhWKfyuTBMuUaNa3q1UIliT+hfWZlmfv9 root@98f0bcc5-2411-11eb-ab3d-9a499a0fc9e5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDqFdxHvy9MkINvPW7+GDp9J5tgjB9hpPwlyt0niTAUtGypwiqtctv378s9kJ+/ykmdCNVb1XyGA5I/lQpilRnj314HXQi2riqzOGZ7Y5YGCF1Sv1Vwr93CLo+tcL29WcFaBqNO+AydkRDI4+kn5n4cX8LlmHc8rVImvSd3sM8mrRTAE0xV2RZ7sqty6qmDSjuxqTRtZMkypDffeXA0bQRd6abdIU3KUI+KEy3ak4tGVc0cAqETFHC8noIRCDbTxFP/GEWHWQswpFbHBEfXgB10fanfwtlc/IlhWoJ83QonBYlNxeZEnHxBJDhnjY8wiBNIfh6l1HkoYFCPpA0H97V3 root@f9cfd364-3ca8-11eb-a772-a610f2f25584\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDLal+H+OqsWg5Ntm7kZrCEWaTF0YA42NNL2LxSgDZKuNQiLv9IDNIZ40Mbj4e1DLhLwDJJcdK1YkL/UVPskTR+FSkRKYupGDt5Wc+DMqxPg8WtkrReU7/vS912WDLdP30YBGHm8M3btKSWNydRCvnAs3FNRbLLtDeHc4Dsh6bSfV6pGXM2SE606rQ3tOocaBf17/ByBGfsD4x+auDSQpshm05S8FrW+oHah1halTVOzEdz/TKgocBLCF7ZYrhRuuKX667X0K6m4gCg620obTNbo+tKNThzxYz48g/BT5m2zaMeny3pul8Y/KcGA8Lb6PjeI30dWhn0KdOriyIJhZ9x root@47854d87-4050-11eb-a051-06e11967f91f" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-004", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-004", diff --git a/audit/projects/k8s-infra-e2e-boskos-005/iam.json b/audit/projects/k8s-infra-e2e-boskos-005/iam.json index 4370fe6c524..54c7190c217 100644 --- a/audit/projects/k8s-infra-e2e-boskos-005/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-005/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-627327163785@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-005/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-005/services/compute/project-info.json index c1e3b50f501..65c021269d6 100644 --- a/audit/projects/k8s-infra-e2e-boskos-005/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-005/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJcYwAz1pXPLTMt0n5qhAxH2YSqJ1nv7xdueApZjVd1dzm23xi9IQZLMMIrZAoD2g75O4SJlO/E+uSMNUhb5YB3QxlrwG0Sn5ulWII3ZHrhHjNxrCMRYNUVfOMquwsKQXlLQxsX4Bx1wRm4b4PxcV9FCW4yWuduqMVo/CkGdnoZO84iyUO0tF5/9GIq382zrwFkEfqlPUW0TLt98dJQceCMR/g2uJ5Wyq8UZxMEDUCTgwEsjo+hL17HXZFzp1iCEaAP+OeWRKS2ReaDndUA17EodSC3pSSj/Zde46FBaI7D4dj3BqZCcr8uiB8WvHp76A4lGuXFg46PbD+djPL31uR root@bd872dc2-dd1f-11ea-9424-2680bd79560c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEfiKkFWTX+7RmVt+UtcAAswuJsZA1AUB2pHuwbDJotjj1MziUmN1uF28xZ+yAmS+vGjwZKVQwd+0cG4G58uaYgVU/QTeE7zt2+JYVTy22EglmChaci5MeYn2VOr4xzf2vVlsnFce5MvpM042O7/1UZLc9MUtvKRyvDgKMODSIdCD5VCCF94m2kBAAoQSt18wpUkRzcMj0iNWrby+JFt6LN+N/OKJUhLYmVLzPAykr+T2kK3jJT8wanB401y4P96QfbTziPgF/pnNDFcVSJYem/cVv8wboH4KBeooqG7iPKgmn1gTGUmCA2vwRFJ/eXyW5HvVfE8Y6rmOLEMCLlpL1 root@9f3bdcc5-dfba-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQv7ulni/3cqFTogClzKl3/POTvnr0MyANzwAp7I0Y2qXdA/UdvcyojCQzWqVNEiv4KK2YSOLWu12UfWbVhgFJcEzzueIVe7Tz+D7n2lVWywtxMdKqc8fymoHkb3blPaK8ZL1Prca8nWKqRT8MobXxAKlaQa7tkM182lws6d8Ymaca14Nd9ouBCeqS1Qw/JhojzeInFukxzjPvNqsZWhecW6ouGhbSIvgqgegzQ6nCQuXGMfX+eaZVxgiIgHgZf/RuuQXFB6/5cDs3EAAt9TnnYZod3NuJ+M0MMv7XCdqvvXPHmBKPvLAvrLsR7NAoTJ8ZEBOcp/uvK+ceqGHEOso1 root@87b954a8-e422-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJbV79GIvezQTIQuwj1bGz+czRVdZ+YPYBGfxnd0/tqr3PCpgwxlZtNKXisoAeqsGWOEctrjQg96X0cDLmUEKQoSCAmvsBcF0/WeBNZRsiLrW0E/TYRSohgIV7LTmlhMOV1FhAIuS7vVFJfsJ5pa4jAv14le2ZC2J3cyn7ByDARZr3sLamFzmcCMLI0wACJ6PIR3yZcQtnpLZnuzs+lzGMH8RfwqI0mBFzGbUfIdP/l6zi/9MlBGJPUBzsTaoP2NPsVCQ2oV7P/4ZAiHLFTZ9EhKgusIguquktOc0SfNoa0rgD22c2qp9SWhkAirkyNc9knMzVEwTttgu0r3ALDK8p root@e191410e-e4c3-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCluRgZ3kcLx3seCYLM3ZTWCp0jBDbEAn/cbHU3PjOPTZNNId3H+n26iFlZyOMovNmp6wG4CwOSEJmZ5hgYw0sLjy7dZFBSsL9PHtXrFAvIK3/m7wtS6/VUlWOK5jNixnY9A38DsR8r9GfAjimqGg/0nwJ6fyPf7JUBKHNhrcIQerO33wdE36SnEsVi7Sp2aJF7ILs2pQvcO6rhH6K7tGwJsZBNzcsYzDJDlb1AmWgYJfIhH6I+4nvetb2IiDJQY2+S1HUIaUShPGARAyTr033h9Pp1GhgGfSTuk6jJw8y5LXeKGWXgwKMcmAkFa/OtzpmPBg6xMH5xihe4SxTkZLX5 root@861bfbd4-e6e6-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC69nLqSNUOv+4MpOcAlhvoZqklZpSnSKyIEWBySK6+0wwgnTRmDvFRf2W3rTpnoxL+W5CWvOjPsqzrE1Uwjn22tT2jz3+oKzaDgUt9dq47eY5y5GrOkcJRFzL35L1C0/XRQp3ff9Euj4pkc+xvsDW8kD2nSKGBzKtkdDUxl4mMtPH5Rnpd2EQofQVN8iV6BQZgah4KRyiKiSuM7N4pCwJ1S2sEuDMU9BGk5mm+NhvtBSCgRO+MImlKGyW8J1/Mvv9LNXCQs2VpxRHrttDLocazdwbyrzZJl5SkcivHsJHco5u3hn5zdZZisw8YljBM3mwCo+kmfB15RsiOyT5gFzZR root@2dd1f012-e8b7-11ea-aa1a-c6580c04344b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCfaiHdaUYyNgkLAhcaIYnmsGg8VhHlmzi36XyJOj5+YSCSBoKb2Ccgrc9xpA69SjydtCSlX8iJjlvJBE7ajhR841dkCTq+p2d15tG3erVF69wd3OZkuXLFjJqkRQSekKIsnkufB8IB0pDaygAG2Tla0njY9IwVutSogJrUNAnxoZljZCRSo8eUSAdb55CHZCRDF7CGWpzNlibRYPqWdj3fj9HGeBQPUl7hkRxk2QvN5MbcbM0kUi4Nu0WUp9XBk9q8Z7WCu50U2JBUrXlMrbO6D4kpyQTC9zEKYdzU/ZvkDZOzx5t+4sqEc8pgRBQnB0kKqjm3SMSZFyPutLvs+ywn root@ad6e2d0d-ea4b-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC64PcqgxJXMlKOQEflF0pv7ozpmglCb4JLvdkP97IS8RGYPaH+AsWyxTjygzWhy2fh8xq2dFZt5NpZ/Kx7k6hix1J4BkKD2DuDeJogllTqpi9EDGzIIcrsN2vaT0cucy3LgCxAW89ew+j8C8jr84NMATr/zBtxAUbmgFR4vIyAupJ0up4rOYWItjTsBrQ7ZdQCrdatACQvdkf9lx7Ezsvetbl0i0r5HLmN+9OfK6nk72hyu0yADdZjkqKmfkT5vI5DqpzAPBCYe1T00aiDHdFt+O2q6nr3+xY3iDKr9dtUKaddm9YquD/gNz45I9tGaENd648QN1M6+rEUXiUK8NMh root@e4ced8cd-ea8d-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC183Cgwjjavr9DyTaVWbxrdOcO20+p2Jrs28LUd8oNgzp6MsCjMst8ca+9jvdOY3SO8N1pJ6hVYHYve7NpxaM9tcCLeHCU//RN6gkLj+vP2gtz0hVur4PEN5tirkpLUVdsFrivOGBchTZjfPMbY9vq+JIpG1P0zpVqelJ7aFhDT4pMSWpM0xHQ3q/fbIV8/TuWbzCqcAuupx4xcDYu27p3OQDMENLtqwmzNqf1KYMxD2dX1vUBap8LYuDciwDzNqZ+3aqc9atCOeuOzlhYKmGjHBUQtrZEX5CdvXRwYzExSboXstp0buogvMolTF8fj0CTxm9vd6Us8Y+uzZchBUsV root@9ad19d5f-eb25-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBLjr8OFS2oYOilny+Z9Z7vkJLXmzMVpF5T3iyOzdCi+hwD1C1jYj2jFJozrW6ymZn1fOipVKfatlF3LeDoWKODMe0OWM96QnT4kedfZUZGgoGQC4snaxRFxc0XB7eo+POl1V/Kmuk/KpGTqopa8Oe4purSrQFRfrX2kqPnV6xxcLTcoBVuGxqS7DDD+mOgw+eRntgNAPkd5U/KYTS9WviaIeS7Kn0MO5yVNTCGNt/u5EUtzrAdU73tZ2rqXrUnKCwOo+R2X6Qa/dB2sv+zRIO4toPU92CWk1/qep/QrcVrJkUN1zx7xtEpEcDExZhNGv5miSUjSUZgGQW/A/JU9Qr root@385fd0ec-019a-11eb-b4e0-eacb7c15c8a0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDePLC5v5nZ+4xWdYwc663W7k+4awfN+7ZBM+4KtCjXQMY71IqNWqZ6/a+FWgPfYhEqmZxXxLfCzZxqnSisXaFEtARTqLvcb/lybrP9Zlma+FEnYD3IPgKAMhI7ASBGPhdKUDFUIWeXjWmNeuHpXS+xiUlh4ehxo1s50aE2OCs9+mdLR/vId1tcBD8Avyeos0WCYiwhnNMuqUedt9AoZtm4Ipj2kACEW0MzcvrBFhCvJ3iKyfqGC/mgkrkdaim3lXd1WpfUZ0/Rj8OGuhz7IUJ5yxc7gKGOV0x8M30dsskv/AbYBFm8SQobYv3bmoBZLy8WZ9wA621r8BbcJOiPeqvz root@6070b4a9-068a-11eb-9dc4-ba187aea6a9a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD3wwN5XdQ+7Sher+PqojwXzJYMAbVM+iNMH+b4rIpP6MUDs0ICyureXN9ps/pOtBVxGQfPH5znQTLkugE5s0HxWWu5+Giw3FeomUTp9hU3GEHf4UOYL5luManeOERI0SzYurfyBzlBgHVUYRykrgGhrNEDxVlETLZ7kxZGpkucsgWQp76gagvXdwcIJHvhLrQa6rB9GFeWwfQmZmiJ8TZ0RrWkvSOOCY2V8qAwvEPbyPgbRx6NvwaEHqgtW9em4eZP4uqU+8PljV578x+5fTyltkezc+JLtufy5pBau4vs1TAdFVQ4NJt7ArGT/QImA5sdCa7tbflRkPiQhGApcDFB root@f543d647-0934-11eb-8b01-e6b73feeeb4e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDdfbQh+mVCO0qgDSBSxsymuBP1c69+ShnFSCdvCK3nybggFdX1t4vkZbBOsoxJHNykUQtlsAuXPOe2C9kZHsLpgl9BFFtwDQgvRf7EBhJkrERC425XZP4JSGLl4EHj7SXg10SsPedAoI+FuMR+Xx7J+nKMbhRzX/IZ/laUSM4OvlybvUpDEWkAXXiNtUk2YnK0prG34R7wvKP+uvnaKuz6oX2yzQz0h1rLxXnU6fNCnmwpMSMd5RQTh97jljV2wiMjEiD09VZYwaDeblGH2eiRgjfj45y6zLY2mM0uwM6Ol279vSKb1FTc3uSrDbJAFF35jTz75I4RZkXnQ2rCnzlv root@bdc76bd3-150e-11eb-8a3c-66d0ef5d093b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDxovIdqVvxyFNouIZYDHDKT5VIDmmDTOkdB2NBDPycimFO6b0agYj6hvHO5SFLABUxSZva+TCvhH331VqpWNOGANDf/k/UXoJrY51syq4EDNKRJ9Uaew/ahXPtNUc+H1/iS3mumY6gND1nlYWwuW0/qgYm53N1pdJda2HLiNen0lUMnZA8pNwCKcMEW5AXHHVqK6052Upl/X0Z3SD1Trek+9ZXUfxi0MsSSABwXnAONt6Bs+Xc1xZENOBmGV+giAoNr5nSo9YdZWMnDctaSajoQrFFPHgc/5rKGsKVsqT90t/SuPnu9m4f54cM6uTdcNsFwIhDkKrC/oT0agh9kIyD root@77fef04b-1b47-11eb-99f1-c6d701d1e283\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBEQ571o/fKvwAMguv0H8UC20tbSOYmcx753CDM0H/LZosf9Z+OrUO8e6k/wjdflnniS2Q/mxRcrqSXOvHDwf5w+rqIb8afDO6pwU8l+K+IKo2Pf29G0U07sJ4iy4OOyr7VAGKXhrbbb6Vwyhu9FW8No+JRNY7oN5j6aBq8sQD0GZUvw5CfcHKwDCouEZm9dAhSTOHQkMzXUT36/EGqrdtHSBKXWjAv3/xk9gjsVo6cSboDS3WUA37qLbiTVCjwlvCiGVtP+OTgSN4kWMukduGwF+h87gnV1thn0/bET22RnIbSnoM36jPM7JK1hDkXdzYJx/uWEeBKP0JncTgY35H root@54fabfa6-2dbf-11eb-8da1-5a2e729b6dfd\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQChUR5KKYVhzc0E9NipBtpNZcvjRsAVHiWwXv3lst8jixe4ClHWvRhKujG1ZMnHBUS0if420WAXqyR0HXMjQMOtUu0Retil8xrI3hmkmXU2USFmoSXzGfDO38ATgLgo1dzVGstZWGcFJJBBGxnJDIg68KROFlscyFzW8ehWDqx5ncfe1yW8RXNKDgRf5dfnRn7j1x0yJgLIGhIP11SdHTWyWUq3bLuCe7gFRATcy0aDpuv0hvm2dZxpmInQhYlsv2jm+S+u4+4APg3LEjcwNYLh9mPdalEOiKejChYFaPtrfo4KT0XJFmugyWpHMycmPkfB9kg4Fg6Li/xq3GGDatLV root@44da2964-4689-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDNUgOu5dNAEmrubPwKRhYrmtJ2Fxpv2f+3x4eZv9tQxYI9hZXvMv9Guj9MAeCLxTjzQFmHdnVumSqiTtZ3v4zmIBNFn08tiM0vNHJTLuAm3Hr/PEgM0/szyIFjGFT+Q4itcINbr14+2ozaSHY5g/dXULvlORswdCrZ4kO/3dTKVzn73YL4ycHxvFxvLMu3+h2LFdfzRtOf3p1V0qlQST0reoOy6HZnyvO7HQtNT4gNhDJl4hGSp7KfbtqrR9q+zZIhbcDMmis3KyB7z/Q/l49cGTTvm9nOHdIOlfb5VzSDUxcpMbHNRChb7A5rpvtYFxK9sX0qRH21TcZL5LcZn+cr root@0749e0c8-5081-11eb-bf1b-5279f1a59a83" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-005", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-005", diff --git a/audit/projects/k8s-infra-e2e-boskos-006/iam.json b/audit/projects/k8s-infra-e2e-boskos-006/iam.json index d350e9c02d6..b33ee2e34c0 100644 --- a/audit/projects/k8s-infra-e2e-boskos-006/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-006/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-312830434057@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-006/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-006/services/compute/project-info.json index 276b6a2f33a..227f81e3e5a 100644 --- a/audit/projects/k8s-infra-e2e-boskos-006/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-006/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC6/MWRekzl5ddztARmRuIsFqb4LUae6vdAqCje7WqV2IRFuP4T25D2VdGq76BoT/AQ+arc7vroMAV8YUaoZT29L7HQzAISJJmrN7wTC43d6TsIhRUdsaNES/DjmefmCYAycwUjLFjQ3irZL0mRF7zLkNII5qcRABgVZ1VoEGiVD83YUrAjshqhD7O9uo6tclgGmSIle8aEVUrxCh573OiWnBnn/InpVY9Jhr1c0gamZnVh+KKJmuvJzaMP3q7erfBNPOSe385f/9ViFcKo9Guo/ggD5DSBU6Ye7vKPo7kzxzINwqE9npyi/oJ1Pz0nQCXeesx38ytViBJWTx5ZDJYP root@130da066-de4f-11ea-8a0c-be937dd98cfb\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDV/oQR2MRFbaqUXEqx2iNdETq9OKX9EhKHuMQC8YtdDQeggtj2lmOQQaZbOsHepSmiLTvBujmk+YvmTq/qeg9PmoYy/DPKSudm2GhbAt/sh/2MGvrCaji+5dtowZ1YbI1xyUcDL2LhDaIuOCXZQctQfwEXkTOOJPaiEk5mCoj8zQatGn8Y3qYKMWifG01HXSwuOlpySelOUmPTBjcumROSN6mXMdL8HZfwZQA94aAEhEKf39UqL3lnku43KzRsBe8LGuJiESOE3b+3iLEIfo0ZIHI2G7rrmEUdYtWK5w7o3tTp/Llg7tpIwepwigWYSrZ06Yk0/ytFL9HyQhBniUdX root@8ea708af-df32-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIsfkSTRyuJ5SSijCXioW4cT1vdGePhs6CqcrZrjWDZmLuGSYW5zncBVoqa7T6Pwj9JanYUkalIETwvBJpzANACgqIzGaefZs5eNE6Up/pOqnJwJSOTGwsEo/tu2SCE3qywSlF2RzpGW6iW0/+6J95EWfZ7Zepu3eR1AbJ5DC+XJ61Mcd6D/XVEzQdNxXbuByvqDNLBAhMl2+/mFkpgKy1+eHjmx0ygBluMjNBJjDUhkJF2aUseVKYJtsTB+jXMvUgbcPkrZDpGhFpYc96q/ogmHDRrmzZFCMFmK2xX+mbRCttLBlVvcvCqrbA+3N41I09AJzK7mrmwHMZnFdreAtn root@9b4c357f-e232-11ea-9eb6-86c455181e58\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDY/b1uJCj/rEJWxSHwBCBuc9AxdqsFq0CQOhqb9/0nueGqLCciEjRLSNlYaO8hCuZ0+eE6w0XZemWQqKpZKc5v9tEtE/Pydy4ySUtTJ3x3ZFzDtP7S7cFr8QiwcYptDK4YaYK4w+dBEv2LgJPTV3QmgULNktn8dSd31PzuBcy2b6i+g+jlgpesgruws7fnV/5PkXeClfFrtFJ4ifCkPcGx+cGK0lWRNgJNz30K4MVxrLSFmnT0DFkU7E9k2QwlQbUXQro1+LmZY21r5VbxrqyoU/WjhWlnlMwoah8O4M4R1K/imdZCHBJFc3px/6/7/3vd4bI4jBx/zKUuVB/GVL5H root@d0161c6e-e787-11ea-8112-a64f894a1815\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCbbeW3OuXikD0+QBzioDusuB/eCTZodanNpTL4MqZhh7MG/8vvrsZhH5n4W0Z05GAlQLh3CfQdO3dJdRs9aR03KJcMi+AKT/P6rmutEUkU+oqQsN0Q5AC70HC9KPefYyG9fAbWGXLJawkTkYnwYEG8vaSr22f3yYNTCBybKS+HogUHZpNK5kS3pOr08Y9z5h13TxeczPyufZnUIqIoMgAhIbTjT0Ubuurn+ulrhE1BVLUUjYAO4kjByFtiCw6zeW8dqqEokgOuZhZVoLUriGkrNLb6sdXCGDmEGFdiRYzAt/KXrieQxobmBf5o6/HOqK5h1SCDNLdyChozO53kh9aP root@dd4d1d0d-edb6-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEOQAxarAVafDjZxQ/KIYLAQakdtI2CHhgKYMwpL6nljrJS2FB7FEHOvtZwLRNVudgNMagldTfuipOAbKMa7YIhUpf4d9ld7SJ2/bVgXk6BjJbCgsGQnnz4PV4LLzlHo21H7NuLrb2wGpNaVxNNee2JCQMqvA3tBOjFHNJ4ReiXBrWF3G2pOpTwopoNScGV7tGgD/FOMFuTkk1grZ54fJtSb38OiLuKrI4WudThDKtASmy2jSI0TciuijphZ6x8Er6KLh1I0NxrjAJnsT3A9c15hhfkvWedrHSz2rMU+wjW002iStekD7BKu4rQ2nPcIixYzyyRqRSOHYOs7WiNBqv root@88afe913-f625-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDmT2uJU+qbYdZR+QQvtiVHOOpEB9aPR+bNoy7h6j2+ipwhZvpplMtkzlX0NnprVMntR5YKEZ1y+SFOBLW5/42YPcfsmFQ2sdFf9KULwY+jTrF4nWo1BEF7+CCr9YIoXRlOl2p68elyhdvZYhq6JCPP1i0+B/9I9cHb2AvGJc+GRaj5/Hbo2180SRk2RH1iHbvb9IKtxfqeKjVv5UaoB13nBkXDxTKUZm/Zx7MlkSEGa9piDmva5Ir01swBt7Puqob5uGG+SVEftXQdKBQ/vtm8FUYzQQoD3VC/2Kj8UHhHY6qCpkx2Kb5hdujpr+vPSzL8EQMK5DaPVCOKbFNIWX+3 root@f8f1c82b-fc44-11ea-8986-ae48fe2da37c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDAmIpVdCp8OcGbKNaWXtz52zucWBrIN6lDlenvbAkOspKDzJZoHRLVsx081corrFbooNLYus/M2sOrocP/jfov3d2ShjdB10LA8+x9iQeChCXokO8dLFNBz0ZrWHAtUME1Cb81KlAWvIzfq0kl7CK8bUflfPVihTFjyC7jX75UzeRNnio8XBQ+czCTzF7FqBu6AzMWfZVMwo+kU9MPTQalo+F5B795xyvZTntPSMlzr0rrDWdHDcVURBRQiED4ElDYNFAvePh2UzNYLh9js5VWBLZPeAjenjsvqK/4wLQySs4+fNpvmwfk6s5MesfnoEN3zwbizY9hMQU7FcHWT6LN root@a629b76d-00b6-11eb-b4e0-eacb7c15c8a0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDF+gG6Ynsv+OK2SHTE9eBM/2IIrty88rJtO+HDmmCKJjM9lKQoBmtlVDHQsPenafrwxOSlZZxsqXOgAjzvFhbP1NAZT50fbQW1zry6KDEc3NO+AOVVXmXjEsGndeeCIijHFHwJBgYDBtUYVVrOXgO6adqBgIG5Pw2MVJd8FDkvXI4xDf75CjmtFXbkFU2lqpxLtUfnIUAYes20sfPpXc2Pff6wSA1eUL78Ft5pWe5baJHoKx4sUOYKc6jYZxZAUMroHBs82XPKPQgjTgRPrMxJlQL1IQqrKwCKv58p6elBaS0Q4R8AMTZmo1/94t4bhiC2IM6EGYdlY7vh2BaEGxvT root@ccf327b0-01cc-11eb-8b6a-ce996ee2646d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCh0B8EHTzPmNQZq97JkF0Xqmw1CKePnzkQgqSy+K+oHYZwWO/dsv6ceu6DsoGK+XIuyBZ6kaUYfcJMx8yp9Z+zjQQReCFCBVnDtLPWyfSJ4zFUKS4MN/6v3YUT3gQuqNsfjKYkc0uHObktcIsujtvX5kRlYBmTsJh+Qku2JeF0UQuB6k8SbQINTobQhEBTUaRrN7dIb1/xZFhNCYKOfweN0begvPTxtJ2ZXX9zpWazgzPMcYMo/byXYQ5A9AxNOtJ3XPwMgCcExqbCNm88rmK9NOgDAyME28TkgUcZkOuSnpjsy4j0u5al+xqZTsEFvXTuW+AUI7SFRs0pdT+drbqB root@b54b0e44-03df-11eb-9ee9-2af320b50223\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD7+WC7FX06Nbw7UZNTCUQ34ORiRZ195hKEMe2fkZ5axEWxppxCEXnKkCUIkflp5RA7qaDquv+MTRZhuvMyAxNuSkT+B73VTla8BbSHy5EL24TXoZNJbuYmpt/nI1igIa3oRRVAMmhJycOa9a4yQiCc4L1O8E5kQd+qRrRWcVFk1F9RtxORXpJtZgu3Dz3HuBSDXPXF7FF2Q4MBIMNaivO5DBYJM7zLag+RjYjIVNF+D8s6CANYPh3PWkAZ3y4pqBEbnkPsHLEFfmFmHZxxkqd3h7DTcF0b0MVzySuYprU55DQKzk5C5ctzmHQsgQ1vHUPi/0CDvDrj1BEb5UCYBk6R root@5057cd22-15f2-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDTGA9t2EIwaxhBi8UNH7xiHcK2M3Xow6q4H+hamiMvMkYS0JKSCH5uG07lVj/7eQwjEJug1qJzqm8otQ8WFfLIWBMpS7bA4MEzD8KQU+uJclR7WFhD35Uh5TMCtXpN+98FE+6alS8fkcKdokc8kWrzVScfPd+lok1niyJSVVUAtfzB1ThTmjMAGkuZsqMvOk4fZB1MHXouovEKS7qVotjLo7PC6OSw+o0ADoPM2kiKjTT5qp9k5Ki22g4c47VcQOuH03aAu4gPXsTic/6Y0O55Ck92JsE6zrG43ZXunhXH1s64pCtnyuCafmIpC/ami1yDsaeX2MeuFKqLu3EGFlF1 root@b8f57cfb-1999-11eb-8107-96bdcb308f91\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmXkn30XdGEihsWXhu/6EMAF8lNAg8UDROJFMBBoVdzpnqzmy6akdPmcEiCHjSVAfNN8I1eksskbz4r4gfXIK+ynA2JqTp0U1Qq/9ZL5B73OHDeIITnWOWP++leA6pgfF2RREUvlVwUBRp64kGwdG4XwX2NJlD+cFOgGr+H9UXlTrakRty04OTKhGKf0IvA1Gypi/YHiy/0alTP2xWE71b1K+YsyKn9QbxX14m7igImaKliDYOsKL4cq1h0NpeeoqsKdIhVyaPN2hxevvJt2O1r8cG2uSVwFjxFWQkQCEOL3VorZUTyMtWBxFKit6SpGrsGvlrSZnewDhMnlaCbsRn root@d6bb0de7-1eee-11eb-a4fe-eec30b56844c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCnsx0iRU4uo/5OsMAT5KsBceu/OuFxHtD0uioSHCc8s/S0Wk9XLuyhgjo1DpzStqQZ5nxkaqbLXhOTqz4eu4JhoXBgp+q0gtKo27N5hriVkXnmmVk0j7X74lHfYj3zSn7IM5jBUtTLEzew7muownuNGNJdhTMJMtN0VUqvhNPW9gba97XHUoWVZffhvHWmB9XK72XdcvZ+C5TRyVF/GgO/a5cL0LEkHAsEqERIkHrz6EIAUPRBN4uBly+e1v515eWzFVomIS7konH7jk8OCEzliBBqtPzGW/G0y+6e6yQ2GT2IiGOrgClkNndfFRqWqYDZENIFAWGvE6z/HvTwRE6P root@d3210ad8-2ac8-11eb-98a6-ba1d66ad0079\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDeHJm7D+YLfuzLIrh3JcVQJGwVKKXME41TcKWE+bOCea1TCBaPRGCFmvTZoBSUQ4px6sZAfvf8Qrnd7XW26NTo/RDf7u/HrbMePBzEMQt5PnuAm48EGppqXEY/d1IFyY35aQJBTVTNaru/urwclq36NJ1rZMLJ1ko/lhTlKO043tcRPPg16uzXjmXfIfmCmL8DeNGWwREmr/f5GApVx0hwuk0bL1FEXy/+J5xwoxgzexKVw+LcQ1moCeysa09zbNRu6hbsfYKgzCc8ifx481so3GcP1HZFKLkC6L5nOM2Wjuz9KsSfUiHBijFl1PB36QI+eJxQC87KwqO7cJ6u7UuV root@32af061e-2ca9-11eb-a59c-42dfb897bae6\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC50nG4cHFDTHv+Ny3hSPfFY/9lZUjNvUrQsmoot7dAKS+4ySGfnfQGbyuCqiT0LQj1bXEuyMD00ZBIuDFH99Hr36FEYtyiIxKBn4faWzVikXG83c+p77Ty/h/FQ0TJZHTNNzi9exUeHSvKz5jAyMQZMye2LsaJAGoq+kZMrXyDRG4de9wFWNpp1uOTWZTMxD0SeBRdpQmWd0V+ycQ3SNKlnkL+ZaIYPUsZrd78qTgYVARJxwKggz9fMZcEfkhCWbFESpg9/jDcLXoQmD+ueOezWvaqidAYRUQCkcHOovP//rm7PJhZIuSpDBQsTGmm3zvOkU+U6ULjdUq7obZUYpm/ root@394dba71-3999-11eb-be51-2af5b2470e9b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDpOK7rcJZb3QmJvz8YN8Du0Bs/aFQ9H/q0x6hbkjd8a5Mox7iCOv6HKAFBjEMFmPH1YrGlXMEVMfHEIxJ+UjoJqIx6XoDF23NkGNmwmo/OvUce+Sgd876JeQ4qmParDhMwpdI37aR12h0bTmR7nSqfH9YueECt4jt8MJCyOV9AzE06GGv6yV5snSfTa9YjMF+JskWJZ2zsNRgWv0RoD8LBkOUn4lJEY5tgqvtIu5c03ptGUdp2byz4rnZubEagFLAhL9e0NzwS8FBMYSyfqOUi9apx5WeJRre9b2VL45Rn1afnkYI9qWwPDRTyiSszhuHnmmIvimjxvn0XnxLDDZGN root@b3f300ea-4392-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQChq/Kok5+eoqkQ06kfh5B0IVWBwmRK1y+kwiUotmjgI9UViLvzWsvB31ceTXOe5chJ1Z/8g5cZPcslBwgSZ1ytkgnguj8CH6ZuHkUPwf6LFDE4y2KeVV86hwtjRd7Iw23hbQ2DS98VoBU5we2SkKUUM+DOwR+IWT0UMgGW+dbViNRGMx7anP3vzLa0JuhP7EBRTxfOqdw8JR6Hub5GrkVdLxwVoBMv1XLZTMO4nzwrLiF6whYIk93OgnENnVxkagpDqATd6dikXBPTXV6NnIWJ2IVVVxcTbA7N0T9LC5TTfGXSl+aJVNWiIA2ekXa/qEvQud/E1oN4l551iRjvN8rD root@697a1a0e-463d-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDG7E1gon6NTKJ++qdiQG3BleMRF260oVD4Wxj8aVIx2i8mc4wGXmiaFOKATjIKFczD2WCpoYFizX8CQ5yfTJMxqi7YD0h730NQVge48Ct57dNbducXyauQV0oiXLHoy/HyyMM2Tw61bfpU3IArfaixbGt45RTnUM4TlbWTX3ZtpeDmHhFlhd7GhHnIvvTvBVxXyiXwe0gKkvdZngLSLdoPciWLHiTAHzC13mRaOoYwxfZWE0F9omLNjxaNNUeQvWssv1P4T1XkR2qbczpo5dWAEkFWPtVpoH4Wnr1INSVlvkq43mTFsdHOaJKHulNoeBgsF4Fyua0oIvVAuyihjXF5 root@8ccab0cd-4804-11eb-acd8-6a2a49dd8a76" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-006", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-006", diff --git a/audit/projects/k8s-infra-e2e-boskos-007/iam.json b/audit/projects/k8s-infra-e2e-boskos-007/iam.json index 4e36c1e71df..440df080c3e 100644 --- a/audit/projects/k8s-infra-e2e-boskos-007/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-007/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-7650953204@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-007/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-007/services/compute/project-info.json index b8218775c19..f65cadf0ac4 100644 --- a/audit/projects/k8s-infra-e2e-boskos-007/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-007/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCi8pdFRA1dF1WRO5KP+Ol673+KbCLbUQt2J8gj7fwTn+R+XSS3sdpKezuNqTE2xQx9l0ZlMavRknPMvxyPyodN/sSMt/dIXubphc8zQM5DGCl4p4NBY6WoGYG6VZBRnBOn2kvAeI5Fa01QdaOtSdVlgr5QucIgC7VqAC+CI//8MTsQZDkodwyOUQ9Hs4pwKvBTzxLF0Xg5YW0bu+K3zctolYpcjo9yhIVxEPSBDqoDF+Y67R6KF0m22901Pn9j621OtfjyWKdqcnQqI8lT58jGlLBXx2/fVHghTHItlcZcWta+cdX8YN3rhlBR5FYfmB+4M1FGYI3ts6ljX4hu4d/3 root@8f3ea473-de81-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCccAt9XikqIdshF4ClrNrAY21uTtzx5fQYSzNRxs8e0vybIt/BYXCWYhN2SjXV1fsb2j/I56gtoD+DwLEbI/VQz5sUgHkU0cdfbdn89FGztgnA3dlHMQ8wvJv+kYs+1QaucDC92QCTd1FS6tBBMCqtF+zL3S1LFWJPk3pfilXAtGGnm980c71OD/PdLvb35rrTXBN3OaGC/Skh+D+C3GZ6toO2368MKZZ3uE2m8EQWTo/6X5rACFzxVNL0eg7lXK+fbLO5BA6kK1my0MdBrX4XNN9Flmy0SwgTGCozpVUh28JkszrpmKX3+envg4c7njZAm5+J1LaGj43ew3EJ+SML root@f22966a2-e2b0-11ea-a87b-7e1d84ccc038\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCpFyij+t3a3k++yHKO+L9UEaHV4JnNBxLEj0jtTnMqTefRVXb6N1Ldg+PhQ0M0wgP+EqFn2fRAkylj+cgzQrm4Sf+ZP4xvaav2fIw5f2dRWxLwomqih0XnuC4t7Z/ST2augMb/dywxfFzmC/KYJhUXf/8bsWg7ggOBUcAhhEb6PuSUrg9/xdumdORM3BJnQU7F7j6IEt8elLXtLxR1M3wTwzsoM+iEu+NxWjtJM0AwTUIJpugJculhIPHNnzF3G0AO0N09fbY7qnNlPhDt9Lk32sBLuJqcHvS81Oyi3dUSspv1G4sQbSYMdyaQ165axjJv/DXd8Xtw7R1U1+mQf4Qx root@e218f5fd-e412-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC3F0AmDXljKuEH+yLqUq01J6mD8Wi9+I8gr0C2r0lbsVE6SaXijmayErVpLn5UpHYWTvfZYUyaOYciPOMC7cWqGbyr8A7vk5saPdYROHvMkMSNy6NZqZ0iZJ3jez/Y1HYeXw2KzvXrLPR8n3kKpfIa27w2YfPFH6znmAuIcHhwuk0QXeWhDveAyoCh4AK5m9tmf/lUBS8f2kZz7z9BQOBaiZdh6u5qrn1dadIARvKL0TOb8v8sQLuBcaYBS+lY2BrWxdXoua1Fa2SWXTwBJbrHNPxJi7B8eQ0opwHgbUiq7fESboDVDgY8UHiuAeCSOzzDP8C6ML7mEVB+EMq/TV/h root@9cb038a7-e9c3-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQMt4+DdNHo3KsK+8guTrjczTM0yuK1sF7njFMTzyRVjN8sKEz1OPhZhYNRvO32N5Da8fmd5dBkok29ilujtIfLtz4Y8qJFvN8zCE03BcQZOj7LWBY4AuHfexghzgbQmuDvSuAk5yejhqagdnj88MI8vGOrOQG8x7mfttO4fm/Fnw3wS0r6YFzXa6xyWgrQL/wmOk+qSQBV36iT7Siw8ln1WPxCOK7gB5FBfXzC/qz3XSakb/7Gn9x3sWsMHuz1Hxhb9yzMXDjK8q7Vy5mQlJ6RlxkhQlxJSsFlLhym8EmbmsRj3qV3LlJv4tCiPiur0VgQ6biqdqYKBnA2Uuz463L root@430d0030-f25b-11ea-bd49-066a8cf01e04\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDmzyHt6d7ee4q54HbseMupcqBv4lUFxX7Y9oV6XhCj48sIOdPYLgxgoY2Mdeai2aq2Xbh/9LBEgJOwZY5BKKP3s3wBcrm+1P6Ls8GMzcwxHkGhcbHN9KTsJHIL2TaZ5C3kzBVqXD7sB+SIBD0UAeyqWhZSaWG1bN/4J6cKyWXmL5nDGjt2m0p2Q7BHGRpEuiSHgyvotXHl9F7D7usoYhd7AOnC/Stv+h7ummir1sNADtgiyvc/ORX56eb6aD3quSeuv9tXMGodc8dCbl4EZPb9aI0zw25/8aFyr27B0H3hALeF3exlvoMUgcIvqVmU/qq/6pEgIlN09ISpEiHp/kfP root@47dee6a5-f884-11ea-926e-7e7ea190b727\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDkVC7fqdse1eyjeO6xifN4dDoOBxk+NGU1gA+P4cgDJRS2fVe5UcVxLERANccsMu5cYbL0QGGbGL0Rz850CCUrnvUIH5D3/pUSCOBhRPKCq2+hetvx0H+LcwepxO4BgcSXMkuTWh85ZNogggo5da39GnJt1hTq4Wsu0cAzxuw+xK4m4WtvoVED6voEiL/u5UgUwsEjWBBnf8E/dxtLeEiwmSztn93nhTO0a1M0ZwjyD5kZYFEdi5S92s8ccwpTDnPpgjz5mt62t+ErpO015s7po20izz+iGF+gdGENlp2IYA3H8t3053j9Hq0FVoE/X6DEsYZqYcWq0igp1fX9wu5b root@8ae58b37-0805-11eb-b895-6272783fc925\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDu4LKYShWO1WwVnIlvktdVqPjWRFZjIeMUOXEWC+Tm3LymtervzQ05wmF0xPibG7IzDy6rWFiqaCIJlOOzGX8nLaTNCqCudZdoz4Nl8m3lGkVvpO/f7WJ+KnHmijotFJyZLq8NBYkyVrwOO+UGT8IEMtk9EOquq6jIYCTNGcfNDY8XckAPHMGDE2rdU3sMApZdKmeuupMvOlV/ob2crmn450OLjlJmWGr119Hb9rgT1FJ+UhCLDfrU8Uvy1CAdaepSrQENcLxCld+Ua5Q2di5kiUn07P+R+4B53uPIU006GAn3m6ppswWtWBxfr9XfFhmbHFdQ3ZRIeFY1mt6rXfnv root@eb748862-1e3d-11eb-8d52-9233771f1447\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDWaGOsvaIbKWkmq5b63h0J49kS6v64Y/O0ZKvBx7fl88mAxW0HN6OWisYqPYjESo5S7vCevQLhExNFhJdvCgcSuaNzwUlodYSjQa/ZXiirfWPckPPpY6116nCHGjnYX6eo3LBFPJbGzq0SLJNeoHbsaxYkgfyov8DhtbCI8zzWtcVK8ZOoODVphoSaj9ugA/FhjbkNflb9AHIZITcbh0UGFCEIDahMbFP1veYnsmD2WId+qd/CA0QKFSjRMnd/ar3eq9w6H2576Vts2T0UGRE9FU8m0UCLkIVP0P4/p8EStU+OagVTmGNelo/fWtY1pSC7a9N/3rrzDTsMADEJ4gir root@6575f33c-2083-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCph+CbREr5oUuclVtHRJFqUfHM9lsigbhuvaxxFWSgW6KO1kPhMI7ixPR1wMvk+PqjE8o5DEc3zWdCeD8rAvKC5dZAw9SY8YmTgAT/OkbEoo2gI8gsBkDYhYtmHfC+gsr1C+QJyWMC+jPMc5i7LJ4f9iyrXyI/ethz7z2B+WINZv9eAdeti5HM6q9njVjQTLngW0foWhVFh06Fm06Pxf4ZSycgAaohlF9Rp4na1cdx7X6qP1zZV2Nx6T9r/TStKmg0ctfkODc86OOjsqHVjCS9pzTor+prcfQOZ126tbGvRdjAxG5iBqP8SHuoKswV4dMe8OoFPmICprc6GRuPD17z root@d2ac4ad1-2101-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDXkIePcAQCdFJrphhXLedaqKnL05+eUvmiMfMAgBK9O5trcnh1z6B72iHTlB036hWONCZlJbgmDPDx55Vw8ud1AAD7Z0IJgf0jrRhY38vnZjtQC5FkYNmZPW2OatS8RFizFPUS25eMrSJ6vi4n9/nsDXSoizYcbjVoptAJvUV1UpVyqh75RA1VXhLA1/67v2YGr2b8RMPpRHjJMJNu9V0yLz0EcwD8wTvtL4WxunEUHOSCuia59BBbVj5awmPosEIcgoUJoi8gx6yqXKJ/8N20JFXPjn9P8T3/QmtUXFUFR1mg7ckO2vhryM6h+bDQiP78mZi9TfMTZmhlywAkI0/N root@edcec6fa-327c-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDbl7zdSyO5f2agCetunxenDhvO2DEMzol3P0wcboQcoc87GmFlJSyjJK+XipYhuPm1JzQNByMALUZh5hUI5TISHPvUu04vY1LQjGtx7uSjPfdS4CGdPFITslIA6NGZbJuVMU9LYOtjsz9n6w2FOAnVjP7Q2AkhYwaHErdHDbwA10rIumhn2KBdYNuuoVctpK/lcY0l6ZodeuYMan5vPWJ13gSRN2T9ccDD/Y7pHfkPXqUwBeqJv1cUpV/xZQC6NgzRI3s8sddRnIqRIZctsJqjh8FtmBN5Rn9pMGDsY+Cz6YBMAJLkeOqwb/vs84nTvrF0YMQAZ0e3U3aKMUAGdP5L root@5bc9c587-33ac-11eb-84c2-b68ef41a6728" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-007", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-007", diff --git a/audit/projects/k8s-infra-e2e-boskos-008/iam.json b/audit/projects/k8s-infra-e2e-boskos-008/iam.json index 7aaaa38d75c..c9acf6f55b0 100644 --- a/audit/projects/k8s-infra-e2e-boskos-008/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-008/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-890593655482@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-008/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-008/services/compute/project-info.json index fdbd8588c26..6d062212553 100644 --- a/audit/projects/k8s-infra-e2e-boskos-008/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-008/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0AcnrUDsEn9aULnFvDwzV/fNU0ThHZcovrnS0O/FUR0lyeRxT5oy6jsVC1vwRvXqdpW5ftjEnMMMK4rVMIAepsHXy6EzXIEMpuEPJsUJYeggvT+hbvieJGQ9OyvaVflt48+NZaOZBXGFeu9RYFNHmAjRYyrS84hHFGLdTAJQM/6aFsDMesyPgxwgP72ezPMs2ssAFWr3A2ST/x/kItbpkP0iZ745qhbGciwfdOY9Z+WIzTq1UhdjXN8qfOQ4tii15VbD/fzUT/hW56q6OML+7QPRnnf99rpkGgO7NSVux5gwHtQ5b6SnOYhjPUidtwk+n29sdBEwhWFoshijXVVLn root@8dd461de-dfe3-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCVMFGfT7wkYCmoP1rSXKbLJphlJuZkcDlJWQYu9rROzCaZaF/ldyk/1GEE4ujKiznN+OmH7Ka3C+YEQpoj6X3ssrFu7TdKwTn2uT63DWLK6AK7NoKMKIqkPpW6VjVVSgENmMw5WTUFbGcQNKiojeMMMidqNEuQeY3ZucQjnqNKGOoi1n49PD4DhZjrkHqBefSgIKRYr4M764E7QE26Hkx1PsZpjh5pxHctjJYagCRquLlIpw114NPcZU/6WmDByNqodwf2WLNbOZeyYOTkdaFBEigPFUSD76wTTNy02qAJqb9S2BovPrjCpAMF1QiBAvDd8eMPPb6E59TUg7Cs+Ksh root@022fdd36-ed6b-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQChHKP4Jw/eYja+NZKti1o7AIvbZRZlFwEyQiFk4gAlxENwdkOb+LPSgjTW0lB6SsyDEzDg/OP4wrvam19j2oKjjMONBFFC6Awf9ISPYjdNZnWE80dGlIa1GYlNT2MFrlKKbhzOEgOv9OpwUNl26sRdvE7u5DqXcwrhxcKnnKFcRJMkuBkF6DRz7oiVHQDwn0WQtecFBXGgdHO/TLdqOSSkX79Jkb+1p6pQMIWN6nwGI/24GEegt9UY4nAPZVAb2qQOAg00ZLE4l6TwMCcYghSBrUzkYjfQoy62ySm26J3VcQurUo2/YLbAODxTLDBDjrSlXGzIxDdIpermQ3YWoghD root@eec964e8-ed8d-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDV1Tk1YwIzYQU2+fEc+CIt1OJ6AEBiwstlxuqmka6T4/aUOrL1Xms2NShtC1AVTopYgmuN5Ylmnvu86vlRTypN+X3mPm4vwHA0KLg7jHiDG9X09gdrS6Qm5KHwm3bAvmtQf2waSj7zzu8Y9OjPBhOn/NLp5GsHo2ZfZa8JEkSUYS3zFdDxgOxbHtQ+kC0VXg73MpTVcQY4zmgFtjChWIRjT2R9hIDMd7PffTwH9ZJMTW8Q852gQnm8W5FiZ5e2kbyYtN0FC+y53wI6h5Vh5wmfA4hXixopqtmPfYuno52Lr2YQWufiqlkglhyo0D107929vQzZ/YOIZcAtHKXHtuax root@4071efd9-f55b-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDTCl93ipjMzAuurh9kCWFAszgtUP+Tlgi3Ckfe0ZQrLAhBrbYxVZaJ1TyVAS3s0pfwCE7OzdCsxt9zGlrN8TCY0DLZCqLZ96wO4qGtT88ZJeJdZDhQ3zP54vTCPNxr0ijvecW2LqbXuCU//YrYOn3WXI/va4OBXw/x24f4BfXZX/oxQbceC0BRNZHToeyGKOAghOOMHmm3Kmz/wnOIR2BtsMz5C3BK+Mu+yWgGS5CRLe/GAS+bu0Wll0rumKsJfTCEdSJPEDU7Dzt1/sZ1rEgVfGes4bkn6XBP70SJXNXx2rLkNaqXfwyt/0lGoArorZiAR5T67jV+ece0C0VIxCwx root@c36c4ae8-fdf2-11ea-a78d-ce9ca29dcab2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCwFXGUoIApi74EiIqSptYA8rXHN1VTdwHx0gXxcJ6FhsolnzPTxaJ6OeoXSuejnE7MBO7cdqcuo0aD7t921mGmIAJR5gxM+Fw9glq5OvQfXdx5q3jpBZgLA6uUYvtV4A02aQn0BkMsrFtyeu4Nk5H/hWds4lBrBQ0Fx4ny977hVT5YYjuBkyBrltj3y6BuTpAxEfhOAZGdSx6RAZovNE1WaUfOpRixWa1jbHWyTJxHiDLNVeLrRHSRjhFpkjuVzVi7C6vU9/7VdqTv6gtSboVoD26rHkcfMYUFOPMcff+f1FXGd+JacybxpPv8znr+Aj1Z8oowaltNiQRZKl+khRkt root@17924efb-0671-11eb-9dc4-ba187aea6a9a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC5SGJsz41fe7Mf85kjcRvtMpgQR0lRJF+Nn/3ldtYi9A0uzf5CxbdTi36OU3HhvMGlP1GsTVJyTuuGjD7ELqAJyW/RzxbHpIfYCFPphCDDw0nPL0A8mnXlAngCBa3JtTQdCaeSpzKL9Kg6dAC1T11ds/orLpnQZ7pDYgFXLDAbxPxyKhoFTpf9b93tgSU+Cy0bG/sS6tZByqla9qau3QM8otNCAv+05vG7fEn12eIVL5Bd4TWsGeYMkjfIBzOrsJfEJPnpzlgr1wrbUiHS/Us/A1msgldWnv8nlod7xsQY3vE3MG+NiN6caN+/v3IsVhl82O/JEQXK1R1LbJgI43aR root@8a04d797-29fe-11eb-98a6-ba1d66ad0079\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDM5KSxAG4mEFfnm0g1eu5CG1uDh5ByC44NkoaylLZs4efPSDX73JOqsEaQfFBf1j8m+3bgxTvrUZgp9lHmf7/8cAKQYPV/fnr+YSzNHyaJc98x50rIMAPWFxGVsR3hEktVWOKeTvIQLkE/RgQCK3aoX1KsnVK/uYrSsyd8zE1SOnvT/FKKIiV6ZrVe5NGdok67YE0zQ/h5PENmOZIdh9F+ek/oyRtvFJZGvBLDxz1+vnIK4lLodqtHpQLrnmb+ocEnjYGGo9nFGKMxpH19kRnkJqmgB85Ncq+CX1aNF9tnJkXBm921Y60MvOn5TLUT/XxKD59GVZasv5xEKR6LI8e/ root@a1b722ba-51c9-11eb-86b7-56818f023517" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-008", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-008", diff --git a/audit/projects/k8s-infra-e2e-boskos-009/iam.json b/audit/projects/k8s-infra-e2e-boskos-009/iam.json index 5403fdf05f6..9583397e938 100644 --- a/audit/projects/k8s-infra-e2e-boskos-009/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-009/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-1046644858910@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-009/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-009/services/compute/project-info.json index 5af00a107b7..4bad8d3a21a 100644 --- a/audit/projects/k8s-infra-e2e-boskos-009/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-009/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC37IZ2LzuAZrQF9n7jFPYHWDs0yrX9yYoLCZhslM1PTndvdjF5csQl65Tporym3yjA0cFGw1j/vSmn1Fcql8h92+YqipP/IetHMUpkHJKcbVfZrK1vaIFRj1i21M2W1s0H0Rv7aSqlIt7utnSQz+jC5GIlBTYmmZq6WpiA4nGAZhBacgPBb1AH9z0irhP8PiQhuNm0YCpdh7reh6ikv8yLZFKL/HDr+GY5ZrxgMMFsv1H44xGhR/sDIRIl38ev93MMJRisCgFXYfWUINaBDwAeJCgVT/K+qgN00rqrMDQeKxgOFtjs7cFH9BzZghp8NznEzr6iGxQL2bOYRMZ98U5t root@69a205b2-df7e-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDHb2tWayPq0Oi1Ce+I+NGRfNdeGh6/zTv7Fs1240TIViWCiVNUcjaSekxSCk+euJMF1EYJWWxmf61U9Z6ISsE4oIV4RPFLyxt7KxfaNVE4H6MvzMn6vq8+qKB5aSM+Y29mRRpRvtO2o5PcWYsBlbObRaEwNgxryvrbX59wYTf+eDXeYsFE2ieaIv0JFIPCIwyaEJVmo7RLJTsAT0Cwp/fmKkdDlEfI7wM0HoEEjDuqITL4vBCPiB/W8LaUjA60EU7YMvl2oXT8jDH8mIoYblqxFdDsC+2135oWaS/jTJYblYcUuMoUJnwVqoCkOFP8uckBg7Cq6XsTC/9h4/tSnQCx root@f406210a-e551-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDHjFCurXy5nlViR5XExIxiMGQPuHp0wRcvKiTXC9ZDsam3jo2c7Ano3Qw8pKPnSVu8eB5Px7wdNIHTzAUrAqbxqBjz05hC8h+s1uXBTMLzD7UONwDsgRcAzSbOQb18MDcrcvCkpwHIM4gWyPX3JKQBug8KFm66XGpuMLk14IMRxZjERkars2xHOhclv7UWRY7Ctx+8o/MSk6EqeVrunwWYf3a6AjgvGiaLit4oax3/n001ps3jEkntn1ZDvM+HNgNsd0ipBdjDtvYkOzM+nmRFsD4a9wDvm6mOHBgIPAhcfU/g9kU6siEOfApoa6Sau8x7DmTXfAC3p8es9SBMZZHF root@bf568003-eb8a-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDsi1jvcaULxVuJ9BdHFbBZGWIwAJAZIREjuZyvGu6gvfjcwplpFRmRLdUHiidXnixRCngCyi11TEceH1IV4v1FazNVZIrUgB2HruKIKDEMMM4/bRo6RxJOgeVwob1w7ikdT9b4VnstvkXr8mhA2VTC/qDuF0rwmZAU2AtX5GFWibF4TA1hv14RGxjB7m/lICGAulE0091OLp7lrHjTnQV23cAbxuvigDBO7X1n0Ap2Hu9WqyiN16sX4lUalZB/HTnt9aFyH9Qi+m1ESGvzeP+hAnZHMy5rTpK0L7PShZHwdm7jf+dqxl0rqqZINjCALzqp2NX+kzR8blwiBF+77fjt root@ac3723ec-ebad-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZwF8oSY6b2UqbfA527wDBXWl3c8/SNzOkKBwQ4Tq5WZToRAcndcrps5McG4VTgNhbAQFQtwOtlQfMx9YdICmZGPrRZkLjJRvUYMqjfBjLNijmp5msSKOvFdg6dB7ISporlxG+5qZb1R8mBco7aIS80FIqy4y5nhB2FSbOzKvkpGXTfp4ZHIoUy88yG/hYknc7ZMZ2LzeE5Rq151onbYjIKsUA8Xp8/Vy7G56fXOV9N1kn+K9uAMsQNnz5AzYrfb4PG4A478ZnInYHY9/PmvkXI1rt1GjMS6/gYxf07c49PScKtBWZffV6LT6yjJudftArF5tNoiMAmCEzP3qcjDz5 root@b64b1d51-f015-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDkdggYQNeMP0BUU+DCwnjv5JghKHIW/62EwoikiS4ExZRSY7EsEY44z/CDvzWS8vTmqBnbGmTYsWwb6vXb1WaA8csdtCgnHi0IGomvOHOfftexzlpccbIgmvqAGEdLJeunRukjf9Cwr+UKTDmfnKRs0MngHmJkQzaQR+WrBadLzfKll8YTJ1lzCu3RtINTWcwvYvGbwshMMwZ1KlX3ksAYWiPSKCrSABpxVQws++tBUJd3eZ76H/k0B/zY+0LhdHJut3BQ7kYzauGC/TW5paFsU7ArPle23nK02j8BCx8TOYJwhphylE8EEPDvEk5MEofvaAYNSHPiJ61SJ9JFT/Wn root@7b108bde-f9ff-11ea-9c73-86173d37727b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDsPVjqlW6bBPVkowFavmjmiHwwtzW/kc6gZRRyZGNBfcUun9ecbiucRsTJ+VLBw9x9p5fyGskilJG/lur7PcNuhgL6SB4WNGKm8mFh6VYYcO4/MSRT73NAY+0yZTlqgNBaIlC2JNHN0dk+haNDExQeDP/64ZPzXOAD8ELEpZkK0fSfq3/4DLSbk4kXYBuGVRAuwp0AgeyCFN13x0iS4tVdcPck3TMv56PeN/wibIlhOyNM/6M2Dr1FSj00lOLDaNjxjPrbPcr68BTOcP33g9lpakyjRzhZ+AuS50dx+UoiftvAmM0TSCHga5kXAuEErc7F8MALn4KMZkd9R6IKbZyf root@ff91b0b2-0347-11eb-9ee9-2af320b50223\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDeP+MUEsfCIUQ4vSS1zF2bDpszqxe8ogGt8uuPauHbPlLTuMDobNL8mWwHNAVMiMb8gcAq6h3OExu/ZVJ+7bXt2y3S+IjJwhitppPMVc0j64iC+O34ihycV9k+x4TlqmQDOW8f+LGx3SgHc1i6fH8l+Mhhng6ueHUtLM7hNikDM69cFO5GN1oET6qJ02uYOfAh15V+FZR9ZKUnsQD9aQt2fRtn4rZ1HesMTxf25N8unTM6Jkxl98P+Cnk0xlJNkGIM8T0yorbsyLHevhK8hBfO0ShrDqFxIba94bGPDu3y/CkMfzp70+aDEa8wUi116g0GojIQNJn2aMT8BU87Ofw3 root@115ec699-11ff-11eb-9a43-0aa5164aad51\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCaeV/lrM3Q5KrdeRe4XBPD+NbxEBUbhWU64VqB7zChJlnLdMTbFAzfxMgIqbercIJ6sYrjXIg1LpxWiyaa3d5r9miZ+DEw67M7NDe6bofMHVAgOB/o0QpPgRjhhupRKD23W++RXuEsgpKeGuAHnOYSsOMZDCJQu3Kz79xlBDdAN9whUBsLSR5Rs638t/62LVbp6e+xs8NbNJyfRUtY/7w9Uz12R0wl/L8aIift1U9S5OAQFmyEqMnz7lMXIOT8Qz+2gFLIMALyG9RGwKwqaScjn4pFN+i7XbgGKwnDHHMIPhfJ/VeuV1Ec4fUmq5J65+QaCNWvmPF7nCNTIUjPHHcT root@995b5098-160b-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCdRqyCsbJhrdvwPzee39hZ/Ad2j7/p61UvltXhODB7NlTkigVD1nMo9WRxYsHVw31vet5Pqm10099lzJZbS30c6WMyJzm2gqzKrvxKQ3KkJu1YZwSW+WEtQdG/vHM6GKX9r3fIigFVzTMKhXseACjCP1Gt7XHBZGsE5f0bLvUMVjQYiLj6PUB79zC75pKKw/FWoritHXF1cNn0CyhYW3vsn1b8XIiTFF0aDDH6SkSB03qNaZ677y86mddMSvS8kxC7MHgbAyh67oRzvto9bKH3ebAClpIguoTaO5AsleVjmuzJ464KMePaNwh7QXyNP9drlSMvinxEaSIi/ESkp+6z root@c0f9beae-1b60-11eb-99f1-c6d701d1e283\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC4BcMOVqaKY1tl8qKh/Ckgy2ZzZOrwHs5k1W0WD+pB+pbfnrKMipgPWr1iW+Uoq885o8Yb3NDyuO1QrrFbFRVYgCOJDSRQaITi6z7TxOxXeVlgpziQIZEt/2bya02HLREdx4bC7B8rAFxnshNYgPSd8q5pnr89DW9b3S5l7PDnJYxM4S2I+fhvWFDrJwCmEEJDd9LepBvXdy/liPemd2W3Lc3bII7P+y9to3es/llXkmXIJl6LeliYoQ5okwrdqoLOt+MRZ59GQRPFL5xQucZ4xT1QXTwBCbujv8nIYmW9OJRkHpIzZETGnhZyd9nIMmnOIKsex+K+PsEuq0ilVcDz root@ee628a16-33de-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDbO7+ymfw7IYic02yxyFyx5egzdpvqpx1wpdJqxfWoOMWEAouAX3esD5g590dsU4WyLL0q3nnCxfLw5NVZnpiTfArkP8MKWgAvPOi3RupbsbQMc4mOdHdrn6XK9NfJlBYbhqVMTNV3iRAeTwosO6EbBiZEozHoBRQ0pCY5f+l+46rqNFceNXRPm3OBaPy/vcHl1l7TTB0+hctA1fG0ig+BAV6RXTLvdftysSII8ObwPKICoLjSuzCu2Rk7xNPQgMP4G6/z1Qs8Pd0NQV2vX5RC7CLiCM0K5zzTzebxNaIDahMs4xodBxKd6ZY9Aj4IZW0cc57GenHLiTQD63i0O0P1 root@ed69c7bc-3f20-11eb-a0eb-a663209ac437\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCtm+Puc9nVM0AtRnr9biY44tAFb0rkca+Y5mynl+348zASww9qmb7e+4nAFmEGnbkyXwiwvZxsYxbiACUFsV7TZ/lt4HCD8OnMqv77/f1G5yLlCT889PPKSbXBHbrSqIDdivaRwj9MEyYdHYMQrPeAoZqVHCFT1Gw3Q0i81kjNiuQrJeQ+tVDFQ5wzqSGUF3vWtcRSRDx3CJak0/xVz68E2Cu3XTpn7wK4Gwh+D2eKnaMpytngWdllv2pW0kN6I77Xg9u3kV2JTwQUDD+8ENlaQqq9yFd+7ivaNwiPBE2vJBk9NcntsIOeS7E7Cv4rJSxH7ydmexNJ6Z2D2+EcVzd root@ffd5188f-40e7-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDYrvVoKNQG55oOD102nLEKWiRLnPEBrvgbHne4W9ajdJ2EukFgv0N5fZnzthrZ5c0B6g1sENnkN18Ud3wvUqmIvoZsqZsIs8OaRrFQSmahBeynq6QU3JHhqjdnvgQbwybCwOyeW4osjNf92H0MB7nzhdRvO5WnHBS5QXyF2TZY/q6/ortkmO2Tv0uWKoOX54S0L1tx3Llcv4AnvwIZOD+YQnZz9omU+5fg6oe6F21j1rsF/ZIJKfi25crlELpnl2N4b0vCmnJ/43PEC9tkOlv28p7Z56MR+w0pjMH7zy22X7zXy0C5lUDeNLDeVlVa8+hha7viq3VpnwTh3+GB3hwj root@6d30d1db-4166-11eb-acd8-6a2a49dd8a76" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-009", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-009", diff --git a/audit/projects/k8s-infra-e2e-boskos-010/iam.json b/audit/projects/k8s-infra-e2e-boskos-010/iam.json index 682fe78857d..8fc9e3d6dd0 100644 --- a/audit/projects/k8s-infra-e2e-boskos-010/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-010/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-370059417603@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-010/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-010/services/compute/project-info.json index 862b6faf506..d874061a033 100644 --- a/audit/projects/k8s-infra-e2e-boskos-010/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-010/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDXxByUKkG9Gg+ZFO11NsP3z8Rs6Mxk3z/WRchNbO8kq6lEeFBvKuBGfuiqOG+FMjhB0H137ERmALiFYdK6D0aunijQ5FXSMm9vPlbLxTl1RoYDkimMO6hiJFrI6TwceBe+vZh0v5l1JVtQpx64Zv4Rh9jpRphgsNG0LPWsJnEhpcqzk7/uByen+HkKt7Q5mywZyoDoVJfChku9UzYatgmm3PiUylv1CPDeExXjJPLulBtKrajVhKgPAB/+TSS+QE5MsvnYZ5L+mC9mhL4xrSy1QdsTL3TE8WQp4ol2TV1XbiNvCG4+xUPSl8uveDJyT1YTSn70Dr9iULIEoRfrIARZ root@ef29ad03-da32-11ea-8c1c-d23af84fd26f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCprEu004JRLGVm2vLB+GKzBx8B667C1UifnO9RHszRuDK8YjY5FhEQqpPpGIsUGcCW29mbc3sEmCaUHx2QPFTa395gHNNsL4nzuoIEkkUOXkn5fBlHVJ0o1HAA7ao+Sb4QC2mnRRnO1N5E3CnCjwmzV4aWcGu+QSZDiW483JFJ58HHpHH/HslSmIRVcKhEUA2kQUCQAlCpOE1S2bJvAavsxEYXB2NE/OxE8mhjAV4+3SLmOvOiAesJBvT/tX0e7RpckmnLBq+OuNtTnMyufbXo17JTkJtNLuBENs6qzmPupMgyc5Cg1yOHUF6XWdRfTpdpT9My+fMKgO3zytqR+Fed root@f395f936-dd5b-11ea-9424-2680bd79560c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEyvyDa0FhDGCFMZowNpRAjEuDG8M42oR7Wfa4p9XKyXEAIQQXP0tli+2D31IOmQgtPgiAJIQnUJ+CjMzuJZiPjDvM4V0v+DjQkkPpOGH6mKGMCqIZzg0+khszUVKe8FLBHbVZR7thqDw9EvOjVGyFD0xeKohQQA8RPV6PVfAoL7ksTYmlrt7InXj6uP8LOkTGP6AfZUz8pvO1xGX/CBumIsPSO9XHfG51iCz0DjsCXtBDgcWuWeuTvMuJ0jy5kM6BOwev7QVRhE19jSR9q2haeStYQ/4d30JqgCwkclZaAZSOlI/bLhgZjWNMWbGBIHTXDLg6CqZf4HrWCpPT/ZV5 root@1d426d77-e1dd-11ea-9eb6-86c455181e58\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDHL/W2havBwWFYKEsNWJPVy2ikzXIeUkRwzPv/vh2OhuUIRaa5KdFbW1kRgC96hDU1s3LncYpQ6YCTX5PNgAWu+ZCORxECjRBFOQX3sqFPA1YPZdwTeT8rvlXbiDa6L9AWBlyHyRrraEU7Y+FhKu+kmrw50lvaq6xt9UA9VhK/TuoKiWJw67pk+rFeGzwDXkf3UZ2whqBPaTxMfJ0qqq3q3Y1qt8Ljd1du48J9m8wbE4dHj3OH0sxfvt02CWWyXnOs+RqryUFMtJg+8Sw/BW2TlShgQnqCXTlXJiUj7r2eUuOjtTNSE/T8YOorUmBbq14Go1rAI0RRXNPAu3M/9dB/ root@05c5c987-e529-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2wPMo0MsuwgBS5oETmT/Dx/IwfqTogDzSEpxlTiCCc9ga4lMsAcAUYiSARmTmToFosyt9kctPh1Zz3HngAMhvC1M3748xIOOAK+68c1Ak3z543wflSsT9cD8BAlxxG12fUgW+aVCf37CBX0U+fYmnx7lYFOVln7Jdhw0JrqQiCJB3sclrKgOwnLDD9ovbpKzaxNSmbJyQDGF9Hm3ve3MTEGuiHdqbMxnikFceAkoAKPskfPaAgxZGxDUx79kAd79o2MCw0TlXn4RH6OZawCg2VJIveBfJVukRGZ3MaPoXlmDjFjrkAhk1kh2XN0krjRiI1nb92hZOjwG90KKKBGxx root@3d335779-e56b-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDMcv8s9bDf6iKjloA2WouPeLOV1KghHEC5dxepqDizdaLJSeBhxAIYW/8vJPUch1hVWnobbtign3oTR3MJRsmyqfOf2Tb2QxzmBQP3qD/QEHeNOaNt6uyMDFj8l5q3SR0qngZVmqQshpBMmsB//JLgH0zYgPi+I81CDKNS+goGMOHyOOyCTssJoWz6JV7UTDXDEN1izuxOT25vYQqS3BYAzR92gAFvPGUGeyQS0ULw+QvYqceDnBORn0/fS6UBVbO1/L1cLYsrycOSK6g1vw2kWuqRHJ5siWnCjQZn4P9H+Vif6st635aX2UNSQ8AnMwLst6B015mZ6ClN+Mwqi8kx root@80ad6f7f-edc0-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDvOGwZ998iVYhuNfOgSWWyQ3hzV8Hw//zOeZ75sMC2Rtdsn6odBGudz6Uq+T5gn9xZTqHEhXYS33UUuH4LzHuM4HM5rtxfQIE1RaVfGHsbxCsxKTy050RUn5DBgHJx9D2Ru6nI4g4D7ldo1NqH4bP+t7Psxsm/TREvpRvq/vvYQzlTBQSOKVrNV2rf34a2EaP95IMSy8ySauAH2u+Ii9SOEayepSxURfIuBaAZT/YnujjQWBEUrXMi93bjhcCx8BYowvxc/5OoNn7+DMLZ0gM3+XOpxi7LvMuLfcWmRHjs7vgfu8C678D/JkjhDAiR61LekvumolDsrw7D6FDIxihD root@10b92de6-f006-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC8ImDJnAYkjRoCZLiI16mXDrrxXKiFD273ZA2t2bz0jFKvQbVEOUHugTFP33HevrYzSxzsZ5Go/FO+89o5Jg8hqHu5iw87WwCXE+MCdfJiigZ/MY1lfukksPNF3NiAekgnTrPjwsIicbgQrEw6cSeukl2FgxewALBFxyOO3hHgnLwzZ7vrpJemjlidenHkdiMCL82GkWnUcJm04vbFnCxm2KlEaFP0YPQduhGEYPd9elpyxC6w1Cx77LLtjuo7K652qw47eLYMeF86henMGf0HX3HE3XDIDtPM3g9fkhJl9/1eHo+ExiQ32AbqnuNm129VS5uRdfa0B6Pwyd+qdUAv root@5483e2f1-f232-11ea-bd49-066a8cf01e04\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDgUuFtQSyl3DZfS3AkaGGGZQwLSNahmLvn4JnZyiuQvzssKdoiTp7hAR/lALRKfxDhNqkxMXe50P4qlDlC+3RY5bwtCp+DNbXmlCDAZqVva84y6FeqHHn72mLj651YnT91u3u/I1AFdEFI5wZKOin83Ij+fZVYlzeevBY2NCdUiSeh3uEscYCxA0Rya+24Q35wp+LGLPWHnCphZjNifUhkogBHqu2YB6c00G5hVigjSFUim7NAyTN9xwOv6q3g5/XOICaEBf7TIEMPx0IXMeW36TL/GW2Mh888XJApvNxNChk2CZJRqtqH4IQb2ilGQ/FV3grChrb42d+pQeLNaoYZ root@fa1bbaaf-f752-11ea-ae6d-8ed64f3416c0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDas4JUEdtixkvbxWPboKDBjmnIwnQ1B4NfUdekKpFeQOyrjsKjrYTGh97eMb70ZwSD1suC7OSs1xsq/1bZ6PCEiLiQvC/kG1EJUDCOs7cxeJm9UI3sHsUrQVTcZcUd18RUXxn5Wi/VnY5r8gNcSFBzukDerwNSl/ObuCKq8o8mnjI/tqancVPwxg2YaR7xjBR2At23bfiL4hgOsm/iHiUm77dp0kbPsUk7lYla+oQnCmeN57aRj9JAqpRU95fHBJVXzM5OQQ/pAVeJ+djqV+j/83AH+OrxCR2PKQggM2z19ha8JwpgFqs4RWrjlY0zQhjMYNbVTsusOuAV6YCH/njD root@47985f55-f935-11ea-926e-7e7ea190b727\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC47tmN3gy3EK5AS+kTh/XsfGSf8Oyb7s55Z1R0j4WJUr481IDE6vdNiwzf0qxpbfUh67zEV08LkJpnXD0EWU4NqATgyMPXtERbM64GI1AtH1VyqumHNzfvNEtu4MINmUAaZOnarfr9Fu8R3Wmtp3+7ZwFox7cGHhMXgRDKOagfDEQnEdqXklQwcb89Ex4ihXMOTMiJ/rfs8sspX+dJRHNN4q5pRYOyf0kKR1zXbS7jla9wrzw1ojXuWjsbRjjcsMBhB7s7DRUW8faW8OdEe/4sJTg1PI01uKMH6zhhJpvh/kGz26MQHHawLPaVuQDBla6DWFZo49efR5oICOIpR+Yh root@565fd05a-38e8-11eb-8630-522871d052a8\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZzH+gptD7SillFC3QPK1MynwtW8sMUMHCTpROSrzHnk0/ChGHWQnoXVToPxJY5BB53CHFMZHJJx/aPHHDcXwWoc9n/KitvsMo4TkolYnmqBjqJAeBbKEjQa6S+BjcXidsr4zvZ4hc8pNqK/uX4IopzIyfxxxYNGqgCoVfVZ7LEtgeWRBVolQGRGucpEfz/JRpTCCCR6/7W4NKBqpkB2XESaXxMv9eGCoqGusAEBzNUaWVgq3aARLZMF/Y/kPEbJ2Y1MN/+iPSH9qNm/D8Wtv9fGKIb++FtGO70G/VvR2GtSBhj+PdugHZBaFuJRP03oGtIco+fcJW5h3IdJUnL6LV root@67d15fce-3c76-11eb-a772-a610f2f25584\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCsAflgmvFCZmzMyIl3LFpp+WwsXeOkipNWnfW8x/OwywA+1CWDKyQmV6ZEIavpBGAjI+7d/R47h4OZi7a8u2EKv5ZoJLSg9q+T5eafkj2RRU58dMbHYOL8M+uTnS3SSBxTJUnDIdRZnzQKSp8oPnIYDP3bmgjoaRFTn7gdlL3BGG3215i/SngfZ4T5P9KlQfZJcf9p7JbNR1MsKPDXsJyeY2G2C7v065WEkYpIRHQ7YENgO60mwzyeMCx1qeauLKhQImB8kCnZ07jsU1HoYKUYU3VHst7pV3xxCcXNE/IgXH+6T1y5+JXk6qKixG0MCKkRiBS9z1vNuLsYr2lIiNQl root@a31a8245-3f07-11eb-a0eb-a663209ac437\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD1fLwCiz1ZODegN/D7az5gPXN+r7hA8ACEF5RHptv8xIgDXFHj/WriJQM8ZXpdenPLtltvPO+epb3TFhe9DeJKr7HTZmPV8lMP6PFdnvACCy7gz4c+/kgR4Y98xQdbod0izjv52RsFR8Qv/v396/+dIuxS8/y7w4EdE42HuTs9Tj+4oZq6cBFz+K0Y1g+gSXTVeT4XAXPjGtNCIaE/+z5ZxGBkN5fH7pCMqFYlyXZ756VAGzQgo7m5hMgXOeGKlGrr0aROwRXS2w9S5yF2xbYOPTd/wZdrFgD21NlwVkFOjh1D2wtQLKwWtFqQZWBQ2zIONBDmSeVezFoKNwZll9cr root@fd9507a1-445c-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKcsehhfIBJwTta/msZBJcM8LZhNG817wI5uaYzb22e2D7HKXU056AAFIVTT2wJnfvcB8ulkG+7irUsccr5188Z94wOq2vBYV/VFsu2NwloYYm5o0ZJJ5AmHSShAl4yqnWSZLmY/1C/wd0zlt4Fxvu0jRlyMsTiKulZ61YOhksTTp5C/lqiR4OFXbi8QS+usuwZaH4O54ChQKH6ygmcEIkAK2aNT7Y60OX1jadKENm3ZuP2Pao5FxAcEeBBqs8w2ie0AKdeo1u+J0hg22TyrOOQ7TsZ1p6XaoqKyMX9FMDSQk0baNeWVlODwSiUJIWFNcXKE4UlunKzxtoM6f5GBT1 root@df9a2e16-5133-11eb-86b7-56818f023517\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCw3CA0Fn09SOxhmw+Oiez0o1STX2kSpM4HldC5Xebnx1PvlxorHOlwG0/gxE7RjJ5YNm2sW8SChKhmbmDzYnATcC3f9FxXGO4MzlfpGWkDmtg7tBfbdiyJkhpkmGFGcc/FUHeUOU5jYSqXTm/9NiGOLnRqQmNDTh0CH5xRL+nDYjbcfSYHUDZgK8ioQCA4283iRPfNDJLEnLvavJvehsIGNh+G/vFy/rCoeof/aIqO6oiDVgu0poTbHN6VrJGl9T8g+fQIhqj5z24yGl0CaSeDHASsz74sYIUfMXE2+TnCPlI4QyBZ4ltE587LbmFt0XCaomwL7liLYpSljnVG0Xqt root@6c49751c-542a-11eb-b6a5-7e8b7adfd54c" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-010", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-010", diff --git a/audit/projects/k8s-infra-e2e-boskos-011/iam.json b/audit/projects/k8s-infra-e2e-boskos-011/iam.json index 0379325f019..23143aab22a 100644 --- a/audit/projects/k8s-infra-e2e-boskos-011/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-011/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-250196439480@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-011/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-011/services/compute/project-info.json index e08e38013ae..ca2dfc5f3ec 100644 --- a/audit/projects/k8s-infra-e2e-boskos-011/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-011/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0UyieDsBTsLelFt0iFCmpGGLV4UFXxfv8FylCwQRaQtLGssAalqmwviZu0WmqcQMxiiyFq4VBDQJc+CRn7IV9SX1NAEOzQSsQkw3CT+G5JeJIJ7vKhf8t+nTMvEJNJL9hYYYmVCwaIF/S5t5RLnBw2Z8zbGZPZLPATOqrx8D4atpajFhdiRajo6EFTX9kcxNSA+cQvyWLz5DzfUBhMkmZo92uZ2bIgs+zIScNci0T5IV5qstHAvswajW/cZJs4nQpMlsL+CsYDNqk69YhogMs6FyyxPYRhmOLJ4d47sSYpbol6NhSPv7ocfGQ1Kn3KsuhBXykoEql8vs45bPx6dJF root@844f8dcf-e2e3-11ea-a87b-7e1d84ccc038\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDF6dITzs7EN71s7uwrUsFVeuWCtdruvl3UYLv2ao9rGGLMN4WfvMRbrGlC6goRrS+k2FcB8XdmQUKVj4n6dI0NvabKvOG+yWBDibqVFqQHIcO97nsYinFg3LbbHHArp09IhTV8JpSQy3u9dvMCA2kt0vomx1xeu8TbtYBUGLo11Qeu+SkBKTuiMGCEQgvd4vtqYqNZYOPx0KufwSEx7sImVDCIphAt67TnIjkRAJd/vyXk4prQM+AHEsxIDTow0yah4O7/22V8Kz4nh87dUUsGUZQVyP5/6j2lE99MX9nWTAH8V46y9Tb04efoVcCslNsVP+w5PUw0Yv2WxXQzg7KX root@3edaded3-e358-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCFephHggKV5Z6dcwFKdmrHViHdExZrpKMlzrq2u0nLyhsoZ2RP1ke5I1XY/Ynef6c5VWAQ9WL9t+67rclQQeZmy6H+Svh8TtlmI/cOUB2h40AhadBdaLYI3NNFFPPItAjW/VSLAQ/4yd4StRINOJTEgRqV2Q4LK+RX6LFNSBKlqiva8XonDYwaJABeUwc1jEwu0XNEaUZQvwSRQDVa3ObVVll/q6OtV8vFpID34Jdain8L1k2dJpAJmIrv63EtLdrMP06iOSnWPvevpNrAb0DMPiO+dc9/zHOwjuqbVEzdISeDPXTLeZBzvGwj3y11btWhQLx50Obd2evi+yfjzzr root@3df6666f-e4ba-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDkrhb4PxnUFQbBsOIoRuUxCaWybTdYnvmPl61y44DSt1Tuk5yXrN3UvkpfqfN2nr1br2xdBqk79Ubvzvam2R0x60z8hBcjVuVxM4D3FFZCsgA5QFHzefgkOIsIHh3gVBePA8LktG6JBw+UalSJ6c0XVy21N9Algvcvc5ittw9kj/T5xOGUhyBQMM/vB1WnyA8VrK07eq/5vu4eBmFFAT/1wQF5By+CMJWeYZc7m+ct1v6Zus+RQlWh1XQop1XWSA6Txy5dmkbexjGkNjLw+8jJT867/rKb/ta8LaW3iFyBVwtiPTOGLTGlI3Aa4HaNMiuyYyqYkB3YBmH56VfLIyaF root@940dd6fa-ee4e-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC8P4E1KQp3Ts5EAv593ofAngS5dI16TVaNBbt468bb72Q+o9sEd93wcPxQ305xca9bJKIRHAf1dveVjLvnbnt58gSVQ1+MCjqksmW3K+8wlGFJh394Qe+zw/OYQMoBGD//Lf2kxNT/ybpohp5jXK7Avl6rBLnYj+t24ymgZeI4NVZ0juqByUQQBmW40Tg7R2XLg9FBT0PW1O4q8EINIMeskb8Lw12X19qoo4fFAe0kEmhGPRO0JRdoV42d6OAKuY/gTNT2Gel5KapWuBNIylObQS3jYW4chEfeAZM1De4pyiA4pl640n5N6Bu7f8ERxD/B5Qh2C+PpK5uMs3cv29xR root@7fd06457-ef22-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7J8nXNxoWujRHT4CbQd/NRNv+V5QfHX/GK4zkZu0EpHKalCPHPnHhM5PrbxZRxJyk5R9/+IknQHwnrSssNr06IaZNWBclyvzHWgoc+n2EBuG947vZcoB7HSwdVxbBg7iWu+Tg5j3gHWA9qiO56+xVhEOdXVXszezN55pYDHzrZljwefkhHV/jCDQkBUOzmV/b5mLtygExWK8s0O+lqH3aRCAgk7ceZLuzwnTRAIJcXO21bR1W/nPSCZAd7SAB5khrDJ8dkABEQPSNvxDG2gKzKuPzhAlhjCKarRF4WpBz+57zTArt1h9cE0jV/UmITtxTrCWWoWjWQKNfNC4VpEhR root@acfb9cbb-f68a-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDvesoCh1GQdcxm87yYfIvwn++XAiKF4sVedNe/72TpbVseMnT5q84PQM8yu8Z/draLfolz07ZY364+L+XreDyBC9owpAeP8eSMKc35DJRYZCz9TH7GRKSOp7Ms90td2SnKZ2IK7iLkVDFITKAjQopOWfLg9Kx1mBZMTp9D92GLyb4UZNujc1EgE0a4HLY0lL8Y+bxXczdNTEWyvbKuclbI7IMFv0QK2rlWXKO+lCyBpiOqZ1PqTmDs7yYooCB/1yqgyKTTq4YDc6YkSEKkpH/3bnRf1Ge7oxqMIhvrgJqfKukh2D0YnZsnIfx+ZorEP74svM02CVbZckQ3oXh9y5vf root@d5f6e93a-f79e-11ea-872a-bae3dc204648\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDVPi/nRtHVdFne+p1n5+mspqo+rL3cGhLMeZ2QIpHtOHqsO/jPYopYWSSB1kQmBG8cgXhbl6n0dp2SyjiH+Qy6twhufNgfSsaJT9dqOtkszGpaWUylXkOPtUlnUxSGQAcn36/N3zI1xqjUqSMPBBSUyjaF0OCqM/84KL72GgtxZFpi1iaDSg7dMJ/NoImkqzCKApItl5E9qz9jqIyylj+kYjmc/+p8Uwv6eshU8Qbo+hsdaKiEybQO5bRNAtuR6AWErGqlCUhC6pkhwExqmPVQIGWr9XzeytLemVeEXbwuQIfcfUImgrUVmcMW24sXoxRy+DpaE+W/NTnoLTjbSI9f root@c12cf9b5-18e8-11eb-ac0b-9a760af27878\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQ09NO9JftWi172yNO5jWr7AX4aNiNPbeFabUtxx/ztEb6Or8PF66mqWYbVjw/XgSGLeyl8dS7TcCtMl/uIbqqJIMI2/RlEXIIhtFgGmStAESzdFrlckBNoznaiC+F4DkjSa/LAbtzfzjvv3JTJLh93njdKJUhhkS41Yo4MpR8FEhdPkcUA8RfIXLnmBYogB6Q/ZUZNp4IkQoVwUunYLUqO8O3TYgOX38js31PaVuSJ48EFZv6Y15bbwx9pwcQjaqGmUeIXGgXJJPG7qlyLYKKZsUTC8pmxcXq2bXHPpZgMPSf598lfZVM1NCPC/rz6u5+xdxJO3iIGzSh+AoxVXqN root@08612768-1c2b-11eb-99f1-c6d701d1e283\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZoeICj8ZFAqkJ7GECCMb0h+AT9LxAkeLettu2+rJ2RJ6XOb0pIC2ScfVCE2oCo9Y5qIwuNZSZe9DsKRR9/VhJWVFWAErX5KB707+VliDNveyT7r6u+KFtZb81RIk4KJo0djn5TGy9nbdXQffdLxFBgQuwIOMGnQ8u7BPFOZt8WrhcU12ozGSL8LZThffsw5aukTERJw9m4PIfqPznaJiDscZYgdJkeCXBQCVkwT/XllJoKVpJBOKqQYIM0kvJmoivYGZ3O3keAgpfLxvCvh2a85c5QSHPagNlw4JGizgqQrpJFBtVaaEjERCIcIIuVLhua3cK0PvwBi6pZzJvJO9p root@44367ede-1f6d-11eb-a4fe-eec30b56844c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDLrKUcdsS4dsJJWjCKT6AqJxUfneux1RIB429hZbGpsMWxSDliHb14nphVnSJcN36wt/jITY00Z4lDVwxyzq5vJjhyMTYlZO8BpPmZQsXWi0epzlKddfrLfKksVCBnTrQNHzDAMTWjiIVlFQ8xDjyGl9w1+wbsx6DK466wQv24CrzhqqwYjUkzDDhWLjw/Sp8NQ+H7UaQP3PV6dDpDIhQ9NXqqhD6wCbCyYTYz9UuKOCWlXj+PGIpOI/gyP/9zqhIb3/bjBTVlxpuCCtEcMVCcbJI+HeI6qdn5k1RjkYaP4zqveGMBzywo5ik5Ez3mJaDdwbNWUOK66N4H/BE/Xl4z root@93f3925c-2037-11eb-bb76-36aba4894793\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCQ8ZneVon+Iusms+8tx50SMN1q+cIe5Z6g4i4b7uYDYt8iVEGBzvT8SL5Yj6ebGIsLHpZKoPLprSUG7SxNQi8fQmygmqBxa5OsPydgVDtJ71vh3s/2yIUIGZUfTIRHyfT4tQSFH14DNFP5gYoJCtaSfK3SV5zBibnmhOGNmTPVADvBHUWhX3GGz9FhhqME91TtU8xr1/R4+Lo9735VK+9GCHO9BUF2T1F+xnw/hDYaMZtj51F8xY/8YZS2aPec0UwZRshSH1fTjuO3WlxIEEBwsCSPHFoM8Uz+SlNvq3yhqN+GdXWOf0s8f4Ta72jlt9Xbl5qsaHxQ+OWVxjWfyx3 root@43ba5fec-47eb-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDUAXikM65wTAbX1fFYMRaT8i4FqcUhiAgNh6T2IwmHb25Qk4Jvq66dZZj+AnnrMK3FvQGRxNfvJZys6SdA904Htw3RFhpHRZOT4C8YAe9lmJ5DJpkCQdiUmmGYS7YUeiztR+qm7/C9B4gwCqr4iuJcRnyuuQJPfZzHZzK3v9qs8NZ9rJWoZQhM9hFG3ARhl3O2puTaOO/+SFlLp7pnlebNd66Xe/1DLkJXbNg9bHCFnltx8JwJWz1+hPR0L4zG4xh3NJK3F/aQ/IeZLWBdMfDMvMyxoY/LC+olf86Wa4e4KTNbYsqFDgFJjEUFWmFmA8rzBh3WZylpHBCNkzSdDqcl root@3b2ed7bb-4aaf-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDC5KNKbs6hx4pZZLyTVxOGbas1T3rmB8bCp4E5r35OnGmXY/zZwN5uyDG11eZC8zAH84enpCwladvvUzJSMZb73bc2nE8Xo5Sq0Lr2CZuzN6JDDYjbIEyR+fPWY8y2OsJFSLn54iBspy+pvgcpYN4jNUzmwyabcXyPCpfpQzE5SmgWmpAsDEysfbDxWpKoNwomdQmg/VVvmO2pqBeyzY1g4UAuzTIAlHMkiuK/NjP0gIO3H6JORRW83MV/vadb9RCcViMD3wndT2qEIEVpE3Q1j9CbSCBH9QeC5ACCUyx5WnvLdSotv/YcBSXVi4OsGgUNeCuLzQaacMFb1OrnNLad root@15383751-4c5d-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCtnirpvOIQ6439b7AFNGW1Li5MapwwgdUVdWr10cnNgUfacDOt2NlvSwaNWLQ5dbxb/RgVISq+BvTws3CMxDsLbj1/GFgPC+hxSdNYv65fncvi01liFU1Sp0MpxW+lu5QZVS4RU4otozJtdWXdoCfkPjqCN7oxVqvDDhVuEKPbj0tooIklG+AxUkzrPpJt8Gd+uA4AMzQ/BznXWl3zabMjgU37zgKW7yRsxe+n10iq7viNB2d9Lhr3bwuiWWCDyp+zYKsi+bO4Y4RBtK2LPoscNZ2vBdYRKLM2LUr8kuaEYTbdCWlYu2wDF85aantJrpwHMQJLmEVabBT4ehb9xwJ1 root@819a0f13-4e3d-11eb-af93-4e5abfa0c065" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-011", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-011", diff --git a/audit/projects/k8s-infra-e2e-boskos-012/iam.json b/audit/projects/k8s-infra-e2e-boskos-012/iam.json index 6dd28db42b1..e8870aa4ecd 100644 --- a/audit/projects/k8s-infra-e2e-boskos-012/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-012/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-117960000983@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-012/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-012/services/compute/project-info.json index d1e39349ffc..411a12dc68d 100644 --- a/audit/projects/k8s-infra-e2e-boskos-012/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-012/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDec10ehbukPIfV+xVxwG5pRexBC4hsFEqH8uTHBVDVcJXzRQ+IMiJ6sU4VPNbh/xTYzRW3va3wYkoLDopl0R7qwrso+3/EXTO/eJUeeCJCAk7mDfSxQVqbDRn2qqbQ+PB8OeVzXN/WjjQrqjjlEkOHqlMeWoOcYCcJKslo7X4E8AIR71GYDCllThyYL+6kn6hIAtPg9CwviwGkhM/WRZYYTXkyNucD2sTVKjPr1vsNDBPxfCUTdBje/NkXz1MsXbQXYRkM27/NstigFanaVSD3Dhq2fwFgbes60byU/pRv64UR0MjSZPIUyx6kWSv30NQ3k72o2Pot9Mdxn+PmwIkh root@e861896f-dfd3-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC847X4qga98HgRQc4yPigfDvsRXixwBOhcDS/hmpaytYwoJjyLrGTn6tnfXuLSlfpdWLrS0oKN3l8AjBhu4+czyoKi0MWumXhtnXFkxl16mdfK7je8JlefGXG7G+ScGCLqZOhxwZ5cM6f919Bn80GAUDMpYio0p0SCgLTvRw4t8XXt0Ip/7ATgYC8sAqnxlxFhD20os9TenKk5Km3W+T1vXPWkdpAsOk0b2tm0VS3fJ/TipUJ3/Fz96ZvqxmNNIcG4tF4ESJk3HBvFbucyM2Ck2IvjdHo1vX/0K8Z+jlC8b2tEayf/CTsVMsKb/1hnEztsjhwuXUXsEaD1BFFOtW6H root@19c19637-e455-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC4tlAfZoTd9FJw8yAnC85gq24ctE2Z4wH/Y2NJL2DcKT707TmFlsRSv8XsHZgWkpQXRTEK/po0dNjwq141PlmpUulOx9qa6KYKCWWZ++yfNHa11NBoQX+8hcxvp6FMEJLKEcY39Gnvs5x2LY//qnytlI3pNEJqBRhAcwiDUTfSdnSLX8BehW9PsFSrtjMWs82twhIktKmU4myw/rGDTOhGxUm4ISneKpuuPoJb97VRFxA7sgMd1QA/Ct2OVVUqmNP4p6Dj8LG2Mlqu39gKyNIE8HcoD49nwhBSKanw/jGmb1Nrw35NU/1aFhpS70BpeoGjmht2Yxh+NVggbgH8l3Hl root@97c1039b-e55b-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDTq99pO6CjRPbjhlTyrB0jcUcMVmYkS7nUO+FIb4qpCZDbuN06dNlxz1tRz8Ugk8W+Aj9aBS4YqwKBmVcH7JZUKyyNMAT9qqqe8IsbxM/ImHe1g0LWMyWLPzLbpivhyarVwfp7eBlUP4mfyONfFMcH6nNwopPV/c6vZ2Mey29QKzki0yPEl+PJLVXc8SDs00eF2PtZPHnuguBpzJPMjOIDX+oN8958JfUdpR5YwpYzzgR5/kmmh44ea/55E9RhnwCBxBS6nchEhNFngZfdSi9vXm8vK9anUHNKX5aLvWNqSHwJHatXBJpfrCjmOqzbVONH0ZQ32oOfukGnqNX4EE4V root@3768a5dc-ee58-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9eIsqUjddjJkpOpyALVCDq/9G4F26Z713WC+mHjs/pgqasImh/w1Fe5hLFXuyu85CUktA0zdOJfeFmcNowX/z1T/SitKvFOzPusBxlg1KrGeWC0lJ1NubgUtAXNYjv30exACjWGqnq+SCTQlMgED1Dh1CjyQh1NfWjLDf+E8J7eCqxQVIktAvOn7YvXe55MDpKL9ez25D1Kk1dTmYEpGgZ7BlJY8zH8CXgQmAvfLPTEjV7uJIK40lY85CEpKb/eyhHnqCzAmmAnyGnsDe99erdahnBJniBE2RExR8Yqk6SqUW423xlNoBTjG/3rZS3KcJ8SUZ13XnY3PGUy4ENLf9 root@aff36e14-fcdc-11ea-8986-ae48fe2da37c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDToo5t03egF1TTQ4SUiaJTKKy+Drl4pgWNdL5g5YMNM2wHBaU2YesL2YHvJWJcQQ37Gb7K9zVIIPhsGNujYXHbxwvPSw1AE3KQQubQ6wPKsKRCLbdOX4zOHIBnRA4LgrMLugVZtC1BHahJtP3Q1oVg/LaqQ+NU0PbRl8oHVoecA/tSeqtyhXrcyPaq3bKGm5yEuY7tuiWOKuG8ZSQ2nNTANlKux6GkJx75YZ89dl46zPgWzaaz1Rjz2L0QkSB1B6FJXKRyxWuOlOTqsUJLQsNnvED2B6DjV+eAljy155LUm5oZ6+doWFSNP6XUyi7a3Lx/CgO6NYVDqAb+vKyQlnLP root@0cbe362f-fe0c-11ea-a78d-ce9ca29dcab2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDas4+/6icWBQItELbw2Jz522LUMeEYQ/EORJF7edrIFuV7ZFJ8o7N2+KSwm8blRzxlgM+hoOIwUuLY+cY94lFwOhSDwk2fzBjPJ93+PHQUWTFUUs6ucb2IKB7jJDQLMqIsOE+XLaT9dJ9e//wTVR0HoCOIcv96jq03EnXH97P0DbFnJAr2nro74wtivU+zVjq3P7Fx7kS+XRBZhDAWzHO0VTqxRWwXhI1keAE4UkB2ssYc4Bcdro8wC5M05aTtzeaSNWSinzV8Ss/m/fZHh4VZAvpFU2ySsgXNBd41VMwfWxvxVXMOu/3kgA8olIXaA36MbWmXNC6ffqwLyKi2GT2H root@3b1dc279-024b-11eb-8b6a-ce996ee2646d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCli/eZmTzzkbVqWy+Z6M+msirLywkQdweIOsDxe6b17AdmGIzkJpQ55h2/Ojjsgf8KiZuNubpEsV5F02+GBv6VolyQp2uFzJfsmCwPlzT8V9fEEf5l6qI+068T8Iz0YK0m/u/HCvrkFn1sgZsGBogqXimHSvGKUlBA7az31QOAsMUCVqEg4AP7YqkOV29bfn2YG5pMSyKyzRV6x/fRuc8G67PEpBYgMH3+8MjEMj/TFoIwK9onnoAVuPzApOO2L3RnuXjADMbEfUi2B+NCiyH3nRsdE5IdUDbnAPdmg6qMwPD+sNpuEWEBcQm3gqcrJyPtLpGgtmq2q1yywR6/ZXpL root@e5db3f44-1b14-11eb-99f1-c6d701d1e283\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQClprnHEHBxd8yAjuKEn1plS0h3UHw5KmwbF5ctSJZds9G4Y8oH1LlbRGjMmVA6+XK71Vh6d6CQDGkfltj5Hx2pGC5J1OtWpNZkMEo+Yj9Gpf2VAETbkN3/wlpNQDsZCuivX1HCCFb+QryeNeruNHAI7nGyVqd1I3BFujBUpujcHxLhAPShLGjhv2z8Za71qwYy6NffeT2dvY3F/ame/jVgjHq0FBGUd4wD4aARP+ujAtVzASiP80sYMD4GXqk8VeEzcYsLB0DPo38yk4V26byklACoCxjb3rmToIXx98R4qklFhdoHB0gEAKBnm9aEfK+pY2XwJMxxIItuFSlU0cvP root@52b8179b-1b93-11eb-99f1-c6d701d1e283\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDH7rlxCRa3ou3DKUyLBM8naS6GfTw4wVbQIyF+lDpmjfDDQrIibD9fkWyTjkaCqFJq7eFTdOeUaOWYqtO1HHhJM/BWp5k34bejuuA/8xLnvWx/Wfwmvk9IFIYD+yVLH0ZNGgJNncQjWE5qg3Zr4CcaU+W68rO42RzFCZVLU7AW9celVtskVGfBg2VpVnur7vOEljrPilTLFiTn7sWHs0X9VRGW2Xlgn2RIoatoxubpOWVNNf+s4SIOwa6opD+WROEDJtYW8REmy4n+tjQ3IaRVOXaUus9K38/hRI3trlMGbQXjjXJpc3yJWbcLAetHAnMAMutcfzcWeLXXCIpaDE5l root@3dd61952-2231-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCl4+aw/RxkQ68wY6T7jmvDklqom7IZjUcGOlf+uNNqw9NZsU2BGKk+O0xpvw6C2z/qqYtr1x3EI4IYrKMX8sB31+05qx1N4+N5259E2pQg7BIIVFSJY6jdPO4Rtd8EqOI2jZVcLqOAdG3nRgMNBwBwZCIcdZVFoNeh6MIUaSJ9SqHG8m9ocBX90Z/ZqeEfwDsuIva/UvCybq4ovCZDj8q4BLr2P9LzDUC0vr2tuR60NEQ8uic2Pnn7VEQgESTm2F0PICMoLjSQrBtNJ5voQBGAcOqkcw7wqquqByXwUOfLhHJ8aYA9Ojk0Ml2/5PNGph7vf3WjoIVmBAaCQGA2gZhd root@2566f95a-3bac-11eb-a261-2eac9c79d9a2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDK5qOSeXyp/1XjAu8dQN4qakatfDgZ42zMZ9rUlU0OjKrtbW+ih7QllEbpw9gMdFob8jvWqU0Ot5gnHMa3Oh3BBwCEw+iDGwOei3MdfsxiiEZkV8rpxLvh+UwpqMwTFroV0YiAFfAj6K+hYdA8v3e6Zq2QxiBl5hoF1EFDbgOC8qBqC6R291WSHc5DswvW6VVZ/H2YeC5ZpU4TXhOD+0FmKhmM+N88iurzAbjArBYsA5xJfOE94Kw5u2x5yScAVJ5knPGO/JsD/bufnjfGfEpBPPknHMwQOkLmnuRe+XBdQz0UU900KkzsEmcpXhLUw9JdT2dekNUiOL8jgKdE9CcD root@48559d5c-41b2-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDU9Ln4bWgekUPEQzmUlsLjsl2FMNzG8q5Aqkq/KibX8raH5G4Ala96/v3HfbSBJiCNuFmZrbTFJ9kt+inilS6W+QBB+rX5Dc1lrUDO9fOkl0+FxXrs3iJeCjo56hYQSNSYj5mUN8AaSkYBE7yMVQRL8CSaSXNf0IAsvXBw6o8iRg675tbIkjooYekR0meg/jssZlSccNY8h2DPsA0hD8XaKVm+WOB8qqD3JddWCiOr4sn3ANsj59doqgWFfYPra+iqTLHYJOyg9kek+QUoxLcSJrJkva/Nlh3NIYdyqauM+eFml7mstMaC63VV837snARtk01xB2DG1yDd+4WQWVrv root@47734eef-43c5-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCbYMO9PMkALDlacyY35yr5QBcVMiLnkwcmgg8/NKu2MvuAgPj9PX+C7jDWrdwdgdRHUMn6xWFVU02BHyHxYhAzGQ1ATzS3uQ65m+hhWrxswbHE1psindbbSUsKTp+7txgYBMBlRrPsp83WRlk0LDXOT19dvPvsz6cP80AbVxMw3j7K2/1jSf/u4NHQqzh4iW7jsJwm/4wqrawRZVBbmi/WehY318BOtT/IIeSkBI/iVSPSB1PzmHMLH1uknAsw+gLwjVCiSH6DKSFY7BaYZhoxUoRiYzhEUjcctm5/l60YRl+bhOubs34zh8gecda3yVxwTHqsQok9y1ekRjRYLLKj root@f1f22b01-4bf7-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCvViOKhv7taSUwkgGxLg6OoJ18/ix+6Sldnp0aZpOISUBPq9GKurpLEI9TxcERt1ZYK9kaATOHPuRUGC45ZHHmeJTUy0ax0cKwbaA5UcT0cKqq/LUOwgM56UC8sHcccOsoUCik16nsZ8034+AyR5Rl11uieJjzsjvSbUa+qEifer7zGWdEt6PcjCNzS6of5DWOK9liCkFnBbdvE3MJu+TvvnOH+oWNLZ1LIU3IuJyUJ3kbTJZ2Vqp7C5aMqU2FyKu7/Yl4Fl2KFFXw6Hkpyr3Nti7He06dQD2gKIRyc7ETi9eI4Ml5IT7ZDH4/8vCjaPKi6ontBFzcHU1iBWtnyU8t root@a811c80f-4f53-11eb-af93-4e5abfa0c065" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-012", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-012", diff --git a/audit/projects/k8s-infra-e2e-boskos-013/iam.json b/audit/projects/k8s-infra-e2e-boskos-013/iam.json index 77e0d338848..9ea788232f7 100644 --- a/audit/projects/k8s-infra-e2e-boskos-013/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-013/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-993482628758@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-013/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-013/services/compute/project-info.json index 682a381664b..66239a4ead5 100644 --- a/audit/projects/k8s-infra-e2e-boskos-013/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-013/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC8ZePsvS/n0y+dlazAxqgQVTJufBTbotkOzUQDy8Nfjdzlx4B/wlTB26hyaVnb5vZIwJu7NmX0Y8uVMZKxs6A9L2sdSEYSCnZd1F194cgTE6zjYnPlEudiTx3ahco2zz6EtXe+SRSIHJxnUP4wlb4rWLuxF/bvsJKZvL9qIbjZfGrv7DSjn4OMeBtqYYprF1Y1mKDTs+GKeM2YHinKo3002P+RvqkejGCdS/hwt19g2DONxlr5ytucz8yDoXTcF22HgLu9jqDZX5H78e7eg6KbIEONk0MUPma0fV+1sZX52ImhcvIXGOBB78q2tTtct6h7IHEUiiXrglXTg9Goq2sT root@62fb54ba-e46e-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7UunYQi9IReqI7lVReUrz+e45jOKGg0TPGQQEtO7Pgh9CAUEXXCOza2lcYTMMfv1MPEA654lc77UdYz/QG//naDEe8s7h5imMTuVcnILiVZj3R7PQccoPwyIskbwZFuTzqboiy0570A83T1UuOSg5wmsXswR4BCpW2JrBK3S7q/rzCA1ksiBE6Z2lSoZs8hbGwhea/vdVAzBayXtVyn5WWzHUrMVREHrfv3QHapdK2YqsgLj+s+ElEXbHKX3jzR9V0DeS9BZpspoEaFzO0dU2Dum2meN1mChEvSENoBXudS1dJj4jQ3WlCvgo9CfMdtIEcutvQjJPi332t9sAoosN root@29d3573d-e58e-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCyXiMdHS1Q8M70Xe43uOwGUoTDAo1J0wrjlIwEgBCa0Y99nD/FVfpi3ncV/JU8S/PXqXguxdSOIJAXiaxhB6dfCswiTPri5vF4T+W6Ith1NEXX/qYPlVjyZW4cP99e5Hg3RUagTaQ7spFKjS1CZGBKqLgpNGV5WxTI3q4buAE+riyRBT/4wHQrK9ZypqVKbhM5KAC0jh3bvNdRItalx6pl59bVprTrl46fPECoy6AxsCDM23iRWoimjuY+bTENfVsjgSiTVZTgE7Zl22IPE3sAupK0nza5MlVRaX+PKxR/7kRKDJnjUAoSh6hYBkFwSl46NHEx46U4CKXNMIZwVL0B root@e40ce601-ebef-11ea-aff6-5a14b0d7f3dc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDAFWpcZyhagO2OPR3Vkz1qTPTTuXvPmnNGw5VQUo3YlFBdDWv/I6Wex5Fm4zvknCp5jWagVG3FkND1jQgR88td05nr71fgAmnnTOe8u6s2QD0vgEG5a7wQvEJJBl4mUEY5zTdHJVC5hUDthMgwT6X9dT8Wedx4gTOi0OCM7dV293DpFCwkm9ffu2gtb4AgJQj85SpS0YS+7wyIFErKnEQVXMgo0IFe2Yn9uS4BL1/8lp2/vMr0Rk4j0tWetF/ZGonbXYRuF7VozcPd0Oam6d+2Mzwnb2Q7GAfER5XwvfMVaGrJIjfZyipRqeEJl1AhDDHiHh8/kwpelcjsRh7/Bz13 root@c7bba527-efec-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDaAuEQe7mdXcKj7k93KFI8AMq8+mXiI0Qo43Xn0WRGcQZ6BvTuVK/++Lun7oyCP0o80CWoFYSmFVqW7P2cEF2v7FxcrOh/KEQUjVb8xvGLelHrHoYFWWPk+zQ3juxqR0PP9lgjH1w/4gTZdOrUqk7/giDIShufvpTzry54uwkSTs8l4ZOFrFUMGkIvmh7Sh1F/6YqR4ZBf+gLdlrzcfrUyjrTU/e5RTGAsyh7IMFsdaY/C6unV+3TpHByW3PHOK0fXlMwPfrYdF2mIEb8pzFVbC3k6633TruexqevvWWy73Tn4qgF4ByEOqdZb4bpESaSH52Nr/WEh3MwSkmL6mtQP root@12cff382-f409-11ea-a379-bea988342348\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDGOhvqE0cepetjEhe0IfUnMdcFv5f69ANn7RqjrHaPNSS5dTzG9loTf7ttEiP1R1o+EvFIXYyO8A1Ih3dKVRmHWVJAbJNW6YXePTrXQI8mLUbRndiOeAuihhhi0IOqPqBlD65usRm/ZeK1QBp/krMC2x7sdfJaE0avI+eZqTk1lSziVZyJTp9BeZhal8Z5jvn0TUUgmtvlkXIAyUbqRH6/DB75t3j9Gm18rH6P7vD7AYuVZlPOOdFb9hM7u197jLTKLKkZmwB3MGMCw4y2JOyTtp12Kr6qC6UE0w7RhFIfGI84PvORbr+sFEfMjRQpqzjmtZZ8QXvUyFxhgvzfLcG1 root@eea16ab0-0180-11eb-b4e0-eacb7c15c8a0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDiIs2gBIaXnrpZMB+HUVM35Tv4Py2Co9FoeWY5ayhqnUgXGjpP5P9oZD8kbytU/vfu0AeyuZCCwpFbVqqhY1iR6NsGTB4gmDEmhFc1DY63zopnIHVOBOC5CD30QxDedWqoOJHuG6/bULpkvbuCH4NvaWK9ZpQgqHQB9HdeirHpw19Y5sukxLpvXnmjtZL2DB0xexq3ZJtWYc2tIMAo66Il892w4sZfi7L7XuPdkTtleeQyzj9TnOPvlP3wEX+pvGqplLlkKkxs4bK3SeZijr9LvXm+TVM/qw7yOF3ckd9NV+WultscwtAFxidGb2qjcvREpY3UZR657YwjrMO5HeW3 root@fc3dba40-2656-11eb-bb1f-6e397dbce9be" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-013", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-013", diff --git a/audit/projects/k8s-infra-e2e-boskos-014/iam.json b/audit/projects/k8s-infra-e2e-boskos-014/iam.json index b094d799c9a..27c13eb37f7 100644 --- a/audit/projects/k8s-infra-e2e-boskos-014/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-014/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-195130400949@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-014/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-014/services/compute/project-info.json index 774ccc2df65..2bff1e2b2e4 100644 --- a/audit/projects/k8s-infra-e2e-boskos-014/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-014/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDFVw63T6fL/8JwudN0hxW4mNq8BufkbRrDZi9akIx664suY38fkU0hj9pgaDYQ6MuMcorCu3FdfrPjUYUADBVwGfzUqUxrGN2MlSb/H9/xGYBJI3HgWrgrUD1NLn58UrnQCHK65qSVC0XJ/0JsKyqETg85zS+hPiFcIa8OL/iSwJ6/6gVx7WKR3rgeT6LxDudTaROtvRQfH9UGjHKp1YhWxjHbos/fqh1Mu1Fdf0hyZnSv1QgNSLRcMlEeL3+erAr2kiYjPQAAX+wDUHtxJRHugTMWSn4HqJObLWqxBaE77h6R1OwbHKzsLBchcr0dh6kjgNGU/1YKGmYRrWC4u2AB root@ca2acd85-da7e-11ea-8c1c-d23af84fd26f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD1hwrH0Y4VAVRNqAW1aV31cuzt+RjYGjIxwSz76de9+XwlC5icwPBFuPVPJdyVkLJKQvL2D87XJiEEQeysA0Oxb5Vj6qKr/Wce9uiLGoqWMLzvTTDPORXJ74OYGpfgzleKgteftRtUrv3ZfSPlR10cjRscXkqXRMtSlvCYriGXLjHpVRnZRoHtxOzzkEdlRj1WyRXIhDYArXRA9XQBa+ICxQEBHskaAvIcjPFRx+150vYM6hIds00NThuQFwalT98J3rLoYGjsK0tAVR5N78t3pLB0WvxTrRJTM1XY76a7R6kSNMObg6sYxagDwC+zqSaPkMZ+hcps/v0QxATAD8hD root@141fdc04-db49-11ea-82f4-1a238816176b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDhtRsO2zNGjFc3SHW0Ukl8JtNV6w42PFPZq5Q1RlOZIEECBbaKcb6jujrP0diMzgBLPq2Y/MpneUIjF2+TlqVGpJHihFKqezDXPHPBj3w6EuF9I8ynl5VYW/C2bH6LuerNoOCxWEhPrQxJTfy3u7IptNcc9FyjI068yq+gXR7wG/gNLhrKHUdkj8+yX94JLXPLEckOU/CGXXeh4oJ+fKjXuUgW/N45oq/vxX0OWNEVdCxwBItlJG2YMAp+cnTZyu+yunwW8zeztBUBPw+e/NrsfxExunbHaqoNWUFtBHzZTb4hzAH+s7rkOHBBN4aOGHlUk8lKb979Fl3hSjsUIBFD root@abc9ce0d-e487-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC1vY3TAxpaWL7f57qpEDMAGBU0qADpESuvGKvDWz/jkfujJtvD88iX3FI2If5xeAZ3HxAkMKPodBn8uz+u1OUGqPBr5lJST6ob5lTxlUZaQxlhRrN1jQa/zuijXcRPGmwNu1fEEoY2LffTfP4irTUaUJ+4zgHXGPkiVhtGLlxFWa2Ioj26cZsRcmzwC9VytXROc5Hz3tztKmMbP1jZdVWXnNqK2YRkKnqfQ44eQ37ft2Feejz56MYMG+hfU9pPpXyouklTN+6civkMEdTfzSsvMDjUolLFRGEOB+rXw+Bo+lyxyhMBo4lKFfUIBp5UF1jFgySjbu3qgi/AvCSW5qbJ root@737a60fb-e4f6-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC1q6KanLXChnCQyO79fBPVHDtnIAXyu+IZb5U3W/NQYisTSYNvJzY+bFGc5ItBtwfplz70w3hy/Ek57MhrqTRYmhSm0FsVPNYUuBGnATcZvcIExEnXe+HvA83g07MfWz1i09J+MmrbNZ0NiMahu9bl5AUFemqtLHo/UJFjjBar/flakiTv5ZUerf2vqRiRWu/4hr3IM3gC4pGmObkJnX+lDwc4ydVE8NqH+BrbUGUBhW80LEY5KI9nipUVNBj0S+5zScWycjGJIRMjWPytXuyAGmsYgmSezN7wqd8AknDvqrS5KWK4Txc8lf8AvHrRqqzt3uwPMcftOQe3LnUG+J0z root@8a42c08e-e8ad-11ea-aa1a-c6580c04344b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDPceHtWZzeeJO2yMm807FbssYD2XinAR+rGbrVQvngkGpfZgrb+dMIMQa2rgY/HfAW3nGBl/jzFlMB3c/dpUwVozUuxuMxYm2E9t1hL8nWHrKoqhBNpEIkMowyo6bk5K18rKQYTLcLz0VdmrBqor4Uvs5JrIBwiRenRnF4HAOYDsbUALfwUsTz/Hslt9N21YIlc+ISmVhqeGC9BDhWCvtemQRlUXlz+FwMraiunfUEjsYqYDTq6ThV+GXzE0YUnbj5QN6/9gjl16DRCfGoaClS40zzIUv0/fU5oSsG1DqfjTODQo9DCciDtBCcxeD6k/CtTGl3SKtDbiAxvpNbPNpj root@639968e0-eae3-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCz9fQNIsBGOpr6AGAjWOMKc459YsCr3C9PJbzK49yj1vCj12e19mLoF+4h6ZJTvAgswEXb3EbjVRCbtTdVtr0cER/ztDV+T6S5A/JWGLdtb5GtLVXB+j24kM+XSIEo3SbhlGFRfkhOxlS2akKL9m5egPJ/QL2d7Lowl9vQIL10pGbt1R0HuP9SVw9AnE3CpkV/V4oX6utiV4lvB6lRgUThMeGsPsueQDo39ZEAzOTJ5IrrY+FM+eQ4W7yT7abts3b/ZqbcPRqPU7NYt3YbBBfrGK3bQDFcHIylB4mOmeLncratqcPaX1TOuZjhwbzEo5Evqnq27OSr+BeIPLQ9opwt root@19e7b031-ec2c-11ea-aff6-5a14b0d7f3dc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDRczEkweSOn+SHgTzFXl7itwfsBsYKSFPpn853EzQAiiDkCQOv2lgeeFUvpOTrqT53uW9d2bxlxP7BPNETGN9RyiE+3u9Tk/pF2xuUWQw/Ach136RoeA/AJr5XQJmVFbtJhlDH+UY/DyRXR8ohYNlWd209/XadKlcT6MbXrNPJi53K/HRwU/Dc35j8PxBr/yXmytTo9ciJEzsheimrIUOsoazD9YwezV+B1NoC8GqR/WSlXZ1eifdZmYDn2x1an2Njk7wz4/F6AMKdq1Wc+usUxoXkeGaM0CFnf0UYgZXAs5nx3lLJgij7XfH4+/rHRmKm9I0jpzIHNCSWMIrAfogD root@da37fcac-f12b-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCa3yvA8x73RjiU+vAdueD6AIEwuzIJbiEX2sLRZr7l7iblnYKoW27/f4oRWZtpTDffdm6qPN1BO0Df9eu/mf18YY4o7QSHECQ+khbIBVEsDP2oeL4RXLlG+LyoUPVXuQ5d72LqN2NXOZ9ZaRPVjCMqhZqnP50fjxN2L5EfdroeMykIMZLhtaaM+vviIlPLDNzkkatz2HtxYRuZZYaT9inkEGILVFmKleQ1O30SD2jVo9taWkuCUEdKYdwQpmGuCbHPGkLMxfWNLy5h/hc9ju49IEP8KVn2erIIoWR7BH1uNkqFeot8XJEX9FedZ+t2Cesn8rq+EDhmDTh/iUoagIgP root@191a001c-050f-11eb-9dc4-ba187aea6a9a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCszrQlRS5N+CJEuG9c2Xuub61Ug/q5JcKXAnlu5qMcdJo4vxJOY4EypHQ9u6INPEMsb11nTRt0nAqKmlAJfMcxpI/mVzzFV88GUZlqNhjbpgNpFsnYiYCqxWsImv8GZi/oeDIax2WLwWhI1rP4IAmKJGvMF2vZK9a92Wh+0AVrG8LJwAPk2JcOND2JUIbogELYmheMk6rcN4Nasn+cyiA+3etPiq61I55tq44F+wyoJh1f5cTL7FK4PliTmNQXcDRiX52yvNXtDxzEO0iTRst+104DHaBALoJemeF6/nvG0zg4zHlLUU4x1FVpUTxdYkf9XBV5GPbJuVCd5FitDDrT root@7cfafc01-07a0-11eb-bde8-b2e010cd58b2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCzRWXRhwOWdVERlyCi9f3x92o/xTB5NLaGiHyVcC7VKueZN86w7WhBZdt+OVTtjSEijjkMrO9VY+subPqIHSLfdy1wHaxT4O/CiZXWYba3vaey6zclDRAbloj/gpz1LVowUMGDFfMtmD3Wn0c0wdNwaM0olO5TdRW9QnuKNMw4EwlsbNYXM+nifD8+ujia+lwZ0m/f8qS/BqGAGhiPRVe395PQaW4AYhfEHKducHZfPvk5gWcDZ3oT67w/U2Z0XAEUaLw6rgM+HPP+M1I1s07TRzODcSVQmGQeVnMGhX+44rAo4ooq4yzp/12JYRKbW3OLVXhBS0gjSpJmemuMo1kb root@46fb923a-1da6-11eb-8e42-66e2cea7f923\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC5UxMnSGyGfcsItfSeluI2VRl0nocQ7Sqbcwa0vtXeP+pFtqRdMoDVPbIXngpWlnYW6hB++qKTN1HHVizzoeYvJqU3zaGTID3jbmp/ic2hvOP0t0SpxK6OqCjAKPDcKWsvDzAf/osp0Dyvkfe7Q1t8KvJl1LV1enX4C32N+MXNHebdC1KSSNGLnWdqSDjcXRanA0odcUIkps1XuyX/UIu639GzjV+HTAxIxBGxWKqqvL1bIPR1XQQe6DTdzwZeaCkU7EuVW0J0enGt1U93J9RrmozZA3uhGKyi7H4yIRGyH6nfZMe/4Ib2+FhbIZeZ16AOJ3/TCjiXIaKOYiZlhnrP root@632e70e8-21e5-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDFFAiJC5R6MujttTWGyK869zONeaTJjKWs7O6jeclMFtURdcUmrOubpCqg07oTnBaq+drYfOtS7GTOnpxxZl5LN8wtCZJNiW8ww7GZXsiHu3MolIyP2wpaZI7goeXxewpfjzTmPN10aPXjlrhX7fwssUNMCn2E0a8faDZB9YJdwrQ4iNhRh/w3I5eXyko/Ps4oy+8zLaZL2iQcVWCpH8wKUoiR+Py5i9TopyA1HNBf0RH9VhpRSAr1P91N4jxVeYKGgPGNrTL3EAo7CMfSrZlYlm28iTBv6dDtl8Z2h7Rm2GPOSJCjPC0+VCLFWFfszKFaFhKucAiZVoOAHa9DmvuF root@d0320a8f-2263-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD3f9OQvbXgz6LsSkdsIuim5mqqSDHiWCDiIwtHZIj1fjyJ6jA3o/lcCH16reRISw5UCeTHDZcBV8qZrTTboGK0Ax1N+QsgurQpYAEVTeh3anHh2iDpQSmLEHCglckBuiVixFUygM7FZCQ8EQk7V9OsIr/UE9eAN0Z4JcPXqcFOGwQciFvKoa2lqQpdyt4Ts9hxktUI8N/lwBf/kw7gQcaQMuDhbVkNjFv/c26oncg/bCXsqDdnAJjjm5jsuXkj8bzbyqn/c8Tl1uljlRxI1OxrnU09CtjdECH4PzXfqI4ORLd0myShtQI/KZVpXxK++YGec5Tv5sQsZxqrI1ZEMaTp root@10d82356-3f86-11eb-a0eb-a663209ac437\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqSx1TBRCBaCO4TI9bAg/sA4IrrfFPvTiHKcu7XdbEbTZAaJ+ZmGL03JDv0edY8ri1FpDq11dW+U4UwOlu1XFgwk4YwSplSRD/J5KRe/iq8n9wLGHe7JZy2jwBWv2lxSUp9VjoCwIKPw759cZ0GQjxHqF6A7qxD0OJL+7gbHKpb0Ms2pN7VB0SXAugrG5ruoHehgUybLMYZYZe2qgvREXHPoJkTGUXLMXLHT3RQmBTzR21u87iNnb+ACoGeJNcTfgUdGftwljktmG6hQsHC10yUw/Ft8ZcUv15D7o/UaPdweNU7v1kjDOCLaVyyNZPDP+PX3KsYCCLtoxH7jjvk0/T root@909b3ad0-4069-11eb-a051-06e11967f91f" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-014", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-014", diff --git a/audit/projects/k8s-infra-e2e-boskos-015/iam.json b/audit/projects/k8s-infra-e2e-boskos-015/iam.json index 47db51513af..4bdda353f2a 100644 --- a/audit/projects/k8s-infra-e2e-boskos-015/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-015/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-626382397055@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-015/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-015/services/compute/project-info.json index 4e536f872bf..1853f70691d 100644 --- a/audit/projects/k8s-infra-e2e-boskos-015/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-015/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDFsKhv3thOx84xUZVaX+cpdcLvqs07309DDt+7ccuKs5u06aL13A1h/FaS14IkdK58S3TLrZlBvx7NNjV4bekCC86d2LqgGsdcNyF/CyO/ZNOp2A4HC00jlWFTAV9FWo3kfciIwnGpubEtiSrkSfEyTZJE7GV51SzB8gWd9p6FqpsLQu32NjzXPj1FOa3aemI7/TMfMhNXvox/QmHfiLPmkRR+gMzStVQJSh6M6JWrjAGQi9BZyBUGZk8EHaKNYlUr/VhNgFhSY1TrIBKhUlmMeyy5H9wRycKJgP1hhQf2E0yKOkvtaiku5S7jZTsWqkHbuLUhUCx7dhULn3O36Ytt root@6015b7ad-e27e-11ea-a87b-7e1d84ccc038\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDXYa7NylSKAonp51YvfjXDTb8gcAvW7vIx69tJLcrl8yYuvU0oFVSBds0krZASXNENlALXOklySb2cJseidmT6udNjWEJprC8d1ZxYZRrC5z/NkEH/okPoBVzgo+zxBx1f12vOOMyitXsypQeizEjZDpaJyjhDDjWvIp40ol6G0CCSFINUuu/oGp4KX2KOHiL/Y8rU9iTHWNvxwAv0Oux74Rp90gD8C96PGLlNzn7i5ds55OPw9LGE7c3Ck2xaoW5Xwl2BuSjd78Dupv0yN6Ecqbs+V9HHzGNjLr1q2pkl3L9zkn/NX+la6o9sgHhyT3Q3hx7/RZ50bnCl1LxlMyGn root@59f3d8c0-e86b-11ea-885a-2259550e0d87\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC8ajdhtLOAemX0gpDwc9znYtFEE1+ykfiw57UMGJRXc8wGpuRjz9fN4IrAY2h6tVuBDgSi75ErY6qLwt902Go3GBa6doyN/ggZNpRVHizEcuH+RX/PNKY6EGWzCgNNhdIafDQNftAjPW/ofc2pSdS+b5Mxg7oBDyJwZS2Dx2dWDeEPDKJp4RMCmloCmUsLcDXWAwHv2bQ5/297sOFkQlHM3kies3vm9/KL7TrUq6XAGx/YklGqvCcldlgffFnFbjZgc78K3ftjfz0AMgMT6HszqhFVWlIi31kzRxdpND+u1rRFSYtVlDBNFnVwYaRygUQYgIa6ouP9Bj/gy5hv3Hu/ root@ec2e61b2-e89d-11ea-885a-2259550e0d87\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCrIt4PIWhukZFoTagcZlT8xEnJE7DztVGfdSuSocy0UO9QkayIhMiorMZ9N8zSGwDkL10Aj7g4b4yc1HAuS+lhPjN1bSvv1cEJ8Rgh+QHiStMqs0rmsQBSYpeVulVH0YR11vEb2f+nZieiQqhBRSGc+NpsnYKP86qt3DMDxonUQXnWO1f7GZ3+B5wv650pLYrEWwFERmWkzTuH7PbumXX8aH8JPdnNkAceOG3WqpvdaALTV1Wwdn/izZTM3eq8pu5pbSdCFrZ63vRnDsbay1zvPCXOx7XFyuXgOu6PQ5lextOYl6OhCm6rE4VA4pMqt9pV6oBC2mrIH/OAYMR1gDUx root@aebc1246-e912-11ea-aa1a-c6580c04344b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCb2Mf6ee4rU94EiTJKOA3wxXoXk3P69VGPwwvIomVn4eFy0H9xi8oSSy0QoaG2qeIJIEurTwEgdLfLuMoSo6/pwFqNSWDihFHB/88wWgjG9lO5asL4ycK4Ge7AfZIPt4tfwSidxnO3fXEfOpQSTYNi2eYmE0ju00j4zciD0hRHQEaKg50zuzStIpGWK26MhuQhwmM36PXxajHYUO3tUJ+CFUjlAqpplQSeOmEz4VOOgsW5gaAt19KYJaZGXPggNj6zdk9wDzBrH0om3fzjtwwZtXQgVn7PCagJ4rQAvwt4462H1n0OQwhpbSIfoi4u75yBaflXYAcVxdL16WmojB1J root@e4c00e64-e94e-11ea-aa1a-c6580c04344b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDcHoI5ZrfCEaCI9fzGgUxRZ6uKXJMp5lB3B1IkwTV95MemtCN4VTBqvRwv+dLgIvD59WknE6x+iuu5KTIY4L2YzttJwI3as4PPM5mTYS9YBBGuOrzXkjF1BLz3SSYsU4APjQ5Ynw93OAU7wZvn7is8Bj5QFV7FhmRrAUTj26xVpNcPOlu8HJxVpvjA0VDnm/9LcG1URT5wiHaQ87fLBCO5qWiUSz0HAcpYoLNj0h62x8qet57l6x5Jup6O8/0caWrTkOW8ycKB+5KNiAPLeigkRqNYR5gEiBFKYkqreikM+2gY62Suc5Gf7h0vZ9hM4JucZuFICOLAfgYR67/k2/wv root@9169c6c4-f061-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCtF1LtzVGRCHnXN4AFXtNOAm1R2pEkZb7j7HkrlbVSHVsBYBgG6TrQJIUE6gj3yMOL8VDowy3Mz6h6a2VWdqkYy+kFQuxhJnsw/pzFDN3PwBDsN61vlTehvoQTsoxeC+3rC1PFAMLyZ0ZieLAGDQHPI0Lnijcgrzc7sVqeSI2rzXyN9J2ZgQkcZoZYj9Qt530LUhn9lpJPIrD776FmAqJnh7s6LCHAM+6eF2+dtS2ykthjr49il3C1OAKZ9JGdt31A1vbCdzezrkUP1F4BLIXOOy9L5cQ1NtXj8r6/XAKIqeyer08RUW+2yYpBN+ofo35eG9DNVU+Yl4Zi7c3UI+TB root@1ca74114-f4f6-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9u/5N6eNiZgV/Cr4oRBEiC++3HLGhwtgSv5kyLhTl8oMUluQnFBu0NmKauCFF/lHvhsdCyqrX0ywNSQg3GQBxVSC3GicJPplTaEVoQN3WlDUbR0TT2XghQLo82HJejQkArnpcBnvFqDKSFqnQaEbVU+GkyFFawHv1ivTotKLWfQVoABRksE1FvpnKf2+kJsOkhJaViZPeyITv4Tk1MVaQp/XMk6HU4bn0y4KAqXeU2gdJztwepu/723S52EJoejbaDQNr79TnLrh9MZMfGC3XHh4x64xkDb26/pEiL8RRhWgaaIcuF29fe0xqCBgJyq2X829UFJMV6Hx932BwNIWX root@160a28cd-01e6-11eb-8b6a-ce996ee2646d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCjFjeYq0u7Dca7xS3dpcTxaQ9fZsr5ng9XIsi8aHfqW/cvED6GPX8U1iPmpAKuf4ojfuZ5bfvSqDer+QwuD0Vyl4hUYqCrwTiX7S6zhfitH1wRHsrOMVkoooDVVYiJzdcXT4GmbZnfcPh/XFnsTGkCiPxGzPZZtJZqYiBmUASEgErzY8siwpi/QNWvovq6djYooPFpjQcX/bZidmzPsqrd3MLyhH7e7OimkSeM6K0SSPWkgWbliJLCqhgY7iHN93sPvQn9gGPw0UnwlcXxsL62k41TfcU79kS4y02T/dvkz/ky4jtMzV9/C3zMOH0stg+NNuTWHrwOQfuH1CtSY8LP root@76673cf9-23ac-11eb-bccb-526de22ef413\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+fweM+/NbdT2BjO29jSTabrLzGj6BlDW/Hbb453YIDOQsrfdUzD2TDHaVCsD82MnhC8FjmSLDDHNnGdUNnxrRhNv/a8iY0u2eVD17bux9KYO+FJ3QLyfPASRhvhRn6nUmJR1eem+qHYy7lnl1/Ymg3D2rtOBhx5wP8F/8R71VjeXMXL6zyCEVLEyCZcK061cRs1W8HsGG/03TdQr3OpWUaLVyhjXQTCVc3KZp6VfZSNtoxXIVlqHl6VHsXlgnedH/Tv6niZ7gNNzCaxNqTgKhzF/rkQgIeG8Z8/bBjoRO7Ab9Mas5vdujtn7tq6j/IFWn7Qkt2DXhrIvbujyE+v1T root@aa03ffb6-3ac8-11eb-a164-f6e7f2ebcce2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDjH5Nw3yxZe+fkJoAY7aJOOnO6YcflH6OHvQoV992RYhsjXKHZAactBZm/rGkhPQ9aQMc/I4IzFvrVzgt1I0HT1/TYY+KcGJ+WUqhZd60PijXA+QCN838wydjssoci3anokwkki8rc4FWteuEILw9IE1JVtw3UOnVNV+auHpRa/HzEuKH5By8hgxtRbsdie9EeF+TPyxWP+bStSfkJXzdtiBySiPR+QiVSxu4RdoLqYhQIm1ZUxUpqDA5WTMkx+mJInlQ4VMj3PZr6Bx8y5hHd/QfYRgtLOK2EqbOqtfE9zGqz/NmbQcy4fWAcPr/Ab0y5a8NVTPO82Ff75+NKbpVJ root@5e2ce259-4c76-11eb-af93-4e5abfa0c065" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-015", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-015", diff --git a/audit/projects/k8s-infra-e2e-boskos-016/iam.json b/audit/projects/k8s-infra-e2e-boskos-016/iam.json index 694b8c52637..672e588360a 100644 --- a/audit/projects/k8s-infra-e2e-boskos-016/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-016/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-689468652908@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-016/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-016/services/compute/project-info.json index 0f1ee9f6dd8..8a897767323 100644 --- a/audit/projects/k8s-infra-e2e-boskos-016/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-016/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCye5+wLbNYlKhmCaz6xrjntq+hkFo9+VTCD2/eATaUIogXZC56N0lmFQCOXCzjMVozQB+zbC/+2mCiyuO4xTUYCtsLniulb51jnXOv2j21r+1a61/EcRq5iVu4+5re+8VnxzRoUxTDYCmnSPPPSNhBYPKxAvqGofE0jMiWmZjBVjq3do2iHHyKbz8tVuY6nW6IPSiFu+hXaXNfAF2cqIN0ePY+Ww9roUd+w6RNTp0YAXHTdGVNNUavVd2HWlo8fMHxb57lWXz1W7bBfJs7NhNMnTAzoUfG+1Ti1MhkxlUbBiofF12hPNErF5f1iiCgIQlFez3axBYtRI1vk5vFfW+/ root@5d6acf27-db62-11ea-82f4-1a238816176b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDgdaFWWppQS8i/Mu9Sa0U64wTzdzqS2zVvoUQiXdms0PjnIrN0bz5BnfW2DNvs5AK3tXUbC4yKJXPnWJZpL5xE5RHo84p8QwECWBziRBTs62dZxBD6Ks9cLJnhfuK0cbRAqiVFpme7E5MkIXmwKJM3NtzGNqlA79A+hbIJNkopBg/V77vMmgx0MWfZG3JR0i+IH2q7dUKM3a86DXrLMk+X7VL4Ggrd8ydSpgpsFFmKcF/VBKCWQ78SlSGd8uqlp37MkIIViniiGF1v7jCnsmBcK8LRAPF62K0zLttXAtvXb8OzwA4Pp7g2wfgybvQ2soHLXfDotwaESXQi0RKDufpH root@06b19407-dd39-11ea-9424-2680bd79560c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7Mn2mswMh4AqBauBZGxCFkaEP+dJTPMD94h3kA88CvWPtLZVkGxv6e0GNUwuorHtHOD1HWfNBmAOaLWDtYjwdSqgY5ibgKWxxwdBmbRzz9yHlS8APcpYbr4lHBJO5T1fs7JcF0Kl69xDPQz9to8g58rkrYzfFPURIBqp7TqtePho3HuWiQgd+togXm+gCtpjohDFU3/7vI9QBS4rhXZRugKKn3cUy8nJdxJ/FIbehO1KhuWQhNn50avPhSd2v3a3IWd/2L+Dgym4eZWS3TFiDnKL00TZfS/v3F6barjzFVA610WZoqGa4kiMW+zDubSHHSwRDxypx3vfL1bCCPxbx root@007f63bb-ddc1-11ea-8a0c-be937dd98cfb\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDcdguxFPiNuz8V8BYj76lctDHmE3ByLj7L5D42BZMuPgnLqyUSprKF+J7f46ji80Id1knY43pEAEEE7JOBqODZH22sJ0NNan0NxZs/06fvIlkl9YLKh325tZj0joFJ9xafEzB1kptin0Nrbkg8C027ruwciBghIBQims2PZe2AjN05/WHgMhd8ERdf8gkDD0Sj2keqt3V7gHgczQ2oomXALW1g9mU02RbPfB1uM6a3M/nwawxB33PWh4KSqgOeV9ZtNRQTx0yqjfxmlwYDwk1wpB8GcTx1lkPkd4lxJv0RfODbcwM8ceJH51gTTFAY6qwgAJdyGto4DUUsjg/kZ5yr root@c1028d06-e1e6-11ea-9eb6-86c455181e58\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZhNfxWZYlXU+ScK4jSmhpcb3lZhgdym/JAxmtm7s3T/Qo9M4kFB7NaOgBkpxQbTG0vmPTddKcQqbXN9Z1TS9gJq60YBY2L+M7jMCT2W89wHop2iV68LrmvpzhNQi47Y7/bbl16KwI+Y0jMUWEkjj8mfLC/vQDEfrb7yCcxk8E1vNAo8k4wCY9sbLPRuqJEwYeDNYvdZ5dHXELc4LzL0IDM3OVXsqC59Zstlbk3UAzPwtS/xWAmR+8Q8tgBY/tC+QEaqWJ2X/MYTnSPs2FwkzVpe6jUFRnnVsrlTf/VPLz/UlFYYvfwTaboKFFdTNiAtvofgcoG6FpUlpWii9mK9u/ root@6d2e9c66-e848-11ea-885a-2259550e0d87\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSrzImIBnf32EsqSrIgywI+N/bT7qsaAXCzzAxC/zm6M2xr4+AFZ036sEP4wkyfmE/peF48ZyC0UGew/jyYEt7cWOGkclyppbjtzNA9M0Ez18P2ywTE6XPbLg6x9bTvM8x2ih610O/a7Bur3j09wYzpasP0pKcCVVHQb76z2TRcHf3PniwdioQxw39L8iCFRFhqup6u0mccKCTau5MSd961ccfSbrLdph0wGaXkxyEqYPNGBiZGEW1BhuL3F3z0KdOUILImNWaMp/mLmm1UqHKiWC0Xm3NBQ1y9BqqsCRNslrdpdyMoHdsFLhLJvmRuUEgZW+tDM6a/YZDwWN0oT+L root@17edc32e-ecba-11ea-aebe-3e85ddc86bf2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC64R+w8E/h/OS8OCXqpJk5r7AlOkxXcO01umPIvKIVCvjufXPNzjZoeKq4Clk6v6Ianwux84UyFNUI5rSFPlMY3YH2SPzn4uhC3F8Lv9NhFvf+nrt2V806aBwDdgzcFyvv31IhMaJVnSMluqztHQn2Wvx2riSazyc+vgmd9DreqwtxXMu0+UAuoccOhzBkUeYUu2hOwjg43kU6bdPvpPqA/r7YCTNo02JP35uyCtuQyaUrT3hRFWsx+3yb9igMoFkAK+85JieSf+fW63WVqwzqvns+5mXUE3/NQsT1us2dh5VZtqxM0xSfED51DNoD18fvAibrdppi/kcCdHmYQ2zt root@294ec32c-ed42-11ea-aebe-3e85ddc86bf2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCwG4cf4O8fdOk85upGhQQgxLRAVthZTCUFTmODq9fEXvqH569WfRk8hcfBKimHCyjBQiPB/bPkJB+0Wj1Jm0xBjdW9YCup5JdSDl0736f2z2zcQ0yioi81L263SGm/TKIx0sLUD22sSn7mcnTl9RGGumNP2SktPHGzjdkxo6gYwbyPsuZr5zvzos22fKEmj8GQyC2WBh+DBYg8VDOr/TrIdPEuGS1nVbbKKCi5ik1aggjWjWD+oEDAeRyGrJitPVwB13AFHmZ0Zp1E2zRrB36MjRN+TdWDQ11v9/yuOimjbjC6ime6WW1JGSUWm4leXIFHAkStA4zgiDU7OjXkbpqD root@487f80b5-f30c-11ea-84bd-b6fb6d83c68d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDFtN4tIKmiqSyRx003MverzjdGnEv+puMG04+9YM6bxlY2gjcodsqsa12AOf8sXYltg8ADiTLmfvUMJD4LJcE2UfZMCoG5wNuX+Kvp2TBeqJuUY4K8LkLbdAK5U0A1HBWwqh/dNJMTiLJEq0kwZ/o0NFJypa6My6pqytdmvQFNxlnH9Nq233Tb36h+4hZkakBRWLZLfEuFrcv9UQk6R4AyPAvFjfw51DaO6DF10AgXoNE0cLb86DqSd0QM3bG3Dj0XZnnmnuzbjge7HmcZ2VnsAzMafERAHOyV8DgpIpejR4J9FBqzroTYm2Hj2nfhHom726f48P4nIogX34qFDB1f root@22e95662-f8d0-11ea-926e-7e7ea190b727\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDNUqX+S17AhFB16QuW+qLMoEwMlizd+PEVaik5dQ6hV9Hil0WBRbLmJDQLD6C73Ej2t1ZSTrw7QAlPnCDXWO0refuB6KGN0MVsEgsgGy5DEtCP5l6APUF9GiOt+Gl/6DsupX4YJv5rT6V7bMDum9JcUpfaXqbTqqUn2SUQpzVHmxVfmAmrQBeXDdimtoRWtyBEZZ3yrVlVZXobkz99UVE7nzQDB2PyRKrcQVGdxn8QUhR3JFkrJxdHRAhJm+V8hp/6I8XUMovJOTzdTqtVqf0RSzBvY9PkFOJttVKysiXNHRdb84BZ2FkWk1/sFpaJbBie9F4f5IhayPwhq499N7Op root@3c6dfaa1-0625-11eb-9dc4-ba187aea6a9a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC8V6Fbs3JZluPy/GuuUlESCBEiqcA5ddsO5c628wtPgbGnoZ9mjRCfBWVvfbkHSvO1YINJglZjLuEgTYXKTrkgvJvhRE4ecJLynyXaUvlQIQnY2mu2Zt9NXySA10VlBR7rI+2cy8TuToK3TLZF+cgOn+W+rvBP3ar9VHv4SUFMaWEWmowagW7KExwV/YmwniGMu1l2kfl4e0KQa3LxYUHeCD1TvWbH9ONDlJHZ4ylRj/JaSizUgX6AzgRopQftjHH15fbJzjF1PsTC1J7urrNdodl+TBrplPtNt1ruT+SOvm3Oe2N31i3zkrRlJjlrVx0yzG1UwyiBtcYUue8Q7Mpj root@05a90a47-23df-11eb-ab3d-9a499a0fc9e5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDC/6VbUJm2Uew6f0JG/4kwhtgojIRESvg7zxzUt1RSko4bGtRWvXctjT7Bm0JaAttvCzXgObP7e1AFu4YgNb8hoj6z+bWqnxiBouXql3hZPLGl2yWqDNznPbvIrWf5famE0WvFKzBJStr6WD6Yg+bKD/A6poIM309z0/UUXSrP6qSP/OxJEl5++oPF4WpQGs5DJ486lA4WK52Qee6idSBkeCFQbnDd6ieQdxphu7EYIkrtsYLqKENiAgmdAbnDK2USkRgoeB4JMpaEyx/ddLyifxJZ1YvBkAsK9BgAr8bIOzjs5C2uDzPBTPvfPWnnItHWQLvyzH4STF/POmsAGnyT root@6b71c9d5-42c8-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCUOfiksavbhOt7gnddH4noDgeFG8KOSAQInDZvTAJ7pEfiORirOXcba/NmKxojrX7yudQRchX3/yn4wJMsuBhSOF6Wedg3kC1rbYkLUfrw67ahpizI1XngSh+FfRYbZXkYtUwfKxFcmi4CV7E30mfeg/y+B3/7tnn3NieY3bJxD2GQRBpiyx84A3qZEj6AJEw41gnQ2pEWi8xYqQQvyr5GCOvEeYYTAbogcLeXJW1u7plKGaf/Cvwm1mVUKwoL2ICRuHx5K3do8KK+3uQBXv9OIqy9TbY6iGcepLobtbC/VQClsxy8j1xgkp/gxt4CPTYlZ8eiJniX8/gGrijKVm/f root@cb2ab59f-4da5-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCfL7Uoc1dvP1E4xHAL6oGVaAjbnLO1XFSPGr9Ht/TKlvA3GLUAC0gT3XPHuFfMlcJ2DYhhOOVkcdrV7QxJ8zG2VXHcCzGvdZg9SnI3R1aRLYLKfVgk2OESV3pFQjLXqhEgOgpUwJlARHNeFqU5BLORhmH33JsK335RxgvYnuTDIu3ZtTt6UOgWCQt25FDCUO3Gp07/DQEpZAwq9iVheyD7gCDGlMnk4XzMEIRdR4B8CUmYgGkE+zchi/US3Da78sGw8M2Ukav5zHKjN8Hi5kSk8O0ri1oQFaZi0IF8u/3mI3P1kXUPZVl8TNCWKgAWX3fYukUtSjpFxmOuMoq4QkG3 root@81acaabd-4f9f-11eb-ae25-d6360d0295c0" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-016", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-016", diff --git a/audit/projects/k8s-infra-e2e-boskos-017/iam.json b/audit/projects/k8s-infra-e2e-boskos-017/iam.json index e11e3bd026f..ff899d94c0b 100644 --- a/audit/projects/k8s-infra-e2e-boskos-017/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-017/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-436321592669@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-017/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-017/services/compute/project-info.json index 9e0149591a5..cf8eb453266 100644 --- a/audit/projects/k8s-infra-e2e-boskos-017/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-017/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCb9s6/phXda3t/62o26D9aEC8Js9GjE8zTRReFajw4s+sneZbTmG8DhPxY2aFLGM3dhWUYq/ZqKgBLx3lZO7TpJbjzMrBdVdPv47DydsYHMGnhuUB4klkLxzyKGZAfq6cUlx6c9x4xTmTgrb7rVy/4nPJ243UDprJ9cI/+PKuVN3eXN+Kl7tPg0hHTcqK0uNKvoTlCQfrcVpn+GDIvJK7j4qHqtC4EdK3DGPtS40wQ+3Mtbuk5PvZpT31PwYgASa/d2314AUWbNwLKsucCw34yITdcE9R/duQSNJnnQLSqpgDah0wZd4J/bF59Fi+s9/Szm728tacU2op5AeDJyvQD root@976429fb-e60c-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCvpv/8p7Fg5ZBTG3SfcCPxEeWzqLvZdFWZTnp8qQs/MznJBAOHyMznU1t7+q+dTBaVw0MqsqAfLKbn8rgpyYNXrXLmkketOJmXOn4hSEZnCSu7Ub1TN3PHqF7PaKzqr4kQWE5ckMD6GaR+lhAxrMJe4FdVMFfkCm0cTgZC4pVwGta7XRiH/H7dllByB2QtzLw7toPNargbZM0XSeLjekaKzpvXgyrGc9OVBmvMla+kgG3/Wla52udZb0soNzSB4qi41CD89PkLFmhi1wr2h08wRiaSUzMDevuyteJYJpsrgh56LwrHvQa/T28StIXT/YDXkBrYcXYpqLr6uX3tlwZz root@dd11930a-ee67-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+KOB/6BJTgKVchzWN//xYrDb10s90vPWh6tEl98DlvTSZb+86h+e24obMGvUnkRpIKXE6+N6ZxZYJCbg45rpu3gpoH0l+iC085B65eE33qiEppLXKiYkRBqPByU6d/PlxVJWhWzTiT6I8r4MaHbFZ8DWgckwwc2V5rX+ZZTZ78HWDqcQ2lmIqGKICQj98pPa85vVjLZijI8p86R+IKR7ugGTE70uacewR9Zz1NTvwba6GPyV6FG9EY2t+nSLIZd7FvjgeasO2Sb5Fr3037hiBBrLuWf7fkpBAyq+kp+hNpNdwx337NtdcfKIgFIgcinBOwiGyiidAkZ3v/UfCI8GZ root@34f536f8-f06b-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDkBf6QycLcqZDoeMhhM/yBVr6TjXKwmTteVsjDYyJ4Nw5FyRfVG2HNmYfD/3HTvk9Ct0o7wJloqpgCU6D268DBcLdSjV3pSPAOOJvuwhYiH6ULTxxhxyH+Nm5pZPs6fz+MKqzsnZOA+rjn9DVt66PdL2andZFeF43mio828iqHRcKOvkhDZpZRfevBO4L+CwCgaxVl6BdzQGJ3ygJI/OAauXRS/3swvYeWWxILKozcAPb7AcrdnQ0k3KxKK8riZJT9fzp3UTgoyLyvlbi4Fr8Vqc8jZc/BjyqB7bm73Q5JeQr4I3jyQ2Vbylm2/HznH4ghkDD3H1kdmSU/iIksdQQ1 root@8a961f90-f4c3-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCl9XghyzACwRMZqu2IXgvAZtJUZy/O8P/bLNnj2af5Q6ej7g2ZpMZCrLBpeqaOQGPXVt+rTp9EiYrBqtQVtBWkPAultQRYeGEBri+yd5CPd1ysYK6iRIyJEtaV+POH1AQuNS+Nmac8UAZDqUTm+5sZfDmugAs4YJOFCl1urQlMyxad4wrX3nlrV7LQLJQhkGsJkriP21ax6K2R8YzHiYZwviDvSdyAUou43GsUw+th24+VFY5LHQ5VVf2fC8fqOwsvfKjM58EmRPtWnBjE0Hk9rRIZ7X9otc5xsaNsKRQD28MTKVdQ5n8PzdCeFzXT/UJ59VVE65KrS/shB9C7QtRt root@d57698a7-f6ed-11ea-ae6d-8ed64f3416c0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/PCgVLl0exv1njSadNPWhhZU+4OLSaPszDj9oULqE5injfepQSj5Fw4oia6hyMdqpWt0qdiffJmIE+4UH/nJ+6JBezPpqpnc0TwNMihXjXYX4hI3RyDV4nYmGnMl5YS2dv0DztXBf6qU6QJZ/5C0sAzmLHCyUun3P4AXxsDNdFSEIv07oR5mcmKd6WF0ag1ogJ4nqmjIjbkIfv2BXFYS9oFg3jz6WPuyuoX9Ha3+2kKDsSf17B1WxZ/hx5FWFrXs84/KdUXPvhws74fzybc0kNuWD1Nx19jIGwvFXFSqVxCU4OhgK28DymbHbWCl2aTpNOsBjKTOTtw6D7POiv4gp root@7a63e42d-fab0-11ea-9c73-86173d37727b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDd9Ka0G7Tg1UuUm/DgyCBwsmNTLnwiDsgLH4Nip6fymSUpiBDOU8VuJ/MXBsiujFYlTi6KQJq8MrmW6P/WiAW88FvWpzcL4yQZ3jcvNs6Rp6qrGUIRmGfY2sYNvNOv2cgL/EPaJ1gZwCcpQkA3HNZDU0Ecm4u8nwIQFT3EyMIo59IPh/c4l6UnqC2EXhSdtyxSliTRw++fg/FvVglz8+3CI4HJ68AydUE7sykmzcsd3wx4MafjK0uTuJI4hmPwpc2qBAIw7RVxoY655LD1vok4D8YSrYnW15fMg5XSykTK6xCFtc91lJL4udRociEulZDSgqXTNzU8pM/IcGXFDumz root@a40c59f2-1231-11eb-9a43-0aa5164aad51\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCluVgR+/b6vZ6tBW4139SkMUbHYHUAxCILbW6Lv6mR352rKuZ3vxarvnodHXk5lhJ6AkijSymaYzAA9K7QWFbt1yCZgVeemIJTa3RrrfZtCfDxW29LQTnFEGRNlVd3s5tVJZMRcjR6fDzprRdgz/EFV53OD9JOTW96Ae0EVIfVxHZIIZy+Z+xDQphlS0OVchs408tTjJiRI1yIrchFPO3fRQ6FRurbf4TF9F1ijHshJkxRh0So3cInclqluvhO5bK05XKwKi18ujG423tcqyac/htoWVvZOB/bg326bw8WdI1SyTzQ/Lh3bdW5FAIZjovl+OhobPV3X1HFteF4nA3l root@b4b56b57-1d73-11eb-8e42-66e2cea7f923\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDE+yIBA0Av1+trUOR0MyKYexYZGo/8jjhni/4eqxFrkQGlEzapy2y4R43LCw2QA0c9X0U14D4+gvrZgeZTFl5XY4R5+xTUzG6p3T/iZ34iQssK2gEv61/Um9lzKsa6/VO1Lu6TgWXKevhUjlvpfq5AzJoiwwNdYTyrgrgUI4AJQ9xT5BqyIDPnp5rw7Mcdy/uEnTwaEf1jT+wOY5gcKVwpEewmikv9Iyse/77gDS/EI21IA3UuU+fmAgZgr3ih96VzsSwwEiDM/6nNLGPvpsjxBvBUO8eEz/H4RS+dzNzgGyR0rBV4+4jQM5NtrwNSMZ+3zQng0jrqTSTuEZQt/pYz root@5e0dc157-2f86-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDM2NZtf5NHy20NkxO9d3Y+de647TwTK/M90IyDnR/XrfSFicJWxN/YN2A8kdt/yE+4lAMgXgXAmyzNSTR6s7eWW3HpX6ZCwoRUmPTHIjhji8jPax0kULe7ka+Os5eS5xRGWg6pEIiHZI7QHaEhcwC2F22BTiLq+bEtK/EZ83ejyS3U+vCybWJgtJd/Dv9/4bHhegSd9CnvLsJFd0GovCQAH5AT6quVVM1jfdtW4JVmy2Bta05W956FPzytDUW7PpXJnvZJv4HpsqDm/BJ21JMzCPwYwO/Lt8NNy8+boeoANnCM7EhuLdE2wH458FtmS1d8Zh1dMfpzSnjhook9pQuf root@17821a8e-360b-11eb-8ecf-c2fbd71c5254" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-017", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-017", diff --git a/audit/projects/k8s-infra-e2e-boskos-018/iam.json b/audit/projects/k8s-infra-e2e-boskos-018/iam.json index 5fd0bd73ae3..9a0a37943b0 100644 --- a/audit/projects/k8s-infra-e2e-boskos-018/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-018/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-961650802495@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-018/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-018/services/compute/project-info.json index ec235990976..536c35ac261 100644 --- a/audit/projects/k8s-infra-e2e-boskos-018/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-018/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC52mPExWUbgWJNiKQEu8yzRr8E/gsYy/cjwurNmaKn6j+/OginTd4jL4akye/HVzv3CM/JHWN7KmYNTUOMO2rHnUsvipXY6E/HIYunUpSZgC/M55WnciCFG3l0cEGFgjxt0WA1JTPhavi6uFvpk9ux++ejUHgmNMj+dIrvcCTT4c5jHfsTcI9CEH0b9l9zvBBvxtPV/TVjaRmyDLJXiBJFXtYjpAPgkZiui8/fgf7KN1unEgB7yGLm5i/N0/XBrDr1lE7aPRDih5d59cFDuVggHt3cRW0VKQueVQARzJ383iSGeLU/OBii+2VuTq132p3qw55jgKx5yQZeGFPnwKNZ root@bc224f84-dc91-11ea-82cf-066baa17f17a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7SEvSMbwUK6ZEflJ+NvY6xv6OFmoEBSfdPDrfp9ZNCdn0mdxoVU4MtWDiQLkt84lYHI6s/S6UnoPnJUK5ofDyFD/RwyYDzAnKIy91pkFtUaa8lTssUMZyo9GAD3ut2gcXCQ8bHBEUStfJ2XFAahDzrq6tfgSFTWjoCVq94Dtwq5mTD/TPNGb9e0HY/6tukqUOjv8MI00MsQMH9cnoU96BtajCxrCyi20MTYlMsbky6Dp+cMySniM3WlSbIIkYL07hqXE01mE+I5XE+QUp42bc7D8nE6e7OyKKKabSjtVTyPEGoWXhBsjvBOeEnFUMZORrm4G+t4Mcjz5ejs+qoftL root@51d1aeb4-eb0c-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDGN+ok9bCd3tYzmub2aFCf5tc28wSjqG78egckHKBLLsDL9T7J0sDtrOlBRtLh4h5ytNrAeO0Iv8+l47BgKZ1btjxx0cJ/SfJS5CVa421hO4ps+IwGEDVChEKcqQ9G5x0fP+YqmzAF81Tx7P4PgVECqtkfyKtJ2JvIhTDgbwo41X2pOfoI//iHcasYgtD7w8q9C6SiIwBgGyjrAkMagAjxOYmFXMY4WQx4cMKJl8bPktDgnhThFhrjUf1+sVq/ypnD03e1lYnjlFpoFdRlYpN4/LKudpkcZH2e/Nb+5Sl0ShLwWgsxVy4GfR6SZvacgBHZVwm6isiTXhUZRdWC4wUX root@01d65b23-ee1c-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCwGv8cgw+Hwc5SFcM5s7qMwjdy29T3A37MpITb9f3F5/cs3cpMYnBpdb3QTFMtEc+pl1QNTLnS41Y2jIPWzMUoCw6a1eX61JrrjG3XRlbfmDrjTb0jXUOE0bwROR4dGXT9r4sz2lw4oVdtXeAB6gfAc1Q5+H5e0XDL+XfP0J+Xe66dCw+ysCadAy3w1EeKrOwejfQ8Bt3C7X4c0MceruzaLtt6j8dvsviHnD+nFHwNI80dydxhi/IlCsc5bbsPkBC6c1uAySwnP4+XzZPQv4lXptyNKqd0tzUPJ263LNIOkV6qLdAj3mwc4foSsCvnLvGIzfVHSQsHRK6ZpdE/xFMj root@c701f003-f09d-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDa/qsdubvV4WyfeW0+2i640Lwt4WJjk/wAyISI7THQCUkztUFR+50FlPKRUfMVIMcu60fKl4DgqJqGFUW4fRhtLQUChS93yELN3K+XztKoJW1gJg0MnGHdPoibgI/OKHHiJimDJQqWOpvs5PJJih/cN7MpcVSDQbUPNVVH7Y2o1XI7aygFzge5AVIRWpWVIZP0vwlKpEosW023XBIGteB+yPexsWc/+f43wH8TCxhaGv5Bkbf1Wil781bTeUWBx6VFyRxxm1sAsz+4OELCuyKyGylpMR1OB+ClYUkQQxsR34nR6t69JTKzOpV7C12dLuciATQV1nQNyQTHq3J55XDX root@f6ac0911-f5f2-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCXvY9vPfNrU9bqgRI3ghfhDemFdcpuT9P+HTOioia7N4KfcgTizNUTiKcq2yJMd7LcWhJgIplEZtovSJLhA9mWzAtJiorBshypR790tVfBYLy9vNyuYG5Waqgf6gtdUDca5I31/mMj91Ya0hPdLxHIMZqf5x+4VJXQRkTmLbktFOJ4rfqOWlOrhxH/B9xcRZ/RceY6HT5xp1hJuUOwjnp5V0JVMBIFsxl6e12WE9OthxNFtjLe6wti4UB5I0Xz6aefvjL/5UG0qZv08TAzh0vkiWrQEuJPJM6FqaZ81Znd0Bn4JeVrU12qQVBe9VVRp8qKfV23RjL3GMmNN16bqDBz root@82d6c847-ffa0-11ea-b4e0-eacb7c15c8a0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCfDBalA2BAFduc6dm0NWFP7IFeZ354IFHz4pNleFzvSmsSMAAkhOXDNrZRxgHOZoMITG6rahzLplVuJVklCKsNdQCXCTHmiQSR21qBfeAQs3o2KPp3wqkAZArCLNt7+vUtGfmev7yABWnqRQ9HV/r3DGryxux5vgI5gVuorSBTxMm6LXdoN2AUyGza+tg/rsv36G3zOXGgDrlv8shGPRzDaNWrhRdBM0c5YNvSSDVfhSKO3k1Ui2ZpDbuXNbIoi9B7LBH8iwFQNJcWSsP4NfVAu75SczpkIpDQrxXx4dsmYO+ITnd/FDSHi+AQ9jaWEcQLnqG+vYNrWkshDag8gaeL root@0de72fe8-0bad-11eb-82af-de22b9665164\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCiKxiy/JS/2Ps4WTgQ+SY39fevECno02wfSIZNUfAE2pLc9XwO0EX0U32+/qfg6rUgcm5/XRK9t1YR9b6deq85/nhk0tSe8x9C3zWejHqGq7zJwl+kICvo1gM1ZSBeh49uVQihQYIx1myMnCRx17S+p76itig7bFKIN4dDsNAzho6uFOhMwcZ+c9r22P6ZKvPuJi93MRbJ8Pgmvqfx5lwz8PK/SgoQrQ3mYbdPmAS4OP083FzLpdhPf2n4papRlex62rU8hxjHI7q5qlRqCCJgG/IOEv/ayCBg+0wDYl4hQ0oGwZwgjmCYP/vOP/Q/7/OrcGx2Q3sZ5BvcwnQXMRPZ root@1e9c78ca-0f3b-11eb-9a04-3e74eeea3a1f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+6tpSngKZKlCveJqdpXc/rcqUExZ4l8bca/3lbZJ3ImAQKCOXQc2MkTiGbP/F1tPWnPJ5Fi0sE0hRcaigjsqGjUSU0jGXAsM3IyKOJ84PyajIF1F6KU8iAa+3DMmOIO/Ljuv1tKi1PfK6aUPAaQs6Kwyr0uPbTvXWFQfOAeAm2cD/PkvFEPR0+peAV2tmQwWE4o88pqRYZ4HlfAWVugjQCp9un5zxssgSfK5qSEYotQpwbcqJ5Fz7AnkSQMag5jlNR9+zciFu2FgLJSV80lzRONuFN3Zym5ujgCsyP6pySr0OtjlLhJbHwfRhsgsM707kJcE8/x0ake8asGOptChd root@430de7e1-0fa0-11eb-9a04-3e74eeea3a1f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDUQW7UEnShuKZfGcwaapSL2j8Do5Pr2h8UewOawuGJLwJqqKJ5J1atYbvTZ9DEFh5ussPJwNBKqGwRrrTQj+5Z4NciLj0WgcPg9luYipZjd6EdJGqXgnip3wAXHxUVyaKHnVett+wY2u3Pr4NC86ZUvHx6/4lUo0AOxw5OPqK2on+1vsj9QljjML+hFTHDgVbZXIuPnfzEUKBMVD62BYUSnMjOnU3EWOlEgD73+8Xq+d7nAT7iw1X/aq0bQEh9ZTEvTrGWhKmH8X5L3H0nwQa3fX28W3zkHJyQ6wHPsyK+MawkK5BLo4tLbzPmLwAJI0/j804eGoBfV9Orczv8ThgJ root@2c1977db-14dc-11eb-8a3c-66d0ef5d093b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCswnGjXXVcMPSbArCHbnVWEkei5L/xaq9OFSuizWQspLxtrkfgrG/T2x7tO+LiBHhVrOjXsOFjcSSemGYkGcxA7/9vs5tRxeKgzaxXQkN1Frj0TB6txvGoXAHGbezwVWJeVFd0WmE0R+BmV0aFp9nvBO5MFY6U+JVvdJe3uOElM4WJdLZWETPjIiUfemCQPYGBxqwaM5FeS0DujyZeyVUx3bgDfNnlj3OURBVAFkZ69Oz73dDNxlOfXFuUn6FgO5qV94GgA4MgOcjFX6TYDXBVyUscRlSOA2sjEc8AvxBE9MLSDmGKPmGT79uV1Ig9GRG1wPkwB4w5ce2XfUFjTLCR root@4a2f2676-1805-11eb-8cf5-bee87f5cdaa3\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCbkrPcB8LZtfdSoGasbbuLqt/0+41bNdREkJSdn6IpHzWzjreiL+33JDTdZICj7rkaup5wazMYUgl0XS2Z3NUmPMc0CYMONv0zgubG61OqlgHAiVlhu6J3TleYQafE3uFXu6CFkd0DVGcjdGIQgBB70RxtpiSmWPiO8I8r6vQ7smSws3EEwF8pQcCoL5aF5svTHnEXij1N9Uo+AUCV9bX2hIxmv3jV1R/5mHx1A/qkEP5CD2UFp4bTlZtJ56b62jAzNLVtbiQOLqJkQYEwWyN5CXUbdw4i/S8r+mtO9WsnWWr9pzzmc0/RpZoV8T3ajHKye4lovilSm2b80mqC6LgL root@9b750be8-1bac-11eb-99f1-c6d701d1e283\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD3MabZypvtcRWk/Tk2ogZ6rnNFFA4m8Xm25wY+0RdhAfxiswaMf1+4h5wn2uo92yw6f33rx/kxUfC5v5glpGAQsAtJJGc7HGhQjsUYcrN6IGLQ7iMuL/APJt5lulgvyzTyvN7eBD7N3tt8MdrwMVNnkJF4WHz2Rs9/wzvnaeAiEBzkXeKHVDu8PBfaO7GrZXPMV+mnCq90iphmp/GGUAmmwn0vWvh2zC/75s7lI0T4tp/MJQZa8Fx8wCwbixpaCNgh5FiVYzzF14Y0nxk31ObSVuAmlf0HWxK3BRVacEVd0nq+2DJGmESu3jq19v6ENdcfHt4oF+th4KVcqSST5OHP root@8ecf57ad-289c-11eb-a35d-7a1d48297fba\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDRr7iyIPCJCNT20cvfXi3VR73uORvUCg7XMCs7D7RSsDHj1ikrjfz0rVIzGk90AAd60WJRIE0iFkEqhB4ETdwCK4O4QR9LFVsZ3h+lueMnwO/YjlW7kwWoft+HGjbNKkclVq6LpMQudbzXqrqfeckUvvSdR8eHKjtkOYz63QHh0bxGbXy0mnAyVpi/HW8DLrbe02JL4P7QCZnzVVdj+GmHj+BgTcV0pygyn3zw8BIvZ0L16l8pygSJ1nNZ5d9/MiVDFKH0VuPPVzfJaWvlfidNNDsygauGcr5UttHZNx0GftueX49n9BxOQorDA08rWA2p6KKN+O4kwVStHbzLgorR root@c99d2a46-3379-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCZQL43ChrQeaX69NM/M4++KCtJJAePHG7P+JAqIN58IPYMtAg8AFabxtbl/O8bnJwnElHcEIwo2GjA7xgT9DiZMmoyyaF/tQcVpTJrOBu4zlOObHNRwR56qI4o9es7+jNGP/zEUWg6/SAregzGO+xHoOgBHwYl39w0O5qDl5PLX2QDq6hauhFeLYsoctXu4Jiw95uRS4PfhbmI7cj7EMK7WSLsUwZ5N3pZavNlclfkR7UrVXUMc7xSFK8e+GxDc1XXNwj1ft0oFIYOJUG4pR7qHFwvjeDSN6ojbeK4YwfnIneJxUwlAjuQsYhwfdSQoSWB8Ylx3z872sl1n21akq4l root@f2f4bebd-3707-11eb-a25d-22a534811c55\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDAvXlwRo2scBKx6F+MnkQqOK6J4Pwj6F2xLzVa2p9H1c3Dsk0EI0cMior8257P3tklho7NcecBcAgwHnizXGqkrU+12ep5EyEU/0LZdA2pLpxwn6df3BJ5MxLUWO6remjTRdhZQpFzfPsW0SpINHprZWlVmHUTG/V6ZGk56kOoI0LOvsZgu0/sfDSlMZkhmeTlK8C0NaHcIwD0lySjiPk6UqZk4Ln4k3nc+OqYYimOvr+wx1YMpf35IS9Nu0kN8IDx6ZwvvuUaLrnupNacfz3Xc4a5ySGRNVEUCOtMKNS0Fz7Z1GJXBnIbiOPKzDzOQak/b9oFtxEWPQhVAmJWNaAH root@93322910-3b79-11eb-a261-2eac9c79d9a2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCv299n/KdbqLxdsRuhDptYe7LDyc9VD7ToBHxtqew0EZ/jDSMP1HEOkBDbHgnhcgFEuw7taNfd6YMDCVJ0NklhWribAYLnCbLABbIti+CqayVpYu4SJZL9zRqvMfbfnMje58gDeoWwhz9mlLcfkGmDR5b7nnRwcLwoeromty29GA6zVqfSNDg+22av9g/VakYXy5R8/U/XXxl3oohG+1fuhbJ6g1DlUNwRWCM35OxhqyESII3q5WNeRqwGkhXVklLgsvj7hLIDTU75yg+3zuRcHocLqO7SqvvwDz6/hEe5eKgtG3ibrFI2weeaDpvNhSmEU0t08cW36sKHJtvIAyMb root@84503168-4a17-11eb-af93-4e5abfa0c065" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-018", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-018", diff --git a/audit/projects/k8s-infra-e2e-boskos-019/iam.json b/audit/projects/k8s-infra-e2e-boskos-019/iam.json index 649bcac9f66..9076333ca23 100644 --- a/audit/projects/k8s-infra-e2e-boskos-019/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-019/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-492612675321@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-019/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-019/services/compute/project-info.json index 7e5d9b844bf..77f95a48b00 100644 --- a/audit/projects/k8s-infra-e2e-boskos-019/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-019/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQChXDRmwm47e2imTnztb03kqU7pVILPMPWzNyXz20PF7DkDUrm9DVkqaqfgc0RmMcgX05NfrmIOCKJuREI16Xr/FjRWw2OV0YKFUGkguMYKQekGV62j1SnunVUxd5wyb9AJJvQo9Ad4kGlZ1PBjBfFZR4iWzl924MPdnc2zjRnIWecVYtta/xKbygpPlGzyUTd024qVKTSJl1pA6yKKCSUSZnxK+N3uDXB6/JbGQzC+2inNwZrnLgtcj5/3iw/OAyN2qQOWbfeJzI4NvS5cImYeob8Qw9b3HMVUNUbAh4KMON0jP8ivv36hWhINOEB1y+Jcc/4bpHwsPFGfTBd3x8HB root@5481cf2f-e0e0-11ea-8c67-968ff53f47c5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDHNKkp/cCpQ55FV6eWX4iMLBk15vNTgfddNDc640HAmqRVf8zaDC/yllqDC39Iu+Mnb0ixi/n5qQHKK8nWXJkLgJO5SHgF0hz5Zcm0GpCRAWHG1qnga2A22HByuk1ycwtEcM2fkGHyUT23cTg8ZZNeMTDVZRyayq6kspIcoVd2drvz/KPts+9SNtcRRGoUa5Ff9WmzlksTLhx9gAO+nv7KLamXH6OD6HK/LKk5ergzC3KsPzH1oBMk2+9lf3HN6tpEG7QZ33LeAmrVy+BNHcgEPxzh3boPNhIZQVvTpPj3nkdMU6CgPZSS4PMWyxkAMpevemkd5bfVuqxcaTAiv8+l root@78e4659f-e145-11ea-8c67-968ff53f47c5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD1Ke1cjKOIz2FiI7pT8KUgjLCz7ZVE41IEG79Rwj15M9rUay11ZAVlpSZOr9zG5O9AWvu4MEsFHrRnaEwPUZDlCdEFK60arAQ1YSYYoOvuO9RGcLgA/SkhsMDYuK3FnoD30iz4jN5ALw9sH/U1gpcO99zdcJGncToQR0p5HecUqsp/kqR6sPV8q4Oe5xxKDjKIKc652pAAsGmqbAY8DhDkqlwQf4+8hReTNndXfyUCAFU5Se7zT8CYTgS0VEortpKePNjRS0C1UeudpqZTDf35B49dQpfbpQVSVetVoWNl+3BJh2K6DIhMJh85onlek7naYwNGQtOw7E2bMNIXtTqz root@4e93f2a2-e2a7-11ea-a87b-7e1d84ccc038\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCaaAp0FYl7l2ZLyKRRswwxAsFAjDoHYMtlukCCJdELN/2lTF6jBIi6SsAz9TjU02Qfl73JsJg0nEegZ+v2moDpKokQ6Xi8Wyomev3EBvsiqR/vCYGbu44iyuRL0YjFs1o3Psec6NdeB8SGqExBmrMNuRAuRHTA97sVvYYQs+TTpclIxf2EM2NnTAJ24UnpTKyRGQ7ZIajkNfOVstu5j+LHTrdIJqnFm8dlt/P0wW5qhoQT0dvHqTsYQnIUlLvQBhAuJR7P433tqlsnmmmMzTfzKz4FagOozKPB+0KkWyW6NoUujVKTFhAsIW5WzgoSqa1YGKkvATaJ9OQBUNocbREz root@db2f3904-e815-11ea-885a-2259550e0d87\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9BWd/kD9IhIJrx734aLtHqVtDQRhw1cVkJa7y9NZijkHBXEd1D8DyOJGsqlJoxM9yLh6T/cCO71day0P2q2cQDy7mabz8Af0qCFg4KS/XPRE4Caxibo1zZKEAaJa/UU0cP0TRSoSGCU7siOk68UexhFb8mbJXIUxyffyJHKz7g/8i56V/8j+9zOGc2hA9vxbqeTukad9GaxDsgCLP1S0tAgFLG8M2E08HCUfL6Cy+FEdKa+Dqc6M6ZEVorPqirmh2kArSv70Y3LnYf0dySqwaNGkURICAxTErvvpAcFexHDc0aUZFyFKJQ09VWvRnaOsgMu5Ctza/3aY/OMwPN/fd root@7db0d16d-f1e6-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDR0xtAslUxlpza88nBFMMFJQoacrzn872Iieu6DfI45eZFFwFVTdc5YVEKtQtAQ2j13Y4Fld/7eSqZvlpNNfsE7bZa+oFBery9STV9V83lKNIUWBQfbT23LqK+TxbXhOGEKzesKIxD9lFk954nzMGo652yW3S1qC24DFFW6kwAtvak33Ue8wWCqm5Hhpyy9W+GrG7Kp+BrAb3EMFnZvCqjuKtCHzYZSSxPpCdmI2Vf9ie4ZRqMRw4K6ouOWT9I3MS0xRDYvtIHuzpC869nFCCFN9aULtGltzJKavCOd5BegnIFIGIINqCVWV+qeYKXzgepPSl3TKbjoqipLn8lgOVT root@1b82a710-f5a7-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDW2J49SM5B+HRGx616SvgRx7P8NqIwyk9bYZogwCRIjoJ+AYXb0iZo0mkzOa8y6y0F+p7NKThUPLxVq5iU8Ojjjwb23UzgZq5PEKhleOyb2byK5xajUxw/hoWx/VJSddRLzp0FRgyRykpehCG67/d1BkJK+X5FLvP0cfJ8Kf4SCGnCh8RZnsRWUhktQteOTmgblXPBB7v9NtnmgKTsBKQ01PgdOTzAO+RsIPRAdLTJCipS37SzTKjUTZPkxbq1SG9xxkNlm1oX/Amj0hk9F6M4pVB8TXW/zfkXZXcCC71nnNnzWBqOub4JTsaitqWQwnrcTCbA2/RRwVG/IF9Fbr2l root@793d748e-fc12-11ea-9c73-86173d37727b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCli9dqa3rGKbIj8TiZLDZhWTPJ0qWfhg34X5bpFwt3LSUK5Hqnj5TuIqtTV/whiCeQlDdml+IyX7x3ikNDtXJcgJ9HE2/iCSu/YQc1EViKwNVpxG1Ra3jYD+43yedzCH+Ul0Uv0XXnd+MxUrAoL8ebmrdWHYsDKrFqbZt0wiaMF6/dktke0PyKCgozojTYrA0Zwn5I5oDXrLgtctaXk+DIGqxXvNY5C9/2/kxowWQTs1BqXATPIOhU8D0O/1vxyUY07i348RViAesJwZmUiuF5tLyATk7wDrrdhyVDdHbiCCsnD5RoRBVLZ+DpfL+eSJeIRbnrIIG48Sm3uE6L9sgN root@f990164e-fcf5-11ea-8986-ae48fe2da37c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDNGFFgYp8XzcE5FmLZh1z+WQS3UizDlozxgVN8EEp7PzGsEl7Aci6i/SeHPHcU9GnwVmoB1yt771WDHPvhRyLIY+JACwPqw/Oo+6pNe/p7yl8936s1wrmcmaR6zhkYF5W+rikE4+jsTlBoxC5xtyWMKlCtRJ/VqdzlXVcDuYTFD2xi8yjZA0ycPAOUuFrC87qPqJsoLxEBRI7Ea6RPnAc6J8nulf/MUspu2JunguQQPyqXLVUni1gsRg+mkiFx3amigUf1evJxPNzItlDdM4FOpwxXeNu1eUbqewJ0xoiyg3AP2l5dJ//yHi1mV1RZ6QNJvx3qI4Um+99m0j1UjxvX root@137d5c12-0135-11eb-b4e0-eacb7c15c8a0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEArXDVUDpfH5mpZBRohghdk0tdx0Bjl6BmLGn8luCvwR+qAtmSorHOHbpxyBaAt7Xg5VJo9Ycekg9SYbxx1TFOcz3S/uJSWakE0Lum+HWTtqhN0Uvk8TcMaeE8Vzi+V/f0HPEfgwxXL6MmsMDf8NaLLzCzU4szDuu0jNPBrdmYDbqZTIxgU6xkcr9hJveTUatrf0yXC1x9VGYcM6zhBkdwL29tDqASTXzzUzLK3NKLqwiWsnI/GThUkjJziLPh1V2JemuB/Vwsyo/YVkE9NExMuoay7EWubQTk1C7ANGzMLfndTB1jitd9LXX6Y2aqj5FeyJX6gkLAGHrawX3R5en root@0f262698-0afc-11eb-82af-de22b9665164\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC3qdrZk6QWqJ93dyGOGCypGPOpg2RmFT2qpCYmHwh4326UXeFl47vryvKhcX7AKFRBxfcTQrQPSBnKckeNBl+LRYLoHzKpknVsT3fgBXVt2HXK3lbdwUAGy8yfKPvyNyNIZLDB+WHNkGCSp/GtIaZGs/MKH4r9JCQg3C8NJqEoVe2pLJlXFxj8DTL5vBoD6ublrpKi2I4FK1fe24RbEKPfa2D4CehAkkKRRH4QfZiNFNqeHcYW/vrCyIy0FihdTiRfqfKuZZB04AG5Wwfx3BdZssgXYJaiy41eS0ZOIIppT9Qz48B8okYmsl4goqOxO0P46DtuADCLur96dAzN0Nvj root@8bc5a4e0-0d41-11eb-acdd-663f8ab42c5e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC4eBXuJKWOUXbmTKh78uxVULJUPPPpBlmg5EPHaLHdQ7PN+dSpb/aT2uEJlCwX7YR4f9wd7W1L/BPTXTsr01KObbN+dcmyX4Qv9mQGvdQpP7YxZieGUgkPMXiBoK4rcjXENAmkFGhcLOA/QEOrs0K/W+B8bb02kxBfaHsD8yu2w1LhIb0Jptv24Q02w4lq0M7veuvl+ql1mm9bY5auQQNM2mwc9tNzjIALunMW64KZ0RCeqCbNTbm8/XIdWoivNIrtzykDjO4r7oCNiKXKQNBDuuJLSBexHdOnZkLfCclJMpuJ/bv9dPg6cv5Qqh/1wB3G+uv8r/KX8VoeyV3Py5P3 root@fde6e5f4-1d8c-11eb-8e42-66e2cea7f923\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCwqZxaBtUTBtOqTM1FsPqn++Ra3RXSt3jGLXBp5yKrxhmljwRJIWuoCTyRQSHpvg843wvQyquDg5wMqu49ft51l5qPvQp5CsucOn9Zsf6gF3k/KQDUXZZovZ54QPrIfbqZ2D2nPsdf13GNAaYTjSb0ID3+Wo8NxjQvUJdiznYsepdAHprulQTtudCi3YMlG8SFtC17dFkPX4EK1euudC/Kw5iUoBvvdPX/4gW+MOYB54oQh8/PYUCX9qBZjpj1DvuoYmfGfl7qdrWCF9z3Loa6DR4s6LG45C7n+3X/A8aOF+YBSL5+ief1D8r08daD7mOZXzNr3cY1T/DZt7v5jUEn root@e23c0914-242a-11eb-ab3d-9a499a0fc9e5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDf41KmRwxBvv4x/HcJU/6I39DXZNSB8kcaeYmkT+6V3fU/fU43ZYPaazZ255e8FJ2BtnbK0jcPZnWzmgi0T4AmRrddCDy4l9WPX44tmDqqoGG47ikuhFG3AI3tljtzMd1H1tWHHFoYzNd81bp0cgD99VZ399z2LjiRevtLscnqDahn85MknnCOt7Z81UDPPG7dzRU+TLU9qdiCCuajaXkqV9m7bpxiHPwzR035/WWmLGBpJNlClOjFecgZuAWq4V8KGSWgkdPYa9u0AdJvAZ/92YLkDrMnxGvDkTyGNCs2dH/yWnywK3zLlmPV7rbWQ851ZA7z7i2GMhgq6AyxpNX7 root@a62a78dd-3050-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEABT3JX1DhFYX4fYy8BCXoGUSIaC15mieC8nLu6Xrk2/+Z3tTDdpqbjqtAArH9LzD13I+U2qjG41HoSXYXNl9ilmo4z7IQnYXWJiRVQxUvN5gvOf6CyF/ScxbnyMymfdJFdfncP8P9N/XODs48gfneIcBdFQ7z+HGZXmyNMhQX7D8htt4SaFpnp2/DB78KNhIZLYO40eiwtzfGBuz1vkUrKwWDx3C9YDLA2wcenRWNa332dhVntrvoxJTYm3EBBtiL/dGDybp0c51icL49TotP6A5cjJpZ/uMGmu4D+QjLfsPebCyh6INzbuzdHS/eYQGTK+eI5X1nFvt+Ctnsbmj root@f0100ba6-3a30-11eb-be51-2af5b2470e9b" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-019", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-019", diff --git a/audit/projects/k8s-infra-e2e-boskos-020/iam.json b/audit/projects/k8s-infra-e2e-boskos-020/iam.json index 5e302aef26c..a942c316681 100644 --- a/audit/projects/k8s-infra-e2e-boskos-020/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-020/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-741131917987@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-020/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-020/services/compute/project-info.json index c58ad83d25f..f233558ce83 100644 --- a/audit/projects/k8s-infra-e2e-boskos-020/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-020/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCwMBIm6koK8Q8L57ih+0D8sgcjam7gnQF2sDoMOFXeamdu8aL3XWWF2FCVGFeNIdDK/R6gNK0hdXMtFCc0yi1dFJUwhtIvGlTTk1K9vQlvQkbMZGXiyskIHtN7A/qf7IOaRgjif3KDoy5WL7LJDtMXO3pteuuN3SXCdZzfjOQJMZng2AzkWz2Ml1alONR1mt4C6q2ciRKn7Tv9wBhdGmPbtCKlkmmA47HCC9Gp1BRzbBh+i+Ad7RUMEKl/sNLVozILK7XQv5TMKGiVlIDv/lh/Brqic1QI0DHaB/sCW0WeTe0SxRFAPNIP9hLqZxQBf4YVTvXazZ/3uIcF3iaaSPaH root@6372f290-e3bd-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDsCxLaWintnk7rB2dS7ZCVetdIlI6Nd3w+kKUVUhnSce94Fs5kioq2hGhReqoI3PtfjYW4Ni59KKs24/I524FFIeJZ5kuyM400g/2cd2BoeaTs3oCUk7yjPI0x3MugPrixQN46/ih/Jwx536GJUwu20av6gpnQ9Xqj4abkWeNb9VrpWz66RzzVEn7w+gt3LwrvbgDRmxqdEVjJutg/6yyPMlAaiq+NwPga2pwLU8q559RtsAPCQwGD8t9+Z67/ExiJZmnu9Q9eBMI1blf/ZbVKqkvKylbjt5SSUBCH53k4xtcAhpoMtNAkxqV0HPVJhUKKhDaNnr5D29CeOAN05Wwl root@ffae2002-e87a-11ea-885a-2259550e0d87\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDB5YBeB/qq5X/Jeq3I92pU0z4mcnqio8OZUTk3wuP4Lp9MAGP4UEvJ5LRxo0yWlu5TnIP7m/x4LszkjaVtkoU/O8H+aZMpDPnSUZ4eb7cww4fz7p7O30bYXmSSHPGrSvJATlRv5huXick0WJxyxD/SPv6IqAEEKG7R3Bor3nxiIeH1J9HgIzB5Yyw7yQdDN7foidzLcHR5CgBcm/Omyvm99xqHR5yJS5HjQhGNcQdaxAUGZHFlUvBnm1T7jcTwOxtqbd92i8W/J/RPf4TzmiIXMSvEooST1oJmSbhZQXBrVNR0UfHW5jy3YuNk5V8v4dcPnxqVEvkiprvVe11GJgdX root@1a0de339-eb7b-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBV0hoHnG/exnMh55IgFqt1HZVEXlsh7jcVDLPvDbUxCfMJhJqjJhSEc5aMlXFJP6paeaGMz6pFNrAe//aTJZmH9AjZAprmsSlfStDmccUnzOAwNf5GciID825uQIZLL0dQ6O/aCPLgWy+kij+nui0UYuhn1gY1KZEwAhbTHpTImf2fdxlVoQIy9wHY5Pac7qrYnVpuwk6oxTGhX3srh/UGeWXpJ7W3jxj6Ns17GlXYU3QnaDs6cHFYLrqgYYKsA24N9Qc219JMRVkp8fQTtdIFUzqndmGTcvkrIJCWHfkT8xkjZBgVYHDvow+/4ztC1audeeexjrNEjl5T98UqVjj root@63386fc4-ec45-11ea-aff6-5a14b0d7f3dc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDNcX0l246kurOzQCOxi2p1s5yASkuFQOYZvPdTFyeFz7xYqc4z04V7xIk4ahjKPc9dI4U21a1q29K7Z0+wtWuEaiR8WAZ0OdY5qmp/xGr9zUXYmMMNqi2Zbi2t7/wsjtpQHhLZinCPwOcSYPtBD0Wj5ye6c4+axWfEIguHthsnmO3W60BxUXalith/+gPPROSiOsAvC5oUrKlkOC1T+CZHyWLdIaPxezG9OQPCQuheLIRHWBVxKznPiGqaCVa7XWZbFyxERGn80klGjW2pqMHfCzmTxRKRhxVm40A0du6JvUoQAXWMELumeIMR7SSdOYLK8p5FtnCICH5SIevmgxlz root@648f40a6-f5c0-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCzpQ5Xrg/nW7951dJky73DIe8ngOjZ4mOo6IjwTcIvNo+QJxJGR4s3Llgx+w8W/G0TSRCuTkL01o28ZSNsj6QJOr0VIpXdB9b5F06MjHU0gOdXiCQ0RmwrzJapnORFKAgv3nAsxWqEHFSDDD12I00MbB1/iJQ9nRiPiEumgnl82Bj8eUY09IV6KktZ2pJJn+aMCJLOSiCwV5hcJjJBI+CQRxQDILi3t9mEgGE0fBLcs02fqKdjoFHSc+2yRhZNBGCtz99rd/Gk8rSTLc0M90Ay2bNMlx/zXNEdwTDMWQTNbK+2xa7cuVo9iZivMWYIZ9JdJv1yUYkSK7fvAh4f5Njx root@387bb0e0-f81f-11ea-872a-bae3dc204648\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDVWQ03HPt52yeg1twPi3R3xee71iftM6J6Oyr9QaJNl9u6lV46IAAhmCGz8lB9VYAXi1JoAeQQOPfFD4rPZiE57jkytOt/OMKdeVN70bY6ODbUTAxN9Ijf8wsOMr21ugfiBwbOhG1EaCHgeNYsIyrhtWuGrRU7Tp4pwexwWTTaN6e+w5D9GSwbPWLxRxj3mhjYCPEACvZgzXHPBZ54FfZ2ONWLlP+vi3R9zcSGoUBhp6qT8cSzF1pz0KVQUVypoVg4mwfxcOuMAZIQStNmzbJl4/xOPFbQqB/HQusaTJiZCMMwJJ0XdSLRDD3yo4QXxLp+DihTPPn7L2PGx3O8PZnb root@af88f111-086a-11eb-b895-6272783fc925\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDWOdrcTV2PA16ajZtjAMoBE6sxg78V5Ey5dKHcIH6uFVlIyB+mf7LRyTxGlaAhFtf6DdcnpBZIeN7S9GXToPiZb/2PHg2WyjduGm4Oa4hxVT0L4lvEYzCp509ZLlVUsTkJx86/HzwS4c4LC8GjzcNsyeRSi5rvaJVRKAmXxsV+o/EoLrHYZnlbljwtXaEJD2mIPA8wctxFf2dyQeNRY8ZZ2Km6YhiRaAtSjUBclYb05Hel7W3ENav5hFAZ3VBivND2BkwozHHrO0eB72qYEenX8ypiH+/cphDum4iKSqfcFBoKkG6or3a8a/IZkNEHY2E5CiBReegRtFlYZTM72I/5 root@a0328b4d-0bdf-11eb-82af-de22b9665164\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIA0GFVDb0nKWMEBAXRsF8i3VPGEIp07XMZCsdJY8KK/5CF6X/GryedK+UPBD/hd+HICKmeyP9YRuISUQTkuzzWtKPjYSfT+nWtRbuELBbqhJTuapRbpgK0ghB2weToFk5NofR5V0yYA8N/T3pc/SxVMXlIojNhEQ16h1rIqbGN/iChArbncee0WNySLwKwSTY+pxKBla12bL5TRiodO0unjxSPrjv4eNgasb+05twWzyB1ofbcEWTnkl/1cI0OJTyEumWrNK2Y8S7Y2QjugSt7YWGBaFhwOp2OreSpNBsyxh0jdCnptuid/tLMdSzFPu6uQmnrEqfwSAghvuybfWd root@3e783988-137a-11eb-a3c5-629ea79d0103\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDm6VSPpKrgYYXwuDasYAJYm565FPswXenR+OEC8Ti/LiR1ltI1mbika5ju3a4fDqCcsfg3x2GOaz36dYrgMyUjCeunkVr2VA1ZBEksI6pvznSSJWrn7PN+HhC17wJAks7xAIOMcTo3qYKVrKEn5QLub0hEPgxmwj2NKsuJTvz8dKbh10Zd/G20rqf9ApR5Ik+k56V0IiPM29I8/KbgXx+sLWu+REGUZksc9xi6A4DJkdC2kRxb58QEFKj0MmBEq/zcUpDbH+UFQPJ1ptp/4dkmgpi7PRX3iWzlOYQDh7RmTwSFLJYVOpOO3K01F3PXbIUZJGrbIYWsbi1o/WV6hOLD root@e08e603f-1786-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/SxRUNg0wAFzjUz9cX0oNxm9wDvDFLFhQwkQREmabpY0sh4FuqHuaJFqOUd+GRDg3WrSMkAxirUzQVoVdnK99OEoOm6ASB0bu3VWlrj8wGI7/1MC1xxcTtJqMLlpkpj1k044NoGTMSGyolSUf8Fl27q9EY5wHCDGm2iKvKFUafEFgY3Sk+27eML6hpqqiJS/zbOPIV4PRhIQqQ08l0Qs2YmEvC9FO+IGU/+OYpHAFdrlN3NlNV34OTnBJMUguSlU7nl9HYgy63TBWGoFoWwElWb/HIEOMyV04TnA0zS2WQWSqHo8ZWj0ZclTOyO7Tev75OAeQTaA7fvqRY6GQsvOv root@b3544860-2901-11eb-a35d-7a1d48297fba\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCXSpjuAKYvJs/Esm+v9hzTRAak8hSjYV0BOyF/6oeQVWuzfMjYFlGuDGyK9wpXqGUaFSbwSBCQJTq61pS8jRO3wbjAMqvdhf/XQ0EXJLdT+CmoPRFKnqhVbTUK2auiN1/zRw81SJXR5L3Z0mfCJ3bSx3kTgXmSBLRWhslYPcgDk73m1sxS5VRUdOCCr8zjBTJKWR1LjZk0Bmy/WSbXYKtjKAfoLPPJmN1PaTl61S2F4VJQfhEGFPFn/HolAHrF2mdMYHdBE3MZjTnXnTcmztlhLJ+/I/oBXodiT2XFSKj57Q3cC2mA4fZWlg/94E1fcGo8H/xDAm1lwzU97pN1ILHn root@da2653c7-3fd1-11eb-a051-06e11967f91f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDfW1z+u9YBztF57WsfZJIdNLbE9Z0Z0H8eIYYLH1SnwGOISTNt5Vu739TW2DHFNOipno7A1fNpx72S6vPZ1BrXC8PlCpbL7e70JufeuG76V5Aq3YnSdrhupKA8giXxmFwA07vPwi21khvN6abYrM1lWUYuzmFKmpG9eAmT3t6OPEQzX063OHL5IvIv3vIDMlQDIo0OLid30ElsaZgSlfP1xXxoJhae2fMVUA0158kj+yOqUGgS1WKtI4KhHBSE3MglOrGB6dyw0jLEjDWVdRoYch7TrmtNiSig4QVQ9S6ZADTjK1st9vGkxgN74JOt+dnOUlqSNPEbi8wmyw/EK2kj root@82aeb7b1-4eee-11eb-af93-4e5abfa0c065" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-020", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-020", diff --git a/audit/projects/k8s-infra-e2e-boskos-021/iam.json b/audit/projects/k8s-infra-e2e-boskos-021/iam.json index 6433d0006bf..3a399f0af61 100644 --- a/audit/projects/k8s-infra-e2e-boskos-021/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-021/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-1073676230139@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-021/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-021/services/compute/project-info.json index e04d37be377..13eebfb8d0d 100644 --- a/audit/projects/k8s-infra-e2e-boskos-021/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-021/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQChG5Py4IuKkxogi7TfnRNMsjtF44w4GYVEtA2x27k0sc6JnLfMBuv07Mv3K0beOzSzkii1GSuNT+jiNmiJsO/tS56Mlidp0i2nMIpTLsKVkV9+ztC9frA6zIimXVvR+SluRaRm35fIR4k0UwhjE8q4hgrrkbBybRYsny72rQCh2X71J4bbbp/Xox2SsRH6xRxyiw6rpDvN27lCahivldGjFg8ZSAO9eAjMIEFXG931+OD5m20cSNjCPBeHbA78PCA6aawiJbto2Up3PVBSzFc2OSylaNpy+E6JeMPz0gYu+/qodWdnL/sbiD5DvKwIhXWGrRpjkJg6CktYQ6HYljnr root@2fd02135-e12c-11ea-8c67-968ff53f47c5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQrey77ZZN0ZoPq506Vpu27W7EVzviu8vL52bOL79qyPdiOMS1QhriIJPJzQwaUaLeLyYUDRunXzu0oCPhDWApa3oo8G+eYzZBuyn3wfpAFx2EiY10sI1NOsWgYxsYo62pc/XN2mgdPLnJuvF4ha91Ux3vsOvIyNatO+olGkDxWMVMhe2morilmGn+WGpezArf+ILZRslrV6l+5f8LY2nePmcg7RgKvkOLyC6V65aAA8AYOAZqUz/9CmQ+AxdhTkIQr8QJscRFQleuMmAIz3C/lz78X3FVmZlSc62QpA73bjlzHZ0qrMp0iNQDNF+huKhTPH/L2r1pViyS8Uie1DmD root@64930356-ea32-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDaSNd9NF+pizXxotD2/7pxyrnS5iOi18uesHKQyAXQMZAbtcWyqsP6UR8Vy/4Scrj25Z0RBaZSgfiKn+FQ+GrBIrxsZh7RUZWeUyyeeJ0IFHyl1jH7epk7AsPTXS8YanU61cxDjzBb7ngWWF/IF6wwSwUS9EURnzlP/DHsoDxCVzX0449aqJ/052PCYRU4pz9omAWpDAIsYXcsyIRjiP9AkHC9LaOY0QF8HIeNahG9O8uxOIBpnMYx3LPxoCnUyMY+kKRvWY1akcJiz6TfOa0tU4Ip40fW9Sie4i7J9qXHx2UBcNv3P+tpldZfPdA6kT6dG7ul/BNWCEfFGu6emL2d root@5c96c7d6-ed5b-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDgQcwYkhkVUZyRx6XIhzm1oMgxM1nHPtytr7tlfCCDJQ6yIHmPN5dZEL+L/6VdqVA8XSiJCgdM8YOGbHZy1D5Dc4IB+LasOsJxqn3VJRmhm8cDtj4WW9AVcRdNete5+R78+D08eMw9IRj0/WpUzLJvomGgwMytCQ+kJ58aLsmRmVS0s6pWr8u5TEG3NC4XAkhB5Sut3ilWkRxVxsyPMy3BO/XlvdMQUGGQ50YNNZIvtUuE1uJMTn9pwpFYlD4NKj4Hwm4SPrQKq0PzbntSMbg4KyfrXjJTLZW1yDal1QoebdT4GepdyFZUg9deHMM+XjXUTTOVkx5+Hx/cZcJOHNqP root@c6e6defa-f14e-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDLuByXAqClHDzAk03MF5KqN6mIgqC1+J+LXQ8GfqfSHMCiCfaVKt6zt3wx/haokhYey9PGbdFI+PDzlV2Lwhab1ureeoDYggP/MW5VDHZMcBUfziYQh/CdNKsFpYx2/J8L5aa3E/kLocWNyBHGUWvnrKozxS/rvev5hhikR5u33USPpAE/TG0nCuFZ9ZwtR61ZGVsxb3+aP/fhF0Ecl7wQS5QEPQj0+NF4eEZYFfa9hEht9iwiUy5NjpQbQAEbs67zIwb62rwsUWLWS0dLjjsXrM1LVEkxmFPRco54x3az2jHs68d4DvV19GnJPtnld2rN8Yqu7f9odXMTfJ5GmEyr root@d2a99440-f58d-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDXECOFI1Tv5AVPLa3kC3uC2C8E8ykOFCZlZCMwuiMFUqKxZSSo12V0IaLazABVUb1CfP6JOpbMZfI6RnH6w+c2Frln41hlSYNjVs1Cp1xuOtHmeH+slT037odHUpMNZDKp/diSMOYEBPmmsY08O0CpcTskf5QTOxmntNQtX7H2bu5TzaEMbAQQU3QF2ZluI+WF6JMA1/kqEjTJ4wmYiYKcP3pLl4+NkSi6D7QDjr/MlF/sEY4mNrwoR6trsWfgmqq0E97YfQ2ZU22hx02aptbDYV5jPYHSk2pt9smS83gW7ewFYJVCDYxuilEAfRCQUpj4+aOGBzSR4bpcSLXMABFf root@c2b970b9-fb7a-11ea-9c73-86173d37727b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2xs6bfeibgr1NSdrsjAwzQZDzrn8RFeryI6VqpL59Cz42M3r0jkCJlJLpTMvVzdKrP5PLfokHdKyIPFO6GaSvV9DiqPO7dLOQwWavjBXO31kU6JE5N/LkwZbts9F+Pa7UuBz79mdGBlzT+1IvYc4dorN2jz2eE4AI7+vGKdy1ygn3y1XplLKbAXJxHDNjoWzb6SfKjnbWPjr8XjG/vuHx899Or7OVuLjLqO8CajqPNGZC5TNNxVja0ZZyo52yH2a0sxqff8jUsjYxwMguKWU5sSbKL/pjqqn6e0Ebd1PC/i3ZgX/M36Ox5vwM7JqFI+6GXKoGtZhwmEKDN/boS8P3 root@30f577ea-fe71-11ea-a78d-ce9ca29dcab2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDVzZn/aCM9hmXTEU7GavFriwVhj3/bPiPFHa4+a6Owo3DZ6ZBdoMdy/0gp9kCUAul94Phch5LIdR0tIZ+TzU96R4m16e0eb5wyMo6l42ZVLTleY5JwhI4xqopiaQg8zPkyqUkAJWffkraSMushz/lFyj4oWpP05C8nOgQ018YSrlky1H9NSFEF3AGtATmoUA53VpQYEI/NrlUls1PWYdFy1u7ikwGQjTGCqAEX6Aw2xY1bNXGAWm9uLiNpTm8DYzqxnUw2iFNQF3AkeAAtaGKsfuaJw4GWMx2Gt7Dr5HaFyy0mQ3xE0vrLHzrh4HIkZM2l6ji/BXov/UVTMB1iRF33 root@e684e42e-2df1-11eb-8da1-5a2e729b6dfd\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC00KRr+lwe4cZIao2xn7Gt8Lz/gi0kxyVQNg6dCORJE3Hk6gDrJmEHNm8Q4WplHX7FQRlKYFex7ilUgAM40/J+BqiGWa66Gp1zJqh1+2SY0LdkaSu7v7+HAo4ShZFn5b2fX/TMU2+ksFcFJAYJFYgfBv6HRsEvhPkMTxBBM2rh2AjfK+m6ARVYu2w34923w/oH216OUnqnLLCozTIZ74q4E3lIQDhjmUyz8a0/h79M/aP72+k2USJBNuc1303PTgfxQW3tF1eBaV/3MvlsGmLu36nMWEpXWssNVc5YkuScJMQhmhoTEUCkUaqZO5iHBdQgrO9Z59UyQoqydt70xyR1 root@a536950d-3476-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDLwXGoqGI0gdmrQCikINHb22D8CaXxZeqBMtMAMvMTYqqgz9BbzvRRfySp8wSnvd4yuo7VmnS7qZxw4tqRf+19zqcbptiLwkCB3KaV36irDumt9UHqU65yXvOzO5yelbdX45R2dzmLokEkHfQcI+yw0+JW1bg3vedahMZO+V/KgxbR//KPa6eQBKISsrRLAuz76SsGfoIhqlPr0vaiUhbliJV2+w8net/dg71IrtrBrum2RWBXqWkdIAhhTeo39CW+/9RTrFCw4qDVYsqKcHBhWyriPyVsuzQWKWR1ArQrRZ22yzyp/g0nNaNsQWrJdGmkD8BeSvawIuJYabXl+xmJ root@90893200-43de-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDLENQ1Gl1mXYTiaSG36W/VjGeHKEN/ao0FlVmM65WVfmKHHtfie36Gl0ZTc4/FWsOrPxsR8d5cvVLWOIjpUQMEhNdAjqPg+KQqcOeYZvKzK67HplDvLbmtje4rL/m8LmkLovoQU4t0GTyzpowbTd9nxmOh6dp/6UDJrojIpv2lPL442zvhQHZkAsMhRFJxR0Xe+e+PiBFpffg1smcaHbx7j73t37+YkH9f+PVY0G6yFxCQnFxGjVPzKke2NAplrIc8M2SSr5XcAE7y9ddxLN0Q0qJ60BRm8rY7P2zjZ9AKPSxSG1BDAFEafcLF409vZPjw5z3o4B2F5O1sXk5jV5Hz root@8d47eae5-4966-11eb-acd8-6a2a49dd8a76" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-021", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-021", diff --git a/audit/projects/k8s-infra-e2e-boskos-022/iam.json b/audit/projects/k8s-infra-e2e-boskos-022/iam.json index ab04a0ede4e..d28b34281ac 100644 --- a/audit/projects/k8s-infra-e2e-boskos-022/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-022/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-303123739080@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-022/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-022/services/compute/project-info.json index b1837e54345..a123dee07de 100644 --- a/audit/projects/k8s-infra-e2e-boskos-022/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-022/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCvgIMiaXn04Xky8EMq596tw8gjna/s9MTxuKlF/aSTWn9zbHqA2a4VVSZpno0dLrNQAAAgc7NvkCG49eiVnl/TLjxqKmTiVw8gx5diapeiGYAmc//sN5Op+wYN9H3VC5sSk+WqoIb84jeeBrHIk04Rmxi6bMc6P5Qx//RPXLJWbKYGVbMxqxnCNAyABlcT99Stt0FvudRASMG2seHrJZ4qshh6crUufNOWQSzh5D+eE+ku6wm6FHYzuaAWPIgWrFUvAuQ1tJJX4HeKnHCYfgWavoEBzyNu75C9YJa08nRGTSal2j0WbIEe9eheTQlUVRbFGBVObrGgxLuyf1tTD6BF root@f8b39e23-e177-11ea-9eb6-86c455181e58\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/P6tbs30N0b2AYw6//DsiT/UooAyiIfoh0vidaXD6k6bZFvupto6j/YXEya36Y8wi7G4UdTF183oyKZoRTm4axUWIDDq+VcvsZseFxWAmF3g/IAm0TQOOc+SL8Z9ZdiZplXavC7OmjNYZ8OxDZdMLhSCKVQ1Wn8jd6RM4gfy3AGF2xhPZ2pe89XXKaBcDoRSZSnX4pd/Rovp+HStcPGJLDiLFBfkH+UPId70fq55K7+aL2IayiBZ0Y69JBEmB3y1Pscv4cnArgdfvp+rtvbOBPtG3oGgyx1beYIuL+N/VaT20TvsUKxMpNzczoAWnHNEYacVHmXxzxCSx6YPZuMHZ root@0516255d-e68b-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDs5wOb/YQh9OnMNzMLUkoahQxGVCA8L26gfNeEMnKUEw+jsTKqLf6tS6d67CzWyeB1zcnbAkLzmcFjitZfw4AWxKUgYYcW0PTQZ7QSDpxn1AD6lV2KHeFU55Qwx8C5q1HtMK9jv5FNoNT5hnhlWycGOUxvXd1J45UoTyQo+/sphjXmnu+CaopWvdcbo7olWIvTu8tCNJ1zi/1IXyLWpruvwW3wLfXuO99HUE4LpzlNGYOhYnZATUHFOGT89X22SIQeo3F5J2TJq9lmmg4IGibxmUw/Gl1vLLrHzTIPJoBy1EiR6lNtzlk0fpRMTayZS58V56S1hlVQOU1mya0kspmj root@3d044f0b-e6cd-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDILjz6+kJWWudo5g11WHFQtIoyPxgOV9yiQN3TVvr0xgbDaDX7j5zrjMZJFUBjpkU4bRcOzlFqDZtr5JsODZCjAeeRAzfnxIwHwyD/5RdKlaDHR9+40nuiC4dF224+sSwUqdRVHOjeHtzaLSFj1JVj0ShULmnAIcl3Z9L1bkEPM70EQ6SLtbvFcF/4iw1kGhE8IWV2ey6VKYA9xsfMcpFB2jZOU78PpNL8a1CzisAY3yUyuC7GZyTiN+HFPn/8OC/487iUdzt7L7YGHfNAU2FFpF1i9dB0redARxowLA1W/aj5NSv59W0fhSmv4OME2l9bLYrJoatlaFHlkxJyr52F root@089aead0-ec55-11ea-aff6-5a14b0d7f3dc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDxzDMWVsCJtSucwYhNSdRTywcaTmw9eY9M6zAJF5+H1XE7QxFKxzOE6LSIFS08UpAAW6LcR37dnOI4xwli2oZZnVVt4I69eGUgCjHCcVcbvmv1Ml5CMOxaGAR2DeOdh7G5vCrj1p53wWiyc637yf8Vb9W4Gq8IaSpbT8Da/pjEWH/jKv02vKFzoP/vz7cOnaBvamIusykHQ/iqAU1+D/KopbZTB0LHhPODxqv4moWzAb9HuGr09jbMxydqD6amE6bWeRz6AxOec2Ro074vackdEhMpifKzwZz6Qb+R7ep7CFiBnqY08MZh/XU8kxVLCM6S9sT6qbJuFc7x+72vC0nT root@b8404b6d-eeb3-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC6/jnvwyS2L1iBhoK1Vswf4VXaT62tbDlwCzfMuGwhlz/jUQVx2SfYJW1A6+TwKHufSteucQHHyh9wAWKMIoSorwHB4r7hgJpxUFfcNg9ZIur8KQCVw+FoedfVbtjfrUizoKfjY6trcGLrArPZAL1UoltJmfWx5xxJNag6LVt8ZfnqRFZg3KPEQyaeARsnFwdNvhIJxx5fy2UNTd5qMpob9puMracwNjXhPbF3CExNLfVrfikIu91silmF8QwOaw4zV6ZYkhOOKsFPV1xDJqVUuwdln64WN25Kegfpd5MqK+scfPjnsmptjh71ZXvVpovemgYBVAosSF3Z8O/su0X9 root@3f822eae-f60c-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCt4gOODiouZU7xbeqqSsiQyRtUM/8PJCbtYsAATY7w+tkm9lMnfe9EGZh4MGcMdx0SkSL91nlwRygyxKoVII1T3+juugDBCcnvcWnma4OUPKaAEqUcJHCBPO/kN6ZM6UYuACz8RWDAHciBAMH+Vo8KrNfSiyPyNHl1W1wuCbRGe7WQzOQPJOeNsxpJXnoqH/NGeK/zQUNTMXNs41/cgQh2PTf2l1U34uDQT4+1X+B3QNjv0bW+rdohwsxBS/9NOJgstTHbAv6AkaoF/CrXhSXG4MqbI66R8axUF5eceZEwLx2HQLyqbp9pdTlj4xVcf8efEAaTmI3sdGuA+yVEf8ZP root@ac6a7238-02c9-11eb-aa74-ba383c228abc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCwN+tvvbQA88BF4v0vvUcymiqPfy9fKpi9mrMrMrJg+A1U7y1uwDND3DdAKNzB4KG40Q/eJAp8oB3EzEAxICgGcnloPB46wRn7LQEYKqAjuECzsOoSl0gaPjBt25NXIHB2SItIFOvbLkO1RjGoR3rvVYB354/zp5fD/FxDjbV7XAUR1kAxcFGiYJ0Cw2BCaH4/Lx+/yc4Y0mIrnHbsMGaDWj7EgXytg1ok9HftFirFFZ6ksmtUnkUI9Xrb/VqvtSxEx/nT4G99I0tnW5+94MrWvzOUVfPIhM0m2UJcd54P443RyG5iYWGNXxM/uwNOJo+bSLkielLwsaQwJq3DFuLD root@9cc5e496-1afb-11eb-99f1-c6d701d1e283\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDOPBoLwzm3wkVnwkrxTUZ85pAc0ltCDGReP9sBDsAHsk1R2L2gjIYinJ6Z1oTV7qN6//YPBPGgsgMfLwYdrJurqBHunteVxxZ7w5p9r7qQQG/YNf6wS67ZzngmrecFPOsKk6PqTRvBhMC8YFdN0mRG+FqSzTMApCzdT1WZHCLdBkKn8KDYPOY8mp7tOju79FE5VqKEUwnNuUotgaZqzNRbfZJm7Bx++UsOawPUDL/Cz1b+PGV50RrTU29P1cDCz5RkmjvaAt6JekPsdD9Dp3F+guQNh5GhNFtim6aogxCTZkI9YTf/GxTTWSdZMnteCQK6Y2IyU6OxM9Mit3cu35MZ root@a4c02841-3314-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2+Z97hJNjrcaBCD2lbhqe4sG9bNuqZBw8fz3xx2J2YseOSjF4u0KTKA3IYqkv5TG7baIPNRmuOXOXHYKJ63PRlCIh97o4JC9IzVrpTq4fzvBQOoEFc49yofEvu2d9DhFKfA4F5YzckM1Mb6+NbKZBioUzsKY6A7+J/DjmGllsvU5Pf/lCZZp90CetOZzTFjuVb+eK48B///4E6OTvcRPer+LNPWC6eQBYvYBxfXLShpMbKMyxbPrmInRb/QHLsg/XqW5b8D/PgtzM/czot4OY5AFNwrUd1hV3nAKkJQqzi5g20gy20Rj5b8KMNzXWfpKM6jWEkZoz10boVW5Rs3eh root@6c351936-4004-11eb-a051-06e11967f91f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDP2ySoW8ocEI2bKJC1cjbI2Uw9t5ZxK7Mm0pI7gcAwJuohe8hNBbIR7nsBiflHdnL4638D9Gt8rRgLuftmvi6FDwA8EIXpguFhd1vzR+fast9a/qrSwX/7Y5e7VWHEXbtibNIPhd05r9TJD5JUrzbas4Ja130KFByCRHOosbXV8TH2wjTZkOggOu+5dieIjO488z0fta9wB7y3KT3Qi+yi8UlRKf0FdAFAa+4Gz/j8FabN1P2pcOqmJqsEs+FG4ZsgFrHtz8IyujdB5o6RwPCzkOjJ1RcAXhsLBaEbyfPqGLVrp7W+zYTcFiKvEE+IsRoqJ/EcUDtZxW5EiJ9Wshy9 root@b381db39-45a5-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC8B0XRaHBAj2ngCnI3nTPnxm+w33CG3aIBbl4YA/TwdRe5LtUEdMZWhGI1zZ+uHkUybdjdRIn7mbyTuWg88OQbj5xyk9omN5b/OIA9hC+a28EeGWPfO2Z9TisVddfHB6p8cKnOcZz7OUo/iif5UxUPpgGvxe+pYwxfRwE1C0eb+6DHkYfI4YTWCOmW62tfPyDeEmuK5S8xEFTWlhtCMZACTbDirbD3BvUXQJZtCGF0mxPd43SBrCQL7kcfvmIqtbmTptu5mZB/1TuzmCLvByeg6NlPawV8dKcVKQS1vlpC5iufZFgXvajliDRxC544sECS/b0wmrC4SvO4F45H+kyL root@8465cb06-4b79-11eb-af93-4e5abfa0c065" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-022", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-022", diff --git a/audit/projects/k8s-infra-e2e-boskos-023/iam.json b/audit/projects/k8s-infra-e2e-boskos-023/iam.json index efe1d07fd11..550a36f91ae 100644 --- a/audit/projects/k8s-infra-e2e-boskos-023/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-023/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-2325130472@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-023/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-023/services/compute/project-info.json index a167f56b23c..0943ad62856 100644 --- a/audit/projects/k8s-infra-e2e-boskos-023/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-023/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\n" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDGVh0BFP0nDjRHbY6VlC3Jc/1x2M/fITTqPwNvB0VPXiMPsJuaf/4SnWXR0AThePUXy3qv3m/evca/8DrH5i5lRYzb7uJz2Ybc8elzECs9SWs1Y95GlJpXWrumEuCJl15Ls2Su3RI7EHABNVxnbj2PfUVdGNwsSbeyBXCPmq6nJJkeb7AMPyVPJV5tRmiGK8CqyKBzW1x8kN8nCJifKmRBEwisuNjv0Vl4Eq35zLixQzIp4ujdZL7wQxkj/g/q26p2D5q+S+Se8idH3Z1zYN1cusCf698sWxve/mqBXb6xgJsvDpWIvLKWrcQjHNl+tYsosbpL/+42Df2X3c3t3LUT root@c9e8febb-db2f-11ea-8c1c-d23af84fd26f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCcTQ+kx41kaBzqt1Engzn0yk8pQgG/GF69yrl8Eqj7gKhj7WP6TGZd1bw9B6/mXPJf32Bg0mOCAsha3FV9+xE/kag6XjKU0kM+Xte8c6nNWMzFwqhuE82pW109hD9ZiGGkrJJ1YKD5CxD7TMIAVTbfUEt3bNJ1h+5bZqkmuLWh3LuxSCtbr/6NaXcv1oM56/To7mo7nDjZUL9WlZQhXiNcPGBlaeQYgyL+dDQrCFLetV4TwJGxd5VzFB/UF9CVOjJWGpwaKFk0JEdSug0zwfdI7CFTfY+Jvz16LfEDOxYJAewJ38jYnfZFa8WzWUyFPnbP+i8AIvxOj4xKRqqsfjlX root@53c408db-e9aa-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCqSaGihF66qUW/Omdvcp6cW4fq3J+Ec9y/FbupC17I/yOxN5CMvk7/Em4Kvacc0ulhc7NfNnWdJInDPpvuwNSIeWG2j5Pf4BPemMr8R2a+pZq1NNXQS/yv7Eh8IJMUhm5xF1N+TK8TPITyXKWdZo0qvdbyc2aHpHHyBpfUiXHvUZIFZwZs6/Z8kvn6Og8nNnmD6jxpsq7nQ+nW/bl/ZACchAGhzOF57HvfRt128GM/oyXlbFn+JACcVa6qkM3gikwGzGAu1LzJU7femKn1haVQUPnDBabu/hDa72fTIqDEixJk5+F/vsSUyWxlNuUwhXqL0pld7LtoD9MMA96o17v root@81320e3e-0102-11eb-b4e0-eacb7c15c8a0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDR9hK1KfITs3g8AzLG8h1xkCmijb4woUTbaN55lkVEr39KwmzZZSHz9QNr7JjHsNc9noGRLT/nbzd4MYQVR0eoz4cSe5HN7QYDhPhkzvH8M+JBSskg6hFUI+t664JZm/kYBCZqiaR9GCxRoV/umxAfx87p+VQSLbNuMDS0gzcFQZIfkRZb/cpRos8nsaV1L5DktcWRTZmEwIM26d6ao0ztLvg4fyvvvAehoKaf0w8l3K8zKdMtgJdRAtOyVoH/d7zpMiR2rnYXSw8dxuEs4wNLdjaeVxuMMrOKLba8tOjsqtugjq9JbYUl55nK6d5V5ZkckIQMkzgbJMaBcYo3/gJj root@f452cf51-055a-11eb-9dc4-ba187aea6a9a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZW+Ke4VSIGv+z5MRh1cvW/4KrdxhEd2KrJmC2/Y3LIpYvitgYKTJQsyYpX3nmyF5/v+wuV9dowD0IOR7p8oRW2U8lj0F65bEW27R6mMwxFsNuXWQHhkmSubWZwF5kwmBkwXR9TkfCl3j4LduXRXZ3VkfpSMHd6lzMB2YNeUp4qfkEu/5h396lPEQoVAidphozUV5taJl94C4FbPKxrBFajyVfy9tUZ85uCjhv3hbcMvxrK5ABbIL5jJyyOIQc2boxfZjmG+VY27KjF2Bpp8QIZ8zKLt4CVLgTMo/YzlRufOacxauQdL4QqIaPSL4pr7VhIRqtL4J8lxszWrPC1wO5 root@588e7b73-07ec-11eb-bde8-b2e010cd58b2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDyShZy3hNxUpQt79d2p666nysSC2T0RVh1BlQKBtgobNy2ODHaQYbMCKodJPSk7vKDlZJpDCYAteR3Wql0GnXLYXyQR/UFisNuvuIH5HeaXm6jV3mLutH62Ngnfu+M6fUCJ3xHTcCw/KmtDmPY3TCMLlyR4oO7yHeU9XHGxx3U2PkTn08o0s2hiu250oyQ1U0NZOw+mHWJT0T8pQbM1g7ZM4hdin8BJLBx8o3q9ee5c/OclnMFv6rvFU9IsZttpQt/YV6dBfmWfzWB3IMPJWASJoEDnaSEF1gBwaRuUz8M5/Di9A8oW7BMClYXRrJy9oOxsrKC+v4orWIZgSYW0tvB root@cfbb8b65-0a31-11eb-9ebc-160f1a1b7fc9\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIfFBKPhARp+B6eoT2FV+sbmaOuhEjewzm70Uk77lNWQKYGQLJIV2PVXwszRxTK2RMfgS4Cyer/EXwV9KZarJQfUIP6BFR2oYKtnYPWxYGQggtwC9sfDz0GlK2TrBAMSqB+zSNwYSxcgN3hOhGsZp5J9YhE562SxfeoWChdAx9asAOJF4MzeertMTjhEv9KXyowItlVXiaTIXgEfCfVxjPvuEdpPxxE17JmNno58vnN1xit1B+i1cSD43vcoKyaiKbxq6enWRx5xin5rPjZXAvWZiAMI6e4aHJls4Bg0xNgAIC1pu69ar/Fx6wAlPDIISuXoKWQfzJ0xR+fm6Xm9Ct root@7b298c37-2d73-11eb-a59c-42dfb897bae6\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDD6m480Yxwe+dwiO9USb+tJj/4IpWAc//2uybEfqi/7Bfozd1/Rvl7wVPWKYfav7ysrljS62SwWfVN2Dax7U1jchMvrOe20tp8iAOjlk2lDYlnY4Hc6zNQWbIVDteVkin4fxGYis6Ow7L0PlYKvML0l81DOKql4cQG+oG0UKNZFjmhUrl52pKBFwUNsCLsCf+HdQIaTh5QTd7iKgmBe7bUOPK8lMdCUAbjREzXEYLCVcQSPSOJzRMP4p6M2Ab70mhHrmwacTY1YrkPBwo4parR61J+OfqhXOjYD2a04BEpkHO7WeE4dgXE+Xfvm6VtZ/jq28EyovJuxcrZ2w0tva9t root@d8c8ca2c-2ea2-11eb-9b0b-d6a9455c8be7\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQBOPico9mbAZ+JJuWW+CTS4wNtzrgayB8xPw0m7eRffA8yanZ4yRyoERgZzLv4DAW8n9jP8deOlRslOoKTsTxM7DuQqEa3XJHMvjMHHMHEr0gKFFYWh+Ibb2CrDChVh1qehfR8Agok5DHodCepFLWxGvRS/TLD/9z1Th2fTY8410o+i7G0slLLgAW+5VlT7bfwi5pNXu56xtVMPGZkmMJhK0Kxqyc53kBGCpox60CjZ88yempn1+jThgJDwRIE6UaYSRldN07kGH3MCvXGB8MVcwlx9NfU1ZXsnlywnJ2G4+7gevVvvpT9x7mFFcf2DASz6Q1hAgcRSvYLcerieR7 root@f3c3dbc1-3656-11eb-8ecf-c2fbd71c5254\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDenywrEdoCaZUXSeRfyGKGamIEXuCW2Cnh42xvw1lqoLRbCsu7Ohs6jZ23TLilsNfgdqQ/mIl5UbZ68oIuOvOIqmcbMk7FYu5zXcq6M4n2gZjmUPwQTjvRB1SPwStiHkxKJHPNjRzSfGNKzLWTnFRHSgA5G1qK75hVcFV5yoRCwVDWofG/X6Qao46noCENaJCs9IDUPu0rx4vXNqTBainsTtBegspcWl2tnD+Vlcvzp98K+oq1ZufXERHx4R41hkCdoOBAGVpYWTxlowjkLWiR+MqT+SFRzbG2fiB4AmMmLT5h7Pjxbmykm4dKvA7cXVRnSl/YttLvmiuPOdi2mGDL root@60b3e8bd-3aaf-11eb-a164-f6e7f2ebcce2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDUjy/O+DVyZS97XubooMLIVkZFrJ79HVAGZUQMrJKraJa3t/LI1OTrwUKlF+n1xoquQYGFwLGORQ5v+zMLPtHJ0oZIC5JZDRu36iLhYMuivF/ac+GE57P/JaibwY17kcNWX/kCck08WTszmgMKYO5VeNa1nU3TRtweVF1xx5GL+0jkcHNNclMIF8peGuJCrrUHfCPmhU8MDEuCvBGD9bbYdrlTnucpq4iOI+W7mhm9e48DqRdpyBDWfqvT98IvT8FtIpYWidUR4B7XoOHNuzbg+c85cMWCQjSID7t7qeuhUFW7rmIFsBewgd7BMhSdVaUmUimbN2AXbnz1RQNHJPxn root@5825ef88-5101-11eb-b04b-46165271725c" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-023", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-023", diff --git a/audit/projects/k8s-infra-e2e-boskos-024/iam.json b/audit/projects/k8s-infra-e2e-boskos-024/iam.json index 5920942ea0a..90cff357a67 100644 --- a/audit/projects/k8s-infra-e2e-boskos-024/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-024/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-294429263717@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-024/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-024/services/compute/project-info.json index 3ed6c37ec54..19336348905 100644 --- a/audit/projects/k8s-infra-e2e-boskos-024/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-024/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\n" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZYWxZdZHDDJdeKnuQau7Gn2C/y+RJsOkVZCy8RYIzksZHH11N1a6YzhUQiFOaPHps+et+d68P+mk4/CpEhzxn7bNYByhKlwHAKrc7uf+D49ST4NhHd5kcZzkf/nb3+1wjAU7a1b6fa56eQCEOzz63vJ0oYe20VrHSiokNiGjncjVFHXJEVRB5Z5fN7eitGxYtHaJLwh2PKA+DXdZeCIYhp1GBtbtpFaNP7Cb/s3TIcRsKDfM6ESZpJkb/kh5WhZ8PkjG0X53cX0gMg+gSnLvGrF8DyEpyFHh+JWDHzA9MoXAUfEAwl0LBgcg0H4h0C4tsD561+0kLDXsQQRU9l0hl root@a53b6810-daca-11ea-8c1c-d23af84fd26f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCxIMGtnfTL5kn1W7wiTAuqqFM2JP/1uyV+IiNv5ACK7LJwsDR0KraYXzDViCqnBaNW+uX929n33Cw6a03g0HQCJtR8Vpiw2+7mvB+rx48p67r6Qpz/B//FjvhrPPDAGE1jBPOhwQNqGQOfJaYgoZB0Ukzm+FCy79+DLVZHFwrUeHZ5hysVkAWhbpIUJ5xstXJcVyMxwTpr+qin8JvIrGilxorWUiakZuzVTT/aquZhUTXhKSeK7vlF4tFFXAYAXHlgc6ZtGZKrCEhGiIsJVr0z+i8Y7RHG9XRm7NFyczObTv0OdOo4TzKwb3KX1uJpEjUQD0IMn0yGglfEjyt4wTJz root@191d3bdf-e506-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCs4lhQ/d1/wzbMzlSDCnUP6WI3pxTVA2hWrRIGOXtBfcyZyf9OkPQC0uH2FVyt0NUN6FlXMB1udp4LJ7FVv9Ln9b4HIK1XIS5J/yY8HrEn5fRYRC36RQ8O/KFq2nWCapKR3rWTY4sWq/ViiyddeCzOc3s58W2wHRKL4m3QFeCxI4OiX8oQbcIpzt1Bgac2DMm9Lw8r5kcqau0AhaRm8UMjzuIMRiE5z/uSoPfTq9AE6WQIjxDyquuD4jhjFZe1AlRbYZI1VDSC4RauJ5X6utba92ANGzwdOts4X50fdG8VazNYDcjxiIK6YuuE8sQBwwIKwT29RIhUzywc22UauCq7 root@7e94fcf0-e81f-11ea-885a-2259550e0d87\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJbgSRiEHNxBXoRTQNexqW7Z0VMEdSOXr5SPNSl4L2D5YMRtoB9mpawaU/VzRcuyYwQS9nIX95FxNPVv8S9uffS/itGEHdEvE+daH2+wHR8B7GxJc7YeytthIaZg/evLzGBJfk7iHttQ1geH2FFQ74DE3SPyGRFUTaY20urRGN+wPERgBNdvtcJNn4msBvjh9LvNO74SypAeqG63pSITSUMechhHHDhEHX1bS7TkV4wy15iBLcCorTaWJtGmU+WMa+6Hd2WI421VK5Grmf51v42t4mUTvX42tE7AsApWVk+YvL95wHTKQ2wZ+knBQ1mnAhY4hF2mQpCQlqWLtEs66h root@51d77722-ebbd-11ea-aff6-5a14b0d7f3dc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC82UAqYZzDjlSESQpc8nin76UEKj+7C2SwYUBee6Qr2iZA/Ycz3xreHwcXRNHc6J5hypyuEozmp3iQGqUbOoNF7JTPUoh2jA4g2e8UIbLu108ZXxXIc6u9dvpJ1Rg+m2Ns3u/dSrd5aqohZfrM3bhxexpF7ZwCL/XPGyROeIs0ek0NW7I13a4lxTdJLe0USTy+DDdG6r3BwMKqqnvRS430f87oQvY1tAeX5viko/vC9FtS/5iXd+5YjwzVGV0EXTg5t9X0swVJXmuTPg8Ng/JsgEe/4WeRc3WQJFd9G7j0w2qNM16jTp3bHGcZu2v7qRbhXQWJgbpxVjDvnsXU6ybx root@ceab7386-eca0-11ea-aebe-3e85ddc86bf2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDND2MD/jCrBnMIhVOCXw7PJ0StG5oOjh6JIKKAEFuR7zgfD7vbhnB7jmdrFovXGZ26WWrj+AFIUi2jivGMerbQfCl0GcTf+WqjMgs14xzYXNvdOg9671c1QqW4pVk2MnA5ca9Z7+gFkNzx18R2PiYaOY+7JIS/a1Uwb3OcX8pSDJz1dD0PKEPWC1w8qfyGQMcSNXIsUaAc1KLs0qXhmnNuDqtssrwLkdAL7cmsVUNBJH4BkH8loYQMzwT+Hj/SHtb4vFenurTjXx/ElE79DYnZuVvZyzyXt1di90y8iAUpaCQz3QXQZdvd0jkDOYsGKmTNmWfq7flK+iZ9/b4ArqTd root@ffe3f589-f42b-11ea-a379-bea988342348\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCbqb4A7dpkbOsIKN5uk9ViXsp8DHCmQLRXnKrFYw2hHUissBcnQFUru1aIIm+PrZTj3l4Ehs1FlNQQJWQFpsNOvL618iBOq65IITb8hqjspKSRubTPeBlkHbrRm3rqmDvt/OWsdEXxtgM7eA9//++CvkojrLFhNWdMkBfk026HMnkwL6CYvSOCxWJCqw4bfWfxJbIHuWme5zdm8SqGR2oN8iqsjmB1rwd9LEgmni4S6QeisMC02cqeXJW/RyAYnam+3YhhGyJMok3rovNvBMmRTc0T/OuH8VVYDtO31U+P/utx2yXSC+VzJWz/R+Ffo6tQ8U5+W7d3ZEkQ/K9/z+1r root@1049f3d3-1ea3-11eb-8d52-9233771f1447\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7UEnS+X4gYYGyDSsfummQYMrpPvSI4kG/GC1mBymxFhfjl7og7OHiJuAFzEe6FSURsgDHeefbj9UWsES01cBr0EkpaU3Y7TXxD7W0FvnQF845d7ihW66BjX9oQOb34JbZx85C6YQOfMfLVylALFW3xEAmD+EYjYKgCr2cBGi2vq0SX3+8jsu80FgLLAgoh1JP80OWjJqVghMNLNHx0QWi/NWXz9J5Z3AP+Wc/zB9YnnbbsOTtw3HDRgRBJfSGYnraYyCyT6qY1h0rzjnlAcvxhaH/KQe+cusDBg27d163G8nShthYd1ulwQ8uTHKtP8TRFgWqmYA1ygJUwrrHth8H root@6935c840-2999-11eb-a35d-7a1d48297fba\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDRJs9rdj9+Q8IISv0x+g+Cn3a5nTOPO0dQsY1ggBKOLJlc/LDapAcQmfVIqYmibSj7C7u18IMN8xYHyc76Yel4ybhTxaUmy89ss0ND9fUtTfHGjqVuVzd3b81LCMdUrdkF7078aStO43B1Im9DR8kzGihqWqjvA5F4CuM+Qawqbqqjkf5mK4TdXX8tctXIwg2LXi0VSg2TzkOuudpx5rGzMVhVcaLnMdgWGqM4PR6FJZJLTQV8wCHlkbTkCggexuMCX9CHVkd41aH9KUM6+MQdZnmx4WveOGuSudQuSBsFTc7SNCTBWgJi4Il6mB5CNu/EL28T5WI4BRaq7juKB3jh root@6ef8f41f-40b5-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBrIHkyNhJ+Iq71sO7a+MEaMImfEgheDlFyYFC0aO3dpo7XJOTKZ/vRV1Jt5yIPL1fDAkQQtag1sxYKWahKgN6xX50tPyi2O6lduE4ZAuyBGgHO9QBQE10h82Sxy3injzDzgnGR2uutpdE/QoBWa/FEpTXQz12hqAGl3ZWAaykI+1YB1qyZVQZLC/khzUYQGKlT1waRKS4lvJffuO3WrQHdyQvXhFbJR0AC3c/yzE+3i76ePpWym8ZFILiN1wP16uGtBqMU9r1weSnq3LJ8L5PWvL7Ps/3uuyz+HVjadIRCOlvP9rzvo+0uxEfyZVq1GS74fTcnf91Ject11GaSCuR root@b47ba1be-44f4-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDME6BmNeOJLnuSO/aTs6qJZY/zjRJHZaX+osEshhfpUES+s07pO3j/4eXYIukqoScUX33jae3JGzpD2WZbH4f965E/GSYBvRd83aKOa3Oca5EPKhJMpXwJwvjvItEkhztOedpTlpx9ymDidow0sXBxyH0/Z+68yc6ksbBpFcUVtWHcLcJlXLQDRbyWvo4gpPI9yLwpwuwdLkR047/vQ6DZam7r1z8hOtRnl5jWNFW96rTkC0pWluiQGbsppRb5Rb7cuBLZB1C6+jiKw5yWjkXxgqnX0kbA60bHoK2shyvxR9dE1JC00MmzfSBxKpCuCu49dwetYg0XGoJ4Nga1Qqn3 root@1f5c52e0-4786-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCusFSb4JIC8VDtGn2JNKGJSBlzcT4RoaV4ScbuMvvre6m9kVADmXuxxj+0zVePEJXkkcAqgaFGmkf78+Oj75TS6KOMmVMvLz6gv2j5taDqdbTCnh16bJXcCAWhJzHRxtq84GkK0YyBn+u0gnbko6lWIJ+On+B+lG5Hb1PkUJWS4sOHAjOVPF3WVp0/mI4kzrO6HOavOttMNbFoKlvo32zp2kyKQCqZ8x4gJo4J3xpSyh79FVY1YUqTfofTdSgqCfjdT0HtaD2BM9aB/SNvkFpJQM5U5uxqKtIgPeWQIf4z6j3MHpLcWFRzyZ0asBqckFeKPcJcdhIbWwbTvtL0oFGX root@1eb0b79f-4999-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDdqOU6VMX0KV3siMDbOrPwXRgPS4gaEpZ0voYKn24YQ0/zyL5eJDarJPbuCMdxE7Ar0wKwngX/nY+vJ7UCiAYrdATCR0bngDb8fnlyPVterAUq9znQApSj44xrVoSZ+HlM1w3f862ysd40JjV6PB6xXVBFyEBMzvXNIkO8fdI1dFGWK6P1n144eM87zxh4UK8+gSRYMcD+ACC/2mzr1xCI9+7oofiV5zPzOzJ1wgnPEie7vHjmrO5VcAb4ZopQosS3fnByCCPNL3kXXqDDL/T1mP0fYF5v86PoB+a0wba7Wpb+6mIyR5cUlb0CJLdl9n8uyyRi+DyWbn0dUSMMdWyH root@d7822ba5-50ce-11eb-bf1b-5279f1a59a83\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD0hKysfKdBoMlDPzrNKLaPgguSirq+TGLjpBNhqZbu552sCkV/D3lFd1aeFLH9N+HG9+m0PhcZt4uG6PyvE3tVWhDgCdbAPDEccq1iXXwOeqOUFpcEHJa8NY9Bjg2Yd7TTrPCSbfWS34MHL7YXdUC/mncnitCIvbYFgkyHBhs7MTc1IpI37aHn3LfBS6VpFYvNt0dUTcunUDgYLkPV5wh4YiASQI+OhvRKZrj4G8hTlSy2Vz8ezqYwvhbQibcowX6YaxGhtUfb5uxgSBl3QwXrbHew9cqhOxdDKQgbKimPIxX0FetMc85rOpSBxUTQpo0yOj+92jNYCxzCZbTvRUMp root@71a74aed-5166-11eb-86b7-56818f023517\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDNTGGLbuKN3+j8hilq+bKlkiYWV3j/Fd7uvCjqVsDLlgYzB6GkG8VMewRI/+xnSEQlh4kEhyBDAmZsAM37cby/8qHLvash3Fvg3htQZ1N0Yzzscqx0aEPqm5qZx2GJK3apDg619MITHarkkhnxNyOV9OoA0R8vcxjDLWvlAL3fajRMuEgxMir1I421lWBMb5h/vQI+Ulm3NhZ8izhxGQ9fkD5wYx3aSQdcbm60BxOKmEv7kouWzi6d/UqM0opYe2/WBJVXWFWfJg2/dEH4P1DsqphpDv9AS95+AUXrFopSlgrEeB2MY6LIGkzpTdpTL8evosE+usmsj6xmFtwUzNr5 root@25a27760-52af-11eb-b6a5-7e8b7adfd54c" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-024", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-024", diff --git a/audit/projects/k8s-infra-e2e-boskos-025/iam.json b/audit/projects/k8s-infra-e2e-boskos-025/iam.json index 3d44a422126..911787d2334 100644 --- a/audit/projects/k8s-infra-e2e-boskos-025/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-025/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-865842075947@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-025/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-025/services/compute/project-info.json index b0feb50e069..9593cb01d7d 100644 --- a/audit/projects/k8s-infra-e2e-boskos-025/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-025/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\n" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKPe9Bh7yA7Gr9uc72Lsp7W5yHYFdvRclKafI1EdOz/XBR+b3uTGFaMdayG+8uWbyvpqdnxtkjg8wvQIw11BP+4f8HEsK0sNzVbWeQnwypdQP7aZQGkgoTxeJ9yvcEg+wouk7mp/GGg2KgIxj4X4u1h6U7/sBbN48BmP6GmCnisSmn/6u/rj42jTmSdC5gPoxBHx73WJ2UiyYpd72amIDypwAfrHXow7WXIkZk8GmBUJO4UZb2o+i7PrPOPNvBfDUU4p0SuvBdK5JdhBRiu3HJi+mzyX2FvdjGB1PQvIqsrXW/DKwmZ5zjSm2WG3sY/BEu9kGGBhA3uxzyfY98ApTb root@cbee9043-d91c-11ea-8c1c-d23af84fd26f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCy8t2r3o3lR2pjg6jmgIyGaCxZ3giCoyS9HWARNG6V6xIaTGDMfTKlHoU+RoRgh+fTwmTf4v6IlZGOfWMsdP6PsHP493gt4Hsa/Zt6gncKSCDsUTo0qvoi9zXioDUcJn/8wMqBNfzGD5ZbXrqUqCRZOTfmhF9mY2srwG14FRGV+GLUfjqGsfpUYICl/NEd61sOu8jNmS01s2Qt08og+T/9j4h7p0x+5nuXxq2T6oirmtAjdzxdGeajeWlKdR/j27Jm2pRJOgehwQgxClR6O/xKtShZ+vjUBcxLj0fSVDDsikNncqoaxIkoZwy/QlyIpvjC+CDy6Do0p+z/3yurQEPt root@e3f3411f-eb3e-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDDV09vnNFfq6wKuLkvjrSO+Z0RM+e9WYG6UY71T9A7Qmj5Vk/6CaeQ7A5TYNSW52tqnqeTWuRFQyhW9KDpwoRY5WG0jo281iZ+EeRLkqsJmdMRCcTGIqE51m5v3ORs0lNhBc9KBkMAzONxcy/JNivvEA3A+nujNcQPttaXRySynKtMCv8Xl+Gja9bAWTsq6kPhBc4okaA8WCXnA3vQ5a48T40UqUBGn6XPDHXq0v452PHc9flKcLGfl+Luc/PXTefzIpKvR6EPwUuQ2/ntq4VgqzYq61cuQf3638zOfZd7PYSycjHoiW5YOLPbdZ+lKTmbIOihR4aURxI4SOk/TAcV root@3ed2edd6-ec91-11ea-aff6-5a14b0d7f3dc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCZ4lJPgnNOC0BsIvZll2hXIo0PWDc7hYv7adNzSZXUuqgPZHRl+8lOxRZB+pOnfOxMLiVkM+vcE9rKDwJDKdsP4EgGnogDCi3LLDP3nvCbr9252G4xYVKt0ytU/WYcSHKmnH/h9SGErdK51NcrKEVLSezvMFjoal3VqFWT+6+oJR6c4rD0j32cIB5S4q4s74lIrquNR1TVJp3MK7DTGUGGMzwVdoq1wOt1wAvTRCyQFkRHkKMRipTnx4AHTfhjCDkvA81GSe/Cf1es5dS2jCW+2HzKBUwSRAgQlczJesZOn3+Yn7sBcLLjoc0M5RpN8o4Y6sPeKUv9hHdhSlKHvxz7 root@db39aad5-efc9-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC02ATvqdBjzXj4/ty9bm0aOJMVZVGp5/CNmjgupZLTZoD2vKER9itxDMLDO23pWeTE4AKF6LFb3vvA9jrQpTimAQl/SabeuA/DMXxqXlAR3eRPNYGbpy4deDup+DCQc23YZ2wqyQdEgXmrVJzZjvuLKq4dKLk3E00DBNqIvfaZhEH7jCPwlGXVQJKAtEA+lPzGOaxz1W60fWpC4YInfvg7aZ1YqjNXNTULbQ2YGv3Pk8LKiaOkf++edsK5ttx5KOvtd+V6IVWOM7cL53X3J7xAkiuSQ+O0fbKeDs1zIkWxhU8gWZCgzABuxDExGm3V8//xaf/PSuOxgSw7c8FQJHbL root@134cfbf7-f709-11ea-ae6d-8ed64f3416c0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQChL3n4qfDzec9pmBStazEWdGOkcp93g2qkayAha8miuTRScgac8VF9SROKSzvwYr6rWrGeDC2ysuNUEkKGTu3/7xR+WGl0pDP3Pzo/OLML6XPu+TiulMwWXAWDTAxozlW7ci7uZzAN7MFp42E12ItDta70Yx9C0LH6zVmmaQ8mpTO6T1Q8xld+jSJTj2iGRzXvS5gw4iVEqEG8VqHsLnqjOQG/ZptwegH9MprP+e3TnxeEM7v6XY0OWS4iB4TSmKEhebGpfXKHjgSELlvqzZRsecr/ioluEGsC5ypHRg2ZzRl2cZTWvH/r1qnfdgjH03Qa0j2CuHnA1sLplyFlz1TT root@8694bd6a-0a18-11eb-9ebc-160f1a1b7fc9\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDfM0sHtbLWQW+w4vMmk8JrRqvLjXTqxvl5JdkI3jYeh2te0ty5MePfdNJ8VXiPse3TZjZdQjZiTT+mfC3TBUHx9yWqJjMOqdXu0gOAASpuvhPZyiJcV5EP7MzsCFNsKREcbfH0Dm2p8r8H96bOTKhSZp3knU044ILdWBqi0O6jhzgPZF8hkGW05cAe31Ix+laTKlpYBF3vcCoYTAMN+h1rDdJioKwckbPsweGXcPUyoUt8WCSLzH5ROgWHbNvX71aKatkPsSiIKWxqDzLk3dICyUSara7yhMOOIKgecsov7OylAYeLP48O/7u1aFcDYqNIwU1osVMGaEQGxS5/hA7b root@1dc4df43-0d74-11eb-acdd-663f8ab42c5e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDvnuFHihVwollm/dswDJ9QfRckvIkbW8oCed/VHvT3G6Y4pRnL+xmo8QgQQCE1vMfkR4q4L+uCI03zg+LBnXVUb9splRvdzHg4i65lDjVuGiGa6a0rjaR9DXoUD3SE67a9oVgirbXQmD4J3t+CmB4b22XIpHycJn7fghk8+uCZWgXN7YxnnPcNfhAFk5sX/2Dv8BeIb6aC6uxoWQvbSxpxs0n+XGpLYnzar9pC/8cdHM4d8LhU3cfFq6tMtNZKajwLTdghcAK/WXwkTaFHOGpI9/BEn1G+eo67ftC4WTqUzHsMCGXjHYuZKa81HA2MPNPJA5m4txpFo9kvdlYkWdOn root@5aa8e2ce-1218-11eb-9a43-0aa5164aad51\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC74j1wSkQS/Pa2rfpGP89O36c5VcokPI9FrR0jfkuK7HVyUATu2mop2GYXp8HYvaK9rmkvXQRwhSRoQ6c+J4LhiZIOIaZQz95qfaDS0sE1e25VuDIHNnmhsGoT7X0/isTJgoxgLq7HYucS4JjI/Bfo3d3Ry5/ZEu5p1oy0Excjydy+rw32ubBPWsYNpE0qcgNHngwpa79xKis8tc7D4ksnG9s/rB9KAbzBXdoxX2H8Ni/Ouat1kI3+NMpjaE4HbfwheRTkwsHYuieA7xTM9uJKZiC3G4dXjUQeEuFPkIe36dM7kYk9/tXnkKSCVZHjAQeOMlXuqzynzfFqj2y9Z1ST root@e45cc09c-1bc5-11eb-99f1-c6d701d1e283\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC8GibgKmWWlC57RyNc/KzUwpGyfNCwkefSx8+FFzC9Uw4BpoccoyhYGZISu3iKJlbr7OMz15Hy0JPGuFEdEhziWU4E7dvKRX+9AZxltAY59gpftenpVlrPpdjNvhX8pp87iECCHnLyRDsN1PmqhtU1w0ovLNRHz/tINvEslFhatWaSi0r7W9OdZz+wZQEWewzJXAqZqEWUL1HKrln6Dv2VxpTnygh6y+wZHxDGdWGBGxes4PF8Yqg5ili4yQBNrtkyRpd2hH2xRYDpMBX5+LYv613uVn6usKnZxmKIiiJKbO6Xcni9obrejzrRGaarZ7jL0xtrqNoiGoVcox7vqTfZ root@6f74b243-1fd2-11eb-bb76-36aba4894793\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCs45+wQyM2+uHb1WtrlI0EUfQIspeWmhUUybvnt1fT1abnWuEclNQrljZDJRi+LSO+lVJxR3YGA61mTziMDbaeiAyqILL84BuMUgHtOCfPjjpxgM3G6QJ8mG6hCJ/mJoG5euf5ZAAhjAuCl+xjOmzDoLCDWDPEF/7WNgxwXce/IYYdOAv+TZEyV/B/Vu2rT4XNF7mB9JYESnB3iLM0IQdmBCZN4B0nPPe3uV+SPab0KHlwcZbNUlA4ZGmmd8zKE0n5u5tpkVu69FPvdLdWwrMbKlKaTd5ZN4m/+4H5uUeZcYSIr6/PZ5xtd08LzBuw0PrMsNxs0axVPwRu1Vvva9VF root@1bf0aeca-2ae2-11eb-98a6-ba1d66ad0079\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCu8z5xxl+ES9YCCWxq119ednNE0EoeGixEbkcNPOwNyyppdYiFHja7GLMQtor7Nmg6V1RE4ckxV3ar/jLKCuVmnFUX0Tih/z9p9qDEDzROI3scWDb6CN8YU/DvjB+o01Ax926kDJXdrbca8yIG+/eFqWw/iT8s3giaqZo59bQaZaQY5f5XdeCf1XPI56IQQnTE/Z2HFFuGPIJ3Y731TLwZSD8uzYW6OvJwvAjsepP49zQDEJiIYBTKaPQIft2/zmtio56EVsgOUf+2rhyN5cx3kvoH6fCwKLEIBiSiQgvodwrq3igbmaoj9OvI1w6W+kAUhVffjY/gUKkqtw1TrMAv root@29a500e7-355a-11eb-9896-aabf0c108015\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCa64teMdXvd/1tXi4Rdai0GJU+fxoZ2hpf7S936bhHxROtXwj5Yas69pUxyCQj1QHWO4aJvqCk0RT0GufQPK0Xz+Ush2CXYvInQSfRJw36gdLWkDN1cyO7KsgimiUp5w701y3Ro16TekI9RDcQGk9+D6+TK3PefsfZD6YMxjePWbPGP8vs2dJ5074gE75yCC1+23dgyaasW9FvJqPyHNUTEm33OBB3l2UCc/Omgbzf+YPTIW+56XaK058Pu1/vi3T8OJJd/6Fp0O8WaqVVXYCzdUSajPxWjouX9YbQCtLz6FDAWZq03tfQgAeoX2WFyqdauw0vnjpok+L1H8HHRcf root@006c7e04-4199-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC3fn4QEjaZAQqcAUnfYYXWSVYic3LxFl1q61oz8Vr2y6WnZq0G1e61tlVC5bmay8OZ/fRTRmKqIuPQoIN/JntGykwONndm6gw8dXPrz0BVQn00KFPiFAnWUnUsv5IM/Y8mGz9NWQ5Z3YdvBC4neyZx1CYsAXg0LVUzsGoCnh47qFKdlDutgLcug/pIvMTMkaWmNEsz59LiSc52j4thzQvhXjCvhC9qthRHrfh9IjRc18kacZ3reK5/zkmexzaptljvYMZA7H32kSltIXnsLpqh6OgdJAsdWJ3J4adBaSRypb+sRTmBFgQNoqcHZ+15AuDeJWIhLK9Ih5B64uqSV3Al root@234526f8-41fe-11eb-acd8-6a2a49dd8a76" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-025", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-025", diff --git a/audit/projects/k8s-infra-e2e-boskos-026/iam.json b/audit/projects/k8s-infra-e2e-boskos-026/iam.json index 9d476c7cd25..de30f2fcc57 100644 --- a/audit/projects/k8s-infra-e2e-boskos-026/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-026/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-314989574020@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-026/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-026/services/compute/project-info.json index 30e1ea6291f..a1c01b846b2 100644 --- a/audit/projects/k8s-infra-e2e-boskos-026/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-026/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDYvZSE/4th+n02vDHv/Gc/81DEGJGPDFEm8EIBafCpkx86AgcWGnsRkqsb0cfiuuKFYfOar3enfUpReXyrFUuIAczm8gPMdimgUIGPJbJ8ZOQ5EVQRbTDfV2ll0+MxI4FJQXZiYgm1+Vg1fZQc9BneHbToG4oS26r6p804Q2Rb++iJU3oNGy/E3zS7LGixGORasy+U9q5rPTGlwJrjjbMTONMuCj/88+tBmK1O6jJawXAP9i/sfPDNa5LqtUoBBPZRj/9gFgqa2NxFVAF/Ru8xwXxfIinw7ZKVYzyciQ9J2NSDBYGHdmJ0qovnZp05llOOo4gu8R2ABOceFQfvxVZn root@29d94011-e6f0-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCyKagIBZkc8vNpTEpO2+Os8PJo+Hg20EDM9IqxsLaT1tl6f/2eM8GxlhOk0nQJsbTJPMFRlL8pLa8XGt0LXBDhUfNEZ+mx87WlVo/H31makbXStZAll7ccbzbT51EahBWO6dbioeS2wAL/NuKNyqxGIhm00Q2W3etHrqXCg8sYSjG7bre48iFEOoEk8ijJCpd4RR3+S9rkzAhQ1ZeZT6r9vr1e0tg7taE5/Oz/Fy2SZnAol39Z1gQcRs7rgZstoeFiVVm/E3N7Bf5jglmGjmsoZLQsILHVGo2aWwTvLveR9ree0fEwx78FVkpTyfpgrGMPMPwwSARvLnDrZIGdm7gF root@5ae79a81-ef6e-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDaP7HmKRIRjwxJtCYr+wX8OxdHMiVf9vc9hZeabW++4aq8Kpku1O9kwTrt4IHAl5kWGljqAoKTzuWHgGXXL4cmtWlFK3XLFk4o1OkigFugu6tHj7XJ4FfcCEjlKdXyOjP51V9a3td6yRr8QUO6hWzN4xvMHxRPjLJr78oOxLQTZAEK7yavJJmYFq3P7WadeD9RP7ZbLj5ku08K/1wNd271tFjNDw1Vdll/waSn7vp2gd32lfEdKkbhbl5awnQAe2p1/8fZ0DNVVLUa/URAeip2NKTkP/2aEk9aZwoDeSTOnDjKBnKSgaFdEAWgoX3rbh/ULd2GT/wBJXcxXSx71xWx root@191a5e13-0a4b-11eb-9ebc-160f1a1b7fc9\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDRTnlg8af//M9IfiwAIrkYJ0zSX74Xu2mv/9r2OOOL2lpHY3BcLW8lT7QgERmZsjensO9qlKtNo46D4s4vTmnSHaDxKGsezENwXYLyFJ2IjGxSrmN6WZHuZs/odpFEB1GCDQyvxM/D87iujyTpobeVPVJB0GF96LUyQ5ZYsJQIF43UPt31tfM6mszf3lSMf6jqx4LfzmteHInjyA9qoH76KSBYJT24Wxlbr1vPZmuRDLLl+Gr4uGRLNs3o4W3V08tlXYTSLgyxOfiZtcceV7sVg6DQ6mAoGr2XcSlSdu1cK1u5VIRWB3pNr/c/UN7qiIJKZ548gL6aUnmZzrQ4wcbD root@a5f5d86c-101e-11eb-9a43-0aa5164aad51\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDFzuO1Q1DUglIR/dSFU4ngDQ5oWKcqQCyq9iphzO0Efdve+KXkG9kZ7ROTUwQphsEbKgO2mID5snegQHiCJ8pe7WobJSOIqgc88dak501Y1+mNCkqUuIerXvtcrbNTuctAnHJ+F9SBgWvg3GIjDBt9v28/akgm0lSxXm4RI6eJCcsySJOa3WaX7M3Aa2qiLAHbEQcYs7SF8ogY3ZgdQzYvnOeeL2xi/r/b/E0eZ9MizULfal4c/nZlNGH6m4k7Bu4ennemU+2bhrIiwGhWsECtxsdAqC9EgmAEXtKQ2fhQdk1/6xZ5c0xFIfeo87TM9M/8KsnCAmQUwxZ4hBU8s4ED root@21048ee7-28cf-11eb-a35d-7a1d48297fba\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCsdnH9sPWCMPuJCwNOwouPJhAz9B77a8Xi20zmuK5bg2J68yqn8RzYuT7qbEmg+MFrvNgp+Nsd68RKA9g41GE50HHW2D1ahqkoM7ZltskGxMR8NDzVoNo/OjGzhtB6ygNgqJ2L/IMeXNroA6PpMlSeXoK82++XiOARCzM3iMTWGasQMtFK8Mklk3fr52cYVbRao96sbO1B5nGhHu57igc/7XNnRmwTVuOhp0m/yb/lgMeMHmcfFUnEJho2lRdglluBzGTHa5akbJah/fj+nvbq0Wc3RFm9HdiohqxE4vWdoKJEMHUEkAgVEebmu2FGdd5YfkDoF1qnxAewtdjIMTEn root@415043e5-29e5-11eb-98a6-ba1d66ad0079\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCxuXFEDn+HSlpYT1KN5Dc1bSpi+MfmY3qoarwjuObmUik2D86VVpsQiTnJ/L1TpK5BBeyeBnUDQswSZthBffW18w7CWSWq8/OpOa+Zx3fXwDTT8nLL7GkZsIM+znWE7477ao9XdK7nSENoQUmkVuEWIDMFldtPz1aPjsIHC7EwSgQHGrkfcy+fpSl0RrisqOr2gLaqCBaWDuYFc5DVs4g5efjV80oq/KGHA2dHZYeUS7M9RUau3Q+aWpabjxUIwmP+CEsLq+LvDXTrMBG6q7LnsrxI1lFvG4JzDhHjohbDPKyd5cM3RxotRGJez4j9X0iQOBaPHxvWc8EyQy74DOBb root@14f0e1fc-39e5-11eb-be51-2af5b2470e9b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDLovA5V8me6BvX/I3VXYl0hJx9tqsCUJrlzeWQ9sy76C1bkct4CZFaXSq6UdJQPyXTQ8FRwiXCqqujk7+CmpX12b2Wq2NN6WGAmWO/8ghCmwK9f0P2MaFmrELxST69hN517TQ6GXfex+eBDkL8DDxXrMuR4hnqf1uMLrxuXwSzlpImfqVhLsAC0Ki5Tjz07qO859Wsf7SBmQ+T8pHgah7/9I8ig0x/xy/FQ2a0cAKpcujaWoMg9Lzl70Vt1PxakZWfK64Aniq7yJJCrvVK7xGUp3WrAl6pLSt1vG46t4l8ssJcMYnIRsfTAGEjAf9StPHAND2pzZrrgqaBdPtFOG+p root@cb609960-4cf4-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC3Oc2vYCpi+mnPoviGhMznKDiu3uenqeUDJDONyXZss9lXxFft107eq2bwIMvSYceY4yIAAUD1WCk2Wwen8zdbSE9INqRf9MikQjBQCq+TRqywcxUgeOmq5TMPanb5kTmD8OGWHaTFjZDEv2R/671E9JMk9IQm0eEAdyLmRuQvYzmJXaUpU5xCPW0ueaz+G+uEMUgjw14uF7SL6kwqXw3dy+0OW9HTRVH52SUAcqg9/KrmeqkL/FOiljjZ/WC0kul7jgKzHCcO1/MSSnWD2Yi+b0sqFdKXM8xE1wqTLSwj/ql3IfI5HmJsavt1gliXESNIn+gkmeU0z/h78jnvLo7d root@e39ffa7a-50cc-11eb-bf1b-5279f1a59a83" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-026", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-026", diff --git a/audit/projects/k8s-infra-e2e-boskos-027/iam.json b/audit/projects/k8s-infra-e2e-boskos-027/iam.json index c46c437281a..e34799173a5 100644 --- a/audit/projects/k8s-infra-e2e-boskos-027/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-027/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-42441632373@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-027/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-027/services/compute/project-info.json index dbb949fcae3..17582483123 100644 --- a/audit/projects/k8s-infra-e2e-boskos-027/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-027/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCtjOuzY4UWzmpKfhN9PTgsCpcFWZ0U5MNeGwlh1RtZUa8oAVcFxNh63BiyDYs6fAf+AHvQGv2Bq+vHd7TKAGhIkTbWwmpXz+YyBjCLuer+onEIn6shAPB/R7e+debOPDBFxIONr8yHTXuKzCWNk7n7+z8IPbR3b8/x4R86jGrCdfDjnS+tyzA/idUIIMeuaDH+ZleeSDAgxwY7X4r+thuuGdU/MzBdIzVYX0+e5XLqsUWpviDd3Vuwd8PeqAdeN4xFqWF4XJs4DN23mdssvdAVHRl7cLbZE/1zOupdMS4YiJjHhjzjRcwFcAqNq2omae6N7I+vipA3wdbrQ5xwL9o7 root@b75d3ecf-dda7-11ea-8a0c-be937dd98cfb\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCcD48qHcLbBw8uZbdVSV01ZlC6Lg7jwq6SvdZvh8rmWk/rMFY39He5qyUg2xg5juaDp4gGQQB0HvzLestl3l8ZNwKYiRSkmpUli4sihc3xVeM+q6Z28c3OjRKwGoCvMiiyndpAaDtS9bGUQ+NFKioX6cFC8kPeN4q+mw/SFnAknhfMyjT5r54iRwtRpjJ2tViFK6jmDmDxuP82JVNVJXuK8ULdawDXrjoYihFzHRwxIyCv7zMSd8coPH1qsSZssBhW+7PzlVd0Nqs0Bk8bYQeLWO/jzPVnKzJy9LJnTiqY78oBBcnfL+qv5zngeVqghkvxqDi3ra6B0qvIMMhg6Htl root@88144180-e371-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCWomRoQzY1c59CEpHd24v0Y/gU2q3OYi35rrZ0kCUVOmY6t7jwdjzxFSbyz4DDFSuwCY9c/Xauvqc+ipnNOjbSxSBnaHzY4WKIWNcekunP4RC24t6TnyeQApcHbpc0zDyD9YdmKHi9x9XMZ3B6M2pPucJS9il6CXEvZnCCyLiy9166i9pRV09sC+JsELreqfKPx5gPZiJMERNZvej+rLoQyjkfDfFZ4H7WejMjFA+l5GL2A5jYA9UwtAQBuuTQKaAvyOVlF+omYec5L155yYlclZ4+A0wKVYvsIn9p55h6jAyUyhHoNQ1WnxrSjjjXtYK1Y2P2gaVU17I+yO1D59Qp root@bd599de2-e45e-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCTrWcPCwE2jmE0rqtAY/OYOxpdO8Ca4nzJ1hbIcDr3bWVQG3vgqzFRvIierUNUUKfSDpuRbf5S8mq6GNXULgdv4Xpy12HplF8kMSsEcxW+JSUbuAs6uQuP2D25nT7RHDoId8XjtJ7Nhye+hDZf9AD5D1N5on4mvRP6dikbNGPNpkozHTm2jQltp3ozUpV4yrJFJn5r6S4IbKKr1zjejJ6lbq8L+seVC6wYWP8cN4RbgQRvzQJ1DrzEQ2ZhB10z06fAXJshBW1zyYYHRuTDdEAA+ykPT8lbKBTKROWKE3p/IiquVSUI4O5ehsENAp7SMr6tv5RAwR5TZ7VAmxC+cYiR root@193137bf-e7a1-11ea-8112-a64f894a1815\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDB34eJq2eaz/NsoP9CH/E+KGZ/sg/dMuOQFzJu7+EQA+/IwIxI0ytSlin2J//z6DwdR0lm28RxCQ9u0Cg+0bYvP08bzwESdgAsh+eooah5EfDV0t39gZuhHGuHYJtjoKmxOoeVJTMfLve2oJOILXujwrKNGOO0OJqXnt+8Rs9Dcg8ik4Tj6xuReJSjFvHsMr91CtnU7XWIKSBgw0jo26H54Kg75VyiGn/R0ofd1ZjJooEUIwm73vQBF6+WR5ajGCro53FP7l4aKBw77oxbseiB7wdbPA/7JyY+uAg42H1MamLMO1v1C6E7N02xcBB1wvNCqIRyznR4XPZZZm6yhFWR root@96f43568-ed0f-11ea-aebe-3e85ddc86bf2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDK++wzDVTftSg2smHizl0zCpWblpreq51hWBvKkRnQlAwzDXM3zgsJKr2cJ8eFsNUh7wxe4O5d1ZiVayWDVjAL5y6NJ8Ys3R5uRdZNNUhJVZ4xqulLd+eKAUkLyh/Oy/FSrFckgY8rpsxm/XFyixrPzlXeP8cmL/FtR/I7sUrpgLdVLYEhUTbev+40d3iOQa0YG6zFNCkCEMRvrUM/Z2mwOfZpTvRKUkzHfgOF2fi41UdZ8QLaxW5Us55B8VSNvzMGS1LFdMQA7nF4aGT53e78gODDA6671svbcmT6g4WzXFMqXjaC3qlUqJUVGXhdfSsZd+bAlz5+3A9zyYR3UwNR root@4b3aafc3-ed84-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDOdAn5tm9akUal3lTNz17F7ytxyrnrYwNvLIKi2S8MK1xZGjKsu3OkjNhAoaLFBOdGRt4nTqxI0bAuXShBMiXDf8GKQ9zGKm+Uj6+FUqh16E1Bk9uUtuLL0mAiBgNyrOmIOzFbQFsyLAmXxxrcOBc06qug99WW//ci2a8lMRW6D75cRaPSXXFIIBw/cdr1bFsmd+tD3koMLqrG+bRUvarhr5RQ8KALQkYKdM/SzmICnQMhNM651zzpjVenDcrVAYWVpsZUtSS7yWhSdA2OMYu1oEigtE874MSmorAD1qOvzz7GNZTUgVsctqAlOc4ZV6eMwcjIcxdQlLJvKMq+ngdJ root@67eefc8e-f720-11ea-ae6d-8ed64f3416c0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSZnPuHu7dqrE/ovkvAKMw84wj03RAnyivSvm77e/w0JKtqPat3IqFe3H+JHFBCXiWi6QHKKmO4TdvIjBwK6aQRg0RIYZ2ZL4XYED+WPoitRSiLVpczHSgrmVN2EF9LsZzDycNI6QNoegyglsLqgY08nJCTPyEELQl/WK7CvW+pwkKDBljAMJox118fw5KGU8up4vsxbSCevCL1ROaNedd4QUFzZ2OkQT8Y0ed2s+c2dBl1kSCDJZJHGGkre+tRNff16td2plsrcqzUOZI9hK+Qm8W1xOdfqyGOq/UT908nR9bLhCrdkgbl7eVdo4Otgo4hhudt3wuH0oATYk7xOPr root@90e8fb48-f89d-11ea-926e-7e7ea190b727\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDf/m5ABFL5qAQIFpZvZeUhld8OdyhKX6+1Kmy8CfGgzNao9mDoZD84VuecoTzaCbuustH6jqVPss5oMCisPkmdjgNKOb9MHNl/BjcmDHEkXrv7/ZCBroDAQSF7AxVTiMS0aeTY7b9l2/jPvGRGJdAqWBUJfcE9gSMTjE8eWKlz5DeT+cjNXgjuA7tLHSQQc8LiI/1qG2ld2amgjLkyvF+cwd63JtQ5zkltgvRVYlBvTaYcDh6g3CjWaCYbqyvF9sfN4Vjt9GbV7cf0ib6B0q2lZ9e3TGIY1239tCuAgvrLM7w6fuwxfecvoy9/2KWLxITCiwI8ntyLvJBWotHRCXkl root@67ac6a61-0f54-11eb-9a04-3e74eeea3a1f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+E0LhSvu/2r9lWWLDp+fMBvQMeOs+gmU9uV8seG0RIIkpxIYtB7uDMO3zTco1uXuLDdzwsuDkvn/qeVSTBw7DyK4oB7FRT6vm0yjSu6cDBThSSXITbYkabAjxaKbq4wPe5e/ZjEpvUrMaFxDJf4xsv91Nhezd0OX80CDJz6KLREpeCmiViG6YIMEInqx5XauWiMyESuIxri8q4kkh4AbDRScrumRM5gDEAmgymiXOIvCJ+u9V9orwtpbys+pKUSQNChO2KLh6krEOqeY0G7Irg858KCdC/SgieRc3QUnAp1AJd25VvuNLJR4PKvaJQ4CmAKIMLAw+jQ4BK7z1vI3h root@edc126d2-10e8-11eb-9a43-0aa5164aad51\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDfGBbg5YJNLoZqnE/YvGxYd5PqVtx/9RiCeMaPtydRpqlLd7/F5mHf8pULzuG7rGRUg38wSpdQXtvTj6aeZDC1FYOj89Qa36DU4JTBHf8vnk4nQsLN9NG1SaeLA4nntmMZx+fWtdMzi/plNg7yG8FhePCIjLiPDPUk2VHE6V6Gz/oX/ZfjVX/Xp9bFpeicTHRJArURYqdzmxlbLsbMwqmJ3PpeklElakV5GjJk4ozF+J/541PYW1Z5bfxsBKo8s6RtTCQswzcRHfRSGlpMcFYOkimxHUGsOZ3KnF1guNjJ/XEz0+ytEiqlztfJAB1wducapjbg7OOTe+Q8RECZXiD1 root@26201469-1851-11eb-8cf5-bee87f5cdaa3\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDRCXHT4erQbLjk4t5rNTeP/S0LBVa3tiHwtCBr9YqqmD9KxqA70SRgQh5l5wK+WKK1qe4ghfH7t5OPs3luyNQmGbTK1pUinDHVGsENIggPIxUFUlgrEMJRU+abXew+N/tSrsOCylaksMUBqv3/tRiiqKWjMWiO5DTFm6wl6PtqvlD7pulWgEZoDAVQjuzbOZKGlgCBLuzi5GYrLpwfmgaSy07aH+ocvuIPYw+p33zheQxUyjdKH4fOStgB4JQuo/hU3YWiVFVpEhiEF744Kn8UhSlgQTWPFuwR1C92LToQwrmVqzQbmKTkEGfl9ApgpqS5LrPxq8rf+AxZq2ca6ofN root@2c332d67-1c90-11eb-99f1-c6d701d1e283\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCf5WpNPICE22Vvr8rbfD/QuqoYT2jfem4k7dJJ6f2SCQn9kpVYv3RFLY15GRWje1RilpvIetZKrb6ONh5QcybUoErSevmBrb08FOEg6RZ5qpyhbNiQsBK2S/2RuSxKJPZrGQPo7ZGSZCpgNE+E/sNboZRsT0eXzeIO3f415cOdkTkKzPXXval3PTNCI6s+BnIEKgz9SFQAcLnNbC6fQIJRy6CYXmoS8jK8lZjZLR70fft/3Yv8eIVoSBehpB+He046+Msj4TQs7+c0JMVteb8lbJEu74QltbNyNvvqW96v7Q6j8ffmusCE+t5SHItExQPT1GijosLBPPADeCw03Ztn root@bd933241-23c5-11eb-ab3d-9a499a0fc9e5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9SpHH98TqPkcGrcAy3TdhcMfe6OnHAZPK5Inp9/fSMKF3bgGT8xUmB2adsiHaAM1iB5HEMpud8A4wSzqe+FFH6vOUD9iuJgAmbyA5OmKmDsrNDPOgwKMi0ErCUJCT+MCJ3bFsJszhSg/D/saf55CSd1xLk9TmkPTelXxJuHRTIxz5H7Emv2sjYv5iDpmzQI+GaatvDmscK9gmN5Qpb96fOzEY9aavCLfc3lFOCyYi2UzfKXdMKLgIjqMUMjnF+2G088gYJ69+f/FmUAygzqJWHkOiBqobyo4IUxOw4VNqw/BS3E7UIWtpm+azun3C/O7l+IkatmlnhX4j0ZbLBUW/ root@5d60efad-245d-11eb-bd88-f687e5d66392\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDn5A2fPGtw/ag6jQeTAr4q0tqb21ZKrN9OAc8sE6RFl8XZTd9kCUDsnXerIFjDtAz6gDK4iP4lGEDnSmNhJxq+8xiAiexQKXFenS/kr+deDFUSUTpqo/udz+bgn4DlPcGZN44BEHti8b0fpT5NZhPtUFiIxUAwasTJSlE57cH1haUy47yT79Qx3QbXpPsbrkHiASB+RegTc1xYW0qbNsSQW3K99NcTIScV//awXpxzoGHB/PnC2e+ZC366pYm5FZKb11l0ZiWrSgbN6hyhAEaRxRmthjpnoihHam7+wlQhBlmbgQpdCppwuvgRm6vjWpEIp50ERlucKJv8YmyOyKlf root@7cc62706-2c11-11eb-a59c-42dfb897bae6\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDS71+/oGNLgTYjuF2oNMe6ZmQb6WhzTK8QC+H4r2rIPtzlNCSseeftb3C30q820rolywAzG6S45G0czjXE3siO+Qcgp9JUyLId9mZ+FQW6LuMpoNPzh7NLcGgtfsNhmwImRWNNrFIl7X1I+izBXr4XWY4QjJ3u5jLewDC5JwYwY7QedIWdTmTlN12nZa8Jl7FBQPekZqCQMKBLyw8cEZwMe09epnPTKb3ZPOUFJlEqVxA/2jmBvKM9VSBevqRSWpW86x7YpXMPcM++bvkzgC9Q12PkvbO/l6JsfF6eP36bBPkrbmPvXX0cHHgR6Yk6yiL6aDMIH8XFxvbXGbqfz7Qn root@127ddb98-32e2-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDiSL5OuhKELFUbonxJVkrFyWXLNrKv2lsi46u9pINTfCfHakeseKLvr1xLIapifY5UrWQt0aXJyf2C7JZCnz9G+avp+7ZZMYOXNKm3QZif3ARbAMVpkDe/gnmA4lFb8f/J5v3MoGMIVJP8sWKH42QtSti0kT0vhEadghxfzZBRE96LtVC9RJf/kr+iI6wFMb+ofL3lBFr2hFUuM60V6fbmtCGVPsdNb2bzwwYayWlIbl/5KbfQh5T8JRUuR6WVKtffU0DIr02uyTN2vmHsziUOEbwO952yrFH9e80nrzJ07oi/J1Tr5pu8evae2u+KXFT7JjIVWVQxTWdM4YUKqFTV root@b1c5fee5-3bde-11eb-a772-a610f2f25584\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC8YQHdVGQKXkgDhhuVYPeSa+ylUX5fLyC6vQI/tOaUWJLw2QdyIhVAuMug8MJU2iLMkuS/ruFB8i64+6NJq/8vazlpjJQ5z8tJmiZsUbgRF2aiGGTDBs8IXbk944XncJ+e6fP4s8FFJCTJjfRoa8tnYwS2xuoxia8CPyD6j0Q8s1wToz4MYM7X9qMO2pssNOyigodCYqJe5XkACIHxle//1BymLnU57q+CMP8YIMc7OFqDRHnHhNm0w9KB19Zve3eCapD7fz0MykhbD61eVwECpq8YsWfILifSdLoZPe24N4pX6e6JAMCiHw2ft+TRzSc44bmSYVoZk1mrjQIsKuVV root@4f664e95-3e89-11eb-8da8-6258f8057dc0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC66FITWFw/QV6VpueWsA+mQaMEWUyixNLQ943ywWlzN5C2QTyEiY3m6dpP1i9txV72WkgROkTDaRlnmtwBc3l+VdHE1gFemJtnmPWKKp05WBAl7/Xk4alvJYdETKb1P3cHK7UmOB1BPkW3rF0PB2NY8slPOcoUinu+IyjgzHq0Z71ylpWOCndBDXpEiIjQdhPteDTYQixvRL1If2VLWntqOf3Rdxy7y4s4aIEYyw3mJhs1QMDbKSmK0kGyu1RGjnYL5scu3hdxSx4EQAgb752lZqkujXEcc13Zqyxm503Pt7m0ShsdK0Ms9WXXyICnLfbSKeQl7A0Bk0xH0pYZbdR1 root@92bf8ee5-411a-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCr7CyqL2c3+8ZJI1REkzCnitGLy28nfs99hw1DInH9sCPLzLvGv9HX5FjswWJ4+1TCH7i4qLwYRBhdic3kYvTgWgCOuIeyAxRAO4LjYNl0JcQSGFizC4cVoernPFItxnTufbg+YIojB2pXf8yKsI25a0t4aMoFjtZ3NeqhZjVXNti/Y4AY5CDZFvh7rEzQkFh4unUMid63RwgoxWnFEiXKC5O1s6VG8C6WVW3oXELcpTVsb1y0h2Vmi7vCnQHokrw1cV3Gvw0RO3R60Va415gJKYPc73VzUX9Y/qSAr/6THjQwrcPcn7L7UiHHOPLbKxOY1df4DGzgnNaiuRNYgezl root@fb213793-4882-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDsaVzW2Fn1tjz+N4yk49IMy0ipa/iH7niozRLyrMYXyCBkaZ+9Zm5L/GKkVyk5umXTUqLsOE+MQmd6DyUNh4XIiRxq5XSzWiwSqmowk26hfiX8pKS0ZWb6YKbL/7VsE6y1HXyVyGA7TWEqwQ9Tzv/4Hn8WdqEw89oHi9oEcSobMviZP8f1hg4+Z5AeZxcRdMqnOlMXsFo6iosCbmc5Yo4VqTFVo9Egh4CeOmcQ+obMw5ElHEbbBWs5ccgqRJU/zp+3fn3QzYWVd6zcBDYWfEIq5Dt9wdc0gj3m9UsTdNmM/iWEul0YcQc2o4SZGrTpLwNcKmQS7e9bwRDOyZrybfL1 root@83fae985-4ac8-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC6X+mfwUlalcA7R2tJj04uTKUHaeSJT8d/T1ogQXXg2pRL+LqKdd6O84KvtzYjMcdiF6BGMHKzjonFqU0ZtbeKgS8oYuJFSOfS0N39EsdqzD0Pet45RqzgA+C7GtF8wvX0QdLUdZFNS+kK3WA/v2M8QRAx0jfNpugX59wDjHRpXEPOsfGmSBgjOKTeWrNRPsv2mme71L9vT8MdDx6+v5TY0/BuxvIayov8avQ2VHmly7LTyfT0rflSsp0khkQx7WFqRHg9ARWsjWqotJo8VMfeMPGgg6RoJNGbpq3bKClnZ1eRVMXH48cbmLw4LJ128CsQDBaP3zg7JiWsKPUDSELj root@5f80054b-4bc5-11eb-af93-4e5abfa0c065" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-027", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-027", diff --git a/audit/projects/k8s-infra-e2e-boskos-028/iam.json b/audit/projects/k8s-infra-e2e-boskos-028/iam.json index f98ee76445d..9019a834e0c 100644 --- a/audit/projects/k8s-infra-e2e-boskos-028/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-028/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-1097373170051@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-028/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-028/services/compute/project-info.json index 29c33f32063..fb1d03436c1 100644 --- a/audit/projects/k8s-infra-e2e-boskos-028/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-028/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\n" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDD4jX/yED//ddJucVZgeRd/aMg758pd994vBWNUq0n7O7wLFux1CKZcHQrpO3H26xHjD89AijvFD62btxGdUSG1FvAKQff6Evzfws/gU9OW2Qw7D1n9g7WLQDqQxkze8PobCXcODMnAn0i96k0+BMzbB/l5zOec/UZp9FZ+EtxBpvdsByfyacqCz9OGTPuZsu8a88UUkGoJxkIEkm8Z4NTkynkIsRSpgbCHPgbaA1mWljil4c+uaEQDw3vY505yI984mEltUf4GqO4ff/W/VCzkYO9pZGSlXKqgJOAXOyQ7e6sw6SlhR+ZZz5zOJAbLXsCvwPalaCQP81gdcq+u5d7 root@e9f79448-de71-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDos2YbzgTIhoo90ylp8bgzJHk6edsHvndpkoccjIqLXNL0NInAzLHB1WROVUOsFnlHPmYk1zstGpw3rMiL/ViF4/TRyFUQxmtunz4Tn/Wng1UCoo6Gy/6kM8WskkGnHFLQxosnY9i5Y/E7PNJG/uHTdE7gQgdnfRwz4NbskvNIGuScnUjaXhDyJSsrwVaACW2Wv/ZmELJuvmCrTc9WtrDeDziIr4jHRmqHYoUd0QKJGnY73yfT2aKEhqKQeCTu22AxixbAr25MvrmfexRAlHFKrUcA30IdLftYTn05hOOugUqX7t6emiulMVT7pzK9NoGrQYrganrYtT1PHBhB40W/ root@9c598e2d-e181-11ea-9eb6-86c455181e58\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQChRmG3g4dFYMPbZULVPZoXKpt5uf37E/GlW1hrS7yYvYJPr8nifRwptf7DlkqkOOh9AXdJuX7W7pXXloALgXtvVPsYpeuSEDNKSGlCHJob700gsR8Sx5n6DLq2NCky7fQwyLtmH3ASxlVZB5PxMQkQR0pW0rhjLTS5aYOJ5RQAkTYlH9Zm7b0SMWBll04kpXPYpAMkesBe0NKsmhHbyQmfQ3Xn++70p9RQEftffP/mgoJY4RjbEymb2PGsu8VUKIA9aauBxxejEPvEMrab4iXrpgj/snEyA5pATxSaESKmHslGToytGXoTtVd+kQlUdyhYic+UVmDv6fdcfq1mP+Sd root@ab3958b3-e538-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDgBrKwd0CKRfbpEf+zGwkTG6YciuBPiimAq1xhR3OsCSAGapn7bXkLBcrT3Y1DjrLSnKS7ebTiJz9Idd918IxidvcT1egBgPgixGGMIIcBoyGynZYGfp0p6blbUmzgGMMsHhz5fXg3dmi1RZkqJB/G7t1T7D3emW4acc1Kn9sKkhcGyo0rYBvwewmjPIem/VfEOSmTgoFkT/1zRS1dHGKgvbknQskq+5fRjDz+lMjXmz4PnVL1kgkhPwlPCTBvG+6W249Zst+cv+zp/jbc02fS6qAkm00i1ivKOsKia5XKTYML30xLHvs0q5ONO8z2b4+IYaml+IB4869ka5V5Jhlb root@3dfe24f8-e755-11ea-8112-a64f894a1815\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7Lh6/O9RoNJz9dG9jSUrWLwTZY6d8JUKyxcdEJ9mAdkG/ayMRGkPtbbuf/QEXQVvsFtpvRzylAx1Xl9N8fDPvJMvrLChVZSPHBZhCqvgpX3BEHP61PyjzoVHWZeDCrU0ZZK88/88+pdY2VVQ9uQPbF5JQ9/OjlYKPVSM5n2pbN72UiNPNMWWrNa/+6V9fPla/gHW3GiID7/pJhUgY5bDmSbAzYPtuxM0hL6G+0n4LuwA973p9WValrWJ6YqDlX43CYoqsC+WzJF0AuNuyY92i35OXShgJmSy6QawXy0bJh7DEUU6m4A+5xwSO/Znf9TpWUNTjGiyS+MmsKDT0DPPR root@0945bdcd-e903-11ea-aa1a-c6580c04344b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0/5/2aoBxbi/g7CnZpd7/jvEplt8GG+uljIQUzGmm/u0aB8/LRtFwgWIXcZcoMhq/4s6kK1pTdFfKGZhEdoIBcIzDQ+zzwtsHZI8BrdFnNpg8kFoyb3+LBLlLZLzhvL4zo/2/43ZueXSLQPi0FE6PlRb1wV8bg2RevTEkLpQb/WjDmdXKPuRPF+WVY+rP4oGnHgdu+9Qt1vLigQptcEQPsDY6BxU3o1Qy05O9kU+FbdfF4eZi86jN7miKcu1kZimx5PwB6vumzNZYhAeqESqZ/Q6dUU6xQkgHIHl/OXlps2qnsJGx/v9zfh1lzKam8nsoStv2g7ky6rwAsvNqM3dj root@2da7fd3a-e968-11ea-aa1a-c6580c04344b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDX8LX/F6M9giUWUO+wDJFYzvzWyvotcigUvaohuaAo4tTRLE45IKhELD8xUSr8oddITcc1saLHmXe447AHY0V/EGg6Qyy+PoS44q7Vk/yQ/btVvhf450YwszUt5V+3uzPKMA/NIB6cg+KrlCtBxcqmKE7n6F9iBVxrNtBAV8qxkmtiSpjMACWlAQybkj1vq0dYVJxPml7IIC08LDalvPq7SbbeO0ihBgjU2myxYubynm3ekin7Wl81kwb01heIE96Mcgai5E98fZxv2NTImz0kP3crXDt2+h/5MARFZEeDPn/zPT+l/DM6Mis5CUnSCdK5fj4fG7U2DIrch30Cw/jr root@f125538a-ff6d-11ea-b4e0-eacb7c15c8a0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBuCNOkkbI5ckLRAdlfEUkm3ZqxZz3FoOJRV1jjItTMdlRQpPuiPYDgvOpFT9erIYPid5AwGliEsdXv85kr6Hm/w/V7m9OhiSI9hpTXLFlCnh22HJwyKy3poEZpacDD61wR6yoDqYT4ORKBPI7V7gyAIfPtVGtkOcavsa1WrbGCp+S/nCzTk38GByi9F6CFzP0oJYdZZBsFWKXV8/MQyb3HNoKwWuA5dRmdTd9XYeXWtUSrZwhnSGmBsPLqLakamX84qRu0KQbCEO1MfZlxTrFdvdMmKgW/hlh4Y3j629gY/s/Ph0RVCt7f898ZXQDCBbPeDAVFj9AGpCGVb857Qov root@194fa3f6-227d-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDeqd5LtYArB2lVhMM7j059BJ/0SL72eisu7Xr1J3zi6rM0CCYxpMtAV/3Mo07jACQ5CVpJHEeK2NouaFI/mxb7Xna25kz7gKCfDaonbOzLDEmFa6anW5Gxiq9pFazBeDO4AjmOE5bXWcptIX8HmfnLm5IH2i+AUqry03KhVp277LDhQ/9rJtT5Tv8vEL/xLRuSZ0YveY8KMOohs+5+7uRYMzC+h/hKAKeXObSweJbiAPJ/ad6rmlyeaYQvVIecTbZCHRTMneii+G42qZodwJqSV1roGDxYi9jRKXi3gyN874wlUt4qn4YowUrY5uUYdiezU0OOZIXH7LpkcaNqZgRP root@545b89f3-2e70-11eb-8da1-5a2e729b6dfd\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD2Sw8LB1TrJOz6VSp31kmOn7ut3QrApvjT+XMjCfodfo7KSBcNNhzPsSVrh8go7r90ZjKpPgh5Pbr77mgYJKbJn/advP3RY30DQkjeJAdZZvlRyfDBOSgmEFfHroMFXEa3RocP8/CO1tcp2seNbvM/zmL1xwxaeI3Lrf3yLZiAiiDuY1HH5klc9lmJ7UxY6jBOZR0dqs+l5ki1KX5rVnggVFG/R7UQdJyBp36eRyAtpdt7cWRxNT/6zwbnD1fswBtYC2mfWwo0k3BaR9md/DQd0H8VluOkBRytmRamEfxRie+OnX3uulRLyupTm98z90QrajqVI0/wX0AmNMyxRYWv root@cf720433-36a2-11eb-a25d-22a534811c55\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDVTBxsXZ7FkcOSEuqhvKIJYrKg8ewNrTleYN6lgAc7A3NvtPjXO4PFLazjX1X3/vq2kX11aCOrthaqUvYGIgABL3rc3G458AVvdPq5LUxL1tg3oKZv+8KP4FcwjP3kMx+7zoG//mGUnaMOlgS+dQ2YdKtoJyaDsmDWbPwWL6v/u9jVictqkCKYRRucm+mzL8g/ECWNmDUI+rmGGdP8f9R9cIIWd4NjB/+Gx0T355EgSXG/R1Y3pb9cb+ogBCxZuWljYKaimSVcLinHMFmmWh2TvHV/HJWBuv2MQhcWpOHYpV5nAqdkG70iJoMWd2gsyr2ht/Uj/6yX7w3rX4tG9hA9 root@396b98ef-3a4a-11eb-be51-2af5b2470e9b" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-028", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-028", diff --git a/audit/projects/k8s-infra-e2e-boskos-029/iam.json b/audit/projects/k8s-infra-e2e-boskos-029/iam.json index 983fd2c0128..7fd19068075 100644 --- a/audit/projects/k8s-infra-e2e-boskos-029/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-029/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-527274517556@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-029/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-029/services/compute/project-info.json index d2e563b7ebd..4f983711c43 100644 --- a/audit/projects/k8s-infra-e2e-boskos-029/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-029/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDh+yHk438JtmSAUu0GpL4hlnV7CnUcNudp91gIHzYuTS9XvMHqKW7BaIMqBu1Q91GwlsR833Xs/SQ9QlAGkbzgwqrZ6dquUViBclazmiwm14Zz13cnzDwV9zUqhMIiq0YMBgudw2ujzh77udBHRkzPECvls30+TvP33Gc2TOSzNZW5jHS/Lh0ucKLJqt51P8wiIaVlWlOF9xnJNI+ZPlA4v9gdzT8ipgmO87Ey1m34miByvTGuxfrIzg4tD4RtZ0fY4YNKcjRmm2Jc2L6FOut5MSq3qXq58rCcWXYZFinRQHBBraKaSGul15fBnqNI9fiPzekkrQqBW92ulq5oDhT1 root@4ff664ba-dd52-11ea-9424-2680bd79560c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDx1H490NiWVGmssKj+M2lCCo2sPcShEfEOfgm+Q9kfHpp1/98N9ASHldBRtelCL8DkIowumiilb3CQnytDi018GYzEqtKQ1OhnRRpTyc8krq3U1hpoAynTdgAyS3YpG4V79bhg1eYH9uZzTAcJXBDy1wiKDYQvDbmxFPQauQBcm5kQlCRoYwUy+IQV3lWkjGfReLEPGe0sFaqx/rtFmOWGen3GefFQ0FGFdqkK2886rYKJqAKhM9M8MoQkF0klO5pAW61MIPwzEsyR05fKZn6komczri8NEGTvJz7NM0/F4jzMxyXqCumEWy5l8PWHsm4yTQwgrmHvXDcnO0WloU2n root@812a81a9-de1c-11ea-8a0c-be937dd98cfb\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDMrTtksn96phAYyi7/uL91P0ul13j3o/Yi3bKWBukQqWTdPy3zElWT7t5pqOuqxAIEh+41dz1zNU77Kjd5M50knlyTmUY0MU/8je7F83FsSLuJ72UtFOBzE3lVn/De7TW6nmM5Yt76e9xSz3JYaU3aC19fpsaIhUH3/Yd/J7kpkzVgsy1nMk/krtX4ftSqGDv8tNR0dafAMNWS9JiGalMsfeu2vbhRjXUkylAIvdIhlctDQ4Yf6czTNG48fnpdTBuXBqe3jQ8BPGRNxoI4Plj1t9X0aolE6XiWkHMXNBadfx1BYiS3MQXsiTOVduN/dcY88UOTh1OAvhB/xQkOBn0P root@a917b3ca-e297-11ea-a87b-7e1d84ccc038\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCPuAfEfDSRUQSJgu5rzKERbDUOucZyS2DIRkoDVhB82cWM/6OXhu1f4vt4K6TALZpBPur2df8PbMt+ScFcU9hnEn7DpGmBs07+D5XdBipX/A5RmUJzt2vhIHHN7wyeToRuePWeXdUaLLNlbJrV/0EvFT/9T9URpv0g8futHZ8P6FwKtk9xNJLo0vA/5cXnqxwRGwx/QpQw+XimPpPVGW25omALK8ByudhYi+m+eHv+aWZfPuEhTrf3gUT+u5vXTOU8VawSyKuCsYDELtLOpUX49uMIkXgvyreJaH9Zup/gOtn8WGaIKM2lvNKZAyZJdbcsLJZSeNP4+kqdF2u3OjZ root@c0fae80d-ea28-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQN/mgFPH9Atds6qIbmhwC/6/HFV8AZ+kmLr0s2L5FWaJtWydynBUc9r03IaHWDDdaCRQAtxFOA0mxHxCv0df2CABNJAO6c8GnocWkssbQIGieZgpGwC1QPG7e2F5IRrpyGo30mAdIMp07LcfXFsto0bqRlRFZOGKr0HzzcsAnAn3/u7wLwk9C4oT4XgnIKroxRINxWBGmAV+uOMN7eTNSo8W56Pa4fWlhFGbqUvGyyQhxBbk6jnMjxGWpXLfuA6P1w1sQ1Wx8g0H26v6keZq0FCGevUiq3VlPQbRv2bdlLg3xXIzn3GCMx0BJ74RqQDUHZBwT/50vzFaOrQoDYfNL root@b5eaa99a-f2d9-11ea-84bd-b6fb6d83c68d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCxe6yjzEMUQS+6XPvQ1oYxIIsCaAmH2o5FQzwj0wjg5pXguEeEAj3xIseG45+jdumqFFZfL4YbFy9D5jXJoA9fKHJLRar7Mq4x4OjumLFN2/W02p9Mb0R8Dd7pItuOK0dbB0IUiqecglN7RVnRWavT1iNX4ZKyinZCBInwzfj29l+2iJvqZyK3zLuvIJORhlauoCbCEqZXMzfjQt1Qwc4h++sShhwLMJ3kG/WlabQkCDIEQ3jaY7kZfohB5enhoC4Il7tqF75a9PAgypKm/WaWrgP7A7ld5NMkmatMtZiy2QbTqOuQQhAkR4VPhBQz7epKM+sDcaqVDIvo2aN+voL root@5e3e8204-ffec-11ea-b4e0-eacb7c15c8a0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCW8NfzXt+ilEAXT0x5JsTfTp0n7CHpVfFrIdyef2ULEudjDvaBmaAJr4/vK2TZYrvX7tfYZFTKwLNkufev2fDqln/GulIvgvvdBqowTSUyZFEurGCN+3PAQpiGLaYlhPCsM/7n4fDxWUQgjAPNbloLQunBjaJVgu3ltNYXwVGkchucl2Dc7lC1Q7/6cTjWSAFI5RRib3IMfCwsTppQnIPyPBnHJS5YmA3la9PebrMpizx0oa7U81CRI6vcQtNSY/00ku01p1Cv/3uWsgeMH9b04xiqH+4XsaU+dkm9QGTPsbOi8qCJbPNNZHYyk5WTDtuto2WaY60/zzr/7avy7szj root@6c14bb9e-03c6-11eb-9ee9-2af320b50223\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQpp9c43EUAZcZ0ciVYNaVZ8C7XoVdOgNSUZHkF0ZoYgjr9/ZwkBWVBw/Kl1/A2K4+pmut34AZ4YPwcgetK1dQfcSctK16TXcO/sWC65nRC5jqPNlp3UBT6hvGppkXL8z6Lt8YW0/ycAjkk85MsMSvvtMrAhHxn5MafcjSLEF2VtHpf4Hq3PB3Thdzjr0BP5TXL174fltdnmyhSQOlYpKkcCnlHT6kq4u1Q8uzROVEt1MrPxZqMmtZdfOuwaV4JKEISeBJTqfjtcpsFrk1bwPfrWviztIn96igmRU6XyVy+5NR6bSfrVLnzRkwNUrCylihinPoOyHHw/JjQR1A4ny3 root@77ce2f9b-18cf-11eb-ac0b-9a760af27878\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDGEYmlwdJQkMhDijSs8L32ozq1bJZmkB1oNrBL2ykQAYTxttSWKnDKX80QNyD9P3oS3Cnycb0geB9aY6VO4CW4EPa6DsL6IPZ8aOiOapMdBIvf7p/V0wtUs1Ie9B6QQYP2ciI3JSFk6nOWQ4vGt0wz/W3+sPB2QHUGa0OV49bxHJzOVYGAA77I0DV5P+2acOsBYYaYUeFGZeotuwYt2Pz2KdV9UFaulJotzUuloEPfAYxunxbHuWIYTp4J8f75xSqBCN7h96Y/YGPcpggvdexnepxQNGF86UDjRc3xyOpf6zvooGhTkg0GLSDOeznwk38R4EoCRW/ytC78O4eJDKpp root@f7b39248-20b5-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJFNQYDGM4cMIlR91Yq5UqEDlUneRooT7+l1XT3jvN6NVzj9dyimfTAsVRZh+zCIZhVoXajpmpR+oHxpgQqYF5l7LW95nMMMoi7QoYXErihSs7ie9COmEPlcT1UMcVrQPGnJWEF1ZU5TzrLp5K9IDzMjCfLtU5WyAayxMmxuCAltlgbYzBRvFBvmuVkpeZp1sjIHUEqnt/wRUpUig8BFkSH+7QVV4FkrTL6nQ3xngffolbi6BBpVXSq0fTCQr+nnMXTx18JUv1dqFld/+3P9j0BEMEJ7MCcCgMks2y2od5/CXbZay9gtcCpt+uPbosP5UaIWxPvD49thxajbeFf/qd root@1f3ed845-26bc-11eb-bb1f-6e397dbce9be\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9J026Tzz1AdJlqU7gZ1DeAVmMXxtuJ8b+fxj/YIW03aprwzq8ncSKOzUtASV/hGPwlznDBRpxlSfzgHJgsZnFLz4UynMOW8snQ7G+zev4OP1gMdWoPyZ2/7w4KDBGhkg9npgQjhFLb8s2CLN098CmiCC4bmOom+8Es09M1SCK9FSSxMKIQTuhokpLycBsNGanka476/BBqR4urgvzyUurOYMDr2TDgY7SILEPLcvo90DPKlMgZY6K8tVROnlZayQaXpxyK8fM9jCKCS/DvEn4/YJW1hZbESR/pfO1Gt/rvNaM6drPTZxZg8ip/0zwZBcWrCgnkkyLLV0bBcnixLSd root@8b8710d5-273a-11eb-bb1f-6e397dbce9be\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCZbbEkSO5FgVRi/htCZJ/8e5jn8nXWe5hbW8pHNsSbOq6/ruZIiGNtI0Yz7LGb8noPOmBOCfiHUkVqhbGxebenYqQJvBUPImdh8i0JgEj5optD+L0ZxA+t+uac0+Y1SB8bwFbvUjgKt2wZ2IgQPowkkvzq1lEtVWLhIkTTNstvoXdOqqiayRsVOgfGnBxCC3xkljnzPO9wvLedmrZsv9dQ5mN41OqW3px0N+5HY9oadg7XvA6MTHe9p2YPgUSINlq2ckLWvjMHeCZuUuRznkQbt3QXHyE8nSVodSrPOYOdBd73JvIglms2rIKrH/0CKD12+IGglDNSgXM8GyON171X root@d7e482b7-28b5-11eb-a35d-7a1d48297fba\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D3xa28rOskmjvWHJLhFECbEB9Ev1fY0wDiFnDSam4PHnhLKRShWtilzT6jRpi4OYkR1/fV+KhBd2HNns0kPt1FuLhExUOt01yW37oNwVjaWgRuQwh8NIcm+yjODdocsKwSEVdAHj2BFaQwKNPOGpU6bBhLuvs2G4YrcfrDaGw7f1s9ILAXVoQQg+39nSiihIti+mkPc9BXu5M7azHiOpRhmh80V4/0NoFin4ezume+h3yuVBlq23P/KZriKGXda885HONjZ4Ka47q8pknY7hMEg3y3UVwLRgtBdFp3gP5+DdPILVCLsK1zrOIBgz6IwX4W3+QiJ/zrAFtrKar07J root@adc739c5-2b14-11eb-98a6-ba1d66ad0079\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKVSejTZkJDEAIyg8g4ClWVdb5BMoe7kh1tVaNk2GVsRXFzpOwieJcdB4a1LPlw4mbKWTWyW7Bt5Yy9AkyExq66Bb9FXkpjOJBMPWr07olkHl0XhzuD2QCdEA0qTIvWFl7b1IENFUaJGiep4elsFipGMfYMtDmImwTfLImT5aoBNu5hrpNUXKFBY5vIWhTNZ7IeHjbzQxd0zURNuIi9a/tELVrVdjcEKY0FUlyh4aP98NxoILE7Wkal8Pax6uyBfaMJDMXrCQK8Aeb8Ob/rnoUkloCSCd8ulXONDcLn+M93RXnaqxXkYuRzBubLI8z5AyFVTGl2sAk/B1OgTcR2VX1 root@68c234f1-479f-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC3peTTlRHyoAdJCqmgWULsTFuoNpxGErkSHp9c8NgMKDc86IY+vzWJQkorAW1Dwa3olbZrkxeb6luwtTba9fi4xsT7HcXiy7YPtELvpkskvVFGD7x4ATsRoAmBua6jMtu+PifUzTa9fB+L1l5f8/iXI7QR6auzE66gko2EDJjhepnTIP2uJ2ibbk4TFu4Xq4q8F86CI+Cw8PBXaGKmMBqVMXRTgcfw+fefw6yIxPGsMLFFyXif+ypSuuxO70Ty9Nj/wjMXV/lh4j6mIL/0bgAirHA3LTgM//4zpZoL8mtXWGJAEuXJF5RFXZ8Hi5u6JNhwWHmj9FYmmvQaappe7Es7 root@688532b8-49b2-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCrRkh+RM8PKS+TnK/fhjYsOH6iYa3PFCT0nASfuI7NzXd102H2WDgZuLfjlV/gM5qJ2Nl5FsGVXpXecY1A8jiuYaDdOhlTN+PzvmMoo2xt8gb6NCrAjK/V37/b3HidorhXoQiuB4G7PCnj6Hzha/DWMHbESvFOeC9V2R2Av5jWUvWJ9FvMZR5xjmBQTtW2815poySelBCv1AyKOR6/LpduEp8zkEECkntSZEcZ5ThGzJZ0pWnwS915wr3k/dxLayYJbOdO7IeTOf6XM6uaacianY0EzpnezCvW+T2++pgUptiiiePAOM57gHMLhPr5aL4MfDKNANeLQVMEyGDxG4+Z root@8355fe00-4c2a-11eb-af93-4e5abfa0c065" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-029", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-029", diff --git a/audit/projects/k8s-infra-e2e-boskos-030/iam.json b/audit/projects/k8s-infra-e2e-boskos-030/iam.json index da5a9985893..6dcff8f1dfa 100644 --- a/audit/projects/k8s-infra-e2e-boskos-030/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-030/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-580537525558@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-030/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-030/services/compute/project-info.json index 1749d730c28..df369e5a164 100644 --- a/audit/projects/k8s-infra-e2e-boskos-030/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-030/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCn/rg9+lldeVXLsgygs1XYCClZhmNofTvUJD5uyZ7j0yKeDPDfKZMcQYrKjk4hbDKiwihuwSBqDbMX0uaK9UbXNksdM8HHVPafLoI3KVa9e5mK1MpFP1u8E0dQ9K+uri5L9WDw5jku3Om03aODWU737lbPesOYAAY9HnePbUTcKN42KXYBgmlmB7EEg0QxF55oSS7F0JEdX8szrSHhqxQ0mt8u3V3KLRuLOjOMqLTZRAJ5TOXo7eiPf7gazAbAzNzIsZna73eFIlp2vZU/4za83OK07NQ5xMp0G36gGnl7F1T0Su0S6Yxay1jTR9DZLecHI45Zi3leY45M6TpjjhPr root@5c199294-dab1-11ea-8c1c-d23af84fd26f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEBU+Dj0WYcLVc59VCA+zAjqAKIHuj/EAW4gUgyP4hxF8UchbolrKiStmRINgWjQlM8uuDVHW87F42pdHDgeMxh1/BrywPCFfPAcmsdpwDrKa2TJP0O6WYoCDuicm8SKm7LLl2+Rzj+GR8Bigk80v/D+rnmXOH7Vhvxcy5nhkEjaYh43mczqkd2bOwYUaM7Bhi/emBaJ18WPEJTaMb9n6S6x+cG7Zhmp5/Xw08slKDJTUFkwCwHO4HpDjfa5PHahxKbAvDLMttvbbMMkjzPDKucoz1c2SDK2dHPOgtHQrI3vXtW8igUDDPtrAVf7yaK9Kqhkc0Fe7a2qqVrX1u107N root@21639bba-deb4-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKJvUi32rXH1Wp/c2xunkXO7VcwQpAEqxYnmRHmsnNNnoGtiy6urLrEph9TblhdxqKkQNs5UyxU9gOw4ySoFtvLSGuK0CfKyAe28OqjPksMll13bLi0d2woUYrunQiTwjrxKclbROlUfZyWIUGSuJGhVU1VeD66K+KR3D/i+XchB5JiShYUcprvMBDI7fEEnitbadh7RRqOWgcBIVPtKshi8D7Eb+WjfrhPlii8mE/I6/EeClXqaTraFDVufWywnZaiky4zKQ96tI/8vMwlkjX6FIbtUC0T76zB1ZPfiMAgfFXYfovh9LP8gCharrx9DQ8OCJVkSPS5MAcSsFr6iZn root@324ebfc8-df3c-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDO4gWWCVLcKQMaFVup4mv0ORglQ0EBgswOMrGtvs3/iE/mlkrcZNGi9v3KDSzPrUkxogOmfgG6l5gMVrx/vP07YUVJBqIMwzO0XprJXbbc8F+bKzdWDAV5RtQGOMxmeMqiZ6bRO09MT4oOWuwrHoF3xfx91eVqLgE6f3kKzGzSPIr6bOTwKuboTtMIPz+k26b4gPFh/DEe9gZKhPS+5aOy+rt5E/eztdgRqQXqJi9l+7/IgIDCNeUOb3EGIICsAPYfNsPTpdrsc0avmzFFSgdyn7JRSYF2lAnxRotnqaw0Iz6MDKTNBhgXtzUyJYHdo6ESnaL8l6JnuAdeuxCym0pd root@16e5a9f9-e265-11ea-a87b-7e1d84ccc038\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDAoVAj74n/6gWZlhyxO/0YNXdP1sOym9PNzok1sthPCE2faA5fbwCRrYMG0YpaFSQN00r268nxViK/cxfBOjPk0qq/G7lImz3tAga/mU6xpcnPHuQH3SNMgmbfGvYGNRFp4ak2/augKwDKJ4nsoXczcOfdQwReIjBoVu7oONz5QgprmAN0EcZ78jKJrxi9MyvN1IYnA7WwPZ4bEqOqlNIQod9ZyKZV/Ipg42bJPzBBeWOvCaz0kIAEITw2rtZI6wjPud41xp6Dp9caXD68bv73SPFhj6FCZJe0xxAOTuDL8SC7E6DePa8kaVb2Ccj+G5k5vurddQM8BHMwOA9Wj0c9 root@f3c76248-e6b3-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDE3x7M0LUp28lGN2QW5SmG5NUpCXRHq+it7Yoryor6k3N/EPfGf+W0/OmFuyILnRxTtPtnMJHwp60MR4cI/ZEPG565Hm7QUfaqZgFNBlY7DNOplnl/Q8RGgcDVhHGrXId6yts1LonNHFC5FBuYqYn+jIW4H8KaTuFEgShHRLpTlaTSpJPnW8B/Qh/R01TB4Cm69r+CH2q+jzGJbNxAUcK9zZ0Decnz01esHhQ2Gjo3SS17pHzVaZR97HbTQ9cJAwJYzg3V10lOan4tjst6AJ/66/5CAqOxyAwOw6g0LEOK5gPzRxaBl4hqFyu/4dGhq7L3GPnX14hfXDzVc694yDjH root@1350c987-edf3-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDxvvwGrlT3XkdCCYs+BQkTSOC7pefaVo2gCjaQaJ9HmJvVeOocLnWZcCnF+kUy3brqndVJGpXzZIIBXOXMZbCRML5kQuowE7dAWBGnzZ5DkwVEF8ZjQQCdpktQ3bcjggkQ5mUKnUTgpUGjpfvAedMdzTlsUYGftRJYL7QVp6vgiwkJ/Ic+EeBUfGAB7/7yuGVzQghEJjr24xxSjytLItTZrxYsm1wcR9PvpehEXmQ7wQvJ3aIka0qlIeAJUITHoKykdK4f0VViqaeXiUcNEEWSa/0iN24FDWSCigvLj8Ex73Zt3diBNHYF8kPUKjp95Zw/kxTDACwld4x5Ad1CPdlD root@dc5da346-ef18-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBHcILrIatptzlmNhhWHsx2adZdPdgEcYfCIs4xgQ7NAgLdODB+gWxhDAnsZVAK5O/79ZD+yzE/+FmhZnr5lUWiuqmQRr+s29CXQOgorlkVJQI8pOdMxzR0JLye9NgtA6xYfeI9TnCEthGEXT6oUFX3aINlbBo7MxwqaCftHvxT7YYz3XW+MxFi6xaI0n22FBCImaaME6Wz481VjksbPcRlXxov/GB4mOoMD8Tjj1N5C1LcMpDhr9v0HMBBoQCWsiKgY3wVr01qAgZu6ZFQNmIy6TJbNXvnO6cPbDiDnie0dIs7C4/RhkvnwJe9yd9aOTpfSGXYQ/sicO5AnC+CqH7 root@b578d8a1-f177-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9TYy9QfVT6w4LOl99ai5H+R+EPBl5dD1Axb4lSZnFLmweT46B+N7m5Zk3g0pDp7vepy/vuIchwcCHz6evNoXOFEhTx5o/J+ZZvU1OYBQy+BYBJytGIREC+BG2IM1KoMXDWPxLdLMtutuXWMKt+6W4+1yzYyVmzbE0yPF6iEzEOKHuukz8dVlAZf+GKxDRk5qqB7xm5ASDGcxH71nkqgf+u8QuUc5sAvLnhpxIdqD7L40567x3hnY3kP9FUOR64WTCbgbnbokivqAxO0g+mUC2p4n5hajEkLubhAbRiFolcSNavpb68/RNRMdbH3Z62rl3esfLaCfVofNzFdjTVRRN root@a73eae26-fd8d-11ea-bf6c-a2eeca28ab84\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDV4481TxHupZgEcDNfEH9m2Zxl8b5vnvdbTeAvtqdVk/iq4Mi6ZFzj1KNyrGCJi3T9X/YY/dHQmOp2Y0iGf7Oon+oXouZH2Jc+BIwm/Na2Pimhx/g/H+PqOW7WHZSVy0q76EHM/NXzrg0l84xfe2WYVDUXhX8GmzOppOhkjcUR91UWsEU/anjwOoxRlFPDF/gi2Pn1ip0KBlAPD9BtI11RDBw/OOO5XiR0G7XKX9y7EI25fVMmXojN4fZ3oeFAS3bLO8SaJr0k0WAC6BVGgvzL0Rnee6zpBXlaMGzt4jFp3/U8QVd93fRAzW68BNFaW1aVYkSNTYupgtvaukR7acgF root@02390903-febd-11ea-be1c-eaa6cb7654bc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDR9blRupK927QPKni9Egb9M9XqpXzt+I+0cOVIlZYUrdDU3dzCuFHsy+1Ak5kYBHBRPMKuP7Xpq45h+Zn56wrl8fMLz0NWYJIWhLwN6B2oPINpFfCFIsuaUSDFX3CQuHsVNCcGrJhThp2EmuWhRK3fCICv1LGakPjs+mPSBkic+MwhhIOQj6KtkqbgeV9p7QhrBZ/e4BkoO++7Wng+I8PcXRa0UJz/BsGiDDgtb359BvWk7Pz0YD+Twcm8qmRkDPCVDXgO2pMR9ycTRnvGA5ZKcPr4Q8Odhxir4j6Bq22uinuEse25GhrM1PRgIr39NZ/D+Dlf95AILA9bDceXycVD root@7e228992-1e70-11eb-8d52-9233771f1447\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDnI0ObsKp8u1333yDVmpoiV8hIZkgNmKr4OJYCvN2HpG6+DVOwQDmfXah6Il+oasJP7zCnpFgJhEry/FZosgIZtmqc4fEwPsYJSTAyQ3soKXOC9kBAXxvEgNwVBIDt0kZsQVlGXszgBnuRRFWcvyJ/uGjlUivr1vEFgQpa73d+Mnyqpxy0crgi0zxamup/tVztLPTVxlQYCiC47wMhU5NwFo2718STLv4feC/PNSly9tXCJKDmxkRSa38UQtCVyf8Qqg+DL9PcybOw5NA6PxWYXML1M/N/Op4pPFWrKQniOuSu5HAkIfTeGaepZHvc+fcuPsWI/tzghOzPAIuGHkqH root@456fe333-1ebc-11eb-a4fe-eec30b56844c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDClPMb93JqwVq1r/mZmv8bh675oSR0bRH/qkknDnfB0Em4IoDpUHAOU5B3Jgv/NBZXoN/ihevGhR2mv3Aw8keovpqrR8gaSD180ymbl4SFpn7qp+OloEMnS4J0xZzsqx2HAPbedH9TzOTMI4h8Bggz+5YSLuScrmli2CVVaXADCDob/IZE0alV9l2JHRj7hy3cYDOZAQCRec9XY6tiF9mIGRiYPDepAWepbBclyjRy/CB9+hekMJdTliKgCqeTtkAyhyEbL+/33zUUE4PaSYvcBNmr0km5Lsj0NXKBb+mLWVZVkk121ySuGw7ylw6MJbS3/96hYOQRsCfE2hsQjxpf root@79289e56-2e24-11eb-8da1-5a2e729b6dfd\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCYl6pu3QiDCedgIk6QrM43zKxF2KAxIIf1PdGWzf1Vk8DVs564IOTdRBFkcSlchnsCN3qzwIe+pa4PpB4AGojlwC8UYIS/go01GzHuzv4+Ca66BpFBc3uenMlfz+5Wwswiq8PnfhmGmfeHC7o3oUJpimGawj7KQtEq7bH9pbinlJ/iJPgJek6s7Ooxn6gXRxvyYi6W0D1MvbvFXWJrZXYT1KiatuUE2lZ6Q3utpzWvP53DWL20vlBq8EM96awSzkPVIjn1Af8JzxGdlJ3w5m09Cojmkuy5GN2CuDVYyFYvrcFDPXEnV718bgW33r+RniAR1jhEBgXTjdnpDmAPJFab root@855064da-35d8-11eb-8ecf-c2fbd71c5254\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCxWFec41yrm3VMUtDhB4e2CLMoRcSfS157GaYg57BkwkBoqoA3nRZFluwPKbUe0sqPrRuektNmF65U+YMCyFdZ6in1LKeLl/R1tS9X57m7GQmfNbT5Pu7C/D+fZv+UWVhGdVtEl3VpINqMbBAVFeGBRDIbXSjqKiRvuquI+DIeDlP655J6JdMioEJX441Z/HCWdhiYpheIo364pUGywILn2sh8ZVySt8Ou0GY9B9vnhMGEJXYqlE4IoVRXCwr2Qr3LYprehajELjAnrtgXMZVDteVVnORhXRvlXt32mMZxoIVkRhrN1Z0aPDcRaOdstuht/oTJjCgpGUi9HLaGsGfb root@a8db8f6a-3850-11eb-a25d-22a534811c55\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7SX+ilLhpZLaTSWV1Bx+x6t88byr1SmLVJ5mvwliQ3nm9Xu/1aN2dUosbA46uw+RThOI7+BAmI7WPO5L6mTIjmdydi6fDG/FaRzLU9bUxp3KUfU6gIHlRgZiZPk7vxa+ToqFFOG11Nn89NDC3T+eRtIcPgxI4SyftZAP2wzpQUPAvMQCRlrMFMG39NKtJzM4R0AgQ0kV4TudL2D1EcNZbCs90Ix7kBs3QGzvMUf9Xoow9XJGs6DhiUm3tZ/RZ0q5VKQ+hJGusEiTBSrL1O88/qnV4/BgqjbYMjxoPKT7r/g+2sKuGQr/n31qN+D+UIoQ8hGxjGqvQZuMjndVZlBvF root@cd67e7d6-4b92-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIgt8ib3q7oupdUlrMPZmoHqWHpBA801gLbspgY50rdE4U34QGIsqId+mvA1a9x7HViMitVolEUSNxl/lsijkuwwsji2XHBeh/3Z4o6HRrD4Am7zxd90VUQtyhVEF4fALzxsJIbVI2Uuq99DXdA++HRH+Y5gQiXkwxHUz0FJw1f817D996l5aXDMsBmixUkYdacNUq3dox6W2bYh6Ka7vaJ/zDBfoMIFqLy7RGdolXitrkVIiay2NpXDTjN6TMb3SZk+OMwZOTmRrrrh2Ass9hU+4dy3NEwZGksY/zrenklcwHWkIcAWpgQupyVFTtRCvUyH1Vw7FsC9Ta82KtDZVX root@a77daf16-4d40-11eb-af93-4e5abfa0c065" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-030", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-030", diff --git a/audit/projects/k8s-infra-e2e-boskos-031/iam.json b/audit/projects/k8s-infra-e2e-boskos-031/iam.json index 1834e1b12b2..261595c84b5 100644 --- a/audit/projects/k8s-infra-e2e-boskos-031/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-031/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-217547755854@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-031/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-031/services/compute/project-info.json index 7ad42aec211..f5e3cd01ed7 100644 --- a/audit/projects/k8s-infra-e2e-boskos-031/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-031/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDxgSh2R1xfVlNoLPzc5VqYWGCbxwvCNeqsIfbJWLyMtW5r+yElK+iGGf6/Ac4lMFltCe1D0CVT3zZva45nmFsIGsX9SqlaDr9EDZIJIgER+8CYoZGfXy3G54VNPlYSFB1fYK6WgVIcDnhN5jnIOM0SXYR/NMBNaw2O0aMs0XJD0SKGx6/63Lh36TA2PZqOt7rnfTlfJMwZtLfO5v8kzdJZnGny1YFHUL1ftuA1hZPM7wYzIxoUIHLhkykbWrx/9+cVpLInWiuPx/ZnWvL58a/glVGPfNUciQdBk6WuvSbcxdh2wFIxSLKADlTLxyd83KpicEUTBCghd6YBm8FEVEHB root@1842dc51-e668-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDfFUDq5CVZmNnNDes75Igprs49GGPFLWW4RS0id5ovf+aLRxakCDI2Nv5hcxAAVQo/VxN3Fveo/pcVVvYIAJpmUSLC1+Xm/qmIqbCVLuPGnhZ+n7SQNdwbdQWxX14i5krRVppJYkIGHOmsgUtpUBjVi+FmcrbWQZtsar+/3k6VC3q2AWETmCLg9YeCP3O/aHEfgD7MWUWbsKujEYXPkmiLvm5IlNAlk2jInDKZjubV+oW53eO8OEvZf4SOngAF3/J2gHyKkt8DVpoilTgMt1iXlITw3rOgr861mBRdoJPy0AXFnkJLCgzEq84NjObbN1w1qX8wkOx7jI+bxicOkObT root@be667e9e-e7b0-11ea-8112-a64f894a1815\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDATWKelnu7f7M8PVTORWIjeu6a+2zYdxN4NvCg+0ktOEk/fgblmW0UdRCHRyWOE9g1gzNsVd9TfS5temdMze6XIOiS0OR2+vaHAeQ3TEy3VCCC2yp2l6NvYfIZnMbPgPYGnZdRCIE1+cSGumuSgkeIS+mj3yc0WDvEA1bYCVWXBWNqGzwRl/OXMGMVesWggiKPptFEfQCZwgi0uRCBnPfQdKDQfdzxPb9N7U3rWk2/2xWZWLPjCeXJkpB6LmvaqspJI08lfXcNY0V9nRx2PspwTdtTTcpv1912kCTwc/T1iW1iRPuIU7lkIsJ21B7Zn513g1FJDewOzfegQGj4r7M/ root@7b275bbe-0c2b-11eb-82af-de22b9665164\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDPKkLED6Y9rcD9v5lEGVrGxBBQhzXdW52JxtzKObUUEqy2BfwYA6JCQOmCP6KtAEd/BYWEN1/2oSTP6zUHweIZT9UtVXwnEQ9ExXQiIyWl+vyhhHbRvNjreVnT+Z1t1E7EzeOJpwmrgkgMud2s8KpOkPV2fZfuUrtUqaf32U8lpysG+PZeFDhHo3z4SFnjfw4QFyUD6ivg8AEl+f+BY24YMlWSLOTlZfjNWXJBhYoVGDzm7reA3S6tLkRQVWGDiuWzVNc1TNX55Y8tlBUkP9LtzjM1CQomUWGavZeH9skpN7B/T94dfPrXkNVGjscEAXwLVMUIq/Wce9sDX2OcthQn root@e961057c-0ca9-11eb-82af-de22b9665164\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC6CvNWu5j5/Vh0flzRjBM2KRoCOL0y5Al2OhrTDJRTRu9vRn7BybiBsnAzq6yvyIi4OwJvgPmdbhE8AStOGQZdg47RuAE5vHOPOozfm+1ui7BUNPeR3quNMKIPOf3lLjeTSg3aSKGiVVDR+WARxbi5tLQX/MX8G3Hj0mMcZqdy0DAJRF88EbZMKtE0i07pCbtpbjWFY+x51gk1d15Z/fr+1zXdC+1gKg0ZwAV7iFLA2/gPut2gv5qsCA72SzPU/1SYaXk4mjC+fFgZ+Tx6Ykao3Xr6Q4OmZuDumKade2oa40ZOvMFTD5qd8fRaDIdw5j5h6DvGRkNsBNAsnGeem17P root@7522c0ae-15a6-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0Fq01zOc4zIjPHJWzrhW1yzAKDPvkD1v70PMToumkzMnCqNDBG+ztsyKH8sPSgOgFaFu9l+fxSD9d4ZuLlQoUEmfgLIPK86/rpkFIEC169QxT5wVDm636tdQstpOLi7d+Qa10PPY1/lxrbEo5AbLj6Bxiu3s6374gtgMYmEd4T2661sMQdLTW6DHL979mYreAS+NV9N2uPVHzrgEngxG6mzxs4vjZZD1dmmIOEdq2JrBfXyKeh1eg7Rba4LCQv5ZHTwFOTBgRxGsbBVlNq0q7eeI8Ox1uyrk6H371RSuV6hPTtvqNI/ffTDY3oUhD1CLSOUMDVz5rrl7+Cwx4zAkJ root@e2f878d4-1d27-11eb-99f1-c6d701d1e283\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDM1gdUzrE1nkrUCPYt2pDnYe80vSmnOIcQg4Zy9bY8zZhFggaXNg0TR046e8Z9/Zao7bkLUW20A8EIB3spb7GhbJ/iFC9Oq4dwnfILG/q/N++FiqSqS9Bk95fNDgSvk5hNYRFxrbbFJ8MLmq0rrUXdHvxf0dx09FcHwHxY5nrPI8kdOcs99OIzLAI7FDLL16fIuMEvPdU74HveisJOf8/LzT8eyQ6b5od8kjbOHm0f9V5pYtR44okI3Q14LBiRB0BGYWumpAXBZ3AGSyv29ldN5NxN8v62b+l6q7kB/M3Gl6mooG/vZGKrYHlXQPvz+QbDD5zXS2da2+Nc3UBKwWQb root@dd1894d1-2050-11eb-bb76-36aba4894793\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDdfsKYFienE1qeS5v9L51VdZwSYTxpDO4WBzllUpVbkgfsTn0Qxyw1TLwAhTRqDUwGdawSIsT+rEhMIQBHUmT47hARUVVgbhBL6/7g0nbBVuWZ0xZB42GRwKq2Zzyjww2xw27hC0yn9YWuWhxrEg4GLLNh3R+E+oFz0Jbs+wzP/6zlj4SVrOmx3zExXubPX5slqOYGIs8vnITEdwN9Hru9DJ0vLdPQKE2gF4NOuhOnsqKfdAzbmZ4uynKq4Jvid3UAir+m4ALNOka8A+R+lUPG7KotGQ79WDkYLL1A3C02da1IWW7E0Q57KBkXx5zrFFOrHpySe4oQpIQ6dEawDm09 root@b861c527-258c-11eb-aecb-aa862b891259\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDojg+86cLKexnd+fWEyLyNQuI8Eyp339HPFfKLnqyTozkeXN5LOiXrNG32W6vpiciovNqX2NuuzTT7LV4HZKc7WVnIoGchJE/lOM5z1ZOWBJ4/kvEocEHKaPQ4EBQoAY2JO3tSnNWTemn5rJzMc/SJVnPRlZedv/YZSZUjIq0AU9uTgRxxd1LVw7m6/oHAkLXOv3zSGGk8qFTiriflQsG3x0ZY7mn7m0kmYCXzfUFJaQnWfMHTnf+1dbYZJ9ZEVW/75wslTh70JegsPMCEcRg/2ZL+lQb6yzrYwiP0KSKhjVP0OKpffNeb+ajbfAAX7ejGwaRu1EzaJkrfWbL439Mj root@b209e54f-4869-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIhqcNvZyzRkpAAg0AgD+HGZHlbYciEARNG4WCmUcNpVn71BXJu8UiuvQIaCI/hsn30pSu1riMVnKd3PVJT0xdeJ1wLwAhsuH8o2S8j+Ru1RmWvqqm0YPkk66Rzy73GIiDq7e89CFoA86up00B25oWtCvcIiBMUzcLM+0SsUz4wDpAlPOMx0NWMKBQUz87STQkSJnwEXMCM+cSApqsQTf+DWvUIIzZDeCEm0Evufwf8AKygqQW/j5oiExiUbW6gtwBUo5maJnfcTG3xCNMPOvt7snslZVyrgrzULpSSU3Vlh/l1UvXPr8bJ0bbTMQSzLjKy5x/IIoMW5JKhVXuJ5Gl root@1edc2794-48e8-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCykp5ir7cvURPCXWWmaC5Fj5+Rg4d6iDdM4Uks3TSxnpA3q23T74OOfM8IV2JaIYc4avxDqyaa6QIhP49419S7SNo6IvI+lzjJ39PeVtsAsXyYv9gkLrvaw94+7kiGlnR8n5JZPgxSJWHyq/eCubuuN1SS7bivWeP8vkkjbG9TzK7FKMjnQqDkf5UANL6I4nDYFhOI614eSFW5AHGArYf26NOFfronCosNRCV7Mtygbv3aWgsDee+iBCyLUVToIrR3h1/biWMPAWq85tcDW9zolTdmaRDZh4eeSAFF/A4iQrGSV1QKsnGRDrPHEqYggrgJdP3E9R+JJ3k96teazTpP root@5d089189-4feb-11eb-ae25-d6360d0295c0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDYvNgySF5BV9GR6c78o5pNisXp83spSf02mbiCHZ8trsmEXPbIZ3yySnFm0OuU7IgZc/WjIGOoCUbiu7UKhL5Xy3TPUuWNru8NkEzVhYSHwGB685zyKFH+eVPytasQZpTETCn6NT26q/DuiVfahnyIRWc7BGEL2owqbcOHAM0MeSKx7Nptq03P1LlMGhqnalKSl5I2szjULMlM4iZf6aFCAYMR4+DPhAyTm9mPMqHOrg4h6JH9yKwenpxdCUmWbDSxX7cjQKzC4GVJWNnm4dYFyF0V3IC0jahuZJeP+rcodFfuGihDaQu3DOBmp+WUbnzkyyFV3/GHlxKt3vIMbvSb root@45223377-509c-11eb-bf1b-5279f1a59a83" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-031", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-031", diff --git a/audit/projects/k8s-infra-e2e-boskos-032/iam.json b/audit/projects/k8s-infra-e2e-boskos-032/iam.json index b47f94f7a95..2ae628412b6 100644 --- a/audit/projects/k8s-infra-e2e-boskos-032/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-032/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-900987002307@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-032/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-032/services/compute/project-info.json index 747c3f7ed7a..a0b13b6e1e9 100644 --- a/audit/projects/k8s-infra-e2e-boskos-032/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-032/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\n" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDGrkaM/dDy1Tp94hJaJZG0Pud7pco/0n7hBj90KsQmaC6PK6qfw1q/MLRvHH2J1lkU1IKwxPSIQVDiiLLFA/fWPwKlKdeziI+YaIErMKsBKk46Sei4kPtUZXATlw4GUqCecQM0rfmFIDYWOr0c9rjp/xAwlqXZi+4Ws508MRMl2DOO7HMvxYSegUPEEysvOESfb0AV2iD+oz4VGMFvZWK5GnCS89W4qVjLYwPPSSic8mNkfuaq/mVDmG9DpSBLRyPZSXQQNBjexvYPuKZiFpnropmDV2uq6dn6GT+odJYt6ygiFJSGavbWTFOMhRU47KIq0P3F9V3v5dReQ9KSREft root@81daf5b2-d9b4-11ea-8c1c-d23af84fd26f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBrv7bGgLlbrWfj4G7rzIYots1eZwu79mffGExJx/aQzDjTEu0DWYNyi1iSe98OF4KfCJ/OfbZ+9spCr4FoLqnDhat1ukGv9TnfGV3D/EtmB4V00aFmFpoPXzvg895KWmObWT+NfXmg5TK/WaOt83l1FzBeWN9V28qYe9bpmL0UcJK4KgDt6roaZGiSpDP3PBitQQsdlN5GQ1OVbmDN2ji+vWXaCbCbaUraBIC14sZQxEz80Cit/7tusoohyZb4ZF6LhCtyqrP0AQp41d8GdVstwYY1Lu1Vwbx/oFgRVQ5Ufm8CjCzCyd47Sr4te4DkY3ZtTBFNGr2Wu3BKcme+acf root@a3023c0c-f038-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCimlA8BJV8vxftBWx2FUNOoZa1qPdknGPFTXx3RM8teZ0clQjgDu3bzDjD9nCAAWGiYnIYAmxiFYEdoNPItphW8drWgKcFoitbBpe3myQF850k4GUjWgkLSeBBp/FV1idz4crVijsScUObp/ojYhs6gP6ChEFIpgBd91IQ9qpDqQ6SC7nbZ8aB/I8OkdFBwCOWO8V8IU9SrITclcQRt7PFvM4fhfBnI3N96xRZMeQz4abAnOZSGG/++rgOc0WWPpx+N1YfyqAzWCdNPxZiX93fObFl4u5m/hZY1l/rofniWkzAPOI8fGA8nxhzBEg4lCNY5XSaZYFl3VxYuG06kUJ1 root@618cd798-05d9-11eb-9dc4-ba187aea6a9a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCudxcyzPMn510JkCsyUx1a674TQcjUopAP7E7y4Kv+97kEUu2vZKWf3UUjceJ6M2y+UX99L6sfSF8HSXjBStbgWuVaSTmxu0Kbed3iUGNLg+0U3Uk+B8AeEvsAt+kSTKS5PC+ZacpM1R4aTkLyRHv420/7KTT6tbOc9L7qnECGBfVIgRSVl2Y8e2mcer5WqPwEoRDFJTnRNnNV2SgvJ5tHC/HQe6ZUvGHgmAMhNqo4hd2S/uesYwOjMzlCx9h9cYfTxDdwD2Y72llHpM1+W7R/ualTB9nHRXCmiY18g+D8KE8nDiQV2ls/utsgYAYY7EleCmbOb6NiuBO45B0x1i+P root@8986fc0a-12e2-11eb-a3cf-6ef374375bd7\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDgsNGvV+XbKE3GkucjYj9fK8ABmBsePqO6yxSRFBkefrsDEkvLCuqKiNS5FYdQRcdtTM3tPW3dMWO0E6+Lnx6cB95Hrwl4F2BMzYGjJHXzUY2n7jrxF649yqxo3HySrihNMXVokUFVp5Ri3YH3q0NrfkLKKr1vYS7xG43kllAHmI7LxjcFqQGMHQIg4zCTYx5mqiPvJO0nL3NXxJ0Mheg9swndH7OjjfwEFl1d1Mk7PSQxyCCzwu84yukP28+8/q/1gwOWw+7qTG2AaaqrD/TWoMBU1ecaEUEMOn2kyKvrSj3Wc1GTY02wyC9d+zb453x9uO1+ONxjC7VtcnLhSM/R root@7549ae19-22fb-11eb-bccb-526de22ef413\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDpyFInf+/kfC1q4UC9PgnkPM8jQOAesdZoJNKreTtC3hpIrSS0sQat6XqgCBshL094lr2/ug6lh5AycZsJQVU1If6qmDqQr86AoL7eWWn1hOqG09OmRkNYyp2C3bICw2yfGiaO5t+D/7Zl0YuM5ZNYGiDQqNeoVCAxeshRRV/dWAxDRfCv/Apq6XDYDQaFCeM26LhHN8TDKPGLcPllxcIBwAF2rOj+QGR52sl170u08bFkwy2BKFvONoxNIuSoYB+PvUB0AtEeT/q24uwGkssUvRlYpTSioyBNfskk1wTpBuAycZ0p4dacwBI2KC9CmjspPnRmRBExXM5L3imE9KtZ root@4ac70b90-25bf-11eb-aecb-aa862b891259\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDb70t+lPQUonzaDyqUIyGjlsV1AnLWMe0pk0njeuJio2UDre0G4BPXHwqUOVF5G9yJhv/4HoOMqDUsl4zGYXvNu8Ro1SHXlO8qEnnNug0hNAaMyBRk6QcqUnRMNXenhdYdtR7Y07a7h4H512bU6cb6EWKYPpj6dbI2DEzGDWlw7Yc4W6RoEojzLRaEwSdI/kvrz0SKiKdP4Zi5Q7kqI0aUXWul+Hdhwa6bEkbxfWcx1gHrGXxCKyGMneXRW+EkbPPGXQ/rCMdR5Oxb+TeeZ4kvTLs0gx8DWsHGO8f7IKkhdyPEh4KewLHyeB1z/pxHKiTM+Mbi7AwFXI4N6VVMSNPB root@a6d3cc46-2f9f-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDFcrCW5HVmeNOGymMaCDqRqgh2Wxje+IupevMRep1a3BzZ6VsiNjnuSTp3i2bOo4IV1ogu5/KqqTo4McYx7iZtyJt32iLbGi9g21T/qMmoj+fYoJP30DASeWjrDzm+1/kyN++wT5JYK0I4zbajQFUpc4MhaMk/424VC91Ib5jM4qmUqi4cIbkDY7jjJBIQp41T32sK+aXRjad0CntkCzv3/AnPQMZEY5p78E/7Cce60a9sgeMEYMS/HopPbQpVHrFXXBNetaDYuP9Ycwnzt2PWYCa0oIDi9VLlmy4p3ST8rilqU0XcbyuIMjjZMeJa3YxvREkNMD8uG1G7mhL/r3tN root@63720dd1-50ff-11eb-b04b-46165271725c" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-032", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-032", diff --git a/audit/projects/k8s-infra-e2e-boskos-033/iam.json b/audit/projects/k8s-infra-e2e-boskos-033/iam.json index 13c3f1aff73..dd5570b3c81 100644 --- a/audit/projects/k8s-infra-e2e-boskos-033/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-033/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-452415549210@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-033/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-033/services/compute/project-info.json index 90688e306a9..bba948f2956 100644 --- a/audit/projects/k8s-infra-e2e-boskos-033/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-033/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\n" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCtoPasE55ac+L4xIhdB7kmP0+Iym31Fj4FGGNjMuwdZIo9ZccxRFKsqxqOREucyUrq8LSJWMs41AVodYoblQgnW70RdUPMfMv/9hEjs0X3H2NjkiVvNvHKlkna6eP9zOaSk7t844rN4TRhUV/Sz0t/x1+9aO6V4rkPISMiELyuebuNeCfseRc+mDL3RgNMampJXcuU5rQ2P98Si5iFZmh0u4U5x4kKAoWREbCT23S6AqMc92YGCLPLALTUSrOgJBjNrHE+g7WrVQZVWdmbnETn7e1mjQXjZylcbV2OlvhtZiK5Enmt0nHXOYa2pppsevvYjBB9XwjwiS9fmQvSMvL/ root@182e1d5e-dd10-11ea-9424-2680bd79560c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC8tI6P9xd3AFQIFDOES25cwkNi9NsJ9sf0v+3dNzNlUF7SWQJXQKkRvay+QpEbfpZT5BCKNnBarTTayTKUpDPzCRm997feO7AsZ9NZobwvnxgJ+XFmrBU5jIeHwJhP97vQnaFvt37508HQVwEjHt5WXnHR8e1D3Lz6VZ9Xq2FmyAJXU4ETx4s3Ga3dI/YpcFUSU0iZf6lRbEg5hVaRCQsksbw9muksGNHSGxBQFP0SjujCIOqZ9zvFIrUt7nAsMgETlrwMmMsjdne8FsF1sTPFh/hTNJoxOauVR1nVs5XnJ0M0OGRv9XmWMcl2K9NfdTFEZJZselpjLf4mO/+h3Kmj root@4ec32491-e542-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDFul31u80tVS6t35k8Ux4BP1583TB4/JAX66neNQBHndcER4Vkz63XMn8MQP+yhP3JCHGSCkWfgwRV+6ssQIPvm58jkt2Ien5xzAT7PREa0mYO5gaL4KDw1aFkjFdDZG/5Gad7dVlbKKqLeXg8SsP51V0vYo08WuSwNmEU9di0MxWG3odv4M2UbSM2udXYGkdcpw4uNlQoUbQ7hmDTVBuo0AwdDflDTnSDb6TWsxbKoLYihNV0C3Avmqa62UuOVon2Ct1imGKT65DfZdl/WTssEx+pKb1O5yCh3kZAOCoN1Hgp+YQ/xNf50iSYN4JbEtZ0EJqb9I75vzwL+nPHxrWn root@9258a16b-efb0-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSPrV+KWE5jLZxdhwOjdIceF15oWt8X6uRs9OBzJGNem6+5w1OYbM6NdPYo4BqPo+v88sqYB2sTQ2P4DtlmMnLk7ewnYBeRl8++rlVjw+WHaEsyfePNG+90Xta7y+MA0o5C3HXOSFxmGVUJqA1sdZJmMeIzBR9jAHTcaUcvOSZy+Y21qnoJVc09j+0FV3eqQO9dFdDdeN8x0bfDqlUoXZ4wPmu0ObjxIPev3oxwCrNURq0KaqTQB8FWS++vIyROQt9JxD6C2lU40+oYZXOpqaXOcolouq4lP5Wxer8EWQa8ArLKuFzoRupIViK1o65Ls97iHP9gYMSdbZ5yonVwTd/ root@ec32a52d-f315-11ea-84bd-b6fb6d83c68d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCfxMy2bZuMul89/GQtgpHD7WIsQyWBBz7Pnp6eVB9I25G7mtSCk4OuUUAzatlrS69HkbbqqQnKSt1tUgVGG+E9tZxRIvZ63lMNy5uRh5lESNdnfFWB/jxv2qhj4tqoHusJ6Scm74AQGMQhGBEQayF1QupviFSJG7WBYISp0jAYXEwa3CuqoAr6/MgMxql6V1uLrkYXUJFOoBvsrMNOUhMXT9W4eU8nAAyoLrmB3Mza9GvKGZztfUQVG7xBSK4jrzgXebHR7q6+2rjf680M8prALhUT8D/GsqUzG+Q8VaP7c0Y1FGXEskqrWQ+B0YTH5lsoLODt4taiu4BJAQfWH0oh root@5c41a1fc-f422-11ea-a379-bea988342348\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDe6t2J+mkzkCqXs8hMbKCgTiCwBLz45ynHKsCSyOuKck3iv0F3hp71y4CIYcUonQxZX7L0BC4yqgdiCSZz1oH8QxDTaJ8wi6FQfrgbNEIKZP7E/O8addeuh0eZxJliWkBhPau1DOw+mNj+w5bqCnZYDEsDtsRVa797gksv4PUfoD/93Yu9kT6+ZGzN2cj1z9eeJbsj5+A14TYxTPAbCKSA1gDoa3lfKNZ3O7b8f3qpBzaTZ/j2jBYVjN8mSiHdys91PXLFexVVCyP2jjgQ9LGelC6FvsR2/bkb8NqkVCT2vKjacOUnH/fAg7JtVjwmqPFfcSeohpMWYkRx7M/7YJYH root@a5825fc9-f73b-11ea-ae6d-8ed64f3416c0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDM6uZsgqscbQ0HCEHYR034IZBDxrRIP6na8oF11rbDMWPXSzMgEgxpojX545NcjWEPYxAn/sDku4jUJo0D4NVp2avoac6G3FIT/bCBu6ol74pzeqBacGoh7KdNBHH3vX2HxeYhSyVNQ5Qya6jw0yc17YQC2rS9HRSW9mKQ+woAMtlprzclIflGz+EGCAqs48DrmbhATgRSRLS11lU0GD8bBBdeUCNANe24L6VzenvwBPVXy0grLKl3oBL0LZmSdDp2UcgSmC1Wb9Yo5Zx/LeXhVqn4+CyOb/pODtsVi6CgGX+twZfaC6bPFiC/M259nheTWV4G1OSyIRZW9x6siezT root@84458ee5-0264-11eb-8b6a-ce996ee2646d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/3w3TTmLk4RchqB6ePTw3W4Hv/RQfp8Jm3OKgQ/MrEzwTK+5gLUKA22vEL4GxR6+Zz1b17sN0aKLDGrwmZLlD1kJqXtx95lBOpn5s37vyU1xsPS8WaR8ksbx/uCvzS3RWi1dwq0ecVwoVqTFZQyxeYQCa6DQraPJFj8gXnDqBvHm7l0VBWMAHdPDO5fkvGLAoUoJ9oHpxmx9eu0nM4qrRygPhCTR0MBaq37LSUeJMfNYPHtFTi8HjIjsWKSDHIvGZXwfvtyW6/mCvo4MnKhtOQnvwmRWGIjB5IgRkcxPZCsMD+4sLAwwq1WKT+D8A+KYQyHNLMT7wbvPAJ4l7+M2B root@93b5aeb0-2527-11eb-aecb-aa862b891259\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCdRY45BLjW8fI5Xz93XPSqEtSofd4gkek+/r8/6VhfbLTTdruKHH9Mq1LFEfHVy3U2Jus9qfXD2a9cMuUBlkka7sNR/52PgBg34yyzp+Pfksk1gmOKLiaintH4p7DoGWBeyBVWT2+dUdA31f63KrWj3NAVhD50gXBO3wvGGBnMjiA1rcjljH9CmMsZgFDGCiHDemBQ8ul1Gfm8c90dgAUiPw2b1Hvpm42m84mCszP8gaXOpX8JhvUYjWNX/ukCKjJeWXqZSVl72ud/IuwXWBX71OeH6kxeerusNb3RThYgejlpqDsyhPHXfstBJ0iHyppP0NOUeYm4Vj8SDgB4zjjx root@af969e8c-279f-11eb-bb1f-6e397dbce9be\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCep+dLqNm07nc3HxvmK7DwTACBPq6SoALVJk1tnnc4CJwd6983XqThAU8Ta3PMm3xsxvILIYtMV6bc2BtLSBj1LdLjqKckp7S5knKgKhklxvZHvOj/e/lR/0sj7HTGLZDK1T2qV584izY/LhDZSjARd2i8nBSnSq6A4Sz5TQq8wuC/6CoTSeoNrx7PVrCndYU1gTDHnGTrMs68U3g8FA+pB07sQ7uTYOA/n1FQB1p4AYe+xenhybx2Gs40aOdyCFu+cGAR8WI2si1LX4JsXHW6LQYf8CumEdUX1b8SxIcspcHIV4sNS+g6qwQdeOWPIBX7owosx2oid0PYxtpespg9 root@321a0c1b-2d5a-11eb-a59c-42dfb897bae6\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDTsJQsuJ85KaXnoTUyy2FOj/tudqrpvs36CvcHkSLzut4QvIB3P1TzLbVOu11ez3e9Y8nEkfBdSkKkj4qsadctP7SS1fVG6/qt0e9T1H4gL0Fi75GBim8oLTLr3azPMu24Z4s0gN7vnD1a2B8iuxwzd6u0zf6ipvNh2CKOTXXD/ZzpDSHTVHNWGk3/6O9yDrHvMyk14CIrFfZsYjVplUW0GVrPS1o/YA7JJZDsn/gYi6UFKlQly6Xvm4/l8ssHB0eyJzewokZoPdHVsELuwYfUT9vAzjKxPKKRp5CtZfQ9VvFkMfsTvnH0bRaTUPbK0FQlixycCBk8b1g4XgV8mDK5 root@3ba6467d-37d2-11eb-a25d-22a534811c55\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDPzeht9VJfmkTYyxn4DlIeHKDI7ugeGpJCAehbsAxpWDoMBeWvHCeax+zUscS6yjHgdaEnc4ynfJXS0PxxywFcDGcGgioIv95B45m0RvVg545zj4kFWqr37b18XKG79pFdMJTQBP5hwx9J+N8fJl4WzJjT2W7O7PAAiPc299MfqM7GgNpD9qjbKHSi+pcPgXACFOJ96Kr6ycGHxemDErzQs4LBLCLLPlnorQV0XwBeI+AZLvRq7BALi7jkoyTsXbaqBq9WaVI/IsHPyzhn408LMkOHjsI+daST+hFNie2VWqd7q+fktijgRx75TbDXN16P8rinGdCDA4DSgGVZTwS/ root@6b15ad1d-442a-11eb-acd8-6a2a49dd8a76" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-033", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-033", diff --git a/audit/projects/k8s-infra-e2e-boskos-034/iam.json b/audit/projects/k8s-infra-e2e-boskos-034/iam.json index 888fd45b3da..016f5b6dda4 100644 --- a/audit/projects/k8s-infra-e2e-boskos-034/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-034/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-1070426771515@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-034/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-034/services/compute/project-info.json index 1cfb6968bd3..4235ba6f817 100644 --- a/audit/projects/k8s-infra-e2e-boskos-034/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-034/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCWIYqJUKuocuEKZ3uJq3EGXsSsAt4ThmODdJpnYH0SMau/qBfm9ftZGaIenzDq0meeNnm3Ope7jY/wSh90+0A/1Pc4fN4TFvBFXnaGRkd/pDKftB4LebpFHKzGQ7VQgc640SQ2E/YXguoB1aE46Mbd0tBjp02yfyBM9TlkSI/kDnSk32YTJG7Up5fD1LBTJTya2fqRzp87XDqxrr2XxWXxdYfJdBnvNEw8u2xL5VKIPVOp4IA8z995XlviOsdh770dVnY629u3QUWJQmRGgtGQKa2xRhOfBQ9nogk4QK42bpmv8lAQxqvZdr0uQuDdITvR3ggcWbCWf2RUpwmn5qj root@40e8592e-e945-11ea-aa1a-c6580c04344b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDOTAJRSupdMJ0okQrR80NeNOH83M2YeaXqD3x06YYRj3Xca1klbgiM+UU9nOtFlhR9GtnlNf3R2ms2V+ybhrnvmwK1mdyyGQcmrXBe/k+RR3cgNE/qO2GwOyjSbjaJcpA8KzLylNz7aMHzyxISHc+zz24FwX3g0AU9reb8iUlb4PulI0MihQqNx45jsVjaDvl62uLztn1HMnoVeBxH734kzjEUcOJqGyBsM3SyALBre/Anr+BsanluDNs91G3qJ3TuTNGl3WEVArZcL00LMKH750JT0bhTS0RlwHoNvPXLh19WpXw61H63fDgXYGwzkz3N6tY3XYFBtI8VzZhAVqd3 root@ebeddd18-f051-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDA8ZKT/avzKt8ByFygdfL6cL8Wwn9iZGGSii3mrZIjcF1km8KEvaAfdjqGpk1M+xbzREv8lPpb9UIYgtTcLN0gIpWu4yj5igG2fEztVd6aVKflNT0TaQ1QzwpLCoKRMFGoHeeBMOZDYlXXppByDZSKNzRnVxPCfhoRJ8j2yoD/jQsFug7zSsyC4DpqtnyVohwTD3eGX5OggHAeugHPLcjM9o16Q/v6dXTuDqmMDufukXSGwetkIQ0lGScQdC1y1whpVicoDZpmJC0ZuVoyZ07R5oehvBniT5aHcjS/MKKK63i3CqCa9C25qdH5gLYUh5KNwXRkogzjLzWnymqBLkQ7 root@47aa996d-f1aa-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC5UZSRq+31RP0VTUgTYcpOmgyz/j8WLN5gdalwyZ5haNJQJsmDWoA/Ijte+mgMharWqvhlnwd5/sjeb5R1Afon9nJa+LRqPt8WUDh8h+Oh943elc25sRy1iZ0TPMbhQAsAbTMwaeOdOyQhgWjHJFSM0zHh6KdP91aItbsW2KAu8klHE4qpl7zGOjq+wGPp34+U8bIYkBZ/Vo3h77/lIdgb8s/ND6QHeg5NVAXJ3Sb3NqR/qYgJ82+NEYqk//O7aIvU3QRpzQhx+D7Pz+ARfomsFqUgEDEyCb3lb/glWPjmGxGvOXinlq+8jD4xLqvob0HN/gV6N6NXG0dxx1puEixH root@9e32b4fa-fb15-11ea-9c73-86173d37727b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCc9CwwIRkJg6mD8qyC+MlzdH5/+i2DEda2P1gnUhB/9BnFeD8DWpGeDmCw8oAhVZ4Tb8C8QCYE3EjUBbn71urczyTlBT/L8b4ELwpNQRVMvre1lFytSeAxzDfH4+tPEf3TW23clEWK+Im9gE9QCqHrVe4s34lgSceMTvaJU6Oi9Q1lRLa1vZu/hu8Mzv43kRtffWp3vDGaAvxvxKAsVJyngipj4W9UOxGp9q1+P7/9k22NNkubwzl8XSG8HcTzJkxAqn0lXpr7cl/1elnzmi/YkKrhjUnQeNzNQph70z4gqPiNdE2QrD89CDFH/cK2+gRQkrjjC4WvI5mMKRMa7/kl root@cdf10c35-0708-11eb-9dc4-ba187aea6a9a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCnCN/NaLld6SXX04oHYxyTcWZAjecTSEo9I3Bieb5/RG++WccgY0VtK68FYwPMU20GFCy3OGjtlDkzi6w5AUqdXW54ES9SC21K7T6E3LFiCXgvC276EJipg5dH/zzDPkTaol74aSoBInCVqtK5q3hJ6HIsxNNr1RfUVFWxL/geuGF/s0nuJcGEbHWGOWg15/xnrfcox3j0NBaxyij1RRjzTR4p2lqSXOa2cte8mZhTbICz4N7BIw3G/7gC9x+Qj4KD9DA0OwMU+Rw6xbfZ8l33szO6awbmpw/vlLX8snh9Te4UKCxuGwzcWWUAp98ba1EPFB34+Ir9GXFWJhZ4XLcx root@878d11e5-0967-11eb-8b01-e6b73feeeb4e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC8uwO6Ait/Jd+GznkHXhduO1LrT3NgQgL2t1GhK5cEhwbnhbXeCwsH2x9PEl+sUT+qaRbsX+R6j3MMZFt7SRwjQrqItS1u33AQJBAukoHKNz7/M9DpVKm2tVMQQdPwxymxA3W/0Ghlt5Q6qLdBtr760TxdMI5JhDqDI/FLXBlM9+aFrFhWGAzqBbVO5/OManXDoxpJ3dbLaHsiR1nQ5teu/DrWMT9jEyi0q46ZmUwfgZ74ACwxvLW3ckHKjCBluwZlEGWFHT0UV/avdSFgwHkKuaWfhWsMBPtVhlRB/C2BYsDBf5EHioaL03FGInI/qeLbgi7LZp2AWQs9S0r3Sof3 root@a4e5f69f-10cf-11eb-9a43-0aa5164aad51\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD3OiJWmwDWc+qE84L9MyAjL+MbtXTQ0Q3bhWXrxJFpXeotlUZ6J3cyXcha7Ku5+Axf+Xk06uT6IJXpj2RwpF7neSvJjapPU0ln6Rf9WSuILjEc+RliIiNbBWGrVaI5XiSAD9KFj2uCBDjdOh3U66N8phswtk0wCFJ5i+3YowctQwaorLTLFtQ2ViWhhG9Oolk64dexk2ARUyOw7aUQmfMqjGWPpUoFXuiCyFISCCm22R12a+PjQyw6mqz1+Im2FMJ39j86BhKLJleClbUYdenvgdBwC+gWBuU8WrObqHWUnM3vwqddBcD3MRrWdfdEiQfuD24yYfzzQd/9LFwfZgsF root@79a8a548-1980-11eb-8107-96bdcb308f91\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZ5tAS1W5h5WbfPiv9yFtov8euLTKgxT2BFgkatbqKTraDnGkVLKCL5crv3P2BL0L6+KRJ0OoKwPj3k/JyVlaZRfcLF7P+UKV7DrvqPzl1FhEslhjze9KY7McZUORhxzfQoZ7Q2mHm96AIYj3fCP3mYf/QM4nOBNN2udUcevWWeHtRVyM0TAPFqjJaiPOvwmWepMFj5nhhwWe9Kih6KvTjugb2oFxj8QaFNeW5A8a16wP8YwuVcoGgc46AlqmiDjCzVXjkt9ZIHDdckW6b+JCFxAgRXd2G6LxU73w7UMkrQqONl30XRkivY/F4VgmootaGVZO7tjcoHWp7qj0L4tjN root@dd3adc28-19fe-11eb-8107-96bdcb308f91\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDVDO4ypVn29fN3/YkHmrPQBuRApcyQzMXvv/DBczp+JC5/mwRDfGqpbM5uc2zf2A/EPRW+fr790MVFwpmhDZ8WUWrPOHv8RaNHXN5E1GDRQHFUT4LJHH259Iym9gcJjCryXOHNw+fHMZPskL2NU28N/GRdl1yy+4lDuoiV1GKsizUp6dN1TE1UVmjWh/UdT4h7rRrg+36ii6AwT7eC0XYGfaD5DDYcfewylPI0Sap6md5HFuCfrtvNcy+hzKJSfbZ3pgzaLusAjb9C6YsPlM/2fPcNPK0ZGSGCOcoJbh5LHBKia5oYCflfpCUaasY2JU5bHL9nryIX7+oZXYes1Z/1 root@38e3f663-24a9-11eb-bd88-f687e5d66392\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDAMpMXfmfOgc+8tiY/hUo696MLdVciaYBaGz6733ERy0DCgm/qXVTYIMZoNu2EBS2/eRzIYSnhLyGwM4lbXqhWhPjHglWN2H1wiGs7Ok1ULYWq46LyRzhbo+UfYMw8wIzKc2BVq6GRjE2DzTHFw5yZaCdOmQWvElf/zwx7XzfDH1UFlnF88QwvXAXSSOAAkizASddJjNcJL0OZCOSqoAZKYT7yxF4ia/ZZ6/gN8o9iVLbESN60BYvzEzqxvvhylD9m1Rop8wBW858uej+cum6kkbpCMp+EuoWasLxQM6JH25fBOZMRovgo51MeFp0w2D7GdngR5nxWr9rB4pLFdnvB root@812ab2a9-314d-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDXhxgz4vxLo6XMJ0E3TiQGihC27PJlLH1/xUXrGCXMZx56ZIgBFhrJ7105mcfb6grwyMGeyg1RnSUKTA68yRizzYQ9yBtcV5gjFmnmefyE8f/dYgXbDEsqsnKFGtgm8tjM2UNyNg6hPOsNOZRYYv7Wa93U//tgQzR89BqWSmu2T2ewtCfQVrYiZVFZliGg8Rf2MAImsnn47lxtpjwnclmsyUJGbW/98Xetf2hJE8cwCMoQMA80JuoeaCwf5MCrP8n2o+x7s9njGu2Vcaje59tppQeOnZyNH7kq4WyE1YdorOp0sgYX16kTeON96OEgVTpcGbcaFPPX4nBxNDSEYtjB root@fd60e839-450d-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDkhfbs9KwCQjpR1m3brWgtvVRi0fNegPX5rBhwjEYmJpbk4fcdwDEmMbZ3YT/K784LvYMrga0O9hfj7t+/13v9j90wt+x79u35w9QfbT6V0cBKkoEyOGM4UE1SgPGpDBMyagfktV8Rn+cYCsoTeZlxrr2i6YEE/ZSX9fhmXnauLeWBIKopg4RcwW7YEkr6garjdQlf5+aOlUdR7dzTtfs6roSOlKotLIRwIfxS1s702B1n8CSilleE8zmEY/4vOVIrT6S7huC8PhrOKZCiCsIVx82hQC8aAwfC895wtdZG3PTjngjCwqtLUjYeUXiJsI5PfLJMVxlo47UD56UeafDL root@8dc80402-46a2-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqe+LjsXoGz4qksESE5T0Ur9JJqTLcbYbkpr+FnP9n/jpnL6I6069UljSJ6c76qvq3meprUYI3kDMuoBojMVDFgXyr6ejPsb7sWwR/h7t4eRuvIRO1bnGjqi7PSxL6WY8inQrwqDrrvDo5kp1irhB50Ox2Wj20KM08xjaIZOvafPz1mZGuLT4oj0+n5rfCPS9lF+I5H2WqK5dpAP/Rt0DC0X9ZBbRMiMKiB1+ayZm7PTR/IeKN/XnmrGhdQe1sv6RvcNUlUSIGhRxkUzbrdHBy1HRnHuLuzqKtciVag5fwTxPfe6IqxhXmkjdnAQdn7+3UresNv7Q2SoeeqrNfPokt root@3a1d363f-4f86-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDA9wWLVIA/yB7fCiPnqWWx24zwUnIs28fELspC2XTiBQKz5NnGWT7BEixcTD/P8P4GRgkfMBXuZkfPwbK5re/jUqf9Rb++UDvD3rM/kVid0gEPMBnsFR30kB70oLN4tbUM8Uu/vSvhik2uP/Di8TwY1SgzLi9zqxwzY7zGljD51Ola2r6YAZP9Kxo/w4AubutzlbEyYJ0dn/NU2V+X/wU0TQZ/4M6IyilblYruhewHFjPNfFuKZ3rB8+EVgekxNVKk/C5X2bWnef+bmOoMf4JDk+r2S15/Mn210jiTUqPf8yefavSyr4oCO13u4/bvPBQK6WIywEIC7DCa8TjR/LOh root@7efc5a8f-5540-11eb-b690-769430c9414e" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-034", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-034", diff --git a/audit/projects/k8s-infra-e2e-boskos-035/iam.json b/audit/projects/k8s-infra-e2e-boskos-035/iam.json index 2dd97fedaa0..2d0de6cbb34 100644 --- a/audit/projects/k8s-infra-e2e-boskos-035/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-035/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-601616359157@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-035/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-035/services/compute/project-info.json index 6330b15bbca..f1b91dc662f 100644 --- a/audit/projects/k8s-infra-e2e-boskos-035/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-035/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\n" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDOhXELiyjkt+XTW2qASu1BFCyh2DYMGwn9/qGp/FJMWYsIkMs5WFonWSbjf0MTs5j3bi+mxWm7Fso8wVp2Mbg6gvVX5xDytKjJFUEDPXHu1lo4IV+T143aYqNOvCajr/okg6MHKQ1T/IQtlY7yH5iuz51pQ04+PK/Km+cWH35gPoMAR598WNyd44AacjkZ6g7s1UM9IlWQAyLU0SxhpLL8f1Jh9envdO2C3R0yQTo+j2XL1B4CKOpRzxLRyHPYaZI/dA92US6Cf3BJ3RMn5Se/5Sq8NWxWNd/kS+AQ7wTI4odTZa2MDcon2/uYxkV9pD0ezoqeHgOLJIoC4wTt6Whv root@0542e298-dcab-11ea-82cf-066baa17f17a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDUavYucYRKKtwDrSvYaK+HFn1d/gFFmFKWG1OA+9uU3ytWhiuh7hfTF1C8SKjyvQrJnOLfs9ZoPavVkBhQjVl1wC1sX5D2Gm9tTrUD1RI19sja+Y7q4t7DhdXBPmGcBlnT8NeaxY2EiUv6IBQDDHOntXquJgR9sdE2JQullZbwRUPlAhzMpgtjW1DXdiRxwtH4rUfhb60Z0kRkAXTNLPCBub+NyqJSgtA4zwnpYGg48cb9WZySm2pBS3FTTgNtQuQA2W7ImF6m08xhjnMHVl6pKC3NhfKaaPp+OiukcwcSOi99r6CHOGVWrw2XEcnfdjpKNwMXCg+mHZIaAfU6vVX5 root@98dc9cfa-dd6b-11ea-9424-2680bd79560c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9JvB1ZFgOR7TYngK+UFKCfqkCGK8779vgIAii35wjeHLR/1CjN47smhYKSui6Vk7VWXyVETVyHmtMKseDR+k0H2dLvx5+wfXbsaVwS3HAeDmRqOCOBqvOr/0xEWbwYT7dg1USI4mpHpGbjYpUXj2ihVC41oFu+fiqe9IwEFIxs0p5ZFeU7YD1qkvmWG2NvEtibDeIH+Iy0gAHyrhZ6Z3uWzaRwg81MiytuQj7bg2lY9C3oq07gRFRDfpSwelzKJv3ywaRG83yjqX+WBDzI76KV8CfYqyQ4GmMcXLy1EB5w5k+9iclrkWxgkG+nPDwezyHwN+qUWBWuJ8iH8PkaIN7 root@bcbd09c8-e50f-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDID91nG+I/8fMhn9XoqgEDVcZOQODCdhZR2bbtwvsEmU7PHm6GI9OJGODACrYpFNZxVviF+ZwM1SdzHNG0RjTrZtKVx+yvSFzqL6sEFFrJMpHsJvSrxYpETUEf958nxxnqRwzIKEphq1HhNg2vcvJ36VYSWjACYc49bqt9kvAZ+2ZkO5AyI0AqPbqS0dGZ/sxCxV4bSR+K509020nS0p2Tamfdnh2pVYbFj5SOOTFDaLQyyeRF+QdWtiDFzZvddF/1T3Gy0BeiOyjPAPobx/u9+NsUMstpYgchEqZHD+VzbM51S3b6sPeH0g41Qm/9qcrSmEQPFsjv+Np0D3+zr8K9 root@07fcea2b-e719-11ea-8112-a64f894a1815\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC4Gfy4NBc6UrfIo7anTwTZQUlMs2oPdwrDOwtO8MSVfJbZA/kp3R4tRQRBgmbshzgIhKHn56tqP5Xv9YS7uuwYxiEkPq39CeiDq9oXnQDUxaaUnvZuZJUtfvZ+veUI16E9E0WXqgRmaEhkQrDPxGW8Q6ppOGGTVhJzE/J6oVlVvom3Jezqkdt2bUcC58Aq/wRy1/9cFn9g1m8y/8PbWEZeWXISYzpLxtvTs/PJIAMPr8Mxk8vPzGpKXqfUPMVJsJ8uGQmUDzZSQr7YrAgX8Y2nF+keCb4gijsMSUz3cQ54DccERTLscGULtO5qVcfgSECQAOF8+qZ0NVMYMG5PsqrL root@65491fc6-e981-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQChf27r8g6D04KkDtrJXLQNAmyU/qmcD5GiyJC/h6FODScsXf/tE9QOpnH+Aqbdr1u7resMh1Mtxoqjfp1t5tsFtIHeJZ0hXOZe1jLUVNWjB72C88Tf0+gGJrlf1uJtsUIJCKbOVSQSHjdq4XJqY7mF1davT0yTCztt/+Q/tz0xMvJumWLsjmNlmoR1OcNSncE+Nw1kWroU1ioO/l+g+7UKtzs2t6Fs0a7/viRtKZSqpAA5xeS+UK0pYfohiLQRRAGJplHeaMiPmPkvkIg0JmmlH7vrOYBR46vqHj6tr2oLfE6+SFrdW1aPLSljsX6Dzi1dRctpQu30MGC2gqjU/5un root@f6a49d24-ea64-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEX5ivT8jzzaDSjNdKvkcd+QR2NbmgftAl6eTKqwprV45F9eGLE277o2n/jsxhQiO2UtcKEM+8rU3jUjbFqz3WgpgAKMLID9zi0XXMuJLllYjq0ygK6NjfZsnH9Hhy/WnzuAMcXyPVyPwv57M7rqgTyaI3/SGY+o5jKcPZZAWiO4ODrkZwWqyfrLdJJ3cKh/4NmP7DT9uHznYbOhOfhZU5QzURn0+B31yReIxoBWfQxDpVDwLQmrHvZjnKiHU/2gO0WhkJukfRDpD0WtmSid5bIFuBKeCe8ITNepr7PLtOdCuGnnLZJ9lwFFunPwGBR/rPghENM2a0En5qKndU7S1l root@eb31fb15-f1b3-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDOpZZ4hUhdA9OmwRMCpTghzGNABCdPYnn+gJi5asDPHJmtt7BcGCgWmGznkJdOFu7xmm8XZspbIGpFLjBbtQs9PpJWTVDSTlDGcVctJeUG7XAKmvTAAESX4c39s7RUCIhJ2rnGGzvUjE8zNlAKalG/gOjpkfNEvFZvn+BLrtP1m7NrOQtL2U7aNbMQiZLnPtIgX3NL879cZgfTx+4pmScEfklJupTpkFWFGkeG+jetA0uFwYH/rb9SQzlvtxhgRPRiIh3gfIvSgKlUx5rjNkuz30OAahl8hookjBqN/4CnxhDWZJHKtCBRb0mK++/tLVAu9IefYs6si92reA2yrgg3 root@91c64940-f3ad-11ea-a379-bea988342348\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEMrycCrpIAeXC6jHodLqAdHGBXLNUY7rmKv0b5eagZlKd6GruQqHJkpk8yiCS7UfmEK2D5CovfUoWetkomt+4GgJ5+jCQaZFfNuCI50QRcHPDF3KnAzSPB/4G04iYBNiqHEtDdgIVifwcseSWh4ft1/aVfqci529ylFvgitDLG2JXFylRkFkTPaHbFnZT5CqtdSLVR2q4LteFp0d2BDiUrTFSNC0EUiift20LelTsTuaEl4YLA4P50XN3jWDapbNH06ljJ89ET8cvYTnYgpMIzjg9SuG1I4lFZuuwq7APeCRHoT4dKqFuLWVGXt2PozNTHtbgkXghnrsErjMK3KNj root@adae2fdf-f5d9-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDUdRdhYb6nJLefty3sltHkEpGRxa8jOd3agaRWQckapYS1OyICg/p7Yx/1y6kYb4lhyST8zjU0NqTLbyzx5NKAzx646+rMtPqNeCM01PEivpEdRQ0luBAlwzfaT+HzIa5FBos8jqMqLyRPcqC/wFTWRo4EtA/9hpg44JvVybKwcvScuY3N/CvlLSCJ6m+cN4jREaMIezo+LMiijlzouQAsP3csOoXi6CoKp6fbqf3xESxGnzp0flIoszjF4IyaSs0+9oI4+j/mIgf5oRyczVbHHYsRmhJ2xEwCtPegZVk3JormGn8xZ2u88SMeafOGqCO9rEQ1IObZbBMTjq7qovyZ root@3158af46-fa97-11ea-9c73-86173d37727b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDK+WB3/cSbxKnAR3nR87qI9dcdRHn/8pSOY5b/foF07Z+6+zB7JFt7BXL0q1fUTJrBlr5oNMnj34GASU24aAupdjiBRaHcD+JuTS7gWarVcJ0HwVsK/WV0POqKaJbLc+TkWA4C1YO1AGYdX5+M5d6TFvRQkRWJ1ajAAPfh5FqX7BNC6CfuhYik1LRN+dYn+r/u5+f/EzTdagK25F5jugiMc4lmUWUDxWtJwGDu6qWatQNoHZVSilL2AlpvSb6AlMnFVeQtOOt3JZMzlgvHJVHtbEOwtSi599UpsAdeqiw9qzRdSn7KHFPAMTvZAUN3rNpNd73nSs1stQJEsCSuwS4x root@5e2e7ffa-fd74-11ea-bf6c-a2eeca28ab84\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDHF/DoMY7ZnfEip1A3CMd1ErKT30S8Sw+wwcZaMGhkNVvOsLSMjlCq9AxRvtGzM/xgjLGz2h8wo+QybUh9i9Izikgm5M+sXLI2Vl/mb5mBIg6ubPykw1GLEzT+LNnGNIJdE3BrjJkQQgh2MLFBDaHDcHH1CoMNHzOH+Q3YZcOrt8zYKNbO/xDv8z1phTbk/zIHeDHEFD2Ze+htOdHQdXrRUxYC2+AAlonalF25v+Q1R86xwCE1IqbLv0mQtakwLxsp9/kQ865/UQpaFDOwiXOzS8FNsmGis5/7aHzYNVhuk6ogZ9C9R1G+ChsJ+tZQr6bzU0aJazjd68zhKUmvRlzD root@9a4a29f5-1c5d-11eb-99f1-c6d701d1e283\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDg8G0ZqVY+m6SG/aErUWRxFjQyfcyMVDEH02c/9CEdqS6yd1Kay29HJ9Bygy0kPIg+mABFep5yyqQGNqi+hhpn/T02CY/qvT/I0guVUnzlCjsvST29+dXSb6nrHKLpv1mkjDGQZM2xqbtv+3Vhe7JeafDincOXPctlSA7ZGrHVY6oQoH9zZgxHb5i1Gj+YHbcI4SpwQyXOjSmXRcGN/s+ACZQBP64XDyDbOS2d7W/Y31OHlc5EPrTNHAHoRjg+0x9uGM225PnYr0fvPom1DYSMX1yL4O1RdxDkQ2wYiqk1NaIG66F23O+6QgRqqG47mCnxYoT2uH+wSRkq6v4huuTv root@01da253c-2005-11eb-bb76-36aba4894793\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDMH3R4X4r9R9VHFMbGq9FKpG5JipFgDfztNwVsJ3Gjc7qZPRWt++Mu4D1IC0YDgcC6BZSV2ridO5cUkqsDDGSeiU0jeBE2Feb8WbVlzj46Zg9mGlmZ7kVMXJkHUR5O5IETRtqSHgL+S1K3AmAccu6vFTw72I+qaYoseTacLOyC448tHoegaP6P/qheHU6MbXS27h/7I6pi3yV9shR8NkOLhz48+VMPfJJApCRa7lueund8/b0i8trXxKgluFmMrDoAt+PaNjkT5OH5qwXlTTQkPtUD+oymC1b8dzF8G15LZIaWNeMMnxQXL09ieBMT6oNKkE2FEZ7Q+YUeJc0ZwTBr root@1c826821-2a31-11eb-98a6-ba1d66ad0079\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDDJFe18KLKgRYOjimpHYO70M9vj4LsCVqKN98n4hz3jiDTMx4qdN+eVWbevwQPg9zKQwZSiJBXEDeeeGC3ZKS/hajj0sT+L9LcPDBRZfuNdzhC+B087rZcKWgR37CL/ysy2SNBRw7sdqhHJci+Xl6axAhH2HykF5Toq+KZQ9WH6+5o6QFND7G4025iG0LRZ9g5Px6YqQDZrrkMxwoe6aJMDkdcnHKdo2CWrtVGZ6BL+5oX5GW/yVTcZrhCQXxPuQBpq0ELCR1tE46/HbpOnekt3Z4sNSwSs5uq175S5zI9ylwU6DBxqx2KsXmOjjXZ4owg3p41hRZkX1juFyOWgIQP root@d92100bd-44a8-11eb-acd8-6a2a49dd8a76" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-035", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-035", diff --git a/audit/projects/k8s-infra-e2e-boskos-036/iam.json b/audit/projects/k8s-infra-e2e-boskos-036/iam.json index ab16fa76a5b..3ed4f7398b3 100644 --- a/audit/projects/k8s-infra-e2e-boskos-036/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-036/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-1014481108942@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-036/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-036/services/compute/project-info.json index 5eb1133433b..69d8d06dbbc 100644 --- a/audit/projects/k8s-infra-e2e-boskos-036/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-036/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCSj+a8tv06ujVzkU+/Fgdl6SwcjOJPdcSVaPOKtfZhV+WUR+AHNC400b+ZDqfgs2oD4/3vs+kb0txi1IzQ8BvyXJUQ2vXdIXOWvkdwYYw9NQHo4bL4KRigb6jgKiWdvNXoWbZgCqWMwiopW5KNTIoLxuizi1jviYwLcb/b/0AMlQ5Mx4LZol6OV1NTezN77ZX85+VSOxQRL06umJ3/zGz2C75bruH+dsDeAwKaH2J59I2fUHfvyTJ5oovCVRLJsB7PKg/8NV+BRuxSPxTODu/L4hvtk4bzvcKe8syH/V8/ZwbPMX96rifhUNtbu4x2x39cw9EHU5PussKhsQagZpb3 root@13f927e0-d9e7-11ea-8c1c-d23af84fd26f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDN/B4Z5IR634ul4ZTSZrwmuTRRaUK9HlaxQNNj7sRncf1yLoM1UnwGDP73TFWtnQkqFHDfha3Q2R1B9Sx4xT+6vt2IBedLS2CBytkIjieTALqmtCeYhR2LVCbSsdDA7wup4irlpQFBwzMTaclDUZSr39nwBpfmb3BRGq80kukBujCzjlGoNqOk9mqK/X6qTmkvuZa8VLP3vtGgfNKNdBsn7i93PoLik71UN8z2zgFCvYLVPOoQnX7G77YFdEfVqdop95RYqB6jJOTuHIHrpv21Rh6ZpqXZ/pojW585WMC1SuzN0ufOP0A3MguTZDBubL48qs6lSYtP0e/OKfu/J+EF root@6c7e84f6-f0ad-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCwWUIbnZQsuvqSpHu9tZhbOUPnhstAQTouRp8Z3NjOLeDejpvk3k14NnHu7ignbcsKLcn9wYj1OicPGSLZWA3iMY3/scy99EFzp3H2tmgedAYx6CG/HYJ2CKX3FWvr437Y0EZhRVArzi5yiH+QC/GuPwyxITDF/JhxwSmW0dMB2zQKPBhSwCg888pVhST8jaTZESuW8JIqfWmycXdrNhmYbvS/Q/FTPuID8vUx1O4AlLgwChup13Lhmi/GA2e7rqGjHplQsApWT0yGfQQlhFgR2mbhpKNyb+5jytj/ueAlZz7qnMTz8sA1n4hFLH97rWkdVQaxoJNzZgm1nEXNPCpT root@63ff39ee-f671-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDD5yOdd0sOSYkxe9TTU/tsjfDOmwntau1sOe+zLT21nVmS/ygYa/ljO9LY2qerv2nhFqZApYVvRxUb0Y7eBS+wddudlt4R2cRAJ7DhBmcCCR9Tsx6ovdwa5/FOLb99a7Wk6uHyINJw8ppoDkwFFARhhHYksQlu7hDM3rWg8vKYJ/UDaQ4luAhePJA7+jSkF/LjoLhcM0a1jhzkJNhb66skHnI0FZ5NbvHTY4vg0vt3/NoxcH2CPdFEkN9zseEb3Sq45Ipkj8u188dP2H+vANzR9ENX20Qy7TXUMyacSxaThdmmS/zmOSOYxtkssK8dRQJPvZbu+OXPyZ0h60f45uC5 root@0183a942-f6a2-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDlTCWX9LfRDh7xjvQm/rUNpLI++DlfqzycDmxTWmigYCP278ptFH6CCKo905AZynVV3LZv+HTmhGyKeL8Ghw+GyVH1z+GhLsDS3A7Y8VTKn5eZTwPLQYesp0Be4ZAXU6iot2AX/BQvJUgcYoJft422gtADKYXSAG78I4ZTTfPvvnwiDGE7BttzmQhr0iyr8N6Rf+YVIAFvmvoL03Ib4NGoZT5MwSvoQ+LWuMR6ucOWMzECg6Ve6kL0dARSdwK28t81mF1L2vQym/99Cd1vYAW1seImqkLN4B20/SyRLDBxBDKim+kPvl10oyM1QOCmw21OQE/kt3PZQ71CZnufF9Mr root@1393c097-f7ba-11ea-872a-bae3dc204648\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDTUnF8EeOYk5O+STjSF1NtPn3VddMYbD7jrJdIcqBKJPak6v0dVmGoGOj8R1iaJ4p6QH7ylPq3bS9AxRHOnzrQMLN1+SQ8KJu6sEO9/hi7WHe05h63Dc9KUhA472f7ieOk9hxI9bvaOdnjfm64MXr/NG5cQtdR8bADbU24VOeHp3xMCY7LeTPxCoUCuVImGqJmchyIN+c9uQe4hVwlLiJy2F85v/H/WYIg/6WTi/y3Frw2EbHZmCp3SbNOL3DLyUMvCsyuHgsZakz8KIW9BqGwktgE1uZq5GOzEhqPzn7u7beiVbRPcQBGqNHutmFn0fggiDZRDd7JYquCDlP1TUdF root@39c5dbc2-ff87-11ea-b4e0-eacb7c15c8a0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDzqTmqloQRaE+dWD2mlX5RCfl31XFlAYB5v0S5qlb4IQgvG6CjP3fTeQzplUYtZvrH2va+hBF7iRZbruGTsiPHKGPrUzfBsFqQKS5Wzbv4kxtLORbyckZDi+E4r9hu4RdiMnzT2sLHevygwNzomE54SbVX8ZAx44+BcB0mxAaZQvaA4I1nRQN+4u2dAxiN6nRiYGgd1sMpdrjxwds7R91nWv6YVnkSrAP49jP0kech3jxGQoNkpGtY7a7hLs3sdhB6SXTTH0NNrD7kJG6E93NZ1OuNxclwfGiyaZUDvn4V1YhRBGYlD7D4t2OUYbDQ39jPQ64ezcQ4QaEb/p3ktv5l root@d801b1e4-25f1-11eb-bb1f-6e397dbce9be\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9AfIszexwyN7FPFkTGO41YyjxwzBtdA4ZW0R5h7XWJ9rvFXKof6pTFRNSFlDkhUJp4veCgiDYPW0+uvls7Uo9BmyjcVb3dV/R/FsRCfqPQN3WyqoXRQAJLnzcdFN0eRPt//ME6t/dwEtbsva2KIU43d1vWtVeHDLGRmjsM1mNLxlcETts3IM9/VljaPT/XQlOn3h521GtPpoD8imd5HIUnF0iXNUOm7akgUtcgWNhPkkNhUQ4fjDMa/PqP241xrXqckVd0TTpl3EOBDhhwxYO73SpTwEbq9O6v0jkqlH4wL8LL38SQ2rQJrPSUfNT1fpCyyf6cVuoTqrG7d7+I9ov root@14418940-301e-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDLpc1PdHrctgwO0BdwcMOaeDYNpShZpZhk5A7rrcR/UzCaJMmv4uFjq/Rn3CGEVDDmP/75lmu9rgsNtTzVFoyIqwsOv+oNhdATlvZdZkF29//uHmilnB+fNvZQF95pUyLMpX43EMbEy7P4W0tgROLeafTJ3k7BmdV95Gths4LzzT61Yv2tIjD0p7mzMzhdhAkV1IHcSlkKdT2ggtFPKAmb3ws3Rdld4IyTLMbylXfX8EYbHOYw2PogDUy3xnz8VT9a/XPDEHbTWRRxTyB+soGGC5OD3117+G5436GxP/1fuBSAcHrM/5iq8VWd5ymimGq9O1inY9bDxNMu0cpFsL+R root@80c83c24-34c2-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD0JtiMOS0aIXqlvm8QfXuIYEJtWDUBzgpj7yTvUxJXRe4DKdueuWhioiF6xDxx6KaGTFdHE5RprpnNf0Gy6GCjauBenQjS/0FXikhHWmE3gL4arHSmZ/V+Lu8HB5dh6tatwHMfn3ULUX8QM8WFuO6P/W1oHe2QNCOAUkpdAEQRJkCvqWxV7VXpSHdc4llV/AzaO1u+vucn2G2soX1DdI9XwWVNgsK+Kkd63MCQBPzs0Wr0u2PqlkLX5Ie4cKtckg1lxc29l0tKUS2DtPm3Q65Ir6lN0CAWz4KtR5+s2YRro2BzuxZoP23VovvVdcbWKSlJcZ8ASN+0lNksMS5xuTD1 root@3c71d4ba-3721-11eb-a25d-22a534811c55\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDYdFrxCGjvFyjPu/wRfq9BfjtYvtBgWP+Zv2vZu6hFdVcAtUSOyL2kZtSCqCLn7nQw8FrwL0uU0fBHmw6QuPk9Qz0EZqf0CxkSlo0SXMXlHWjjpJYvpaQ3EMpzqEMQ/mM1kCI8dXijL65Lzw0Wo5rhF6B8TYtBs728zLfjjvOnkkb5GDJc4AZlXhbNPuGIX6VnJEg/dqWBiFwERjIuMtfRUnWO7vEYdtgQ+tCq2f2VCQQ4zy1z5+d9zZeZdG8EoydgBLbb6C3dIy7DHvpV5gXKN8H7CW0YedThLzHQBUYPptM1zp0H9sRZlOITqhydnSTeDdgwHEGWm2Nmit2Tugyz root@82aab36a-4d8c-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC40NSVs87m3fv+jsUcQ0pBcuseEwLgeYvCKYgXh2eF62FsQstVLftSr0WNYmd584gfhjvV89+mtKtFIk4aB0nNsz66w8iDymme7TsbWLcUDxE4jQEieaCCrKmvz/Fi5j9wv2bNgqrcFGK6BlgLoflCyNLYHB9kumqJ3MxNHYou7BF5VzsbVPSdKEA1ALRFXf1ZUTZjQ2g13kBKTc8utNHnuYAKkIk938L6RsshDj2e1NxBhMdlpNpeEy0ozQ4PtYz9/Ubjb3heRaBd53nMjXZbDzvBw4e38NyrTEJka1qPzvxTndM/a25pVTcQofdoFpmdhBb/tZnoHq6v3+fC7g/V root@8e8f4adf-50b5-11eb-bf1b-5279f1a59a83" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-036", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-036", diff --git a/audit/projects/k8s-infra-e2e-boskos-037/iam.json b/audit/projects/k8s-infra-e2e-boskos-037/iam.json index 4fe7fb5fdd5..079ae6a9109 100644 --- a/audit/projects/k8s-infra-e2e-boskos-037/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-037/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-288806337027@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-037/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-037/services/compute/project-info.json index ef538501a65..8049ec4c60d 100644 --- a/audit/projects/k8s-infra-e2e-boskos-037/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-037/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZYp+nFxO2rFzjROtfYKiya/gSJTgaAS+CTgpjbVfMVC+pJdCEkraWXJ/s1rAE//w0JYFZw9EvThE3TlywYQ3buOVuYeQ7kwJ8K8Z7W+vCI2H0tVckLA4lLRvno1XV/64r9z1brtiRVtNC+vvJqr5x8qPfbgBo5EOCelu1ke5DS835tHZqfvobS5KvSBwHFqNJHQok19T4aKO72m3tHgyRZKFm07XLXcVHeAfvJcffIisF90scGWKTru6x2YoLZyoFKI7VmO8VfaJSjLt/fN9LcXYKAWiQlaMC/xYsFypdFcUOt4SZHpdQvbJJ9wYA0bi1Q9D9jBZ1L6jFKJeQI8qT root@2b90260a-dced-11ea-9424-2680bd79560c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2cuHumWYKeeAsW0gWjT1NT3M6xGVl7q1diQ2+m9qzIgp81boWFbD53ro8yTA/jmb0jPjY0KzKPG47j6owUGUaNlKosWu+mXeVDvxG0HSyWsCEwc/dCJXXzo6YAy/PIIMeyLXZhPX2C24NK4ecJxebkjVbN6FxNk1Prrc1bcdiKEcg9tJocKy2EMT9CVfO224J2NsA+cbRv7lnzZm9h/K0+fDB0UyNAE70sjA3uh8mp5yFRm/OL9ydTRlsxBapTjN+y8Skbdu6iABmCoKoQcziGnFOJFk1Q2G2Fr8/xeqNcLtAMKFcjYDQEcih8ZTPwHhJBhYeD4nydiNrxdvdLdVL root@8d924166-e094-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmlJ/i5QzgOAaoF68VfF/4sbRn78AGvJdp/YdEAXJDM5iuZdtjJO2YMSgdAS2CiDtpMGTYpQSFkQBn7EwaYcac9exKE+CxAAZDTuvUEsQBxSg8TJsD/rMJIBf4OxBrTjakqqfnvOqXX0za26ImGKjE3+pw8Q8GnwzqmZCEJ5ny2LPiDYltvythSa5xQCReda9IL9g4iW0E15GD8ymGnRzdT9PYS8q7vAkdMybYT6GdwrlInC/uGu/j/UqLf5PweFJxdTx33DMUwPP9n/PEK4NoWHP64rYw/ABJ/584LiPwSnclmGIPjCeWPk7wX4HU00W1+XBS5Dj+FGasKSkizpnT root@f4e58d0d-e4a0-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDV12T0kH6Jw3qfrPkZetlAmATPI4xT1OMtoN7EjY9GFy7gCXmRHWyNlMn5j0bEsilZ7caRYEdzeAK3gdvvbcQPweM+HQv5RFjKUFNkhuSl1PiTmJTZRTdCeLQYOulXL95rwb6hhIR9piX72ZxIZHRVP0d5klmZ8V7LCUzEXI/p7kmI48QmdkU4jXpr/0fdGdFMUPrCr8geHu3RFkiX3RQ4UZaDkn0MKa69H3OcRW/7wqXC5oFusDtRZCS/Vgo8griybLCLE0W17QRHrabqDDY+DyoM8adTfExS5zwUPVwxwl6KkWr5QjIy8N85g8WcTA1SRoy/07JMC8H968o7s7V7 root@ca081b1f-edd9-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQOsyCl//nJDqAdkzcijvvLGHlaZgIvB0weamRm3MjYSg9UaNgCGfkEnzK1SEAlYQMEAG4jAV0KJ6sXavF27kQgzTI3vg4pb/PjIUDeir4tBb7rheDA91TFIEbftFKD2BgGUII554MQlr0uUmfjNrz9jO7mDK8uShvfzMkERtDZxMJD6jg4d6Yzk9Rz+Cjh6GGHJz8Le1iIOSUYdnpSosc8Nb9DYulZTmr9x27MT+QLShdT2R3RsZnn+k/AN+lKnq+YJ7EFwfPEtFB5F4/AV2mSbf9CxwkWTpb63zcaJNfsDZhPfNU3/arRvVU68ELKQ6BbeSeHqIVXf+/05/Rcd5D root@30480320-fb48-11ea-9c73-86173d37727b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+G+IVIo+5r7xFfwZFky1tW9bvR/RxfYJEQZcriMWkgjMyDIjOwGGvzQU24TrjL9L7nAVtEY+842Y0c8qNfA0xyzqMF8KQTLwvdBRAwKVCExNVUp2haw3s8WU6U9WN0BidD3m5LM/3bx9qjmrFrr3bX4WvvzVqQP7BPbvpvUBFq9w1ofoMtIVrh3RFqUMd3fpe0xn/S85F6UjE6IDEoFdm2V/JlxcEKgIv0E2I07GkTtYqPo8NZ27O25pUD0AWvQbeJ8KCbPnkosIsbru683VX+h5wwpWUinr92KI+0nrMgqx8hVE1u6iATbqltFoKtH8KZG4agJQchcdes/XpXm9v root@188cacd8-05c0-11eb-9dc4-ba187aea6a9a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDi89iJlbIJEbbLUBCzZgCezvVK66RdW7HXB119TzC1SEK4Pu+cUDpCavcgesfvnaYP7epSTqoNJDyGscapngBVP1C8jpE8ZXJ8J7EessWWVcdMcOiFdl+aLttcO3QMpNxtQ9XsfAoy5sOPik2IqtqYx6nlSDksnS1YET6qQVHv7m0cbC1NW0SVPT7xluyM1eKmT+GRsahqdesA55XWaKs0+BqeSrQ4Z/q5fmQAb2QsaHadXeUsJHebwWqrp2TSzP5Jly1a1itnD01f7EVmkhJ+CUuC/vCInt0HR1gtMnDBmyYAQg2ByLW/c62w1sRkpgGQaMHcbW1QDoaxVFkvs10/ root@a25feb1f-0754-11eb-bde8-b2e010cd58b2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDmnQHYynC8ZU8mKTd8rXecKjy+XJNEobOrss9FBuBcYeYeG8SDABQMNrPpsiWrdTcHVe5MpdA95KqHQXu9njcPnaodP9ZkT7aNVWWQWAXBF/t8xWLUwDMSw1m4fJgCmoi3H1Z1f12pdqKjwPYMzFP3Iq46rqCP1bIQQKcortkBU504NbpVG82X09oQwYt8fsMuHVGG2Zdc/CZmpvVE0q7Jm0Wtybc4Wem7H27UBVGWeHebI1OzJ3uKsxJKC3duYHPp9WEcoFtKGrZlgYk37sRO+4xDt8U/hSntB4mME41T5caO0x/hpAnsBYJXqoPew3IKx+yZw3xfecojokZ4YOQV root@508e8b1e-1490-11eb-8a3c-66d0ef5d093b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDues++FyvCmCLqUQlIBj5EQWb90/SbMzz4gFvSPpxVy2UHtqaJK8WjyEtAdwslMoJ2Q5qD50rSeUuNfiStrfl6bxiU50tQ4FdSUh7IBRJR0iT6L2LqfhuKfZ+bk9uhyul+HhW034ZlsopEkSGszewXoL19Z0IGqSl6bTJewAOqTlN9C10Q7j9L9bcNYRREJsMARfRhWFmaGfKTW5J9Y/ytFOmtoLmHBitLwR8ghVLuX3rEDqGvWHxjvtm5/TY606RaLZkyfUGVzXHffKCz1MpPwr3Xj/wXAOj9IRkLE767j93CnKrVdmC/QeCF8NMuq9XRzcjcXZSQJNeeOG4vIvT9 root@40be8d11-20cf-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC5+tMeQUMzmlXZkBvmCNsQTLZF0Ruf0a+UqyqA53sVa9XoPqGY7aBXCbKlsOy8YrW4xqPVh9OR7etmXkDm0aKSpSa9QUlmC91yrGIGqAY4Lo9p0l4NjWII1yivFis0ORsc/y+wWUDFwWlY9Bp8t/X+Giz7nlZhVmCQpvedERYfeOjvtQjxXT9SH78zwV7Ng1CwpIePYyyFmLxF6OZh/QsrjzflnZMSBUrOgnb9bZMYKEb6hvLf9Z3MgIWoiOueKkpuFT9ym5TW0Z403wOeuGtcVcmV/5BI4Ffqhouayxeu4PeMNwzMSNN4pi0hXntWWijgJ4dqDwD4izbWVGzne0Bb root@871323b2-224a-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCy2bzPga1qhHkd0wNMvo7RpuKPeAUFTLR9zUSVrbEN8ymOepXd2D7LWbAEgMxny0RgrRPcs1SoZqB52MqvAs6x748atJNAdpoP3lgRF5U5ZIMeLhPwQ3C5hoIvIXNlfk7rOONk/t7/k1D2ngMmdlyINfp8Fun2aCxGGLjn66hN9B+HfJuyCdu+Roj+/Xn0+COJFs79h3M2C1X9GrWSiOE+sjvpWFZTMX8v+uSnXdvTzrccJwPq4o7HZGkBBGAy6CMvPUGMOxJglsaLlHAP0KowQUOL2QLJGg/KeGbHXlco4E7hHQCjflZCu+CamwOGukXOiw5q7HimUlt13m9YLS8H root@07b3ceb9-232e-11eb-bccb-526de22ef413\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDNIS0MVSgAlPRBeEOssPUDnO/vPEB7pBOFcaOSUVZGxuuHU6ujMGzhT3+V8n25rKQKkwB1049vGFqS6ck98vqF0gCx8S4s14ierIZC5+lBxjAtUw8rBinwChgma+3fl33KChAdx8pThai3M7PTZpo15p/WS6301qNYwU139HwuN4Ah9glDXug5la5k2j84DmSbsvaJ+4Rouy/VxbIiEXHbLBF6TlzL5OiNnKzVgg3CWbLLPd+K9VkLjOO9fkZs56QJnC7G1lRBmaiKuA9+SJN1oRdHItYDs+ALreCZdfnpWRnym5A8v228V72m85Jy+i4+MNws9gzSc2BMVwVZaH6B root@f318cf0d-35a5-11eb-8ecf-c2fbd71c5254\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDHj5o/1Dip+0bhOlnZFHTf18wPc3ZG7y9bhF46aOrFsSDbOuCK6ouJc5s0gQT7WEwRsuNMBqgkIONi1rOppFcX68IC7PIX5E2wP36Is1C7Cj4cxCo04u6r/5WLcptd97iq1cx+0JspyO60IFAN+L2g+ABx0ifF4VQm5pryrmVEVxVpPiHLURkqTEeFsAC8/5DIRS8sobxruptgjbszo56spgFNdUxXnaiU8zIpUYeCfUgdaiki33vvnteOjEIX0pSEVXPz3LGaeSCTfkp6UwwiWxdFp3UhEqwGffEGvCqRkq/dpfgG3BZ6nJzegrhF6qAqwbD8VsOzHxCMI47iMWTH root@3c048471-3afb-11eb-a164-f6e7f2ebcce2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDNpGXZ4guH1dzGaGjYrk5e61f6ywBy/WeO5lr2CDwXq2OuAGsDQmJEnWwottI7QgZQiOKNeEe/NfuWm9U28AhrbmPpK+oH8tAXfLcDKXnFw3/nkJVWCCbrXrDFDVHabNrwTwNyn+EUEZJXfAeKETyT4QPAjaCr28QdfglsncJpB8CR904DvRtld5xkJzwDDG7ZFVMhZ2ILhht1cWOsUo7e9kl4B6upUKI3N176S2SKbMOyF9jx+FnieqZ/Xdn3P6qp5RHNMIUTnhW/6Gca9MJdQQ2m2yT3uDgCX+XMraz55sorAQoS67YnDH53WAgvgUvgy0VO9AR9ni7qqpyqzEpp root@435c28e4-49fe-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQT6C4KroqpS1AxhbHm8JyP7EelFnnGuGM9BwZpRKDdwZQVECdSgRBK1YwIDvCtvcn2RQw4fI2Rp5FzIkKAPgaYRnn0FqBZzUiRdUaqwAUUWCbgw1LohS1brVlNklbylLCAlKRvvHmB/fnBeHPpVWlzOr0CRk/hGWwgm71RdXqHrAPgxBLjadEZZjZCxXUnS3/ByulnR63UNOWlkoqFV2+Hd/CGm+VpkLOZaO+uamrSd3gy/KGjnAgYFQ5leROCMUvTDkR0G8omwZjY1xrZlphJnpDo4tK3QE2rW1jvDFG7w5GsgLd+QbxWzrDTnPapfnbCb5HkTHFt0FnJzOzo3Fd root@a9417353-4a7c-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDdjqFeMWn7tM5+sYftft4I+h6bmGLIQvv+h5/mSvsx9ad/KWO1FRAaIzfRSXA9usnEFwmbZ2lW02FRHp4q1DoJNNtKz8xhue4Sn6G6ciodWTCb9aq3E2XLmnvmLl+MiotFRhLRjDave5WARl7fuCVNVKhLuMF0yFMr12FKy/QK8NBwcNi7tvYGYn2CPViWH7hFTJw217lzQW5rk9UJSLiLgAk1tcmSMyJT7xDs8ekd6dGzTSTE/lNArVJ8xEQMcCOgYZjq552QzyNZX7pU/hnBx9i1yZFWG5oaqGJ2yEFwozQRfIfhj3DPP5wYJjnUlP3YBY+SZXjZTZ+IraYL2f8/ root@2676b961-51fe-11eb-b6a5-7e8b7adfd54c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCnC/L0BfXENuwVBDm0x8KdAEsU4TSluXb5E3kwfJwgJxihVPNZNBw59nPaId+ncnpuSoxx4fYtyE8mJpIUwJJFThkEWpRpuyg0r8suJ4IBbGJuRcyagJx0lgewVIDVDjFJPnUaVn+SQ54S1KZ9pISMyWidfObfyqyoVZrpX0K1cOg94DcwJfyiQx73rfmaa0sMvl99qZGBSrHWM5VB7tZpU4T8kXkc46HtEfe6NvKe8foN4Q5lDroE04RFDzVbUl9KQ+DqThprA7WHGhDSGHUGnFp+lB790HPvTri0W70msuySJYGXjEYiVRJ+FW3fbe7piMhKTlj6Z8xlxIT6wQYr root@dae36b07-5346-11eb-b6a5-7e8b7adfd54c" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-037", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-037", diff --git a/audit/projects/k8s-infra-e2e-boskos-038/iam.json b/audit/projects/k8s-infra-e2e-boskos-038/iam.json index 6b0d0cb98f9..2bdee5542a6 100644 --- a/audit/projects/k8s-infra-e2e-boskos-038/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-038/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-415537245831@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-038/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-038/services/compute/project-info.json index 3d0ac8f5420..e5444f1e831 100644 --- a/audit/projects/k8s-infra-e2e-boskos-038/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-038/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC33502DYWOMcOXVjoNvH8s7m1d5PZZ0Xs+8G2w2VEjUQyT71vu0s1AqJVjtak7pDhYOuUOuHIpzHlzn3QVIzS3kmUPeWt4rjWWKf/fsAkQ4Lb/CDXl3+rGIQmFL9DhzXpVjVonv9ze4OUqghaBiC3br22mv6A6xjb+PEnhdbM9dkWgCQf6ltdC0brk6SAXC7L4Z6lAMWye8HvEqGn+KKBfbUs1h00QptOjxsiSTd9RGvoKb7v6uHAKh9tGkdrv614nnQlDvFd4L8n97sU6HDDoVGtuXDkdcYkEAIIBVhEPA1RBC0D5dY2X4hNbiix5b+qzqsc4UjLOiqOdVgW47Nw/ root@6e48bba3-ef4b-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDYlnc4VtPv03eZKblyGvhDX45+DyIdXyJKOhESvMXRNFvQLvPVeWqkPFztV5N/PHUBU/a4XfJ8UdT2WybguEY7kyIuSLgFN1YbNH+dctttk63Y11Fj9JS/VAmb3IpJm42iNQ/P8FiiDjXx0gS3/q1F1D1oN2bWJgXLJWA6OyjhWQrhOrbAlJa4aQMpK0lgVyndff4/guIZe39VquOy+Buvnyso2ogRmo5bWXqdzVm97l7ebME7KKf9o+96Agq4n3uYvKwD/oQGJFAQYINr1jNuk+x53/3vj6dCpy8Z2Zzfj3WksHGyGBdNbMaM+62NmstkUgUYuQCSfJCLJnLxmA3d root@59f7ec21-f01f-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCyqCF6+depnU+BCBkZ4EJVf+gQRj5dbx/DgG74ee73FaWQ083PkXedEDJBHF5sL3aG2YtPjuQvxBYh/tFAvI92NLRFb1ufWLvrow+WgMN+5fHingcRaKbo8KCBd2Tjbbdr8dqV9GCivDqBoDHR/WJH2MnexSHBNORpQ1KeUoOLTazTXm315pa6zfEukZ/Tmw2M1mdCKdW14qETkMPXsn164Ior54DCTnsvH212i4yhFyGAL4DWz5xt8qlSTSvQSpFnUfr2Bb7ShDk1kqb/Z0siXKutxgt9xR8rR2Jwh7NMo2ejR9LID36ceu1ZTMttxpPl+LOrxf/0sWCoZZPY0bkZ root@93e75dac-f623-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7dgOOkm2KTqKSBy5th1ABxyO89C4Y5us93d0kyyhNFwOTxi1GaMfxB5qizxPfmgibmG1l32JJLjf4g6A7GBCrLnYqyEjT3sKLDo6qaz6/GlhL3aBQdUklXxV2hD5WK/DRwIkRuzR3WqMtmYAYmuN+mcgVPELLiXxJGXZVg0brUbArympSAfzFV8S4WADGQ3OYGSlw0FT9KwJbv6YIEmWjNptK8Gsw77WMabGsqUo8OWDTWe6kuQmmYve4X6Q3/l8Y9xmkX0o+LOUcH9ikD5VXdybcjb+os5at4s/LpEbtkmqmpk5x0g4gQJzh0fDzEjv93tqVpSU9j+yEbdGTljc1 root@795cd947-fb61-11ea-9c73-86173d37727b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCk9Mel6hyqs0hHWpSw8bw/M2LQ3Ze1Rbz8AClg+2FCC/toO7UyvqDKzxqrbRusTU1zZRdEbwSB32bC6eGTb25rFqxjYySY7CQnBgZ7I7UC3GU9SNNKlbioG984PwtJqJNgiRM1vkBNmkYI8zUUvzgPiXLHlRyim7MIZoRDih8UGUscN5CfcfBFZFDS+riinNJ01scQYZRIZYfxDtPbyU4NjnKO06zbMgmXJRf0mL7lguP1a4sTlHU+HPR6xdt3zBajDQ9Xco0nWJHHIpK2WGp1JKw+2QRRtUhzLcTT0L0CovOfcHQ7D4p+kBYz8l5M7aHmLS4F7gS3e0QwrRxrtL8B root@79e66a4b-fe8a-11ea-a78d-ce9ca29dcab2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDUD0paSp4J0rVqw8yre5YvDG8JVfywx7g9bbe/k7NfAwKwevazXoQBYMl/s+xupNZki1cxuz1mpKgCoxYOYtFZCBGdyFU6J/w0U78WS4xuKt+HP8r8ch7nhcqx92HSQXu40okYkHMcqH9vrh/dEeamSPh6KIKHHHCyawGdLOFwEf+Jc1nZt1XUyRBe57FF6mCfGoCh1wjcY2XSbobwbM0iMAMQS3DQr6r0mEdr81eeulVrotigqX5XpqnLrx9o0xH4kRpxFhOQEG5JzTuPLPbjzxHXXPtHKxm3lcRfQzdRhm/KlYC2rY0XPJBRR60+rhf00G0cQMwyT5Zm+rx+0aDF root@ca481b5c-011b-11eb-b4e0-eacb7c15c8a0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCzfaaMlj6eQyHqWaUTgBZ9+gA6Wp3kHHwgza2dmMpxSBKG7Nn6tgG6He/3bGa7EqN6JVs88zyXJ9zQZq7HKbbU4JybDBiT43gyvkOgneYd1GYq4nxYdneiiBXWmnVRua4CJ2HCTvQrCm4ERbMvJz3VOj9hy6sOf3434REqmfXaSVlBgXZBLiu7BuFVzYbNJBl4QmpNzBBUyF3hVxEqdsOqTttCTpoq/UoI7Ga9QfhIw8gwN7wjCSwe4CFhKA/39a5+UsfngmiN2JAYvnoZQhssaZRMOwiHBu3Gjj8uyPCX6XFXHvVRivZxNTEIC/oYo/VilcHwowzNeXw+iUUIHvoD root@2d340457-1bdf-11eb-99f1-c6d701d1e283\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC6cBvnWYKWQJ64cBcL+1ndeinFUiyvxVnAv0PDuEFS6C2ncMu2KPkZlveOUQeFpM/+Jib2eSUbMSpE3J7MkTe8DKTQNSaX5NdDc7GoZBah+SIb1mIMqblK1RlLIeluWjO1cWZ3SjYojcmuh8Ix7mXjsGmYv52pvsG58MC8w8yDljMBfxJISuf3w80RVFESJ0Y59twM9Z6ovk+eLWKMDZ1SaIRukDs5m+cWeVbzuAjNrtvctdWGHWpGBVYJE5F53dDv6Fg6d2c12hnABNHB49QuFl5/q7Eg+htTIuV8xrGmY/7AxscGWs/d7jpm3U2R40tySKQ2UVbvUlKf8+qnIfAt root@9067fed8-1dbf-11eb-8e42-66e2cea7f923\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDVOvaHpqw+w0D5PR/CrVmFUH+t21fVTINmPNemEyvhMRrXn5mIBWEusrd7FVSDXLQhKDN5OH3a6PLbKfszvoKsWvE4ASLSpmTAb070osvOk2/ltgcnPp3ltoObG8kojWmnJTSWcuCnPwJRbatjVsQYG0v9YNnenHg/syXOTLMOjsCour2lzekIrzDLSolbIRiAphBShROToO9IAqVxGuVEpXZurpnbJuhl77madhdvod0HV2R+VGlHitoDEokDJvX0e4CgW/c7ETDD6uEDaXYgvu4eEBIvYhyBXqS8nqaEsUCpS5LW7fpfjavWC1zKuQ/Dc7eeZjhDW9VdVGZSkhmr root@67ccc79b-26d5-11eb-bb1f-6e397dbce9be\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJHHrvlDS4hMwJH0fxmtVnMw5gb2BhWavu+FLbLKQ6tCnuvPrr4IyynTZxh2/6q5SXIihX+gfUG+xq+3qnupdf4ivKdiAIe9ltLPt5NJ/sSyiinQYvTzkDUnIYrz75+7oCZJTLCILtmcZmXMjGmzFIkQm70Jwae1S/sZg8HFOvG3q6iYrh1y37aaUZG4LiO2D9QX57YU7bYR+qnrn8f7o9eXcLtDVKen1dtUPgQ7Q3iLTe7hepfZ64E6imRP8VjL1nu0ZcgJzOYapJVCLIFB8DPQ89JrO28gjUlE+rjpNQwacD7HJJMNQHdD64C2hjcVnSDnbRaZWB7JGWcMVt8ZCx root@6cb353b1-5379-11eb-b6a5-7e8b7adfd54c" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-038", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-038", diff --git a/audit/projects/k8s-infra-e2e-boskos-039/iam.json b/audit/projects/k8s-infra-e2e-boskos-039/iam.json index 8d0f5b18d6c..99a3ae9c6e1 100644 --- a/audit/projects/k8s-infra-e2e-boskos-039/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-039/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-230053707446@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-039/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-039/services/compute/project-info.json index 4e01a7de63c..094a34f8b70 100644 --- a/audit/projects/k8s-infra-e2e-boskos-039/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-039/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\n" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC3Lg5XjcRX/PG5no4NdfTXQKt5gcOpncvqb/FSyn+e0Mpzl9bkxqJB5g+kNqqS4F7/KGQ2eGZoOTEqU27BF9q4xfFglvAFbV22GyfduqhP1nEwruqhuFp6iTmovDWeyimumWD55PDXEkoCNcuuRnEpmw5wonH/FLyN4rL0Wk80WI6QKkL0+4pw/NCgladb6A6mL8GxmbFoDiHA8MleCquUfbky5DB6H1GC3XMsyFu9hSXdDwfhPBVzfi+I3d7G+J7p4gTM55t2src1vKwyr7gWQWZY05oqDPFbNhdzulwDaQteXBdS2mxVGcCa/jqZIbGIXTO9OtRiLpU/56s2jG8x root@4e3b83df-dc13-11ea-82cf-066baa17f17a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCzdo1CspwygLSNW+rI9oXlSRAuDYBO5tT32wxUyJTZyVnllOxMJitZMrapFkCZ8bsdwRlNVCatIaQqogqAM95A+e7AZCSPmDnlBtjBFJZmJrz+jJghRngFOSuzl0/czSC14Ol4dQmdnK33/W47IrFRn52LLX8JyOWZ2SwjWRanGydv6Sejpck1vtsqf5UZd3M89RvD5b6WwxNPKhvGu3yysEZ7SeZ7dckKncVL1OJzxuRFVgIGRw26nSRAEiLkW0iNJ0gYjvffDyh9jYngfNS6hCdLayclfzbjJtcEkS1bWvyRGIABIk+LcOgKmAdig10pSuYEjZBeC1OV9fzdFm7L root@617ae5e7-dd29-11ea-9424-2680bd79560c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDRRV+HXwmmdGH2SZ3a4mvGYMQP2oauhYlGugh0O55pUDWfaLexAaQFtiijn5U+aeuN3bToVsSeE8FjnFD4g9a3mIHxodxR16mkTWRru6ubJQWkDfnZSB4ROyn/bpcdXBlV7co5YplGqmrYVc3DlGVyZKYXGhmrkZgjjY+Jrr9XY1cAT9YYTz9OMCH3pFmSCpL250rWm4QxCqF7HToU0Z/Ii+Dn+G1yR8hdYXKcT53DlYHUsEORHTvcDo6BltZEonLszecCweFUDmDamQA0G1PGEVADaFQg3VDxfSB03ssJ5W5/mIkWZV3y1tNXr/XBFUiEWeV2wEIWlVT0ii5r4HTr root@13a2d865-dd9e-11ea-8a0c-be937dd98cfb\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDf8VvOOvcyTdha3sfeAMIePA85zJ8SUEhwqFKZE1q0XClQ19grQOsKi267awkuX1eab3CvrXb/eiEJ03vdnlZ4T2J4jCK2stlKGDonvJjURDpDhqYqjSoZkrjc62gG6Sxu2TSs45MqnUHxhlcZ9AkONmxtTtJLuUdz17ysMM73sbtLtS49spgN8g3LLkKqgI8dSi22cx/YfT/l82NyNAlDenrTp8YATR4cKqIOy3xP7ANkJuyysdVoNGhwb4SWALwejRyNdi79Q38CsrYmd0Kg9kByI5/2Dylcgoecwt2Jp6CTqYkcEGA0jRfKwBBfwOeA+dFmeBMJbDA4GfkeBpkR root@20631b11-df65-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCzcxP3Ca5du2ZfDwVdHkHcF5VPYvBwYB9v4lB6M8QAzZhgc/+XpzuuCO3OYmsbBvyQ4/huvJv5bPEw6kdy6k2Ws4Ws1MccxRmSZNCLwXGaxg4z6Jrx7317Ctas/9a1jBNSNoxFZeMp66oyUJzSsiylWAGw5OzirAlo0VW7siIua4H6p8iFnZxMoNBaou0NnBf6vLW6RuiN4WFdirq65E061pnMs8oZLX2KaN9O+QrMEt11tMFYHx/7uevXVNHsFUkleyuci9Zaz6QcOV5sZLTZF3hoVJcvzTgU0ZDZuk6KnZ8wH65+MAamSVDTWadTjN8Bm7vTtM3+IufgU8aFyvdF root@37cbbc55-eda7-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDOZ7NmtHaOs4HmhrdDq2SFdazic1vb5jGi9L05QjZD9nNjwZWVYcE5f9RC0vP2vRML7HEZqbYmp6Nmxt+N8iHbVQidvGvsxSxCcE9h6hSLhlRlHwE8uI4/zffme75d0xQFLZ8plXmWzgzOesZ/4dmEyVD599NgTkianlZMlCdBAx+I5NY7XGolRX2fUHKERvNRBlDnD6oFF4an3kt7dl5EfDO6W66kP9SOoFaSju7skAX9fdnjFBt4Z3+8C3f5wv8ZXdG/FrliwLaUEvELLuFRBoB52OyluPW/5/s4fDdkYKeV4X/fktohIy5EkcyJgeLKMi/OoWaeTIEwNc26jo6X root@809ac3de-ee71-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDDeNP/f33bB9hE+bNzuLxUGZVQygHT+mltEoNUsljGlRxNSBVOuFYquDV39MKMkKBp9OcfKyCktZVrnGc4giVxDPHYGK3STDl6vQ8PoGxrzr3PgD5+d0ikPeMpDQBxkCpxfk6AVWFF6jymXfxHn6Qy18toiYEGL9AT/Yb70jbtHfrVcmYN8AKKUheei6wZoha/qikL5teIeiA2ETkE/8GMXCSk6tJHEO4CTybiS0eHJSXvilX4u94DUAPq54ivsDK0ocYVXtIZ/Rpgtwdppmm6SVPstzf61yhbx75fPREmwQv6mHcsYIrGcPX7UYIN+uZGqQS2JLmVPAM1Ljvfl/6f root@78d671ac-f297-11ea-bd49-066a8cf01e04\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCgPivcUM9OyWAV67/t0bLXFdYu8wceYldaHibW1F6XwopTjpnpEwQ4FeABNPg8BzcrtkHFtBFS0/BSe03OeX/D7yyvh8OZuoY7iubdUmgh6xAHToPGqO0A5y2H+uiLuRHhpcb3+MkikBt4rwXQwc8aM/4eBpP6NhQrHBcKhzZQaIu9ork9ELWNMFKy8MUJ6wK63Tk13+SbTcqupXSB3SLW9fjQ3iDvnWEHE1yGUJS6KNimUJs8eXJpniEHCZW2Fgb9IAmBiU2N4EuV0QasMlxXlUP2lwuByJei/35JvS0ztG13d7VNlrl6P2Jc/Oj6xRdTBL5xgUs2kqCkYBFWbTx1 root@48f8e75c-f445-11ea-a379-bea988342348\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC6OHnW2oCMkqNI9ayqSRITkdx/73CmWdbMFhwQVrNM8Eb5sIGlM6X888TqFC9gGBtiO1Ep4lc7DM/D1YIn1zg4WokPFLi157IEj0+qIshs+BBPC67ifOI9duNyM/Ev89DBhZJutfmddXmS6WZc69xbfqqYUytKX/FkYJAbXoxUKbLaFrASSq9205DGmF00mkqoyVr9YYcFmQe+vRigNpxohj5KBiq7pXvEapYSzTK67z3A1/G0VF7yrecIx+Ub8LdgT7S7yfWtL7LpKGy5MUTmqkBBQERFl3n2jhj6drUqmIHPc22vAUNrupqG9Yzy631p9u5uHH+MsGu/4oeRqwBR root@94f485d2-f572-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDlJYnPzQAEA1RCq3fJ1v5Soh9d9H5BpHGGJPn0U0LpucDbCduq9Z3anxjte91WqIyiTyOWSB41yDEuiSTJlFo86W8R5D5TvUd7+orS4tmyEGSW06ADQcfAnONy/ZnJwy0Z7IwKRHnbfMf3tIrupsyOkhTrpK/wbc/rU9dnUnLV95gRwm+Jpatu0UUDOGzdAPb0QxJEzIyRIyvuRR89Nui5qqjucIEjclHKnujuV0zdE5LnMmBA72kWwUZNNW9Yb4lcNV7c5fEhj99Qy8YXnx/99vu1Putqp43BAqqq+YCcVnnQ7SKt12gkKQto0Q21YeqiBIp3fYaIcGcAiF+pwhdx root@1755bfe8-381e-11eb-a25d-22a534811c55\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCib/ZFRnTOBzwK4z6u6NraSsHbS3OeLX7tYd3bwHy1Ffwy9foxaLXC1YFnn0SSlJ1Et42JokLWyQZDPdIvcX+qZ3yYJwaIVU/RQfmYJzJ22dtiMJJK5O5/kK2t9BKAY83MKL1U+nx2w3dS/iT09TuFkDmt+QOqFmP7O1EsptJg/NR5Xjx+3qsMUTV4FosZkFMVenVUajMnd9qNgXEuzKOQY/hCDxiK6ysL23/sbQTQPWuRqy1ISfdwng+iXsLihp6fYRFjLRdIRpmUQprNy61wfzkHdhifN0k3J9RAaVE+aD1ghfV6+gSDdOp3GOedLh9DxD4T6Tp1rNPmMyBLNHYj root@b565fff6-401d-11eb-a051-06e11967f91f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/NXnjKW4m1QPRjmaPuIyVOyizUNzKUXXnbOsBOzBXTi6TB4kHfcs0WgOjkD6rQj9ECuU6dIO+qsMLxyTucPylj/cuAR7jBiTktcT+UO+HOV730b+qVGtenjb2eaNPMBGR2zAhIe1qMejDvi6E7fDZ/kDgngc32X7qotFuPqGLjfxQK/JTJ4YnUT6xlP+9NGR2KHMMRa4GsZqjwaRuIpTXBXeJRRPoMqcs3ObNRrm3HqANIyRmv1H5Z7VT4bgCrqmDFz22Xw2Ihz9FBVFTMnJTqKgfZTkErF78zxsxyNuSBqfls7dc9PGSKnB94pAWjoFmocvXVcTjbX3UEBiB1XMf root@fa89d2dd-47d1-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCxkW+8fF5s86BNkOfE2awHTB30yxsl+I0cAs4lrRv1rj0zlTVXb/tXdTaFG6fWKnj7xTfE0+4PMAb3QJ2alvMf7iN5kP0dhreHIiQZEeCTvfwxU+C4QLtTODVXhmKoPdv+o1jPyk4gN5p9VRC/VJDY8c8FgMq/shNrPhcm/jz/TrRSosTPqzghKefLQSn01ggs8BQTEEzBkUw3y22Yn8aqvW0ZmZc3Zb3CvP0KajlfX+yo0eFkhcHJZ8VZJC65AY4MPNriBhD465vZlC/DdMH/ztqBnqUj630ZeCkrlaNaNrER7LygvFocord8b7ftAJQT8lq1XNlB7GSFgqSUcg3V root@8d4bb733-48b5-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDgdWvoKDXZqmDWo69m3yGpJONCA6QB5bCykdVMbdH5buOCOqVbS3K5cNsrYqVFhrdvveQlp0ciix9w4rlPYNFO8naF9Q6wNFhoDKlCsnZhxFwYMCSWxwQrY6GPdfIK7mEICsMVU9rp8AYbay9gQvCqyfeHxfUoK5tKNa6JSDuiNH8b9A9fGg+c41gL4DR1FATTnbcoLA5WdMmSKorEV86T+dqVCnzimaCukN0ACYBToaboJzgClulDrLrS4TeCI00DkpE0xiTdMXrBrOdFlecbexWqnL8MRMVdui8YQaCddS0OySZZeFTqO1xWocSOXzAEzDjZEGNZy4x0lIIJpf9H root@5d25a304-4e89-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC6S5zeNGmwXme3ILn+/CoHOJhJD9bs6QYLUmzqsTYcl7epK11MCiNRd9W/wu62shhHM7H6B65P5TaxRE1q7hOboCdxJhDK2ANUD3rLcL1iBDkxkoUFnjMBzLNUkCaHp0OQ9FANZHCokmYz55+mXs/V+rnIDIFEKxk2fo7RkDViTAcBxrzPU5zxBwys6mxA8wkt/Mt4nCU3U4fQicVXY4MREN7i1+A0IFfMr3yvmYkvFAmSMDjpsqhPnoG8Vaszd9VoRQMxfKlGesEqAw7zNFmNIOS4NnLM7jCkhmic/UW9ZPV+dz6rQGoY6pZiLbx6y88zb66uoeBJQRWmhFYcpSLH root@f0acf918-4f6c-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDOFSOrEhezT7r/XZ0yApL2kN5Z/Sw/0ras2KsqryArohZAGelMLlRGOMEeZ7WObdyVxCoqWeclU57Jp/A1qumV0k/BdcJdWRtGmd89h+HlQFAYeRHbo4BaQWfnbJGiKR6Zg4w79sghBu15GnDiRIn/Lmt/AdmU9aJp3BmxvTR9Uc2gdAriiZlWuPAqjpuFn+xCKFXKdXACLorv20GHOd+oIMbgWdtWaLsXnlAMmQSCIjLdY05dTlZq5IqsRaovvZch0XsWZQs0SG9hVoR2egL/zSXxRXHWHI+RUiTS9VjJikyy/apnFvBp83ujW4z8JFX0k17+5lvplXUATqR70yFF root@4d47a0ce-51b2-11eb-86b7-56818f023517" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-039", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-039", diff --git a/audit/projects/k8s-infra-e2e-boskos-040/iam.json b/audit/projects/k8s-infra-e2e-boskos-040/iam.json index 6a7134fd1d7..86fc10d682a 100644 --- a/audit/projects/k8s-infra-e2e-boskos-040/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-040/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-159632970703@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-boskos-040/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-040/services/compute/project-info.json index 926d9e78f0e..4bda0f5d3ed 100644 --- a/audit/projects/k8s-infra-e2e-boskos-040/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-040/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\n" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDC835eblhplBE58CeCXOuEAYlLFqIsbW1uBJ/kyKNTQduScUSdY9nbGmMcBR0MbxztH77H8hb76bXCQrKgOgpMdyMk0MSE+wxPGjTJ6xfdW9VuLZo84jJZ/GPOtdGKzUvbhAdSrdhne+7DgE5eGFNj9KhmgjJAw6HPFVFHk+WB+qCjYFirFrIh0As0201h4Hzqg1wDY4QT+83gIo9o64L9tsUS9gZvD+ublAsm13WwPGzRosoJyWOwCrCUtEUYxWeK+215g7gLSqoo4zecJBfIRuktuL2j4zYSD5vJGBDfPBuKRR5wt4fE40xTndZWSILAzvQKDFLICZzRFxnTW27Z root@29b03095-dc5f-11ea-82cf-066baa17f17a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD2fQ8lKHWEeCLlzcNLkaJQMtnBCkOZgHtmWDvaEJV/BagnLmkDV4jHzSq4oq+ZUBhzutTQpFS3BHHnX9rKrycIKYn6Yq7eg5dgJfrxbaL7qmx7jwkmkCEZwB0o5VbD4Xv43Agc+bOeLNBz31eiv5nTvu1DKP28UyC73iPqMNtWG7wNl/x6pTNweynCjh7olaG6QLPyMQEbd/Lr/FEykJC2pUppH6T/FjWVIh1GBzGUYMl9C0Ez8tjsFhCAsIm0/b4qcLfjxQoCAIUKnTmBeCqysM6frcNtpu1pk13sjO7RafzV6qSN1UidiUl3bpOLkK9Y5lNVQsdaYztz2PbEFcvz root@ae7948ba-e325-11ea-80e5-e2aaca28ed6d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDlUwcZBuHCoTZqBvD4LUKycqGPh7tfQbCtgUBlkanTiisgbLRgISMekZGPRbnAkuS6PyEfsgsIp+Ih4FdAcCmNWr9GzkpMMMG4JGZFL2/RblKgd/F0KHX45HwOfz94a1rStPUE258g/VP+hAQCwORGFClgtfRKvApAT6dKcYYkUrtr1lWqQR9hZ5WH8524XhFiO+3V4Pzppj4oyxwuuy2A5rKGPVeW2fXjSal4/FSp3AB7mRq9kAjEgE+Bnd/uFt4AixIcOPSmsuHCLKP4kpiS80gu6g8lfWpOcM9Ynz/avmxHtWfnCiH3R3x0jm7/jItMmbdki5hPC9m2ek+oM4Cf root@1a1053df-e3a4-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCxcLJyHtoi7+c0+MXQqk2hnEOJnLgzPu/sT0i6gLJRvn1H59uxKPsc49dSjcb07GA2yfCHIgLN/auf+Xur6aJT8vjcVybIQH787GxsrgXYb4WFmMQ57Lm7gwaJX+yJNdKn9258ewF993kTLDYy8JoVmV+66mbtcq7C6smKUUdgISpHoudOhVlzcjiTYYhOAVkQu5hY8tn13uinGQvHitMHI/4RBuBw+Rnd5omrEvhiwIO7LcjuS0Lkh9nQepFCn/PI5HUeGqRzrIDrJCCNy5jec3AuUE7aamvEqJ94ts191h2GUPzTiQ7O0hTfe9HFYsCvFqwaWNEtrVqDIM3VsLkb root@5001b258-e3e0-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDS6FcOMwo29CcgNw6oBVWxDycXjluSv1bKWWJcQBmU0jaJScAlidZvxFxdq0G4Fa/uId48dAPeUL0/OgRbVYtCbUtksWHEd9GhU0p5wL2iH85g5YX9pvaBPGSuAakPXsCrTB/DGKjde7pNEmvhyoSWKHZ7DD4dMMe3Jk129GwF8MrBmALVKb1XG7mC3e3elB4j0ZOiH7F3DhnZcXWTs0jqyv0ZsPNxfIlzpua1Ljw+QLiZ1U4xx30i6IGHWbdWnPioxJJNw9f6mogIYrdBy1l+WsFP9htDnEDyV5BW60Ld3R/5hsYEyHleJhqOtoIhdVuqyq+by9fL5FTVb90DE+Ev root@2446a200-e82f-11ea-885a-2259550e0d87\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC3/gYaM1waLYJSk0qIdJuWQU22V3DEOgcL37hLpRzFgcdlRn8XiK7CND0uajzQTm6YCnKuE0JNqhHnMRWk1N66rOEFEpoU0BlS7+A4voHGL9cttruSDRlLiiWEYDyg5LXlDz/x50N1kwr58BwR+AdJYvMfODAcq/mmlUxUb+D6bNGNeN3kg5Z5ZiWXadE504oLA9bPMgT4Dn26eV3j9w03NVI3RmPHYMekdXNb0M3Ft8zBmSJPS5GImfGNzm1keeRcTllQjyrA1m0EC+CcJYobkzxziwmoa9/h2OkC/bB1UgzYzIUFc+lfIcrrzEssdR1cL7a8AjrJQC8sHrlBQJGB root@5c2cf6de-eebd-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDxOo6w9nddvYGxP0KbHDbIEwAE90qVit5Fk80jH3OcpuQ4L44arQmEiAgLXCF+YxtBJ7A5+Lgwx150NXvdvnsgR6cjjyFyAvSYuO2I6NfHJrEWiVGoDSUsQe0CAXLvCDRSIp9IrbChOEk44zRGTHE4ii5IbCYKBpDirIch0UPaPIrMkuXWt57Ic4Iq4OvL6pDUWwjMwwM0IuEtsORi+FMI1IWjR0Re/Y72q4c4s8OcY3aVG3boAAL036kxCbxiVwizXLafALWZX8HiuwtBOf2sMQxyjQ/lwUU+OrcyLs/cx55YJpVhEDl+CkgYTa8X+EOy8E3gapichZcEMNNzhcj1 root@d9eefd79-f1dc-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCfq/cBYadyCTMPH1081ev1Ms1gzoTPW/LSFyYNCfpWbjeGNKVmEjbVE+VH/u1bjMDiT76KPfWYAVeKE9OGRSUu8rw5me8uYZKg4uHkSwIodHo9eKnhVFBjhljTnkFPkYzBeXwZC2b44yvqnC27YKXCfSF8/fBYA9dt8rewzM0VVf6So+IKAj9WyipeCflhmr0uaHyYG1pmS9xCG/Zxg0vpNoslBMKgccMoQhtUmwUCfuX3usdBtqWgzEXOtTAisQKi9qgSzFUwVVAK8FFJtRjb7l0Z/zSoBIRU6SHRCyWstJt1LFB/mmtZtO+hHkKZK76a0tU86OwvQ2sKyiNIWjSr root@0b375b12-f219-11ea-bd49-066a8cf01e04\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0sVJONKSU5XUi7t0mNT6TGdxYkPqP99Gy8cj8CSBGj0iTqMLipVovRNHtukH/whsL61ivy8KgpXhCpe3c5Fw5V3rZnrzXtOTOQZdxLpW8ZufyR0p0jjm/MYx9/S/i10EDpXJ8/Jkk3qDUmBwoLlIEENPcBlCJ6ZOM6B0VhyV+vUR7OjiHP4LlOn2qfIhbnUsc28LyXfaABPHCC6uZMGbBdbPXMjfob18s2LeAbX6dXscQIs9p+YZFQfiNXRPLO29nAzwO/HwOoarZsAk9pa1QXQz0ONeLYnq3dpvfcWu8VWNQb4chHiRlHBRNCiQeIrYI6iRkLXsZSGDv4L8SWJbx root@b0dbfed3-f739-11ea-ae6d-8ed64f3416c0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDa1pXjqMOE/bVFElIc7LMM1SEKVceGWdmXasEYn78G3NvMbFI6VM1zoHdIZ2lqfrwFZLJg6iDWX9CWBDmyD3YUUDYm2Z2HnXsAlPyMuDAzz/ZOyNr4mco144l+JJNIqrQ4A3qRwmblpJ9PvT/OcwhbgugTcX2vPgUDLijLOjvAQMfybwroASVEQ1CMKT7nkssQV1ZbhW1MAXEFckLROlEfaQs36bE1vtw4BekdodOjN0Q83m6sGTnu/wHo67/zn7MHfgvsZrk2F2qqy8bisPmP9oEGfmqA2TFf4GIFWX6GP38BWw4Vv1JDLAVcEBi9or/5N5GwpJQE17J/LmBJtY5R root@e69ddb5e-fbdf-11ea-9c73-86173d37727b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCioXJWc4UO9I7E75WuynW+bG0w5UY55Mqy+uN4hfLEX6iGxESukJfMP6LLISJ4N0SXT4wRXM2ALEfmr5IEjL2f5p/DsgvYCVw4q9aHKVbdpxVaOpeKXX/JWWjzWUi1jTEwPsGnKbvf7/7g7nnzSJVES3Zh6NpVMgV+XXUoIi11cz2YVirgqi2p14vZQciEFOG14Q+N2XWcU026sdmX3BuNOruzsL//GusFAYTwE0fTWNiGG8m2LA7KXRcGKvl1cuqgzOEt61dPUE+Br+q4FAcUXxKGutOegLzwaoL6YMP0eNlb3Yu6AYXOqm4lFbHi8sbkK8gHRrqNHbqCaZ+/+69t root@84a926ac-042b-11eb-a932-82154e1dffc3\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC5iTBNpirgcFd8hKBJcqAg1iMhPKmktQ5ydfuGUlE/eOhJMZTuTv7ltZYk/dwJhSRiyIgeMZc+wq1vdqiQcieQdmzRJ74DegjiBT3Rre2ZhNQedvSKQ3moQ1iD6WxtF+YpT0Tuny90A9jw3x164yIQgOWQabRkYZsjFv12yco6FwsvD1mWPJtChMti88C0tvKgkvbp7QLlJj5K6UOIhVh/UdlfS/ovC4q4sWVhk0uRrv+Wm0h1eMnvej12nfBVx9/5uDtDZzG9iPNXdRUJNy6JTCUmbgDqApAbGgPYYsDF/tUqUbb+ftG+1cTz5k7xO6BqHon+MpGpgL/dYfsHV7SR root@a0f4d75f-0b2e-11eb-82af-de22b9665164\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEA19eWAs1ONrYhB632SKK6JYb7ToS2wqfQZWcKplbS8yD/leAO1wJtkCXVlm6Zqw5aOwNsbHv2mI/9hbHoE21Ozp6qMq+xjv0Y5XRVpu9kT6tBSGbXcsZEczv4z4jxHzXmEBazXtUqfk/xl2GmnvKSQNaCsWI5jq1sCxAf/xhSY1ic6UKVtUsexg0g2u188E5rYOowBZfrF85wjNCj6bCTQp8iC/jOjFpAFBuoKUwG81DET4zEBZQY/nFtdpkTTDcFqEbkry7qRez/iverfGTHE86Y5CWE3XXXT7qnljOsx5CnfQbNdp8HiHY6kQmKo2pS40MXxyceC+xj9vvZ/Kb root@1be33e7c-1264-11eb-a3cf-6ef374375bd7\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC4ahe3bmzYJU/KvmCZmycIAK5DgG9/AlsogDeCtBOJGYzuchdpuFdcWb9ZpdSqFZiq6dE4LMa+wSitVTolseESnni6R6+S3ZTYwUBDgWacgBPIe8pZG4cqxplGUB2zRfjxf04sFQOsnl//a5tI5YUjQDRpCYHV+SElmyibHEBRKdbq+K/O+aqkers9ecClyRwKqrIHxsjkhv+pjsypCqkkdpUsQaNBIuWMejPf7j16eWTzTp5bn7pkYt18t24xWCVxtdZfj0qMmBzjFh8SanSQaLUpsW56qXSkXDONYHCqfV5bxUeOwsA+9iMvIdQqmqkFhnv/Re/XJDn8X3E8qsAr root@21d5d7e5-1d41-11eb-8e42-66e2cea7f923\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCk6BlRCJ/Oj6dptasbtPMtG9n3bbI7Qp9y9HccY8vfO0Ad+lcs03sxmq9XK+mR85UEo4wIgZxUYtkD81tJhfjzD+WQVzAjr+cYnOmzDlNyiJXmLTZrVZNTnePEV/pPPlc+OH+hFYcHKAQi4MOljiM2mYLUM9cr02ytYEb1p2XOMWEK2UP6ieKwSgHg1q6jwsVMva8Pl2iCBpF+0qR/2Tz0PBnAbBFjNyZkOEl6vCC0a4xdmd5XilRVPVcqP/ZhRQj9M2iiMfAGIuNkHjiE0GdareNVp6AfnWtMJA3ayf3PGV+XPEmUUA5ymkXzk34/4fEH8B+U34FxmnpEkuF22Qiz root@9a0bbba2-2360-11eb-bccb-526de22ef413\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCtjB0SEPuOWUXYa6AKFtVb54hYpwIoJXscHO8oS1UfCldHGHhrlga+N/bFgrDcPnbBJjSScDXjopfsMQ/z57DISt2zpiQHsK5ymivphVab1g+dfdCdET47ge3DiJhcJha/XbsRZBt/troeqjmAGT3Im2MqXWErOCe6xfGoKLmwb4WmVct2dgpoGqbEGOvZho6G0EhkhDgcMsqz3+bfrF0+v3BsMs0YfuJ0/2pvjtwrJfIN7XFaiegdWJCVlyIOiPZCNTO5ifEBZEcFJaUy1fcn++wFWcWl9kmhhAQXB77fM4b9EHqeev9RCMbJrDAvmGEfn+NWQFE4uN2z5Yei0oT3 root@e903a273-2d40-11eb-a59c-42dfb897bae6\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD5mzMDBjZmMV/nFYEp0eKcmyhRCe1+XEh7fDD6KHZZmI5jlkRYYCe0FV/IdcIKnBLry1CUM17TnNG18CwxEZEJMQ4q84XIx9kqV+CjEvWYO4xQU8ljPczvk4VptvVbfeh4VWH7KpYji+cS/pDUDSlEB5I6BOqh806fIhc1c3Bexyfsi70fS99Nb+1GVSm4zVw53wyxem4v11oQxaEPASD2dW9XYSpS9LfxRRZfctM70k+PjJryFaOcrYdKA7f6ujgHiIV1PwkP4pW8umCX9WVNd3E6wC+2UK44sq/WkcarUjtn5YTVgK6VuPDImq8LGZGMJppo1HLr2YrMMopz5XeF root@8f137a09-2e89-11eb-9b0b-d6a9455c8be7\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCf46Zax/1d5uBRPNeyKwDCulXHNj4u6Bcndz29oHf+B3V6YZM4w64BimE97t3WeDm7Fik1bN1f6eSoURaoaLcJ0ahLTnmOKWpxaYWVp73L6FQATF3VV90wqU7Q2UJIUI8YO2jcp+8mmqYE7MEo9W1WHNIiTU7u7broD3U/glzhDJ0W5fx8qXFqJefP9fXgCnbAbn7ZFaBHN8btipYVoyG8k0VbPJfjw+wcWHXGQO3uOqX0qG6JUrJYK2i9eQSPPwpbEx4K6Ds5WXNZYvmxyrPun6QkG06BSuBnmSZuc6H3gtkgIta8VLJVUmvZ3bHhdIszAOMC+hk8/xGYBwoRuZzp root@17b60712-36bc-11eb-a25d-22a534811c55\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDUIjgKjwMrzROaAHN44PvtIQihALxERPJGkkIAdQsvEebKMYTBlSvqoery7B6blTe5lQYoOePiyQp4kJ8bC/gWv0zf5dFkypsRKWWsjmHuUv9yYqkkntY+LFTLQ/Q6/4oMpLSZU+3bBDgywgPNB/bIkRX+YUHinInKyuVIBitH/U93zsEXFKKpWs4hkDYuKG/Xr7zMVUszvVlHjJNzGYm3YTkUVHCWOOHu6ppBecNlqqJuILL/sTDE04K0afgvD7NGYlRpP/gQWqSWPTAauQE0DeTjjL13jKuMNRxyzpGRluHMP89d/0bCDCrgxxTPlrtWF/r9jLIgAuU5YrC49hAT root@22eca842-409c-11eb-a051-06e11967f91f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCwzbKq5LtphB8+olgRK5zdeSELXBZA1QZvEgT31i5LN7pbG5lHsgwuN2elQNeu3JWVCLppBEwUuO5vHU1wa6Z8v7cNxL+HcFOwZZHHAggZWStTTmaRIlO/zJRfGQ/IjMLMLGTv2rlgQ4yUoyLUrpHD4EyW9IBHhPyWbPbmmpqFv/cXfVnDZnIx1D8W2w+eq/X48LJ3YlOu7sXjJIw5YjQCFsvY/culx04Td9XaVV0woFOIx42PgCcPEnzU/lPWFAtrzN4Vt22s6+QPHCLW/tBrOQlVIcNtcnjj1r3xytZ5hTf28/TVsaDrpb5FO6nSJODnhNpf13PbYD8g7CCNtq79 root@d8114473-460a-11eb-acd8-6a2a49dd8a76" } ], "kind": "compute#metadata" @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-boskos-040", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-040", From b9b614eb483d81dc13193d5eb0fee7213b4a4beb Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Thu, 14 Jan 2021 17:46:56 -0500 Subject: [PATCH 10/39] audit: enable services for prow build clusters specifically: - enable secretmanager - enable serviceusage - reflect quota updates done out of band - reflect automated cluster changes done out of band --- .../services/compute/project-info.json | 72 +++++++++++-------- .../services/enabled.txt | 2 + .../services/compute/project-info.json | 16 +++++ .../services/container/clusters.txt | 2 +- .../k8s-infra-prow-build/services/enabled.txt | 2 + 5 files changed, 63 insertions(+), 31 deletions(-) diff --git a/audit/projects/k8s-infra-prow-build-trusted/services/compute/project-info.json b/audit/projects/k8s-infra-prow-build-trusted/services/compute/project-info.json index 4d865b04349..3a48dc58da5 100644 --- a/audit/projects/k8s-infra-prow-build-trusted/services/compute/project-info.json +++ b/audit/projects/k8s-infra-prow-build-trusted/services/compute/project-info.json @@ -20,99 +20,99 @@ "name": "k8s-infra-prow-build-trusted", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -120,15 +120,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -140,11 +140,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -152,8 +152,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-prow-build-trusted", diff --git a/audit/projects/k8s-infra-prow-build-trusted/services/enabled.txt b/audit/projects/k8s-infra-prow-build-trusted/services/enabled.txt index 7c5a892d14b..d2af82da1bc 100644 --- a/audit/projects/k8s-infra-prow-build-trusted/services/enabled.txt +++ b/audit/projects/k8s-infra-prow-build-trusted/services/enabled.txt @@ -11,6 +11,8 @@ logging.googleapis.com Cloud Logging API monitoring.googleapis.com Cloud Monitoring API oslogin.googleapis.com Cloud OS Login API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API +serviceusage.googleapis.com Service Usage API stackdriver.googleapis.com Stackdriver API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-prow-build/services/compute/project-info.json b/audit/projects/k8s-infra-prow-build/services/compute/project-info.json index 944ae8871cf..659ee4bc7a0 100644 --- a/audit/projects/k8s-infra-prow-build/services/compute/project-info.json +++ b/audit/projects/k8s-infra-prow-build/services/compute/project-info.json @@ -8,6 +8,10 @@ { "key": "sshKeys", "value": "gke-8d7225b757872b0f06a6:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD2x5DoWU6zKsjIs0srrMdc3CupZyCk6uiJUZ6KeRb3s7MmKQ3GCngTaTmRT3eJJwvzGBHbqAGHayQVIDX8NIw8PBh7qS1wtwZXGiRGkQM9xZGnDGlLDh5/OPgsAZxvmO9WX0y1voN5Q9k26J47aVC/cVQetMD0UVYYE+fACq6Nwz7KtBoFuVE99e9QaqvJc7g3WzeOFcRj8FPtFKSskwVOIgbR4sEdY/TAlibyM3eTnnjIAKugNX78R+V9rSXDOl/OCAkx22Cy+TrF5VVzvGR4r8MytyoYupr6DLnNIqtPPnzQbx+GA+x4NBGjOB/MGidY2lTIc+qAoXX1aSOrQ+ff gke-8d7225b757872b0f06a6@gke-8d7225b757872b0f06a6\ngke-8d7225b757872b0f06a6:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0TwjNFdXL0OC2Qt0dfP64bpc6Yy5vH353AiZ/0V9WJJ5n7Qrk7oQbbtGXYuWYs/+cPx7sA3jGh6CRNkPPTl/0gVrud1XM07gMkBlr8ulyHUIBFG3jEmDipedNHYIioVz6w4ZJhQcDe83n+MTW8a2iNFU8ihqfmjMcyj5q4q8c1jA1zWv06cKG3rlfTHM7E1Y1g/twmgymNkj55vMHfax3Zdh3zsjBqAsAhWLTCCPLpU39qXg90uDnzunoXQ0rmGVliJyhrHfeJlY5trC8C1M0dI4DVRpeT2PtS9YTMoJ017hA+To848af9S5bnpQ0eHhqaMGsAjwuaxULXIPEZZqz gke-8d7225b757872b0f06a6@gke-8d7225b757872b0f06a6\ngke-8d7225b757872b0f06a6:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDbYis3+c9yPGIVnC1PzVTlLVFf+8C67ElBXCFm75E6H3J3chHxAk8kc9VKEk6MoqNEL1xWH9B0GI+IeWcqJC8IhaPAv/FDqub2IUf0YZCUnjU48Y709DodM1+IQZZcmM4bDaiRzGoB+0H9TI2rL2jhb17xckvztWLTf4aKxgRUWn655FORnrcs7064kH8c4c+W+qgUlG1P5Vad6H1EmnFG6AB488kf9y5dE7A1tDQqX/Ssf5atcGlHMR/5gdTqEF2nx40j1btDBAlHOBSBOEsNOHe7xGKi+KDlyvJEjuZbq7yVY36+twXalxwO+b2wRjV++OZ1fk9oKE9CJjxMA+1r gke-8d7225b757872b0f06a6@gke-8d7225b757872b0f06a6" + }, + { + "key": "ssh-keys", + "value": "spiffxp:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCpkTcxcoyyH/fEAAY3pRCXJqewZ68piwWCIxR/hUpWX8FEwRIOih6yNsuS+BiKID9yEBVjuEOVLIrG/0aqF7OJEqnYyriHfsYDzwmIu8h9v5AhQBwZq5eDIdqiHqYM6+7S1y5L/cmW5dYAgKzNd2qeR0n4xuFfgMXcsraKoqJsiyW8CMz/f64C710k9rp0YHSS/v8kR2Q4ypz9TzVazefTCfHpDbTFMhdgKPTjQODmYLOWlSsIwIo4h7GNViAONmAjH7+2rXg6139dMxect5/HAlSG3G+92YHMOB3GCMDM+GpLrJeCOx4HZRDU7ix+JKCKjOAZndomxkVdkxH7TrkH google-ssh {\"userName\":\"spiffxp@google.com\",\"expireOn\":\"2020-10-22T18:47:27+0000\"}\nspiffxp:ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBKZcHfJn+tLvb6Qc6xdvI3KCwUAGLdXR17KuavgOO4OWeBS2nDfwdZN6VDcOPzWnAWqGieRlcJzmI6EQbZ5FM7k= google-ssh {\"userName\":\"spiffxp@google.com\",\"expireOn\":\"2020-10-22T18:47:26+0000\"}\n" } ], "kind": "compute#metadata" @@ -154,6 +158,18 @@ { "limit": 15, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-prow-build", diff --git a/audit/projects/k8s-infra-prow-build/services/container/clusters.txt b/audit/projects/k8s-infra-prow-build/services/container/clusters.txt index 195a6a5b1aa..0220886af72 100644 --- a/audit/projects/k8s-infra-prow-build/services/container/clusters.txt +++ b/audit/projects/k8s-infra-prow-build/services/container/clusters.txt @@ -1 +1 @@ -prow-build us-central1 us-central1-c;us-central1-f;us-central1-b 6 RUNNING +prow-build us-central1 us-central1-c;us-central1-f;us-central1-b 67 RUNNING diff --git a/audit/projects/k8s-infra-prow-build/services/enabled.txt b/audit/projects/k8s-infra-prow-build/services/enabled.txt index 7c5a892d14b..d2af82da1bc 100644 --- a/audit/projects/k8s-infra-prow-build/services/enabled.txt +++ b/audit/projects/k8s-infra-prow-build/services/enabled.txt @@ -11,6 +11,8 @@ logging.googleapis.com Cloud Logging API monitoring.googleapis.com Cloud Monitoring API oslogin.googleapis.com Cloud OS Login API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API +serviceusage.googleapis.com Service Usage API stackdriver.googleapis.com Stackdriver API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage From 29426dbba53429779b59bfea4841f6aaeccf1bf4 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Thu, 14 Jan 2021 17:19:50 -0500 Subject: [PATCH 11/39] audit: add prow viewer role to manual k8s-infra-e2e projects --- .../k8s-infra-e2e-gce-project/iam.json | 13 ++++ .../services/compute/project-info.json | 72 +++++++++++-------- .../k8s-infra-e2e-node-e2e-project/iam.json | 13 ++++ .../services/compute/project-info.json | 72 +++++++++++-------- 4 files changed, 110 insertions(+), 60 deletions(-) diff --git a/audit/projects/k8s-infra-e2e-gce-project/iam.json b/audit/projects/k8s-infra-e2e-gce-project/iam.json index 1a48f103573..6ef8d54d13a 100644 --- a/audit/projects/k8s-infra-e2e-gce-project/iam.json +++ b/audit/projects/k8s-infra-e2e-gce-project/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-302382158096@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-gce-project/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-gce-project/services/compute/project-info.json index c0efe2018a0..3c8b075d544 100644 --- a/audit/projects/k8s-infra-e2e-gce-project/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-gce-project/services/compute/project-info.json @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-gce-project", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-gce-project", diff --git a/audit/projects/k8s-infra-e2e-node-e2e-project/iam.json b/audit/projects/k8s-infra-e2e-node-e2e-project/iam.json index 6a0ac27099a..2568834a4e9 100644 --- a/audit/projects/k8s-infra-e2e-node-e2e-project/iam.json +++ b/audit/projects/k8s-infra-e2e-node-e2e-project/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "serviceAccount:service-855765450555@compute-system.iam.gserviceaccount.com" @@ -17,9 +23,16 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "roles/viewer" } ], "version": 1 diff --git a/audit/projects/k8s-infra-e2e-node-e2e-project/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-node-e2e-project/services/compute/project-info.json index c1a79983af7..b34d041c323 100644 --- a/audit/projects/k8s-infra-e2e-node-e2e-project/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-node-e2e-project/services/compute/project-info.json @@ -16,99 +16,99 @@ "name": "k8s-infra-e2e-node-e2e-project", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -116,15 +116,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -136,11 +136,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -148,8 +148,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-node-e2e-project", From af431d1c307e1c0d2c4c9ac27f71fc7978a843c5 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Thu, 14 Jan 2021 17:45:51 -0500 Subject: [PATCH 12/39] audit: add prow viewer/oncall groups to k8s-infra-prow-build-trusted --- audit/projects/k8s-infra-prow-build/iam.json | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/audit/projects/k8s-infra-prow-build/iam.json b/audit/projects/k8s-infra-prow-build/iam.json index 3657b4ef454..fa33fd79dfd 100644 --- a/audit/projects/k8s-infra-prow-build/iam.json +++ b/audit/projects/k8s-infra-prow-build/iam.json @@ -1,5 +1,11 @@ { "bindings": [ + { + "members": [ + "group:k8s-infra-prow-viewers@kubernetes.io" + ], + "role": "organizations/758905017065/roles/prow.viewer" + }, { "members": [ "group:k8s-infra-cluster-admins@kubernetes.io" @@ -76,6 +82,7 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" From e3d188cd447ab8602780bdb8c525b81b442a3316 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Thu, 14 Jan 2021 17:39:41 -0500 Subject: [PATCH 13/39] audit: add k8s-infra-prow-build-trusted secrets specifically: - windows-remote-docker_ca-pem - windows-remote-docker_cert-pem - windows-remote-docker_key-pem --- .../windows-remote-docker_ca-pem/description.json | 10 ++++++++++ .../secrets/windows-remote-docker_ca-pem/iam.json | 11 +++++++++++ .../windows-remote-docker_ca-pem/versions.json | 10 ++++++++++ .../windows-remote-docker_cert-pem/description.json | 10 ++++++++++ .../secrets/windows-remote-docker_cert-pem/iam.json | 11 +++++++++++ .../windows-remote-docker_cert-pem/versions.json | 10 ++++++++++ .../windows-remote-docker_key-pem/description.json | 10 ++++++++++ .../secrets/windows-remote-docker_key-pem/iam.json | 11 +++++++++++ .../windows-remote-docker_key-pem/versions.json | 10 ++++++++++ 9 files changed, 93 insertions(+) create mode 100644 audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_ca-pem/description.json create mode 100644 audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_ca-pem/iam.json create mode 100644 audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_ca-pem/versions.json create mode 100644 audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_cert-pem/description.json create mode 100644 audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_cert-pem/iam.json create mode 100644 audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_cert-pem/versions.json create mode 100644 audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_key-pem/description.json create mode 100644 audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_key-pem/iam.json create mode 100644 audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_key-pem/versions.json diff --git a/audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_ca-pem/description.json b/audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_ca-pem/description.json new file mode 100644 index 00000000000..ce3f7266f9e --- /dev/null +++ b/audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_ca-pem/description.json @@ -0,0 +1,10 @@ +{ + "createTime": "2020-05-27T23:37:49.309378Z", + "labels": { + "secret-group": "windows-img-promoter-cert" + }, + "name": "projects/180382678033/secrets/windows-remote-docker_ca-pem", + "replication": { + "automatic": {} + } +} diff --git a/audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_ca-pem/iam.json b/audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_ca-pem/iam.json new file mode 100644 index 00000000000..a18367fa89f --- /dev/null +++ b/audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_ca-pem/iam.json @@ -0,0 +1,11 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:456067983721@cloudbuild.gserviceaccount.com" + ], + "role": "roles/secretmanager.secretAccessor" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_ca-pem/versions.json b/audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_ca-pem/versions.json new file mode 100644 index 00000000000..cdb94ef8736 --- /dev/null +++ b/audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_ca-pem/versions.json @@ -0,0 +1,10 @@ +[ + { + "createTime": "2020-05-27T23:37:50.427709Z", + "name": "projects/180382678033/secrets/windows-remote-docker_ca-pem/versions/1", + "replicationStatus": { + "automatic": {} + }, + "state": "ENABLED" + } +] diff --git a/audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_cert-pem/description.json b/audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_cert-pem/description.json new file mode 100644 index 00000000000..d7c34ffb1a6 --- /dev/null +++ b/audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_cert-pem/description.json @@ -0,0 +1,10 @@ +{ + "createTime": "2020-05-27T23:38:13.897402Z", + "labels": { + "secret-group": "windows-img-promoter-cert" + }, + "name": "projects/180382678033/secrets/windows-remote-docker_cert-pem", + "replication": { + "automatic": {} + } +} diff --git a/audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_cert-pem/iam.json b/audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_cert-pem/iam.json new file mode 100644 index 00000000000..a18367fa89f --- /dev/null +++ b/audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_cert-pem/iam.json @@ -0,0 +1,11 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:456067983721@cloudbuild.gserviceaccount.com" + ], + "role": "roles/secretmanager.secretAccessor" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_cert-pem/versions.json b/audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_cert-pem/versions.json new file mode 100644 index 00000000000..e3beaf0d7df --- /dev/null +++ b/audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_cert-pem/versions.json @@ -0,0 +1,10 @@ +[ + { + "createTime": "2020-05-27T23:38:14.994470Z", + "name": "projects/180382678033/secrets/windows-remote-docker_cert-pem/versions/1", + "replicationStatus": { + "automatic": {} + }, + "state": "ENABLED" + } +] diff --git a/audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_key-pem/description.json b/audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_key-pem/description.json new file mode 100644 index 00000000000..d896195b936 --- /dev/null +++ b/audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_key-pem/description.json @@ -0,0 +1,10 @@ +{ + "createTime": "2020-05-27T23:38:32.418003Z", + "labels": { + "secret-group": "windows-img-promoter-cert" + }, + "name": "projects/180382678033/secrets/windows-remote-docker_key-pem", + "replication": { + "automatic": {} + } +} diff --git a/audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_key-pem/iam.json b/audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_key-pem/iam.json new file mode 100644 index 00000000000..a18367fa89f --- /dev/null +++ b/audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_key-pem/iam.json @@ -0,0 +1,11 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:456067983721@cloudbuild.gserviceaccount.com" + ], + "role": "roles/secretmanager.secretAccessor" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_key-pem/versions.json b/audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_key-pem/versions.json new file mode 100644 index 00000000000..b82aaf80b30 --- /dev/null +++ b/audit/projects/k8s-infra-prow-build-trusted/secrets/windows-remote-docker_key-pem/versions.json @@ -0,0 +1,10 @@ +[ + { + "createTime": "2020-05-27T23:38:33.351277Z", + "name": "projects/180382678033/secrets/windows-remote-docker_key-pem/versions/1", + "replicationStatus": { + "automatic": {} + }, + "state": "ENABLED" + } +] From 6660eae3a7b0fc5e2f2539db6c2096d5c163e7d8 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Thu, 14 Jan 2021 17:40:52 -0500 Subject: [PATCH 14/39] audit: add prow-deployer service account specifically: - create the service account - bind to trusted prow via workload identity - empower SA to deploy to prow build clusters --- audit/projects/k8s-infra-prow-build-trusted/iam.json | 7 +++++++ .../description.json | 8 ++++++++ .../iam.json | 11 +++++++++++ audit/projects/k8s-infra-prow-build/iam.json | 6 ++++++ 4 files changed, 32 insertions(+) create mode 100644 audit/projects/k8s-infra-prow-build-trusted/service-accounts/prow-deployer@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-infra-prow-build-trusted/service-accounts/prow-deployer@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/iam.json diff --git a/audit/projects/k8s-infra-prow-build-trusted/iam.json b/audit/projects/k8s-infra-prow-build-trusted/iam.json index ed8d8fdd77a..36ec27a7718 100644 --- a/audit/projects/k8s-infra-prow-build-trusted/iam.json +++ b/audit/projects/k8s-infra-prow-build-trusted/iam.json @@ -42,6 +42,12 @@ ], "role": "roles/container.clusterViewer" }, + { + "members": [ + "serviceAccount:prow-deployer@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/container.developer" + }, { "members": [ "serviceAccount:service-180382678033@container-engine-robot.iam.gserviceaccount.com" @@ -76,6 +82,7 @@ }, { "members": [ + "group:k8s-infra-prow-oncall@kubernetes.io", "user:spiffxp@google.com" ], "role": "roles/owner" diff --git a/audit/projects/k8s-infra-prow-build-trusted/service-accounts/prow-deployer@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/description.json b/audit/projects/k8s-infra-prow-build-trusted/service-accounts/prow-deployer@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/description.json new file mode 100644 index 00000000000..4893807b083 --- /dev/null +++ b/audit/projects/k8s-infra-prow-build-trusted/service-accounts/prow-deployer@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "prow-deployer", + "email": "prow-deployer@k8s-infra-prow-build-trusted.iam.gserviceaccount.com", + "name": "projects/k8s-infra-prow-build-trusted/serviceAccounts/prow-deployer@k8s-infra-prow-build-trusted.iam.gserviceaccount.com", + "oauth2ClientId": "108520437172201123758", + "projectId": "k8s-infra-prow-build-trusted", + "uniqueId": "108520437172201123758" +} diff --git a/audit/projects/k8s-infra-prow-build-trusted/service-accounts/prow-deployer@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-prow-build-trusted/service-accounts/prow-deployer@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..025312b1dd3 --- /dev/null +++ b/audit/projects/k8s-infra-prow-build-trusted/service-accounts/prow-deployer@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/iam.json @@ -0,0 +1,11 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:k8s-infra-prow-build-trusted.svc.id.goog[test-pods/prow-deployer]" + ], + "role": "roles/iam.workloadIdentityUser" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-prow-build/iam.json b/audit/projects/k8s-infra-prow-build/iam.json index fa33fd79dfd..f7febb55455 100644 --- a/audit/projects/k8s-infra-prow-build/iam.json +++ b/audit/projects/k8s-infra-prow-build/iam.json @@ -48,6 +48,12 @@ ], "role": "roles/container.clusterViewer" }, + { + "members": [ + "serviceAccount:prow-deployer@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/container.developer" + }, { "members": [ "serviceAccount:service-773781448124@container-engine-robot.iam.gserviceaccount.com" From 5b54a5cf88cfb4eedb40c89d04f24b15afe99030 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Wed, 13 Jan 2021 12:57:16 -0500 Subject: [PATCH 15/39] audit: rm k8s-staging-release-test project also drop permissions given to related kubernetes.io group --- .../iam.json | 5 +- .../iam.json | 5 +- .../iam.json | 5 +- audit/projects/k8s-release-test-prod/iam.json | 3 +- .../bucketpolicyonly.txt | 4 - .../cors.txt | 1 - .../iam.json | 44 ----- .../logging.txt | 1 - .../bucketpolicyonly.txt | 4 - .../k8s-staging-release-test-gcb/cors.txt | 1 - .../k8s-staging-release-test-gcb/iam.json | 52 ------ .../k8s-staging-release-test-gcb/logging.txt | 1 - .../bucketpolicyonly.txt | 4 - .../buckets/k8s-staging-release-test/cors.txt | 1 - .../buckets/k8s-staging-release-test/iam.json | 43 ----- .../k8s-staging-release-test/logging.txt | 1 - .../k8s-staging-release-test/description.json | 11 -- .../k8s-staging-release-test/iam.json | 77 --------- .../description.json | 8 - .../iam.json | 1 - .../services/compute/project-info.json | 151 ------------------ .../services/enabled.txt | 10 -- 22 files changed, 4 insertions(+), 429 deletions(-) delete mode 100644 audit/projects/k8s-staging-release-test/buckets/artifacts.k8s-staging-release-test.appspot.com/bucketpolicyonly.txt delete mode 100644 audit/projects/k8s-staging-release-test/buckets/artifacts.k8s-staging-release-test.appspot.com/cors.txt delete mode 100644 audit/projects/k8s-staging-release-test/buckets/artifacts.k8s-staging-release-test.appspot.com/iam.json delete mode 100644 audit/projects/k8s-staging-release-test/buckets/artifacts.k8s-staging-release-test.appspot.com/logging.txt delete mode 100644 audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test-gcb/bucketpolicyonly.txt delete mode 100644 audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test-gcb/cors.txt delete mode 100644 audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test-gcb/iam.json delete mode 100644 audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test-gcb/logging.txt delete mode 100644 audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test/bucketpolicyonly.txt delete mode 100644 audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test/cors.txt delete mode 100644 audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test/iam.json delete mode 100644 audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test/logging.txt delete mode 100644 audit/projects/k8s-staging-release-test/description.json delete mode 100644 audit/projects/k8s-staging-release-test/iam.json delete mode 100644 audit/projects/k8s-staging-release-test/service-accounts/634027639865-compute@developer.gserviceaccount.com/description.json delete mode 100644 audit/projects/k8s-staging-release-test/service-accounts/634027639865-compute@developer.gserviceaccount.com/iam.json delete mode 100644 audit/projects/k8s-staging-release-test/services/compute/project-info.json delete mode 100644 audit/projects/k8s-staging-release-test/services/enabled.txt diff --git a/audit/projects/k8s-release-test-prod/buckets/asia.artifacts.k8s-release-test-prod.appspot.com/iam.json b/audit/projects/k8s-release-test-prod/buckets/asia.artifacts.k8s-release-test-prod.appspot.com/iam.json index 5183fe1bc67..78b6581be00 100644 --- a/audit/projects/k8s-release-test-prod/buckets/asia.artifacts.k8s-release-test-prod.appspot.com/iam.json +++ b/audit/projects/k8s-release-test-prod/buckets/asia.artifacts.k8s-release-test-prod.appspot.com/iam.json @@ -12,15 +12,13 @@ { "members": [ "group:k8s-infra-staging-kubernetes@kubernetes.io", - "group:k8s-infra-staging-release-test@kubernetes.io", "projectViewer:k8s-release-test-prod" ], "role": "roles/storage.legacyBucketReader" }, { "members": [ - "group:k8s-infra-staging-kubernetes@kubernetes.io", - "group:k8s-infra-staging-release-test@kubernetes.io" + "group:k8s-infra-staging-kubernetes@kubernetes.io" ], "role": "roles/storage.legacyBucketWriter" }, @@ -28,7 +26,6 @@ "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", "group:k8s-infra-staging-kubernetes@kubernetes.io", - "group:k8s-infra-staging-release-test@kubernetes.io", "serviceAccount:k8s-infra-gcr-promoter@k8s-release-test-prod.iam.gserviceaccount.com" ], "role": "roles/storage.objectAdmin" diff --git a/audit/projects/k8s-release-test-prod/buckets/eu.artifacts.k8s-release-test-prod.appspot.com/iam.json b/audit/projects/k8s-release-test-prod/buckets/eu.artifacts.k8s-release-test-prod.appspot.com/iam.json index 5183fe1bc67..78b6581be00 100644 --- a/audit/projects/k8s-release-test-prod/buckets/eu.artifacts.k8s-release-test-prod.appspot.com/iam.json +++ b/audit/projects/k8s-release-test-prod/buckets/eu.artifacts.k8s-release-test-prod.appspot.com/iam.json @@ -12,15 +12,13 @@ { "members": [ "group:k8s-infra-staging-kubernetes@kubernetes.io", - "group:k8s-infra-staging-release-test@kubernetes.io", "projectViewer:k8s-release-test-prod" ], "role": "roles/storage.legacyBucketReader" }, { "members": [ - "group:k8s-infra-staging-kubernetes@kubernetes.io", - "group:k8s-infra-staging-release-test@kubernetes.io" + "group:k8s-infra-staging-kubernetes@kubernetes.io" ], "role": "roles/storage.legacyBucketWriter" }, @@ -28,7 +26,6 @@ "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", "group:k8s-infra-staging-kubernetes@kubernetes.io", - "group:k8s-infra-staging-release-test@kubernetes.io", "serviceAccount:k8s-infra-gcr-promoter@k8s-release-test-prod.iam.gserviceaccount.com" ], "role": "roles/storage.objectAdmin" diff --git a/audit/projects/k8s-release-test-prod/buckets/us.artifacts.k8s-release-test-prod.appspot.com/iam.json b/audit/projects/k8s-release-test-prod/buckets/us.artifacts.k8s-release-test-prod.appspot.com/iam.json index 5183fe1bc67..78b6581be00 100644 --- a/audit/projects/k8s-release-test-prod/buckets/us.artifacts.k8s-release-test-prod.appspot.com/iam.json +++ b/audit/projects/k8s-release-test-prod/buckets/us.artifacts.k8s-release-test-prod.appspot.com/iam.json @@ -12,15 +12,13 @@ { "members": [ "group:k8s-infra-staging-kubernetes@kubernetes.io", - "group:k8s-infra-staging-release-test@kubernetes.io", "projectViewer:k8s-release-test-prod" ], "role": "roles/storage.legacyBucketReader" }, { "members": [ - "group:k8s-infra-staging-kubernetes@kubernetes.io", - "group:k8s-infra-staging-release-test@kubernetes.io" + "group:k8s-infra-staging-kubernetes@kubernetes.io" ], "role": "roles/storage.legacyBucketWriter" }, @@ -28,7 +26,6 @@ "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", "group:k8s-infra-staging-kubernetes@kubernetes.io", - "group:k8s-infra-staging-release-test@kubernetes.io", "serviceAccount:k8s-infra-gcr-promoter@k8s-release-test-prod.iam.gserviceaccount.com" ], "role": "roles/storage.objectAdmin" diff --git a/audit/projects/k8s-release-test-prod/iam.json b/audit/projects/k8s-release-test-prod/iam.json index e3015f3ed6f..c735197e434 100644 --- a/audit/projects/k8s-release-test-prod/iam.json +++ b/audit/projects/k8s-release-test-prod/iam.json @@ -72,8 +72,7 @@ "group:k8s-infra-release-admins@kubernetes.io", "group:k8s-infra-release-editors@kubernetes.io", "group:k8s-infra-release-viewers@kubernetes.io", - "group:k8s-infra-staging-kubernetes@kubernetes.io", - "group:k8s-infra-staging-release-test@kubernetes.io" + "group:k8s-infra-staging-kubernetes@kubernetes.io" ], "role": "roles/viewer" } diff --git a/audit/projects/k8s-staging-release-test/buckets/artifacts.k8s-staging-release-test.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-release-test/buckets/artifacts.k8s-staging-release-test.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index db130a5c0f4..00000000000 --- a/audit/projects/k8s-staging-release-test/buckets/artifacts.k8s-staging-release-test.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-release-test.appspot.com: - Enabled: True - LockedTime: 2019-10-07 22:04:21.520000+00:00 - diff --git a/audit/projects/k8s-staging-release-test/buckets/artifacts.k8s-staging-release-test.appspot.com/cors.txt b/audit/projects/k8s-staging-release-test/buckets/artifacts.k8s-staging-release-test.appspot.com/cors.txt deleted file mode 100644 index ed5cc0879ac..00000000000 --- a/audit/projects/k8s-staging-release-test/buckets/artifacts.k8s-staging-release-test.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-release-test.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-release-test/buckets/artifacts.k8s-staging-release-test.appspot.com/iam.json b/audit/projects/k8s-staging-release-test/buckets/artifacts.k8s-staging-release-test.appspot.com/iam.json deleted file mode 100644 index e19596b4186..00000000000 --- a/audit/projects/k8s-staging-release-test/buckets/artifacts.k8s-staging-release-test.appspot.com/iam.json +++ /dev/null @@ -1,44 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-release-test", - "projectOwner:k8s-staging-release-test" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io", - "group:k8s-infra-staging-release-test@kubernetes.io", - "projectViewer:k8s-staging-release-test" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io", - "group:k8s-infra-staging-release-test@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io", - "group:k8s-infra-staging-release-test@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-release-test/buckets/artifacts.k8s-staging-release-test.appspot.com/logging.txt b/audit/projects/k8s-staging-release-test/buckets/artifacts.k8s-staging-release-test.appspot.com/logging.txt deleted file mode 100644 index f7d051df352..00000000000 --- a/audit/projects/k8s-staging-release-test/buckets/artifacts.k8s-staging-release-test.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-release-test.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test-gcb/bucketpolicyonly.txt deleted file mode 100644 index c02a087b3e4..00000000000 --- a/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-release-test-gcb: - Enabled: True - LockedTime: 2019-12-10 16:30:26.008000+00:00 - diff --git a/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test-gcb/cors.txt b/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test-gcb/cors.txt deleted file mode 100644 index c606cdb2053..00000000000 --- a/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-release-test-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test-gcb/iam.json b/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test-gcb/iam.json deleted file mode 100644 index f5c7b13794a..00000000000 --- a/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test-gcb/iam.json +++ /dev/null @@ -1,52 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-release-test", - "projectOwner:k8s-staging-release-test" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io", - "projectViewer:k8s-staging-release-test" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io", - "group:k8s-infra-staging-release-test@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io", - "group:k8s-infra-staging-release-test@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test-gcb/logging.txt b/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test-gcb/logging.txt deleted file mode 100644 index 9443a54cdef..00000000000 --- a/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-release-test-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test/bucketpolicyonly.txt b/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test/bucketpolicyonly.txt deleted file mode 100644 index bb7d5c0232f..00000000000 --- a/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-release-test: - Enabled: True - LockedTime: 2019-10-07 22:04:43.121000+00:00 - diff --git a/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test/cors.txt b/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test/cors.txt deleted file mode 100644 index 5d0863a29d1..00000000000 --- a/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-release-test/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test/iam.json b/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test/iam.json deleted file mode 100644 index e35bd1cda9f..00000000000 --- a/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test/iam.json +++ /dev/null @@ -1,43 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-release-test", - "projectOwner:k8s-staging-release-test" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io", - "projectViewer:k8s-staging-release-test" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io", - "group:k8s-infra-staging-release-test@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io", - "group:k8s-infra-staging-release-test@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test/logging.txt b/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test/logging.txt deleted file mode 100644 index 7aedf56c6fd..00000000000 --- a/audit/projects/k8s-staging-release-test/buckets/k8s-staging-release-test/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-release-test/ has no logging configuration. diff --git a/audit/projects/k8s-staging-release-test/description.json b/audit/projects/k8s-staging-release-test/description.json deleted file mode 100644 index 17d655259be..00000000000 --- a/audit/projects/k8s-staging-release-test/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2019-07-09T22:03:39.445Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-release-test", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-release-test", - "projectNumber": "634027639865" -} diff --git a/audit/projects/k8s-staging-release-test/iam.json b/audit/projects/k8s-staging-release-test/iam.json deleted file mode 100644 index cc2696d5657..00000000000 --- a/audit/projects/k8s-staging-release-test/iam.json +++ /dev/null @@ -1,77 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:634027639865@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io", - "group:k8s-infra-staging-release-test@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-634027639865@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io" - ], - "role": "roles/cloudkms.admin" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io" - ], - "role": "roles/cloudkms.cryptoKeyEncrypterDecrypter" - }, - { - "members": [ - "serviceAccount:service-634027639865@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:634027639865-compute@developer.gserviceaccount.com", - "serviceAccount:634027639865@cloudservices.gserviceaccount.com", - "serviceAccount:service-634027639865@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io", - "group:k8s-infra-staging-release-test@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io", - "group:k8s-infra-release-viewers@kubernetes.io", - "group:k8s-infra-staging-release-test@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-release-test/service-accounts/634027639865-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-staging-release-test/service-accounts/634027639865-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index e8fe8ca64f8..00000000000 --- a/audit/projects/k8s-staging-release-test/service-accounts/634027639865-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "634027639865-compute@developer.gserviceaccount.com", - "name": "projects/k8s-staging-release-test/serviceAccounts/634027639865-compute@developer.gserviceaccount.com", - "oauth2ClientId": "113841052621378931053", - "projectId": "k8s-staging-release-test", - "uniqueId": "113841052621378931053" -} diff --git a/audit/projects/k8s-staging-release-test/service-accounts/634027639865-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-staging-release-test/service-accounts/634027639865-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bc..00000000000 --- a/audit/projects/k8s-staging-release-test/service-accounts/634027639865-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-staging-release-test/services/compute/project-info.json b/audit/projects/k8s-staging-release-test/services/compute/project-info.json deleted file mode 100644 index a00882a0f30..00000000000 --- a/audit/projects/k8s-staging-release-test/services/compute/project-info.json +++ /dev/null @@ -1,151 +0,0 @@ -{ - "commonInstanceMetadata": { - "kind": "compute#metadata" - }, - "creationTimestamp": "2019-10-23T15:49:20.671-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "634027639865-compute@developer.gserviceaccount.com", - "id": "549894741099898399", - "kind": "compute#project", - "name": "k8s-staging-release-test", - "quotas": [ - { - "limit": 5000, - "metric": "SNAPSHOTS" - }, - { - "limit": 15, - "metric": "NETWORKS" - }, - { - "limit": 200, - "metric": "FIREWALLS" - }, - { - "limit": 2000, - "metric": "IMAGES" - }, - { - "limit": 21, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 250, - "metric": "ROUTES" - }, - { - "limit": 45, - "metric": "FORWARDING_RULES" - }, - { - "limit": 150, - "metric": "TARGET_POOLS" - }, - { - "limit": 150, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 69, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 150, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 30, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 30, - "metric": "URL_MAPS" - }, - { - "limit": 9, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 300, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 15, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 30, - "metric": "VPN_TUNNELS" - }, - { - "limit": 9, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 10, - "metric": "ROUTERS" - }, - { - "limit": 30, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 30, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 30, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 175, - "metric": "SUBNETWORKS" - }, - { - "limit": 30, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 100, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 45, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 300, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 15, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 2000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 15, - "metric": "EXTERNAL_VPN_GATEWAYS" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-staging-release-test", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-staging-release-test/services/enabled.txt b/audit/projects/k8s-staging-release-test/services/enabled.txt deleted file mode 100644 index b3fa5c67bc9..00000000000 --- a/audit/projects/k8s-staging-release-test/services/enabled.txt +++ /dev/null @@ -1,10 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage From 7cd3c63f84c31cb1fa5ccda70c89f2e51ca76acd Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Wed, 13 Jan 2021 13:06:57 -0500 Subject: [PATCH 16/39] audit: rm k8s-sig-release-prototype project --- .../bucketpolicyonly.txt | 4 - .../k8s-sig-release-prototype/cors.txt | 1 - .../k8s-sig-release-prototype/iam.json | 42 ----- .../k8s-sig-release-prototype/logging.txt | 1 - .../description.json | 11 -- .../k8s-sig-release-prototype/iam.json | 24 --- .../description.json | 8 - .../iam.json | 1 - .../services/bigquery/bigquery.datasets.json | 0 .../services/compute/project-info.json | 151 ------------------ .../services/enabled.txt | 17 -- 11 files changed, 260 deletions(-) delete mode 100644 audit/projects/k8s-sig-release-prototype/buckets/k8s-sig-release-prototype/bucketpolicyonly.txt delete mode 100644 audit/projects/k8s-sig-release-prototype/buckets/k8s-sig-release-prototype/cors.txt delete mode 100644 audit/projects/k8s-sig-release-prototype/buckets/k8s-sig-release-prototype/iam.json delete mode 100644 audit/projects/k8s-sig-release-prototype/buckets/k8s-sig-release-prototype/logging.txt delete mode 100644 audit/projects/k8s-sig-release-prototype/description.json delete mode 100644 audit/projects/k8s-sig-release-prototype/iam.json delete mode 100644 audit/projects/k8s-sig-release-prototype/service-accounts/248671828424-compute@developer.gserviceaccount.com/description.json delete mode 100644 audit/projects/k8s-sig-release-prototype/service-accounts/248671828424-compute@developer.gserviceaccount.com/iam.json delete mode 100644 audit/projects/k8s-sig-release-prototype/services/bigquery/bigquery.datasets.json delete mode 100644 audit/projects/k8s-sig-release-prototype/services/compute/project-info.json delete mode 100644 audit/projects/k8s-sig-release-prototype/services/enabled.txt diff --git a/audit/projects/k8s-sig-release-prototype/buckets/k8s-sig-release-prototype/bucketpolicyonly.txt b/audit/projects/k8s-sig-release-prototype/buckets/k8s-sig-release-prototype/bucketpolicyonly.txt deleted file mode 100644 index 6ab3c46f30b..00000000000 --- a/audit/projects/k8s-sig-release-prototype/buckets/k8s-sig-release-prototype/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-sig-release-prototype: - Enabled: True - LockedTime: 2019-07-25 21:40:15.402000+00:00 - diff --git a/audit/projects/k8s-sig-release-prototype/buckets/k8s-sig-release-prototype/cors.txt b/audit/projects/k8s-sig-release-prototype/buckets/k8s-sig-release-prototype/cors.txt deleted file mode 100644 index dee998405b5..00000000000 --- a/audit/projects/k8s-sig-release-prototype/buckets/k8s-sig-release-prototype/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-sig-release-prototype/ has no CORS configuration. diff --git a/audit/projects/k8s-sig-release-prototype/buckets/k8s-sig-release-prototype/iam.json b/audit/projects/k8s-sig-release-prototype/buckets/k8s-sig-release-prototype/iam.json deleted file mode 100644 index 208d00e31f7..00000000000 --- a/audit/projects/k8s-sig-release-prototype/buckets/k8s-sig-release-prototype/iam.json +++ /dev/null @@ -1,42 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-sig-release-prototype@kubernetes.io" - ], - "role": "roles/storage.admin" - }, - { - "members": [ - "projectEditor:k8s-sig-release-prototype", - "projectOwner:k8s-sig-release-prototype" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-sig-release-prototype" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "projectEditor:k8s-sig-release-prototype", - "projectOwner:k8s-sig-release-prototype" - ], - "role": "roles/storage.legacyObjectOwner" - }, - { - "members": [ - "projectViewer:k8s-sig-release-prototype" - ], - "role": "roles/storage.legacyObjectReader" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-sig-release-prototype/buckets/k8s-sig-release-prototype/logging.txt b/audit/projects/k8s-sig-release-prototype/buckets/k8s-sig-release-prototype/logging.txt deleted file mode 100644 index cab8530fe07..00000000000 --- a/audit/projects/k8s-sig-release-prototype/buckets/k8s-sig-release-prototype/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-sig-release-prototype/ has no logging configuration. diff --git a/audit/projects/k8s-sig-release-prototype/description.json b/audit/projects/k8s-sig-release-prototype/description.json deleted file mode 100644 index 277f77733f0..00000000000 --- a/audit/projects/k8s-sig-release-prototype/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2019-04-26T21:38:06.936Z", - "lifecycleState": "ACTIVE", - "name": "k8s-sig-release-prototype", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-sig-release-prototype", - "projectNumber": "248671828424" -} diff --git a/audit/projects/k8s-sig-release-prototype/iam.json b/audit/projects/k8s-sig-release-prototype/iam.json deleted file mode 100644 index 52ed47973fc..00000000000 --- a/audit/projects/k8s-sig-release-prototype/iam.json +++ /dev/null @@ -1,24 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:service-248671828424@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:248671828424-compute@developer.gserviceaccount.com", - "serviceAccount:248671828424@cloudservices.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-sig-release-prototype/service-accounts/248671828424-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-sig-release-prototype/service-accounts/248671828424-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 77f3ab01eee..00000000000 --- a/audit/projects/k8s-sig-release-prototype/service-accounts/248671828424-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "248671828424-compute@developer.gserviceaccount.com", - "name": "projects/k8s-sig-release-prototype/serviceAccounts/248671828424-compute@developer.gserviceaccount.com", - "oauth2ClientId": "110271817996764836707", - "projectId": "k8s-sig-release-prototype", - "uniqueId": "110271817996764836707" -} diff --git a/audit/projects/k8s-sig-release-prototype/service-accounts/248671828424-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-sig-release-prototype/service-accounts/248671828424-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bc..00000000000 --- a/audit/projects/k8s-sig-release-prototype/service-accounts/248671828424-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-sig-release-prototype/services/bigquery/bigquery.datasets.json b/audit/projects/k8s-sig-release-prototype/services/bigquery/bigquery.datasets.json deleted file mode 100644 index e69de29bb2d..00000000000 diff --git a/audit/projects/k8s-sig-release-prototype/services/compute/project-info.json b/audit/projects/k8s-sig-release-prototype/services/compute/project-info.json deleted file mode 100644 index efb2644cff6..00000000000 --- a/audit/projects/k8s-sig-release-prototype/services/compute/project-info.json +++ /dev/null @@ -1,151 +0,0 @@ -{ - "commonInstanceMetadata": { - "kind": "compute#metadata" - }, - "creationTimestamp": "2019-04-26T14:38:56.004-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "248671828424-compute@developer.gserviceaccount.com", - "id": "186415154931352735", - "kind": "compute#project", - "name": "k8s-sig-release-prototype", - "quotas": [ - { - "limit": 5000, - "metric": "SNAPSHOTS" - }, - { - "limit": 15, - "metric": "NETWORKS" - }, - { - "limit": 200, - "metric": "FIREWALLS" - }, - { - "limit": 2000, - "metric": "IMAGES" - }, - { - "limit": 21, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 250, - "metric": "ROUTES" - }, - { - "limit": 45, - "metric": "FORWARDING_RULES" - }, - { - "limit": 150, - "metric": "TARGET_POOLS" - }, - { - "limit": 150, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 69, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 150, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 30, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 30, - "metric": "URL_MAPS" - }, - { - "limit": 9, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 300, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 15, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 30, - "metric": "VPN_TUNNELS" - }, - { - "limit": 9, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 10, - "metric": "ROUTERS" - }, - { - "limit": 30, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 30, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 30, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 175, - "metric": "SUBNETWORKS" - }, - { - "limit": 30, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 100, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 45, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 300, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 15, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 2000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 15, - "metric": "EXTERNAL_VPN_GATEWAYS" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-sig-release-prototype", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-sig-release-prototype/services/enabled.txt b/audit/projects/k8s-sig-release-prototype/services/enabled.txt deleted file mode 100644 index 2e23ee931cf..00000000000 --- a/audit/projects/k8s-sig-release-prototype/services/enabled.txt +++ /dev/null @@ -1,17 +0,0 @@ -NAME TITLE -bigquery.googleapis.com BigQuery API -bigquery.googleapis.com BigQuery API -bigquerystorage.googleapis.com BigQuery Storage API -cloudapis.googleapis.com Google Cloud APIs -clouddebugger.googleapis.com Cloud Debugger API -cloudtrace.googleapis.com Cloud Trace API -compute.googleapis.com Compute Engine API -datastore.googleapis.com Cloud Datastore API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -servicemanagement.googleapis.com Service Management API -serviceusage.googleapis.com Service Usage API -sql-component.googleapis.com Cloud SQL -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage From 0612babe09b54669275b2d06c73c8ef1adb10e5d Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Thu, 14 Jan 2021 16:52:36 -0500 Subject: [PATCH 17/39] audit: add k8s-staging-* projects specifically: - k8s-staging-addon-manager - k8s-staging-bootkube - k8s-staging-boskos - k8s-staging-ci-images - k8s-staging-cloud-provider-gcp - k8s-staging-cluster-addons - k8s-staging-cri-tools - k8s-staging-etcdadm - k8s-staging-examples - k8s-staging-git-sync - k8s-staging-ingress-nginx - k8s-staging-ingressconformance - k8s-staging-gsm-tools - k8s-staging-kustomize - k8s-staging-mirror - k8s-staging-networking - k8s-staging-provider-aws - k8s-staging-scheduler-plugins - k8s-staging-sig-docs - k8s-staging-sig-storage - k8s-staging-sp-operator - k8s-staging-storage-migrate --- .../bucketpolicyonly.txt | 4 + .../cors.txt | 1 + .../iam.json | 37 ++++ .../logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../k8s-staging-addon-manager-gcb/cors.txt | 1 + .../k8s-staging-addon-manager-gcb/iam.json | 46 +++++ .../k8s-staging-addon-manager-gcb/logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../k8s-staging-addon-manager/cors.txt | 1 + .../k8s-staging-addon-manager/iam.json | 37 ++++ .../k8s-staging-addon-manager/logging.txt | 1 + .../description.json | 11 ++ .../k8s-staging-addon-manager/iam.json | 68 ++++++++ .../services/enabled.txt | 11 ++ .../bucketpolicyonly.txt | 4 + .../cors.txt | 1 + .../iam.json | 37 ++++ .../logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../buckets/k8s-staging-bootkube-gcb/cors.txt | 1 + .../buckets/k8s-staging-bootkube-gcb/iam.json | 46 +++++ .../k8s-staging-bootkube-gcb/logging.txt | 1 + .../k8s-staging-bootkube/bucketpolicyonly.txt | 4 + .../buckets/k8s-staging-bootkube/cors.txt | 1 + .../buckets/k8s-staging-bootkube/iam.json | 37 ++++ .../buckets/k8s-staging-bootkube/logging.txt | 1 + .../k8s-staging-bootkube/description.json | 11 ++ audit/projects/k8s-staging-bootkube/iam.json | 68 ++++++++ .../k8s-staging-bootkube/services/enabled.txt | 11 ++ .../bucketpolicyonly.txt | 4 + .../cors.txt | 1 + .../iam.json | 37 ++++ .../logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../buckets/k8s-staging-boskos-gcb/cors.txt | 1 + .../buckets/k8s-staging-boskos-gcb/iam.json | 46 +++++ .../k8s-staging-boskos-gcb/logging.txt | 1 + .../k8s-staging-boskos/bucketpolicyonly.txt | 4 + .../buckets/k8s-staging-boskos/cors.txt | 1 + .../buckets/k8s-staging-boskos/iam.json | 37 ++++ .../buckets/k8s-staging-boskos/logging.txt | 1 + .../k8s-staging-boskos/description.json | 11 ++ audit/projects/k8s-staging-boskos/iam.json | 68 ++++++++ .../k8s-staging-boskos/services/enabled.txt | 11 ++ .../bucketpolicyonly.txt | 4 + .../cors.txt | 1 + .../iam.json | 39 +++++ .../logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../k8s-staging-ci-images-gcb/cors.txt | 1 + .../k8s-staging-ci-images-gcb/iam.json | 46 +++++ .../k8s-staging-ci-images-gcb/logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../buckets/k8s-staging-ci-images/cors.txt | 1 + .../buckets/k8s-staging-ci-images/iam.json | 37 ++++ .../buckets/k8s-staging-ci-images/logging.txt | 1 + .../k8s-staging-ci-images/description.json | 11 ++ audit/projects/k8s-staging-ci-images/iam.json | 68 ++++++++ .../services/enabled.txt | 11 ++ .../bucketpolicyonly.txt | 4 + .../cors.txt | 1 + .../iam.json | 37 ++++ .../logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../cors.txt | 1 + .../iam.json | 46 +++++ .../logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../k8s-staging-cloud-provider-gcp/cors.txt | 1 + .../k8s-staging-cloud-provider-gcp/iam.json | 37 ++++ .../logging.txt | 1 + .../description.json | 11 ++ .../k8s-staging-cloud-provider-gcp/iam.json | 68 ++++++++ .../services/enabled.txt | 11 ++ .../bucketpolicyonly.txt | 4 + .../cors.txt | 1 + .../iam.json | 37 ++++ .../logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../k8s-staging-cluster-addons-gcb/cors.txt | 1 + .../k8s-staging-cluster-addons-gcb/iam.json | 46 +++++ .../logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../k8s-staging-cluster-addons/cors.txt | 1 + .../k8s-staging-cluster-addons/iam.json | 37 ++++ .../k8s-staging-cluster-addons/logging.txt | 1 + .../description.json | 11 ++ .../k8s-staging-cluster-addons/iam.json | 68 ++++++++ .../services/enabled.txt | 11 ++ .../bucketpolicyonly.txt | 4 + .../cors.txt | 1 + .../iam.json | 37 ++++ .../logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../k8s-staging-cri-tools-gcb/cors.txt | 1 + .../k8s-staging-cri-tools-gcb/iam.json | 46 +++++ .../k8s-staging-cri-tools-gcb/logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../buckets/k8s-staging-cri-tools/cors.txt | 1 + .../buckets/k8s-staging-cri-tools/iam.json | 37 ++++ .../buckets/k8s-staging-cri-tools/logging.txt | 1 + .../k8s-staging-cri-tools/description.json | 11 ++ audit/projects/k8s-staging-cri-tools/iam.json | 68 ++++++++ .../services/enabled.txt | 11 ++ .../bucketpolicyonly.txt | 4 + .../cors.txt | 1 + .../iam.json | 37 ++++ .../logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../buckets/k8s-staging-etcdadm-gcb/cors.txt | 1 + .../buckets/k8s-staging-etcdadm-gcb/iam.json | 46 +++++ .../k8s-staging-etcdadm-gcb/logging.txt | 1 + .../k8s-staging-etcdadm/bucketpolicyonly.txt | 4 + .../buckets/k8s-staging-etcdadm/cors.txt | 1 + .../buckets/k8s-staging-etcdadm/iam.json | 37 ++++ .../buckets/k8s-staging-etcdadm/logging.txt | 1 + .../k8s-staging-etcdadm/description.json | 11 ++ audit/projects/k8s-staging-etcdadm/iam.json | 68 ++++++++ .../k8s-staging-etcdadm/services/enabled.txt | 11 ++ .../bucketpolicyonly.txt | 4 + .../cors.txt | 1 + .../iam.json | 37 ++++ .../logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../buckets/k8s-staging-examples-gcb/cors.txt | 1 + .../buckets/k8s-staging-examples-gcb/iam.json | 46 +++++ .../k8s-staging-examples-gcb/logging.txt | 1 + .../k8s-staging-examples/bucketpolicyonly.txt | 4 + .../buckets/k8s-staging-examples/cors.txt | 1 + .../buckets/k8s-staging-examples/iam.json | 37 ++++ .../buckets/k8s-staging-examples/logging.txt | 1 + .../k8s-staging-examples/description.json | 11 ++ audit/projects/k8s-staging-examples/iam.json | 68 ++++++++ .../k8s-staging-examples/services/enabled.txt | 11 ++ .../bucketpolicyonly.txt | 4 + .../cors.txt | 1 + .../iam.json | 37 ++++ .../logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../buckets/k8s-staging-git-sync-gcb/cors.txt | 1 + .../buckets/k8s-staging-git-sync-gcb/iam.json | 46 +++++ .../k8s-staging-git-sync-gcb/logging.txt | 1 + .../k8s-staging-git-sync/bucketpolicyonly.txt | 4 + .../buckets/k8s-staging-git-sync/cors.txt | 1 + .../buckets/k8s-staging-git-sync/iam.json | 37 ++++ .../buckets/k8s-staging-git-sync/logging.txt | 1 + .../k8s-staging-git-sync/description.json | 11 ++ audit/projects/k8s-staging-git-sync/iam.json | 68 ++++++++ .../k8s-staging-git-sync/services/enabled.txt | 11 ++ .../bucketpolicyonly.txt | 4 + .../cors.txt | 1 + .../iam.json | 37 ++++ .../logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../k8s-staging-ingress-nginx-gcb/cors.txt | 1 + .../k8s-staging-ingress-nginx-gcb/iam.json | 46 +++++ .../k8s-staging-ingress-nginx-gcb/logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../k8s-staging-ingress-nginx/cors.txt | 1 + .../k8s-staging-ingress-nginx/iam.json | 37 ++++ .../k8s-staging-ingress-nginx/logging.txt | 1 + .../description.json | 11 ++ .../k8s-staging-ingress-nginx/iam.json | 68 ++++++++ .../services/enabled.txt | 13 ++ .../bucketpolicyonly.txt | 4 + .../cors.txt | 1 + .../iam.json | 37 ++++ .../logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../cors.txt | 1 + .../iam.json | 46 +++++ .../logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../k8s-staging-ingressconformance/cors.txt | 1 + .../k8s-staging-ingressconformance/iam.json | 37 ++++ .../logging.txt | 1 + .../description.json | 11 ++ .../k8s-staging-ingressconformance/iam.json | 68 ++++++++ .../services/enabled.txt | 11 ++ .../bucketpolicyonly.txt | 4 + .../cors.txt | 1 + .../iam.json | 30 ++++ .../logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../k8s-staging-k8s-gsm-tools-gcb/cors.txt | 1 + .../k8s-staging-k8s-gsm-tools-gcb/iam.json | 39 +++++ .../k8s-staging-k8s-gsm-tools-gcb/logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../k8s-staging-k8s-gsm-tools/cors.txt | 1 + .../k8s-staging-k8s-gsm-tools/iam.json | 30 ++++ .../k8s-staging-k8s-gsm-tools/logging.txt | 1 + .../description.json | 11 ++ .../k8s-staging-k8s-gsm-tools/iam.json | 55 ++++++ .../services/enabled.txt | 11 ++ .../bucketpolicyonly.txt | 4 + .../cors.txt | 1 + .../iam.json | 37 ++++ .../logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../k8s-staging-kustomize-gcb/cors.txt | 1 + .../k8s-staging-kustomize-gcb/iam.json | 46 +++++ .../k8s-staging-kustomize-gcb/logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../buckets/k8s-staging-kustomize/cors.txt | 1 + .../buckets/k8s-staging-kustomize/iam.json | 37 ++++ .../buckets/k8s-staging-kustomize/logging.txt | 1 + .../k8s-staging-kustomize/description.json | 11 ++ audit/projects/k8s-staging-kustomize/iam.json | 68 ++++++++ .../services/enabled.txt | 11 ++ .../bucketpolicyonly.txt | 4 + .../cors.txt | 1 + .../iam.json | 37 ++++ .../logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../buckets/k8s-staging-mirror-gcb/cors.txt | 1 + .../buckets/k8s-staging-mirror-gcb/iam.json | 46 +++++ .../k8s-staging-mirror-gcb/logging.txt | 1 + .../k8s-staging-mirror/bucketpolicyonly.txt | 4 + .../buckets/k8s-staging-mirror/cors.txt | 1 + .../buckets/k8s-staging-mirror/iam.json | 37 ++++ .../buckets/k8s-staging-mirror/logging.txt | 1 + .../k8s-staging-mirror/description.json | 11 ++ audit/projects/k8s-staging-mirror/iam.json | 69 ++++++++ .../k8s-staging-mirror/services/enabled.txt | 11 ++ .../bucketpolicyonly.txt | 4 + .../cors.txt | 1 + .../iam.json | 37 ++++ .../logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../k8s-staging-networking-gcb/cors.txt | 1 + .../k8s-staging-networking-gcb/iam.json | 46 +++++ .../k8s-staging-networking-gcb/logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../buckets/k8s-staging-networking/cors.txt | 1 + .../buckets/k8s-staging-networking/iam.json | 37 ++++ .../k8s-staging-networking/logging.txt | 1 + .../k8s-staging-networking/description.json | 11 ++ .../projects/k8s-staging-networking/iam.json | 68 ++++++++ .../services/enabled.txt | 11 ++ .../bucketpolicyonly.txt | 4 + .../cors.txt | 1 + .../iam.json | 37 ++++ .../logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../k8s-staging-provider-aws-gcb/cors.txt | 1 + .../k8s-staging-provider-aws-gcb/iam.json | 46 +++++ .../k8s-staging-provider-aws-gcb/logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../buckets/k8s-staging-provider-aws/cors.txt | 1 + .../buckets/k8s-staging-provider-aws/iam.json | 37 ++++ .../k8s-staging-provider-aws/logging.txt | 1 + .../k8s-staging-provider-aws/description.json | 11 ++ .../k8s-staging-provider-aws/iam.json | 68 ++++++++ .../services/enabled.txt | 11 ++ .../bucketpolicyonly.txt | 4 + .../cors.txt | 1 + .../iam.json | 37 ++++ .../logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../cors.txt | 1 + .../iam.json | 46 +++++ .../logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../k8s-staging-scheduler-plugins/cors.txt | 1 + .../k8s-staging-scheduler-plugins/iam.json | 37 ++++ .../k8s-staging-scheduler-plugins/logging.txt | 1 + .../description.json | 11 ++ .../k8s-staging-scheduler-plugins/iam.json | 68 ++++++++ .../services/enabled.txt | 11 ++ .../bucketpolicyonly.txt | 4 + .../cors.txt | 1 + .../iam.json | 37 ++++ .../logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../buckets/k8s-staging-sig-docs-gcb/cors.txt | 1 + .../buckets/k8s-staging-sig-docs-gcb/iam.json | 46 +++++ .../k8s-staging-sig-docs-gcb/logging.txt | 1 + .../k8s-staging-sig-docs/bucketpolicyonly.txt | 4 + .../buckets/k8s-staging-sig-docs/cors.txt | 1 + .../buckets/k8s-staging-sig-docs/iam.json | 37 ++++ .../buckets/k8s-staging-sig-docs/logging.txt | 1 + .../k8s-staging-sig-docs/description.json | 11 ++ audit/projects/k8s-staging-sig-docs/iam.json | 68 ++++++++ .../k8s-staging-sig-docs/services/enabled.txt | 11 ++ .../bucketpolicyonly.txt | 4 + .../cors.txt | 1 + .../iam.json | 37 ++++ .../logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../k8s-staging-sig-storage-gcb/cors.txt | 1 + .../k8s-staging-sig-storage-gcb/iam.json | 46 +++++ .../k8s-staging-sig-storage-gcb/logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../buckets/k8s-staging-sig-storage/cors.txt | 1 + .../buckets/k8s-staging-sig-storage/iam.json | 37 ++++ .../k8s-staging-sig-storage/logging.txt | 1 + .../k8s-staging-sig-storage/description.json | 11 ++ .../projects/k8s-staging-sig-storage/iam.json | 76 ++++++++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 163 ++++++++++++++++++ .../services/enabled.txt | 13 ++ .../bucketpolicyonly.txt | 4 + .../cors.txt | 1 + .../iam.json | 37 ++++ .../logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../k8s-staging-sp-operator-gcb/cors.txt | 1 + .../k8s-staging-sp-operator-gcb/iam.json | 46 +++++ .../k8s-staging-sp-operator-gcb/logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../buckets/k8s-staging-sp-operator/cors.txt | 1 + .../buckets/k8s-staging-sp-operator/iam.json | 37 ++++ .../k8s-staging-sp-operator/logging.txt | 1 + .../k8s-staging-sp-operator/description.json | 11 ++ .../projects/k8s-staging-sp-operator/iam.json | 68 ++++++++ .../services/enabled.txt | 11 ++ .../bucketpolicyonly.txt | 4 + .../cors.txt | 1 + .../iam.json | 37 ++++ .../logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../k8s-staging-storage-migrator-gcb/cors.txt | 1 + .../k8s-staging-storage-migrator-gcb/iam.json | 46 +++++ .../logging.txt | 1 + .../bucketpolicyonly.txt | 4 + .../k8s-staging-storage-migrator/cors.txt | 1 + .../k8s-staging-storage-migrator/iam.json | 37 ++++ .../k8s-staging-storage-migrator/logging.txt | 1 + .../description.json | 11 ++ .../k8s-staging-storage-migrator/iam.json | 68 ++++++++ .../services/enabled.txt | 11 ++ 333 files changed, 5169 insertions(+) create mode 100644 audit/projects/k8s-staging-addon-manager/buckets/artifacts.k8s-staging-addon-manager.appspot.com/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-addon-manager/buckets/artifacts.k8s-staging-addon-manager.appspot.com/cors.txt create mode 100644 audit/projects/k8s-staging-addon-manager/buckets/artifacts.k8s-staging-addon-manager.appspot.com/iam.json create mode 100644 audit/projects/k8s-staging-addon-manager/buckets/artifacts.k8s-staging-addon-manager.appspot.com/logging.txt create mode 100644 audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager-gcb/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager-gcb/cors.txt create mode 100644 audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager-gcb/iam.json create mode 100644 audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager-gcb/logging.txt create mode 100644 audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager/cors.txt create mode 100644 audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager/iam.json create mode 100644 audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager/logging.txt create mode 100644 audit/projects/k8s-staging-addon-manager/description.json create mode 100644 audit/projects/k8s-staging-addon-manager/iam.json create mode 100644 audit/projects/k8s-staging-addon-manager/services/enabled.txt create mode 100644 audit/projects/k8s-staging-bootkube/buckets/artifacts.k8s-staging-bootkube.appspot.com/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-bootkube/buckets/artifacts.k8s-staging-bootkube.appspot.com/cors.txt create mode 100644 audit/projects/k8s-staging-bootkube/buckets/artifacts.k8s-staging-bootkube.appspot.com/iam.json create mode 100644 audit/projects/k8s-staging-bootkube/buckets/artifacts.k8s-staging-bootkube.appspot.com/logging.txt create mode 100644 audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube-gcb/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube-gcb/cors.txt create mode 100644 audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube-gcb/iam.json create mode 100644 audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube-gcb/logging.txt create mode 100644 audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube/cors.txt create mode 100644 audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube/iam.json create mode 100644 audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube/logging.txt create mode 100644 audit/projects/k8s-staging-bootkube/description.json create mode 100644 audit/projects/k8s-staging-bootkube/iam.json create mode 100644 audit/projects/k8s-staging-bootkube/services/enabled.txt create mode 100644 audit/projects/k8s-staging-boskos/buckets/artifacts.k8s-staging-boskos.appspot.com/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-boskos/buckets/artifacts.k8s-staging-boskos.appspot.com/cors.txt create mode 100644 audit/projects/k8s-staging-boskos/buckets/artifacts.k8s-staging-boskos.appspot.com/iam.json create mode 100644 audit/projects/k8s-staging-boskos/buckets/artifacts.k8s-staging-boskos.appspot.com/logging.txt create mode 100644 audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos-gcb/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos-gcb/cors.txt create mode 100644 audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos-gcb/iam.json create mode 100644 audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos-gcb/logging.txt create mode 100644 audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos/cors.txt create mode 100644 audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos/iam.json create mode 100644 audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos/logging.txt create mode 100644 audit/projects/k8s-staging-boskos/description.json create mode 100644 audit/projects/k8s-staging-boskos/iam.json create mode 100644 audit/projects/k8s-staging-boskos/services/enabled.txt create mode 100644 audit/projects/k8s-staging-ci-images/buckets/artifacts.k8s-staging-ci-images.appspot.com/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-ci-images/buckets/artifacts.k8s-staging-ci-images.appspot.com/cors.txt create mode 100644 audit/projects/k8s-staging-ci-images/buckets/artifacts.k8s-staging-ci-images.appspot.com/iam.json create mode 100644 audit/projects/k8s-staging-ci-images/buckets/artifacts.k8s-staging-ci-images.appspot.com/logging.txt create mode 100644 audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images-gcb/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images-gcb/cors.txt create mode 100644 audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images-gcb/iam.json create mode 100644 audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images-gcb/logging.txt create mode 100644 audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images/cors.txt create mode 100644 audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images/iam.json create mode 100644 audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images/logging.txt create mode 100644 audit/projects/k8s-staging-ci-images/description.json create mode 100644 audit/projects/k8s-staging-ci-images/iam.json create mode 100644 audit/projects/k8s-staging-ci-images/services/enabled.txt create mode 100644 audit/projects/k8s-staging-cloud-provider-gcp/buckets/artifacts.k8s-staging-cloud-provider-gcp.appspot.com/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-cloud-provider-gcp/buckets/artifacts.k8s-staging-cloud-provider-gcp.appspot.com/cors.txt create mode 100644 audit/projects/k8s-staging-cloud-provider-gcp/buckets/artifacts.k8s-staging-cloud-provider-gcp.appspot.com/iam.json create mode 100644 audit/projects/k8s-staging-cloud-provider-gcp/buckets/artifacts.k8s-staging-cloud-provider-gcp.appspot.com/logging.txt create mode 100644 audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp-gcb/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp-gcb/cors.txt create mode 100644 audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp-gcb/iam.json create mode 100644 audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp-gcb/logging.txt create mode 100644 audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp/cors.txt create mode 100644 audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp/iam.json create mode 100644 audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp/logging.txt create mode 100644 audit/projects/k8s-staging-cloud-provider-gcp/description.json create mode 100644 audit/projects/k8s-staging-cloud-provider-gcp/iam.json create mode 100644 audit/projects/k8s-staging-cloud-provider-gcp/services/enabled.txt create mode 100644 audit/projects/k8s-staging-cluster-addons/buckets/artifacts.k8s-staging-cluster-addons.appspot.com/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-cluster-addons/buckets/artifacts.k8s-staging-cluster-addons.appspot.com/cors.txt create mode 100644 audit/projects/k8s-staging-cluster-addons/buckets/artifacts.k8s-staging-cluster-addons.appspot.com/iam.json create mode 100644 audit/projects/k8s-staging-cluster-addons/buckets/artifacts.k8s-staging-cluster-addons.appspot.com/logging.txt create mode 100644 audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons-gcb/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons-gcb/cors.txt create mode 100644 audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons-gcb/iam.json create mode 100644 audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons-gcb/logging.txt create mode 100644 audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons/cors.txt create mode 100644 audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons/iam.json create mode 100644 audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons/logging.txt create mode 100644 audit/projects/k8s-staging-cluster-addons/description.json create mode 100644 audit/projects/k8s-staging-cluster-addons/iam.json create mode 100644 audit/projects/k8s-staging-cluster-addons/services/enabled.txt create mode 100644 audit/projects/k8s-staging-cri-tools/buckets/artifacts.k8s-staging-cri-tools.appspot.com/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-cri-tools/buckets/artifacts.k8s-staging-cri-tools.appspot.com/cors.txt create mode 100644 audit/projects/k8s-staging-cri-tools/buckets/artifacts.k8s-staging-cri-tools.appspot.com/iam.json create mode 100644 audit/projects/k8s-staging-cri-tools/buckets/artifacts.k8s-staging-cri-tools.appspot.com/logging.txt create mode 100644 audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools-gcb/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools-gcb/cors.txt create mode 100644 audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools-gcb/iam.json create mode 100644 audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools-gcb/logging.txt create mode 100644 audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools/cors.txt create mode 100644 audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools/iam.json create mode 100644 audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools/logging.txt create mode 100644 audit/projects/k8s-staging-cri-tools/description.json create mode 100644 audit/projects/k8s-staging-cri-tools/iam.json create mode 100644 audit/projects/k8s-staging-cri-tools/services/enabled.txt create mode 100644 audit/projects/k8s-staging-etcdadm/buckets/artifacts.k8s-staging-etcdadm.appspot.com/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-etcdadm/buckets/artifacts.k8s-staging-etcdadm.appspot.com/cors.txt create mode 100644 audit/projects/k8s-staging-etcdadm/buckets/artifacts.k8s-staging-etcdadm.appspot.com/iam.json create mode 100644 audit/projects/k8s-staging-etcdadm/buckets/artifacts.k8s-staging-etcdadm.appspot.com/logging.txt create mode 100644 audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm-gcb/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm-gcb/cors.txt create mode 100644 audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm-gcb/iam.json create mode 100644 audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm-gcb/logging.txt create mode 100644 audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm/cors.txt create mode 100644 audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm/iam.json create mode 100644 audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm/logging.txt create mode 100644 audit/projects/k8s-staging-etcdadm/description.json create mode 100644 audit/projects/k8s-staging-etcdadm/iam.json create mode 100644 audit/projects/k8s-staging-etcdadm/services/enabled.txt create mode 100644 audit/projects/k8s-staging-examples/buckets/artifacts.k8s-staging-examples.appspot.com/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-examples/buckets/artifacts.k8s-staging-examples.appspot.com/cors.txt create mode 100644 audit/projects/k8s-staging-examples/buckets/artifacts.k8s-staging-examples.appspot.com/iam.json create mode 100644 audit/projects/k8s-staging-examples/buckets/artifacts.k8s-staging-examples.appspot.com/logging.txt create mode 100644 audit/projects/k8s-staging-examples/buckets/k8s-staging-examples-gcb/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-examples/buckets/k8s-staging-examples-gcb/cors.txt create mode 100644 audit/projects/k8s-staging-examples/buckets/k8s-staging-examples-gcb/iam.json create mode 100644 audit/projects/k8s-staging-examples/buckets/k8s-staging-examples-gcb/logging.txt create mode 100644 audit/projects/k8s-staging-examples/buckets/k8s-staging-examples/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-examples/buckets/k8s-staging-examples/cors.txt create mode 100644 audit/projects/k8s-staging-examples/buckets/k8s-staging-examples/iam.json create mode 100644 audit/projects/k8s-staging-examples/buckets/k8s-staging-examples/logging.txt create mode 100644 audit/projects/k8s-staging-examples/description.json create mode 100644 audit/projects/k8s-staging-examples/iam.json create mode 100644 audit/projects/k8s-staging-examples/services/enabled.txt create mode 100644 audit/projects/k8s-staging-git-sync/buckets/artifacts.k8s-staging-git-sync.appspot.com/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-git-sync/buckets/artifacts.k8s-staging-git-sync.appspot.com/cors.txt create mode 100644 audit/projects/k8s-staging-git-sync/buckets/artifacts.k8s-staging-git-sync.appspot.com/iam.json create mode 100644 audit/projects/k8s-staging-git-sync/buckets/artifacts.k8s-staging-git-sync.appspot.com/logging.txt create mode 100644 audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync-gcb/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync-gcb/cors.txt create mode 100644 audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync-gcb/iam.json create mode 100644 audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync-gcb/logging.txt create mode 100644 audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync/cors.txt create mode 100644 audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync/iam.json create mode 100644 audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync/logging.txt create mode 100644 audit/projects/k8s-staging-git-sync/description.json create mode 100644 audit/projects/k8s-staging-git-sync/iam.json create mode 100644 audit/projects/k8s-staging-git-sync/services/enabled.txt create mode 100644 audit/projects/k8s-staging-ingress-nginx/buckets/artifacts.k8s-staging-ingress-nginx.appspot.com/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-ingress-nginx/buckets/artifacts.k8s-staging-ingress-nginx.appspot.com/cors.txt create mode 100644 audit/projects/k8s-staging-ingress-nginx/buckets/artifacts.k8s-staging-ingress-nginx.appspot.com/iam.json create mode 100644 audit/projects/k8s-staging-ingress-nginx/buckets/artifacts.k8s-staging-ingress-nginx.appspot.com/logging.txt create mode 100644 audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx-gcb/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx-gcb/cors.txt create mode 100644 audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx-gcb/iam.json create mode 100644 audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx-gcb/logging.txt create mode 100644 audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx/cors.txt create mode 100644 audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx/iam.json create mode 100644 audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx/logging.txt create mode 100644 audit/projects/k8s-staging-ingress-nginx/description.json create mode 100644 audit/projects/k8s-staging-ingress-nginx/iam.json create mode 100644 audit/projects/k8s-staging-ingress-nginx/services/enabled.txt create mode 100644 audit/projects/k8s-staging-ingressconformance/buckets/artifacts.k8s-staging-ingressconformance.appspot.com/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-ingressconformance/buckets/artifacts.k8s-staging-ingressconformance.appspot.com/cors.txt create mode 100644 audit/projects/k8s-staging-ingressconformance/buckets/artifacts.k8s-staging-ingressconformance.appspot.com/iam.json create mode 100644 audit/projects/k8s-staging-ingressconformance/buckets/artifacts.k8s-staging-ingressconformance.appspot.com/logging.txt create mode 100644 audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance-gcb/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance-gcb/cors.txt create mode 100644 audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance-gcb/iam.json create mode 100644 audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance-gcb/logging.txt create mode 100644 audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance/cors.txt create mode 100644 audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance/iam.json create mode 100644 audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance/logging.txt create mode 100644 audit/projects/k8s-staging-ingressconformance/description.json create mode 100644 audit/projects/k8s-staging-ingressconformance/iam.json create mode 100644 audit/projects/k8s-staging-ingressconformance/services/enabled.txt create mode 100644 audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/cors.txt create mode 100644 audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/iam.json create mode 100644 audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/logging.txt create mode 100644 audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/cors.txt create mode 100644 audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/iam.json create mode 100644 audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/logging.txt create mode 100644 audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/cors.txt create mode 100644 audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/iam.json create mode 100644 audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/logging.txt create mode 100644 audit/projects/k8s-staging-k8s-gsm-tools/description.json create mode 100644 audit/projects/k8s-staging-k8s-gsm-tools/iam.json create mode 100644 audit/projects/k8s-staging-k8s-gsm-tools/services/enabled.txt create mode 100644 audit/projects/k8s-staging-kustomize/buckets/artifacts.k8s-staging-kustomize.appspot.com/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-kustomize/buckets/artifacts.k8s-staging-kustomize.appspot.com/cors.txt create mode 100644 audit/projects/k8s-staging-kustomize/buckets/artifacts.k8s-staging-kustomize.appspot.com/iam.json create mode 100644 audit/projects/k8s-staging-kustomize/buckets/artifacts.k8s-staging-kustomize.appspot.com/logging.txt create mode 100644 audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize-gcb/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize-gcb/cors.txt create mode 100644 audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize-gcb/iam.json create mode 100644 audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize-gcb/logging.txt create mode 100644 audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize/cors.txt create mode 100644 audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize/iam.json create mode 100644 audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize/logging.txt create mode 100644 audit/projects/k8s-staging-kustomize/description.json create mode 100644 audit/projects/k8s-staging-kustomize/iam.json create mode 100644 audit/projects/k8s-staging-kustomize/services/enabled.txt create mode 100644 audit/projects/k8s-staging-mirror/buckets/artifacts.k8s-staging-mirror.appspot.com/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-mirror/buckets/artifacts.k8s-staging-mirror.appspot.com/cors.txt create mode 100644 audit/projects/k8s-staging-mirror/buckets/artifacts.k8s-staging-mirror.appspot.com/iam.json create mode 100644 audit/projects/k8s-staging-mirror/buckets/artifacts.k8s-staging-mirror.appspot.com/logging.txt create mode 100644 audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror-gcb/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror-gcb/cors.txt create mode 100644 audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror-gcb/iam.json create mode 100644 audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror-gcb/logging.txt create mode 100644 audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror/cors.txt create mode 100644 audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror/iam.json create mode 100644 audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror/logging.txt create mode 100644 audit/projects/k8s-staging-mirror/description.json create mode 100644 audit/projects/k8s-staging-mirror/iam.json create mode 100644 audit/projects/k8s-staging-mirror/services/enabled.txt create mode 100644 audit/projects/k8s-staging-networking/buckets/artifacts.k8s-staging-networking.appspot.com/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-networking/buckets/artifacts.k8s-staging-networking.appspot.com/cors.txt create mode 100644 audit/projects/k8s-staging-networking/buckets/artifacts.k8s-staging-networking.appspot.com/iam.json create mode 100644 audit/projects/k8s-staging-networking/buckets/artifacts.k8s-staging-networking.appspot.com/logging.txt create mode 100644 audit/projects/k8s-staging-networking/buckets/k8s-staging-networking-gcb/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-networking/buckets/k8s-staging-networking-gcb/cors.txt create mode 100644 audit/projects/k8s-staging-networking/buckets/k8s-staging-networking-gcb/iam.json create mode 100644 audit/projects/k8s-staging-networking/buckets/k8s-staging-networking-gcb/logging.txt create mode 100644 audit/projects/k8s-staging-networking/buckets/k8s-staging-networking/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-networking/buckets/k8s-staging-networking/cors.txt create mode 100644 audit/projects/k8s-staging-networking/buckets/k8s-staging-networking/iam.json create mode 100644 audit/projects/k8s-staging-networking/buckets/k8s-staging-networking/logging.txt create mode 100644 audit/projects/k8s-staging-networking/description.json create mode 100644 audit/projects/k8s-staging-networking/iam.json create mode 100644 audit/projects/k8s-staging-networking/services/enabled.txt create mode 100644 audit/projects/k8s-staging-provider-aws/buckets/artifacts.k8s-staging-provider-aws.appspot.com/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-provider-aws/buckets/artifacts.k8s-staging-provider-aws.appspot.com/cors.txt create mode 100644 audit/projects/k8s-staging-provider-aws/buckets/artifacts.k8s-staging-provider-aws.appspot.com/iam.json create mode 100644 audit/projects/k8s-staging-provider-aws/buckets/artifacts.k8s-staging-provider-aws.appspot.com/logging.txt create mode 100644 audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws-gcb/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws-gcb/cors.txt create mode 100644 audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws-gcb/iam.json create mode 100644 audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws-gcb/logging.txt create mode 100644 audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws/cors.txt create mode 100644 audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws/iam.json create mode 100644 audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws/logging.txt create mode 100644 audit/projects/k8s-staging-provider-aws/description.json create mode 100644 audit/projects/k8s-staging-provider-aws/iam.json create mode 100644 audit/projects/k8s-staging-provider-aws/services/enabled.txt create mode 100644 audit/projects/k8s-staging-scheduler-plugins/buckets/artifacts.k8s-staging-scheduler-plugins.appspot.com/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-scheduler-plugins/buckets/artifacts.k8s-staging-scheduler-plugins.appspot.com/cors.txt create mode 100644 audit/projects/k8s-staging-scheduler-plugins/buckets/artifacts.k8s-staging-scheduler-plugins.appspot.com/iam.json create mode 100644 audit/projects/k8s-staging-scheduler-plugins/buckets/artifacts.k8s-staging-scheduler-plugins.appspot.com/logging.txt create mode 100644 audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins-gcb/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins-gcb/cors.txt create mode 100644 audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins-gcb/iam.json create mode 100644 audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins-gcb/logging.txt create mode 100644 audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins/cors.txt create mode 100644 audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins/iam.json create mode 100644 audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins/logging.txt create mode 100644 audit/projects/k8s-staging-scheduler-plugins/description.json create mode 100644 audit/projects/k8s-staging-scheduler-plugins/iam.json create mode 100644 audit/projects/k8s-staging-scheduler-plugins/services/enabled.txt create mode 100644 audit/projects/k8s-staging-sig-docs/buckets/artifacts.k8s-staging-sig-docs.appspot.com/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-sig-docs/buckets/artifacts.k8s-staging-sig-docs.appspot.com/cors.txt create mode 100644 audit/projects/k8s-staging-sig-docs/buckets/artifacts.k8s-staging-sig-docs.appspot.com/iam.json create mode 100644 audit/projects/k8s-staging-sig-docs/buckets/artifacts.k8s-staging-sig-docs.appspot.com/logging.txt create mode 100644 audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs-gcb/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs-gcb/cors.txt create mode 100644 audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs-gcb/iam.json create mode 100644 audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs-gcb/logging.txt create mode 100644 audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs/cors.txt create mode 100644 audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs/iam.json create mode 100644 audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs/logging.txt create mode 100644 audit/projects/k8s-staging-sig-docs/description.json create mode 100644 audit/projects/k8s-staging-sig-docs/iam.json create mode 100644 audit/projects/k8s-staging-sig-docs/services/enabled.txt create mode 100644 audit/projects/k8s-staging-sig-storage/buckets/artifacts.k8s-staging-sig-storage.appspot.com/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-sig-storage/buckets/artifacts.k8s-staging-sig-storage.appspot.com/cors.txt create mode 100644 audit/projects/k8s-staging-sig-storage/buckets/artifacts.k8s-staging-sig-storage.appspot.com/iam.json create mode 100644 audit/projects/k8s-staging-sig-storage/buckets/artifacts.k8s-staging-sig-storage.appspot.com/logging.txt create mode 100644 audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage-gcb/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage-gcb/cors.txt create mode 100644 audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage-gcb/iam.json create mode 100644 audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage-gcb/logging.txt create mode 100644 audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage/cors.txt create mode 100644 audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage/iam.json create mode 100644 audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage/logging.txt create mode 100644 audit/projects/k8s-staging-sig-storage/description.json create mode 100644 audit/projects/k8s-staging-sig-storage/iam.json create mode 100644 audit/projects/k8s-staging-sig-storage/service-accounts/272675062337-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-staging-sig-storage/service-accounts/272675062337-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-staging-sig-storage/services/compute/project-info.json create mode 100644 audit/projects/k8s-staging-sig-storage/services/enabled.txt create mode 100644 audit/projects/k8s-staging-sp-operator/buckets/artifacts.k8s-staging-sp-operator.appspot.com/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-sp-operator/buckets/artifacts.k8s-staging-sp-operator.appspot.com/cors.txt create mode 100644 audit/projects/k8s-staging-sp-operator/buckets/artifacts.k8s-staging-sp-operator.appspot.com/iam.json create mode 100644 audit/projects/k8s-staging-sp-operator/buckets/artifacts.k8s-staging-sp-operator.appspot.com/logging.txt create mode 100644 audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator-gcb/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator-gcb/cors.txt create mode 100644 audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator-gcb/iam.json create mode 100644 audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator-gcb/logging.txt create mode 100644 audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator/cors.txt create mode 100644 audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator/iam.json create mode 100644 audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator/logging.txt create mode 100644 audit/projects/k8s-staging-sp-operator/description.json create mode 100644 audit/projects/k8s-staging-sp-operator/iam.json create mode 100644 audit/projects/k8s-staging-sp-operator/services/enabled.txt create mode 100644 audit/projects/k8s-staging-storage-migrator/buckets/artifacts.k8s-staging-storage-migrator.appspot.com/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-storage-migrator/buckets/artifacts.k8s-staging-storage-migrator.appspot.com/cors.txt create mode 100644 audit/projects/k8s-staging-storage-migrator/buckets/artifacts.k8s-staging-storage-migrator.appspot.com/iam.json create mode 100644 audit/projects/k8s-staging-storage-migrator/buckets/artifacts.k8s-staging-storage-migrator.appspot.com/logging.txt create mode 100644 audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator-gcb/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator-gcb/cors.txt create mode 100644 audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator-gcb/iam.json create mode 100644 audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator-gcb/logging.txt create mode 100644 audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator/cors.txt create mode 100644 audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator/iam.json create mode 100644 audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator/logging.txt create mode 100644 audit/projects/k8s-staging-storage-migrator/description.json create mode 100644 audit/projects/k8s-staging-storage-migrator/iam.json create mode 100644 audit/projects/k8s-staging-storage-migrator/services/enabled.txt diff --git a/audit/projects/k8s-staging-addon-manager/buckets/artifacts.k8s-staging-addon-manager.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-addon-manager/buckets/artifacts.k8s-staging-addon-manager.appspot.com/bucketpolicyonly.txt new file mode 100644 index 00000000000..734ea935bf5 --- /dev/null +++ b/audit/projects/k8s-staging-addon-manager/buckets/artifacts.k8s-staging-addon-manager.appspot.com/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://artifacts.k8s-staging-addon-manager.appspot.com: + Enabled: True + LockedTime: 2020-12-29 15:50:11.853000+00:00 + diff --git a/audit/projects/k8s-staging-addon-manager/buckets/artifacts.k8s-staging-addon-manager.appspot.com/cors.txt b/audit/projects/k8s-staging-addon-manager/buckets/artifacts.k8s-staging-addon-manager.appspot.com/cors.txt new file mode 100644 index 00000000000..f6980ef2a0d --- /dev/null +++ b/audit/projects/k8s-staging-addon-manager/buckets/artifacts.k8s-staging-addon-manager.appspot.com/cors.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-addon-manager.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-addon-manager/buckets/artifacts.k8s-staging-addon-manager.appspot.com/iam.json b/audit/projects/k8s-staging-addon-manager/buckets/artifacts.k8s-staging-addon-manager.appspot.com/iam.json new file mode 100644 index 00000000000..0aeed7ac787 --- /dev/null +++ b/audit/projects/k8s-staging-addon-manager/buckets/artifacts.k8s-staging-addon-manager.appspot.com/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-addon-manager", + "projectOwner:k8s-staging-addon-manager" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-addon-manager" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-addon-manager@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-addon-manager@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-addon-manager/buckets/artifacts.k8s-staging-addon-manager.appspot.com/logging.txt b/audit/projects/k8s-staging-addon-manager/buckets/artifacts.k8s-staging-addon-manager.appspot.com/logging.txt new file mode 100644 index 00000000000..8bbf7a72770 --- /dev/null +++ b/audit/projects/k8s-staging-addon-manager/buckets/artifacts.k8s-staging-addon-manager.appspot.com/logging.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-addon-manager.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager-gcb/bucketpolicyonly.txt new file mode 100644 index 00000000000..9031723e911 --- /dev/null +++ b/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager-gcb/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-addon-manager-gcb: + Enabled: True + LockedTime: 2020-12-29 15:50:59.044000+00:00 + diff --git a/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager-gcb/cors.txt b/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager-gcb/cors.txt new file mode 100644 index 00000000000..db406e36631 --- /dev/null +++ b/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager-gcb/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-addon-manager-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager-gcb/iam.json b/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager-gcb/iam.json new file mode 100644 index 00000000000..a98593d2a8f --- /dev/null +++ b/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager-gcb/iam.json @@ -0,0 +1,46 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-addon-manager", + "projectOwner:k8s-staging-addon-manager" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-addon-manager" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-addon-manager@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-addon-manager@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectCreator" + }, + { + "members": [ + "allUsers", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager-gcb/logging.txt b/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager-gcb/logging.txt new file mode 100644 index 00000000000..5792acde43b --- /dev/null +++ b/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager-gcb/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-addon-manager-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager/bucketpolicyonly.txt b/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager/bucketpolicyonly.txt new file mode 100644 index 00000000000..08e861252ec --- /dev/null +++ b/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-addon-manager: + Enabled: True + LockedTime: 2020-12-29 15:50:35.841000+00:00 + diff --git a/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager/cors.txt b/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager/cors.txt new file mode 100644 index 00000000000..0b694f6c4f5 --- /dev/null +++ b/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-addon-manager/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager/iam.json b/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager/iam.json new file mode 100644 index 00000000000..0aeed7ac787 --- /dev/null +++ b/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-addon-manager", + "projectOwner:k8s-staging-addon-manager" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-addon-manager" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-addon-manager@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-addon-manager@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager/logging.txt b/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager/logging.txt new file mode 100644 index 00000000000..b1f025f9883 --- /dev/null +++ b/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-addon-manager/ has no logging configuration. diff --git a/audit/projects/k8s-staging-addon-manager/description.json b/audit/projects/k8s-staging-addon-manager/description.json new file mode 100644 index 00000000000..5eed1e5e9d6 --- /dev/null +++ b/audit/projects/k8s-staging-addon-manager/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-09-30T15:49:21.676Z", + "lifecycleState": "ACTIVE", + "name": "k8s-staging-addon-manager", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-staging-addon-manager", + "projectNumber": "103321906213" +} diff --git a/audit/projects/k8s-staging-addon-manager/iam.json b/audit/projects/k8s-staging-addon-manager/iam.json new file mode 100644 index 00000000000..a18f2814b77 --- /dev/null +++ b/audit/projects/k8s-staging-addon-manager/iam.json @@ -0,0 +1,68 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:103321906213@cloudbuild.gserviceaccount.com", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.builds.builder" + }, + { + "members": [ + "group:k8s-infra-staging-addon-manager@kubernetes.io" + ], + "role": "roles/cloudbuild.builds.editor" + }, + { + "members": [ + "serviceAccount:service-103321906213@gcp-sa-cloudbuild.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-103321906213@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-103321906213@containerregistry.iam.gserviceaccount.com" + ], + "role": "roles/containerregistry.ServiceAgent" + }, + { + "members": [ + "serviceAccount:service-103321906213@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-staging-addon-manager@kubernetes.io" + ], + "role": "roles/serviceusage.serviceUsageConsumer" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-addon-manager@kubernetes.io" + ], + "role": "roles/viewer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-staging-addon-manager/services/enabled.txt b/audit/projects/k8s-staging-addon-manager/services/enabled.txt new file mode 100644 index 00000000000..30cdd842f18 --- /dev/null +++ b/audit/projects/k8s-staging-addon-manager/services/enabled.txt @@ -0,0 +1,11 @@ +NAME TITLE +cloudbuild.googleapis.com Cloud Build API +cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API +containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API +logging.googleapis.com Cloud Logging API +pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API +storage-api.googleapis.com Google Cloud Storage JSON API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-bootkube/buckets/artifacts.k8s-staging-bootkube.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-bootkube/buckets/artifacts.k8s-staging-bootkube.appspot.com/bucketpolicyonly.txt new file mode 100644 index 00000000000..5b9186fb510 --- /dev/null +++ b/audit/projects/k8s-staging-bootkube/buckets/artifacts.k8s-staging-bootkube.appspot.com/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://artifacts.k8s-staging-bootkube.appspot.com: + Enabled: True + LockedTime: 2020-09-07 22:17:57.029000+00:00 + diff --git a/audit/projects/k8s-staging-bootkube/buckets/artifacts.k8s-staging-bootkube.appspot.com/cors.txt b/audit/projects/k8s-staging-bootkube/buckets/artifacts.k8s-staging-bootkube.appspot.com/cors.txt new file mode 100644 index 00000000000..c38970753d0 --- /dev/null +++ b/audit/projects/k8s-staging-bootkube/buckets/artifacts.k8s-staging-bootkube.appspot.com/cors.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-bootkube.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-bootkube/buckets/artifacts.k8s-staging-bootkube.appspot.com/iam.json b/audit/projects/k8s-staging-bootkube/buckets/artifacts.k8s-staging-bootkube.appspot.com/iam.json new file mode 100644 index 00000000000..9df7393fd8c --- /dev/null +++ b/audit/projects/k8s-staging-bootkube/buckets/artifacts.k8s-staging-bootkube.appspot.com/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-bootkube", + "projectOwner:k8s-staging-bootkube" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-bootkube" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-bootkube@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-bootkube@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-bootkube/buckets/artifacts.k8s-staging-bootkube.appspot.com/logging.txt b/audit/projects/k8s-staging-bootkube/buckets/artifacts.k8s-staging-bootkube.appspot.com/logging.txt new file mode 100644 index 00000000000..1fc4ee77e94 --- /dev/null +++ b/audit/projects/k8s-staging-bootkube/buckets/artifacts.k8s-staging-bootkube.appspot.com/logging.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-bootkube.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube-gcb/bucketpolicyonly.txt new file mode 100644 index 00000000000..d2b846d18e4 --- /dev/null +++ b/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube-gcb/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-bootkube-gcb: + Enabled: True + LockedTime: 2020-09-07 22:18:42.337000+00:00 + diff --git a/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube-gcb/cors.txt b/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube-gcb/cors.txt new file mode 100644 index 00000000000..1a0cb09919a --- /dev/null +++ b/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube-gcb/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-bootkube-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube-gcb/iam.json b/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube-gcb/iam.json new file mode 100644 index 00000000000..6525e97c6b1 --- /dev/null +++ b/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube-gcb/iam.json @@ -0,0 +1,46 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-bootkube", + "projectOwner:k8s-staging-bootkube" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-bootkube" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-bootkube@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-bootkube@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectCreator" + }, + { + "members": [ + "allUsers", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube-gcb/logging.txt b/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube-gcb/logging.txt new file mode 100644 index 00000000000..90ff90ab974 --- /dev/null +++ b/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube-gcb/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-bootkube-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube/bucketpolicyonly.txt b/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube/bucketpolicyonly.txt new file mode 100644 index 00000000000..db417ee6a44 --- /dev/null +++ b/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-bootkube: + Enabled: True + LockedTime: 2020-09-07 22:18:20.834000+00:00 + diff --git a/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube/cors.txt b/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube/cors.txt new file mode 100644 index 00000000000..990585a05c3 --- /dev/null +++ b/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-bootkube/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube/iam.json b/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube/iam.json new file mode 100644 index 00000000000..9df7393fd8c --- /dev/null +++ b/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-bootkube", + "projectOwner:k8s-staging-bootkube" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-bootkube" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-bootkube@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-bootkube@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube/logging.txt b/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube/logging.txt new file mode 100644 index 00000000000..5bde852175b --- /dev/null +++ b/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-bootkube/ has no logging configuration. diff --git a/audit/projects/k8s-staging-bootkube/description.json b/audit/projects/k8s-staging-bootkube/description.json new file mode 100644 index 00000000000..8779acae1e9 --- /dev/null +++ b/audit/projects/k8s-staging-bootkube/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-20T12:00:31.878Z", + "lifecycleState": "ACTIVE", + "name": "k8s-staging-bootkube", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-staging-bootkube", + "projectNumber": "48439280800" +} diff --git a/audit/projects/k8s-staging-bootkube/iam.json b/audit/projects/k8s-staging-bootkube/iam.json new file mode 100644 index 00000000000..e2de3521596 --- /dev/null +++ b/audit/projects/k8s-staging-bootkube/iam.json @@ -0,0 +1,68 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:48439280800@cloudbuild.gserviceaccount.com", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.builds.builder" + }, + { + "members": [ + "group:k8s-infra-staging-bootkube@kubernetes.io" + ], + "role": "roles/cloudbuild.builds.editor" + }, + { + "members": [ + "serviceAccount:service-48439280800@gcp-sa-cloudbuild.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-48439280800@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-48439280800@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, + { + "members": [ + "serviceAccount:service-48439280800@containerregistry.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:davanum@gmail.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-staging-bootkube@kubernetes.io" + ], + "role": "roles/serviceusage.serviceUsageConsumer" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-bootkube@kubernetes.io" + ], + "role": "roles/viewer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-staging-bootkube/services/enabled.txt b/audit/projects/k8s-staging-bootkube/services/enabled.txt new file mode 100644 index 00000000000..30cdd842f18 --- /dev/null +++ b/audit/projects/k8s-staging-bootkube/services/enabled.txt @@ -0,0 +1,11 @@ +NAME TITLE +cloudbuild.googleapis.com Cloud Build API +cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API +containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API +logging.googleapis.com Cloud Logging API +pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API +storage-api.googleapis.com Google Cloud Storage JSON API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-boskos/buckets/artifacts.k8s-staging-boskos.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-boskos/buckets/artifacts.k8s-staging-boskos.appspot.com/bucketpolicyonly.txt new file mode 100644 index 00000000000..1dec8e57c3e --- /dev/null +++ b/audit/projects/k8s-staging-boskos/buckets/artifacts.k8s-staging-boskos.appspot.com/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://artifacts.k8s-staging-boskos.appspot.com: + Enabled: True + LockedTime: 2020-08-24 18:53:27.723000+00:00 + diff --git a/audit/projects/k8s-staging-boskos/buckets/artifacts.k8s-staging-boskos.appspot.com/cors.txt b/audit/projects/k8s-staging-boskos/buckets/artifacts.k8s-staging-boskos.appspot.com/cors.txt new file mode 100644 index 00000000000..7e72b637a22 --- /dev/null +++ b/audit/projects/k8s-staging-boskos/buckets/artifacts.k8s-staging-boskos.appspot.com/cors.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-boskos.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-boskos/buckets/artifacts.k8s-staging-boskos.appspot.com/iam.json b/audit/projects/k8s-staging-boskos/buckets/artifacts.k8s-staging-boskos.appspot.com/iam.json new file mode 100644 index 00000000000..67d76767b1f --- /dev/null +++ b/audit/projects/k8s-staging-boskos/buckets/artifacts.k8s-staging-boskos.appspot.com/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-boskos", + "projectOwner:k8s-staging-boskos" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-boskos" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-boskos@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-boskos@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-boskos/buckets/artifacts.k8s-staging-boskos.appspot.com/logging.txt b/audit/projects/k8s-staging-boskos/buckets/artifacts.k8s-staging-boskos.appspot.com/logging.txt new file mode 100644 index 00000000000..a7d147658b4 --- /dev/null +++ b/audit/projects/k8s-staging-boskos/buckets/artifacts.k8s-staging-boskos.appspot.com/logging.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-boskos.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos-gcb/bucketpolicyonly.txt new file mode 100644 index 00000000000..2a19a8b6bc8 --- /dev/null +++ b/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos-gcb/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-boskos-gcb: + Enabled: True + LockedTime: 2020-08-24 18:54:18.423000+00:00 + diff --git a/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos-gcb/cors.txt b/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos-gcb/cors.txt new file mode 100644 index 00000000000..7b656d5ae20 --- /dev/null +++ b/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos-gcb/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-boskos-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos-gcb/iam.json b/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos-gcb/iam.json new file mode 100644 index 00000000000..344d7718880 --- /dev/null +++ b/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos-gcb/iam.json @@ -0,0 +1,46 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-boskos", + "projectOwner:k8s-staging-boskos" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-boskos" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-boskos@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-boskos@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectCreator" + }, + { + "members": [ + "allUsers", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos-gcb/logging.txt b/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos-gcb/logging.txt new file mode 100644 index 00000000000..514a7955bdd --- /dev/null +++ b/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos-gcb/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-boskos-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos/bucketpolicyonly.txt b/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos/bucketpolicyonly.txt new file mode 100644 index 00000000000..983a7ebd1cc --- /dev/null +++ b/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-boskos: + Enabled: True + LockedTime: 2020-08-24 18:53:51.124000+00:00 + diff --git a/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos/cors.txt b/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos/cors.txt new file mode 100644 index 00000000000..dcf52cf7f90 --- /dev/null +++ b/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-boskos/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos/iam.json b/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos/iam.json new file mode 100644 index 00000000000..67d76767b1f --- /dev/null +++ b/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-boskos", + "projectOwner:k8s-staging-boskos" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-boskos" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-boskos@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-boskos@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos/logging.txt b/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos/logging.txt new file mode 100644 index 00000000000..a5cf09708bb --- /dev/null +++ b/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-boskos/ has no logging configuration. diff --git a/audit/projects/k8s-staging-boskos/description.json b/audit/projects/k8s-staging-boskos/description.json new file mode 100644 index 00000000000..f435e10585c --- /dev/null +++ b/audit/projects/k8s-staging-boskos/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-26T18:52:21.673Z", + "lifecycleState": "ACTIVE", + "name": "k8s-staging-boskos", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-staging-boskos", + "projectNumber": "41305360102" +} diff --git a/audit/projects/k8s-staging-boskos/iam.json b/audit/projects/k8s-staging-boskos/iam.json new file mode 100644 index 00000000000..0bfd08bceba --- /dev/null +++ b/audit/projects/k8s-staging-boskos/iam.json @@ -0,0 +1,68 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:41305360102@cloudbuild.gserviceaccount.com", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.builds.builder" + }, + { + "members": [ + "group:k8s-infra-staging-boskos@kubernetes.io" + ], + "role": "roles/cloudbuild.builds.editor" + }, + { + "members": [ + "serviceAccount:service-41305360102@gcp-sa-cloudbuild.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-41305360102@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-41305360102@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, + { + "members": [ + "serviceAccount:service-41305360102@containerregistry.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-staging-boskos@kubernetes.io" + ], + "role": "roles/serviceusage.serviceUsageConsumer" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-boskos@kubernetes.io" + ], + "role": "roles/viewer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-staging-boskos/services/enabled.txt b/audit/projects/k8s-staging-boskos/services/enabled.txt new file mode 100644 index 00000000000..30cdd842f18 --- /dev/null +++ b/audit/projects/k8s-staging-boskos/services/enabled.txt @@ -0,0 +1,11 @@ +NAME TITLE +cloudbuild.googleapis.com Cloud Build API +cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API +containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API +logging.googleapis.com Cloud Logging API +pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API +storage-api.googleapis.com Google Cloud Storage JSON API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-ci-images/buckets/artifacts.k8s-staging-ci-images.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-ci-images/buckets/artifacts.k8s-staging-ci-images.appspot.com/bucketpolicyonly.txt new file mode 100644 index 00000000000..8293cbe6769 --- /dev/null +++ b/audit/projects/k8s-staging-ci-images/buckets/artifacts.k8s-staging-ci-images.appspot.com/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://artifacts.k8s-staging-ci-images.appspot.com: + Enabled: True + LockedTime: 2021-01-24 01:03:30.641000+00:00 + diff --git a/audit/projects/k8s-staging-ci-images/buckets/artifacts.k8s-staging-ci-images.appspot.com/cors.txt b/audit/projects/k8s-staging-ci-images/buckets/artifacts.k8s-staging-ci-images.appspot.com/cors.txt new file mode 100644 index 00000000000..ce16a9d2793 --- /dev/null +++ b/audit/projects/k8s-staging-ci-images/buckets/artifacts.k8s-staging-ci-images.appspot.com/cors.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-ci-images.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-ci-images/buckets/artifacts.k8s-staging-ci-images.appspot.com/iam.json b/audit/projects/k8s-staging-ci-images/buckets/artifacts.k8s-staging-ci-images.appspot.com/iam.json new file mode 100644 index 00000000000..22075a4759c --- /dev/null +++ b/audit/projects/k8s-staging-ci-images/buckets/artifacts.k8s-staging-ci-images.appspot.com/iam.json @@ -0,0 +1,39 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-ci-images", + "projectOwner:k8s-staging-ci-images" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-ci-images" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-ci-images@kubernetes.io", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-ci-images@kubernetes.io", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-ci-images/buckets/artifacts.k8s-staging-ci-images.appspot.com/logging.txt b/audit/projects/k8s-staging-ci-images/buckets/artifacts.k8s-staging-ci-images.appspot.com/logging.txt new file mode 100644 index 00000000000..3ec94047b00 --- /dev/null +++ b/audit/projects/k8s-staging-ci-images/buckets/artifacts.k8s-staging-ci-images.appspot.com/logging.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-ci-images.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images-gcb/bucketpolicyonly.txt new file mode 100644 index 00000000000..af8b97f01db --- /dev/null +++ b/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images-gcb/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-ci-images-gcb: + Enabled: True + LockedTime: 2021-01-24 01:04:26.841000+00:00 + diff --git a/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images-gcb/cors.txt b/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images-gcb/cors.txt new file mode 100644 index 00000000000..aa89228118b --- /dev/null +++ b/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images-gcb/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-ci-images-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images-gcb/iam.json b/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images-gcb/iam.json new file mode 100644 index 00000000000..6f6b961b9f2 --- /dev/null +++ b/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images-gcb/iam.json @@ -0,0 +1,46 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-ci-images", + "projectOwner:k8s-staging-ci-images" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-ci-images" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-ci-images@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-ci-images@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectCreator" + }, + { + "members": [ + "allUsers", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images-gcb/logging.txt b/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images-gcb/logging.txt new file mode 100644 index 00000000000..9e46edcc2f1 --- /dev/null +++ b/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images-gcb/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-ci-images-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images/bucketpolicyonly.txt b/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images/bucketpolicyonly.txt new file mode 100644 index 00000000000..d73c66b7daa --- /dev/null +++ b/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-ci-images: + Enabled: True + LockedTime: 2021-01-24 01:04:00.640000+00:00 + diff --git a/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images/cors.txt b/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images/cors.txt new file mode 100644 index 00000000000..ecb3dc0de97 --- /dev/null +++ b/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-ci-images/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images/iam.json b/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images/iam.json new file mode 100644 index 00000000000..5a5263913bc --- /dev/null +++ b/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-ci-images", + "projectOwner:k8s-staging-ci-images" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-ci-images" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-ci-images@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-ci-images@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images/logging.txt b/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images/logging.txt new file mode 100644 index 00000000000..f0b0cafebcb --- /dev/null +++ b/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-ci-images/ has no logging configuration. diff --git a/audit/projects/k8s-staging-ci-images/description.json b/audit/projects/k8s-staging-ci-images/description.json new file mode 100644 index 00000000000..6b62566c20a --- /dev/null +++ b/audit/projects/k8s-staging-ci-images/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-10-26T01:02:20.737Z", + "lifecycleState": "ACTIVE", + "name": "k8s-staging-ci-images", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-staging-ci-images", + "projectNumber": "731599680865" +} diff --git a/audit/projects/k8s-staging-ci-images/iam.json b/audit/projects/k8s-staging-ci-images/iam.json new file mode 100644 index 00000000000..ad0d7d76f71 --- /dev/null +++ b/audit/projects/k8s-staging-ci-images/iam.json @@ -0,0 +1,68 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:731599680865@cloudbuild.gserviceaccount.com", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.builds.builder" + }, + { + "members": [ + "group:k8s-infra-staging-ci-images@kubernetes.io" + ], + "role": "roles/cloudbuild.builds.editor" + }, + { + "members": [ + "serviceAccount:service-731599680865@gcp-sa-cloudbuild.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-731599680865@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-731599680865@containerregistry.iam.gserviceaccount.com" + ], + "role": "roles/containerregistry.ServiceAgent" + }, + { + "members": [ + "serviceAccount:service-731599680865@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, + { + "members": [ + "user:davanum@gmail.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-staging-ci-images@kubernetes.io" + ], + "role": "roles/serviceusage.serviceUsageConsumer" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-ci-images@kubernetes.io" + ], + "role": "roles/viewer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-staging-ci-images/services/enabled.txt b/audit/projects/k8s-staging-ci-images/services/enabled.txt new file mode 100644 index 00000000000..30cdd842f18 --- /dev/null +++ b/audit/projects/k8s-staging-ci-images/services/enabled.txt @@ -0,0 +1,11 @@ +NAME TITLE +cloudbuild.googleapis.com Cloud Build API +cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API +containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API +logging.googleapis.com Cloud Logging API +pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API +storage-api.googleapis.com Google Cloud Storage JSON API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/artifacts.k8s-staging-cloud-provider-gcp.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/artifacts.k8s-staging-cloud-provider-gcp.appspot.com/bucketpolicyonly.txt new file mode 100644 index 00000000000..f9231ca427b --- /dev/null +++ b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/artifacts.k8s-staging-cloud-provider-gcp.appspot.com/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://artifacts.k8s-staging-cloud-provider-gcp.appspot.com: + Enabled: True + LockedTime: 2020-10-15 21:52:41.223000+00:00 + diff --git a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/artifacts.k8s-staging-cloud-provider-gcp.appspot.com/cors.txt b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/artifacts.k8s-staging-cloud-provider-gcp.appspot.com/cors.txt new file mode 100644 index 00000000000..53724427196 --- /dev/null +++ b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/artifacts.k8s-staging-cloud-provider-gcp.appspot.com/cors.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-cloud-provider-gcp.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/artifacts.k8s-staging-cloud-provider-gcp.appspot.com/iam.json b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/artifacts.k8s-staging-cloud-provider-gcp.appspot.com/iam.json new file mode 100644 index 00000000000..f022a6b45f5 --- /dev/null +++ b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/artifacts.k8s-staging-cloud-provider-gcp.appspot.com/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-cloud-provider-gcp", + "projectOwner:k8s-staging-cloud-provider-gcp" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-cloud-provider-gcp" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-cloud-provider-gcp@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-cloud-provider-gcp@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/artifacts.k8s-staging-cloud-provider-gcp.appspot.com/logging.txt b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/artifacts.k8s-staging-cloud-provider-gcp.appspot.com/logging.txt new file mode 100644 index 00000000000..aea61ba78b9 --- /dev/null +++ b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/artifacts.k8s-staging-cloud-provider-gcp.appspot.com/logging.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-cloud-provider-gcp.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp-gcb/bucketpolicyonly.txt new file mode 100644 index 00000000000..2f55be3bd55 --- /dev/null +++ b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp-gcb/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-cloud-provider-gcp-gcb: + Enabled: True + LockedTime: 2020-10-15 21:53:28.123000+00:00 + diff --git a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp-gcb/cors.txt b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp-gcb/cors.txt new file mode 100644 index 00000000000..74f31f61f05 --- /dev/null +++ b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp-gcb/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-cloud-provider-gcp-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp-gcb/iam.json b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp-gcb/iam.json new file mode 100644 index 00000000000..537a67859c6 --- /dev/null +++ b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp-gcb/iam.json @@ -0,0 +1,46 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-cloud-provider-gcp", + "projectOwner:k8s-staging-cloud-provider-gcp" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-cloud-provider-gcp" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-cloud-provider-gcp@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-cloud-provider-gcp@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectCreator" + }, + { + "members": [ + "allUsers", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp-gcb/logging.txt b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp-gcb/logging.txt new file mode 100644 index 00000000000..b7cd397e5f5 --- /dev/null +++ b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp-gcb/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-cloud-provider-gcp-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp/bucketpolicyonly.txt b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp/bucketpolicyonly.txt new file mode 100644 index 00000000000..a1692ed1508 --- /dev/null +++ b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-cloud-provider-gcp: + Enabled: True + LockedTime: 2020-10-15 21:53:03.842000+00:00 + diff --git a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp/cors.txt b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp/cors.txt new file mode 100644 index 00000000000..3223a23f6e2 --- /dev/null +++ b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-cloud-provider-gcp/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp/iam.json b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp/iam.json new file mode 100644 index 00000000000..f022a6b45f5 --- /dev/null +++ b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-cloud-provider-gcp", + "projectOwner:k8s-staging-cloud-provider-gcp" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-cloud-provider-gcp" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-cloud-provider-gcp@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-cloud-provider-gcp@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp/logging.txt b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp/logging.txt new file mode 100644 index 00000000000..b7dd1bf1b66 --- /dev/null +++ b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-cloud-provider-gcp/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cloud-provider-gcp/description.json b/audit/projects/k8s-staging-cloud-provider-gcp/description.json new file mode 100644 index 00000000000..2e1cae58905 --- /dev/null +++ b/audit/projects/k8s-staging-cloud-provider-gcp/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-17T16:04:12.032Z", + "lifecycleState": "ACTIVE", + "name": "k8s-staging-cloud-provider-gcp", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-staging-cloud-provider-gcp", + "projectNumber": "67010995753" +} diff --git a/audit/projects/k8s-staging-cloud-provider-gcp/iam.json b/audit/projects/k8s-staging-cloud-provider-gcp/iam.json new file mode 100644 index 00000000000..50903a4fdf6 --- /dev/null +++ b/audit/projects/k8s-staging-cloud-provider-gcp/iam.json @@ -0,0 +1,68 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:67010995753@cloudbuild.gserviceaccount.com", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.builds.builder" + }, + { + "members": [ + "group:k8s-infra-staging-cloud-provider-gcp@kubernetes.io" + ], + "role": "roles/cloudbuild.builds.editor" + }, + { + "members": [ + "serviceAccount:service-67010995753@gcp-sa-cloudbuild.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-67010995753@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-67010995753@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, + { + "members": [ + "serviceAccount:service-67010995753@containerregistry.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-staging-cloud-provider-gcp@kubernetes.io" + ], + "role": "roles/serviceusage.serviceUsageConsumer" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-cloud-provider-gcp@kubernetes.io" + ], + "role": "roles/viewer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-staging-cloud-provider-gcp/services/enabled.txt b/audit/projects/k8s-staging-cloud-provider-gcp/services/enabled.txt new file mode 100644 index 00000000000..30cdd842f18 --- /dev/null +++ b/audit/projects/k8s-staging-cloud-provider-gcp/services/enabled.txt @@ -0,0 +1,11 @@ +NAME TITLE +cloudbuild.googleapis.com Cloud Build API +cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API +containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API +logging.googleapis.com Cloud Logging API +pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API +storage-api.googleapis.com Google Cloud Storage JSON API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-cluster-addons/buckets/artifacts.k8s-staging-cluster-addons.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-cluster-addons/buckets/artifacts.k8s-staging-cluster-addons.appspot.com/bucketpolicyonly.txt new file mode 100644 index 00000000000..52c0958698d --- /dev/null +++ b/audit/projects/k8s-staging-cluster-addons/buckets/artifacts.k8s-staging-cluster-addons.appspot.com/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://artifacts.k8s-staging-cluster-addons.appspot.com: + Enabled: True + LockedTime: 2020-11-12 18:42:03.526000+00:00 + diff --git a/audit/projects/k8s-staging-cluster-addons/buckets/artifacts.k8s-staging-cluster-addons.appspot.com/cors.txt b/audit/projects/k8s-staging-cluster-addons/buckets/artifacts.k8s-staging-cluster-addons.appspot.com/cors.txt new file mode 100644 index 00000000000..37835af53e3 --- /dev/null +++ b/audit/projects/k8s-staging-cluster-addons/buckets/artifacts.k8s-staging-cluster-addons.appspot.com/cors.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-cluster-addons.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cluster-addons/buckets/artifacts.k8s-staging-cluster-addons.appspot.com/iam.json b/audit/projects/k8s-staging-cluster-addons/buckets/artifacts.k8s-staging-cluster-addons.appspot.com/iam.json new file mode 100644 index 00000000000..a8df20cf2af --- /dev/null +++ b/audit/projects/k8s-staging-cluster-addons/buckets/artifacts.k8s-staging-cluster-addons.appspot.com/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-cluster-addons", + "projectOwner:k8s-staging-cluster-addons" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-cluster-addons" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-cluster-addons@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-cluster-addons@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-cluster-addons/buckets/artifacts.k8s-staging-cluster-addons.appspot.com/logging.txt b/audit/projects/k8s-staging-cluster-addons/buckets/artifacts.k8s-staging-cluster-addons.appspot.com/logging.txt new file mode 100644 index 00000000000..87975c1e18a --- /dev/null +++ b/audit/projects/k8s-staging-cluster-addons/buckets/artifacts.k8s-staging-cluster-addons.appspot.com/logging.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-cluster-addons.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons-gcb/bucketpolicyonly.txt new file mode 100644 index 00000000000..bd46dfbcd32 --- /dev/null +++ b/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons-gcb/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-cluster-addons-gcb: + Enabled: True + LockedTime: 2020-11-12 18:42:48.525000+00:00 + diff --git a/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons-gcb/cors.txt b/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons-gcb/cors.txt new file mode 100644 index 00000000000..1b9cd82ec75 --- /dev/null +++ b/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons-gcb/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-cluster-addons-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons-gcb/iam.json b/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons-gcb/iam.json new file mode 100644 index 00000000000..001de2439da --- /dev/null +++ b/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons-gcb/iam.json @@ -0,0 +1,46 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-cluster-addons", + "projectOwner:k8s-staging-cluster-addons" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-cluster-addons" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-cluster-addons@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-cluster-addons@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectCreator" + }, + { + "members": [ + "allUsers", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons-gcb/logging.txt b/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons-gcb/logging.txt new file mode 100644 index 00000000000..7a9f3e5a294 --- /dev/null +++ b/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons-gcb/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-cluster-addons-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons/bucketpolicyonly.txt b/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons/bucketpolicyonly.txt new file mode 100644 index 00000000000..b02fb6ee41f --- /dev/null +++ b/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-cluster-addons: + Enabled: True + LockedTime: 2020-11-12 18:42:26.724000+00:00 + diff --git a/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons/cors.txt b/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons/cors.txt new file mode 100644 index 00000000000..19af27a71b0 --- /dev/null +++ b/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-cluster-addons/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons/iam.json b/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons/iam.json new file mode 100644 index 00000000000..a8df20cf2af --- /dev/null +++ b/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-cluster-addons", + "projectOwner:k8s-staging-cluster-addons" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-cluster-addons" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-cluster-addons@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-cluster-addons@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons/logging.txt b/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons/logging.txt new file mode 100644 index 00000000000..323ff0447ce --- /dev/null +++ b/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-cluster-addons/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cluster-addons/description.json b/audit/projects/k8s-staging-cluster-addons/description.json new file mode 100644 index 00000000000..cf79ef541f9 --- /dev/null +++ b/audit/projects/k8s-staging-cluster-addons/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-14T18:41:09.035Z", + "lifecycleState": "ACTIVE", + "name": "k8s-staging-cluster-addons", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-staging-cluster-addons", + "projectNumber": "239900365888" +} diff --git a/audit/projects/k8s-staging-cluster-addons/iam.json b/audit/projects/k8s-staging-cluster-addons/iam.json new file mode 100644 index 00000000000..f4279ad8444 --- /dev/null +++ b/audit/projects/k8s-staging-cluster-addons/iam.json @@ -0,0 +1,68 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:239900365888@cloudbuild.gserviceaccount.com", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.builds.builder" + }, + { + "members": [ + "group:k8s-infra-staging-cluster-addons@kubernetes.io" + ], + "role": "roles/cloudbuild.builds.editor" + }, + { + "members": [ + "serviceAccount:service-239900365888@gcp-sa-cloudbuild.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-239900365888@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-239900365888@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, + { + "members": [ + "serviceAccount:service-239900365888@containerregistry.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-staging-cluster-addons@kubernetes.io" + ], + "role": "roles/serviceusage.serviceUsageConsumer" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-cluster-addons@kubernetes.io" + ], + "role": "roles/viewer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-staging-cluster-addons/services/enabled.txt b/audit/projects/k8s-staging-cluster-addons/services/enabled.txt new file mode 100644 index 00000000000..30cdd842f18 --- /dev/null +++ b/audit/projects/k8s-staging-cluster-addons/services/enabled.txt @@ -0,0 +1,11 @@ +NAME TITLE +cloudbuild.googleapis.com Cloud Build API +cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API +containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API +logging.googleapis.com Cloud Logging API +pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API +storage-api.googleapis.com Google Cloud Storage JSON API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-cri-tools/buckets/artifacts.k8s-staging-cri-tools.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-cri-tools/buckets/artifacts.k8s-staging-cri-tools.appspot.com/bucketpolicyonly.txt new file mode 100644 index 00000000000..d48b23954c0 --- /dev/null +++ b/audit/projects/k8s-staging-cri-tools/buckets/artifacts.k8s-staging-cri-tools.appspot.com/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://artifacts.k8s-staging-cri-tools.appspot.com: + Enabled: True + LockedTime: 2021-02-17 19:28:32.040000+00:00 + diff --git a/audit/projects/k8s-staging-cri-tools/buckets/artifacts.k8s-staging-cri-tools.appspot.com/cors.txt b/audit/projects/k8s-staging-cri-tools/buckets/artifacts.k8s-staging-cri-tools.appspot.com/cors.txt new file mode 100644 index 00000000000..56f75e13040 --- /dev/null +++ b/audit/projects/k8s-staging-cri-tools/buckets/artifacts.k8s-staging-cri-tools.appspot.com/cors.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-cri-tools.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cri-tools/buckets/artifacts.k8s-staging-cri-tools.appspot.com/iam.json b/audit/projects/k8s-staging-cri-tools/buckets/artifacts.k8s-staging-cri-tools.appspot.com/iam.json new file mode 100644 index 00000000000..8800ec2218c --- /dev/null +++ b/audit/projects/k8s-staging-cri-tools/buckets/artifacts.k8s-staging-cri-tools.appspot.com/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-cri-tools", + "projectOwner:k8s-staging-cri-tools" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-cri-tools" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-cri-tools@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-cri-tools@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-cri-tools/buckets/artifacts.k8s-staging-cri-tools.appspot.com/logging.txt b/audit/projects/k8s-staging-cri-tools/buckets/artifacts.k8s-staging-cri-tools.appspot.com/logging.txt new file mode 100644 index 00000000000..79cee9e7d19 --- /dev/null +++ b/audit/projects/k8s-staging-cri-tools/buckets/artifacts.k8s-staging-cri-tools.appspot.com/logging.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-cri-tools.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools-gcb/bucketpolicyonly.txt new file mode 100644 index 00000000000..1f0ae3234f4 --- /dev/null +++ b/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools-gcb/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-cri-tools-gcb: + Enabled: True + LockedTime: 2021-02-17 19:29:07.746000+00:00 + diff --git a/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools-gcb/cors.txt b/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools-gcb/cors.txt new file mode 100644 index 00000000000..aa024c9ac20 --- /dev/null +++ b/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools-gcb/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-cri-tools-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools-gcb/iam.json b/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools-gcb/iam.json new file mode 100644 index 00000000000..1811189d38c --- /dev/null +++ b/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools-gcb/iam.json @@ -0,0 +1,46 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-cri-tools", + "projectOwner:k8s-staging-cri-tools" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-cri-tools" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-cri-tools@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-cri-tools@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectCreator" + }, + { + "members": [ + "allUsers", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools-gcb/logging.txt b/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools-gcb/logging.txt new file mode 100644 index 00000000000..3c8d62b5a92 --- /dev/null +++ b/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools-gcb/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-cri-tools-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools/bucketpolicyonly.txt b/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools/bucketpolicyonly.txt new file mode 100644 index 00000000000..ecaa39829af --- /dev/null +++ b/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-cri-tools: + Enabled: True + LockedTime: 2021-02-17 19:28:50.453000+00:00 + diff --git a/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools/cors.txt b/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools/cors.txt new file mode 100644 index 00000000000..675e460d96c --- /dev/null +++ b/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-cri-tools/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools/iam.json b/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools/iam.json new file mode 100644 index 00000000000..8800ec2218c --- /dev/null +++ b/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-cri-tools", + "projectOwner:k8s-staging-cri-tools" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-cri-tools" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-cri-tools@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-cri-tools@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools/logging.txt b/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools/logging.txt new file mode 100644 index 00000000000..f34ee0058a6 --- /dev/null +++ b/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-cri-tools/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cri-tools/description.json b/audit/projects/k8s-staging-cri-tools/description.json new file mode 100644 index 00000000000..abb6113a469 --- /dev/null +++ b/audit/projects/k8s-staging-cri-tools/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-28T17:53:15.737Z", + "lifecycleState": "ACTIVE", + "name": "k8s-staging-cri-tools", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-staging-cri-tools", + "projectNumber": "565574877728" +} diff --git a/audit/projects/k8s-staging-cri-tools/iam.json b/audit/projects/k8s-staging-cri-tools/iam.json new file mode 100644 index 00000000000..221bc30ae02 --- /dev/null +++ b/audit/projects/k8s-staging-cri-tools/iam.json @@ -0,0 +1,68 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:565574877728@cloudbuild.gserviceaccount.com", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.builds.builder" + }, + { + "members": [ + "group:k8s-infra-staging-cri-tools@kubernetes.io" + ], + "role": "roles/cloudbuild.builds.editor" + }, + { + "members": [ + "serviceAccount:service-565574877728@gcp-sa-cloudbuild.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-565574877728@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-565574877728@containerregistry.iam.gserviceaccount.com" + ], + "role": "roles/containerregistry.ServiceAgent" + }, + { + "members": [ + "serviceAccount:service-565574877728@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, + { + "members": [ + "user:davanum@gmail.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-staging-cri-tools@kubernetes.io" + ], + "role": "roles/serviceusage.serviceUsageConsumer" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-cri-tools@kubernetes.io" + ], + "role": "roles/viewer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-staging-cri-tools/services/enabled.txt b/audit/projects/k8s-staging-cri-tools/services/enabled.txt new file mode 100644 index 00000000000..30cdd842f18 --- /dev/null +++ b/audit/projects/k8s-staging-cri-tools/services/enabled.txt @@ -0,0 +1,11 @@ +NAME TITLE +cloudbuild.googleapis.com Cloud Build API +cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API +containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API +logging.googleapis.com Cloud Logging API +pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API +storage-api.googleapis.com Google Cloud Storage JSON API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-etcdadm/buckets/artifacts.k8s-staging-etcdadm.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-etcdadm/buckets/artifacts.k8s-staging-etcdadm.appspot.com/bucketpolicyonly.txt new file mode 100644 index 00000000000..8592852b44d --- /dev/null +++ b/audit/projects/k8s-staging-etcdadm/buckets/artifacts.k8s-staging-etcdadm.appspot.com/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://artifacts.k8s-staging-etcdadm.appspot.com: + Enabled: True + LockedTime: 2020-10-18 21:49:16.431000+00:00 + diff --git a/audit/projects/k8s-staging-etcdadm/buckets/artifacts.k8s-staging-etcdadm.appspot.com/cors.txt b/audit/projects/k8s-staging-etcdadm/buckets/artifacts.k8s-staging-etcdadm.appspot.com/cors.txt new file mode 100644 index 00000000000..7b5a0d7dbf2 --- /dev/null +++ b/audit/projects/k8s-staging-etcdadm/buckets/artifacts.k8s-staging-etcdadm.appspot.com/cors.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-etcdadm.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-etcdadm/buckets/artifacts.k8s-staging-etcdadm.appspot.com/iam.json b/audit/projects/k8s-staging-etcdadm/buckets/artifacts.k8s-staging-etcdadm.appspot.com/iam.json new file mode 100644 index 00000000000..09cff056312 --- /dev/null +++ b/audit/projects/k8s-staging-etcdadm/buckets/artifacts.k8s-staging-etcdadm.appspot.com/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-etcdadm", + "projectOwner:k8s-staging-etcdadm" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-etcdadm" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-etcdadm@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-etcdadm@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-etcdadm/buckets/artifacts.k8s-staging-etcdadm.appspot.com/logging.txt b/audit/projects/k8s-staging-etcdadm/buckets/artifacts.k8s-staging-etcdadm.appspot.com/logging.txt new file mode 100644 index 00000000000..98fc4d10bff --- /dev/null +++ b/audit/projects/k8s-staging-etcdadm/buckets/artifacts.k8s-staging-etcdadm.appspot.com/logging.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-etcdadm.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm-gcb/bucketpolicyonly.txt new file mode 100644 index 00000000000..01e22727662 --- /dev/null +++ b/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm-gcb/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-etcdadm-gcb: + Enabled: True + LockedTime: 2020-10-18 21:50:01.422000+00:00 + diff --git a/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm-gcb/cors.txt b/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm-gcb/cors.txt new file mode 100644 index 00000000000..fd251d56d68 --- /dev/null +++ b/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm-gcb/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-etcdadm-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm-gcb/iam.json b/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm-gcb/iam.json new file mode 100644 index 00000000000..9ffe456a50d --- /dev/null +++ b/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm-gcb/iam.json @@ -0,0 +1,46 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-etcdadm", + "projectOwner:k8s-staging-etcdadm" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-etcdadm" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-etcdadm@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-etcdadm@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectCreator" + }, + { + "members": [ + "allUsers", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm-gcb/logging.txt b/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm-gcb/logging.txt new file mode 100644 index 00000000000..60fb6788851 --- /dev/null +++ b/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm-gcb/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-etcdadm-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm/bucketpolicyonly.txt b/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm/bucketpolicyonly.txt new file mode 100644 index 00000000000..c934ae8ebd1 --- /dev/null +++ b/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-etcdadm: + Enabled: True + LockedTime: 2020-10-18 21:49:39.322000+00:00 + diff --git a/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm/cors.txt b/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm/cors.txt new file mode 100644 index 00000000000..d32d196d641 --- /dev/null +++ b/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-etcdadm/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm/iam.json b/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm/iam.json new file mode 100644 index 00000000000..09cff056312 --- /dev/null +++ b/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-etcdadm", + "projectOwner:k8s-staging-etcdadm" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-etcdadm" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-etcdadm@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-etcdadm@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm/logging.txt b/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm/logging.txt new file mode 100644 index 00000000000..4ae541e8f54 --- /dev/null +++ b/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-etcdadm/ has no logging configuration. diff --git a/audit/projects/k8s-staging-etcdadm/description.json b/audit/projects/k8s-staging-etcdadm/description.json new file mode 100644 index 00000000000..7cdf54de5bd --- /dev/null +++ b/audit/projects/k8s-staging-etcdadm/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-26T18:45:36.970Z", + "lifecycleState": "ACTIVE", + "name": "k8s-staging-etcdadm", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-staging-etcdadm", + "projectNumber": "621671725592" +} diff --git a/audit/projects/k8s-staging-etcdadm/iam.json b/audit/projects/k8s-staging-etcdadm/iam.json new file mode 100644 index 00000000000..6aa922eb50b --- /dev/null +++ b/audit/projects/k8s-staging-etcdadm/iam.json @@ -0,0 +1,68 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:621671725592@cloudbuild.gserviceaccount.com", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.builds.builder" + }, + { + "members": [ + "group:k8s-infra-staging-etcdadm@kubernetes.io" + ], + "role": "roles/cloudbuild.builds.editor" + }, + { + "members": [ + "serviceAccount:service-621671725592@gcp-sa-cloudbuild.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-621671725592@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-621671725592@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, + { + "members": [ + "serviceAccount:service-621671725592@containerregistry.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-staging-etcdadm@kubernetes.io" + ], + "role": "roles/serviceusage.serviceUsageConsumer" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-etcdadm@kubernetes.io" + ], + "role": "roles/viewer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-staging-etcdadm/services/enabled.txt b/audit/projects/k8s-staging-etcdadm/services/enabled.txt new file mode 100644 index 00000000000..30cdd842f18 --- /dev/null +++ b/audit/projects/k8s-staging-etcdadm/services/enabled.txt @@ -0,0 +1,11 @@ +NAME TITLE +cloudbuild.googleapis.com Cloud Build API +cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API +containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API +logging.googleapis.com Cloud Logging API +pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API +storage-api.googleapis.com Google Cloud Storage JSON API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-examples/buckets/artifacts.k8s-staging-examples.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-examples/buckets/artifacts.k8s-staging-examples.appspot.com/bucketpolicyonly.txt new file mode 100644 index 00000000000..8a53ec2c26a --- /dev/null +++ b/audit/projects/k8s-staging-examples/buckets/artifacts.k8s-staging-examples.appspot.com/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://artifacts.k8s-staging-examples.appspot.com: + Enabled: True + LockedTime: 2021-03-06 20:53:36.438000+00:00 + diff --git a/audit/projects/k8s-staging-examples/buckets/artifacts.k8s-staging-examples.appspot.com/cors.txt b/audit/projects/k8s-staging-examples/buckets/artifacts.k8s-staging-examples.appspot.com/cors.txt new file mode 100644 index 00000000000..e5637ebe925 --- /dev/null +++ b/audit/projects/k8s-staging-examples/buckets/artifacts.k8s-staging-examples.appspot.com/cors.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-examples.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-examples/buckets/artifacts.k8s-staging-examples.appspot.com/iam.json b/audit/projects/k8s-staging-examples/buckets/artifacts.k8s-staging-examples.appspot.com/iam.json new file mode 100644 index 00000000000..191d0d839af --- /dev/null +++ b/audit/projects/k8s-staging-examples/buckets/artifacts.k8s-staging-examples.appspot.com/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-examples", + "projectOwner:k8s-staging-examples" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-examples" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-examples@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-examples@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-examples/buckets/artifacts.k8s-staging-examples.appspot.com/logging.txt b/audit/projects/k8s-staging-examples/buckets/artifacts.k8s-staging-examples.appspot.com/logging.txt new file mode 100644 index 00000000000..ab09a1ddf94 --- /dev/null +++ b/audit/projects/k8s-staging-examples/buckets/artifacts.k8s-staging-examples.appspot.com/logging.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-examples.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples-gcb/bucketpolicyonly.txt new file mode 100644 index 00000000000..0ec21708c3f --- /dev/null +++ b/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples-gcb/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-examples-gcb: + Enabled: True + LockedTime: 2021-03-06 20:54:13.538000+00:00 + diff --git a/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples-gcb/cors.txt b/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples-gcb/cors.txt new file mode 100644 index 00000000000..a641cf5b6fe --- /dev/null +++ b/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples-gcb/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-examples-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples-gcb/iam.json b/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples-gcb/iam.json new file mode 100644 index 00000000000..8bf7c201cbc --- /dev/null +++ b/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples-gcb/iam.json @@ -0,0 +1,46 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-examples", + "projectOwner:k8s-staging-examples" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-examples" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-examples@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-examples@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectCreator" + }, + { + "members": [ + "allUsers", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples-gcb/logging.txt b/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples-gcb/logging.txt new file mode 100644 index 00000000000..e66a313a319 --- /dev/null +++ b/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples-gcb/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-examples-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples/bucketpolicyonly.txt b/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples/bucketpolicyonly.txt new file mode 100644 index 00000000000..f765e9f8c52 --- /dev/null +++ b/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-examples: + Enabled: True + LockedTime: 2021-03-06 20:53:56.667000+00:00 + diff --git a/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples/cors.txt b/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples/cors.txt new file mode 100644 index 00000000000..6e29310c24b --- /dev/null +++ b/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-examples/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples/iam.json b/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples/iam.json new file mode 100644 index 00000000000..191d0d839af --- /dev/null +++ b/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-examples", + "projectOwner:k8s-staging-examples" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-examples" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-examples@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-examples@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples/logging.txt b/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples/logging.txt new file mode 100644 index 00000000000..71a36e399a7 --- /dev/null +++ b/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-examples/ has no logging configuration. diff --git a/audit/projects/k8s-staging-examples/description.json b/audit/projects/k8s-staging-examples/description.json new file mode 100644 index 00000000000..43ff0496d37 --- /dev/null +++ b/audit/projects/k8s-staging-examples/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-12-06T20:52:45.011Z", + "lifecycleState": "ACTIVE", + "name": "k8s-staging-examples", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-staging-examples", + "projectNumber": "315229499758" +} diff --git a/audit/projects/k8s-staging-examples/iam.json b/audit/projects/k8s-staging-examples/iam.json new file mode 100644 index 00000000000..2cdf9fc1239 --- /dev/null +++ b/audit/projects/k8s-staging-examples/iam.json @@ -0,0 +1,68 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:315229499758@cloudbuild.gserviceaccount.com", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.builds.builder" + }, + { + "members": [ + "group:k8s-infra-staging-examples@kubernetes.io" + ], + "role": "roles/cloudbuild.builds.editor" + }, + { + "members": [ + "serviceAccount:service-315229499758@gcp-sa-cloudbuild.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-315229499758@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-315229499758@containerregistry.iam.gserviceaccount.com" + ], + "role": "roles/containerregistry.ServiceAgent" + }, + { + "members": [ + "serviceAccount:service-315229499758@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, + { + "members": [ + "user:davanum@gmail.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-staging-examples@kubernetes.io" + ], + "role": "roles/serviceusage.serviceUsageConsumer" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-examples@kubernetes.io" + ], + "role": "roles/viewer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-staging-examples/services/enabled.txt b/audit/projects/k8s-staging-examples/services/enabled.txt new file mode 100644 index 00000000000..30cdd842f18 --- /dev/null +++ b/audit/projects/k8s-staging-examples/services/enabled.txt @@ -0,0 +1,11 @@ +NAME TITLE +cloudbuild.googleapis.com Cloud Build API +cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API +containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API +logging.googleapis.com Cloud Logging API +pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API +storage-api.googleapis.com Google Cloud Storage JSON API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-git-sync/buckets/artifacts.k8s-staging-git-sync.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-git-sync/buckets/artifacts.k8s-staging-git-sync.appspot.com/bucketpolicyonly.txt new file mode 100644 index 00000000000..df7a52d402e --- /dev/null +++ b/audit/projects/k8s-staging-git-sync/buckets/artifacts.k8s-staging-git-sync.appspot.com/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://artifacts.k8s-staging-git-sync.appspot.com: + Enabled: True + LockedTime: 2020-12-07 00:06:47.108000+00:00 + diff --git a/audit/projects/k8s-staging-git-sync/buckets/artifacts.k8s-staging-git-sync.appspot.com/cors.txt b/audit/projects/k8s-staging-git-sync/buckets/artifacts.k8s-staging-git-sync.appspot.com/cors.txt new file mode 100644 index 00000000000..779ea47fd0e --- /dev/null +++ b/audit/projects/k8s-staging-git-sync/buckets/artifacts.k8s-staging-git-sync.appspot.com/cors.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-git-sync.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-git-sync/buckets/artifacts.k8s-staging-git-sync.appspot.com/iam.json b/audit/projects/k8s-staging-git-sync/buckets/artifacts.k8s-staging-git-sync.appspot.com/iam.json new file mode 100644 index 00000000000..0b9d091b26c --- /dev/null +++ b/audit/projects/k8s-staging-git-sync/buckets/artifacts.k8s-staging-git-sync.appspot.com/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-git-sync", + "projectOwner:k8s-staging-git-sync" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-git-sync" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-git-sync@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-git-sync@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-git-sync/buckets/artifacts.k8s-staging-git-sync.appspot.com/logging.txt b/audit/projects/k8s-staging-git-sync/buckets/artifacts.k8s-staging-git-sync.appspot.com/logging.txt new file mode 100644 index 00000000000..80aaa699878 --- /dev/null +++ b/audit/projects/k8s-staging-git-sync/buckets/artifacts.k8s-staging-git-sync.appspot.com/logging.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-git-sync.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync-gcb/bucketpolicyonly.txt new file mode 100644 index 00000000000..65bd9bea611 --- /dev/null +++ b/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync-gcb/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-git-sync-gcb: + Enabled: True + LockedTime: 2020-12-07 00:07:21.323000+00:00 + diff --git a/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync-gcb/cors.txt b/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync-gcb/cors.txt new file mode 100644 index 00000000000..fc3d73344ed --- /dev/null +++ b/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync-gcb/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-git-sync-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync-gcb/iam.json b/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync-gcb/iam.json new file mode 100644 index 00000000000..796e7cf8bb4 --- /dev/null +++ b/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync-gcb/iam.json @@ -0,0 +1,46 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-git-sync", + "projectOwner:k8s-staging-git-sync" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-git-sync" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-git-sync@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-git-sync@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectCreator" + }, + { + "members": [ + "allUsers", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync-gcb/logging.txt b/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync-gcb/logging.txt new file mode 100644 index 00000000000..bb8f9253808 --- /dev/null +++ b/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync-gcb/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-git-sync-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync/bucketpolicyonly.txt b/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync/bucketpolicyonly.txt new file mode 100644 index 00000000000..e99c18a63c2 --- /dev/null +++ b/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-git-sync: + Enabled: True + LockedTime: 2020-12-07 00:07:04.810000+00:00 + diff --git a/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync/cors.txt b/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync/cors.txt new file mode 100644 index 00000000000..a186e23f71b --- /dev/null +++ b/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-git-sync/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync/iam.json b/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync/iam.json new file mode 100644 index 00000000000..0b9d091b26c --- /dev/null +++ b/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-git-sync", + "projectOwner:k8s-staging-git-sync" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-git-sync" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-git-sync@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-git-sync@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync/logging.txt b/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync/logging.txt new file mode 100644 index 00000000000..3485c8f5be8 --- /dev/null +++ b/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-git-sync/ has no logging configuration. diff --git a/audit/projects/k8s-staging-git-sync/description.json b/audit/projects/k8s-staging-git-sync/description.json new file mode 100644 index 00000000000..5e9854d0520 --- /dev/null +++ b/audit/projects/k8s-staging-git-sync/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-09-08T00:05:59.672Z", + "lifecycleState": "ACTIVE", + "name": "k8s-staging-git-sync", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-staging-git-sync", + "projectNumber": "998209132534" +} diff --git a/audit/projects/k8s-staging-git-sync/iam.json b/audit/projects/k8s-staging-git-sync/iam.json new file mode 100644 index 00000000000..a2e49c60923 --- /dev/null +++ b/audit/projects/k8s-staging-git-sync/iam.json @@ -0,0 +1,68 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:998209132534@cloudbuild.gserviceaccount.com", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.builds.builder" + }, + { + "members": [ + "group:k8s-infra-staging-git-sync@kubernetes.io" + ], + "role": "roles/cloudbuild.builds.editor" + }, + { + "members": [ + "serviceAccount:service-998209132534@gcp-sa-cloudbuild.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-998209132534@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-998209132534@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, + { + "members": [ + "serviceAccount:service-998209132534@containerregistry.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:thockin@google.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-staging-git-sync@kubernetes.io" + ], + "role": "roles/serviceusage.serviceUsageConsumer" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-git-sync@kubernetes.io" + ], + "role": "roles/viewer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-staging-git-sync/services/enabled.txt b/audit/projects/k8s-staging-git-sync/services/enabled.txt new file mode 100644 index 00000000000..30cdd842f18 --- /dev/null +++ b/audit/projects/k8s-staging-git-sync/services/enabled.txt @@ -0,0 +1,11 @@ +NAME TITLE +cloudbuild.googleapis.com Cloud Build API +cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API +containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API +logging.googleapis.com Cloud Logging API +pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API +storage-api.googleapis.com Google Cloud Storage JSON API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-ingress-nginx/buckets/artifacts.k8s-staging-ingress-nginx.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-ingress-nginx/buckets/artifacts.k8s-staging-ingress-nginx.appspot.com/bucketpolicyonly.txt new file mode 100644 index 00000000000..4e4cf2bdd49 --- /dev/null +++ b/audit/projects/k8s-staging-ingress-nginx/buckets/artifacts.k8s-staging-ingress-nginx.appspot.com/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://artifacts.k8s-staging-ingress-nginx.appspot.com: + Enabled: True + LockedTime: 2020-08-24 18:49:22.327000+00:00 + diff --git a/audit/projects/k8s-staging-ingress-nginx/buckets/artifacts.k8s-staging-ingress-nginx.appspot.com/cors.txt b/audit/projects/k8s-staging-ingress-nginx/buckets/artifacts.k8s-staging-ingress-nginx.appspot.com/cors.txt new file mode 100644 index 00000000000..8885db3a396 --- /dev/null +++ b/audit/projects/k8s-staging-ingress-nginx/buckets/artifacts.k8s-staging-ingress-nginx.appspot.com/cors.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-ingress-nginx.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-ingress-nginx/buckets/artifacts.k8s-staging-ingress-nginx.appspot.com/iam.json b/audit/projects/k8s-staging-ingress-nginx/buckets/artifacts.k8s-staging-ingress-nginx.appspot.com/iam.json new file mode 100644 index 00000000000..0047cab2bd5 --- /dev/null +++ b/audit/projects/k8s-staging-ingress-nginx/buckets/artifacts.k8s-staging-ingress-nginx.appspot.com/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-ingress-nginx", + "projectOwner:k8s-staging-ingress-nginx" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-ingress-nginx" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-ingress-nginx@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-ingress-nginx@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-ingress-nginx/buckets/artifacts.k8s-staging-ingress-nginx.appspot.com/logging.txt b/audit/projects/k8s-staging-ingress-nginx/buckets/artifacts.k8s-staging-ingress-nginx.appspot.com/logging.txt new file mode 100644 index 00000000000..8cb5943ad9a --- /dev/null +++ b/audit/projects/k8s-staging-ingress-nginx/buckets/artifacts.k8s-staging-ingress-nginx.appspot.com/logging.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-ingress-nginx.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx-gcb/bucketpolicyonly.txt new file mode 100644 index 00000000000..50592fc85ef --- /dev/null +++ b/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx-gcb/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-ingress-nginx-gcb: + Enabled: True + LockedTime: 2020-08-24 18:50:16.825000+00:00 + diff --git a/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx-gcb/cors.txt b/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx-gcb/cors.txt new file mode 100644 index 00000000000..5bdb11b9dc6 --- /dev/null +++ b/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx-gcb/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-ingress-nginx-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx-gcb/iam.json b/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx-gcb/iam.json new file mode 100644 index 00000000000..513dbe6f7c5 --- /dev/null +++ b/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx-gcb/iam.json @@ -0,0 +1,46 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-ingress-nginx", + "projectOwner:k8s-staging-ingress-nginx" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-ingress-nginx" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-ingress-nginx@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-ingress-nginx@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectCreator" + }, + { + "members": [ + "allUsers", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx-gcb/logging.txt b/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx-gcb/logging.txt new file mode 100644 index 00000000000..904895ac470 --- /dev/null +++ b/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx-gcb/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-ingress-nginx-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx/bucketpolicyonly.txt b/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx/bucketpolicyonly.txt new file mode 100644 index 00000000000..a128404a751 --- /dev/null +++ b/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-ingress-nginx: + Enabled: True + LockedTime: 2020-08-24 18:49:48.428000+00:00 + diff --git a/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx/cors.txt b/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx/cors.txt new file mode 100644 index 00000000000..e2abe67fb1e --- /dev/null +++ b/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-ingress-nginx/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx/iam.json b/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx/iam.json new file mode 100644 index 00000000000..0047cab2bd5 --- /dev/null +++ b/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-ingress-nginx", + "projectOwner:k8s-staging-ingress-nginx" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-ingress-nginx" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-ingress-nginx@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-ingress-nginx@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx/logging.txt b/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx/logging.txt new file mode 100644 index 00000000000..95fa9b1ac45 --- /dev/null +++ b/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-ingress-nginx/ has no logging configuration. diff --git a/audit/projects/k8s-staging-ingress-nginx/description.json b/audit/projects/k8s-staging-ingress-nginx/description.json new file mode 100644 index 00000000000..3a7c286b4ad --- /dev/null +++ b/audit/projects/k8s-staging-ingress-nginx/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-26T18:48:29.135Z", + "lifecycleState": "ACTIVE", + "name": "k8s-staging-ingress-nginx", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-staging-ingress-nginx", + "projectNumber": "971199482687" +} diff --git a/audit/projects/k8s-staging-ingress-nginx/iam.json b/audit/projects/k8s-staging-ingress-nginx/iam.json new file mode 100644 index 00000000000..0087922c52c --- /dev/null +++ b/audit/projects/k8s-staging-ingress-nginx/iam.json @@ -0,0 +1,68 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:971199482687@cloudbuild.gserviceaccount.com", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.builds.builder" + }, + { + "members": [ + "group:k8s-infra-staging-ingress-nginx@kubernetes.io" + ], + "role": "roles/cloudbuild.builds.editor" + }, + { + "members": [ + "serviceAccount:service-971199482687@gcp-sa-cloudbuild.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-971199482687@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-971199482687@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, + { + "members": [ + "serviceAccount:service-971199482687@containerregistry.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-staging-ingress-nginx@kubernetes.io" + ], + "role": "roles/serviceusage.serviceUsageConsumer" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-ingress-nginx@kubernetes.io" + ], + "role": "roles/viewer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-staging-ingress-nginx/services/enabled.txt b/audit/projects/k8s-staging-ingress-nginx/services/enabled.txt new file mode 100644 index 00000000000..ab1ef15e4e2 --- /dev/null +++ b/audit/projects/k8s-staging-ingress-nginx/services/enabled.txt @@ -0,0 +1,13 @@ +NAME TITLE +cloudbuild.googleapis.com Cloud Build API +cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API +containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API +stackdriver.googleapis.com Stackdriver API +storage-api.googleapis.com Google Cloud Storage JSON API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-ingressconformance/buckets/artifacts.k8s-staging-ingressconformance.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-ingressconformance/buckets/artifacts.k8s-staging-ingressconformance.appspot.com/bucketpolicyonly.txt new file mode 100644 index 00000000000..3dfe9747c91 --- /dev/null +++ b/audit/projects/k8s-staging-ingressconformance/buckets/artifacts.k8s-staging-ingressconformance.appspot.com/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://artifacts.k8s-staging-ingressconformance.appspot.com: + Enabled: True + LockedTime: 2020-09-07 21:45:50.021000+00:00 + diff --git a/audit/projects/k8s-staging-ingressconformance/buckets/artifacts.k8s-staging-ingressconformance.appspot.com/cors.txt b/audit/projects/k8s-staging-ingressconformance/buckets/artifacts.k8s-staging-ingressconformance.appspot.com/cors.txt new file mode 100644 index 00000000000..6108a1a5e55 --- /dev/null +++ b/audit/projects/k8s-staging-ingressconformance/buckets/artifacts.k8s-staging-ingressconformance.appspot.com/cors.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-ingressconformance.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-ingressconformance/buckets/artifacts.k8s-staging-ingressconformance.appspot.com/iam.json b/audit/projects/k8s-staging-ingressconformance/buckets/artifacts.k8s-staging-ingressconformance.appspot.com/iam.json new file mode 100644 index 00000000000..343bb3918df --- /dev/null +++ b/audit/projects/k8s-staging-ingressconformance/buckets/artifacts.k8s-staging-ingressconformance.appspot.com/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-ingressconformance", + "projectOwner:k8s-staging-ingressconformance" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-ingressconformance" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-ingressconformance@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-ingressconformance@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-ingressconformance/buckets/artifacts.k8s-staging-ingressconformance.appspot.com/logging.txt b/audit/projects/k8s-staging-ingressconformance/buckets/artifacts.k8s-staging-ingressconformance.appspot.com/logging.txt new file mode 100644 index 00000000000..124425843b5 --- /dev/null +++ b/audit/projects/k8s-staging-ingressconformance/buckets/artifacts.k8s-staging-ingressconformance.appspot.com/logging.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-ingressconformance.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance-gcb/bucketpolicyonly.txt new file mode 100644 index 00000000000..c2ad30c9471 --- /dev/null +++ b/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance-gcb/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-ingressconformance-gcb: + Enabled: True + LockedTime: 2020-09-07 21:46:36.427000+00:00 + diff --git a/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance-gcb/cors.txt b/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance-gcb/cors.txt new file mode 100644 index 00000000000..c72a55af159 --- /dev/null +++ b/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance-gcb/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-ingressconformance-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance-gcb/iam.json b/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance-gcb/iam.json new file mode 100644 index 00000000000..1be667af947 --- /dev/null +++ b/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance-gcb/iam.json @@ -0,0 +1,46 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-ingressconformance", + "projectOwner:k8s-staging-ingressconformance" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-ingressconformance" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-ingressconformance@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-ingressconformance@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectCreator" + }, + { + "members": [ + "allUsers", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance-gcb/logging.txt b/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance-gcb/logging.txt new file mode 100644 index 00000000000..8e7c57ac0c4 --- /dev/null +++ b/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance-gcb/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-ingressconformance-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance/bucketpolicyonly.txt b/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance/bucketpolicyonly.txt new file mode 100644 index 00000000000..eadf85fb1d1 --- /dev/null +++ b/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-ingressconformance: + Enabled: True + LockedTime: 2020-09-07 21:46:13.424000+00:00 + diff --git a/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance/cors.txt b/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance/cors.txt new file mode 100644 index 00000000000..8c4e63d71e6 --- /dev/null +++ b/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-ingressconformance/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance/iam.json b/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance/iam.json new file mode 100644 index 00000000000..343bb3918df --- /dev/null +++ b/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-ingressconformance", + "projectOwner:k8s-staging-ingressconformance" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-ingressconformance" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-ingressconformance@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-ingressconformance@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance/logging.txt b/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance/logging.txt new file mode 100644 index 00000000000..6901d0394d8 --- /dev/null +++ b/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-ingressconformance/ has no logging configuration. diff --git a/audit/projects/k8s-staging-ingressconformance/description.json b/audit/projects/k8s-staging-ingressconformance/description.json new file mode 100644 index 00000000000..e408f9ce535 --- /dev/null +++ b/audit/projects/k8s-staging-ingressconformance/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-06-09T21:40:42.524Z", + "lifecycleState": "ACTIVE", + "name": "k8s-staging-ingressconformance", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-staging-ingressconformance", + "projectNumber": "320459285183" +} diff --git a/audit/projects/k8s-staging-ingressconformance/iam.json b/audit/projects/k8s-staging-ingressconformance/iam.json new file mode 100644 index 00000000000..31f0ec95071 --- /dev/null +++ b/audit/projects/k8s-staging-ingressconformance/iam.json @@ -0,0 +1,68 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:320459285183@cloudbuild.gserviceaccount.com", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.builds.builder" + }, + { + "members": [ + "group:k8s-infra-staging-ingressconformance@kubernetes.io" + ], + "role": "roles/cloudbuild.builds.editor" + }, + { + "members": [ + "serviceAccount:service-320459285183@gcp-sa-cloudbuild.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-320459285183@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-320459285183@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, + { + "members": [ + "serviceAccount:service-320459285183@containerregistry.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-staging-ingressconformance@kubernetes.io" + ], + "role": "roles/serviceusage.serviceUsageConsumer" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-ingressconformance@kubernetes.io" + ], + "role": "roles/viewer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-staging-ingressconformance/services/enabled.txt b/audit/projects/k8s-staging-ingressconformance/services/enabled.txt new file mode 100644 index 00000000000..30cdd842f18 --- /dev/null +++ b/audit/projects/k8s-staging-ingressconformance/services/enabled.txt @@ -0,0 +1,11 @@ +NAME TITLE +cloudbuild.googleapis.com Cloud Build API +cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API +containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API +logging.googleapis.com Cloud Logging API +pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API +storage-api.googleapis.com Google Cloud Storage JSON API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/bucketpolicyonly.txt new file mode 100644 index 00000000000..f3344277572 --- /dev/null +++ b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://artifacts.k8s-staging-k8s-gsm-tools.appspot.com: + Enabled: True + LockedTime: 2020-10-15 22:23:19.927000+00:00 + diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/cors.txt b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/cors.txt new file mode 100644 index 00000000000..41f847e1c14 --- /dev/null +++ b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/cors.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-k8s-gsm-tools.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/iam.json b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/iam.json new file mode 100644 index 00000000000..3fb8dd67686 --- /dev/null +++ b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/iam.json @@ -0,0 +1,30 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-k8s-gsm-tools", + "projectOwner:k8s-staging-k8s-gsm-tools" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-k8s-gsm-tools" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/logging.txt b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/logging.txt new file mode 100644 index 00000000000..fe2f6b11ec7 --- /dev/null +++ b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/logging.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-k8s-gsm-tools.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/bucketpolicyonly.txt new file mode 100644 index 00000000000..ec13889ca20 --- /dev/null +++ b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-k8s-gsm-tools-gcb: + Enabled: True + LockedTime: 2020-10-15 22:24:05.028000+00:00 + diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/cors.txt b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/cors.txt new file mode 100644 index 00000000000..bcfc7ad1b3b --- /dev/null +++ b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-k8s-gsm-tools-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/iam.json b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/iam.json new file mode 100644 index 00000000000..bb97d296470 --- /dev/null +++ b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/iam.json @@ -0,0 +1,39 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-k8s-gsm-tools", + "projectOwner:k8s-staging-k8s-gsm-tools" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-k8s-gsm-tools" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectCreator" + }, + { + "members": [ + "allUsers", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/logging.txt b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/logging.txt new file mode 100644 index 00000000000..19c57f7d0b4 --- /dev/null +++ b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-k8s-gsm-tools-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/bucketpolicyonly.txt b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/bucketpolicyonly.txt new file mode 100644 index 00000000000..a23abd7288b --- /dev/null +++ b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-k8s-gsm-tools: + Enabled: True + LockedTime: 2020-10-15 22:23:42.127000+00:00 + diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/cors.txt b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/cors.txt new file mode 100644 index 00000000000..6eb00b67c08 --- /dev/null +++ b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-k8s-gsm-tools/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/iam.json b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/iam.json new file mode 100644 index 00000000000..3fb8dd67686 --- /dev/null +++ b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/iam.json @@ -0,0 +1,30 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-k8s-gsm-tools", + "projectOwner:k8s-staging-k8s-gsm-tools" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-k8s-gsm-tools" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/logging.txt b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/logging.txt new file mode 100644 index 00000000000..7def2cc5ef4 --- /dev/null +++ b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-k8s-gsm-tools/ has no logging configuration. diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/description.json b/audit/projects/k8s-staging-k8s-gsm-tools/description.json new file mode 100644 index 00000000000..7d35f52407b --- /dev/null +++ b/audit/projects/k8s-staging-k8s-gsm-tools/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-07-17T22:22:24.556Z", + "lifecycleState": "ACTIVE", + "name": "k8s-staging-k8s-gsm-tools", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-staging-k8s-gsm-tools", + "projectNumber": "1073099305721" +} diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/iam.json b/audit/projects/k8s-staging-k8s-gsm-tools/iam.json new file mode 100644 index 00000000000..438898fcb66 --- /dev/null +++ b/audit/projects/k8s-staging-k8s-gsm-tools/iam.json @@ -0,0 +1,55 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:1073099305721@cloudbuild.gserviceaccount.com", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.builds.builder" + }, + { + "members": [ + "serviceAccount:service-1073099305721@gcp-sa-cloudbuild.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-1073099305721@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-1073099305721@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, + { + "members": [ + "serviceAccount:service-1073099305721@containerregistry.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io" + ], + "role": "roles/viewer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/services/enabled.txt b/audit/projects/k8s-staging-k8s-gsm-tools/services/enabled.txt new file mode 100644 index 00000000000..30cdd842f18 --- /dev/null +++ b/audit/projects/k8s-staging-k8s-gsm-tools/services/enabled.txt @@ -0,0 +1,11 @@ +NAME TITLE +cloudbuild.googleapis.com Cloud Build API +cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API +containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API +logging.googleapis.com Cloud Logging API +pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API +storage-api.googleapis.com Google Cloud Storage JSON API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-kustomize/buckets/artifacts.k8s-staging-kustomize.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-kustomize/buckets/artifacts.k8s-staging-kustomize.appspot.com/bucketpolicyonly.txt new file mode 100644 index 00000000000..c0ef82c6b96 --- /dev/null +++ b/audit/projects/k8s-staging-kustomize/buckets/artifacts.k8s-staging-kustomize.appspot.com/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://artifacts.k8s-staging-kustomize.appspot.com: + Enabled: True + LockedTime: 2021-01-25 18:42:25.857000+00:00 + diff --git a/audit/projects/k8s-staging-kustomize/buckets/artifacts.k8s-staging-kustomize.appspot.com/cors.txt b/audit/projects/k8s-staging-kustomize/buckets/artifacts.k8s-staging-kustomize.appspot.com/cors.txt new file mode 100644 index 00000000000..59c114238c9 --- /dev/null +++ b/audit/projects/k8s-staging-kustomize/buckets/artifacts.k8s-staging-kustomize.appspot.com/cors.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-kustomize.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-kustomize/buckets/artifacts.k8s-staging-kustomize.appspot.com/iam.json b/audit/projects/k8s-staging-kustomize/buckets/artifacts.k8s-staging-kustomize.appspot.com/iam.json new file mode 100644 index 00000000000..46edb1d92a9 --- /dev/null +++ b/audit/projects/k8s-staging-kustomize/buckets/artifacts.k8s-staging-kustomize.appspot.com/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-kustomize", + "projectOwner:k8s-staging-kustomize" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-kustomize" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-kustomize@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-kustomize@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-kustomize/buckets/artifacts.k8s-staging-kustomize.appspot.com/logging.txt b/audit/projects/k8s-staging-kustomize/buckets/artifacts.k8s-staging-kustomize.appspot.com/logging.txt new file mode 100644 index 00000000000..a31db49fdc6 --- /dev/null +++ b/audit/projects/k8s-staging-kustomize/buckets/artifacts.k8s-staging-kustomize.appspot.com/logging.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-kustomize.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize-gcb/bucketpolicyonly.txt new file mode 100644 index 00000000000..1fc99e1784c --- /dev/null +++ b/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize-gcb/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-kustomize-gcb: + Enabled: True + LockedTime: 2021-01-25 18:43:08.140000+00:00 + diff --git a/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize-gcb/cors.txt b/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize-gcb/cors.txt new file mode 100644 index 00000000000..62313868392 --- /dev/null +++ b/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize-gcb/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-kustomize-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize-gcb/iam.json b/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize-gcb/iam.json new file mode 100644 index 00000000000..4feb9e803f3 --- /dev/null +++ b/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize-gcb/iam.json @@ -0,0 +1,46 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-kustomize", + "projectOwner:k8s-staging-kustomize" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-kustomize" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-kustomize@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-kustomize@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectCreator" + }, + { + "members": [ + "allUsers", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize-gcb/logging.txt b/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize-gcb/logging.txt new file mode 100644 index 00000000000..85626337726 --- /dev/null +++ b/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize-gcb/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-kustomize-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize/bucketpolicyonly.txt b/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize/bucketpolicyonly.txt new file mode 100644 index 00000000000..7a220df1689 --- /dev/null +++ b/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-kustomize: + Enabled: True + LockedTime: 2021-01-25 18:42:48.244000+00:00 + diff --git a/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize/cors.txt b/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize/cors.txt new file mode 100644 index 00000000000..232d09724c6 --- /dev/null +++ b/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-kustomize/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize/iam.json b/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize/iam.json new file mode 100644 index 00000000000..46edb1d92a9 --- /dev/null +++ b/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-kustomize", + "projectOwner:k8s-staging-kustomize" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-kustomize" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-kustomize@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-kustomize@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize/logging.txt b/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize/logging.txt new file mode 100644 index 00000000000..002ff6fa4ef --- /dev/null +++ b/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-kustomize/ has no logging configuration. diff --git a/audit/projects/k8s-staging-kustomize/description.json b/audit/projects/k8s-staging-kustomize/description.json new file mode 100644 index 00000000000..71ce74c6c1e --- /dev/null +++ b/audit/projects/k8s-staging-kustomize/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-10-27T18:41:33.326Z", + "lifecycleState": "ACTIVE", + "name": "k8s-staging-kustomize", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-staging-kustomize", + "projectNumber": "660796270509" +} diff --git a/audit/projects/k8s-staging-kustomize/iam.json b/audit/projects/k8s-staging-kustomize/iam.json new file mode 100644 index 00000000000..b40fbbaa08b --- /dev/null +++ b/audit/projects/k8s-staging-kustomize/iam.json @@ -0,0 +1,68 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:660796270509@cloudbuild.gserviceaccount.com", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.builds.builder" + }, + { + "members": [ + "group:k8s-infra-staging-kustomize@kubernetes.io" + ], + "role": "roles/cloudbuild.builds.editor" + }, + { + "members": [ + "serviceAccount:service-660796270509@gcp-sa-cloudbuild.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-660796270509@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-660796270509@containerregistry.iam.gserviceaccount.com" + ], + "role": "roles/containerregistry.ServiceAgent" + }, + { + "members": [ + "serviceAccount:service-660796270509@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, + { + "members": [ + "user:davanum@gmail.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-staging-kustomize@kubernetes.io" + ], + "role": "roles/serviceusage.serviceUsageConsumer" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-kustomize@kubernetes.io" + ], + "role": "roles/viewer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-staging-kustomize/services/enabled.txt b/audit/projects/k8s-staging-kustomize/services/enabled.txt new file mode 100644 index 00000000000..30cdd842f18 --- /dev/null +++ b/audit/projects/k8s-staging-kustomize/services/enabled.txt @@ -0,0 +1,11 @@ +NAME TITLE +cloudbuild.googleapis.com Cloud Build API +cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API +containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API +logging.googleapis.com Cloud Logging API +pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API +storage-api.googleapis.com Google Cloud Storage JSON API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-mirror/buckets/artifacts.k8s-staging-mirror.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-mirror/buckets/artifacts.k8s-staging-mirror.appspot.com/bucketpolicyonly.txt new file mode 100644 index 00000000000..6633238d8c8 --- /dev/null +++ b/audit/projects/k8s-staging-mirror/buckets/artifacts.k8s-staging-mirror.appspot.com/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://artifacts.k8s-staging-mirror.appspot.com: + Enabled: True + LockedTime: 2021-02-19 00:11:17.239000+00:00 + diff --git a/audit/projects/k8s-staging-mirror/buckets/artifacts.k8s-staging-mirror.appspot.com/cors.txt b/audit/projects/k8s-staging-mirror/buckets/artifacts.k8s-staging-mirror.appspot.com/cors.txt new file mode 100644 index 00000000000..ffada8cf40d --- /dev/null +++ b/audit/projects/k8s-staging-mirror/buckets/artifacts.k8s-staging-mirror.appspot.com/cors.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-mirror.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-mirror/buckets/artifacts.k8s-staging-mirror.appspot.com/iam.json b/audit/projects/k8s-staging-mirror/buckets/artifacts.k8s-staging-mirror.appspot.com/iam.json new file mode 100644 index 00000000000..74caa70de8e --- /dev/null +++ b/audit/projects/k8s-staging-mirror/buckets/artifacts.k8s-staging-mirror.appspot.com/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-mirror", + "projectOwner:k8s-staging-mirror" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-mirror" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-mirror@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-mirror@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-mirror/buckets/artifacts.k8s-staging-mirror.appspot.com/logging.txt b/audit/projects/k8s-staging-mirror/buckets/artifacts.k8s-staging-mirror.appspot.com/logging.txt new file mode 100644 index 00000000000..93e4e24231c --- /dev/null +++ b/audit/projects/k8s-staging-mirror/buckets/artifacts.k8s-staging-mirror.appspot.com/logging.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-mirror.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror-gcb/bucketpolicyonly.txt new file mode 100644 index 00000000000..78b7f88258b --- /dev/null +++ b/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror-gcb/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-mirror-gcb: + Enabled: True + LockedTime: 2021-02-19 00:11:54.744000+00:00 + diff --git a/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror-gcb/cors.txt b/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror-gcb/cors.txt new file mode 100644 index 00000000000..a7261dd4e45 --- /dev/null +++ b/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror-gcb/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-mirror-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror-gcb/iam.json b/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror-gcb/iam.json new file mode 100644 index 00000000000..6ca93a66087 --- /dev/null +++ b/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror-gcb/iam.json @@ -0,0 +1,46 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-mirror", + "projectOwner:k8s-staging-mirror" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-mirror" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-mirror@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-mirror@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectCreator" + }, + { + "members": [ + "allUsers", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror-gcb/logging.txt b/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror-gcb/logging.txt new file mode 100644 index 00000000000..5d037986996 --- /dev/null +++ b/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror-gcb/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-mirror-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror/bucketpolicyonly.txt b/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror/bucketpolicyonly.txt new file mode 100644 index 00000000000..b1b2528fed1 --- /dev/null +++ b/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-mirror: + Enabled: True + LockedTime: 2021-02-19 00:11:37.740000+00:00 + diff --git a/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror/cors.txt b/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror/cors.txt new file mode 100644 index 00000000000..96ba9fb3b3f --- /dev/null +++ b/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-mirror/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror/iam.json b/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror/iam.json new file mode 100644 index 00000000000..74caa70de8e --- /dev/null +++ b/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-mirror", + "projectOwner:k8s-staging-mirror" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-mirror" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-mirror@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-mirror@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror/logging.txt b/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror/logging.txt new file mode 100644 index 00000000000..2f6e5ddfaf5 --- /dev/null +++ b/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-mirror/ has no logging configuration. diff --git a/audit/projects/k8s-staging-mirror/description.json b/audit/projects/k8s-staging-mirror/description.json new file mode 100644 index 00000000000..1406b3e3fd8 --- /dev/null +++ b/audit/projects/k8s-staging-mirror/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-11-21T00:03:04.613Z", + "lifecycleState": "ACTIVE", + "name": "k8s-staging-mirror", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-staging-mirror", + "projectNumber": "98327187586" +} diff --git a/audit/projects/k8s-staging-mirror/iam.json b/audit/projects/k8s-staging-mirror/iam.json new file mode 100644 index 00000000000..3db8b2573b5 --- /dev/null +++ b/audit/projects/k8s-staging-mirror/iam.json @@ -0,0 +1,69 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:98327187586@cloudbuild.gserviceaccount.com", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.builds.builder" + }, + { + "members": [ + "group:k8s-infra-staging-mirror@kubernetes.io" + ], + "role": "roles/cloudbuild.builds.editor" + }, + { + "members": [ + "serviceAccount:service-98327187586@gcp-sa-cloudbuild.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-98327187586@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-98327187586@containerregistry.iam.gserviceaccount.com" + ], + "role": "roles/containerregistry.ServiceAgent" + }, + { + "members": [ + "serviceAccount:service-98327187586@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, + { + "members": [ + "user:davanum@gmail.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-staging-mirror@kubernetes.io" + ], + "role": "roles/serviceusage.serviceUsageConsumer" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-release-viewers@kubernetes.io", + "group:k8s-infra-staging-mirror@kubernetes.io" + ], + "role": "roles/viewer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-staging-mirror/services/enabled.txt b/audit/projects/k8s-staging-mirror/services/enabled.txt new file mode 100644 index 00000000000..30cdd842f18 --- /dev/null +++ b/audit/projects/k8s-staging-mirror/services/enabled.txt @@ -0,0 +1,11 @@ +NAME TITLE +cloudbuild.googleapis.com Cloud Build API +cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API +containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API +logging.googleapis.com Cloud Logging API +pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API +storage-api.googleapis.com Google Cloud Storage JSON API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-networking/buckets/artifacts.k8s-staging-networking.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-networking/buckets/artifacts.k8s-staging-networking.appspot.com/bucketpolicyonly.txt new file mode 100644 index 00000000000..41c6a875c90 --- /dev/null +++ b/audit/projects/k8s-staging-networking/buckets/artifacts.k8s-staging-networking.appspot.com/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://artifacts.k8s-staging-networking.appspot.com: + Enabled: True + LockedTime: 2021-01-21 19:24:05.941000+00:00 + diff --git a/audit/projects/k8s-staging-networking/buckets/artifacts.k8s-staging-networking.appspot.com/cors.txt b/audit/projects/k8s-staging-networking/buckets/artifacts.k8s-staging-networking.appspot.com/cors.txt new file mode 100644 index 00000000000..ec14ad0c6dc --- /dev/null +++ b/audit/projects/k8s-staging-networking/buckets/artifacts.k8s-staging-networking.appspot.com/cors.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-networking.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-networking/buckets/artifacts.k8s-staging-networking.appspot.com/iam.json b/audit/projects/k8s-staging-networking/buckets/artifacts.k8s-staging-networking.appspot.com/iam.json new file mode 100644 index 00000000000..b2d7d9a3be6 --- /dev/null +++ b/audit/projects/k8s-staging-networking/buckets/artifacts.k8s-staging-networking.appspot.com/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-networking", + "projectOwner:k8s-staging-networking" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-networking" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-networking@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-networking@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-networking/buckets/artifacts.k8s-staging-networking.appspot.com/logging.txt b/audit/projects/k8s-staging-networking/buckets/artifacts.k8s-staging-networking.appspot.com/logging.txt new file mode 100644 index 00000000000..860963f0c69 --- /dev/null +++ b/audit/projects/k8s-staging-networking/buckets/artifacts.k8s-staging-networking.appspot.com/logging.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-networking.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking-gcb/bucketpolicyonly.txt new file mode 100644 index 00000000000..1f4085813ea --- /dev/null +++ b/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking-gcb/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-networking-gcb: + Enabled: True + LockedTime: 2021-01-21 19:24:49.345000+00:00 + diff --git a/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking-gcb/cors.txt b/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking-gcb/cors.txt new file mode 100644 index 00000000000..cee22cbb043 --- /dev/null +++ b/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking-gcb/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-networking-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking-gcb/iam.json b/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking-gcb/iam.json new file mode 100644 index 00000000000..91e08b99a45 --- /dev/null +++ b/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking-gcb/iam.json @@ -0,0 +1,46 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-networking", + "projectOwner:k8s-staging-networking" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-networking" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-networking@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-networking@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectCreator" + }, + { + "members": [ + "allUsers", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking-gcb/logging.txt b/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking-gcb/logging.txt new file mode 100644 index 00000000000..d1ceeff9c25 --- /dev/null +++ b/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking-gcb/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-networking-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking/bucketpolicyonly.txt b/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking/bucketpolicyonly.txt new file mode 100644 index 00000000000..1495a263bcf --- /dev/null +++ b/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-networking: + Enabled: True + LockedTime: 2021-01-21 19:24:27.541000+00:00 + diff --git a/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking/cors.txt b/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking/cors.txt new file mode 100644 index 00000000000..f5be675bdd6 --- /dev/null +++ b/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-networking/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking/iam.json b/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking/iam.json new file mode 100644 index 00000000000..b2d7d9a3be6 --- /dev/null +++ b/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-networking", + "projectOwner:k8s-staging-networking" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-networking" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-networking@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-networking@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking/logging.txt b/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking/logging.txt new file mode 100644 index 00000000000..161d8d056e8 --- /dev/null +++ b/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-networking/ has no logging configuration. diff --git a/audit/projects/k8s-staging-networking/description.json b/audit/projects/k8s-staging-networking/description.json new file mode 100644 index 00000000000..d6019fb07dc --- /dev/null +++ b/audit/projects/k8s-staging-networking/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-10-23T19:14:43.981Z", + "lifecycleState": "ACTIVE", + "name": "k8s-staging-networking", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-staging-networking", + "projectNumber": "235137276492" +} diff --git a/audit/projects/k8s-staging-networking/iam.json b/audit/projects/k8s-staging-networking/iam.json new file mode 100644 index 00000000000..4ce9c18b4ca --- /dev/null +++ b/audit/projects/k8s-staging-networking/iam.json @@ -0,0 +1,68 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:235137276492@cloudbuild.gserviceaccount.com", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.builds.builder" + }, + { + "members": [ + "group:k8s-infra-staging-networking@kubernetes.io" + ], + "role": "roles/cloudbuild.builds.editor" + }, + { + "members": [ + "serviceAccount:service-235137276492@gcp-sa-cloudbuild.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-235137276492@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-235137276492@containerregistry.iam.gserviceaccount.com" + ], + "role": "roles/containerregistry.ServiceAgent" + }, + { + "members": [ + "serviceAccount:service-235137276492@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, + { + "members": [ + "user:davanum@gmail.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-staging-networking@kubernetes.io" + ], + "role": "roles/serviceusage.serviceUsageConsumer" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-networking@kubernetes.io" + ], + "role": "roles/viewer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-staging-networking/services/enabled.txt b/audit/projects/k8s-staging-networking/services/enabled.txt new file mode 100644 index 00000000000..30cdd842f18 --- /dev/null +++ b/audit/projects/k8s-staging-networking/services/enabled.txt @@ -0,0 +1,11 @@ +NAME TITLE +cloudbuild.googleapis.com Cloud Build API +cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API +containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API +logging.googleapis.com Cloud Logging API +pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API +storage-api.googleapis.com Google Cloud Storage JSON API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-provider-aws/buckets/artifacts.k8s-staging-provider-aws.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-provider-aws/buckets/artifacts.k8s-staging-provider-aws.appspot.com/bucketpolicyonly.txt new file mode 100644 index 00000000000..9b4cfd7e745 --- /dev/null +++ b/audit/projects/k8s-staging-provider-aws/buckets/artifacts.k8s-staging-provider-aws.appspot.com/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://artifacts.k8s-staging-provider-aws.appspot.com: + Enabled: True + LockedTime: 2020-08-24 18:43:13.433000+00:00 + diff --git a/audit/projects/k8s-staging-provider-aws/buckets/artifacts.k8s-staging-provider-aws.appspot.com/cors.txt b/audit/projects/k8s-staging-provider-aws/buckets/artifacts.k8s-staging-provider-aws.appspot.com/cors.txt new file mode 100644 index 00000000000..b1eba90b777 --- /dev/null +++ b/audit/projects/k8s-staging-provider-aws/buckets/artifacts.k8s-staging-provider-aws.appspot.com/cors.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-provider-aws.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-provider-aws/buckets/artifacts.k8s-staging-provider-aws.appspot.com/iam.json b/audit/projects/k8s-staging-provider-aws/buckets/artifacts.k8s-staging-provider-aws.appspot.com/iam.json new file mode 100644 index 00000000000..97fcd141890 --- /dev/null +++ b/audit/projects/k8s-staging-provider-aws/buckets/artifacts.k8s-staging-provider-aws.appspot.com/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-provider-aws", + "projectOwner:k8s-staging-provider-aws" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-provider-aws" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-provider-aws@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-provider-aws@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-provider-aws/buckets/artifacts.k8s-staging-provider-aws.appspot.com/logging.txt b/audit/projects/k8s-staging-provider-aws/buckets/artifacts.k8s-staging-provider-aws.appspot.com/logging.txt new file mode 100644 index 00000000000..b39899b2d18 --- /dev/null +++ b/audit/projects/k8s-staging-provider-aws/buckets/artifacts.k8s-staging-provider-aws.appspot.com/logging.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-provider-aws.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws-gcb/bucketpolicyonly.txt new file mode 100644 index 00000000000..8b9dadd9102 --- /dev/null +++ b/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws-gcb/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-provider-aws-gcb: + Enabled: True + LockedTime: 2020-08-24 18:44:02.525000+00:00 + diff --git a/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws-gcb/cors.txt b/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws-gcb/cors.txt new file mode 100644 index 00000000000..604cb40d5b6 --- /dev/null +++ b/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws-gcb/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-provider-aws-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws-gcb/iam.json b/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws-gcb/iam.json new file mode 100644 index 00000000000..47613fa2c8e --- /dev/null +++ b/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws-gcb/iam.json @@ -0,0 +1,46 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-provider-aws", + "projectOwner:k8s-staging-provider-aws" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-provider-aws" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-provider-aws@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-provider-aws@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectCreator" + }, + { + "members": [ + "allUsers", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws-gcb/logging.txt b/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws-gcb/logging.txt new file mode 100644 index 00000000000..20988f60df5 --- /dev/null +++ b/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws-gcb/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-provider-aws-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws/bucketpolicyonly.txt b/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws/bucketpolicyonly.txt new file mode 100644 index 00000000000..b8b12a48675 --- /dev/null +++ b/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-provider-aws: + Enabled: True + LockedTime: 2020-08-24 18:43:39.623000+00:00 + diff --git a/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws/cors.txt b/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws/cors.txt new file mode 100644 index 00000000000..a1ca23b543c --- /dev/null +++ b/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-provider-aws/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws/iam.json b/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws/iam.json new file mode 100644 index 00000000000..97fcd141890 --- /dev/null +++ b/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-provider-aws", + "projectOwner:k8s-staging-provider-aws" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-provider-aws" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-provider-aws@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-provider-aws@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws/logging.txt b/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws/logging.txt new file mode 100644 index 00000000000..2f6b5676160 --- /dev/null +++ b/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-provider-aws/ has no logging configuration. diff --git a/audit/projects/k8s-staging-provider-aws/description.json b/audit/projects/k8s-staging-provider-aws/description.json new file mode 100644 index 00000000000..5d1e473d430 --- /dev/null +++ b/audit/projects/k8s-staging-provider-aws/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-05-26T18:35:22.593Z", + "lifecycleState": "ACTIVE", + "name": "k8s-staging-provider-aws", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-staging-provider-aws", + "projectNumber": "967205882988" +} diff --git a/audit/projects/k8s-staging-provider-aws/iam.json b/audit/projects/k8s-staging-provider-aws/iam.json new file mode 100644 index 00000000000..614c21cd87e --- /dev/null +++ b/audit/projects/k8s-staging-provider-aws/iam.json @@ -0,0 +1,68 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:967205882988@cloudbuild.gserviceaccount.com", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.builds.builder" + }, + { + "members": [ + "group:k8s-infra-staging-provider-aws@kubernetes.io" + ], + "role": "roles/cloudbuild.builds.editor" + }, + { + "members": [ + "serviceAccount:service-967205882988@gcp-sa-cloudbuild.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-967205882988@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-967205882988@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, + { + "members": [ + "serviceAccount:service-967205882988@containerregistry.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-staging-provider-aws@kubernetes.io" + ], + "role": "roles/serviceusage.serviceUsageConsumer" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-provider-aws@kubernetes.io" + ], + "role": "roles/viewer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-staging-provider-aws/services/enabled.txt b/audit/projects/k8s-staging-provider-aws/services/enabled.txt new file mode 100644 index 00000000000..30cdd842f18 --- /dev/null +++ b/audit/projects/k8s-staging-provider-aws/services/enabled.txt @@ -0,0 +1,11 @@ +NAME TITLE +cloudbuild.googleapis.com Cloud Build API +cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API +containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API +logging.googleapis.com Cloud Logging API +pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API +storage-api.googleapis.com Google Cloud Storage JSON API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-scheduler-plugins/buckets/artifacts.k8s-staging-scheduler-plugins.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-scheduler-plugins/buckets/artifacts.k8s-staging-scheduler-plugins.appspot.com/bucketpolicyonly.txt new file mode 100644 index 00000000000..63fe41432ae --- /dev/null +++ b/audit/projects/k8s-staging-scheduler-plugins/buckets/artifacts.k8s-staging-scheduler-plugins.appspot.com/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://artifacts.k8s-staging-scheduler-plugins.appspot.com: + Enabled: True + LockedTime: 2020-12-09 13:42:05.776000+00:00 + diff --git a/audit/projects/k8s-staging-scheduler-plugins/buckets/artifacts.k8s-staging-scheduler-plugins.appspot.com/cors.txt b/audit/projects/k8s-staging-scheduler-plugins/buckets/artifacts.k8s-staging-scheduler-plugins.appspot.com/cors.txt new file mode 100644 index 00000000000..23475e4f21d --- /dev/null +++ b/audit/projects/k8s-staging-scheduler-plugins/buckets/artifacts.k8s-staging-scheduler-plugins.appspot.com/cors.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-scheduler-plugins.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-scheduler-plugins/buckets/artifacts.k8s-staging-scheduler-plugins.appspot.com/iam.json b/audit/projects/k8s-staging-scheduler-plugins/buckets/artifacts.k8s-staging-scheduler-plugins.appspot.com/iam.json new file mode 100644 index 00000000000..b4a644a9d4d --- /dev/null +++ b/audit/projects/k8s-staging-scheduler-plugins/buckets/artifacts.k8s-staging-scheduler-plugins.appspot.com/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-scheduler-plugins", + "projectOwner:k8s-staging-scheduler-plugins" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-scheduler-plugins" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-scheduler-plugins@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-scheduler-plugins@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-scheduler-plugins/buckets/artifacts.k8s-staging-scheduler-plugins.appspot.com/logging.txt b/audit/projects/k8s-staging-scheduler-plugins/buckets/artifacts.k8s-staging-scheduler-plugins.appspot.com/logging.txt new file mode 100644 index 00000000000..01b5ca6380a --- /dev/null +++ b/audit/projects/k8s-staging-scheduler-plugins/buckets/artifacts.k8s-staging-scheduler-plugins.appspot.com/logging.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-scheduler-plugins.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins-gcb/bucketpolicyonly.txt new file mode 100644 index 00000000000..c3b3aec9f06 --- /dev/null +++ b/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins-gcb/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-scheduler-plugins-gcb: + Enabled: True + LockedTime: 2020-12-09 13:42:45.343000+00:00 + diff --git a/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins-gcb/cors.txt b/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins-gcb/cors.txt new file mode 100644 index 00000000000..25a3ec0c4ec --- /dev/null +++ b/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins-gcb/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-scheduler-plugins-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins-gcb/iam.json b/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins-gcb/iam.json new file mode 100644 index 00000000000..68c2c599244 --- /dev/null +++ b/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins-gcb/iam.json @@ -0,0 +1,46 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-scheduler-plugins", + "projectOwner:k8s-staging-scheduler-plugins" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-scheduler-plugins" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-scheduler-plugins@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-scheduler-plugins@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectCreator" + }, + { + "members": [ + "allUsers", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins-gcb/logging.txt b/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins-gcb/logging.txt new file mode 100644 index 00000000000..7c2ed5e28ee --- /dev/null +++ b/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins-gcb/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-scheduler-plugins-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins/bucketpolicyonly.txt b/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins/bucketpolicyonly.txt new file mode 100644 index 00000000000..9f62c02a36c --- /dev/null +++ b/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-scheduler-plugins: + Enabled: True + LockedTime: 2020-12-09 13:42:25.741000+00:00 + diff --git a/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins/cors.txt b/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins/cors.txt new file mode 100644 index 00000000000..0e1897bffc4 --- /dev/null +++ b/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-scheduler-plugins/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins/iam.json b/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins/iam.json new file mode 100644 index 00000000000..b4a644a9d4d --- /dev/null +++ b/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-scheduler-plugins", + "projectOwner:k8s-staging-scheduler-plugins" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-scheduler-plugins" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-scheduler-plugins@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-scheduler-plugins@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins/logging.txt b/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins/logging.txt new file mode 100644 index 00000000000..b37dd17c638 --- /dev/null +++ b/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-scheduler-plugins/ has no logging configuration. diff --git a/audit/projects/k8s-staging-scheduler-plugins/description.json b/audit/projects/k8s-staging-scheduler-plugins/description.json new file mode 100644 index 00000000000..32660f1ce85 --- /dev/null +++ b/audit/projects/k8s-staging-scheduler-plugins/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-09-10T13:41:08.256Z", + "lifecycleState": "ACTIVE", + "name": "k8s-staging-scheduler-plugins", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-staging-scheduler-plugins", + "projectNumber": "96918712006" +} diff --git a/audit/projects/k8s-staging-scheduler-plugins/iam.json b/audit/projects/k8s-staging-scheduler-plugins/iam.json new file mode 100644 index 00000000000..c716dcce807 --- /dev/null +++ b/audit/projects/k8s-staging-scheduler-plugins/iam.json @@ -0,0 +1,68 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:96918712006@cloudbuild.gserviceaccount.com", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.builds.builder" + }, + { + "members": [ + "group:k8s-infra-staging-scheduler-plugins@kubernetes.io" + ], + "role": "roles/cloudbuild.builds.editor" + }, + { + "members": [ + "serviceAccount:service-96918712006@gcp-sa-cloudbuild.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-96918712006@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-96918712006@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, + { + "members": [ + "serviceAccount:service-96918712006@containerregistry.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:davanum@gmail.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-staging-scheduler-plugins@kubernetes.io" + ], + "role": "roles/serviceusage.serviceUsageConsumer" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-scheduler-plugins@kubernetes.io" + ], + "role": "roles/viewer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-staging-scheduler-plugins/services/enabled.txt b/audit/projects/k8s-staging-scheduler-plugins/services/enabled.txt new file mode 100644 index 00000000000..30cdd842f18 --- /dev/null +++ b/audit/projects/k8s-staging-scheduler-plugins/services/enabled.txt @@ -0,0 +1,11 @@ +NAME TITLE +cloudbuild.googleapis.com Cloud Build API +cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API +containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API +logging.googleapis.com Cloud Logging API +pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API +storage-api.googleapis.com Google Cloud Storage JSON API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-sig-docs/buckets/artifacts.k8s-staging-sig-docs.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-sig-docs/buckets/artifacts.k8s-staging-sig-docs.appspot.com/bucketpolicyonly.txt new file mode 100644 index 00000000000..f45f9ff074a --- /dev/null +++ b/audit/projects/k8s-staging-sig-docs/buckets/artifacts.k8s-staging-sig-docs.appspot.com/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://artifacts.k8s-staging-sig-docs.appspot.com: + Enabled: True + LockedTime: 2021-01-03 17:45:17.069000+00:00 + diff --git a/audit/projects/k8s-staging-sig-docs/buckets/artifacts.k8s-staging-sig-docs.appspot.com/cors.txt b/audit/projects/k8s-staging-sig-docs/buckets/artifacts.k8s-staging-sig-docs.appspot.com/cors.txt new file mode 100644 index 00000000000..e9885d5a0ac --- /dev/null +++ b/audit/projects/k8s-staging-sig-docs/buckets/artifacts.k8s-staging-sig-docs.appspot.com/cors.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-sig-docs.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-sig-docs/buckets/artifacts.k8s-staging-sig-docs.appspot.com/iam.json b/audit/projects/k8s-staging-sig-docs/buckets/artifacts.k8s-staging-sig-docs.appspot.com/iam.json new file mode 100644 index 00000000000..4934ac4c3dd --- /dev/null +++ b/audit/projects/k8s-staging-sig-docs/buckets/artifacts.k8s-staging-sig-docs.appspot.com/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-sig-docs", + "projectOwner:k8s-staging-sig-docs" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-sig-docs" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-sig-docs@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-sig-docs@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-sig-docs/buckets/artifacts.k8s-staging-sig-docs.appspot.com/logging.txt b/audit/projects/k8s-staging-sig-docs/buckets/artifacts.k8s-staging-sig-docs.appspot.com/logging.txt new file mode 100644 index 00000000000..1d2c15d411a --- /dev/null +++ b/audit/projects/k8s-staging-sig-docs/buckets/artifacts.k8s-staging-sig-docs.appspot.com/logging.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-sig-docs.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs-gcb/bucketpolicyonly.txt new file mode 100644 index 00000000000..ee8b32352ee --- /dev/null +++ b/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs-gcb/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-sig-docs-gcb: + Enabled: True + LockedTime: 2021-01-03 17:46:16.352000+00:00 + diff --git a/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs-gcb/cors.txt b/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs-gcb/cors.txt new file mode 100644 index 00000000000..08f95ea4340 --- /dev/null +++ b/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs-gcb/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-sig-docs-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs-gcb/iam.json b/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs-gcb/iam.json new file mode 100644 index 00000000000..aa7a5c0b6a1 --- /dev/null +++ b/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs-gcb/iam.json @@ -0,0 +1,46 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-sig-docs", + "projectOwner:k8s-staging-sig-docs" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-sig-docs" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-sig-docs@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-sig-docs@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectCreator" + }, + { + "members": [ + "allUsers", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs-gcb/logging.txt b/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs-gcb/logging.txt new file mode 100644 index 00000000000..208f0052d14 --- /dev/null +++ b/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs-gcb/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-sig-docs-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs/bucketpolicyonly.txt b/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs/bucketpolicyonly.txt new file mode 100644 index 00000000000..aa87d84a751 --- /dev/null +++ b/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-sig-docs: + Enabled: True + LockedTime: 2021-01-03 17:45:44.048000+00:00 + diff --git a/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs/cors.txt b/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs/cors.txt new file mode 100644 index 00000000000..ba67eccc0a9 --- /dev/null +++ b/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-sig-docs/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs/iam.json b/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs/iam.json new file mode 100644 index 00000000000..4934ac4c3dd --- /dev/null +++ b/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-sig-docs", + "projectOwner:k8s-staging-sig-docs" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-sig-docs" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-sig-docs@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-sig-docs@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs/logging.txt b/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs/logging.txt new file mode 100644 index 00000000000..421e708c9ff --- /dev/null +++ b/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-sig-docs/ has no logging configuration. diff --git a/audit/projects/k8s-staging-sig-docs/description.json b/audit/projects/k8s-staging-sig-docs/description.json new file mode 100644 index 00000000000..a9cefd3ef32 --- /dev/null +++ b/audit/projects/k8s-staging-sig-docs/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-10-05T17:44:22.198Z", + "lifecycleState": "ACTIVE", + "name": "k8s-staging-sig-docs", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-staging-sig-docs", + "projectNumber": "563253410071" +} diff --git a/audit/projects/k8s-staging-sig-docs/iam.json b/audit/projects/k8s-staging-sig-docs/iam.json new file mode 100644 index 00000000000..fd67ba5c6f9 --- /dev/null +++ b/audit/projects/k8s-staging-sig-docs/iam.json @@ -0,0 +1,68 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:563253410071@cloudbuild.gserviceaccount.com", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.builds.builder" + }, + { + "members": [ + "group:k8s-infra-staging-sig-docs@kubernetes.io" + ], + "role": "roles/cloudbuild.builds.editor" + }, + { + "members": [ + "serviceAccount:service-563253410071@gcp-sa-cloudbuild.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-563253410071@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-563253410071@containerregistry.iam.gserviceaccount.com" + ], + "role": "roles/containerregistry.ServiceAgent" + }, + { + "members": [ + "serviceAccount:service-563253410071@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-staging-sig-docs@kubernetes.io" + ], + "role": "roles/serviceusage.serviceUsageConsumer" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-sig-docs@kubernetes.io" + ], + "role": "roles/viewer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-staging-sig-docs/services/enabled.txt b/audit/projects/k8s-staging-sig-docs/services/enabled.txt new file mode 100644 index 00000000000..30cdd842f18 --- /dev/null +++ b/audit/projects/k8s-staging-sig-docs/services/enabled.txt @@ -0,0 +1,11 @@ +NAME TITLE +cloudbuild.googleapis.com Cloud Build API +cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API +containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API +logging.googleapis.com Cloud Logging API +pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API +storage-api.googleapis.com Google Cloud Storage JSON API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-sig-storage/buckets/artifacts.k8s-staging-sig-storage.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-sig-storage/buckets/artifacts.k8s-staging-sig-storage.appspot.com/bucketpolicyonly.txt new file mode 100644 index 00000000000..1fd628cfec2 --- /dev/null +++ b/audit/projects/k8s-staging-sig-storage/buckets/artifacts.k8s-staging-sig-storage.appspot.com/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://artifacts.k8s-staging-sig-storage.appspot.com: + Enabled: True + LockedTime: 2020-09-08 03:17:26.822000+00:00 + diff --git a/audit/projects/k8s-staging-sig-storage/buckets/artifacts.k8s-staging-sig-storage.appspot.com/cors.txt b/audit/projects/k8s-staging-sig-storage/buckets/artifacts.k8s-staging-sig-storage.appspot.com/cors.txt new file mode 100644 index 00000000000..bd6a0dd1103 --- /dev/null +++ b/audit/projects/k8s-staging-sig-storage/buckets/artifacts.k8s-staging-sig-storage.appspot.com/cors.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-sig-storage.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-sig-storage/buckets/artifacts.k8s-staging-sig-storage.appspot.com/iam.json b/audit/projects/k8s-staging-sig-storage/buckets/artifacts.k8s-staging-sig-storage.appspot.com/iam.json new file mode 100644 index 00000000000..9cc2304ff11 --- /dev/null +++ b/audit/projects/k8s-staging-sig-storage/buckets/artifacts.k8s-staging-sig-storage.appspot.com/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-sig-storage", + "projectOwner:k8s-staging-sig-storage" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-sig-storage" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-sig-storage@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-sig-storage@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-sig-storage/buckets/artifacts.k8s-staging-sig-storage.appspot.com/logging.txt b/audit/projects/k8s-staging-sig-storage/buckets/artifacts.k8s-staging-sig-storage.appspot.com/logging.txt new file mode 100644 index 00000000000..4db880fdcfe --- /dev/null +++ b/audit/projects/k8s-staging-sig-storage/buckets/artifacts.k8s-staging-sig-storage.appspot.com/logging.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-sig-storage.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage-gcb/bucketpolicyonly.txt new file mode 100644 index 00000000000..c79259a637e --- /dev/null +++ b/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage-gcb/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-sig-storage-gcb: + Enabled: True + LockedTime: 2020-09-08 03:18:14.421000+00:00 + diff --git a/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage-gcb/cors.txt b/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage-gcb/cors.txt new file mode 100644 index 00000000000..ecb08e38d1e --- /dev/null +++ b/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage-gcb/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-sig-storage-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage-gcb/iam.json b/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage-gcb/iam.json new file mode 100644 index 00000000000..9b45e02849f --- /dev/null +++ b/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage-gcb/iam.json @@ -0,0 +1,46 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-sig-storage", + "projectOwner:k8s-staging-sig-storage" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-sig-storage" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-sig-storage@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-sig-storage@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectCreator" + }, + { + "members": [ + "allUsers", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage-gcb/logging.txt b/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage-gcb/logging.txt new file mode 100644 index 00000000000..61fad7657ed --- /dev/null +++ b/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage-gcb/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-sig-storage-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage/bucketpolicyonly.txt b/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage/bucketpolicyonly.txt new file mode 100644 index 00000000000..b421924a881 --- /dev/null +++ b/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-sig-storage: + Enabled: True + LockedTime: 2020-09-08 03:17:50.721000+00:00 + diff --git a/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage/cors.txt b/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage/cors.txt new file mode 100644 index 00000000000..bd3a0c43237 --- /dev/null +++ b/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-sig-storage/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage/iam.json b/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage/iam.json new file mode 100644 index 00000000000..9cc2304ff11 --- /dev/null +++ b/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-sig-storage", + "projectOwner:k8s-staging-sig-storage" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-sig-storage" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-sig-storage@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-sig-storage@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage/logging.txt b/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage/logging.txt new file mode 100644 index 00000000000..0ff245252fb --- /dev/null +++ b/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-sig-storage/ has no logging configuration. diff --git a/audit/projects/k8s-staging-sig-storage/description.json b/audit/projects/k8s-staging-sig-storage/description.json new file mode 100644 index 00000000000..e2a36580c8b --- /dev/null +++ b/audit/projects/k8s-staging-sig-storage/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-06-10T03:16:33.040Z", + "lifecycleState": "ACTIVE", + "name": "k8s-staging-sig-storage", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-staging-sig-storage", + "projectNumber": "272675062337" +} diff --git a/audit/projects/k8s-staging-sig-storage/iam.json b/audit/projects/k8s-staging-sig-storage/iam.json new file mode 100644 index 00000000000..99e50ff82ad --- /dev/null +++ b/audit/projects/k8s-staging-sig-storage/iam.json @@ -0,0 +1,76 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:272675062337@cloudbuild.gserviceaccount.com", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.builds.builder" + }, + { + "members": [ + "group:k8s-infra-staging-sig-storage@kubernetes.io" + ], + "role": "roles/cloudbuild.builds.editor" + }, + { + "members": [ + "serviceAccount:service-272675062337@gcp-sa-cloudbuild.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-272675062337@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-272675062337@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-272675062337@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, + { + "members": [ + "serviceAccount:272675062337@cloudservices.gserviceaccount.com", + "serviceAccount:service-272675062337@containerregistry.iam.gserviceaccount.com", + "serviceAccount:272675062337-compute@developer.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-staging-sig-storage@kubernetes.io" + ], + "role": "roles/serviceusage.serviceUsageConsumer" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-sig-storage@kubernetes.io" + ], + "role": "roles/viewer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-staging-sig-storage/service-accounts/272675062337-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-staging-sig-storage/service-accounts/272675062337-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..0759c6ff5bc --- /dev/null +++ b/audit/projects/k8s-staging-sig-storage/service-accounts/272675062337-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "272675062337-compute@developer.gserviceaccount.com", + "name": "projects/k8s-staging-sig-storage/serviceAccounts/272675062337-compute@developer.gserviceaccount.com", + "oauth2ClientId": "118011729810398942624", + "projectId": "k8s-staging-sig-storage", + "uniqueId": "118011729810398942624" +} diff --git a/audit/projects/k8s-staging-sig-storage/service-accounts/272675062337-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-staging-sig-storage/service-accounts/272675062337-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-staging-sig-storage/service-accounts/272675062337-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-staging-sig-storage/services/compute/project-info.json b/audit/projects/k8s-staging-sig-storage/services/compute/project-info.json new file mode 100644 index 00000000000..531ebce636e --- /dev/null +++ b/audit/projects/k8s-staging-sig-storage/services/compute/project-info.json @@ -0,0 +1,163 @@ +{ + "commonInstanceMetadata": { + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-12-11T18:11:43.058-08:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "272675062337-compute@developer.gserviceaccount.com", + "id": "7226925129353762865", + "kind": "compute#project", + "name": "k8s-staging-sig-storage", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-staging-sig-storage", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-staging-sig-storage/services/enabled.txt b/audit/projects/k8s-staging-sig-storage/services/enabled.txt new file mode 100644 index 00000000000..661451636fa --- /dev/null +++ b/audit/projects/k8s-staging-sig-storage/services/enabled.txt @@ -0,0 +1,13 @@ +NAME TITLE +cloudbuild.googleapis.com Cloud Build API +cloudkms.googleapis.com Cloud Key Management Service (KMS) API +compute.googleapis.com Compute Engine API +containeranalysis.googleapis.com Container Analysis API +containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API +logging.googleapis.com Cloud Logging API +oslogin.googleapis.com Cloud OS Login API +pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API +storage-api.googleapis.com Google Cloud Storage JSON API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-sp-operator/buckets/artifacts.k8s-staging-sp-operator.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-sp-operator/buckets/artifacts.k8s-staging-sp-operator.appspot.com/bucketpolicyonly.txt new file mode 100644 index 00000000000..2c02420180c --- /dev/null +++ b/audit/projects/k8s-staging-sp-operator/buckets/artifacts.k8s-staging-sp-operator.appspot.com/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://artifacts.k8s-staging-sp-operator.appspot.com: + Enabled: True + LockedTime: 2021-01-12 13:37:56.045000+00:00 + diff --git a/audit/projects/k8s-staging-sp-operator/buckets/artifacts.k8s-staging-sp-operator.appspot.com/cors.txt b/audit/projects/k8s-staging-sp-operator/buckets/artifacts.k8s-staging-sp-operator.appspot.com/cors.txt new file mode 100644 index 00000000000..8442e8f4022 --- /dev/null +++ b/audit/projects/k8s-staging-sp-operator/buckets/artifacts.k8s-staging-sp-operator.appspot.com/cors.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-sp-operator.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-sp-operator/buckets/artifacts.k8s-staging-sp-operator.appspot.com/iam.json b/audit/projects/k8s-staging-sp-operator/buckets/artifacts.k8s-staging-sp-operator.appspot.com/iam.json new file mode 100644 index 00000000000..20e6b1010fa --- /dev/null +++ b/audit/projects/k8s-staging-sp-operator/buckets/artifacts.k8s-staging-sp-operator.appspot.com/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-sp-operator", + "projectOwner:k8s-staging-sp-operator" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-sp-operator" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-sp-operator@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-sp-operator@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-sp-operator/buckets/artifacts.k8s-staging-sp-operator.appspot.com/logging.txt b/audit/projects/k8s-staging-sp-operator/buckets/artifacts.k8s-staging-sp-operator.appspot.com/logging.txt new file mode 100644 index 00000000000..ebc7e485cc1 --- /dev/null +++ b/audit/projects/k8s-staging-sp-operator/buckets/artifacts.k8s-staging-sp-operator.appspot.com/logging.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-sp-operator.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator-gcb/bucketpolicyonly.txt new file mode 100644 index 00000000000..e8dab4e5815 --- /dev/null +++ b/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator-gcb/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-sp-operator-gcb: + Enabled: True + LockedTime: 2021-01-12 13:38:38.040000+00:00 + diff --git a/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator-gcb/cors.txt b/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator-gcb/cors.txt new file mode 100644 index 00000000000..9dc7ee8d45d --- /dev/null +++ b/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator-gcb/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-sp-operator-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator-gcb/iam.json b/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator-gcb/iam.json new file mode 100644 index 00000000000..d7371a077e5 --- /dev/null +++ b/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator-gcb/iam.json @@ -0,0 +1,46 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-sp-operator", + "projectOwner:k8s-staging-sp-operator" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-sp-operator" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-sp-operator@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-sp-operator@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectCreator" + }, + { + "members": [ + "allUsers", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator-gcb/logging.txt b/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator-gcb/logging.txt new file mode 100644 index 00000000000..f5f32054ec2 --- /dev/null +++ b/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator-gcb/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-sp-operator-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator/bucketpolicyonly.txt b/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator/bucketpolicyonly.txt new file mode 100644 index 00000000000..f11cb8984c2 --- /dev/null +++ b/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-sp-operator: + Enabled: True + LockedTime: 2021-01-12 13:38:17.242000+00:00 + diff --git a/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator/cors.txt b/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator/cors.txt new file mode 100644 index 00000000000..afd4a065bbe --- /dev/null +++ b/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-sp-operator/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator/iam.json b/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator/iam.json new file mode 100644 index 00000000000..20e6b1010fa --- /dev/null +++ b/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-sp-operator", + "projectOwner:k8s-staging-sp-operator" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-sp-operator" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-sp-operator@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-sp-operator@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator/logging.txt b/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator/logging.txt new file mode 100644 index 00000000000..57630f112f0 --- /dev/null +++ b/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-sp-operator/ has no logging configuration. diff --git a/audit/projects/k8s-staging-sp-operator/description.json b/audit/projects/k8s-staging-sp-operator/description.json new file mode 100644 index 00000000000..5283210da46 --- /dev/null +++ b/audit/projects/k8s-staging-sp-operator/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-10-14T13:18:07.896Z", + "lifecycleState": "ACTIVE", + "name": "k8s-staging-sp-operator", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-staging-sp-operator", + "projectNumber": "448637284062" +} diff --git a/audit/projects/k8s-staging-sp-operator/iam.json b/audit/projects/k8s-staging-sp-operator/iam.json new file mode 100644 index 00000000000..5b966c2d595 --- /dev/null +++ b/audit/projects/k8s-staging-sp-operator/iam.json @@ -0,0 +1,68 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:448637284062@cloudbuild.gserviceaccount.com", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.builds.builder" + }, + { + "members": [ + "group:k8s-infra-staging-sp-operator@kubernetes.io" + ], + "role": "roles/cloudbuild.builds.editor" + }, + { + "members": [ + "serviceAccount:service-448637284062@gcp-sa-cloudbuild.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-448637284062@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-448637284062@containerregistry.iam.gserviceaccount.com" + ], + "role": "roles/containerregistry.ServiceAgent" + }, + { + "members": [ + "serviceAccount:service-448637284062@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, + { + "members": [ + "user:davanum@gmail.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-staging-sp-operator@kubernetes.io" + ], + "role": "roles/serviceusage.serviceUsageConsumer" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-sp-operator@kubernetes.io" + ], + "role": "roles/viewer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-staging-sp-operator/services/enabled.txt b/audit/projects/k8s-staging-sp-operator/services/enabled.txt new file mode 100644 index 00000000000..30cdd842f18 --- /dev/null +++ b/audit/projects/k8s-staging-sp-operator/services/enabled.txt @@ -0,0 +1,11 @@ +NAME TITLE +cloudbuild.googleapis.com Cloud Build API +cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API +containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API +logging.googleapis.com Cloud Logging API +pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API +storage-api.googleapis.com Google Cloud Storage JSON API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-storage-migrator/buckets/artifacts.k8s-staging-storage-migrator.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-storage-migrator/buckets/artifacts.k8s-staging-storage-migrator.appspot.com/bucketpolicyonly.txt new file mode 100644 index 00000000000..1bfd38a5917 --- /dev/null +++ b/audit/projects/k8s-staging-storage-migrator/buckets/artifacts.k8s-staging-storage-migrator.appspot.com/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://artifacts.k8s-staging-storage-migrator.appspot.com: + Enabled: True + LockedTime: 2020-12-09 13:43:24.042000+00:00 + diff --git a/audit/projects/k8s-staging-storage-migrator/buckets/artifacts.k8s-staging-storage-migrator.appspot.com/cors.txt b/audit/projects/k8s-staging-storage-migrator/buckets/artifacts.k8s-staging-storage-migrator.appspot.com/cors.txt new file mode 100644 index 00000000000..6d8f29cbb4f --- /dev/null +++ b/audit/projects/k8s-staging-storage-migrator/buckets/artifacts.k8s-staging-storage-migrator.appspot.com/cors.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-storage-migrator.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-storage-migrator/buckets/artifacts.k8s-staging-storage-migrator.appspot.com/iam.json b/audit/projects/k8s-staging-storage-migrator/buckets/artifacts.k8s-staging-storage-migrator.appspot.com/iam.json new file mode 100644 index 00000000000..651c461ae33 --- /dev/null +++ b/audit/projects/k8s-staging-storage-migrator/buckets/artifacts.k8s-staging-storage-migrator.appspot.com/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-storage-migrator", + "projectOwner:k8s-staging-storage-migrator" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-storage-migrator" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-storage-migrator@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-storage-migrator@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-storage-migrator/buckets/artifacts.k8s-staging-storage-migrator.appspot.com/logging.txt b/audit/projects/k8s-staging-storage-migrator/buckets/artifacts.k8s-staging-storage-migrator.appspot.com/logging.txt new file mode 100644 index 00000000000..c17c9e0ea66 --- /dev/null +++ b/audit/projects/k8s-staging-storage-migrator/buckets/artifacts.k8s-staging-storage-migrator.appspot.com/logging.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-staging-storage-migrator.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator-gcb/bucketpolicyonly.txt new file mode 100644 index 00000000000..d626fad0e39 --- /dev/null +++ b/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator-gcb/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-storage-migrator-gcb: + Enabled: True + LockedTime: 2020-12-09 13:44:03.242000+00:00 + diff --git a/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator-gcb/cors.txt b/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator-gcb/cors.txt new file mode 100644 index 00000000000..ac0649686e9 --- /dev/null +++ b/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator-gcb/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-storage-migrator-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator-gcb/iam.json b/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator-gcb/iam.json new file mode 100644 index 00000000000..9de62f480c2 --- /dev/null +++ b/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator-gcb/iam.json @@ -0,0 +1,46 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-storage-migrator", + "projectOwner:k8s-staging-storage-migrator" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-storage-migrator" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-storage-migrator@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-storage-migrator@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectCreator" + }, + { + "members": [ + "allUsers", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator-gcb/logging.txt b/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator-gcb/logging.txt new file mode 100644 index 00000000000..c2ee846d8a3 --- /dev/null +++ b/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator-gcb/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-storage-migrator-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator/bucketpolicyonly.txt b/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator/bucketpolicyonly.txt new file mode 100644 index 00000000000..cb17acf4e1f --- /dev/null +++ b/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-staging-storage-migrator: + Enabled: True + LockedTime: 2020-12-09 13:43:44.043000+00:00 + diff --git a/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator/cors.txt b/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator/cors.txt new file mode 100644 index 00000000000..431ccdd666c --- /dev/null +++ b/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator/cors.txt @@ -0,0 +1 @@ +gs://k8s-staging-storage-migrator/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator/iam.json b/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator/iam.json new file mode 100644 index 00000000000..651c461ae33 --- /dev/null +++ b/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-staging-storage-migrator", + "projectOwner:k8s-staging-storage-migrator" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-staging-storage-migrator" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-staging-storage-migrator@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-storage-migrator@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator/logging.txt b/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator/logging.txt new file mode 100644 index 00000000000..b195199781f --- /dev/null +++ b/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator/logging.txt @@ -0,0 +1 @@ +gs://k8s-staging-storage-migrator/ has no logging configuration. diff --git a/audit/projects/k8s-staging-storage-migrator/description.json b/audit/projects/k8s-staging-storage-migrator/description.json new file mode 100644 index 00000000000..db3a1ca4116 --- /dev/null +++ b/audit/projects/k8s-staging-storage-migrator/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-09-10T13:32:03.114Z", + "lifecycleState": "ACTIVE", + "name": "k8s-staging-storage-migrator", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-staging-storage-migrator", + "projectNumber": "687417645981" +} diff --git a/audit/projects/k8s-staging-storage-migrator/iam.json b/audit/projects/k8s-staging-storage-migrator/iam.json new file mode 100644 index 00000000000..27532142d13 --- /dev/null +++ b/audit/projects/k8s-staging-storage-migrator/iam.json @@ -0,0 +1,68 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:687417645981@cloudbuild.gserviceaccount.com", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.builds.builder" + }, + { + "members": [ + "group:k8s-infra-staging-storage-migrator@kubernetes.io" + ], + "role": "roles/cloudbuild.builds.editor" + }, + { + "members": [ + "serviceAccount:service-687417645981@gcp-sa-cloudbuild.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-687417645981@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-687417645981@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, + { + "members": [ + "serviceAccount:service-687417645981@containerregistry.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:davanum@gmail.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-staging-storage-migrator@kubernetes.io" + ], + "role": "roles/serviceusage.serviceUsageConsumer" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-storage-migrator@kubernetes.io" + ], + "role": "roles/viewer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-staging-storage-migrator/services/enabled.txt b/audit/projects/k8s-staging-storage-migrator/services/enabled.txt new file mode 100644 index 00000000000..30cdd842f18 --- /dev/null +++ b/audit/projects/k8s-staging-storage-migrator/services/enabled.txt @@ -0,0 +1,11 @@ +NAME TITLE +cloudbuild.googleapis.com Cloud Build API +cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API +containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API +logging.googleapis.com Cloud Logging API +pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API +storage-api.googleapis.com Google Cloud Storage JSON API +storage-component.googleapis.com Cloud Storage From 1ff4c2132d45c74c51d25fc8fd788a3b38221d1f Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Thu, 14 Jan 2021 17:17:46 -0500 Subject: [PATCH 18/39] audit: k8s-staging-* service enables specifically - enable containeranalysis - enable containerscanning - enable secretmanager - give k8s-infra-gcr-vuln-scanning SA containeranalysis viewer role --- audit/projects/k8s-staging-apisnoop/iam.json | 18 +++++ .../k8s-staging-apisnoop/services/enabled.txt | 3 + .../projects/k8s-staging-autoscaling/iam.json | 18 +++++ .../services/enabled.txt | 3 + .../projects/k8s-staging-build-image/iam.json | 18 +++++ .../services/enabled.txt | 3 + .../k8s-staging-capi-kubeadm/iam.json | 18 +++++ .../services/enabled.txt | 3 + .../k8s-staging-capi-openstack/iam.json | 18 +++++ .../services/compute/project-info.json | 72 +++++++++++-------- .../services/enabled.txt | 3 + .../k8s-staging-capi-vsphere/iam.json | 18 +++++ .../services/enabled.txt | 3 + audit/projects/k8s-staging-cip-test/iam.json | 12 ++++ .../services/compute/project-info.json | 72 +++++++++++-------- .../k8s-staging-cip-test/services/enabled.txt | 2 + .../k8s-staging-cluster-api-aws/iam.json | 18 +++++ .../services/compute/project-info.json | 72 +++++++++++-------- .../services/enabled.txt | 3 + .../k8s-staging-cluster-api-azure/iam.json | 18 +++++ .../services/enabled.txt | 3 + .../k8s-staging-cluster-api-do/iam.json | 18 +++++ .../services/enabled.txt | 3 + .../k8s-staging-cluster-api-gcp/iam.json | 18 +++++ .../services/enabled.txt | 3 + .../projects/k8s-staging-cluster-api/iam.json | 18 +++++ .../services/compute/project-info.json | 72 +++++++++++-------- .../services/enabled.txt | 3 + audit/projects/k8s-staging-coredns/iam.json | 6 ++ .../services/compute/project-info.json | 72 +++++++++++-------- .../k8s-staging-coredns/services/enabled.txt | 1 + audit/projects/k8s-staging-cpa/iam.json | 18 +++++ .../k8s-staging-cpa/services/enabled.txt | 3 + .../k8s-staging-csi-secrets-store/iam.json | 18 +++++ .../services/enabled.txt | 3 + .../projects/k8s-staging-descheduler/iam.json | 18 +++++ .../services/enabled.txt | 3 + audit/projects/k8s-staging-dns/iam.json | 18 +++++ .../k8s-staging-dns/services/enabled.txt | 3 + audit/projects/k8s-staging-etcd/iam.json | 18 +++++ .../k8s-staging-etcd/services/enabled.txt | 3 + .../k8s-staging-external-dns/iam.json | 18 +++++ .../services/enabled.txt | 3 + .../projects/k8s-staging-infra-tools/iam.json | 18 +++++ .../services/enabled.txt | 3 + .../k8s-staging-kas-network-proxy/iam.json | 18 +++++ .../services/enabled.txt | 3 + audit/projects/k8s-staging-kind/iam.json | 18 +++++ .../k8s-staging-kind/services/enabled.txt | 3 + audit/projects/k8s-staging-kops/iam.json | 18 +++++ .../k8s-staging-kops/services/enabled.txt | 3 + .../k8s-staging-kube-state-metrics/iam.json | 18 +++++ .../services/enabled.txt | 3 + audit/projects/k8s-staging-kubeadm/iam.json | 18 +++++ .../k8s-staging-kubeadm/services/enabled.txt | 3 + .../iam.json | 6 +- .../projects/k8s-staging-kubernetes/iam.json | 18 +++++ .../services/enabled.txt | 3 + .../k8s-staging-metrics-server/iam.json | 18 +++++ .../services/enabled.txt | 3 + .../k8s-staging-multitenancy/iam.json | 18 +++++ .../services/enabled.txt | 3 + audit/projects/k8s-staging-nfd/iam.json | 18 +++++ .../k8s-staging-nfd/services/enabled.txt | 3 + audit/projects/k8s-staging-npd/iam.json | 18 +++++ .../k8s-staging-npd/services/enabled.txt | 3 + .../k8s-staging-provider-azure/iam.json | 18 +++++ .../services/enabled.txt | 3 + .../k8s-staging-publishing-bot/iam.json | 18 +++++ .../services/enabled.txt | 3 + audit/projects/k8s-staging-releng/iam.json | 18 +++++ .../k8s-staging-releng/services/enabled.txt | 3 + .../k8s-staging-scl-image-builder/iam.json | 18 +++++ .../services/enabled.txt | 3 + .../k8s-staging-service-apis/iam.json | 18 +++++ .../services/enabled.txt | 3 + .../projects/k8s-staging-slack-infra/iam.json | 18 +++++ .../services/enabled.txt | 3 + audit/projects/k8s-staging-txtdirect/iam.json | 18 +++++ .../services/enabled.txt | 3 + 80 files changed, 970 insertions(+), 152 deletions(-) diff --git a/audit/projects/k8s-staging-apisnoop/iam.json b/audit/projects/k8s-staging-apisnoop/iam.json index d20466d570d..63a99f51e03 100644 --- a/audit/projects/k8s-staging-apisnoop/iam.json +++ b/audit/projects/k8s-staging-apisnoop/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-782271650518@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-782271650518@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-782271650518@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-apisnoop/services/enabled.txt b/audit/projects/k8s-staging-apisnoop/services/enabled.txt index 36a6900078a..30cdd842f18 100644 --- a/audit/projects/k8s-staging-apisnoop/services/enabled.txt +++ b/audit/projects/k8s-staging-apisnoop/services/enabled.txt @@ -1,8 +1,11 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-autoscaling/iam.json b/audit/projects/k8s-staging-autoscaling/iam.json index 125f773fb4b..cacc23a9bc5 100644 --- a/audit/projects/k8s-staging-autoscaling/iam.json +++ b/audit/projects/k8s-staging-autoscaling/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-371644685964@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-371644685964@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-371644685964@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-autoscaling/services/enabled.txt b/audit/projects/k8s-staging-autoscaling/services/enabled.txt index 36a6900078a..30cdd842f18 100644 --- a/audit/projects/k8s-staging-autoscaling/services/enabled.txt +++ b/audit/projects/k8s-staging-autoscaling/services/enabled.txt @@ -1,8 +1,11 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-build-image/iam.json b/audit/projects/k8s-staging-build-image/iam.json index 0c5f014c3c6..5b242c2f45b 100644 --- a/audit/projects/k8s-staging-build-image/iam.json +++ b/audit/projects/k8s-staging-build-image/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-960211007710@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-960211007710@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-960211007710@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-build-image/services/enabled.txt b/audit/projects/k8s-staging-build-image/services/enabled.txt index 36a6900078a..30cdd842f18 100644 --- a/audit/projects/k8s-staging-build-image/services/enabled.txt +++ b/audit/projects/k8s-staging-build-image/services/enabled.txt @@ -1,8 +1,11 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-capi-kubeadm/iam.json b/audit/projects/k8s-staging-capi-kubeadm/iam.json index fd1a2e5a2fd..00379dcb600 100644 --- a/audit/projects/k8s-staging-capi-kubeadm/iam.json +++ b/audit/projects/k8s-staging-capi-kubeadm/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-778608689920@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-778608689920@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-778608689920@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-capi-kubeadm/services/enabled.txt b/audit/projects/k8s-staging-capi-kubeadm/services/enabled.txt index 36a6900078a..30cdd842f18 100644 --- a/audit/projects/k8s-staging-capi-kubeadm/services/enabled.txt +++ b/audit/projects/k8s-staging-capi-kubeadm/services/enabled.txt @@ -1,8 +1,11 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-capi-openstack/iam.json b/audit/projects/k8s-staging-capi-openstack/iam.json index 0bec1d7cb8b..d8d733608fc 100644 --- a/audit/projects/k8s-staging-capi-openstack/iam.json +++ b/audit/projects/k8s-staging-capi-openstack/iam.json @@ -26,6 +26,24 @@ ], "role": "roles/compute.serviceAgent" }, + { + "members": [ + "serviceAccount:service-129051311436@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-129051311436@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:129051311436-compute@developer.gserviceaccount.com", diff --git a/audit/projects/k8s-staging-capi-openstack/services/compute/project-info.json b/audit/projects/k8s-staging-capi-openstack/services/compute/project-info.json index b05cd432178..4185e704a15 100644 --- a/audit/projects/k8s-staging-capi-openstack/services/compute/project-info.json +++ b/audit/projects/k8s-staging-capi-openstack/services/compute/project-info.json @@ -10,99 +10,99 @@ "name": "k8s-staging-capi-openstack", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -110,15 +110,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -130,11 +130,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -142,8 +142,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-staging-capi-openstack", diff --git a/audit/projects/k8s-staging-capi-openstack/services/enabled.txt b/audit/projects/k8s-staging-capi-openstack/services/enabled.txt index b3fa5c67bc9..661451636fa 100644 --- a/audit/projects/k8s-staging-capi-openstack/services/enabled.txt +++ b/audit/projects/k8s-staging-capi-openstack/services/enabled.txt @@ -2,9 +2,12 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API compute.googleapis.com Compute Engine API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API oslogin.googleapis.com Cloud OS Login API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-capi-vsphere/iam.json b/audit/projects/k8s-staging-capi-vsphere/iam.json index 1c97f40e804..023846f2be6 100644 --- a/audit/projects/k8s-staging-capi-vsphere/iam.json +++ b/audit/projects/k8s-staging-capi-vsphere/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-459565607671@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-459565607671@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-459565607671@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-capi-vsphere/services/enabled.txt b/audit/projects/k8s-staging-capi-vsphere/services/enabled.txt index 36a6900078a..30cdd842f18 100644 --- a/audit/projects/k8s-staging-capi-vsphere/services/enabled.txt +++ b/audit/projects/k8s-staging-capi-vsphere/services/enabled.txt @@ -1,8 +1,11 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-cip-test/iam.json b/audit/projects/k8s-staging-cip-test/iam.json index ac57338937f..de1fef665ea 100644 --- a/audit/projects/k8s-staging-cip-test/iam.json +++ b/audit/projects/k8s-staging-cip-test/iam.json @@ -32,6 +32,18 @@ ], "role": "roles/containeranalysis.ServiceAgent" }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-324460563566@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:324460563566-compute@developer.gserviceaccount.com", diff --git a/audit/projects/k8s-staging-cip-test/services/compute/project-info.json b/audit/projects/k8s-staging-cip-test/services/compute/project-info.json index a9c99a8f72e..ef43b3518e7 100644 --- a/audit/projects/k8s-staging-cip-test/services/compute/project-info.json +++ b/audit/projects/k8s-staging-cip-test/services/compute/project-info.json @@ -10,99 +10,99 @@ "name": "k8s-staging-cip-test", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -110,15 +110,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -130,11 +130,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -142,8 +142,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-staging-cip-test", diff --git a/audit/projects/k8s-staging-cip-test/services/enabled.txt b/audit/projects/k8s-staging-cip-test/services/enabled.txt index 0067f42fe66..8feac853adf 100644 --- a/audit/projects/k8s-staging-cip-test/services/enabled.txt +++ b/audit/projects/k8s-staging-cip-test/services/enabled.txt @@ -10,11 +10,13 @@ cloudtrace.googleapis.com Cloud Trace API compute.googleapis.com Compute Engine API containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API datastore.googleapis.com Cloud Datastore API logging.googleapis.com Cloud Logging API monitoring.googleapis.com Cloud Monitoring API oslogin.googleapis.com Cloud OS Login API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API servicemanagement.googleapis.com Service Management API serviceusage.googleapis.com Service Usage API sql-component.googleapis.com Cloud SQL diff --git a/audit/projects/k8s-staging-cluster-api-aws/iam.json b/audit/projects/k8s-staging-cluster-api-aws/iam.json index c64787c9967..ee0b51c0233 100644 --- a/audit/projects/k8s-staging-cluster-api-aws/iam.json +++ b/audit/projects/k8s-staging-cluster-api-aws/iam.json @@ -26,6 +26,24 @@ ], "role": "roles/compute.serviceAgent" }, + { + "members": [ + "serviceAccount:service-433651898792@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-433651898792@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:433651898792-compute@developer.gserviceaccount.com", diff --git a/audit/projects/k8s-staging-cluster-api-aws/services/compute/project-info.json b/audit/projects/k8s-staging-cluster-api-aws/services/compute/project-info.json index 498c14ab7af..582005316ac 100644 --- a/audit/projects/k8s-staging-cluster-api-aws/services/compute/project-info.json +++ b/audit/projects/k8s-staging-cluster-api-aws/services/compute/project-info.json @@ -10,99 +10,99 @@ "name": "k8s-staging-cluster-api-aws", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -110,15 +110,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -130,11 +130,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -142,8 +142,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-staging-cluster-api-aws", diff --git a/audit/projects/k8s-staging-cluster-api-aws/services/enabled.txt b/audit/projects/k8s-staging-cluster-api-aws/services/enabled.txt index b3fa5c67bc9..661451636fa 100644 --- a/audit/projects/k8s-staging-cluster-api-aws/services/enabled.txt +++ b/audit/projects/k8s-staging-cluster-api-aws/services/enabled.txt @@ -2,9 +2,12 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API compute.googleapis.com Compute Engine API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API oslogin.googleapis.com Cloud OS Login API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-cluster-api-azure/iam.json b/audit/projects/k8s-staging-cluster-api-azure/iam.json index 85198d483ad..81fe953b330 100644 --- a/audit/projects/k8s-staging-cluster-api-azure/iam.json +++ b/audit/projects/k8s-staging-cluster-api-azure/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-1087109869165@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-1087109869165@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-1087109869165@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-cluster-api-azure/services/enabled.txt b/audit/projects/k8s-staging-cluster-api-azure/services/enabled.txt index 36a6900078a..30cdd842f18 100644 --- a/audit/projects/k8s-staging-cluster-api-azure/services/enabled.txt +++ b/audit/projects/k8s-staging-cluster-api-azure/services/enabled.txt @@ -1,8 +1,11 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-cluster-api-do/iam.json b/audit/projects/k8s-staging-cluster-api-do/iam.json index d12a71b2921..348d16cbd36 100644 --- a/audit/projects/k8s-staging-cluster-api-do/iam.json +++ b/audit/projects/k8s-staging-cluster-api-do/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-226017735054@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-226017735054@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-226017735054@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-cluster-api-do/services/enabled.txt b/audit/projects/k8s-staging-cluster-api-do/services/enabled.txt index 36a6900078a..30cdd842f18 100644 --- a/audit/projects/k8s-staging-cluster-api-do/services/enabled.txt +++ b/audit/projects/k8s-staging-cluster-api-do/services/enabled.txt @@ -1,8 +1,11 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-cluster-api-gcp/iam.json b/audit/projects/k8s-staging-cluster-api-gcp/iam.json index d716ec4f77b..4eb3bfe64b6 100644 --- a/audit/projects/k8s-staging-cluster-api-gcp/iam.json +++ b/audit/projects/k8s-staging-cluster-api-gcp/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-606075400249@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-606075400249@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-606075400249@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-cluster-api-gcp/services/enabled.txt b/audit/projects/k8s-staging-cluster-api-gcp/services/enabled.txt index 36a6900078a..30cdd842f18 100644 --- a/audit/projects/k8s-staging-cluster-api-gcp/services/enabled.txt +++ b/audit/projects/k8s-staging-cluster-api-gcp/services/enabled.txt @@ -1,8 +1,11 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-cluster-api/iam.json b/audit/projects/k8s-staging-cluster-api/iam.json index 3e6a28d86e7..c34cafcd494 100644 --- a/audit/projects/k8s-staging-cluster-api/iam.json +++ b/audit/projects/k8s-staging-cluster-api/iam.json @@ -26,6 +26,24 @@ ], "role": "roles/compute.serviceAgent" }, + { + "members": [ + "serviceAccount:service-190130481896@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-190130481896@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:190130481896-compute@developer.gserviceaccount.com", diff --git a/audit/projects/k8s-staging-cluster-api/services/compute/project-info.json b/audit/projects/k8s-staging-cluster-api/services/compute/project-info.json index f51a95b0bb5..260908d703c 100644 --- a/audit/projects/k8s-staging-cluster-api/services/compute/project-info.json +++ b/audit/projects/k8s-staging-cluster-api/services/compute/project-info.json @@ -10,99 +10,99 @@ "name": "k8s-staging-cluster-api", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -110,15 +110,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -130,11 +130,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -142,8 +142,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-staging-cluster-api", diff --git a/audit/projects/k8s-staging-cluster-api/services/enabled.txt b/audit/projects/k8s-staging-cluster-api/services/enabled.txt index 28ae873bc03..8feac853adf 100644 --- a/audit/projects/k8s-staging-cluster-api/services/enabled.txt +++ b/audit/projects/k8s-staging-cluster-api/services/enabled.txt @@ -8,12 +8,15 @@ clouddebugger.googleapis.com Cloud Debugger API cloudkms.googleapis.com Cloud Key Management Service (KMS) API cloudtrace.googleapis.com Cloud Trace API compute.googleapis.com Compute Engine API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API datastore.googleapis.com Cloud Datastore API logging.googleapis.com Cloud Logging API monitoring.googleapis.com Cloud Monitoring API oslogin.googleapis.com Cloud OS Login API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API servicemanagement.googleapis.com Service Management API serviceusage.googleapis.com Service Usage API sql-component.googleapis.com Cloud SQL diff --git a/audit/projects/k8s-staging-coredns/iam.json b/audit/projects/k8s-staging-coredns/iam.json index 84e8af15f66..3edd75be767 100644 --- a/audit/projects/k8s-staging-coredns/iam.json +++ b/audit/projects/k8s-staging-coredns/iam.json @@ -32,6 +32,12 @@ ], "role": "roles/containeranalysis.ServiceAgent" }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, { "members": [ "serviceAccount:service-848617618266@gcp-sa-containerscanning.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-coredns/services/compute/project-info.json b/audit/projects/k8s-staging-coredns/services/compute/project-info.json index 4cbec8e605d..fb615ff8775 100644 --- a/audit/projects/k8s-staging-coredns/services/compute/project-info.json +++ b/audit/projects/k8s-staging-coredns/services/compute/project-info.json @@ -10,99 +10,99 @@ "name": "k8s-staging-coredns", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -110,15 +110,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -130,11 +130,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -142,8 +142,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-staging-coredns", diff --git a/audit/projects/k8s-staging-coredns/services/enabled.txt b/audit/projects/k8s-staging-coredns/services/enabled.txt index e5c74221489..8feac853adf 100644 --- a/audit/projects/k8s-staging-coredns/services/enabled.txt +++ b/audit/projects/k8s-staging-coredns/services/enabled.txt @@ -16,6 +16,7 @@ logging.googleapis.com Cloud Logging API monitoring.googleapis.com Cloud Monitoring API oslogin.googleapis.com Cloud OS Login API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API servicemanagement.googleapis.com Service Management API serviceusage.googleapis.com Service Usage API sql-component.googleapis.com Cloud SQL diff --git a/audit/projects/k8s-staging-cpa/iam.json b/audit/projects/k8s-staging-cpa/iam.json index 5464b227348..2a2e8cc5548 100644 --- a/audit/projects/k8s-staging-cpa/iam.json +++ b/audit/projects/k8s-staging-cpa/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-644315828680@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-644315828680@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-644315828680@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-cpa/services/enabled.txt b/audit/projects/k8s-staging-cpa/services/enabled.txt index 36a6900078a..30cdd842f18 100644 --- a/audit/projects/k8s-staging-cpa/services/enabled.txt +++ b/audit/projects/k8s-staging-cpa/services/enabled.txt @@ -1,8 +1,11 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-csi-secrets-store/iam.json b/audit/projects/k8s-staging-csi-secrets-store/iam.json index b8d26841635..2c946ed21cc 100644 --- a/audit/projects/k8s-staging-csi-secrets-store/iam.json +++ b/audit/projects/k8s-staging-csi-secrets-store/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-766197520365@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-766197520365@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-766197520365@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-csi-secrets-store/services/enabled.txt b/audit/projects/k8s-staging-csi-secrets-store/services/enabled.txt index 36a6900078a..30cdd842f18 100644 --- a/audit/projects/k8s-staging-csi-secrets-store/services/enabled.txt +++ b/audit/projects/k8s-staging-csi-secrets-store/services/enabled.txt @@ -1,8 +1,11 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-descheduler/iam.json b/audit/projects/k8s-staging-descheduler/iam.json index c65e279eced..9860c6e479b 100644 --- a/audit/projects/k8s-staging-descheduler/iam.json +++ b/audit/projects/k8s-staging-descheduler/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-1009880777024@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-1009880777024@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-1009880777024@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-descheduler/services/enabled.txt b/audit/projects/k8s-staging-descheduler/services/enabled.txt index 36a6900078a..30cdd842f18 100644 --- a/audit/projects/k8s-staging-descheduler/services/enabled.txt +++ b/audit/projects/k8s-staging-descheduler/services/enabled.txt @@ -1,8 +1,11 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-dns/iam.json b/audit/projects/k8s-staging-dns/iam.json index 98c55c6f14e..d1eb5a5a295 100644 --- a/audit/projects/k8s-staging-dns/iam.json +++ b/audit/projects/k8s-staging-dns/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-558098336346@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-558098336346@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-558098336346@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-dns/services/enabled.txt b/audit/projects/k8s-staging-dns/services/enabled.txt index 36a6900078a..30cdd842f18 100644 --- a/audit/projects/k8s-staging-dns/services/enabled.txt +++ b/audit/projects/k8s-staging-dns/services/enabled.txt @@ -1,8 +1,11 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-etcd/iam.json b/audit/projects/k8s-staging-etcd/iam.json index 0d0c51bd4e2..55d9e45629c 100644 --- a/audit/projects/k8s-staging-etcd/iam.json +++ b/audit/projects/k8s-staging-etcd/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-329483391043@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-329483391043@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-329483391043@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-etcd/services/enabled.txt b/audit/projects/k8s-staging-etcd/services/enabled.txt index 36a6900078a..30cdd842f18 100644 --- a/audit/projects/k8s-staging-etcd/services/enabled.txt +++ b/audit/projects/k8s-staging-etcd/services/enabled.txt @@ -1,8 +1,11 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-external-dns/iam.json b/audit/projects/k8s-staging-external-dns/iam.json index f48667f56cd..66fc2e22c14 100644 --- a/audit/projects/k8s-staging-external-dns/iam.json +++ b/audit/projects/k8s-staging-external-dns/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-548739681389@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-548739681389@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-548739681389@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-external-dns/services/enabled.txt b/audit/projects/k8s-staging-external-dns/services/enabled.txt index 36a6900078a..30cdd842f18 100644 --- a/audit/projects/k8s-staging-external-dns/services/enabled.txt +++ b/audit/projects/k8s-staging-external-dns/services/enabled.txt @@ -1,8 +1,11 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-infra-tools/iam.json b/audit/projects/k8s-staging-infra-tools/iam.json index 11fcb58ceb5..814c638d133 100644 --- a/audit/projects/k8s-staging-infra-tools/iam.json +++ b/audit/projects/k8s-staging-infra-tools/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-1017132094926@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-1017132094926@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-1017132094926@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-infra-tools/services/enabled.txt b/audit/projects/k8s-staging-infra-tools/services/enabled.txt index 36a6900078a..30cdd842f18 100644 --- a/audit/projects/k8s-staging-infra-tools/services/enabled.txt +++ b/audit/projects/k8s-staging-infra-tools/services/enabled.txt @@ -1,8 +1,11 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-kas-network-proxy/iam.json b/audit/projects/k8s-staging-kas-network-proxy/iam.json index e778f5081a8..2e8c6549dc6 100644 --- a/audit/projects/k8s-staging-kas-network-proxy/iam.json +++ b/audit/projects/k8s-staging-kas-network-proxy/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-670598002495@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-670598002495@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-670598002495@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-kas-network-proxy/services/enabled.txt b/audit/projects/k8s-staging-kas-network-proxy/services/enabled.txt index 36a6900078a..30cdd842f18 100644 --- a/audit/projects/k8s-staging-kas-network-proxy/services/enabled.txt +++ b/audit/projects/k8s-staging-kas-network-proxy/services/enabled.txt @@ -1,8 +1,11 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-kind/iam.json b/audit/projects/k8s-staging-kind/iam.json index 29e43070454..bc341d60da3 100644 --- a/audit/projects/k8s-staging-kind/iam.json +++ b/audit/projects/k8s-staging-kind/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-220811308229@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-220811308229@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-220811308229@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-kind/services/enabled.txt b/audit/projects/k8s-staging-kind/services/enabled.txt index 36a6900078a..30cdd842f18 100644 --- a/audit/projects/k8s-staging-kind/services/enabled.txt +++ b/audit/projects/k8s-staging-kind/services/enabled.txt @@ -1,8 +1,11 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-kops/iam.json b/audit/projects/k8s-staging-kops/iam.json index 55c1d4cca9b..8087c78e48e 100644 --- a/audit/projects/k8s-staging-kops/iam.json +++ b/audit/projects/k8s-staging-kops/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-889470918518@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-889470918518@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-889470918518@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-kops/services/enabled.txt b/audit/projects/k8s-staging-kops/services/enabled.txt index d43ee2c0021..49f45ad4895 100644 --- a/audit/projects/k8s-staging-kops/services/enabled.txt +++ b/audit/projects/k8s-staging-kops/services/enabled.txt @@ -7,11 +7,14 @@ cloudbuild.googleapis.com Cloud Build API clouddebugger.googleapis.com Cloud Debugger API cloudkms.googleapis.com Cloud Key Management Service (KMS) API cloudtrace.googleapis.com Cloud Trace API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API datastore.googleapis.com Cloud Datastore API logging.googleapis.com Cloud Logging API monitoring.googleapis.com Cloud Monitoring API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API servicemanagement.googleapis.com Service Management API serviceusage.googleapis.com Service Usage API sql-component.googleapis.com Cloud SQL diff --git a/audit/projects/k8s-staging-kube-state-metrics/iam.json b/audit/projects/k8s-staging-kube-state-metrics/iam.json index 7aea3c163f6..2bcb3327766 100644 --- a/audit/projects/k8s-staging-kube-state-metrics/iam.json +++ b/audit/projects/k8s-staging-kube-state-metrics/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-1023797992882@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-1023797992882@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-1023797992882@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-kube-state-metrics/services/enabled.txt b/audit/projects/k8s-staging-kube-state-metrics/services/enabled.txt index 36a6900078a..30cdd842f18 100644 --- a/audit/projects/k8s-staging-kube-state-metrics/services/enabled.txt +++ b/audit/projects/k8s-staging-kube-state-metrics/services/enabled.txt @@ -1,8 +1,11 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-kubeadm/iam.json b/audit/projects/k8s-staging-kubeadm/iam.json index 7d0d3f15b24..778b4ab5414 100644 --- a/audit/projects/k8s-staging-kubeadm/iam.json +++ b/audit/projects/k8s-staging-kubeadm/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-487125676961@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-487125676961@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-487125676961@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-kubeadm/services/enabled.txt b/audit/projects/k8s-staging-kubeadm/services/enabled.txt index 36a6900078a..30cdd842f18 100644 --- a/audit/projects/k8s-staging-kubeadm/services/enabled.txt +++ b/audit/projects/k8s-staging-kubeadm/services/enabled.txt @@ -1,8 +1,11 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-kubernetes/buckets/artifacts.k8s-staging-kubernetes.appspot.com/iam.json b/audit/projects/k8s-staging-kubernetes/buckets/artifacts.k8s-staging-kubernetes.appspot.com/iam.json index 128c85406e1..981a8b06f4b 100644 --- a/audit/projects/k8s-staging-kubernetes/buckets/artifacts.k8s-staging-kubernetes.appspot.com/iam.json +++ b/audit/projects/k8s-staging-kubernetes/buckets/artifacts.k8s-staging-kubernetes.appspot.com/iam.json @@ -4,7 +4,8 @@ "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", "projectEditor:k8s-staging-kubernetes", - "projectOwner:k8s-staging-kubernetes" + "projectOwner:k8s-staging-kubernetes", + "serviceAccount:648026197307@cloudbuild.gserviceaccount.com" ], "role": "roles/storage.legacyBucketOwner" }, @@ -24,7 +25,8 @@ { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-kubernetes@kubernetes.io" + "group:k8s-infra-staging-kubernetes@kubernetes.io", + "serviceAccount:648026197307@cloudbuild.gserviceaccount.com" ], "role": "roles/storage.objectAdmin" }, diff --git a/audit/projects/k8s-staging-kubernetes/iam.json b/audit/projects/k8s-staging-kubernetes/iam.json index 60e1c15f5cc..559c1720f33 100644 --- a/audit/projects/k8s-staging-kubernetes/iam.json +++ b/audit/projects/k8s-staging-kubernetes/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-615281671549@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-615281671549@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-615281671549@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-kubernetes/services/enabled.txt b/audit/projects/k8s-staging-kubernetes/services/enabled.txt index 36a6900078a..30cdd842f18 100644 --- a/audit/projects/k8s-staging-kubernetes/services/enabled.txt +++ b/audit/projects/k8s-staging-kubernetes/services/enabled.txt @@ -1,8 +1,11 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-metrics-server/iam.json b/audit/projects/k8s-staging-metrics-server/iam.json index 0a1c2cd2d4f..93b3279985d 100644 --- a/audit/projects/k8s-staging-metrics-server/iam.json +++ b/audit/projects/k8s-staging-metrics-server/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-229033024066@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-229033024066@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-229033024066@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-metrics-server/services/enabled.txt b/audit/projects/k8s-staging-metrics-server/services/enabled.txt index 36a6900078a..30cdd842f18 100644 --- a/audit/projects/k8s-staging-metrics-server/services/enabled.txt +++ b/audit/projects/k8s-staging-metrics-server/services/enabled.txt @@ -1,8 +1,11 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-multitenancy/iam.json b/audit/projects/k8s-staging-multitenancy/iam.json index 88f3c304f10..c72a0d682fa 100644 --- a/audit/projects/k8s-staging-multitenancy/iam.json +++ b/audit/projects/k8s-staging-multitenancy/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-817922591645@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-817922591645@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-817922591645@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-multitenancy/services/enabled.txt b/audit/projects/k8s-staging-multitenancy/services/enabled.txt index 36a6900078a..30cdd842f18 100644 --- a/audit/projects/k8s-staging-multitenancy/services/enabled.txt +++ b/audit/projects/k8s-staging-multitenancy/services/enabled.txt @@ -1,8 +1,11 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-nfd/iam.json b/audit/projects/k8s-staging-nfd/iam.json index 34a84da645f..9b862b00a6a 100644 --- a/audit/projects/k8s-staging-nfd/iam.json +++ b/audit/projects/k8s-staging-nfd/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-5125544917@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-5125544917@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-5125544917@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-nfd/services/enabled.txt b/audit/projects/k8s-staging-nfd/services/enabled.txt index 36a6900078a..30cdd842f18 100644 --- a/audit/projects/k8s-staging-nfd/services/enabled.txt +++ b/audit/projects/k8s-staging-nfd/services/enabled.txt @@ -1,8 +1,11 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-npd/iam.json b/audit/projects/k8s-staging-npd/iam.json index e4a57bffa81..630b64ec856 100644 --- a/audit/projects/k8s-staging-npd/iam.json +++ b/audit/projects/k8s-staging-npd/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-152738448582@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-152738448582@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-152738448582@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-npd/services/enabled.txt b/audit/projects/k8s-staging-npd/services/enabled.txt index 36a6900078a..30cdd842f18 100644 --- a/audit/projects/k8s-staging-npd/services/enabled.txt +++ b/audit/projects/k8s-staging-npd/services/enabled.txt @@ -1,8 +1,11 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-provider-azure/iam.json b/audit/projects/k8s-staging-provider-azure/iam.json index e4ae054d01d..e2499de3d89 100644 --- a/audit/projects/k8s-staging-provider-azure/iam.json +++ b/audit/projects/k8s-staging-provider-azure/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-83539169056@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-83539169056@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-83539169056@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-provider-azure/services/enabled.txt b/audit/projects/k8s-staging-provider-azure/services/enabled.txt index 36a6900078a..30cdd842f18 100644 --- a/audit/projects/k8s-staging-provider-azure/services/enabled.txt +++ b/audit/projects/k8s-staging-provider-azure/services/enabled.txt @@ -1,8 +1,11 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-publishing-bot/iam.json b/audit/projects/k8s-staging-publishing-bot/iam.json index 58aa2939c5a..77ddc123451 100644 --- a/audit/projects/k8s-staging-publishing-bot/iam.json +++ b/audit/projects/k8s-staging-publishing-bot/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-438481731081@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-438481731081@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-438481731081@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-publishing-bot/services/enabled.txt b/audit/projects/k8s-staging-publishing-bot/services/enabled.txt index 36a6900078a..30cdd842f18 100644 --- a/audit/projects/k8s-staging-publishing-bot/services/enabled.txt +++ b/audit/projects/k8s-staging-publishing-bot/services/enabled.txt @@ -1,8 +1,11 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-releng/iam.json b/audit/projects/k8s-staging-releng/iam.json index bf3cae4426e..28f53099da4 100644 --- a/audit/projects/k8s-staging-releng/iam.json +++ b/audit/projects/k8s-staging-releng/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-117157742389@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-117157742389@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-117157742389@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-releng/services/enabled.txt b/audit/projects/k8s-staging-releng/services/enabled.txt index 36a6900078a..30cdd842f18 100644 --- a/audit/projects/k8s-staging-releng/services/enabled.txt +++ b/audit/projects/k8s-staging-releng/services/enabled.txt @@ -1,8 +1,11 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-scl-image-builder/iam.json b/audit/projects/k8s-staging-scl-image-builder/iam.json index 7f259c49849..58a3bfb4e30 100644 --- a/audit/projects/k8s-staging-scl-image-builder/iam.json +++ b/audit/projects/k8s-staging-scl-image-builder/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-974299031321@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-974299031321@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-974299031321@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-scl-image-builder/services/enabled.txt b/audit/projects/k8s-staging-scl-image-builder/services/enabled.txt index 36a6900078a..30cdd842f18 100644 --- a/audit/projects/k8s-staging-scl-image-builder/services/enabled.txt +++ b/audit/projects/k8s-staging-scl-image-builder/services/enabled.txt @@ -1,8 +1,11 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-service-apis/iam.json b/audit/projects/k8s-staging-service-apis/iam.json index 0e7a462662d..3ba8c9b53e2 100644 --- a/audit/projects/k8s-staging-service-apis/iam.json +++ b/audit/projects/k8s-staging-service-apis/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-1031494980804@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-1031494980804@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-1031494980804@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-service-apis/services/enabled.txt b/audit/projects/k8s-staging-service-apis/services/enabled.txt index 36a6900078a..30cdd842f18 100644 --- a/audit/projects/k8s-staging-service-apis/services/enabled.txt +++ b/audit/projects/k8s-staging-service-apis/services/enabled.txt @@ -1,8 +1,11 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-slack-infra/iam.json b/audit/projects/k8s-staging-slack-infra/iam.json index 89946310d09..f1fcf4d5419 100644 --- a/audit/projects/k8s-staging-slack-infra/iam.json +++ b/audit/projects/k8s-staging-slack-infra/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-470681440884@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-470681440884@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-470681440884@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-slack-infra/services/enabled.txt b/audit/projects/k8s-staging-slack-infra/services/enabled.txt index 36a6900078a..30cdd842f18 100644 --- a/audit/projects/k8s-staging-slack-infra/services/enabled.txt +++ b/audit/projects/k8s-staging-slack-infra/services/enabled.txt @@ -1,8 +1,11 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-txtdirect/iam.json b/audit/projects/k8s-staging-txtdirect/iam.json index 4e45b1f32c7..08acc36425f 100644 --- a/audit/projects/k8s-staging-txtdirect/iam.json +++ b/audit/projects/k8s-staging-txtdirect/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-662592719730@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-662592719730@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-662592719730@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-txtdirect/services/enabled.txt b/audit/projects/k8s-staging-txtdirect/services/enabled.txt index 36a6900078a..30cdd842f18 100644 --- a/audit/projects/k8s-staging-txtdirect/services/enabled.txt +++ b/audit/projects/k8s-staging-txtdirect/services/enabled.txt @@ -1,8 +1,11 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage From d64f00960ee8fd07f1315751d030d9482d18f3a7 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Thu, 14 Jan 2021 17:23:10 -0500 Subject: [PATCH 19/39] audit: add k8s-conform buckets specifically: - add k8s-conform-s390x-k8s bucket, SA for write, key in secretmanager - add k8s-conform-inspur --- .../k8s-conform-inspur/bucketpolicyonly.txt | 4 ++ .../buckets/k8s-conform-inspur/cors.txt | 1 + .../buckets/k8s-conform-inspur/iam.json | 30 ++++++++ .../buckets/k8s-conform-inspur/logging.txt | 1 + .../bucketpolicyonly.txt | 4 ++ .../buckets/k8s-conform-s390x-k8s/cors.txt | 1 + .../buckets/k8s-conform-s390x-k8s/iam.json | 39 ++++++++++ .../buckets/k8s-conform-s390x-k8s/logging.txt | 1 + .../service-s390x-k8s-key/description.json | 7 ++ .../secrets/service-s390x-k8s-key/iam.json | 11 +++ .../service-s390x-k8s-key/versions.json | 10 +++ .../description.json | 8 +++ .../iam.json | 1 + .../services/compute/project-info.json | 72 +++++++++++-------- .../projects/k8s-conform/services/enabled.txt | 1 + 15 files changed, 161 insertions(+), 30 deletions(-) create mode 100644 audit/projects/k8s-conform/buckets/k8s-conform-inspur/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-conform/buckets/k8s-conform-inspur/cors.txt create mode 100644 audit/projects/k8s-conform/buckets/k8s-conform-inspur/iam.json create mode 100644 audit/projects/k8s-conform/buckets/k8s-conform-inspur/logging.txt create mode 100644 audit/projects/k8s-conform/buckets/k8s-conform-s390x-k8s/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-conform/buckets/k8s-conform-s390x-k8s/cors.txt create mode 100644 audit/projects/k8s-conform/buckets/k8s-conform-s390x-k8s/iam.json create mode 100644 audit/projects/k8s-conform/buckets/k8s-conform-s390x-k8s/logging.txt create mode 100644 audit/projects/k8s-conform/secrets/service-s390x-k8s-key/description.json create mode 100644 audit/projects/k8s-conform/secrets/service-s390x-k8s-key/iam.json create mode 100644 audit/projects/k8s-conform/secrets/service-s390x-k8s-key/versions.json create mode 100644 audit/projects/k8s-conform/service-accounts/service-s390x-k8s@k8s-conform.iam.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-conform/service-accounts/service-s390x-k8s@k8s-conform.iam.gserviceaccount.com/iam.json diff --git a/audit/projects/k8s-conform/buckets/k8s-conform-inspur/bucketpolicyonly.txt b/audit/projects/k8s-conform/buckets/k8s-conform-inspur/bucketpolicyonly.txt new file mode 100644 index 00000000000..361bf7db82c --- /dev/null +++ b/audit/projects/k8s-conform/buckets/k8s-conform-inspur/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-conform-inspur: + Enabled: True + LockedTime: 2021-02-18 14:08:58.277000+00:00 + diff --git a/audit/projects/k8s-conform/buckets/k8s-conform-inspur/cors.txt b/audit/projects/k8s-conform/buckets/k8s-conform-inspur/cors.txt new file mode 100644 index 00000000000..5c150635623 --- /dev/null +++ b/audit/projects/k8s-conform/buckets/k8s-conform-inspur/cors.txt @@ -0,0 +1 @@ +gs://k8s-conform-inspur/ has no CORS configuration. diff --git a/audit/projects/k8s-conform/buckets/k8s-conform-inspur/iam.json b/audit/projects/k8s-conform/buckets/k8s-conform-inspur/iam.json new file mode 100644 index 00000000000..87e982e7c46 --- /dev/null +++ b/audit/projects/k8s-conform/buckets/k8s-conform-inspur/iam.json @@ -0,0 +1,30 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-conform", + "projectOwner:k8s-conform" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-conform" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-conform/buckets/k8s-conform-inspur/logging.txt b/audit/projects/k8s-conform/buckets/k8s-conform-inspur/logging.txt new file mode 100644 index 00000000000..89e832fc590 --- /dev/null +++ b/audit/projects/k8s-conform/buckets/k8s-conform-inspur/logging.txt @@ -0,0 +1 @@ +gs://k8s-conform-inspur/ has no logging configuration. diff --git a/audit/projects/k8s-conform/buckets/k8s-conform-s390x-k8s/bucketpolicyonly.txt b/audit/projects/k8s-conform/buckets/k8s-conform-s390x-k8s/bucketpolicyonly.txt new file mode 100644 index 00000000000..105139bbc47 --- /dev/null +++ b/audit/projects/k8s-conform/buckets/k8s-conform-s390x-k8s/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-conform-s390x-k8s: + Enabled: True + LockedTime: 2020-12-22 20:17:39.873000+00:00 + diff --git a/audit/projects/k8s-conform/buckets/k8s-conform-s390x-k8s/cors.txt b/audit/projects/k8s-conform/buckets/k8s-conform-s390x-k8s/cors.txt new file mode 100644 index 00000000000..68b0d6558b1 --- /dev/null +++ b/audit/projects/k8s-conform/buckets/k8s-conform-s390x-k8s/cors.txt @@ -0,0 +1 @@ +gs://k8s-conform-s390x-k8s/ has no CORS configuration. diff --git a/audit/projects/k8s-conform/buckets/k8s-conform-s390x-k8s/iam.json b/audit/projects/k8s-conform/buckets/k8s-conform-s390x-k8s/iam.json new file mode 100644 index 00000000000..75ea7082020 --- /dev/null +++ b/audit/projects/k8s-conform/buckets/k8s-conform-s390x-k8s/iam.json @@ -0,0 +1,39 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-conform", + "projectOwner:k8s-conform" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-conform" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-conform-s390x-k8s@kubernetes.io", + "serviceAccount:service-s390x-k8s@k8s-conform.iam.gserviceaccount.com" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-conform-s390x-k8s@kubernetes.io", + "serviceAccount:service-s390x-k8s@k8s-conform.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-conform/buckets/k8s-conform-s390x-k8s/logging.txt b/audit/projects/k8s-conform/buckets/k8s-conform-s390x-k8s/logging.txt new file mode 100644 index 00000000000..06bec164dd2 --- /dev/null +++ b/audit/projects/k8s-conform/buckets/k8s-conform-s390x-k8s/logging.txt @@ -0,0 +1 @@ +gs://k8s-conform-s390x-k8s/ has no logging configuration. diff --git a/audit/projects/k8s-conform/secrets/service-s390x-k8s-key/description.json b/audit/projects/k8s-conform/secrets/service-s390x-k8s-key/description.json new file mode 100644 index 00000000000..6d54fb4f53c --- /dev/null +++ b/audit/projects/k8s-conform/secrets/service-s390x-k8s-key/description.json @@ -0,0 +1,7 @@ +{ + "createTime": "2020-09-23T21:18:11.941957Z", + "name": "projects/228988630781/secrets/service-s390x-k8s-key", + "replication": { + "automatic": {} + } +} diff --git a/audit/projects/k8s-conform/secrets/service-s390x-k8s-key/iam.json b/audit/projects/k8s-conform/secrets/service-s390x-k8s-key/iam.json new file mode 100644 index 00000000000..d422f6fdf4d --- /dev/null +++ b/audit/projects/k8s-conform/secrets/service-s390x-k8s-key/iam.json @@ -0,0 +1,11 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-conform-s390x-k8s@kubernetes.io" + ], + "role": "roles/secretmanager.secretAccessor" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-conform/secrets/service-s390x-k8s-key/versions.json b/audit/projects/k8s-conform/secrets/service-s390x-k8s-key/versions.json new file mode 100644 index 00000000000..0762b355283 --- /dev/null +++ b/audit/projects/k8s-conform/secrets/service-s390x-k8s-key/versions.json @@ -0,0 +1,10 @@ +[ + { + "createTime": "2020-09-23T21:18:13.601114Z", + "name": "projects/228988630781/secrets/service-s390x-k8s-key/versions/1", + "replicationStatus": { + "automatic": {} + }, + "state": "ENABLED" + } +] diff --git a/audit/projects/k8s-conform/service-accounts/service-s390x-k8s@k8s-conform.iam.gserviceaccount.com/description.json b/audit/projects/k8s-conform/service-accounts/service-s390x-k8s@k8s-conform.iam.gserviceaccount.com/description.json new file mode 100644 index 00000000000..fc62939331c --- /dev/null +++ b/audit/projects/k8s-conform/service-accounts/service-s390x-k8s@k8s-conform.iam.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "service-s390x-k8s", + "email": "service-s390x-k8s@k8s-conform.iam.gserviceaccount.com", + "name": "projects/k8s-conform/serviceAccounts/service-s390x-k8s@k8s-conform.iam.gserviceaccount.com", + "oauth2ClientId": "111763825701389683173", + "projectId": "k8s-conform", + "uniqueId": "111763825701389683173" +} diff --git a/audit/projects/k8s-conform/service-accounts/service-s390x-k8s@k8s-conform.iam.gserviceaccount.com/iam.json b/audit/projects/k8s-conform/service-accounts/service-s390x-k8s@k8s-conform.iam.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-conform/service-accounts/service-s390x-k8s@k8s-conform.iam.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-conform/services/compute/project-info.json b/audit/projects/k8s-conform/services/compute/project-info.json index 03cbacf6b8a..76ed797deb7 100644 --- a/audit/projects/k8s-conform/services/compute/project-info.json +++ b/audit/projects/k8s-conform/services/compute/project-info.json @@ -10,99 +10,99 @@ "name": "k8s-conform", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -110,15 +110,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -130,11 +130,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -142,8 +142,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-conform", diff --git a/audit/projects/k8s-conform/services/enabled.txt b/audit/projects/k8s-conform/services/enabled.txt index a21f37e268d..4e87e132df2 100644 --- a/audit/projects/k8s-conform/services/enabled.txt +++ b/audit/projects/k8s-conform/services/enabled.txt @@ -1,5 +1,6 @@ NAME TITLE compute.googleapis.com Compute Engine API oslogin.googleapis.com Cloud OS Login API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage From 924a4959da3535743e1c1c295530a44af6b378d0 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Thu, 14 Jan 2021 17:31:32 -0500 Subject: [PATCH 20/39] audit: allow k8s-infra-prow-build-trusted to manage gsuite groups specifically: - restrict access to gsuite-groups-manager_key to serviceaccount - allow k8s-infra-prow-build-trusted to run as SA via workload identity --- .../secrets/gsuite-groups-manager_key/iam.json | 2 +- .../secrets/gsuite-groups-manager_key/versions.json | 3 +++ .../iam.json | 12 +++++++++++- audit/projects/k8s-gsuite/services/enabled.txt | 2 +- 4 files changed, 16 insertions(+), 3 deletions(-) diff --git a/audit/projects/k8s-gsuite/secrets/gsuite-groups-manager_key/iam.json b/audit/projects/k8s-gsuite/secrets/gsuite-groups-manager_key/iam.json index 2ad2c0e645c..97c93795b8e 100644 --- a/audit/projects/k8s-gsuite/secrets/gsuite-groups-manager_key/iam.json +++ b/audit/projects/k8s-gsuite/secrets/gsuite-groups-manager_key/iam.json @@ -2,7 +2,7 @@ "bindings": [ { "members": [ - "group:k8s-infra-group-admins@kubernetes.io" + "serviceAccount:gsuite-groups-manager@k8s-gsuite.iam.gserviceaccount.com" ], "role": "roles/secretmanager.secretAccessor" } diff --git a/audit/projects/k8s-gsuite/secrets/gsuite-groups-manager_key/versions.json b/audit/projects/k8s-gsuite/secrets/gsuite-groups-manager_key/versions.json index 089e1f5feae..8ebe6d94d6f 100644 --- a/audit/projects/k8s-gsuite/secrets/gsuite-groups-manager_key/versions.json +++ b/audit/projects/k8s-gsuite/secrets/gsuite-groups-manager_key/versions.json @@ -2,6 +2,9 @@ { "createTime": "2020-04-30T04:24:24.019226Z", "name": "projects/91610859379/secrets/gsuite-groups-manager_key/versions/1", + "replicationStatus": { + "automatic": {} + }, "state": "ENABLED" } ] diff --git a/audit/projects/k8s-gsuite/service-accounts/gsuite-groups-manager@k8s-gsuite.iam.gserviceaccount.com/iam.json b/audit/projects/k8s-gsuite/service-accounts/gsuite-groups-manager@k8s-gsuite.iam.gserviceaccount.com/iam.json index 0967ef424bc..45440de8e93 100644 --- a/audit/projects/k8s-gsuite/service-accounts/gsuite-groups-manager@k8s-gsuite.iam.gserviceaccount.com/iam.json +++ b/audit/projects/k8s-gsuite/service-accounts/gsuite-groups-manager@k8s-gsuite.iam.gserviceaccount.com/iam.json @@ -1 +1,11 @@ -{} +{ + "bindings": [ + { + "members": [ + "serviceAccount:k8s-infra-prow-build-trusted.svc.id.goog[test-pods/gsuite-groups-manager]" + ], + "role": "roles/iam.workloadIdentityUser" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-gsuite/services/enabled.txt b/audit/projects/k8s-gsuite/services/enabled.txt index 6f7f76a2a47..d8504701f4a 100644 --- a/audit/projects/k8s-gsuite/services/enabled.txt +++ b/audit/projects/k8s-gsuite/services/enabled.txt @@ -1,4 +1,4 @@ NAME TITLE -admin.googleapis.com Admin SDK +admin.googleapis.com Admin SDK API groupssettings.googleapis.com Groups Settings API secretmanager.googleapis.com Secret Manager API From e84f81fe0f633943ce5152ff5189d27479189092 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Thu, 14 Jan 2021 17:32:00 -0500 Subject: [PATCH 21/39] audit: add k8s-gsuite/wg-k8s-infra-billing_pw secret --- .../secrets/wg-k8s-infra-billing_pw/description.json | 7 +++++++ .../secrets/wg-k8s-infra-billing_pw/iam.json | 11 +++++++++++ .../secrets/wg-k8s-infra-billing_pw/versions.json | 10 ++++++++++ 3 files changed, 28 insertions(+) create mode 100644 audit/projects/k8s-gsuite/secrets/wg-k8s-infra-billing_pw/description.json create mode 100644 audit/projects/k8s-gsuite/secrets/wg-k8s-infra-billing_pw/iam.json create mode 100644 audit/projects/k8s-gsuite/secrets/wg-k8s-infra-billing_pw/versions.json diff --git a/audit/projects/k8s-gsuite/secrets/wg-k8s-infra-billing_pw/description.json b/audit/projects/k8s-gsuite/secrets/wg-k8s-infra-billing_pw/description.json new file mode 100644 index 00000000000..51ca1cc1026 --- /dev/null +++ b/audit/projects/k8s-gsuite/secrets/wg-k8s-infra-billing_pw/description.json @@ -0,0 +1,7 @@ +{ + "createTime": "2020-05-11T16:52:59.141275Z", + "name": "projects/91610859379/secrets/wg-k8s-infra-billing_pw", + "replication": { + "automatic": {} + } +} diff --git a/audit/projects/k8s-gsuite/secrets/wg-k8s-infra-billing_pw/iam.json b/audit/projects/k8s-gsuite/secrets/wg-k8s-infra-billing_pw/iam.json new file mode 100644 index 00000000000..3ae71e2e61d --- /dev/null +++ b/audit/projects/k8s-gsuite/secrets/wg-k8s-infra-billing_pw/iam.json @@ -0,0 +1,11 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-gcp-accounting@kubernetes.io" + ], + "role": "roles/secretmanager.secretAccessor" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-gsuite/secrets/wg-k8s-infra-billing_pw/versions.json b/audit/projects/k8s-gsuite/secrets/wg-k8s-infra-billing_pw/versions.json new file mode 100644 index 00000000000..df274a92542 --- /dev/null +++ b/audit/projects/k8s-gsuite/secrets/wg-k8s-infra-billing_pw/versions.json @@ -0,0 +1,10 @@ +[ + { + "createTime": "2020-05-11T16:52:59.792712Z", + "name": "projects/91610859379/secrets/wg-k8s-infra-billing_pw/versions/1", + "replicationStatus": { + "automatic": {} + }, + "state": "ENABLED" + } +] From df805792dbd6bc0b6765016a5145f807cb5d1a3a Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Thu, 14 Jan 2021 17:49:00 -0500 Subject: [PATCH 22/39] audit: add k8s-release project specifically: - k8s-release bucket - k8s-release-dev{,-eu,-asia} buckets - k8s-release-pull bucket - gcr.io/k8s-release --- .../bucketpolicyonly.txt | 4 ++ .../cors.txt | 1 + .../iam.json | 39 +++++++++++ .../logging.txt | 1 + .../k8s-release-dev-asia/bucketpolicyonly.txt | 4 ++ .../buckets/k8s-release-dev-asia/cors.txt | 1 + .../buckets/k8s-release-dev-asia/iam.json | 41 ++++++++++++ .../buckets/k8s-release-dev-asia/logging.txt | 1 + .../k8s-release-dev-eu/bucketpolicyonly.txt | 4 ++ .../buckets/k8s-release-dev-eu/cors.txt | 1 + .../buckets/k8s-release-dev-eu/iam.json | 41 ++++++++++++ .../buckets/k8s-release-dev-eu/logging.txt | 1 + .../k8s-release-dev/bucketpolicyonly.txt | 4 ++ .../buckets/k8s-release-dev/cors.txt | 1 + .../buckets/k8s-release-dev/iam.json | 41 ++++++++++++ .../buckets/k8s-release-dev/logging.txt | 1 + .../k8s-release-gcb/bucketpolicyonly.txt | 4 ++ .../buckets/k8s-release-gcb/cors.txt | 1 + .../buckets/k8s-release-gcb/iam.json | 48 ++++++++++++++ .../buckets/k8s-release-gcb/logging.txt | 1 + .../k8s-release-pull/bucketpolicyonly.txt | 4 ++ .../buckets/k8s-release-pull/cors.txt | 1 + .../buckets/k8s-release-pull/iam.json | 43 ++++++++++++ .../buckets/k8s-release-pull/logging.txt | 1 + .../buckets/k8s-release/bucketpolicyonly.txt | 4 ++ .../k8s-release/buckets/k8s-release/cors.txt | 1 + .../k8s-release/buckets/k8s-release/iam.json | 39 +++++++++++ .../buckets/k8s-release/logging.txt | 1 + audit/projects/k8s-release/description.json | 11 ++++ audit/projects/k8s-release/iam.json | 66 +++++++++++++++++++ .../projects/k8s-release/services/enabled.txt | 10 +++ 31 files changed, 421 insertions(+) create mode 100644 audit/projects/k8s-release/buckets/artifacts.k8s-release.appspot.com/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-release/buckets/artifacts.k8s-release.appspot.com/cors.txt create mode 100644 audit/projects/k8s-release/buckets/artifacts.k8s-release.appspot.com/iam.json create mode 100644 audit/projects/k8s-release/buckets/artifacts.k8s-release.appspot.com/logging.txt create mode 100644 audit/projects/k8s-release/buckets/k8s-release-dev-asia/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-release/buckets/k8s-release-dev-asia/cors.txt create mode 100644 audit/projects/k8s-release/buckets/k8s-release-dev-asia/iam.json create mode 100644 audit/projects/k8s-release/buckets/k8s-release-dev-asia/logging.txt create mode 100644 audit/projects/k8s-release/buckets/k8s-release-dev-eu/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-release/buckets/k8s-release-dev-eu/cors.txt create mode 100644 audit/projects/k8s-release/buckets/k8s-release-dev-eu/iam.json create mode 100644 audit/projects/k8s-release/buckets/k8s-release-dev-eu/logging.txt create mode 100644 audit/projects/k8s-release/buckets/k8s-release-dev/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-release/buckets/k8s-release-dev/cors.txt create mode 100644 audit/projects/k8s-release/buckets/k8s-release-dev/iam.json create mode 100644 audit/projects/k8s-release/buckets/k8s-release-dev/logging.txt create mode 100644 audit/projects/k8s-release/buckets/k8s-release-gcb/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-release/buckets/k8s-release-gcb/cors.txt create mode 100644 audit/projects/k8s-release/buckets/k8s-release-gcb/iam.json create mode 100644 audit/projects/k8s-release/buckets/k8s-release-gcb/logging.txt create mode 100644 audit/projects/k8s-release/buckets/k8s-release-pull/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-release/buckets/k8s-release-pull/cors.txt create mode 100644 audit/projects/k8s-release/buckets/k8s-release-pull/iam.json create mode 100644 audit/projects/k8s-release/buckets/k8s-release-pull/logging.txt create mode 100644 audit/projects/k8s-release/buckets/k8s-release/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-release/buckets/k8s-release/cors.txt create mode 100644 audit/projects/k8s-release/buckets/k8s-release/iam.json create mode 100644 audit/projects/k8s-release/buckets/k8s-release/logging.txt create mode 100644 audit/projects/k8s-release/description.json create mode 100644 audit/projects/k8s-release/iam.json create mode 100644 audit/projects/k8s-release/services/enabled.txt diff --git a/audit/projects/k8s-release/buckets/artifacts.k8s-release.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-release/buckets/artifacts.k8s-release.appspot.com/bucketpolicyonly.txt new file mode 100644 index 00000000000..a8e12f611f4 --- /dev/null +++ b/audit/projects/k8s-release/buckets/artifacts.k8s-release.appspot.com/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://artifacts.k8s-release.appspot.com: + Enabled: True + LockedTime: 2020-11-05 20:49:48.627000+00:00 + diff --git a/audit/projects/k8s-release/buckets/artifacts.k8s-release.appspot.com/cors.txt b/audit/projects/k8s-release/buckets/artifacts.k8s-release.appspot.com/cors.txt new file mode 100644 index 00000000000..40d610b3990 --- /dev/null +++ b/audit/projects/k8s-release/buckets/artifacts.k8s-release.appspot.com/cors.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-release.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-release/buckets/artifacts.k8s-release.appspot.com/iam.json b/audit/projects/k8s-release/buckets/artifacts.k8s-release.appspot.com/iam.json new file mode 100644 index 00000000000..c29862cf2b9 --- /dev/null +++ b/audit/projects/k8s-release/buckets/artifacts.k8s-release.appspot.com/iam.json @@ -0,0 +1,39 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-release", + "projectOwner:k8s-release" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-release" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-release-admins@kubernetes.io", + "group:k8s-infra-release-editors@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-release-admins@kubernetes.io", + "group:k8s-infra-release-editors@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-release/buckets/artifacts.k8s-release.appspot.com/logging.txt b/audit/projects/k8s-release/buckets/artifacts.k8s-release.appspot.com/logging.txt new file mode 100644 index 00000000000..bdb41e5c523 --- /dev/null +++ b/audit/projects/k8s-release/buckets/artifacts.k8s-release.appspot.com/logging.txt @@ -0,0 +1 @@ +gs://artifacts.k8s-release.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-release/buckets/k8s-release-dev-asia/bucketpolicyonly.txt b/audit/projects/k8s-release/buckets/k8s-release-dev-asia/bucketpolicyonly.txt new file mode 100644 index 00000000000..c5f8c7defa5 --- /dev/null +++ b/audit/projects/k8s-release/buckets/k8s-release-dev-asia/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-release-dev-asia: + Enabled: True + LockedTime: 2020-11-29 23:11:21.538000+00:00 + diff --git a/audit/projects/k8s-release/buckets/k8s-release-dev-asia/cors.txt b/audit/projects/k8s-release/buckets/k8s-release-dev-asia/cors.txt new file mode 100644 index 00000000000..feec9e3a098 --- /dev/null +++ b/audit/projects/k8s-release/buckets/k8s-release-dev-asia/cors.txt @@ -0,0 +1 @@ +gs://k8s-release-dev-asia/ has no CORS configuration. diff --git a/audit/projects/k8s-release/buckets/k8s-release-dev-asia/iam.json b/audit/projects/k8s-release/buckets/k8s-release-dev-asia/iam.json new file mode 100644 index 00000000000..2be7d4b581a --- /dev/null +++ b/audit/projects/k8s-release/buckets/k8s-release-dev-asia/iam.json @@ -0,0 +1,41 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-release", + "projectOwner:k8s-release" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-release" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-release-admins@kubernetes.io", + "group:k8s-infra-release-editors@kubernetes.io", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-release-admins@kubernetes.io", + "group:k8s-infra-release-editors@kubernetes.io", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-release/buckets/k8s-release-dev-asia/logging.txt b/audit/projects/k8s-release/buckets/k8s-release-dev-asia/logging.txt new file mode 100644 index 00000000000..090d7b7cfbf --- /dev/null +++ b/audit/projects/k8s-release/buckets/k8s-release-dev-asia/logging.txt @@ -0,0 +1 @@ +gs://k8s-release-dev-asia/ has no logging configuration. diff --git a/audit/projects/k8s-release/buckets/k8s-release-dev-eu/bucketpolicyonly.txt b/audit/projects/k8s-release/buckets/k8s-release-dev-eu/bucketpolicyonly.txt new file mode 100644 index 00000000000..3235ff7dfc0 --- /dev/null +++ b/audit/projects/k8s-release/buckets/k8s-release-dev-eu/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-release-dev-eu: + Enabled: True + LockedTime: 2020-11-29 23:11:50.322000+00:00 + diff --git a/audit/projects/k8s-release/buckets/k8s-release-dev-eu/cors.txt b/audit/projects/k8s-release/buckets/k8s-release-dev-eu/cors.txt new file mode 100644 index 00000000000..45ac4490eb4 --- /dev/null +++ b/audit/projects/k8s-release/buckets/k8s-release-dev-eu/cors.txt @@ -0,0 +1 @@ +gs://k8s-release-dev-eu/ has no CORS configuration. diff --git a/audit/projects/k8s-release/buckets/k8s-release-dev-eu/iam.json b/audit/projects/k8s-release/buckets/k8s-release-dev-eu/iam.json new file mode 100644 index 00000000000..2be7d4b581a --- /dev/null +++ b/audit/projects/k8s-release/buckets/k8s-release-dev-eu/iam.json @@ -0,0 +1,41 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-release", + "projectOwner:k8s-release" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-release" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-release-admins@kubernetes.io", + "group:k8s-infra-release-editors@kubernetes.io", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-release-admins@kubernetes.io", + "group:k8s-infra-release-editors@kubernetes.io", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-release/buckets/k8s-release-dev-eu/logging.txt b/audit/projects/k8s-release/buckets/k8s-release-dev-eu/logging.txt new file mode 100644 index 00000000000..02f7c5904c3 --- /dev/null +++ b/audit/projects/k8s-release/buckets/k8s-release-dev-eu/logging.txt @@ -0,0 +1 @@ +gs://k8s-release-dev-eu/ has no logging configuration. diff --git a/audit/projects/k8s-release/buckets/k8s-release-dev/bucketpolicyonly.txt b/audit/projects/k8s-release/buckets/k8s-release-dev/bucketpolicyonly.txt new file mode 100644 index 00000000000..bb8937fc93b --- /dev/null +++ b/audit/projects/k8s-release/buckets/k8s-release-dev/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-release-dev: + Enabled: True + LockedTime: 2020-11-29 23:10:52.826000+00:00 + diff --git a/audit/projects/k8s-release/buckets/k8s-release-dev/cors.txt b/audit/projects/k8s-release/buckets/k8s-release-dev/cors.txt new file mode 100644 index 00000000000..1cd5f8d841d --- /dev/null +++ b/audit/projects/k8s-release/buckets/k8s-release-dev/cors.txt @@ -0,0 +1 @@ +gs://k8s-release-dev/ has no CORS configuration. diff --git a/audit/projects/k8s-release/buckets/k8s-release-dev/iam.json b/audit/projects/k8s-release/buckets/k8s-release-dev/iam.json new file mode 100644 index 00000000000..2be7d4b581a --- /dev/null +++ b/audit/projects/k8s-release/buckets/k8s-release-dev/iam.json @@ -0,0 +1,41 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-release", + "projectOwner:k8s-release" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-release" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-release-admins@kubernetes.io", + "group:k8s-infra-release-editors@kubernetes.io", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-release-admins@kubernetes.io", + "group:k8s-infra-release-editors@kubernetes.io", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-release/buckets/k8s-release-dev/logging.txt b/audit/projects/k8s-release/buckets/k8s-release-dev/logging.txt new file mode 100644 index 00000000000..ca4931fa553 --- /dev/null +++ b/audit/projects/k8s-release/buckets/k8s-release-dev/logging.txt @@ -0,0 +1 @@ +gs://k8s-release-dev/ has no logging configuration. diff --git a/audit/projects/k8s-release/buckets/k8s-release-gcb/bucketpolicyonly.txt b/audit/projects/k8s-release/buckets/k8s-release-gcb/bucketpolicyonly.txt new file mode 100644 index 00000000000..0fea1c6e6f7 --- /dev/null +++ b/audit/projects/k8s-release/buckets/k8s-release-gcb/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-release-gcb: + Enabled: True + LockedTime: 2020-11-05 20:50:43.122000+00:00 + diff --git a/audit/projects/k8s-release/buckets/k8s-release-gcb/cors.txt b/audit/projects/k8s-release/buckets/k8s-release-gcb/cors.txt new file mode 100644 index 00000000000..817679b219d --- /dev/null +++ b/audit/projects/k8s-release/buckets/k8s-release-gcb/cors.txt @@ -0,0 +1 @@ +gs://k8s-release-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-release/buckets/k8s-release-gcb/iam.json b/audit/projects/k8s-release/buckets/k8s-release-gcb/iam.json new file mode 100644 index 00000000000..4f8ae0abaaa --- /dev/null +++ b/audit/projects/k8s-release/buckets/k8s-release-gcb/iam.json @@ -0,0 +1,48 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-release", + "projectOwner:k8s-release" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-release" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-release-admins@kubernetes.io", + "group:k8s-infra-release-editors@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-release-admins@kubernetes.io", + "group:k8s-infra-release-editors@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectCreator" + }, + { + "members": [ + "allUsers", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-release/buckets/k8s-release-gcb/logging.txt b/audit/projects/k8s-release/buckets/k8s-release-gcb/logging.txt new file mode 100644 index 00000000000..e73ca85d6d6 --- /dev/null +++ b/audit/projects/k8s-release/buckets/k8s-release-gcb/logging.txt @@ -0,0 +1 @@ +gs://k8s-release-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-release/buckets/k8s-release-pull/bucketpolicyonly.txt b/audit/projects/k8s-release/buckets/k8s-release-pull/bucketpolicyonly.txt new file mode 100644 index 00000000000..1dca819a2b4 --- /dev/null +++ b/audit/projects/k8s-release/buckets/k8s-release-pull/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-release-pull: + Enabled: True + LockedTime: 2020-11-29 23:12:16.142000+00:00 + diff --git a/audit/projects/k8s-release/buckets/k8s-release-pull/cors.txt b/audit/projects/k8s-release/buckets/k8s-release-pull/cors.txt new file mode 100644 index 00000000000..7fdbafa2570 --- /dev/null +++ b/audit/projects/k8s-release/buckets/k8s-release-pull/cors.txt @@ -0,0 +1 @@ +gs://k8s-release-pull/ has no CORS configuration. diff --git a/audit/projects/k8s-release/buckets/k8s-release-pull/iam.json b/audit/projects/k8s-release/buckets/k8s-release-pull/iam.json new file mode 100644 index 00000000000..27e77b9aff1 --- /dev/null +++ b/audit/projects/k8s-release/buckets/k8s-release-pull/iam.json @@ -0,0 +1,43 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-release", + "projectOwner:k8s-release" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-release", + "serviceAccount:project-304687256732@storage-transfer-service.iam.gserviceaccount.com" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-release-admins@kubernetes.io", + "group:k8s-infra-release-editors@kubernetes.io", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-release-admins@kubernetes.io", + "group:k8s-infra-release-editors@kubernetes.io", + "serviceAccount:project-304687256732@storage-transfer-service.iam.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-release/buckets/k8s-release-pull/logging.txt b/audit/projects/k8s-release/buckets/k8s-release-pull/logging.txt new file mode 100644 index 00000000000..bb9c521109e --- /dev/null +++ b/audit/projects/k8s-release/buckets/k8s-release-pull/logging.txt @@ -0,0 +1 @@ +gs://k8s-release-pull/ has no logging configuration. diff --git a/audit/projects/k8s-release/buckets/k8s-release/bucketpolicyonly.txt b/audit/projects/k8s-release/buckets/k8s-release/bucketpolicyonly.txt new file mode 100644 index 00000000000..72aeb3b5ec9 --- /dev/null +++ b/audit/projects/k8s-release/buckets/k8s-release/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-release: + Enabled: True + LockedTime: 2020-11-05 20:50:19.121000+00:00 + diff --git a/audit/projects/k8s-release/buckets/k8s-release/cors.txt b/audit/projects/k8s-release/buckets/k8s-release/cors.txt new file mode 100644 index 00000000000..8448536e977 --- /dev/null +++ b/audit/projects/k8s-release/buckets/k8s-release/cors.txt @@ -0,0 +1 @@ +gs://k8s-release/ has no CORS configuration. diff --git a/audit/projects/k8s-release/buckets/k8s-release/iam.json b/audit/projects/k8s-release/buckets/k8s-release/iam.json new file mode 100644 index 00000000000..c29862cf2b9 --- /dev/null +++ b/audit/projects/k8s-release/buckets/k8s-release/iam.json @@ -0,0 +1,39 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-release", + "projectOwner:k8s-release" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-release" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-release-admins@kubernetes.io", + "group:k8s-infra-release-editors@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-release-admins@kubernetes.io", + "group:k8s-infra-release-editors@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-release/buckets/k8s-release/logging.txt b/audit/projects/k8s-release/buckets/k8s-release/logging.txt new file mode 100644 index 00000000000..3c4ec0350bb --- /dev/null +++ b/audit/projects/k8s-release/buckets/k8s-release/logging.txt @@ -0,0 +1 @@ +gs://k8s-release/ has no logging configuration. diff --git a/audit/projects/k8s-release/description.json b/audit/projects/k8s-release/description.json new file mode 100644 index 00000000000..ef67e20fce7 --- /dev/null +++ b/audit/projects/k8s-release/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2020-08-04T20:07:15.795Z", + "lifecycleState": "ACTIVE", + "name": "k8s-release", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-release", + "projectNumber": "304687256732" +} diff --git a/audit/projects/k8s-release/iam.json b/audit/projects/k8s-release/iam.json new file mode 100644 index 00000000000..32926c3ec53 --- /dev/null +++ b/audit/projects/k8s-release/iam.json @@ -0,0 +1,66 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:304687256732@cloudbuild.gserviceaccount.com", + "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", + "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.builds.builder" + }, + { + "members": [ + "group:k8s-infra-release-admins@kubernetes.io", + "group:k8s-infra-release-editors@kubernetes.io" + ], + "role": "roles/cloudbuild.builds.editor" + }, + { + "members": [ + "serviceAccount:service-304687256732@gcp-sa-cloudbuild.iam.gserviceaccount.com" + ], + "role": "roles/cloudbuild.serviceAgent" + }, + { + "members": [ + "group:k8s-infra-release-admins@kubernetes.io" + ], + "role": "roles/cloudkms.admin" + }, + { + "members": [ + "group:k8s-infra-release-admins@kubernetes.io" + ], + "role": "roles/cloudkms.cryptoKeyEncrypterDecrypter" + }, + { + "members": [ + "serviceAccount:service-304687256732@containerregistry.iam.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "user:spiffxp@google.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "group:k8s-infra-release-admins@kubernetes.io", + "group:k8s-infra-release-editors@kubernetes.io" + ], + "role": "roles/serviceusage.serviceUsageConsumer" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-release-admins@kubernetes.io", + "group:k8s-infra-release-editors@kubernetes.io", + "group:k8s-infra-release-viewers@kubernetes.io" + ], + "role": "roles/viewer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-release/services/enabled.txt b/audit/projects/k8s-release/services/enabled.txt new file mode 100644 index 00000000000..d0f1e5a23de --- /dev/null +++ b/audit/projects/k8s-release/services/enabled.txt @@ -0,0 +1,10 @@ +NAME TITLE +cloudbuild.googleapis.com Cloud Build API +cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containerregistry.googleapis.com Container Registry API +logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +pubsub.googleapis.com Cloud Pub/Sub API +stackdriver.googleapis.com Stackdriver API +storage-api.googleapis.com Google Cloud Storage JSON API +storage-component.googleapis.com Cloud Storage From ed6a857733b1b99f08a533ec42a4f8a93caa14e9 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Thu, 14 Jan 2021 17:51:31 -0500 Subject: [PATCH 23/39] audit: add kubernetes-public secrets specifically: - enable secretmanager - add slack-infra related secrets - add triage-party related secrets --- .../secrets/recaptcha/description.json | 10 ++++++++++ .../kubernetes-public/secrets/recaptcha/iam.json | 11 +++++++++++ .../kubernetes-public/secrets/recaptcha/versions.json | 10 ++++++++++ .../secrets/slack-event-log-config/description.json | 10 ++++++++++ .../secrets/slack-event-log-config/iam.json | 11 +++++++++++ .../secrets/slack-event-log-config/versions.json | 10 ++++++++++ .../secrets/slack-moderator-config/description.json | 10 ++++++++++ .../secrets/slack-moderator-config/iam.json | 11 +++++++++++ .../secrets/slack-moderator-config/versions.json | 10 ++++++++++ .../secrets/slack-welcomer-config/description.json | 10 ++++++++++ .../secrets/slack-welcomer-config/iam.json | 11 +++++++++++ .../secrets/slack-welcomer-config/versions.json | 10 ++++++++++ .../secrets/slackin-token/description.json | 10 ++++++++++ .../kubernetes-public/secrets/slackin-token/iam.json | 11 +++++++++++ .../secrets/slackin-token/versions.json | 10 ++++++++++ .../triage-party-github-token/description.json | 7 +++++++ .../secrets/triage-party-github-token/iam.json | 11 +++++++++++ .../secrets/triage-party-github-token/versions.json | 10 ++++++++++ audit/projects/kubernetes-public/services/enabled.txt | 1 + 19 files changed, 184 insertions(+) create mode 100644 audit/projects/kubernetes-public/secrets/recaptcha/description.json create mode 100644 audit/projects/kubernetes-public/secrets/recaptcha/iam.json create mode 100644 audit/projects/kubernetes-public/secrets/recaptcha/versions.json create mode 100644 audit/projects/kubernetes-public/secrets/slack-event-log-config/description.json create mode 100644 audit/projects/kubernetes-public/secrets/slack-event-log-config/iam.json create mode 100644 audit/projects/kubernetes-public/secrets/slack-event-log-config/versions.json create mode 100644 audit/projects/kubernetes-public/secrets/slack-moderator-config/description.json create mode 100644 audit/projects/kubernetes-public/secrets/slack-moderator-config/iam.json create mode 100644 audit/projects/kubernetes-public/secrets/slack-moderator-config/versions.json create mode 100644 audit/projects/kubernetes-public/secrets/slack-welcomer-config/description.json create mode 100644 audit/projects/kubernetes-public/secrets/slack-welcomer-config/iam.json create mode 100644 audit/projects/kubernetes-public/secrets/slack-welcomer-config/versions.json create mode 100644 audit/projects/kubernetes-public/secrets/slackin-token/description.json create mode 100644 audit/projects/kubernetes-public/secrets/slackin-token/iam.json create mode 100644 audit/projects/kubernetes-public/secrets/slackin-token/versions.json create mode 100644 audit/projects/kubernetes-public/secrets/triage-party-github-token/description.json create mode 100644 audit/projects/kubernetes-public/secrets/triage-party-github-token/iam.json create mode 100644 audit/projects/kubernetes-public/secrets/triage-party-github-token/versions.json diff --git a/audit/projects/kubernetes-public/secrets/recaptcha/description.json b/audit/projects/kubernetes-public/secrets/recaptcha/description.json new file mode 100644 index 00000000000..39c4787217c --- /dev/null +++ b/audit/projects/kubernetes-public/secrets/recaptcha/description.json @@ -0,0 +1,10 @@ +{ + "createTime": "2020-05-28T03:40:25.639524Z", + "labels": { + "app": "slack-infra" + }, + "name": "projects/127754664067/secrets/recaptcha", + "replication": { + "automatic": {} + } +} diff --git a/audit/projects/kubernetes-public/secrets/recaptcha/iam.json b/audit/projects/kubernetes-public/secrets/recaptcha/iam.json new file mode 100644 index 00000000000..e7b65abc9b8 --- /dev/null +++ b/audit/projects/kubernetes-public/secrets/recaptcha/iam.json @@ -0,0 +1,11 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-rbac-slack-infra@kubernetes.io" + ], + "role": "roles/secretmanager.admin" + } + ], + "version": 1 +} diff --git a/audit/projects/kubernetes-public/secrets/recaptcha/versions.json b/audit/projects/kubernetes-public/secrets/recaptcha/versions.json new file mode 100644 index 00000000000..0731173716c --- /dev/null +++ b/audit/projects/kubernetes-public/secrets/recaptcha/versions.json @@ -0,0 +1,10 @@ +[ + { + "createTime": "2020-05-28T03:40:26.335853Z", + "name": "projects/127754664067/secrets/recaptcha/versions/1", + "replicationStatus": { + "automatic": {} + }, + "state": "ENABLED" + } +] diff --git a/audit/projects/kubernetes-public/secrets/slack-event-log-config/description.json b/audit/projects/kubernetes-public/secrets/slack-event-log-config/description.json new file mode 100644 index 00000000000..837060ef23a --- /dev/null +++ b/audit/projects/kubernetes-public/secrets/slack-event-log-config/description.json @@ -0,0 +1,10 @@ +{ + "createTime": "2020-05-28T03:40:22.230224Z", + "labels": { + "app": "slack-infra" + }, + "name": "projects/127754664067/secrets/slack-event-log-config", + "replication": { + "automatic": {} + } +} diff --git a/audit/projects/kubernetes-public/secrets/slack-event-log-config/iam.json b/audit/projects/kubernetes-public/secrets/slack-event-log-config/iam.json new file mode 100644 index 00000000000..e7b65abc9b8 --- /dev/null +++ b/audit/projects/kubernetes-public/secrets/slack-event-log-config/iam.json @@ -0,0 +1,11 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-rbac-slack-infra@kubernetes.io" + ], + "role": "roles/secretmanager.admin" + } + ], + "version": 1 +} diff --git a/audit/projects/kubernetes-public/secrets/slack-event-log-config/versions.json b/audit/projects/kubernetes-public/secrets/slack-event-log-config/versions.json new file mode 100644 index 00000000000..af914a2726e --- /dev/null +++ b/audit/projects/kubernetes-public/secrets/slack-event-log-config/versions.json @@ -0,0 +1,10 @@ +[ + { + "createTime": "2020-05-28T03:40:22.855508Z", + "name": "projects/127754664067/secrets/slack-event-log-config/versions/1", + "replicationStatus": { + "automatic": {} + }, + "state": "ENABLED" + } +] diff --git a/audit/projects/kubernetes-public/secrets/slack-moderator-config/description.json b/audit/projects/kubernetes-public/secrets/slack-moderator-config/description.json new file mode 100644 index 00000000000..670b744ce26 --- /dev/null +++ b/audit/projects/kubernetes-public/secrets/slack-moderator-config/description.json @@ -0,0 +1,10 @@ +{ + "createTime": "2020-05-28T03:40:18.073437Z", + "labels": { + "app": "slack-infra" + }, + "name": "projects/127754664067/secrets/slack-moderator-config", + "replication": { + "automatic": {} + } +} diff --git a/audit/projects/kubernetes-public/secrets/slack-moderator-config/iam.json b/audit/projects/kubernetes-public/secrets/slack-moderator-config/iam.json new file mode 100644 index 00000000000..e7b65abc9b8 --- /dev/null +++ b/audit/projects/kubernetes-public/secrets/slack-moderator-config/iam.json @@ -0,0 +1,11 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-rbac-slack-infra@kubernetes.io" + ], + "role": "roles/secretmanager.admin" + } + ], + "version": 1 +} diff --git a/audit/projects/kubernetes-public/secrets/slack-moderator-config/versions.json b/audit/projects/kubernetes-public/secrets/slack-moderator-config/versions.json new file mode 100644 index 00000000000..c8cb96d93fe --- /dev/null +++ b/audit/projects/kubernetes-public/secrets/slack-moderator-config/versions.json @@ -0,0 +1,10 @@ +[ + { + "createTime": "2020-05-28T03:40:18.876516Z", + "name": "projects/127754664067/secrets/slack-moderator-config/versions/1", + "replicationStatus": { + "automatic": {} + }, + "state": "ENABLED" + } +] diff --git a/audit/projects/kubernetes-public/secrets/slack-welcomer-config/description.json b/audit/projects/kubernetes-public/secrets/slack-welcomer-config/description.json new file mode 100644 index 00000000000..7dca4f0be7c --- /dev/null +++ b/audit/projects/kubernetes-public/secrets/slack-welcomer-config/description.json @@ -0,0 +1,10 @@ +{ + "createTime": "2020-05-28T03:40:14.323185Z", + "labels": { + "app": "slack-infra" + }, + "name": "projects/127754664067/secrets/slack-welcomer-config", + "replication": { + "automatic": {} + } +} diff --git a/audit/projects/kubernetes-public/secrets/slack-welcomer-config/iam.json b/audit/projects/kubernetes-public/secrets/slack-welcomer-config/iam.json new file mode 100644 index 00000000000..e7b65abc9b8 --- /dev/null +++ b/audit/projects/kubernetes-public/secrets/slack-welcomer-config/iam.json @@ -0,0 +1,11 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-rbac-slack-infra@kubernetes.io" + ], + "role": "roles/secretmanager.admin" + } + ], + "version": 1 +} diff --git a/audit/projects/kubernetes-public/secrets/slack-welcomer-config/versions.json b/audit/projects/kubernetes-public/secrets/slack-welcomer-config/versions.json new file mode 100644 index 00000000000..7fa43662b9d --- /dev/null +++ b/audit/projects/kubernetes-public/secrets/slack-welcomer-config/versions.json @@ -0,0 +1,10 @@ +[ + { + "createTime": "2020-05-28T03:40:15.317636Z", + "name": "projects/127754664067/secrets/slack-welcomer-config/versions/1", + "replicationStatus": { + "automatic": {} + }, + "state": "ENABLED" + } +] diff --git a/audit/projects/kubernetes-public/secrets/slackin-token/description.json b/audit/projects/kubernetes-public/secrets/slackin-token/description.json new file mode 100644 index 00000000000..5cdcf889595 --- /dev/null +++ b/audit/projects/kubernetes-public/secrets/slackin-token/description.json @@ -0,0 +1,10 @@ +{ + "createTime": "2020-05-28T03:40:30.811539Z", + "labels": { + "app": "slack-infra" + }, + "name": "projects/127754664067/secrets/slackin-token", + "replication": { + "automatic": {} + } +} diff --git a/audit/projects/kubernetes-public/secrets/slackin-token/iam.json b/audit/projects/kubernetes-public/secrets/slackin-token/iam.json new file mode 100644 index 00000000000..e7b65abc9b8 --- /dev/null +++ b/audit/projects/kubernetes-public/secrets/slackin-token/iam.json @@ -0,0 +1,11 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-rbac-slack-infra@kubernetes.io" + ], + "role": "roles/secretmanager.admin" + } + ], + "version": 1 +} diff --git a/audit/projects/kubernetes-public/secrets/slackin-token/versions.json b/audit/projects/kubernetes-public/secrets/slackin-token/versions.json new file mode 100644 index 00000000000..a81809e8d91 --- /dev/null +++ b/audit/projects/kubernetes-public/secrets/slackin-token/versions.json @@ -0,0 +1,10 @@ +[ + { + "createTime": "2020-05-28T03:40:31.541692Z", + "name": "projects/127754664067/secrets/slackin-token/versions/1", + "replicationStatus": { + "automatic": {} + }, + "state": "ENABLED" + } +] diff --git a/audit/projects/kubernetes-public/secrets/triage-party-github-token/description.json b/audit/projects/kubernetes-public/secrets/triage-party-github-token/description.json new file mode 100644 index 00000000000..72b529369c2 --- /dev/null +++ b/audit/projects/kubernetes-public/secrets/triage-party-github-token/description.json @@ -0,0 +1,7 @@ +{ + "createTime": "2020-06-25T19:14:21.868654Z", + "name": "projects/127754664067/secrets/triage-party-github-token", + "replication": { + "automatic": {} + } +} diff --git a/audit/projects/kubernetes-public/secrets/triage-party-github-token/iam.json b/audit/projects/kubernetes-public/secrets/triage-party-github-token/iam.json new file mode 100644 index 00000000000..67965024676 --- /dev/null +++ b/audit/projects/kubernetes-public/secrets/triage-party-github-token/iam.json @@ -0,0 +1,11 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-rbac-triageparty-release@kubernetes.io" + ], + "role": "roles/secretmanager.admin" + } + ], + "version": 1 +} diff --git a/audit/projects/kubernetes-public/secrets/triage-party-github-token/versions.json b/audit/projects/kubernetes-public/secrets/triage-party-github-token/versions.json new file mode 100644 index 00000000000..36b437d20c1 --- /dev/null +++ b/audit/projects/kubernetes-public/secrets/triage-party-github-token/versions.json @@ -0,0 +1,10 @@ +[ + { + "createTime": "2020-06-25T19:14:22.485364Z", + "name": "projects/127754664067/secrets/triage-party-github-token/versions/1", + "replicationStatus": { + "automatic": {} + }, + "state": "ENABLED" + } +] diff --git a/audit/projects/kubernetes-public/services/enabled.txt b/audit/projects/kubernetes-public/services/enabled.txt index 7e5825bacb8..9ff0d5e80c6 100644 --- a/audit/projects/kubernetes-public/services/enabled.txt +++ b/audit/projects/kubernetes-public/services/enabled.txt @@ -15,6 +15,7 @@ logging.googleapis.com Cloud Logging API monitoring.googleapis.com Cloud Monitoring API oslogin.googleapis.com Cloud OS Login API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API serviceusage.googleapis.com Service Usage API stackdriver.googleapis.com Stackdriver API storage-api.googleapis.com Google Cloud Storage JSON API From a4950420f766d88de6dbed251a539b4a56ba6cb9 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Thu, 14 Jan 2021 17:54:05 -0500 Subject: [PATCH 24/39] audit: bind trusted prow to k8s-infra-gcr-promoter SAs --- .../iam.json | 1 + .../iam.json | 1 + 2 files changed, 2 insertions(+) diff --git a/audit/projects/k8s-artifacts-prod-bak/service-accounts/k8s-infra-gcr-promoter@k8s-artifacts-prod-bak.iam.gserviceaccount.com/iam.json b/audit/projects/k8s-artifacts-prod-bak/service-accounts/k8s-infra-gcr-promoter@k8s-artifacts-prod-bak.iam.gserviceaccount.com/iam.json index 747724d6a18..7bf5a3f1763 100644 --- a/audit/projects/k8s-artifacts-prod-bak/service-accounts/k8s-infra-gcr-promoter@k8s-artifacts-prod-bak.iam.gserviceaccount.com/iam.json +++ b/audit/projects/k8s-artifacts-prod-bak/service-accounts/k8s-infra-gcr-promoter@k8s-artifacts-prod-bak.iam.gserviceaccount.com/iam.json @@ -2,6 +2,7 @@ "bindings": [ { "members": [ + "serviceAccount:k8s-infra-prow-build-trusted.svc.id.goog[test-pods/k8s-infra-gcr-promoter-bak]", "serviceAccount:k8s-prow.svc.id.goog[test-pods/k8s-infra-gcr-promoter-bak]" ], "role": "roles/iam.workloadIdentityUser" diff --git a/audit/projects/k8s-artifacts-prod/service-accounts/k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com/iam.json b/audit/projects/k8s-artifacts-prod/service-accounts/k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com/iam.json index 79ff2d75c38..21d6581c076 100644 --- a/audit/projects/k8s-artifacts-prod/service-accounts/k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com/iam.json +++ b/audit/projects/k8s-artifacts-prod/service-accounts/k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com/iam.json @@ -2,6 +2,7 @@ "bindings": [ { "members": [ + "serviceAccount:k8s-infra-prow-build-trusted.svc.id.goog[test-pods/k8s-infra-gcr-promoter]", "serviceAccount:k8s-prow.svc.id.goog[test-pods/k8s-infra-gcr-promoter]" ], "role": "roles/iam.workloadIdentityUser" From daf7712421285320f0359b6edd883969c6b8b83a Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Thu, 14 Jan 2021 17:59:14 -0500 Subject: [PATCH 25/39] audit: misc project quota / service rename updates specifically for: - k8s-artifacts-prod-bak - k8s-artifacts-prod - k8s-cip-test-prod - k8s-gcr-audit-test - k8s-gcr-backup-test-prod-bak - k8s-release-test-prod - k8s-staging-csi - kubernetes-public --- .../services/compute/project-info.json | 72 +++++++++++-------- .../services/compute/project-info.json | 72 +++++++++++-------- .../k8s-artifacts-prod/services/enabled.txt | 2 +- .../services/compute/project-info.json | 72 +++++++++++-------- .../services/compute/project-info.json | 72 +++++++++++-------- .../services/enabled.txt | 2 +- .../services/compute/project-info.json | 72 +++++++++++-------- .../services/compute/project-info.json | 72 +++++++++++-------- .../services/compute/project-info.json | 72 +++++++++++-------- .../services/compute/project-info.json | 14 +++- 10 files changed, 309 insertions(+), 213 deletions(-) diff --git a/audit/projects/k8s-artifacts-prod-bak/services/compute/project-info.json b/audit/projects/k8s-artifacts-prod-bak/services/compute/project-info.json index 19a275944ca..c0517dcbf4d 100644 --- a/audit/projects/k8s-artifacts-prod-bak/services/compute/project-info.json +++ b/audit/projects/k8s-artifacts-prod-bak/services/compute/project-info.json @@ -10,99 +10,99 @@ "name": "k8s-artifacts-prod-bak", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -110,15 +110,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -130,11 +130,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -142,8 +142,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-artifacts-prod-bak", diff --git a/audit/projects/k8s-artifacts-prod/services/compute/project-info.json b/audit/projects/k8s-artifacts-prod/services/compute/project-info.json index 91225265a16..e0858e1c682 100644 --- a/audit/projects/k8s-artifacts-prod/services/compute/project-info.json +++ b/audit/projects/k8s-artifacts-prod/services/compute/project-info.json @@ -10,99 +10,99 @@ "name": "k8s-artifacts-prod", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -110,15 +110,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -130,11 +130,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -142,8 +142,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-artifacts-prod", diff --git a/audit/projects/k8s-artifacts-prod/services/enabled.txt b/audit/projects/k8s-artifacts-prod/services/enabled.txt index 6affa783c95..80e8ea91d81 100644 --- a/audit/projects/k8s-artifacts-prod/services/enabled.txt +++ b/audit/projects/k8s-artifacts-prod/services/enabled.txt @@ -16,7 +16,7 @@ logging.googleapis.com Cloud Logging API monitoring.googleapis.com Cloud Monitoring API oslogin.googleapis.com Cloud OS Login API pubsub.googleapis.com Cloud Pub/Sub API -run.googleapis.com Cloud Run API +run.googleapis.com Cloud Run Admin API servicemanagement.googleapis.com Service Management API serviceusage.googleapis.com Service Usage API sql-component.googleapis.com Cloud SQL diff --git a/audit/projects/k8s-cip-test-prod/services/compute/project-info.json b/audit/projects/k8s-cip-test-prod/services/compute/project-info.json index 3791ceda65d..a00135cac00 100644 --- a/audit/projects/k8s-cip-test-prod/services/compute/project-info.json +++ b/audit/projects/k8s-cip-test-prod/services/compute/project-info.json @@ -10,99 +10,99 @@ "name": "k8s-cip-test-prod", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -110,15 +110,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -130,11 +130,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -142,8 +142,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-cip-test-prod", diff --git a/audit/projects/k8s-gcr-audit-test-prod/services/compute/project-info.json b/audit/projects/k8s-gcr-audit-test-prod/services/compute/project-info.json index 99caf565124..7d886aa982c 100644 --- a/audit/projects/k8s-gcr-audit-test-prod/services/compute/project-info.json +++ b/audit/projects/k8s-gcr-audit-test-prod/services/compute/project-info.json @@ -10,99 +10,99 @@ "name": "k8s-gcr-audit-test-prod", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -110,15 +110,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -130,11 +130,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -142,8 +142,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-gcr-audit-test-prod", diff --git a/audit/projects/k8s-gcr-audit-test-prod/services/enabled.txt b/audit/projects/k8s-gcr-audit-test-prod/services/enabled.txt index 333c911b69e..7188d49d2f1 100644 --- a/audit/projects/k8s-gcr-audit-test-prod/services/enabled.txt +++ b/audit/projects/k8s-gcr-audit-test-prod/services/enabled.txt @@ -8,7 +8,7 @@ logging.googleapis.com Cloud Logging API monitoring.googleapis.com Cloud Monitoring API oslogin.googleapis.com Cloud OS Login API pubsub.googleapis.com Cloud Pub/Sub API -run.googleapis.com Cloud Run API +run.googleapis.com Cloud Run Admin API serviceusage.googleapis.com Service Usage API stackdriver.googleapis.com Stackdriver API storage-api.googleapis.com Google Cloud Storage JSON API diff --git a/audit/projects/k8s-gcr-backup-test-prod-bak/services/compute/project-info.json b/audit/projects/k8s-gcr-backup-test-prod-bak/services/compute/project-info.json index f52ef068901..61f4bce5f01 100644 --- a/audit/projects/k8s-gcr-backup-test-prod-bak/services/compute/project-info.json +++ b/audit/projects/k8s-gcr-backup-test-prod-bak/services/compute/project-info.json @@ -10,99 +10,99 @@ "name": "k8s-gcr-backup-test-prod-bak", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -110,15 +110,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -130,11 +130,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -142,8 +142,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-gcr-backup-test-prod-bak", diff --git a/audit/projects/k8s-release-test-prod/services/compute/project-info.json b/audit/projects/k8s-release-test-prod/services/compute/project-info.json index 7e6274812b4..0299ddb4c77 100644 --- a/audit/projects/k8s-release-test-prod/services/compute/project-info.json +++ b/audit/projects/k8s-release-test-prod/services/compute/project-info.json @@ -10,99 +10,99 @@ "name": "k8s-release-test-prod", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -110,15 +110,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -130,11 +130,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -142,8 +142,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-release-test-prod", diff --git a/audit/projects/k8s-staging-csi/services/compute/project-info.json b/audit/projects/k8s-staging-csi/services/compute/project-info.json index 55481834cfa..061d820e40d 100644 --- a/audit/projects/k8s-staging-csi/services/compute/project-info.json +++ b/audit/projects/k8s-staging-csi/services/compute/project-info.json @@ -10,99 +10,99 @@ "name": "k8s-staging-csi", "quotas": [ { - "limit": 5000, + "limit": 10000, "metric": "SNAPSHOTS" }, { - "limit": 15, + "limit": 30, "metric": "NETWORKS" }, { - "limit": 200, + "limit": 500, "metric": "FIREWALLS" }, { - "limit": 2000, + "limit": 5000, "metric": "IMAGES" }, { - "limit": 21, + "limit": 175, "metric": "STATIC_ADDRESSES" }, { - "limit": 250, + "limit": 300, "metric": "ROUTES" }, { - "limit": 45, + "limit": 150, "metric": "FORWARDING_RULES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_POOLS" }, { - "limit": 150, + "limit": 500, "metric": "HEALTH_CHECKS" }, { - "limit": 69, + "limit": 575, "metric": "IN_USE_ADDRESSES" }, { - "limit": 150, + "limit": 500, "metric": "TARGET_INSTANCES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTP_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "URL_MAPS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_SERVICES" }, { - "limit": 300, + "limit": 1000, "metric": "INSTANCE_TEMPLATES" }, { - "limit": 15, + "limit": 50, "metric": "TARGET_VPN_GATEWAYS" }, { - "limit": 30, + "limit": 100, "metric": "VPN_TUNNELS" }, { - "limit": 9, + "limit": 30, "metric": "BACKEND_BUCKETS" }, { - "limit": 10, + "limit": 20, "metric": "ROUTERS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_SSL_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_HTTPS_PROXIES" }, { - "limit": 30, + "limit": 100, "metric": "SSL_CERTIFICATES" }, { - "limit": 175, + "limit": 275, "metric": "SUBNETWORKS" }, { - "limit": 30, + "limit": 100, "metric": "TARGET_TCP_PROXIES" }, { @@ -110,15 +110,15 @@ "metric": "SECURITY_POLICIES" }, { - "limit": 100, + "limit": 200, "metric": "SECURITY_POLICY_RULES" }, { - "limit": 45, + "limit": 150, "metric": "PACKET_MIRRORINGS" }, { - "limit": 300, + "limit": 1000, "metric": "NETWORK_ENDPOINT_GROUPS" }, { @@ -130,11 +130,11 @@ "metric": "GLOBAL_INTERNAL_ADDRESSES" }, { - "limit": 15, + "limit": 50, "metric": "VPN_GATEWAYS" }, { - "limit": 2000, + "limit": 5000, "metric": "MACHINE_IMAGES" }, { @@ -142,8 +142,20 @@ "metric": "SECURITY_POLICY_CEVAL_RULES" }, { - "limit": 15, + "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-staging-csi", diff --git a/audit/projects/kubernetes-public/services/compute/project-info.json b/audit/projects/kubernetes-public/services/compute/project-info.json index 32618452d8e..13e52a5a7c5 100644 --- a/audit/projects/kubernetes-public/services/compute/project-info.json +++ b/audit/projects/kubernetes-public/services/compute/project-info.json @@ -72,7 +72,7 @@ "metric": "URL_MAPS" }, { - "limit": 60, + "limit": 100, "metric": "BACKEND_SERVICES" }, { @@ -154,6 +154,18 @@ { "limit": 50, "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" } ], "selfLink": "https://www.googleapis.com/compute/v1/projects/kubernetes-public", From 7df09cef0e417e2b1da075127b30899a48579160 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Thu, 14 Jan 2021 18:00:03 -0500 Subject: [PATCH 26/39] audit: add buckets to k8s-artifacts-prod specifically: - k8s-artifacts-cri-tools - k8s-artifacts-csi - k8s-artifacts-gcslogs - k8s-artifacts-prod-vuln-dashboard --- .../bucketpolicyonly.txt | 4 ++ .../buckets/k8s-artifacts-cri-tools/cors.txt | 1 + .../buckets/k8s-artifacts-cri-tools/iam.json | 37 ++++++++++++++++ .../k8s-artifacts-cri-tools/logging.txt | 1 + .../k8s-artifacts-csi/bucketpolicyonly.txt | 4 ++ .../buckets/k8s-artifacts-csi/cors.txt | 1 + .../buckets/k8s-artifacts-csi/iam.json | 37 ++++++++++++++++ .../buckets/k8s-artifacts-csi/logging.txt | 1 + .../bucketpolicyonly.txt | 4 ++ .../buckets/k8s-artifacts-gcslogs/cors.txt | 1 + .../buckets/k8s-artifacts-gcslogs/iam.json | 44 +++++++++++++++++++ .../buckets/k8s-artifacts-gcslogs/logging.txt | 1 + .../bucketpolicyonly.txt | 4 ++ .../cors.txt | 1 + .../iam.json | 37 ++++++++++++++++ .../logging.txt | 1 + 16 files changed, 179 insertions(+) create mode 100644 audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-cri-tools/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-cri-tools/cors.txt create mode 100644 audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-cri-tools/iam.json create mode 100644 audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-cri-tools/logging.txt create mode 100644 audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-csi/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-csi/cors.txt create mode 100644 audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-csi/iam.json create mode 100644 audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-csi/logging.txt create mode 100644 audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-gcslogs/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-gcslogs/cors.txt create mode 100644 audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-gcslogs/iam.json create mode 100644 audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-gcslogs/logging.txt create mode 100644 audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-prod-vuln-dashboard/bucketpolicyonly.txt create mode 100644 audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-prod-vuln-dashboard/cors.txt create mode 100644 audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-prod-vuln-dashboard/iam.json create mode 100644 audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-prod-vuln-dashboard/logging.txt diff --git a/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-cri-tools/bucketpolicyonly.txt b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-cri-tools/bucketpolicyonly.txt new file mode 100644 index 00000000000..1d9b26d9298 --- /dev/null +++ b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-cri-tools/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-artifacts-cri-tools: + Enabled: True + LockedTime: 2020-08-26 18:32:05.672000+00:00 + diff --git a/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-cri-tools/cors.txt b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-cri-tools/cors.txt new file mode 100644 index 00000000000..90482e7c430 --- /dev/null +++ b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-cri-tools/cors.txt @@ -0,0 +1 @@ +gs://k8s-artifacts-cri-tools/ has no CORS configuration. diff --git a/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-cri-tools/iam.json b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-cri-tools/iam.json new file mode 100644 index 00000000000..1cd8f6c389d --- /dev/null +++ b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-cri-tools/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-artifacts-prod", + "projectOwner:k8s-artifacts-prod" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-artifacts-prod" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-push-cri-tools@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-push-cri-tools@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-cri-tools/logging.txt b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-cri-tools/logging.txt new file mode 100644 index 00000000000..8f59700009f --- /dev/null +++ b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-cri-tools/logging.txt @@ -0,0 +1 @@ +gs://k8s-artifacts-cri-tools/ has no logging configuration. diff --git a/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-csi/bucketpolicyonly.txt b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-csi/bucketpolicyonly.txt new file mode 100644 index 00000000000..71186adbccf --- /dev/null +++ b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-csi/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-artifacts-csi: + Enabled: True + LockedTime: 2020-08-26 12:51:59.575000+00:00 + diff --git a/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-csi/cors.txt b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-csi/cors.txt new file mode 100644 index 00000000000..e58056eb3be --- /dev/null +++ b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-csi/cors.txt @@ -0,0 +1 @@ +gs://k8s-artifacts-csi/ has no CORS configuration. diff --git a/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-csi/iam.json b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-csi/iam.json new file mode 100644 index 00000000000..5cf037aea8d --- /dev/null +++ b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-csi/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-artifacts-prod", + "projectOwner:k8s-artifacts-prod" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-artifacts-prod" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:k8s-infra-push-csi@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-push-csi@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-csi/logging.txt b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-csi/logging.txt new file mode 100644 index 00000000000..dfcb23020fe --- /dev/null +++ b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-csi/logging.txt @@ -0,0 +1 @@ +gs://k8s-artifacts-csi/ has no logging configuration. diff --git a/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-gcslogs/bucketpolicyonly.txt b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-gcslogs/bucketpolicyonly.txt new file mode 100644 index 00000000000..56dabbb50ab --- /dev/null +++ b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-gcslogs/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-artifacts-gcslogs: + Enabled: True + LockedTime: 2020-10-21 17:33:09.316000+00:00 + diff --git a/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-gcslogs/cors.txt b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-gcslogs/cors.txt new file mode 100644 index 00000000000..8ec81370b6c --- /dev/null +++ b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-gcslogs/cors.txt @@ -0,0 +1 @@ +gs://k8s-artifacts-gcslogs/ has no CORS configuration. diff --git a/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-gcslogs/iam.json b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-gcslogs/iam.json new file mode 100644 index 00000000000..1de2c23f86d --- /dev/null +++ b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-gcslogs/iam.json @@ -0,0 +1,44 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-artifacts-prod", + "projectOwner:k8s-artifacts-prod" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-artifacts-prod" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "group:cloud-storage-analytics@google.com" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "projectEditor:k8s-artifacts-prod", + "projectOwner:k8s-artifacts-prod" + ], + "role": "roles/storage.legacyObjectOwner" + }, + { + "members": [ + "projectViewer:k8s-artifacts-prod" + ], + "role": "roles/storage.legacyObjectReader" + }, + { + "members": [ + "group:cloud-storage-analytics@google.com", + "group:k8s-infra-artifact-admins@kubernetes.io" + ], + "role": "roles/storage.objectAdmin" + } + ] +} diff --git a/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-gcslogs/logging.txt b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-gcslogs/logging.txt new file mode 100644 index 00000000000..3e9376b42ba --- /dev/null +++ b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-gcslogs/logging.txt @@ -0,0 +1 @@ +gs://k8s-artifacts-gcslogs/ has no logging configuration. diff --git a/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-prod-vuln-dashboard/bucketpolicyonly.txt b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-prod-vuln-dashboard/bucketpolicyonly.txt new file mode 100644 index 00000000000..1bef307b464 --- /dev/null +++ b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-prod-vuln-dashboard/bucketpolicyonly.txt @@ -0,0 +1,4 @@ +Bucket Policy Only setting for gs://k8s-artifacts-prod-vuln-dashboard: + Enabled: True + LockedTime: 2020-11-10 20:06:45.035000+00:00 + diff --git a/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-prod-vuln-dashboard/cors.txt b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-prod-vuln-dashboard/cors.txt new file mode 100644 index 00000000000..00bb6596917 --- /dev/null +++ b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-prod-vuln-dashboard/cors.txt @@ -0,0 +1 @@ +gs://k8s-artifacts-prod-vuln-dashboard/ has no CORS configuration. diff --git a/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-prod-vuln-dashboard/iam.json b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-prod-vuln-dashboard/iam.json new file mode 100644 index 00000000000..605ba04f247 --- /dev/null +++ b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-prod-vuln-dashboard/iam.json @@ -0,0 +1,37 @@ +{ + "bindings": [ + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "projectEditor:k8s-artifacts-prod", + "projectOwner:k8s-artifacts-prod" + ], + "role": "roles/storage.legacyBucketOwner" + }, + { + "members": [ + "projectViewer:k8s-artifacts-prod" + ], + "role": "roles/storage.legacyBucketReader" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-dashboard@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "serviceAccount:k8s-infra-gcr-vuln-dashboard@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/storage.objectAdmin" + }, + { + "members": [ + "allUsers" + ], + "role": "roles/storage.objectViewer" + } + ] +} diff --git a/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-prod-vuln-dashboard/logging.txt b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-prod-vuln-dashboard/logging.txt new file mode 100644 index 00000000000..143f3380eb6 --- /dev/null +++ b/audit/projects/k8s-artifacts-prod/buckets/k8s-artifacts-prod-vuln-dashboard/logging.txt @@ -0,0 +1 @@ +gs://k8s-artifacts-prod-vuln-dashboard/ has no logging configuration. From de8ae62d13ab9afa9f58c8444272235dc0404b7f Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Thu, 14 Jan 2021 18:03:23 -0500 Subject: [PATCH 27/39] audit: add k8s-artifacts-prod/k8s-infra-gcr-vuln-dashboard SA --- audit/projects/k8s-artifacts-prod/iam.json | 3 ++- .../description.json | 8 ++++++++ .../iam.json | 12 ++++++++++++ 3 files changed, 22 insertions(+), 1 deletion(-) create mode 100644 audit/projects/k8s-artifacts-prod/service-accounts/k8s-infra-gcr-vuln-dashboard@k8s-artifacts-prod.iam.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-artifacts-prod/service-accounts/k8s-infra-gcr-vuln-dashboard@k8s-artifacts-prod.iam.gserviceaccount.com/iam.json diff --git a/audit/projects/k8s-artifacts-prod/iam.json b/audit/projects/k8s-artifacts-prod/iam.json index 1f89e3cec92..93c6c2bf52e 100644 --- a/audit/projects/k8s-artifacts-prod/iam.json +++ b/audit/projects/k8s-artifacts-prod/iam.json @@ -14,7 +14,8 @@ }, { "members": [ - "group:k8s-infra-artifact-security@kubernetes.io" + "group:k8s-infra-artifact-security@kubernetes.io", + "serviceAccount:k8s-infra-gcr-vuln-dashboard@k8s-artifacts-prod.iam.gserviceaccount.com" ], "role": "roles/containeranalysis.occurrences.viewer" }, diff --git a/audit/projects/k8s-artifacts-prod/service-accounts/k8s-infra-gcr-vuln-dashboard@k8s-artifacts-prod.iam.gserviceaccount.com/description.json b/audit/projects/k8s-artifacts-prod/service-accounts/k8s-infra-gcr-vuln-dashboard@k8s-artifacts-prod.iam.gserviceaccount.com/description.json new file mode 100644 index 00000000000..aeb4bb79d67 --- /dev/null +++ b/audit/projects/k8s-artifacts-prod/service-accounts/k8s-infra-gcr-vuln-dashboard@k8s-artifacts-prod.iam.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "k8s-infra container image vuln dashboard", + "email": "k8s-infra-gcr-vuln-dashboard@k8s-artifacts-prod.iam.gserviceaccount.com", + "name": "projects/k8s-artifacts-prod/serviceAccounts/k8s-infra-gcr-vuln-dashboard@k8s-artifacts-prod.iam.gserviceaccount.com", + "oauth2ClientId": "114106329282535755089", + "projectId": "k8s-artifacts-prod", + "uniqueId": "114106329282535755089" +} diff --git a/audit/projects/k8s-artifacts-prod/service-accounts/k8s-infra-gcr-vuln-dashboard@k8s-artifacts-prod.iam.gserviceaccount.com/iam.json b/audit/projects/k8s-artifacts-prod/service-accounts/k8s-infra-gcr-vuln-dashboard@k8s-artifacts-prod.iam.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..e29b35ba92f --- /dev/null +++ b/audit/projects/k8s-artifacts-prod/service-accounts/k8s-infra-gcr-vuln-dashboard@k8s-artifacts-prod.iam.gserviceaccount.com/iam.json @@ -0,0 +1,12 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:k8s-infra-prow-build-trusted.svc.id.goog[test-pods/k8s-infra-gcr-vuln-dashboard]", + "serviceAccount:k8s-prow.svc.id.goog[test-pods/k8s-infra-gcr-vuln-dashboard]" + ], + "role": "roles/iam.workloadIdentityUser" + } + ], + "version": 1 +} From 2c1fae708c8eac09be64f67cd217c48586ce0e35 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Thu, 14 Jan 2021 18:07:00 -0500 Subject: [PATCH 28/39] audit: add k8s-artifacts-prod/k8s-infra-gcr-vuln-scanning SA --- .../description.json | 8 ++++++++ .../iam.json | 12 ++++++++++++ 2 files changed, 20 insertions(+) create mode 100644 audit/projects/k8s-artifacts-prod/service-accounts/k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-artifacts-prod/service-accounts/k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com/iam.json diff --git a/audit/projects/k8s-artifacts-prod/service-accounts/k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com/description.json b/audit/projects/k8s-artifacts-prod/service-accounts/k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com/description.json new file mode 100644 index 00000000000..1be3c2e96ed --- /dev/null +++ b/audit/projects/k8s-artifacts-prod/service-accounts/k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "k8s-infra container image vuln scanning", + "email": "k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com", + "name": "projects/k8s-artifacts-prod/serviceAccounts/k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com", + "oauth2ClientId": "103732893420777575450", + "projectId": "k8s-artifacts-prod", + "uniqueId": "103732893420777575450" +} diff --git a/audit/projects/k8s-artifacts-prod/service-accounts/k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com/iam.json b/audit/projects/k8s-artifacts-prod/service-accounts/k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..c01fcecda77 --- /dev/null +++ b/audit/projects/k8s-artifacts-prod/service-accounts/k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com/iam.json @@ -0,0 +1,12 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:k8s-infra-prow-build-trusted.svc.id.goog[test-pods/k8s-infra-gcr-vuln-scanning]", + "serviceAccount:k8s-prow.svc.id.goog[test-pods/k8s-infra-gcr-vuln-scanning]" + ], + "role": "roles/iam.workloadIdentityUser" + } + ], + "version": 1 +} From 9944317184963f42c4bbceb1811a544fcd3261f5 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Thu, 14 Jan 2021 18:07:41 -0500 Subject: [PATCH 29/39] audit: allow prow-build to write to k8s-release-test-prod bucket TODO: shouldn't this be trusted prow? --- .../buckets/k8s-release-test-prod-gcb/iam.json | 6 ++++-- .../buckets/k8s-release-test-prod/iam.json | 6 ++++-- 2 files changed, 8 insertions(+), 4 deletions(-) diff --git a/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod-gcb/iam.json b/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod-gcb/iam.json index 627481068d9..2e0ccc05af5 100644 --- a/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod-gcb/iam.json +++ b/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod-gcb/iam.json @@ -19,7 +19,8 @@ { "members": [ "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io" + "group:k8s-infra-release-editors@kubernetes.io", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" ], "role": "roles/storage.legacyBucketWriter" }, @@ -27,7 +28,8 @@ "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io" + "group:k8s-infra-release-editors@kubernetes.io", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" ], "role": "roles/storage.objectAdmin" }, diff --git a/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod/iam.json b/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod/iam.json index 43d7bcfdc10..fd87050fc3b 100644 --- a/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod/iam.json +++ b/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod/iam.json @@ -21,7 +21,8 @@ "members": [ "group:k8s-infra-release-admins@kubernetes.io", "group:k8s-infra-release-editors@kubernetes.io", - "serviceAccount:615281671549@cloudbuild.gserviceaccount.com" + "serviceAccount:615281671549@cloudbuild.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" ], "role": "roles/storage.legacyBucketWriter" }, @@ -30,7 +31,8 @@ "group:k8s-infra-artifact-admins@kubernetes.io", "group:k8s-infra-release-admins@kubernetes.io", "group:k8s-infra-release-editors@kubernetes.io", - "serviceAccount:615281671549@cloudbuild.gserviceaccount.com" + "serviceAccount:615281671549@cloudbuild.gserviceaccount.com", + "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" ], "role": "roles/storage.objectAdmin" }, From 490c7c3ea2774600a77d9aff2e98ab025b8662d6 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Thu, 14 Jan 2021 18:15:29 -0500 Subject: [PATCH 30/39] audit: add kubernetes-public/k8s-infra-monitoring-viewer SA --- .../description.json | 8 ++++++++ .../iam.json | 11 +++++++++++ 2 files changed, 19 insertions(+) create mode 100644 audit/projects/kubernetes-public/service-accounts/k8s-infra-monitoring-viewer@kubernetes-public.iam.gserviceaccount.com/description.json create mode 100644 audit/projects/kubernetes-public/service-accounts/k8s-infra-monitoring-viewer@kubernetes-public.iam.gserviceaccount.com/iam.json diff --git a/audit/projects/kubernetes-public/service-accounts/k8s-infra-monitoring-viewer@kubernetes-public.iam.gserviceaccount.com/description.json b/audit/projects/kubernetes-public/service-accounts/k8s-infra-monitoring-viewer@kubernetes-public.iam.gserviceaccount.com/description.json new file mode 100644 index 00000000000..d00f34e95b6 --- /dev/null +++ b/audit/projects/kubernetes-public/service-accounts/k8s-infra-monitoring-viewer@kubernetes-public.iam.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "k8s-infra monitoring viewer", + "email": "k8s-infra-monitoring-viewer@kubernetes-public.iam.gserviceaccount.com", + "name": "projects/kubernetes-public/serviceAccounts/k8s-infra-monitoring-viewer@kubernetes-public.iam.gserviceaccount.com", + "oauth2ClientId": "109438172956774474706", + "projectId": "kubernetes-public", + "uniqueId": "109438172956774474706" +} diff --git a/audit/projects/kubernetes-public/service-accounts/k8s-infra-monitoring-viewer@kubernetes-public.iam.gserviceaccount.com/iam.json b/audit/projects/kubernetes-public/service-accounts/k8s-infra-monitoring-viewer@kubernetes-public.iam.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..55ff3d2669f --- /dev/null +++ b/audit/projects/kubernetes-public/service-accounts/k8s-infra-monitoring-viewer@kubernetes-public.iam.gserviceaccount.com/iam.json @@ -0,0 +1,11 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:kubernetes-public.svc.id.goog[monitoring/k8s-infra-monitoring-viewer]" + ], + "role": "roles/iam.workloadIdentityUser" + } + ], + "version": 1 +} From c4c488d0f4a4e0f872a07d4e092aa0a48f0bdcef Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Thu, 14 Jan 2021 18:16:00 -0500 Subject: [PATCH 31/39] audit: add kubernetes-public/k8s-infra-dns-updater SA --- .../description.json | 8 ++++++++ .../iam.json | 11 +++++++++++ 2 files changed, 19 insertions(+) create mode 100644 audit/projects/kubernetes-public/service-accounts/k8s-infra-dns-updater@kubernetes-public.iam.gserviceaccount.com/description.json create mode 100644 audit/projects/kubernetes-public/service-accounts/k8s-infra-dns-updater@kubernetes-public.iam.gserviceaccount.com/iam.json diff --git a/audit/projects/kubernetes-public/service-accounts/k8s-infra-dns-updater@kubernetes-public.iam.gserviceaccount.com/description.json b/audit/projects/kubernetes-public/service-accounts/k8s-infra-dns-updater@kubernetes-public.iam.gserviceaccount.com/description.json new file mode 100644 index 00000000000..d1d2ce0501e --- /dev/null +++ b/audit/projects/kubernetes-public/service-accounts/k8s-infra-dns-updater@kubernetes-public.iam.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "k8s-infra dns updater", + "email": "k8s-infra-dns-updater@kubernetes-public.iam.gserviceaccount.com", + "name": "projects/kubernetes-public/serviceAccounts/k8s-infra-dns-updater@kubernetes-public.iam.gserviceaccount.com", + "oauth2ClientId": "103924646831481972185", + "projectId": "kubernetes-public", + "uniqueId": "103924646831481972185" +} diff --git a/audit/projects/kubernetes-public/service-accounts/k8s-infra-dns-updater@kubernetes-public.iam.gserviceaccount.com/iam.json b/audit/projects/kubernetes-public/service-accounts/k8s-infra-dns-updater@kubernetes-public.iam.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..116bb7a0950 --- /dev/null +++ b/audit/projects/kubernetes-public/service-accounts/k8s-infra-dns-updater@kubernetes-public.iam.gserviceaccount.com/iam.json @@ -0,0 +1,11 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:k8s-infra-prow-build-trusted.svc.id.goog[test-pods/k8s-infra-dns-updater]" + ], + "role": "roles/iam.workloadIdentityUser" + } + ], + "version": 1 +} From 7d31f1f359fe6ce33d492801f854952358300c7a Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Thu, 14 Jan 2021 18:13:34 -0500 Subject: [PATCH 32/39] audit: add k8s.dev, kubernetes.dev DNS to kubernetes-public --- .../kubernetes-public/services/dns/info.json | 1 + .../kubernetes-public/services/dns/zones.json | 60 +++++++++++++++++++ 2 files changed, 61 insertions(+) diff --git a/audit/projects/kubernetes-public/services/dns/info.json b/audit/projects/kubernetes-public/services/dns/info.json index 791d82f6126..e5db729d3b4 100644 --- a/audit/projects/kubernetes-public/services/dns/info.json +++ b/audit/projects/kubernetes-public/services/dns/info.json @@ -4,6 +4,7 @@ "number": "127754664067", "quota": { "dnsKeysPerManagedZone": 4, + "gkeClustersPerPolicy": 100, "kind": "dns#quota", "managedZones": 10000, "managedZonesPerNetwork": 10000, diff --git a/audit/projects/kubernetes-public/services/dns/zones.json b/audit/projects/kubernetes-public/services/dns/zones.json index 0ae0bff04ee..264b74f317a 100644 --- a/audit/projects/kubernetes-public/services/dns/zones.json +++ b/audit/projects/kubernetes-public/services/dns/zones.json @@ -1,4 +1,19 @@ [ + { + "creationTime": "2020-08-02T19:14:51.493Z", + "description": "", + "dnsName": "canary.k8s.dev.", + "id": "501734107680635861", + "kind": "dns#managedZone", + "name": "canary-k8s-dev", + "nameServers": [ + "ns-cloud-d1.googledomains.com.", + "ns-cloud-d2.googledomains.com.", + "ns-cloud-d3.googledomains.com.", + "ns-cloud-d4.googledomains.com." + ], + "visibility": "public" + }, { "creationTime": "2019-12-30T21:58:29.800Z", "description": "", @@ -29,6 +44,21 @@ ], "visibility": "public" }, + { + "creationTime": "2020-08-02T19:15:15.001Z", + "description": "", + "dnsName": "canary.kubernetes.dev.", + "id": "5739799102251818894", + "kind": "dns#managedZone", + "name": "canary-kubernetes-dev", + "nameServers": [ + "ns-cloud-c1.googledomains.com.", + "ns-cloud-c2.googledomains.com.", + "ns-cloud-c3.googledomains.com.", + "ns-cloud-c4.googledomains.com." + ], + "visibility": "public" + }, { "creationTime": "2018-10-09T16:19:40.004Z", "description": "", @@ -59,6 +89,21 @@ ], "visibility": "public" }, + { + "creationTime": "2020-08-02T19:13:48.289Z", + "description": "", + "dnsName": "k8s.dev.", + "id": "7461758730733311602", + "kind": "dns#managedZone", + "name": "k8s-dev", + "nameServers": [ + "ns-cloud-a1.googledomains.com.", + "ns-cloud-a2.googledomains.com.", + "ns-cloud-a3.googledomains.com.", + "ns-cloud-a4.googledomains.com." + ], + "visibility": "public" + }, { "creationTime": "2019-12-22T23:50:04.476Z", "description": "", @@ -108,6 +153,21 @@ ], "visibility": "public" }, + { + "creationTime": "2020-08-02T19:14:22.451Z", + "description": "", + "dnsName": "kubernetes.dev.", + "id": "1230438774305672617", + "kind": "dns#managedZone", + "name": "kubernetes-dev", + "nameServers": [ + "ns-cloud-b1.googledomains.com.", + "ns-cloud-b2.googledomains.com.", + "ns-cloud-b3.googledomains.com.", + "ns-cloud-b4.googledomains.com." + ], + "visibility": "public" + }, { "creationTime": "2018-09-06T16:58:36.444Z", "description": "", From 0146a9e926c3165d5579877989d064ee61421eda Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Thu, 14 Jan 2021 18:08:50 -0500 Subject: [PATCH 33/39] audit: FIX disable/delete k8s-staging-csi gke cluster --- audit/projects/k8s-staging-csi/iam.json | 18 ++++++++++++++++++ .../services/container/clusters.txt | 0 .../k8s-staging-csi/services/enabled.txt | 4 +++- 3 files changed, 21 insertions(+), 1 deletion(-) delete mode 100644 audit/projects/k8s-staging-csi/services/container/clusters.txt diff --git a/audit/projects/k8s-staging-csi/iam.json b/audit/projects/k8s-staging-csi/iam.json index 52b5e1bd712..29a76a61c63 100644 --- a/audit/projects/k8s-staging-csi/iam.json +++ b/audit/projects/k8s-staging-csi/iam.json @@ -32,6 +32,24 @@ ], "role": "roles/container.serviceAgent" }, + { + "members": [ + "serviceAccount:service-874328413592@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-874328413592@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:874328413592-compute@developer.gserviceaccount.com", diff --git a/audit/projects/k8s-staging-csi/services/container/clusters.txt b/audit/projects/k8s-staging-csi/services/container/clusters.txt deleted file mode 100644 index e69de29bb2d..00000000000 diff --git a/audit/projects/k8s-staging-csi/services/enabled.txt b/audit/projects/k8s-staging-csi/services/enabled.txt index 807a624ad65..7733926c054 100644 --- a/audit/projects/k8s-staging-csi/services/enabled.txt +++ b/audit/projects/k8s-staging-csi/services/enabled.txt @@ -8,8 +8,9 @@ clouddebugger.googleapis.com Cloud Debugger API cloudkms.googleapis.com Cloud Key Management Service (KMS) API cloudtrace.googleapis.com Cloud Trace API compute.googleapis.com Compute Engine API -container.googleapis.com Kubernetes Engine API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API datastore.googleapis.com Cloud Datastore API iam.googleapis.com Identity and Access Management (IAM) API iamcredentials.googleapis.com IAM Service Account Credentials API @@ -17,6 +18,7 @@ logging.googleapis.com Cloud Logging API monitoring.googleapis.com Cloud Monitoring API oslogin.googleapis.com Cloud OS Login API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API servicemanagement.googleapis.com Service Management API serviceusage.googleapis.com Service Usage API sql-component.googleapis.com Cloud SQL From cf5f5e3360c76e660e0af8be25059e0b9d732339 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Thu, 14 Jan 2021 18:10:34 -0500 Subject: [PATCH 34/39] audit: QQ k8s-staging-artifact-promoter: why is compute enabled TODO: I don't think compute should be enabled for any staging projects --- .../k8s-staging-artifact-promoter/iam.json | 26 +++ .../description.json | 8 + .../iam.json | 1 + .../services/compute/project-info.json | 163 ++++++++++++++++++ .../services/enabled.txt | 5 + 5 files changed, 203 insertions(+) create mode 100644 audit/projects/k8s-staging-artifact-promoter/service-accounts/675573440409-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-staging-artifact-promoter/service-accounts/675573440409-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-staging-artifact-promoter/services/compute/project-info.json diff --git a/audit/projects/k8s-staging-artifact-promoter/iam.json b/audit/projects/k8s-staging-artifact-promoter/iam.json index 09b20857dc9..b4a5bf11f51 100644 --- a/audit/projects/k8s-staging-artifact-promoter/iam.json +++ b/audit/projects/k8s-staging-artifact-promoter/iam.json @@ -22,6 +22,32 @@ }, { "members": [ + "serviceAccount:service-675573440409@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-675573440409@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-675573440409@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, + { + "members": [ + "serviceAccount:675573440409-compute@developer.gserviceaccount.com", + "serviceAccount:675573440409@cloudservices.gserviceaccount.com", "serviceAccount:service-675573440409@containerregistry.iam.gserviceaccount.com" ], "role": "roles/editor" diff --git a/audit/projects/k8s-staging-artifact-promoter/service-accounts/675573440409-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-staging-artifact-promoter/service-accounts/675573440409-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..431d2eed1e4 --- /dev/null +++ b/audit/projects/k8s-staging-artifact-promoter/service-accounts/675573440409-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "675573440409-compute@developer.gserviceaccount.com", + "name": "projects/k8s-staging-artifact-promoter/serviceAccounts/675573440409-compute@developer.gserviceaccount.com", + "oauth2ClientId": "108245092545964877064", + "projectId": "k8s-staging-artifact-promoter", + "uniqueId": "108245092545964877064" +} diff --git a/audit/projects/k8s-staging-artifact-promoter/service-accounts/675573440409-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-staging-artifact-promoter/service-accounts/675573440409-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-staging-artifact-promoter/service-accounts/675573440409-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-staging-artifact-promoter/services/compute/project-info.json b/audit/projects/k8s-staging-artifact-promoter/services/compute/project-info.json new file mode 100644 index 00000000000..baed8ea9fda --- /dev/null +++ b/audit/projects/k8s-staging-artifact-promoter/services/compute/project-info.json @@ -0,0 +1,163 @@ +{ + "commonInstanceMetadata": { + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-05-06T21:55:38.693-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "675573440409-compute@developer.gserviceaccount.com", + "id": "1279192389912504869", + "kind": "compute#project", + "name": "k8s-staging-artifact-promoter", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-staging-artifact-promoter", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-staging-artifact-promoter/services/enabled.txt b/audit/projects/k8s-staging-artifact-promoter/services/enabled.txt index 36a6900078a..661451636fa 100644 --- a/audit/projects/k8s-staging-artifact-promoter/services/enabled.txt +++ b/audit/projects/k8s-staging-artifact-promoter/services/enabled.txt @@ -1,8 +1,13 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +compute.googleapis.com Compute Engine API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API +oslogin.googleapis.com Cloud OS Login API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage From d50b705c43f57ec53b61bbaf8e16d09936db268d Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Thu, 14 Jan 2021 18:11:14 -0500 Subject: [PATCH 35/39] audit: QQ k8s-staging-capi-docker: why is dns enabled TODO: I don't think staging projects should have dns enabled --- .../projects/k8s-staging-capi-docker/iam.json | 18 +++++++ .../services/dns/info.json | 54 +++++++++++++++++++ .../services/dns/zones.json | 1 + .../services/enabled.txt | 4 ++ 4 files changed, 77 insertions(+) create mode 100644 audit/projects/k8s-staging-capi-docker/services/dns/info.json create mode 100644 audit/projects/k8s-staging-capi-docker/services/dns/zones.json diff --git a/audit/projects/k8s-staging-capi-docker/iam.json b/audit/projects/k8s-staging-capi-docker/iam.json index 9c71f631150..f824bcccc04 100644 --- a/audit/projects/k8s-staging-capi-docker/iam.json +++ b/audit/projects/k8s-staging-capi-docker/iam.json @@ -20,6 +20,24 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-44019431644@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, + { + "members": [ + "serviceAccount:service-44019431644@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, { "members": [ "serviceAccount:service-44019431644@containerregistry.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-capi-docker/services/dns/info.json b/audit/projects/k8s-staging-capi-docker/services/dns/info.json new file mode 100644 index 00000000000..33889210947 --- /dev/null +++ b/audit/projects/k8s-staging-capi-docker/services/dns/info.json @@ -0,0 +1,54 @@ +{ + "id": "k8s-staging-capi-docker", + "kind": "dns#project", + "number": "44019431644", + "quota": { + "dnsKeysPerManagedZone": 4, + "gkeClustersPerPolicy": 100, + "kind": "dns#quota", + "managedZones": 10000, + "managedZonesPerNetwork": 10000, + "networksPerManagedZone": 100, + "networksPerPolicy": 100, + "policies": 100, + "resourceRecordsPerRrset": 100, + "rrsetAdditionsPerChange": 1000, + "rrsetDeletionsPerChange": 1000, + "rrsetsPerManagedZone": 10000, + "targetNameServersPerManagedZone": 50, + "targetNameServersPerPolicy": 50, + "totalRrdataSizePerChange": 100000, + "whitelistedKeySpecs": [ + { + "algorithm": "ecdsap256sha256", + "kind": "dns#dnsKeySpec" + }, + { + "algorithm": "ecdsap384sha384", + "kind": "dns#dnsKeySpec" + }, + { + "algorithm": "rsasha256", + "keyLength": 2048, + "kind": "dns#dnsKeySpec" + }, + { + "algorithm": "rsasha256", + "keyLength": 1024, + "keyType": "zoneSigning", + "kind": "dns#dnsKeySpec" + }, + { + "algorithm": "rsasha512", + "keyLength": 2048, + "kind": "dns#dnsKeySpec" + }, + { + "algorithm": "rsasha512", + "keyLength": 1024, + "keyType": "zoneSigning", + "kind": "dns#dnsKeySpec" + } + ] + } +} diff --git a/audit/projects/k8s-staging-capi-docker/services/dns/zones.json b/audit/projects/k8s-staging-capi-docker/services/dns/zones.json new file mode 100644 index 00000000000..fe51488c706 --- /dev/null +++ b/audit/projects/k8s-staging-capi-docker/services/dns/zones.json @@ -0,0 +1 @@ +[] diff --git a/audit/projects/k8s-staging-capi-docker/services/enabled.txt b/audit/projects/k8s-staging-capi-docker/services/enabled.txt index 36a6900078a..d890cc70851 100644 --- a/audit/projects/k8s-staging-capi-docker/services/enabled.txt +++ b/audit/projects/k8s-staging-capi-docker/services/enabled.txt @@ -1,8 +1,12 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API +dns.googleapis.com Cloud DNS API logging.googleapis.com Cloud Logging API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage From 8b856629e104ac40d36a362ff674f25301162994 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Thu, 14 Jan 2021 18:12:42 -0500 Subject: [PATCH 36/39] audit: QQ k8s-staging-e2e-test-images: why are all these services enabled? TODO: I don't think bigquery, compute, iam, monitoring or oslogin should be enabled for staging projects --- .../k8s-staging-e2e-test-images/iam.json | 38 ++++ .../description.json | 8 + .../iam.json | 1 + .../services/bigquery/bigquery.datasets.json | 0 .../services/compute/project-info.json | 163 ++++++++++++++++++ .../services/container/clusters.txt | 0 .../services/enabled.txt | 11 ++ 7 files changed, 221 insertions(+) create mode 100644 audit/projects/k8s-staging-e2e-test-images/service-accounts/456067983721-compute@developer.gserviceaccount.com/description.json create mode 100644 audit/projects/k8s-staging-e2e-test-images/service-accounts/456067983721-compute@developer.gserviceaccount.com/iam.json create mode 100644 audit/projects/k8s-staging-e2e-test-images/services/bigquery/bigquery.datasets.json create mode 100644 audit/projects/k8s-staging-e2e-test-images/services/compute/project-info.json create mode 100644 audit/projects/k8s-staging-e2e-test-images/services/container/clusters.txt diff --git a/audit/projects/k8s-staging-e2e-test-images/iam.json b/audit/projects/k8s-staging-e2e-test-images/iam.json index a6809e7332a..0bd0c1b0322 100644 --- a/audit/projects/k8s-staging-e2e-test-images/iam.json +++ b/audit/projects/k8s-staging-e2e-test-images/iam.json @@ -20,10 +20,42 @@ ], "role": "roles/cloudbuild.serviceAgent" }, + { + "members": [ + "serviceAccount:service-456067983721@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-456067983721@container-analysis.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" + ], + "role": "roles/containeranalysis.occurrences.viewer" + }, { "members": [ "serviceAccount:service-456067983721@containerregistry.iam.gserviceaccount.com" ], + "role": "roles/containerregistry.ServiceAgent" + }, + { + "members": [ + "serviceAccount:service-456067983721@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" + }, + { + "members": [ + "serviceAccount:456067983721-compute@developer.gserviceaccount.com", + "serviceAccount:456067983721@cloudservices.gserviceaccount.com", + "serviceAccount:service-456067983721@containerregistry.iam.gserviceaccount.com" + ], "role": "roles/editor" }, { @@ -32,6 +64,12 @@ ], "role": "roles/owner" }, + { + "members": [ + "serviceAccount:456067983721@cloudbuild.gserviceaccount.com" + ], + "role": "roles/secretmanager.secretAccessor" + }, { "members": [ "group:k8s-infra-staging-e2e-test-images@kubernetes.io" diff --git a/audit/projects/k8s-staging-e2e-test-images/service-accounts/456067983721-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-staging-e2e-test-images/service-accounts/456067983721-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 00000000000..fff3c83ac5f --- /dev/null +++ b/audit/projects/k8s-staging-e2e-test-images/service-accounts/456067983721-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Compute Engine default service account", + "email": "456067983721-compute@developer.gserviceaccount.com", + "name": "projects/k8s-staging-e2e-test-images/serviceAccounts/456067983721-compute@developer.gserviceaccount.com", + "oauth2ClientId": "105757215920619059969", + "projectId": "k8s-staging-e2e-test-images", + "uniqueId": "105757215920619059969" +} diff --git a/audit/projects/k8s-staging-e2e-test-images/service-accounts/456067983721-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-staging-e2e-test-images/service-accounts/456067983721-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/k8s-staging-e2e-test-images/service-accounts/456067983721-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-staging-e2e-test-images/services/bigquery/bigquery.datasets.json b/audit/projects/k8s-staging-e2e-test-images/services/bigquery/bigquery.datasets.json new file mode 100644 index 00000000000..e69de29bb2d diff --git a/audit/projects/k8s-staging-e2e-test-images/services/compute/project-info.json b/audit/projects/k8s-staging-e2e-test-images/services/compute/project-info.json new file mode 100644 index 00000000000..1b856d55781 --- /dev/null +++ b/audit/projects/k8s-staging-e2e-test-images/services/compute/project-info.json @@ -0,0 +1,163 @@ +{ + "commonInstanceMetadata": { + "kind": "compute#metadata" + }, + "creationTimestamp": "2020-05-13T12:40:53.841-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "456067983721-compute@developer.gserviceaccount.com", + "id": "2870902180273058730", + "kind": "compute#project", + "name": "k8s-staging-e2e-test-images", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-staging-e2e-test-images", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-staging-e2e-test-images/services/container/clusters.txt b/audit/projects/k8s-staging-e2e-test-images/services/container/clusters.txt new file mode 100644 index 00000000000..e69de29bb2d diff --git a/audit/projects/k8s-staging-e2e-test-images/services/enabled.txt b/audit/projects/k8s-staging-e2e-test-images/services/enabled.txt index 36a6900078a..3f34c5ceaf6 100644 --- a/audit/projects/k8s-staging-e2e-test-images/services/enabled.txt +++ b/audit/projects/k8s-staging-e2e-test-images/services/enabled.txt @@ -1,8 +1,19 @@ NAME TITLE +bigquery.googleapis.com BigQuery API +bigquerystorage.googleapis.com BigQuery Storage API cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +compute.googleapis.com Compute Engine API +container.googleapis.com Kubernetes Engine API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API +iam.googleapis.com Identity and Access Management (IAM) API +iamcredentials.googleapis.com IAM Service Account Credentials API logging.googleapis.com Cloud Logging API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage From 9841ab6dc755424dc90e67ab0540c5642acf3324 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Thu, 14 Jan 2021 18:04:29 -0500 Subject: [PATCH 37/39] audit: QQ: k8s-gcr-backup-test-prod-bak: why bind this SA to prow-build? TODO: shouldn't this be trusted prow? --- .../iam.json | 1 + 1 file changed, 1 insertion(+) diff --git a/audit/projects/k8s-gcr-backup-test-prod-bak/service-accounts/k8s-infra-gcr-promoter@k8s-gcr-backup-test-prod-bak.iam.gserviceaccount.com/iam.json b/audit/projects/k8s-gcr-backup-test-prod-bak/service-accounts/k8s-infra-gcr-promoter@k8s-gcr-backup-test-prod-bak.iam.gserviceaccount.com/iam.json index 5c99d002a21..ef2eb65e7de 100644 --- a/audit/projects/k8s-gcr-backup-test-prod-bak/service-accounts/k8s-infra-gcr-promoter@k8s-gcr-backup-test-prod-bak.iam.gserviceaccount.com/iam.json +++ b/audit/projects/k8s-gcr-backup-test-prod-bak/service-accounts/k8s-infra-gcr-promoter@k8s-gcr-backup-test-prod-bak.iam.gserviceaccount.com/iam.json @@ -2,6 +2,7 @@ "bindings": [ { "members": [ + "serviceAccount:k8s-infra-prow-build.svc.id.goog[test-pods/k8s-infra-gcr-promoter-test]", "serviceAccount:k8s-prow-builds.svc.id.goog[test-pods/k8s-infra-gcr-promoter-test]" ], "role": "roles/iam.workloadIdentityUser" From eb88737e7b293681e48f8614dcb65e4441341812 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Thu, 14 Jan 2021 18:14:22 -0500 Subject: [PATCH 38/39] audit: QQ kubernetes-public: why is an appengine SA present? --- .../description.json | 8 ++++++++ .../iam.json | 1 + 2 files changed, 9 insertions(+) create mode 100644 audit/projects/kubernetes-public/service-accounts/kubernetes-public@appspot.gserviceaccount.com/description.json create mode 100644 audit/projects/kubernetes-public/service-accounts/kubernetes-public@appspot.gserviceaccount.com/iam.json diff --git a/audit/projects/kubernetes-public/service-accounts/kubernetes-public@appspot.gserviceaccount.com/description.json b/audit/projects/kubernetes-public/service-accounts/kubernetes-public@appspot.gserviceaccount.com/description.json new file mode 100644 index 00000000000..cd6b68824af --- /dev/null +++ b/audit/projects/kubernetes-public/service-accounts/kubernetes-public@appspot.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "App Engine default service account", + "email": "kubernetes-public@appspot.gserviceaccount.com", + "name": "projects/kubernetes-public/serviceAccounts/kubernetes-public@appspot.gserviceaccount.com", + "oauth2ClientId": "105254750883748360742", + "projectId": "kubernetes-public", + "uniqueId": "105254750883748360742" +} diff --git a/audit/projects/kubernetes-public/service-accounts/kubernetes-public@appspot.gserviceaccount.com/iam.json b/audit/projects/kubernetes-public/service-accounts/kubernetes-public@appspot.gserviceaccount.com/iam.json new file mode 100644 index 00000000000..0967ef424bc --- /dev/null +++ b/audit/projects/kubernetes-public/service-accounts/kubernetes-public@appspot.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} From d3ad9b7686e944de74bfd80637156396c86fe266 Mon Sep 17 00:00:00 2001 From: Aaron Crickenberger Date: Thu, 14 Jan 2021 18:16:52 -0500 Subject: [PATCH 39/39] audit: QQ kubernetes-public: why cloudfunctions and source enabled? --- audit/projects/kubernetes-public/iam.json | 15 ++++++++++++++- .../kubernetes-public/services/enabled.txt | 2 ++ 2 files changed, 16 insertions(+), 1 deletion(-) diff --git a/audit/projects/kubernetes-public/iam.json b/audit/projects/kubernetes-public/iam.json index e4e0af11e80..e85ee219a3c 100644 --- a/audit/projects/kubernetes-public/iam.json +++ b/audit/projects/kubernetes-public/iam.json @@ -18,6 +18,12 @@ ], "role": "roles/bigquery.jobUser" }, + { + "members": [ + "serviceAccount:service-127754664067@gcf-admin-robot.iam.gserviceaccount.com" + ], + "role": "roles/cloudfunctions.serviceAgent" + }, { "members": [ "group:k8s-infra-cluster-admins@kubernetes.io" @@ -65,6 +71,7 @@ "members": [ "serviceAccount:127754664067-compute@developer.gserviceaccount.com", "serviceAccount:127754664067@cloudservices.gserviceaccount.com", + "serviceAccount:kubernetes-public@appspot.gserviceaccount.com", "serviceAccount:service-127754664067@containerregistry.iam.gserviceaccount.com" ], "role": "roles/editor" @@ -93,6 +100,12 @@ ], "role": "roles/logging.logWriter" }, + { + "members": [ + "group:gke-security-groups@kubernetes.io" + ], + "role": "roles/logging.privateLogViewer" + }, { "members": [ "serviceAccount:gke-nodes-aaa@kubernetes-public.iam.gserviceaccount.com" @@ -101,7 +114,7 @@ }, { "members": [ - "serviceAccount:gke-nodes-aaa@kubernetes-public.iam.gserviceaccount.com" + "group:gke-security-groups@kubernetes.io" ], "role": "roles/monitoring.viewer" }, diff --git a/audit/projects/kubernetes-public/services/enabled.txt b/audit/projects/kubernetes-public/services/enabled.txt index 9ff0d5e80c6..1c171c5e4ad 100644 --- a/audit/projects/kubernetes-public/services/enabled.txt +++ b/audit/projects/kubernetes-public/services/enabled.txt @@ -3,6 +3,7 @@ bigquery.googleapis.com BigQuery API bigquery.googleapis.com BigQuery API bigquerystorage.googleapis.com BigQuery Storage API clouderrorreporting.googleapis.com Error Reporting API +cloudfunctions.googleapis.com Cloud Functions API cloudresourcemanager.googleapis.com Cloud Resource Manager API cloudshell.googleapis.com Cloud Shell API compute.googleapis.com Compute Engine API @@ -17,6 +18,7 @@ oslogin.googleapis.com Cloud OS Login API pubsub.googleapis.com Cloud Pub/Sub API secretmanager.googleapis.com Secret Manager API serviceusage.googleapis.com Service Usage API +source.googleapis.com Legacy Cloud Source Repositories API stackdriver.googleapis.com Stackdriver API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage