Skip to content

Commit

Permalink
audit: update as of 2021-09-10
Browse files Browse the repository at this point in the history
  • Loading branch information
Kubernetes Prow Robot committed Sep 10, 2021
1 parent 1440465 commit 2de6fe9
Show file tree
Hide file tree
Showing 71 changed files with 18 additions and 426 deletions.

This file was deleted.

6 changes: 0 additions & 6 deletions audit/projects/k8s-staging-addon-manager/iam.json
Original file line number Diff line number Diff line change
Expand Up @@ -19,12 +19,6 @@
],
"role": "roles/cloudbuild.serviceAgent"
},
{
"members": [
"serviceAccount:service-103321906213@container-analysis.iam.gserviceaccount.com"
],
"role": "roles/containeranalysis.ServiceAgent"
},
{
"members": [
"serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com"
Expand Down
6 changes: 0 additions & 6 deletions audit/projects/k8s-staging-apisnoop/iam.json
Original file line number Diff line number Diff line change
Expand Up @@ -19,12 +19,6 @@
],
"role": "roles/cloudbuild.serviceAgent"
},
{
"members": [
"serviceAccount:service-782271650518@container-analysis.iam.gserviceaccount.com"
],
"role": "roles/containeranalysis.ServiceAgent"
},
{
"members": [
"serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com"
Expand Down
6 changes: 0 additions & 6 deletions audit/projects/k8s-staging-artifact-promoter/iam.json
Original file line number Diff line number Diff line change
Expand Up @@ -25,12 +25,6 @@
],
"role": "roles/compute.serviceAgent"
},
{
"members": [
"serviceAccount:service-675573440409@container-analysis.iam.gserviceaccount.com"
],
"role": "roles/containeranalysis.ServiceAgent"
},
{
"members": [
"serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com"
Expand Down
6 changes: 0 additions & 6 deletions audit/projects/k8s-staging-autoscaling/iam.json
Original file line number Diff line number Diff line change
Expand Up @@ -19,12 +19,6 @@
],
"role": "roles/cloudbuild.serviceAgent"
},
{
"members": [
"serviceAccount:service-371644685964@container-analysis.iam.gserviceaccount.com"
],
"role": "roles/containeranalysis.ServiceAgent"
},
{
"members": [
"serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com"
Expand Down
6 changes: 0 additions & 6 deletions audit/projects/k8s-staging-bootkube/iam.json
Original file line number Diff line number Diff line change
Expand Up @@ -19,12 +19,6 @@
],
"role": "roles/cloudbuild.serviceAgent"
},
{
"members": [
"serviceAccount:service-48439280800@container-analysis.iam.gserviceaccount.com"
],
"role": "roles/containeranalysis.ServiceAgent"
},
{
"members": [
"serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com"
Expand Down
6 changes: 0 additions & 6 deletions audit/projects/k8s-staging-boskos/iam.json
Original file line number Diff line number Diff line change
Expand Up @@ -19,12 +19,6 @@
],
"role": "roles/cloudbuild.serviceAgent"
},
{
"members": [
"serviceAccount:service-41305360102@container-analysis.iam.gserviceaccount.com"
],
"role": "roles/containeranalysis.ServiceAgent"
},
{
"members": [
"serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com"
Expand Down
6 changes: 0 additions & 6 deletions audit/projects/k8s-staging-build-image/iam.json
Original file line number Diff line number Diff line change
Expand Up @@ -19,12 +19,6 @@
],
"role": "roles/cloudbuild.serviceAgent"
},
{
"members": [
"serviceAccount:service-960211007710@container-analysis.iam.gserviceaccount.com"
],
"role": "roles/containeranalysis.ServiceAgent"
},
{
"members": [
"serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com"
Expand Down
6 changes: 0 additions & 6 deletions audit/projects/k8s-staging-capi-docker/iam.json
Original file line number Diff line number Diff line change
Expand Up @@ -25,12 +25,6 @@
],
"role": "roles/compute.serviceAgent"
},
{
"members": [
"serviceAccount:service-44019431644@container-analysis.iam.gserviceaccount.com"
],
"role": "roles/containeranalysis.ServiceAgent"
},
{
"members": [
"serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com"
Expand Down
6 changes: 0 additions & 6 deletions audit/projects/k8s-staging-capi-kubeadm/iam.json
Original file line number Diff line number Diff line change
Expand Up @@ -19,12 +19,6 @@
],
"role": "roles/cloudbuild.serviceAgent"
},
{
"members": [
"serviceAccount:service-778608689920@container-analysis.iam.gserviceaccount.com"
],
"role": "roles/containeranalysis.ServiceAgent"
},
{
"members": [
"serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com"
Expand Down
6 changes: 0 additions & 6 deletions audit/projects/k8s-staging-capi-openstack/iam.json
Original file line number Diff line number Diff line change
Expand Up @@ -25,12 +25,6 @@
],
"role": "roles/compute.serviceAgent"
},
{
"members": [
"serviceAccount:service-129051311436@container-analysis.iam.gserviceaccount.com"
],
"role": "roles/containeranalysis.ServiceAgent"
},
{
"members": [
"serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com"
Expand Down
6 changes: 0 additions & 6 deletions audit/projects/k8s-staging-capi-vsphere/iam.json
Original file line number Diff line number Diff line change
Expand Up @@ -19,12 +19,6 @@
],
"role": "roles/cloudbuild.serviceAgent"
},
{
"members": [
"serviceAccount:service-459565607671@container-analysis.iam.gserviceaccount.com"
],
"role": "roles/containeranalysis.ServiceAgent"
},
{
"members": [
"serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com"
Expand Down
6 changes: 0 additions & 6 deletions audit/projects/k8s-staging-ci-images/iam.json
Original file line number Diff line number Diff line change
Expand Up @@ -19,12 +19,6 @@
],
"role": "roles/cloudbuild.serviceAgent"
},
{
"members": [
"serviceAccount:service-731599680865@container-analysis.iam.gserviceaccount.com"
],
"role": "roles/containeranalysis.ServiceAgent"
},
{
"members": [
"serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com"
Expand Down
6 changes: 0 additions & 6 deletions audit/projects/k8s-staging-cip-test/iam.json
Original file line number Diff line number Diff line change
Expand Up @@ -25,12 +25,6 @@
],
"role": "roles/compute.serviceAgent"
},
{
"members": [
"serviceAccount:service-324460563566@container-analysis.iam.gserviceaccount.com"
],
"role": "roles/containeranalysis.ServiceAgent"
},
{
"members": [
"serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com"
Expand Down
6 changes: 0 additions & 6 deletions audit/projects/k8s-staging-cloud-provider-gcp/iam.json
Original file line number Diff line number Diff line change
Expand Up @@ -19,12 +19,6 @@
],
"role": "roles/cloudbuild.serviceAgent"
},
{
"members": [
"serviceAccount:service-67010995753@container-analysis.iam.gserviceaccount.com"
],
"role": "roles/containeranalysis.ServiceAgent"
},
{
"members": [
"serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com"
Expand Down
6 changes: 0 additions & 6 deletions audit/projects/k8s-staging-cluster-addons/iam.json
Original file line number Diff line number Diff line change
Expand Up @@ -19,12 +19,6 @@
],
"role": "roles/cloudbuild.serviceAgent"
},
{
"members": [
"serviceAccount:service-239900365888@container-analysis.iam.gserviceaccount.com"
],
"role": "roles/containeranalysis.ServiceAgent"
},
{
"members": [
"serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com"
Expand Down
6 changes: 0 additions & 6 deletions audit/projects/k8s-staging-cluster-api-aws/iam.json
Original file line number Diff line number Diff line change
Expand Up @@ -25,12 +25,6 @@
],
"role": "roles/compute.serviceAgent"
},
{
"members": [
"serviceAccount:service-433651898792@container-analysis.iam.gserviceaccount.com"
],
"role": "roles/containeranalysis.ServiceAgent"
},
{
"members": [
"serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com"
Expand Down
6 changes: 0 additions & 6 deletions audit/projects/k8s-staging-cluster-api-azure/iam.json
Original file line number Diff line number Diff line change
Expand Up @@ -19,12 +19,6 @@
],
"role": "roles/cloudbuild.serviceAgent"
},
{
"members": [
"serviceAccount:service-1087109869165@container-analysis.iam.gserviceaccount.com"
],
"role": "roles/containeranalysis.ServiceAgent"
},
{
"members": [
"serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com"
Expand Down
6 changes: 0 additions & 6 deletions audit/projects/k8s-staging-cluster-api-do/iam.json
Original file line number Diff line number Diff line change
Expand Up @@ -19,12 +19,6 @@
],
"role": "roles/cloudbuild.serviceAgent"
},
{
"members": [
"serviceAccount:service-226017735054@container-analysis.iam.gserviceaccount.com"
],
"role": "roles/containeranalysis.ServiceAgent"
},
{
"members": [
"serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com"
Expand Down
6 changes: 0 additions & 6 deletions audit/projects/k8s-staging-cluster-api-gcp/iam.json
Original file line number Diff line number Diff line change
Expand Up @@ -62,12 +62,6 @@
],
"role": "roles/compute.serviceAgent"
},
{
"members": [
"serviceAccount:service-606075400249@container-analysis.iam.gserviceaccount.com"
],
"role": "roles/containeranalysis.ServiceAgent"
},
{
"members": [
"serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com"
Expand Down
6 changes: 0 additions & 6 deletions audit/projects/k8s-staging-cluster-api/iam.json
Original file line number Diff line number Diff line change
Expand Up @@ -25,12 +25,6 @@
],
"role": "roles/compute.serviceAgent"
},
{
"members": [
"serviceAccount:service-190130481896@container-analysis.iam.gserviceaccount.com"
],
"role": "roles/containeranalysis.ServiceAgent"
},
{
"members": [
"serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com"
Expand Down
6 changes: 0 additions & 6 deletions audit/projects/k8s-staging-coredns/iam.json
Original file line number Diff line number Diff line change
Expand Up @@ -25,12 +25,6 @@
],
"role": "roles/compute.serviceAgent"
},
{
"members": [
"serviceAccount:service-848617618266@container-analysis.iam.gserviceaccount.com"
],
"role": "roles/containeranalysis.ServiceAgent"
},
{
"members": [
"serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com"
Expand Down
6 changes: 0 additions & 6 deletions audit/projects/k8s-staging-cpa/iam.json
Original file line number Diff line number Diff line change
Expand Up @@ -19,12 +19,6 @@
],
"role": "roles/cloudbuild.serviceAgent"
},
{
"members": [
"serviceAccount:service-644315828680@container-analysis.iam.gserviceaccount.com"
],
"role": "roles/containeranalysis.ServiceAgent"
},
{
"members": [
"serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com"
Expand Down
6 changes: 0 additions & 6 deletions audit/projects/k8s-staging-cri-tools/iam.json
Original file line number Diff line number Diff line change
Expand Up @@ -19,12 +19,6 @@
],
"role": "roles/cloudbuild.serviceAgent"
},
{
"members": [
"serviceAccount:service-565574877728@container-analysis.iam.gserviceaccount.com"
],
"role": "roles/containeranalysis.ServiceAgent"
},
{
"members": [
"serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com"
Expand Down
6 changes: 0 additions & 6 deletions audit/projects/k8s-staging-csi-secrets-store/iam.json
Original file line number Diff line number Diff line change
Expand Up @@ -19,12 +19,6 @@
],
"role": "roles/cloudbuild.serviceAgent"
},
{
"members": [
"serviceAccount:service-766197520365@container-analysis.iam.gserviceaccount.com"
],
"role": "roles/containeranalysis.ServiceAgent"
},
{
"members": [
"serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com"
Expand Down
6 changes: 0 additions & 6 deletions audit/projects/k8s-staging-csi/iam.json
Original file line number Diff line number Diff line change
Expand Up @@ -31,12 +31,6 @@
],
"role": "roles/container.serviceAgent"
},
{
"members": [
"serviceAccount:service-874328413592@container-analysis.iam.gserviceaccount.com"
],
"role": "roles/containeranalysis.ServiceAgent"
},
{
"members": [
"serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com"
Expand Down
6 changes: 0 additions & 6 deletions audit/projects/k8s-staging-descheduler/iam.json
Original file line number Diff line number Diff line change
Expand Up @@ -19,12 +19,6 @@
],
"role": "roles/cloudbuild.serviceAgent"
},
{
"members": [
"serviceAccount:service-1009880777024@container-analysis.iam.gserviceaccount.com"
],
"role": "roles/containeranalysis.ServiceAgent"
},
{
"members": [
"serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com"
Expand Down
6 changes: 0 additions & 6 deletions audit/projects/k8s-staging-dns/iam.json
Original file line number Diff line number Diff line change
Expand Up @@ -19,12 +19,6 @@
],
"role": "roles/cloudbuild.serviceAgent"
},
{
"members": [
"serviceAccount:service-558098336346@container-analysis.iam.gserviceaccount.com"
],
"role": "roles/containeranalysis.ServiceAgent"
},
{
"members": [
"serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com"
Expand Down
6 changes: 0 additions & 6 deletions audit/projects/k8s-staging-e2e-test-images/iam.json
Original file line number Diff line number Diff line change
Expand Up @@ -25,12 +25,6 @@
],
"role": "roles/compute.serviceAgent"
},
{
"members": [
"serviceAccount:service-456067983721@container-analysis.iam.gserviceaccount.com"
],
"role": "roles/containeranalysis.ServiceAgent"
},
{
"members": [
"serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com"
Expand Down
6 changes: 0 additions & 6 deletions audit/projects/k8s-staging-etcd/iam.json
Original file line number Diff line number Diff line change
Expand Up @@ -19,12 +19,6 @@
],
"role": "roles/cloudbuild.serviceAgent"
},
{
"members": [
"serviceAccount:service-329483391043@container-analysis.iam.gserviceaccount.com"
],
"role": "roles/containeranalysis.ServiceAgent"
},
{
"members": [
"serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com"
Expand Down
Loading

0 comments on commit 2de6fe9

Please sign in to comment.