diff --git a/audit/projects/k8s-infra-e2e-boskos-007/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-007/services/compute/project-info.json index 2dfc5b180ac1..a372bbbb4431 100644 --- a/audit/projects/k8s-infra-e2e-boskos-007/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-007/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCi8pdFRA1dF1WRO5KP+Ol673+KbCLbUQt2J8gj7fwTn+R+XSS3sdpKezuNqTE2xQx9l0ZlMavRknPMvxyPyodN/sSMt/dIXubphc8zQM5DGCl4p4NBY6WoGYG6VZBRnBOn2kvAeI5Fa01QdaOtSdVlgr5QucIgC7VqAC+CI//8MTsQZDkodwyOUQ9Hs4pwKvBTzxLF0Xg5YW0bu+K3zctolYpcjo9yhIVxEPSBDqoDF+Y67R6KF0m22901Pn9j621OtfjyWKdqcnQqI8lT58jGlLBXx2/fVHghTHItlcZcWta+cdX8YN3rhlBR5FYfmB+4M1FGYI3ts6ljX4hu4d/3 root@8f3ea473-de81-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCccAt9XikqIdshF4ClrNrAY21uTtzx5fQYSzNRxs8e0vybIt/BYXCWYhN2SjXV1fsb2j/I56gtoD+DwLEbI/VQz5sUgHkU0cdfbdn89FGztgnA3dlHMQ8wvJv+kYs+1QaucDC92QCTd1FS6tBBMCqtF+zL3S1LFWJPk3pfilXAtGGnm980c71OD/PdLvb35rrTXBN3OaGC/Skh+D+C3GZ6toO2368MKZZ3uE2m8EQWTo/6X5rACFzxVNL0eg7lXK+fbLO5BA6kK1my0MdBrX4XNN9Flmy0SwgTGCozpVUh28JkszrpmKX3+envg4c7njZAm5+J1LaGj43ew3EJ+SML root@f22966a2-e2b0-11ea-a87b-7e1d84ccc038\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCpFyij+t3a3k++yHKO+L9UEaHV4JnNBxLEj0jtTnMqTefRVXb6N1Ldg+PhQ0M0wgP+EqFn2fRAkylj+cgzQrm4Sf+ZP4xvaav2fIw5f2dRWxLwomqih0XnuC4t7Z/ST2augMb/dywxfFzmC/KYJhUXf/8bsWg7ggOBUcAhhEb6PuSUrg9/xdumdORM3BJnQU7F7j6IEt8elLXtLxR1M3wTwzsoM+iEu+NxWjtJM0AwTUIJpugJculhIPHNnzF3G0AO0N09fbY7qnNlPhDt9Lk32sBLuJqcHvS81Oyi3dUSspv1G4sQbSYMdyaQ165axjJv/DXd8Xtw7R1U1+mQf4Qx root@e218f5fd-e412-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC3F0AmDXljKuEH+yLqUq01J6mD8Wi9+I8gr0C2r0lbsVE6SaXijmayErVpLn5UpHYWTvfZYUyaOYciPOMC7cWqGbyr8A7vk5saPdYROHvMkMSNy6NZqZ0iZJ3jez/Y1HYeXw2KzvXrLPR8n3kKpfIa27w2YfPFH6znmAuIcHhwuk0QXeWhDveAyoCh4AK5m9tmf/lUBS8f2kZz7z9BQOBaiZdh6u5qrn1dadIARvKL0TOb8v8sQLuBcaYBS+lY2BrWxdXoua1Fa2SWXTwBJbrHNPxJi7B8eQ0opwHgbUiq7fESboDVDgY8UHiuAeCSOzzDP8C6ML7mEVB+EMq/TV/h root@9cb038a7-e9c3-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQMt4+DdNHo3KsK+8guTrjczTM0yuK1sF7njFMTzyRVjN8sKEz1OPhZhYNRvO32N5Da8fmd5dBkok29ilujtIfLtz4Y8qJFvN8zCE03BcQZOj7LWBY4AuHfexghzgbQmuDvSuAk5yejhqagdnj88MI8vGOrOQG8x7mfttO4fm/Fnw3wS0r6YFzXa6xyWgrQL/wmOk+qSQBV36iT7Siw8ln1WPxCOK7gB5FBfXzC/qz3XSakb/7Gn9x3sWsMHuz1Hxhb9yzMXDjK8q7Vy5mQlJ6RlxkhQlxJSsFlLhym8EmbmsRj3qV3LlJv4tCiPiur0VgQ6biqdqYKBnA2Uuz463L root@430d0030-f25b-11ea-bd49-066a8cf01e04\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDmzyHt6d7ee4q54HbseMupcqBv4lUFxX7Y9oV6XhCj48sIOdPYLgxgoY2Mdeai2aq2Xbh/9LBEgJOwZY5BKKP3s3wBcrm+1P6Ls8GMzcwxHkGhcbHN9KTsJHIL2TaZ5C3kzBVqXD7sB+SIBD0UAeyqWhZSaWG1bN/4J6cKyWXmL5nDGjt2m0p2Q7BHGRpEuiSHgyvotXHl9F7D7usoYhd7AOnC/Stv+h7ummir1sNADtgiyvc/ORX56eb6aD3quSeuv9tXMGodc8dCbl4EZPb9aI0zw25/8aFyr27B0H3hALeF3exlvoMUgcIvqVmU/qq/6pEgIlN09ISpEiHp/kfP root@47dee6a5-f884-11ea-926e-7e7ea190b727\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDkVC7fqdse1eyjeO6xifN4dDoOBxk+NGU1gA+P4cgDJRS2fVe5UcVxLERANccsMu5cYbL0QGGbGL0Rz850CCUrnvUIH5D3/pUSCOBhRPKCq2+hetvx0H+LcwepxO4BgcSXMkuTWh85ZNogggo5da39GnJt1hTq4Wsu0cAzxuw+xK4m4WtvoVED6voEiL/u5UgUwsEjWBBnf8E/dxtLeEiwmSztn93nhTO0a1M0ZwjyD5kZYFEdi5S92s8ccwpTDnPpgjz5mt62t+ErpO015s7po20izz+iGF+gdGENlp2IYA3H8t3053j9Hq0FVoE/X6DEsYZqYcWq0igp1fX9wu5b root@8ae58b37-0805-11eb-b895-6272783fc925\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDu4LKYShWO1WwVnIlvktdVqPjWRFZjIeMUOXEWC+Tm3LymtervzQ05wmF0xPibG7IzDy6rWFiqaCIJlOOzGX8nLaTNCqCudZdoz4Nl8m3lGkVvpO/f7WJ+KnHmijotFJyZLq8NBYkyVrwOO+UGT8IEMtk9EOquq6jIYCTNGcfNDY8XckAPHMGDE2rdU3sMApZdKmeuupMvOlV/ob2crmn450OLjlJmWGr119Hb9rgT1FJ+UhCLDfrU8Uvy1CAdaepSrQENcLxCld+Ua5Q2di5kiUn07P+R+4B53uPIU006GAn3m6ppswWtWBxfr9XfFhmbHFdQ3ZRIeFY1mt6rXfnv root@eb748862-1e3d-11eb-8d52-9233771f1447\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDWaGOsvaIbKWkmq5b63h0J49kS6v64Y/O0ZKvBx7fl88mAxW0HN6OWisYqPYjESo5S7vCevQLhExNFhJdvCgcSuaNzwUlodYSjQa/ZXiirfWPckPPpY6116nCHGjnYX6eo3LBFPJbGzq0SLJNeoHbsaxYkgfyov8DhtbCI8zzWtcVK8ZOoODVphoSaj9ugA/FhjbkNflb9AHIZITcbh0UGFCEIDahMbFP1veYnsmD2WId+qd/CA0QKFSjRMnd/ar3eq9w6H2576Vts2T0UGRE9FU8m0UCLkIVP0P4/p8EStU+OagVTmGNelo/fWtY1pSC7a9N/3rrzDTsMADEJ4gir root@6575f33c-2083-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCph+CbREr5oUuclVtHRJFqUfHM9lsigbhuvaxxFWSgW6KO1kPhMI7ixPR1wMvk+PqjE8o5DEc3zWdCeD8rAvKC5dZAw9SY8YmTgAT/OkbEoo2gI8gsBkDYhYtmHfC+gsr1C+QJyWMC+jPMc5i7LJ4f9iyrXyI/ethz7z2B+WINZv9eAdeti5HM6q9njVjQTLngW0foWhVFh06Fm06Pxf4ZSycgAaohlF9Rp4na1cdx7X6qP1zZV2Nx6T9r/TStKmg0ctfkODc86OOjsqHVjCS9pzTor+prcfQOZ126tbGvRdjAxG5iBqP8SHuoKswV4dMe8OoFPmICprc6GRuPD17z root@d2ac4ad1-2101-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDXkIePcAQCdFJrphhXLedaqKnL05+eUvmiMfMAgBK9O5trcnh1z6B72iHTlB036hWONCZlJbgmDPDx55Vw8ud1AAD7Z0IJgf0jrRhY38vnZjtQC5FkYNmZPW2OatS8RFizFPUS25eMrSJ6vi4n9/nsDXSoizYcbjVoptAJvUV1UpVyqh75RA1VXhLA1/67v2YGr2b8RMPpRHjJMJNu9V0yLz0EcwD8wTvtL4WxunEUHOSCuia59BBbVj5awmPosEIcgoUJoi8gx6yqXKJ/8N20JFXPjn9P8T3/QmtUXFUFR1mg7ckO2vhryM6h+bDQiP78mZi9TfMTZmhlywAkI0/N root@edcec6fa-327c-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDbl7zdSyO5f2agCetunxenDhvO2DEMzol3P0wcboQcoc87GmFlJSyjJK+XipYhuPm1JzQNByMALUZh5hUI5TISHPvUu04vY1LQjGtx7uSjPfdS4CGdPFITslIA6NGZbJuVMU9LYOtjsz9n6w2FOAnVjP7Q2AkhYwaHErdHDbwA10rIumhn2KBdYNuuoVctpK/lcY0l6ZodeuYMan5vPWJ13gSRN2T9ccDD/Y7pHfkPXqUwBeqJv1cUpV/xZQC6NgzRI3s8sddRnIqRIZctsJqjh8FtmBN5Rn9pMGDsY+Cz6YBMAJLkeOqwb/vs84nTvrF0YMQAZ0e3U3aKMUAGdP5L root@5bc9c587-33ac-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZECHSq/SgECh6Sn9hBDGZ2s1VaiI71uuGFPOC97tNwrvRZSWFr7u2zZ8DdLskhlHX7voR9Kxgc2SaY6g1gpVkZpeBT2rNnD1K6OP56hn/zP54sTZEuVh14ceuyOYKNuJdZwWr6gv51G9Vy88xXiSnnnwdFTBmXRFjj3wLejN2j5xAQPX/M+rU+br02YagAJs8a77GYCc8ISlp7RlMQgb2Gnw1+yQWwxPAbQZUdFDF7z5V5H2yf0h3NhZ23GavrkC1i1gmLZbZJaTvkyAKJH6S+IweaXorEj+fEq1MAhNGNLqxhs1gw+P4RYZAF3daZH1+RRSYkemYE7a5O6lj33Np root@16faa0aa-5850-11eb-88de-22d0764934dc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDjQdWZCa426XfJTqS6l+aCebHF7nzne5Q7pUuV+TbpvaK0DJr805UPosBhm/ra85iWecbALOfMpBcDfWQqvwB6qWq9wU6KIdtt3KJktzmjSYW7IEiODXFjJDgcEFS8uv2tlQRLtaBqDh7m7WBMcCA7wT3MgC+HEwewiYfKxYM8gq8hoXCVzmRacp2sKft0HCDiJekLX9YGp1ijGD3HvBH2p27cow4IAsxdKr2Mq92okdRzWTj1boRp4kgAImr3QO6YFu3c1BNJptuU4KnW73wMfm7kluJskVyh5FSQifnrU6gnphjsB5w11ylG9I2t7nSD6d+jrLgRKK7fmzJ8E3I3 root@3db5b1ef-6069-11eb-b996-722e0b015734\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDaHeWleRvK6GkiEbsQ210OP/kvj0cdOYowJRdE8DQTgQebo4aoyAP7P3lWtuuSemQp1Vk1RblQY0apVMrMi+oolmVpLAxLSmgFv/zxBRn06CjNa68mSLZMvrFoqZg11CK631zlkuxa6JERNQ5iMupUz6Svyxov2WJhZJDwooNkC7/xRxKIq9Re4CM0yp6PMxiA1JJhbPQoFkHgO6hTVdb9khwQMDLHTPipund5FuHrmw9e6reii4l6WqkLf7GRtSYgjg9joXs/xm5hI/KA5bED9BT9Cz9bQ/2HVW/llt1l5jCMZGQagCRA46CW5gHXvHV/QYS+7XqLNc2nHPHAxD3z root@24bdfd11-791a-11eb-a603-2218f636630c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCjfHfffBQZx/tQ+L6vNa64QrVBvYokupti4tofdLIw3MR6EF1axKewoK/aON/Mo33ROz1lzlB98Bq6Arhd5xx6P2qEzBqBEnHhw1Se3wdkvuqjZu5rGtI7W10ZlsVyEn/KFwxKKfHLTI4TqOYTzuf0fyoH6jzurQJe5SU6rlLJuTo4sK1Ob88Zj76zaRikNA5/tOxowrba/lj6+0BwTwdVaFMgsFwzoKDQzs9gmRWXQ04cLOSO+qYK5MhvFLaJC5n1e5phkQbV+zxYSPWUxE+tUE4ATXvE3ExLQub9AQnp85PywBgJXFQ31TAj44QcP7247t/jNe1HA72CbJnPGeQh root@6e6f003c-7933-11eb-a603-2218f636630c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCSWCvIWHvkh5GMr0WXpsPE728IIVLHoP7wcm6zM3UFffwXMx/mT3uhhMTG9w07QOpFj3SnMAkdXNcbuWsiE9EAzOF5iq2OQTWAFMxY4i+vWpIFrarUQrDrs3jZmS+LgeRq/ZvwnALODknaqo5bnv3sPfmIDmZE8i2NiNTawDAmH9Qn8Td3aKOc0rjWHDr4lKmPTYGnJ0catHkvqiDvh1eUWwd1xsEXZbt/UmJYWLXiixaXq2/WkJAnNV1FFmwXsb8V2HZA1oVxgfId7cQmzw90zT4s6Yq2HISdKndAJARhWAPqZA/hk1orbj6tqgUR+MSjsgUOTZnocd5xl5mGj2hB root@14350c7f-7c28-11eb-9b34-4e1d335ada19" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCi8pdFRA1dF1WRO5KP+Ol673+KbCLbUQt2J8gj7fwTn+R+XSS3sdpKezuNqTE2xQx9l0ZlMavRknPMvxyPyodN/sSMt/dIXubphc8zQM5DGCl4p4NBY6WoGYG6VZBRnBOn2kvAeI5Fa01QdaOtSdVlgr5QucIgC7VqAC+CI//8MTsQZDkodwyOUQ9Hs4pwKvBTzxLF0Xg5YW0bu+K3zctolYpcjo9yhIVxEPSBDqoDF+Y67R6KF0m22901Pn9j621OtfjyWKdqcnQqI8lT58jGlLBXx2/fVHghTHItlcZcWta+cdX8YN3rhlBR5FYfmB+4M1FGYI3ts6ljX4hu4d/3 root@8f3ea473-de81-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCccAt9XikqIdshF4ClrNrAY21uTtzx5fQYSzNRxs8e0vybIt/BYXCWYhN2SjXV1fsb2j/I56gtoD+DwLEbI/VQz5sUgHkU0cdfbdn89FGztgnA3dlHMQ8wvJv+kYs+1QaucDC92QCTd1FS6tBBMCqtF+zL3S1LFWJPk3pfilXAtGGnm980c71OD/PdLvb35rrTXBN3OaGC/Skh+D+C3GZ6toO2368MKZZ3uE2m8EQWTo/6X5rACFzxVNL0eg7lXK+fbLO5BA6kK1my0MdBrX4XNN9Flmy0SwgTGCozpVUh28JkszrpmKX3+envg4c7njZAm5+J1LaGj43ew3EJ+SML root@f22966a2-e2b0-11ea-a87b-7e1d84ccc038\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCpFyij+t3a3k++yHKO+L9UEaHV4JnNBxLEj0jtTnMqTefRVXb6N1Ldg+PhQ0M0wgP+EqFn2fRAkylj+cgzQrm4Sf+ZP4xvaav2fIw5f2dRWxLwomqih0XnuC4t7Z/ST2augMb/dywxfFzmC/KYJhUXf/8bsWg7ggOBUcAhhEb6PuSUrg9/xdumdORM3BJnQU7F7j6IEt8elLXtLxR1M3wTwzsoM+iEu+NxWjtJM0AwTUIJpugJculhIPHNnzF3G0AO0N09fbY7qnNlPhDt9Lk32sBLuJqcHvS81Oyi3dUSspv1G4sQbSYMdyaQ165axjJv/DXd8Xtw7R1U1+mQf4Qx root@e218f5fd-e412-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC3F0AmDXljKuEH+yLqUq01J6mD8Wi9+I8gr0C2r0lbsVE6SaXijmayErVpLn5UpHYWTvfZYUyaOYciPOMC7cWqGbyr8A7vk5saPdYROHvMkMSNy6NZqZ0iZJ3jez/Y1HYeXw2KzvXrLPR8n3kKpfIa27w2YfPFH6znmAuIcHhwuk0QXeWhDveAyoCh4AK5m9tmf/lUBS8f2kZz7z9BQOBaiZdh6u5qrn1dadIARvKL0TOb8v8sQLuBcaYBS+lY2BrWxdXoua1Fa2SWXTwBJbrHNPxJi7B8eQ0opwHgbUiq7fESboDVDgY8UHiuAeCSOzzDP8C6ML7mEVB+EMq/TV/h root@9cb038a7-e9c3-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQMt4+DdNHo3KsK+8guTrjczTM0yuK1sF7njFMTzyRVjN8sKEz1OPhZhYNRvO32N5Da8fmd5dBkok29ilujtIfLtz4Y8qJFvN8zCE03BcQZOj7LWBY4AuHfexghzgbQmuDvSuAk5yejhqagdnj88MI8vGOrOQG8x7mfttO4fm/Fnw3wS0r6YFzXa6xyWgrQL/wmOk+qSQBV36iT7Siw8ln1WPxCOK7gB5FBfXzC/qz3XSakb/7Gn9x3sWsMHuz1Hxhb9yzMXDjK8q7Vy5mQlJ6RlxkhQlxJSsFlLhym8EmbmsRj3qV3LlJv4tCiPiur0VgQ6biqdqYKBnA2Uuz463L root@430d0030-f25b-11ea-bd49-066a8cf01e04\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDmzyHt6d7ee4q54HbseMupcqBv4lUFxX7Y9oV6XhCj48sIOdPYLgxgoY2Mdeai2aq2Xbh/9LBEgJOwZY5BKKP3s3wBcrm+1P6Ls8GMzcwxHkGhcbHN9KTsJHIL2TaZ5C3kzBVqXD7sB+SIBD0UAeyqWhZSaWG1bN/4J6cKyWXmL5nDGjt2m0p2Q7BHGRpEuiSHgyvotXHl9F7D7usoYhd7AOnC/Stv+h7ummir1sNADtgiyvc/ORX56eb6aD3quSeuv9tXMGodc8dCbl4EZPb9aI0zw25/8aFyr27B0H3hALeF3exlvoMUgcIvqVmU/qq/6pEgIlN09ISpEiHp/kfP root@47dee6a5-f884-11ea-926e-7e7ea190b727\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDkVC7fqdse1eyjeO6xifN4dDoOBxk+NGU1gA+P4cgDJRS2fVe5UcVxLERANccsMu5cYbL0QGGbGL0Rz850CCUrnvUIH5D3/pUSCOBhRPKCq2+hetvx0H+LcwepxO4BgcSXMkuTWh85ZNogggo5da39GnJt1hTq4Wsu0cAzxuw+xK4m4WtvoVED6voEiL/u5UgUwsEjWBBnf8E/dxtLeEiwmSztn93nhTO0a1M0ZwjyD5kZYFEdi5S92s8ccwpTDnPpgjz5mt62t+ErpO015s7po20izz+iGF+gdGENlp2IYA3H8t3053j9Hq0FVoE/X6DEsYZqYcWq0igp1fX9wu5b root@8ae58b37-0805-11eb-b895-6272783fc925\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDu4LKYShWO1WwVnIlvktdVqPjWRFZjIeMUOXEWC+Tm3LymtervzQ05wmF0xPibG7IzDy6rWFiqaCIJlOOzGX8nLaTNCqCudZdoz4Nl8m3lGkVvpO/f7WJ+KnHmijotFJyZLq8NBYkyVrwOO+UGT8IEMtk9EOquq6jIYCTNGcfNDY8XckAPHMGDE2rdU3sMApZdKmeuupMvOlV/ob2crmn450OLjlJmWGr119Hb9rgT1FJ+UhCLDfrU8Uvy1CAdaepSrQENcLxCld+Ua5Q2di5kiUn07P+R+4B53uPIU006GAn3m6ppswWtWBxfr9XfFhmbHFdQ3ZRIeFY1mt6rXfnv root@eb748862-1e3d-11eb-8d52-9233771f1447\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDWaGOsvaIbKWkmq5b63h0J49kS6v64Y/O0ZKvBx7fl88mAxW0HN6OWisYqPYjESo5S7vCevQLhExNFhJdvCgcSuaNzwUlodYSjQa/ZXiirfWPckPPpY6116nCHGjnYX6eo3LBFPJbGzq0SLJNeoHbsaxYkgfyov8DhtbCI8zzWtcVK8ZOoODVphoSaj9ugA/FhjbkNflb9AHIZITcbh0UGFCEIDahMbFP1veYnsmD2WId+qd/CA0QKFSjRMnd/ar3eq9w6H2576Vts2T0UGRE9FU8m0UCLkIVP0P4/p8EStU+OagVTmGNelo/fWtY1pSC7a9N/3rrzDTsMADEJ4gir root@6575f33c-2083-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCph+CbREr5oUuclVtHRJFqUfHM9lsigbhuvaxxFWSgW6KO1kPhMI7ixPR1wMvk+PqjE8o5DEc3zWdCeD8rAvKC5dZAw9SY8YmTgAT/OkbEoo2gI8gsBkDYhYtmHfC+gsr1C+QJyWMC+jPMc5i7LJ4f9iyrXyI/ethz7z2B+WINZv9eAdeti5HM6q9njVjQTLngW0foWhVFh06Fm06Pxf4ZSycgAaohlF9Rp4na1cdx7X6qP1zZV2Nx6T9r/TStKmg0ctfkODc86OOjsqHVjCS9pzTor+prcfQOZ126tbGvRdjAxG5iBqP8SHuoKswV4dMe8OoFPmICprc6GRuPD17z root@d2ac4ad1-2101-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDXkIePcAQCdFJrphhXLedaqKnL05+eUvmiMfMAgBK9O5trcnh1z6B72iHTlB036hWONCZlJbgmDPDx55Vw8ud1AAD7Z0IJgf0jrRhY38vnZjtQC5FkYNmZPW2OatS8RFizFPUS25eMrSJ6vi4n9/nsDXSoizYcbjVoptAJvUV1UpVyqh75RA1VXhLA1/67v2YGr2b8RMPpRHjJMJNu9V0yLz0EcwD8wTvtL4WxunEUHOSCuia59BBbVj5awmPosEIcgoUJoi8gx6yqXKJ/8N20JFXPjn9P8T3/QmtUXFUFR1mg7ckO2vhryM6h+bDQiP78mZi9TfMTZmhlywAkI0/N root@edcec6fa-327c-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDbl7zdSyO5f2agCetunxenDhvO2DEMzol3P0wcboQcoc87GmFlJSyjJK+XipYhuPm1JzQNByMALUZh5hUI5TISHPvUu04vY1LQjGtx7uSjPfdS4CGdPFITslIA6NGZbJuVMU9LYOtjsz9n6w2FOAnVjP7Q2AkhYwaHErdHDbwA10rIumhn2KBdYNuuoVctpK/lcY0l6ZodeuYMan5vPWJ13gSRN2T9ccDD/Y7pHfkPXqUwBeqJv1cUpV/xZQC6NgzRI3s8sddRnIqRIZctsJqjh8FtmBN5Rn9pMGDsY+Cz6YBMAJLkeOqwb/vs84nTvrF0YMQAZ0e3U3aKMUAGdP5L root@5bc9c587-33ac-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZECHSq/SgECh6Sn9hBDGZ2s1VaiI71uuGFPOC97tNwrvRZSWFr7u2zZ8DdLskhlHX7voR9Kxgc2SaY6g1gpVkZpeBT2rNnD1K6OP56hn/zP54sTZEuVh14ceuyOYKNuJdZwWr6gv51G9Vy88xXiSnnnwdFTBmXRFjj3wLejN2j5xAQPX/M+rU+br02YagAJs8a77GYCc8ISlp7RlMQgb2Gnw1+yQWwxPAbQZUdFDF7z5V5H2yf0h3NhZ23GavrkC1i1gmLZbZJaTvkyAKJH6S+IweaXorEj+fEq1MAhNGNLqxhs1gw+P4RYZAF3daZH1+RRSYkemYE7a5O6lj33Np root@16faa0aa-5850-11eb-88de-22d0764934dc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDjQdWZCa426XfJTqS6l+aCebHF7nzne5Q7pUuV+TbpvaK0DJr805UPosBhm/ra85iWecbALOfMpBcDfWQqvwB6qWq9wU6KIdtt3KJktzmjSYW7IEiODXFjJDgcEFS8uv2tlQRLtaBqDh7m7WBMcCA7wT3MgC+HEwewiYfKxYM8gq8hoXCVzmRacp2sKft0HCDiJekLX9YGp1ijGD3HvBH2p27cow4IAsxdKr2Mq92okdRzWTj1boRp4kgAImr3QO6YFu3c1BNJptuU4KnW73wMfm7kluJskVyh5FSQifnrU6gnphjsB5w11ylG9I2t7nSD6d+jrLgRKK7fmzJ8E3I3 root@3db5b1ef-6069-11eb-b996-722e0b015734\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDaHeWleRvK6GkiEbsQ210OP/kvj0cdOYowJRdE8DQTgQebo4aoyAP7P3lWtuuSemQp1Vk1RblQY0apVMrMi+oolmVpLAxLSmgFv/zxBRn06CjNa68mSLZMvrFoqZg11CK631zlkuxa6JERNQ5iMupUz6Svyxov2WJhZJDwooNkC7/xRxKIq9Re4CM0yp6PMxiA1JJhbPQoFkHgO6hTVdb9khwQMDLHTPipund5FuHrmw9e6reii4l6WqkLf7GRtSYgjg9joXs/xm5hI/KA5bED9BT9Cz9bQ/2HVW/llt1l5jCMZGQagCRA46CW5gHXvHV/QYS+7XqLNc2nHPHAxD3z root@24bdfd11-791a-11eb-a603-2218f636630c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCjfHfffBQZx/tQ+L6vNa64QrVBvYokupti4tofdLIw3MR6EF1axKewoK/aON/Mo33ROz1lzlB98Bq6Arhd5xx6P2qEzBqBEnHhw1Se3wdkvuqjZu5rGtI7W10ZlsVyEn/KFwxKKfHLTI4TqOYTzuf0fyoH6jzurQJe5SU6rlLJuTo4sK1Ob88Zj76zaRikNA5/tOxowrba/lj6+0BwTwdVaFMgsFwzoKDQzs9gmRWXQ04cLOSO+qYK5MhvFLaJC5n1e5phkQbV+zxYSPWUxE+tUE4ATXvE3ExLQub9AQnp85PywBgJXFQ31TAj44QcP7247t/jNe1HA72CbJnPGeQh root@6e6f003c-7933-11eb-a603-2218f636630c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCSWCvIWHvkh5GMr0WXpsPE728IIVLHoP7wcm6zM3UFffwXMx/mT3uhhMTG9w07QOpFj3SnMAkdXNcbuWsiE9EAzOF5iq2OQTWAFMxY4i+vWpIFrarUQrDrs3jZmS+LgeRq/ZvwnALODknaqo5bnv3sPfmIDmZE8i2NiNTawDAmH9Qn8Td3aKOc0rjWHDr4lKmPTYGnJ0catHkvqiDvh1eUWwd1xsEXZbt/UmJYWLXiixaXq2/WkJAnNV1FFmwXsb8V2HZA1oVxgfId7cQmzw90zT4s6Yq2HISdKndAJARhWAPqZA/hk1orbj6tqgUR+MSjsgUOTZnocd5xl5mGj2hB root@14350c7f-7c28-11eb-9b34-4e1d335ada19\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDmQ3D6O4mA8woepKcqdLxiXzc03954/mx8f7YAShb66V5rnukOByHyH38LsOkEbFWypmbb0wxvWIxmTejbiSGd0ht5HvC4PE54Z/4L75l7F6YH8uXo+6DI1OAW1EZmpnzuXMTjadGe8InTeMIrtRXcDoYXQPB2hWds9SemhMifgdDezQAc9eq3L0AfBuLhlSbE//jc01QRt0ihPYLc1Lashuc+bzLJ06SV4lvX+dLFuRjHnLcKLdP21wvguCWiWoh9cUfmyfJSUbobRUkacfzBDczR8daD7kUoE7t9K9JiqDgzTRPf7Gyv2PpYLCMTouBU2qnj4dpbLZZu9CtgOKwj root@e920b846-7c75-11eb-b5fa-bafb05f6310a" } ], "kind": "compute#metadata" diff --git a/audit/projects/k8s-infra-e2e-boskos-028/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-028/services/compute/project-info.json index ede306801aa2..2c9242f1233e 100644 --- a/audit/projects/k8s-infra-e2e-boskos-028/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-028/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDD4jX/yED//ddJucVZgeRd/aMg758pd994vBWNUq0n7O7wLFux1CKZcHQrpO3H26xHjD89AijvFD62btxGdUSG1FvAKQff6Evzfws/gU9OW2Qw7D1n9g7WLQDqQxkze8PobCXcODMnAn0i96k0+BMzbB/l5zOec/UZp9FZ+EtxBpvdsByfyacqCz9OGTPuZsu8a88UUkGoJxkIEkm8Z4NTkynkIsRSpgbCHPgbaA1mWljil4c+uaEQDw3vY505yI984mEltUf4GqO4ff/W/VCzkYO9pZGSlXKqgJOAXOyQ7e6sw6SlhR+ZZz5zOJAbLXsCvwPalaCQP81gdcq+u5d7 root@e9f79448-de71-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDos2YbzgTIhoo90ylp8bgzJHk6edsHvndpkoccjIqLXNL0NInAzLHB1WROVUOsFnlHPmYk1zstGpw3rMiL/ViF4/TRyFUQxmtunz4Tn/Wng1UCoo6Gy/6kM8WskkGnHFLQxosnY9i5Y/E7PNJG/uHTdE7gQgdnfRwz4NbskvNIGuScnUjaXhDyJSsrwVaACW2Wv/ZmELJuvmCrTc9WtrDeDziIr4jHRmqHYoUd0QKJGnY73yfT2aKEhqKQeCTu22AxixbAr25MvrmfexRAlHFKrUcA30IdLftYTn05hOOugUqX7t6emiulMVT7pzK9NoGrQYrganrYtT1PHBhB40W/ root@9c598e2d-e181-11ea-9eb6-86c455181e58\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQChRmG3g4dFYMPbZULVPZoXKpt5uf37E/GlW1hrS7yYvYJPr8nifRwptf7DlkqkOOh9AXdJuX7W7pXXloALgXtvVPsYpeuSEDNKSGlCHJob700gsR8Sx5n6DLq2NCky7fQwyLtmH3ASxlVZB5PxMQkQR0pW0rhjLTS5aYOJ5RQAkTYlH9Zm7b0SMWBll04kpXPYpAMkesBe0NKsmhHbyQmfQ3Xn++70p9RQEftffP/mgoJY4RjbEymb2PGsu8VUKIA9aauBxxejEPvEMrab4iXrpgj/snEyA5pATxSaESKmHslGToytGXoTtVd+kQlUdyhYic+UVmDv6fdcfq1mP+Sd root@ab3958b3-e538-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDgBrKwd0CKRfbpEf+zGwkTG6YciuBPiimAq1xhR3OsCSAGapn7bXkLBcrT3Y1DjrLSnKS7ebTiJz9Idd918IxidvcT1egBgPgixGGMIIcBoyGynZYGfp0p6blbUmzgGMMsHhz5fXg3dmi1RZkqJB/G7t1T7D3emW4acc1Kn9sKkhcGyo0rYBvwewmjPIem/VfEOSmTgoFkT/1zRS1dHGKgvbknQskq+5fRjDz+lMjXmz4PnVL1kgkhPwlPCTBvG+6W249Zst+cv+zp/jbc02fS6qAkm00i1ivKOsKia5XKTYML30xLHvs0q5ONO8z2b4+IYaml+IB4869ka5V5Jhlb root@3dfe24f8-e755-11ea-8112-a64f894a1815\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7Lh6/O9RoNJz9dG9jSUrWLwTZY6d8JUKyxcdEJ9mAdkG/ayMRGkPtbbuf/QEXQVvsFtpvRzylAx1Xl9N8fDPvJMvrLChVZSPHBZhCqvgpX3BEHP61PyjzoVHWZeDCrU0ZZK88/88+pdY2VVQ9uQPbF5JQ9/OjlYKPVSM5n2pbN72UiNPNMWWrNa/+6V9fPla/gHW3GiID7/pJhUgY5bDmSbAzYPtuxM0hL6G+0n4LuwA973p9WValrWJ6YqDlX43CYoqsC+WzJF0AuNuyY92i35OXShgJmSy6QawXy0bJh7DEUU6m4A+5xwSO/Znf9TpWUNTjGiyS+MmsKDT0DPPR root@0945bdcd-e903-11ea-aa1a-c6580c04344b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0/5/2aoBxbi/g7CnZpd7/jvEplt8GG+uljIQUzGmm/u0aB8/LRtFwgWIXcZcoMhq/4s6kK1pTdFfKGZhEdoIBcIzDQ+zzwtsHZI8BrdFnNpg8kFoyb3+LBLlLZLzhvL4zo/2/43ZueXSLQPi0FE6PlRb1wV8bg2RevTEkLpQb/WjDmdXKPuRPF+WVY+rP4oGnHgdu+9Qt1vLigQptcEQPsDY6BxU3o1Qy05O9kU+FbdfF4eZi86jN7miKcu1kZimx5PwB6vumzNZYhAeqESqZ/Q6dUU6xQkgHIHl/OXlps2qnsJGx/v9zfh1lzKam8nsoStv2g7ky6rwAsvNqM3dj root@2da7fd3a-e968-11ea-aa1a-c6580c04344b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDX8LX/F6M9giUWUO+wDJFYzvzWyvotcigUvaohuaAo4tTRLE45IKhELD8xUSr8oddITcc1saLHmXe447AHY0V/EGg6Qyy+PoS44q7Vk/yQ/btVvhf450YwszUt5V+3uzPKMA/NIB6cg+KrlCtBxcqmKE7n6F9iBVxrNtBAV8qxkmtiSpjMACWlAQybkj1vq0dYVJxPml7IIC08LDalvPq7SbbeO0ihBgjU2myxYubynm3ekin7Wl81kwb01heIE96Mcgai5E98fZxv2NTImz0kP3crXDt2+h/5MARFZEeDPn/zPT+l/DM6Mis5CUnSCdK5fj4fG7U2DIrch30Cw/jr root@f125538a-ff6d-11ea-b4e0-eacb7c15c8a0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBuCNOkkbI5ckLRAdlfEUkm3ZqxZz3FoOJRV1jjItTMdlRQpPuiPYDgvOpFT9erIYPid5AwGliEsdXv85kr6Hm/w/V7m9OhiSI9hpTXLFlCnh22HJwyKy3poEZpacDD61wR6yoDqYT4ORKBPI7V7gyAIfPtVGtkOcavsa1WrbGCp+S/nCzTk38GByi9F6CFzP0oJYdZZBsFWKXV8/MQyb3HNoKwWuA5dRmdTd9XYeXWtUSrZwhnSGmBsPLqLakamX84qRu0KQbCEO1MfZlxTrFdvdMmKgW/hlh4Y3j629gY/s/Ph0RVCt7f898ZXQDCBbPeDAVFj9AGpCGVb857Qov root@194fa3f6-227d-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDeqd5LtYArB2lVhMM7j059BJ/0SL72eisu7Xr1J3zi6rM0CCYxpMtAV/3Mo07jACQ5CVpJHEeK2NouaFI/mxb7Xna25kz7gKCfDaonbOzLDEmFa6anW5Gxiq9pFazBeDO4AjmOE5bXWcptIX8HmfnLm5IH2i+AUqry03KhVp277LDhQ/9rJtT5Tv8vEL/xLRuSZ0YveY8KMOohs+5+7uRYMzC+h/hKAKeXObSweJbiAPJ/ad6rmlyeaYQvVIecTbZCHRTMneii+G42qZodwJqSV1roGDxYi9jRKXi3gyN874wlUt4qn4YowUrY5uUYdiezU0OOZIXH7LpkcaNqZgRP root@545b89f3-2e70-11eb-8da1-5a2e729b6dfd\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD2Sw8LB1TrJOz6VSp31kmOn7ut3QrApvjT+XMjCfodfo7KSBcNNhzPsSVrh8go7r90ZjKpPgh5Pbr77mgYJKbJn/advP3RY30DQkjeJAdZZvlRyfDBOSgmEFfHroMFXEa3RocP8/CO1tcp2seNbvM/zmL1xwxaeI3Lrf3yLZiAiiDuY1HH5klc9lmJ7UxY6jBOZR0dqs+l5ki1KX5rVnggVFG/R7UQdJyBp36eRyAtpdt7cWRxNT/6zwbnD1fswBtYC2mfWwo0k3BaR9md/DQd0H8VluOkBRytmRamEfxRie+OnX3uulRLyupTm98z90QrajqVI0/wX0AmNMyxRYWv root@cf720433-36a2-11eb-a25d-22a534811c55\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDVTBxsXZ7FkcOSEuqhvKIJYrKg8ewNrTleYN6lgAc7A3NvtPjXO4PFLazjX1X3/vq2kX11aCOrthaqUvYGIgABL3rc3G458AVvdPq5LUxL1tg3oKZv+8KP4FcwjP3kMx+7zoG//mGUnaMOlgS+dQ2YdKtoJyaDsmDWbPwWL6v/u9jVictqkCKYRRucm+mzL8g/ECWNmDUI+rmGGdP8f9R9cIIWd4NjB/+Gx0T355EgSXG/R1Y3pb9cb+ogBCxZuWljYKaimSVcLinHMFmmWh2TvHV/HJWBuv2MQhcWpOHYpV5nAqdkG70iJoMWd2gsyr2ht/Uj/6yX7w3rX4tG9hA9 root@396b98ef-3a4a-11eb-be51-2af5b2470e9b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCtZUkNOPRfbDlIfs/E4YuVhQXk/U0q1QPdOdS6yuMnS3cvh4bj9bbLFCT7XdQrUMmyx0/WZ3+1C+wleYGvODNMCtGQp93B+6kjqwOXsbQr7KlgaPXvJUL7ytJFOjrGoXyNHGY8h6Gahm9hFnbPVg5gaFS+DOj/yRryGoudDs5IiYWiRsqF7eLJqGulLT8UGCiSGzGMcaiUhryFcfvN3UA+RlnU0KJZe/E3UsbumZDcBNwaanubAIbzS7JBxg2EWi1aRuqxYqihj7hI4R8zxV2U2gQOuXUd9fQvtXIxcpSHwaIp4eznbb0N/BXINNYDl9BsIY5MyMwZYoGZBiuX6Laz root@6ea195a9-55f1-11eb-967c-0ab01e0bcf09\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCWSSLVanPOQW5dy4eYYqdMjzktSEKiouFSQd3dcKF5dxwgkuZrTqc999BAVivxUbwCxPK8mKwtELZvXJYgzLioT2y0Wt2TdfLy2kXa/OBnNWukLAUVBHcomx4AvXRhnGc5xQlIOdpg7k98nHFT6IEWyvPtDdrMGmpzDr4YOVKgtEGxDDjFIbTAJXgAbSy4wz2FNQTIeM2f2VqCZBhheBVGOdRRWJcmaGrBTp0XOzjf9kwDDA6G893EpFXoAvDRg81K9Gs+yUfRbzrP2x64+n60feKm3VqRchAjh1zBA0UHBU8ww7TnZ08j3+5srAUICEhWU0ZvdTfbr8AidFoqWt+j root@0365f5ff-573a-11eb-ab2a-ca1ab07bde17\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDv3WFwhgDi4DrmM+gqSIZ1yfxCPHdLakbnyOAEJxrummdu+1L3zzp5ZmWfo2Mn2dAtYiqp+th0QlyMgsyZgMcEibi9UPxHoXFlctlEFn/s8vt/l7VtVLdWkjLmlzse6g58wkW5qkl7SdT9owJveD4YxUW+8Yzgxm/nffz3JS1QeXWxkUA7VmluKzO+cLVlmo9JuVbBTCGRXIDm15Vp0rlbxajiqaTMJ5djueM58wyKKTBPxPJ4/QKYEJ/f3A+RpMv6tR+epAdXAfJXloh9repa5ZBkhQQqYNz25irL1alACrLf1qKbdqQi7Vwf/AycnkPsTFx2gE74xfGrdI7lBD3/ root@57c2e0f8-781d-11eb-a92b-f2148a2022dd\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIrCN+xheEb71rvJx8w6K5DZUMBj4F//VZOwhpiAhx24wQdpAhS1EZq9JsZHe3mio6dNSqs6TJZ5+pnYafB18Ib7+KadkGDvEDo2/OQIMY/jFNSmfSNA3Rqc9vjz1TyYDaKZU5Nu2OJk235jeUP+kZrJSe3nRbQ7MHGHMC1s8b/++VkX46XnTkPZDlPfNW5G4cIowDaOmlOXSPgslZWs/dx31PEs5ayng5qiPFCHu94lPNzIyZE3p+KnrcQgSN6JqVkqUiFr7izH9oI6bDvyMgxpg+0eQmJPsdPnKX9xhZ/+XxCoKJY7e36edwQqmuoUZuFzCjM/0q/u+qpFmhILud root@6b5898a7-7a95-11eb-a603-2218f636630c" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDD4jX/yED//ddJucVZgeRd/aMg758pd994vBWNUq0n7O7wLFux1CKZcHQrpO3H26xHjD89AijvFD62btxGdUSG1FvAKQff6Evzfws/gU9OW2Qw7D1n9g7WLQDqQxkze8PobCXcODMnAn0i96k0+BMzbB/l5zOec/UZp9FZ+EtxBpvdsByfyacqCz9OGTPuZsu8a88UUkGoJxkIEkm8Z4NTkynkIsRSpgbCHPgbaA1mWljil4c+uaEQDw3vY505yI984mEltUf4GqO4ff/W/VCzkYO9pZGSlXKqgJOAXOyQ7e6sw6SlhR+ZZz5zOJAbLXsCvwPalaCQP81gdcq+u5d7 root@e9f79448-de71-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDos2YbzgTIhoo90ylp8bgzJHk6edsHvndpkoccjIqLXNL0NInAzLHB1WROVUOsFnlHPmYk1zstGpw3rMiL/ViF4/TRyFUQxmtunz4Tn/Wng1UCoo6Gy/6kM8WskkGnHFLQxosnY9i5Y/E7PNJG/uHTdE7gQgdnfRwz4NbskvNIGuScnUjaXhDyJSsrwVaACW2Wv/ZmELJuvmCrTc9WtrDeDziIr4jHRmqHYoUd0QKJGnY73yfT2aKEhqKQeCTu22AxixbAr25MvrmfexRAlHFKrUcA30IdLftYTn05hOOugUqX7t6emiulMVT7pzK9NoGrQYrganrYtT1PHBhB40W/ root@9c598e2d-e181-11ea-9eb6-86c455181e58\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQChRmG3g4dFYMPbZULVPZoXKpt5uf37E/GlW1hrS7yYvYJPr8nifRwptf7DlkqkOOh9AXdJuX7W7pXXloALgXtvVPsYpeuSEDNKSGlCHJob700gsR8Sx5n6DLq2NCky7fQwyLtmH3ASxlVZB5PxMQkQR0pW0rhjLTS5aYOJ5RQAkTYlH9Zm7b0SMWBll04kpXPYpAMkesBe0NKsmhHbyQmfQ3Xn++70p9RQEftffP/mgoJY4RjbEymb2PGsu8VUKIA9aauBxxejEPvEMrab4iXrpgj/snEyA5pATxSaESKmHslGToytGXoTtVd+kQlUdyhYic+UVmDv6fdcfq1mP+Sd root@ab3958b3-e538-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDgBrKwd0CKRfbpEf+zGwkTG6YciuBPiimAq1xhR3OsCSAGapn7bXkLBcrT3Y1DjrLSnKS7ebTiJz9Idd918IxidvcT1egBgPgixGGMIIcBoyGynZYGfp0p6blbUmzgGMMsHhz5fXg3dmi1RZkqJB/G7t1T7D3emW4acc1Kn9sKkhcGyo0rYBvwewmjPIem/VfEOSmTgoFkT/1zRS1dHGKgvbknQskq+5fRjDz+lMjXmz4PnVL1kgkhPwlPCTBvG+6W249Zst+cv+zp/jbc02fS6qAkm00i1ivKOsKia5XKTYML30xLHvs0q5ONO8z2b4+IYaml+IB4869ka5V5Jhlb root@3dfe24f8-e755-11ea-8112-a64f894a1815\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7Lh6/O9RoNJz9dG9jSUrWLwTZY6d8JUKyxcdEJ9mAdkG/ayMRGkPtbbuf/QEXQVvsFtpvRzylAx1Xl9N8fDPvJMvrLChVZSPHBZhCqvgpX3BEHP61PyjzoVHWZeDCrU0ZZK88/88+pdY2VVQ9uQPbF5JQ9/OjlYKPVSM5n2pbN72UiNPNMWWrNa/+6V9fPla/gHW3GiID7/pJhUgY5bDmSbAzYPtuxM0hL6G+0n4LuwA973p9WValrWJ6YqDlX43CYoqsC+WzJF0AuNuyY92i35OXShgJmSy6QawXy0bJh7DEUU6m4A+5xwSO/Znf9TpWUNTjGiyS+MmsKDT0DPPR root@0945bdcd-e903-11ea-aa1a-c6580c04344b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0/5/2aoBxbi/g7CnZpd7/jvEplt8GG+uljIQUzGmm/u0aB8/LRtFwgWIXcZcoMhq/4s6kK1pTdFfKGZhEdoIBcIzDQ+zzwtsHZI8BrdFnNpg8kFoyb3+LBLlLZLzhvL4zo/2/43ZueXSLQPi0FE6PlRb1wV8bg2RevTEkLpQb/WjDmdXKPuRPF+WVY+rP4oGnHgdu+9Qt1vLigQptcEQPsDY6BxU3o1Qy05O9kU+FbdfF4eZi86jN7miKcu1kZimx5PwB6vumzNZYhAeqESqZ/Q6dUU6xQkgHIHl/OXlps2qnsJGx/v9zfh1lzKam8nsoStv2g7ky6rwAsvNqM3dj root@2da7fd3a-e968-11ea-aa1a-c6580c04344b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDX8LX/F6M9giUWUO+wDJFYzvzWyvotcigUvaohuaAo4tTRLE45IKhELD8xUSr8oddITcc1saLHmXe447AHY0V/EGg6Qyy+PoS44q7Vk/yQ/btVvhf450YwszUt5V+3uzPKMA/NIB6cg+KrlCtBxcqmKE7n6F9iBVxrNtBAV8qxkmtiSpjMACWlAQybkj1vq0dYVJxPml7IIC08LDalvPq7SbbeO0ihBgjU2myxYubynm3ekin7Wl81kwb01heIE96Mcgai5E98fZxv2NTImz0kP3crXDt2+h/5MARFZEeDPn/zPT+l/DM6Mis5CUnSCdK5fj4fG7U2DIrch30Cw/jr root@f125538a-ff6d-11ea-b4e0-eacb7c15c8a0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBuCNOkkbI5ckLRAdlfEUkm3ZqxZz3FoOJRV1jjItTMdlRQpPuiPYDgvOpFT9erIYPid5AwGliEsdXv85kr6Hm/w/V7m9OhiSI9hpTXLFlCnh22HJwyKy3poEZpacDD61wR6yoDqYT4ORKBPI7V7gyAIfPtVGtkOcavsa1WrbGCp+S/nCzTk38GByi9F6CFzP0oJYdZZBsFWKXV8/MQyb3HNoKwWuA5dRmdTd9XYeXWtUSrZwhnSGmBsPLqLakamX84qRu0KQbCEO1MfZlxTrFdvdMmKgW/hlh4Y3j629gY/s/Ph0RVCt7f898ZXQDCBbPeDAVFj9AGpCGVb857Qov root@194fa3f6-227d-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDeqd5LtYArB2lVhMM7j059BJ/0SL72eisu7Xr1J3zi6rM0CCYxpMtAV/3Mo07jACQ5CVpJHEeK2NouaFI/mxb7Xna25kz7gKCfDaonbOzLDEmFa6anW5Gxiq9pFazBeDO4AjmOE5bXWcptIX8HmfnLm5IH2i+AUqry03KhVp277LDhQ/9rJtT5Tv8vEL/xLRuSZ0YveY8KMOohs+5+7uRYMzC+h/hKAKeXObSweJbiAPJ/ad6rmlyeaYQvVIecTbZCHRTMneii+G42qZodwJqSV1roGDxYi9jRKXi3gyN874wlUt4qn4YowUrY5uUYdiezU0OOZIXH7LpkcaNqZgRP root@545b89f3-2e70-11eb-8da1-5a2e729b6dfd\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD2Sw8LB1TrJOz6VSp31kmOn7ut3QrApvjT+XMjCfodfo7KSBcNNhzPsSVrh8go7r90ZjKpPgh5Pbr77mgYJKbJn/advP3RY30DQkjeJAdZZvlRyfDBOSgmEFfHroMFXEa3RocP8/CO1tcp2seNbvM/zmL1xwxaeI3Lrf3yLZiAiiDuY1HH5klc9lmJ7UxY6jBOZR0dqs+l5ki1KX5rVnggVFG/R7UQdJyBp36eRyAtpdt7cWRxNT/6zwbnD1fswBtYC2mfWwo0k3BaR9md/DQd0H8VluOkBRytmRamEfxRie+OnX3uulRLyupTm98z90QrajqVI0/wX0AmNMyxRYWv root@cf720433-36a2-11eb-a25d-22a534811c55\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDVTBxsXZ7FkcOSEuqhvKIJYrKg8ewNrTleYN6lgAc7A3NvtPjXO4PFLazjX1X3/vq2kX11aCOrthaqUvYGIgABL3rc3G458AVvdPq5LUxL1tg3oKZv+8KP4FcwjP3kMx+7zoG//mGUnaMOlgS+dQ2YdKtoJyaDsmDWbPwWL6v/u9jVictqkCKYRRucm+mzL8g/ECWNmDUI+rmGGdP8f9R9cIIWd4NjB/+Gx0T355EgSXG/R1Y3pb9cb+ogBCxZuWljYKaimSVcLinHMFmmWh2TvHV/HJWBuv2MQhcWpOHYpV5nAqdkG70iJoMWd2gsyr2ht/Uj/6yX7w3rX4tG9hA9 root@396b98ef-3a4a-11eb-be51-2af5b2470e9b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCtZUkNOPRfbDlIfs/E4YuVhQXk/U0q1QPdOdS6yuMnS3cvh4bj9bbLFCT7XdQrUMmyx0/WZ3+1C+wleYGvODNMCtGQp93B+6kjqwOXsbQr7KlgaPXvJUL7ytJFOjrGoXyNHGY8h6Gahm9hFnbPVg5gaFS+DOj/yRryGoudDs5IiYWiRsqF7eLJqGulLT8UGCiSGzGMcaiUhryFcfvN3UA+RlnU0KJZe/E3UsbumZDcBNwaanubAIbzS7JBxg2EWi1aRuqxYqihj7hI4R8zxV2U2gQOuXUd9fQvtXIxcpSHwaIp4eznbb0N/BXINNYDl9BsIY5MyMwZYoGZBiuX6Laz root@6ea195a9-55f1-11eb-967c-0ab01e0bcf09\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCWSSLVanPOQW5dy4eYYqdMjzktSEKiouFSQd3dcKF5dxwgkuZrTqc999BAVivxUbwCxPK8mKwtELZvXJYgzLioT2y0Wt2TdfLy2kXa/OBnNWukLAUVBHcomx4AvXRhnGc5xQlIOdpg7k98nHFT6IEWyvPtDdrMGmpzDr4YOVKgtEGxDDjFIbTAJXgAbSy4wz2FNQTIeM2f2VqCZBhheBVGOdRRWJcmaGrBTp0XOzjf9kwDDA6G893EpFXoAvDRg81K9Gs+yUfRbzrP2x64+n60feKm3VqRchAjh1zBA0UHBU8ww7TnZ08j3+5srAUICEhWU0ZvdTfbr8AidFoqWt+j root@0365f5ff-573a-11eb-ab2a-ca1ab07bde17\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDv3WFwhgDi4DrmM+gqSIZ1yfxCPHdLakbnyOAEJxrummdu+1L3zzp5ZmWfo2Mn2dAtYiqp+th0QlyMgsyZgMcEibi9UPxHoXFlctlEFn/s8vt/l7VtVLdWkjLmlzse6g58wkW5qkl7SdT9owJveD4YxUW+8Yzgxm/nffz3JS1QeXWxkUA7VmluKzO+cLVlmo9JuVbBTCGRXIDm15Vp0rlbxajiqaTMJ5djueM58wyKKTBPxPJ4/QKYEJ/f3A+RpMv6tR+epAdXAfJXloh9repa5ZBkhQQqYNz25irL1alACrLf1qKbdqQi7Vwf/AycnkPsTFx2gE74xfGrdI7lBD3/ root@57c2e0f8-781d-11eb-a92b-f2148a2022dd\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIrCN+xheEb71rvJx8w6K5DZUMBj4F//VZOwhpiAhx24wQdpAhS1EZq9JsZHe3mio6dNSqs6TJZ5+pnYafB18Ib7+KadkGDvEDo2/OQIMY/jFNSmfSNA3Rqc9vjz1TyYDaKZU5Nu2OJk235jeUP+kZrJSe3nRbQ7MHGHMC1s8b/++VkX46XnTkPZDlPfNW5G4cIowDaOmlOXSPgslZWs/dx31PEs5ayng5qiPFCHu94lPNzIyZE3p+KnrcQgSN6JqVkqUiFr7izH9oI6bDvyMgxpg+0eQmJPsdPnKX9xhZ/+XxCoKJY7e36edwQqmuoUZuFzCjM/0q/u+qpFmhILud root@6b5898a7-7a95-11eb-a603-2218f636630c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+iZixg2KPgaxZWV6Q0kQCOTIFDMGT1Gg48iKHx6cYC7qtCXgxupDJp4xvVVwM0L8MGqQuH4vqhcwi0ZC37Z6VQcApV6Tr0LMYg+drKsFy3ZGaQx9VO4DF2SHg6aiCDwmf0IWY38QJk5iZ4X2xZ8tnOrsEBpqCunX7N4ET8foYRSOP+ByPqxL9XwA0bcKGZe9OjkFJHHPDo95HlpCUfuqqTXlxXATqZvBWlebmIvp5J6mvzPpB8YiDFhi2Y4dzM5mKboTeyvchYULX/nMfqntI9whHr/eV356ebdUSPywOtj0IUPUvPcaKp3eEbeXPv06aalWYW0/b24CyEZJ8FfjJ root@3e686ea4-7c8d-11eb-b5fa-bafb05f6310a" } ], "kind": "compute#metadata" diff --git a/audit/projects/k8s-infra-e2e-boskos-061/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-061/services/compute/project-info.json index c64de2c3364f..a2515fd6943f 100644 --- a/audit/projects/k8s-infra-e2e-boskos-061/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-061/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDM1pLzEeSPLc2cmmIhzApl1PeaF6TtUu82NXpcjpH7quFWgXUFHacBqRVjhmul+KTrPMWtFM4EMBFcUnPTBnn5nfLjww0DlUpIcUdSr0bx6Agby0V6oqw9SEE+UrY0Dog8i1+MxP5dN2uzv7v4VoQ2GNEVCfxJhaNvWH/ARMybLePIUZ2HQQ7Cv0rHxKZiWoJb8nRSsLEgTXE8qLHdRRZPzyT91Whlu3CD61ev+H8deIl+pdYNL0UqeeuHDMyz7soRrcdzuQwIV2MYk6c2NlkS/3cKP92SUi9iyaKJzop4af7epx9Cvg4YfZQLEyKGH7J/spedbMkcYVyu+m6ekCu/ root@c39ffb86-e01f-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCvlG/aoG9SbtdcWY156J2mzu4byLG3eOoiltMmc93droVgqSXaZCyq5F+/ia+ibqremlmHmNafh235BmFaIhISlFhb2aDDLn6auU0/uuK5WMaAmIV9tAF/Aqx9EJhU1bQDXzrZlxUguCDG62HaJ4hTiiEo0TFaSXdlrJArypWamnxCJpPSN+0Ru1iEPmNXyHvzqsFYv+BMMct8fW6T+BHPtdWvLwvMXrDPZFhFn6pJoVWtVHqklOrlTDGiOjN6oeOfQRN4ZFJAs1Z4JkXwPQBkkR8UZYVH7L3m7arzTcQRHU46Tw6sZFgPGgBaPu5OLZbQWpSsM8LODZNzc+Ctw2nt root@f5be5010-e33e-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDL6PaJdSE4cD+QN+n3dkY2Y6t2eC9ucCog7sjbu2qf15x8WfA9tGJcuxNq3tj2JJqgBwF94R623VvYnGPV11vLLgcpmn5S8BpEVI/qE42umh7tIvmUO43PtvnawtIfrMcJ+Ki8L6+YqF9WOq6hvOR/Ef0U3x+jd1PeUBXneNGvpM4Wb9BcYCyuhbCmm1QPrX0k9DkH3WD4iKkh318k6nh2Dnjt+n+RUhjbS5apnB3ioAOEx4/6BbVk7A6YTNiBgbMhwN8eBu1arZnjgUu6cWWlTfErXK8sC4aBtGfOeJsrzjUMwKTKq242J7oqSOKE5defsEs+4/UR9u3ChzyNojt/ root@1b5f6337-ea19-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCw2HYauYeEkAlVSS0lWWSfhw0674tkUjhSyirSPAz98LODmFr899JE8XcV8624o2i8kKIChFFUwYHonnjEFMFbxQqcOBz9CxPYTtyBcJTzIMbu00No5raha52ypFW04bzAPXvhWETeJ2VvLuF2pzAGoYwqw0K997bCA79YjvlK0yzKAM/snCU5+98URGgz+ixIjbTrjOomy+IKlmnlYyKqpNPEQG8xfUnr4lrqjsu3YSfD5oP+66h3FKzMxtgK7loBKxBfpZcB/L5Cj18FscooY2BHHWmGPO8C7B+KzfNW96M++GS/9xTPK7pXKx+OWfH5RXvZby4N+NWr0ZPzKHGx root@cefff24d-ed51-11ea-aebe-3e85ddc86bf2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCrh7UZphp3Jn+Kr/4ugYgnWAFBi8IJjtbEy3fvXUxO8WkCjGHXwKJCVrJsGoHGaU/GOB6dHDBz9qfKJ1/7t6ybRXJ6N23H5K8GpjpJcZlqSiGybZwqq8HscjNo+mjlbdcht/I7PXHORaEX11hwjHpssNA29G0Y/zkcBbg42LWGwiahVPX6tHa9zs4lZEQPsoEOohipQby7AW3Z1JVF1vw9uvjuMT3ISg5c6eH3tXB81sVUT3VDuou6P6JvB1oYoRds2WlJugwHwORw5kKwWihkut96CHNkKGHrjefKNQ+J10LrcL58eCYJaVQ8EwqAdoFLIiPspa4/85QoPxk+9v1T root@493b066e-ef97-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCkknyBem7SKu0eZkAOAYSp2SSpSdOhTPCYm58/4BkfDoVk8Cbt1nlXPkkeM29XaJspFucOe550VH+VEZyZA2TSbXh99rYc0BJpOQ3R/cd8koz6RbRE+hXwfhsCy/l1r1EcISgQ4P9dS3hNdiXPZtD5LUmiGMqtTqmrrczW04lHFD14o2xXuEnuX6pcIZVfSHbOAj1+BZ5iGACKkkkkA7v9wfPjsxzusiuTk68wIheYlBKLARqM6HK44ok4zVqoi3QfZXen4KR2IEaBCwdd4pOHd42z+7sUCaFv86FYZmIqpi8LdCkTKzldkDy/uGykP732qWK6jUHLOr899s4dQekL root@6d4c6211-effc-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCdZS30hmYUbl+a+cG9z14E3EwlI1/DlfnfuQCrWZKIegNX62L1LBpoQcT5qHdYvtMbd1+D6S9CL0xJvU6cdFhkYFO9ZvKTshZIAnOrJuvCsNQXWePCpJpClC7BQPU+5vxsFp3yy2VD8jMuYcfBtpzobC8FMOmF6yL44WSC8/S1XvD9KDBgATLBSvgkeAs9xqQsKZHPh8a+eG7EGA7PomdfLTdYjsd+iSzlyRCfUzxjiu/qBK+PXa7nrWY/5IJsnAFjZWwTgyUP9MXPzqu3dj/YF7RSMr4myQkD3JJXa6CDzTdMdpeLSNsDnY7QbgpEmLHytUxjNh1FIXlopzl+brKD root@eb70f181-f102-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDWZK7AR1eFf2L6w9Rg4N/Ekt0fm0s2tkTIthr053B6Kw47XujUx35HDNWeB5oZpxc2l2QoRYgTwZNOOjNkjMzITH3T9llVLC9yfuD6HDJUbJAuQo+KwG4mo9X/6gKg3PRfawIqN1EQHj7+GrLVQLS2IeTfBBZPjqehrPmrGTMJ8tKMwb2/31PlS0JckrInrVvziWSBKusKQiCXUba+9YEqwpZl6F3cdFkOT2/Uw4iWQ60Ae+tb6Qx0nFXMjThOY2ixGhlBwAeCpl6bKAGC/qWmvL/gD7sqfD8lk0jMjOQFp3nJUer+Rsknabw15XAmN//NWKCypeSVFVQkP9EMwREr root@231444a1-f145-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCpLCXp5rGH5StvPA3ON2gqPo6orE/jfsZpn6vXaH5T6n329CT6+QS1Tx2F6//J3VJvaE+O0eoHvlRihytJGNGvr5nuXax1VsbB+AtYy44w893IbV1VQcJqpnyL06ZtYDgdpPO5ZG0MxY38+WhzeGVVAq856e5rROhf6ZLTgY8O3pocFS7Cnqr4JXagVC2n3MnYnlInOYyLV4oU43TUo9QNW8SigNDLb/JCuHVqA7vdsZGdyCFJ0qEFkLREMm9dYSGYi+i4Q8JPJoxELFyV0l1j6C2ossUJybUjbvrDgemh+AMB0N1VqCIsL+bv7nTwrjpscCGP5mNwToY861v+9Sf9 root@f79ef096-f541-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD7LFbO4aNFGAHPspUqGUwQEvfblHUJ0nzRtrdJFdOluDza6CwWm2pGt5TiY0FhNC10rQtdnY2pORdRzPtsfr37hFPVtf4joX7nzKQLxmQYeE3T8QTqWbaHW8XxnObMQG/7HvYVFbG3aN/fs/fX1h+m4lUfcpw4g4vOJusMLKZfzZWg+ybQ29gkli1ddBu7Wt1QepRv2mLV/XBpNhewj6U+s+D0Ra01bo4oYoblRk9tS/fx7GInb0RTWA5H0xc5wo1OOzI7cpCglH9wC05ERZuGT7WvYOT6W3NOGPfA/CYNw3uRGpTEiKRXxRuzZkaFje74JB44PCBy7PlKT3FS3hY5 root@a57534ad-0167-11eb-b4e0-eacb7c15c8a0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCuIoNOxUnRhegs0+oto6Ce9Xk/FlAhoOGbxbswsnauoT7Y0nnva3qrXN6wRZBWJCfiB/KgDDSaxyPbPTz4k6xGlIxBy0cmd8e+8Igbezfnq8hLlwYfcZOJg+ZPqAtCuVRbPpFBnSh0AzwkDfJu8+h30Xlzae2pexe58ljZbnjqrfxPy8jemEpwiIHkdglHBcwrF+W7aazy6i8ON5K4VHvqYfAupj+b9zyDslHhH6z01+Eggnh2vSFzV++ecDKpy2u6S6MaByoiBhvdyoi8TOAC70m8DqX+zACR54WjZm2aJjdfTp09mAev9czXEk2bGecSCvp+WvhhQiC4sEmP9t5h root@23162976-03ad-11eb-9ee9-2af320b50223\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDX6sj2zgZe1h55LEmvyWcvg6ehhCoJ+3PtEp+jDm+R+K5w09PBm8YCV5DadeqXccAuCHbdxaKZhCSuCfF4QKDeebZd+ftjiZgfsvqhyg6jsepMof6lyTm9yOBSVTLJup7cunvRr1f5fv8QM7bB6tehw8nD/aTqI1DVqkwvniY+HCexIHf0ZivFML8nhhOE633w8FsGY6DY2l0EN7ERqGz0K/oqUk2fv8Us51hELAwq07F/kZIFznzntgZf/EuHc59iRQN2HsKgj3P1zmmPfhLzhnDvDPn14bxC4V/laZZN3OwQpYqM+A5Lb2RxIsCa4CugXmz0ON2HzkjBARrT3QAJ root@ae7474d6-1296-11eb-a3cf-6ef374375bd7\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCl7cgEIz4yJNxne/LmKOOhIvXuBWLZ8Myt48BjVSTv80eY/F0538A0Ul7ecraEi1RZYRKGbhUaYU4xmdhV1lTM9B7UmP66cKjvrTOJuSmLaDox+Mw40qCbZiSEo7NIdAsvTjML28B/G3hiSTlkNT2PNmsYGglWnI42yC4fn64xIgaD3eK7+/xRHdUhPOhGvzvAZcUyUfLJQq2ECAG/g57cqPM8M3HadbbPbJCo+ovsHsOUGKCcwcjw557vKpDF62uz2BkRd4hqvKiBoCscXiRfUa850nO8NX7B4iVSNOcRojEO7buAGd63e2lyCsoBu72H9tc9SFBe5GvSqfKPRQSt root@b87405ff-17d2-11eb-8cf5-bee87f5cdaa3\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+Va9nKHKAoI6/N5J+64Xtz+H7YsvVWssc5cPmXg3kTJcnSAzVpc7fmcID+XJi/YyiwmvxDetOz40xvTEN7hjBUpV1Vs6ZNS0VAT/+ZK7T7BTNhCo1Ysv2QitRpoILMEUb261MY1ZBCjIMl1QDUmoBb1EdODV3Snsd0H1SHeLpycmXrhsDXQCZrwta9Cr3U0sH7JsdS/Ox6YBus5OPj9+C8B+YSqtxD05jPvTyhK0+Fx5dWVk3qxHU7fiQnPEc0toApRj8g7UDuz1Hc78rPOG3bm67UHXIXnJZiO3Qv7KxgZTxROfHbUHh2kkI8MbxGOAZRqJ5PadfX9pb9VyFxr+t root@ce4598b6-3b2d-11eb-a164-f6e7f2ebcce2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCRPT8UIi+iVkk4JzMXib7xT87/8QOaKzIsSA4E8xIRpM2xkFu2no//kXthafOFhsaVNS8/pF172P6wwcbFb7c7rFVe0mz8DELuKLgIf28feJi12DJnqyCBV0VeBwM5WiUWxkoxe/9U0fg0SwFyUePBLSMUj1snyjsJbBBJSlTEknVhvOAgJCXWuaCtpxSNAYCoT3RYdyRdiJDsGReadHtLuMOvbbQ5vcOpZ1smuBMGrIDHVSjNY7lOYzg/20sd3ScSrHESgEf+WMSn/zdv26mHwCjbdNSEm2eElyGXgC7gmEWamcTxnw8/wDDcjcA2jsseQP2aWKT20+58r3dWVjh root@5fa3f569-4a63-11eb-af93-4e5abfa0c065" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDM1pLzEeSPLc2cmmIhzApl1PeaF6TtUu82NXpcjpH7quFWgXUFHacBqRVjhmul+KTrPMWtFM4EMBFcUnPTBnn5nfLjww0DlUpIcUdSr0bx6Agby0V6oqw9SEE+UrY0Dog8i1+MxP5dN2uzv7v4VoQ2GNEVCfxJhaNvWH/ARMybLePIUZ2HQQ7Cv0rHxKZiWoJb8nRSsLEgTXE8qLHdRRZPzyT91Whlu3CD61ev+H8deIl+pdYNL0UqeeuHDMyz7soRrcdzuQwIV2MYk6c2NlkS/3cKP92SUi9iyaKJzop4af7epx9Cvg4YfZQLEyKGH7J/spedbMkcYVyu+m6ekCu/ root@c39ffb86-e01f-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCvlG/aoG9SbtdcWY156J2mzu4byLG3eOoiltMmc93droVgqSXaZCyq5F+/ia+ibqremlmHmNafh235BmFaIhISlFhb2aDDLn6auU0/uuK5WMaAmIV9tAF/Aqx9EJhU1bQDXzrZlxUguCDG62HaJ4hTiiEo0TFaSXdlrJArypWamnxCJpPSN+0Ru1iEPmNXyHvzqsFYv+BMMct8fW6T+BHPtdWvLwvMXrDPZFhFn6pJoVWtVHqklOrlTDGiOjN6oeOfQRN4ZFJAs1Z4JkXwPQBkkR8UZYVH7L3m7arzTcQRHU46Tw6sZFgPGgBaPu5OLZbQWpSsM8LODZNzc+Ctw2nt root@f5be5010-e33e-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDL6PaJdSE4cD+QN+n3dkY2Y6t2eC9ucCog7sjbu2qf15x8WfA9tGJcuxNq3tj2JJqgBwF94R623VvYnGPV11vLLgcpmn5S8BpEVI/qE42umh7tIvmUO43PtvnawtIfrMcJ+Ki8L6+YqF9WOq6hvOR/Ef0U3x+jd1PeUBXneNGvpM4Wb9BcYCyuhbCmm1QPrX0k9DkH3WD4iKkh318k6nh2Dnjt+n+RUhjbS5apnB3ioAOEx4/6BbVk7A6YTNiBgbMhwN8eBu1arZnjgUu6cWWlTfErXK8sC4aBtGfOeJsrzjUMwKTKq242J7oqSOKE5defsEs+4/UR9u3ChzyNojt/ root@1b5f6337-ea19-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCw2HYauYeEkAlVSS0lWWSfhw0674tkUjhSyirSPAz98LODmFr899JE8XcV8624o2i8kKIChFFUwYHonnjEFMFbxQqcOBz9CxPYTtyBcJTzIMbu00No5raha52ypFW04bzAPXvhWETeJ2VvLuF2pzAGoYwqw0K997bCA79YjvlK0yzKAM/snCU5+98URGgz+ixIjbTrjOomy+IKlmnlYyKqpNPEQG8xfUnr4lrqjsu3YSfD5oP+66h3FKzMxtgK7loBKxBfpZcB/L5Cj18FscooY2BHHWmGPO8C7B+KzfNW96M++GS/9xTPK7pXKx+OWfH5RXvZby4N+NWr0ZPzKHGx root@cefff24d-ed51-11ea-aebe-3e85ddc86bf2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCrh7UZphp3Jn+Kr/4ugYgnWAFBi8IJjtbEy3fvXUxO8WkCjGHXwKJCVrJsGoHGaU/GOB6dHDBz9qfKJ1/7t6ybRXJ6N23H5K8GpjpJcZlqSiGybZwqq8HscjNo+mjlbdcht/I7PXHORaEX11hwjHpssNA29G0Y/zkcBbg42LWGwiahVPX6tHa9zs4lZEQPsoEOohipQby7AW3Z1JVF1vw9uvjuMT3ISg5c6eH3tXB81sVUT3VDuou6P6JvB1oYoRds2WlJugwHwORw5kKwWihkut96CHNkKGHrjefKNQ+J10LrcL58eCYJaVQ8EwqAdoFLIiPspa4/85QoPxk+9v1T root@493b066e-ef97-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCkknyBem7SKu0eZkAOAYSp2SSpSdOhTPCYm58/4BkfDoVk8Cbt1nlXPkkeM29XaJspFucOe550VH+VEZyZA2TSbXh99rYc0BJpOQ3R/cd8koz6RbRE+hXwfhsCy/l1r1EcISgQ4P9dS3hNdiXPZtD5LUmiGMqtTqmrrczW04lHFD14o2xXuEnuX6pcIZVfSHbOAj1+BZ5iGACKkkkkA7v9wfPjsxzusiuTk68wIheYlBKLARqM6HK44ok4zVqoi3QfZXen4KR2IEaBCwdd4pOHd42z+7sUCaFv86FYZmIqpi8LdCkTKzldkDy/uGykP732qWK6jUHLOr899s4dQekL root@6d4c6211-effc-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCdZS30hmYUbl+a+cG9z14E3EwlI1/DlfnfuQCrWZKIegNX62L1LBpoQcT5qHdYvtMbd1+D6S9CL0xJvU6cdFhkYFO9ZvKTshZIAnOrJuvCsNQXWePCpJpClC7BQPU+5vxsFp3yy2VD8jMuYcfBtpzobC8FMOmF6yL44WSC8/S1XvD9KDBgATLBSvgkeAs9xqQsKZHPh8a+eG7EGA7PomdfLTdYjsd+iSzlyRCfUzxjiu/qBK+PXa7nrWY/5IJsnAFjZWwTgyUP9MXPzqu3dj/YF7RSMr4myQkD3JJXa6CDzTdMdpeLSNsDnY7QbgpEmLHytUxjNh1FIXlopzl+brKD root@eb70f181-f102-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDWZK7AR1eFf2L6w9Rg4N/Ekt0fm0s2tkTIthr053B6Kw47XujUx35HDNWeB5oZpxc2l2QoRYgTwZNOOjNkjMzITH3T9llVLC9yfuD6HDJUbJAuQo+KwG4mo9X/6gKg3PRfawIqN1EQHj7+GrLVQLS2IeTfBBZPjqehrPmrGTMJ8tKMwb2/31PlS0JckrInrVvziWSBKusKQiCXUba+9YEqwpZl6F3cdFkOT2/Uw4iWQ60Ae+tb6Qx0nFXMjThOY2ixGhlBwAeCpl6bKAGC/qWmvL/gD7sqfD8lk0jMjOQFp3nJUer+Rsknabw15XAmN//NWKCypeSVFVQkP9EMwREr root@231444a1-f145-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCpLCXp5rGH5StvPA3ON2gqPo6orE/jfsZpn6vXaH5T6n329CT6+QS1Tx2F6//J3VJvaE+O0eoHvlRihytJGNGvr5nuXax1VsbB+AtYy44w893IbV1VQcJqpnyL06ZtYDgdpPO5ZG0MxY38+WhzeGVVAq856e5rROhf6ZLTgY8O3pocFS7Cnqr4JXagVC2n3MnYnlInOYyLV4oU43TUo9QNW8SigNDLb/JCuHVqA7vdsZGdyCFJ0qEFkLREMm9dYSGYi+i4Q8JPJoxELFyV0l1j6C2ossUJybUjbvrDgemh+AMB0N1VqCIsL+bv7nTwrjpscCGP5mNwToY861v+9Sf9 root@f79ef096-f541-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD7LFbO4aNFGAHPspUqGUwQEvfblHUJ0nzRtrdJFdOluDza6CwWm2pGt5TiY0FhNC10rQtdnY2pORdRzPtsfr37hFPVtf4joX7nzKQLxmQYeE3T8QTqWbaHW8XxnObMQG/7HvYVFbG3aN/fs/fX1h+m4lUfcpw4g4vOJusMLKZfzZWg+ybQ29gkli1ddBu7Wt1QepRv2mLV/XBpNhewj6U+s+D0Ra01bo4oYoblRk9tS/fx7GInb0RTWA5H0xc5wo1OOzI7cpCglH9wC05ERZuGT7WvYOT6W3NOGPfA/CYNw3uRGpTEiKRXxRuzZkaFje74JB44PCBy7PlKT3FS3hY5 root@a57534ad-0167-11eb-b4e0-eacb7c15c8a0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCuIoNOxUnRhegs0+oto6Ce9Xk/FlAhoOGbxbswsnauoT7Y0nnva3qrXN6wRZBWJCfiB/KgDDSaxyPbPTz4k6xGlIxBy0cmd8e+8Igbezfnq8hLlwYfcZOJg+ZPqAtCuVRbPpFBnSh0AzwkDfJu8+h30Xlzae2pexe58ljZbnjqrfxPy8jemEpwiIHkdglHBcwrF+W7aazy6i8ON5K4VHvqYfAupj+b9zyDslHhH6z01+Eggnh2vSFzV++ecDKpy2u6S6MaByoiBhvdyoi8TOAC70m8DqX+zACR54WjZm2aJjdfTp09mAev9czXEk2bGecSCvp+WvhhQiC4sEmP9t5h root@23162976-03ad-11eb-9ee9-2af320b50223\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDX6sj2zgZe1h55LEmvyWcvg6ehhCoJ+3PtEp+jDm+R+K5w09PBm8YCV5DadeqXccAuCHbdxaKZhCSuCfF4QKDeebZd+ftjiZgfsvqhyg6jsepMof6lyTm9yOBSVTLJup7cunvRr1f5fv8QM7bB6tehw8nD/aTqI1DVqkwvniY+HCexIHf0ZivFML8nhhOE633w8FsGY6DY2l0EN7ERqGz0K/oqUk2fv8Us51hELAwq07F/kZIFznzntgZf/EuHc59iRQN2HsKgj3P1zmmPfhLzhnDvDPn14bxC4V/laZZN3OwQpYqM+A5Lb2RxIsCa4CugXmz0ON2HzkjBARrT3QAJ root@ae7474d6-1296-11eb-a3cf-6ef374375bd7\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCl7cgEIz4yJNxne/LmKOOhIvXuBWLZ8Myt48BjVSTv80eY/F0538A0Ul7ecraEi1RZYRKGbhUaYU4xmdhV1lTM9B7UmP66cKjvrTOJuSmLaDox+Mw40qCbZiSEo7NIdAsvTjML28B/G3hiSTlkNT2PNmsYGglWnI42yC4fn64xIgaD3eK7+/xRHdUhPOhGvzvAZcUyUfLJQq2ECAG/g57cqPM8M3HadbbPbJCo+ovsHsOUGKCcwcjw557vKpDF62uz2BkRd4hqvKiBoCscXiRfUa850nO8NX7B4iVSNOcRojEO7buAGd63e2lyCsoBu72H9tc9SFBe5GvSqfKPRQSt root@b87405ff-17d2-11eb-8cf5-bee87f5cdaa3\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+Va9nKHKAoI6/N5J+64Xtz+H7YsvVWssc5cPmXg3kTJcnSAzVpc7fmcID+XJi/YyiwmvxDetOz40xvTEN7hjBUpV1Vs6ZNS0VAT/+ZK7T7BTNhCo1Ysv2QitRpoILMEUb261MY1ZBCjIMl1QDUmoBb1EdODV3Snsd0H1SHeLpycmXrhsDXQCZrwta9Cr3U0sH7JsdS/Ox6YBus5OPj9+C8B+YSqtxD05jPvTyhK0+Fx5dWVk3qxHU7fiQnPEc0toApRj8g7UDuz1Hc78rPOG3bm67UHXIXnJZiO3Qv7KxgZTxROfHbUHh2kkI8MbxGOAZRqJ5PadfX9pb9VyFxr+t root@ce4598b6-3b2d-11eb-a164-f6e7f2ebcce2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCRPT8UIi+iVkk4JzMXib7xT87/8QOaKzIsSA4E8xIRpM2xkFu2no//kXthafOFhsaVNS8/pF172P6wwcbFb7c7rFVe0mz8DELuKLgIf28feJi12DJnqyCBV0VeBwM5WiUWxkoxe/9U0fg0SwFyUePBLSMUj1snyjsJbBBJSlTEknVhvOAgJCXWuaCtpxSNAYCoT3RYdyRdiJDsGReadHtLuMOvbbQ5vcOpZ1smuBMGrIDHVSjNY7lOYzg/20sd3ScSrHESgEf+WMSn/zdv26mHwCjbdNSEm2eElyGXgC7gmEWamcTxnw8/wDDcjcA2jsseQP2aWKT20+58r3dWVjh root@5fa3f569-4a63-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCyFNTaVPfqijHskHMe9usiogvLrIHm7NXkDM1EGkXkO7hc1vHsirAZrggP5J8LKMj2iiIjz/jLh3pWYrGcl/ow6a9Hq7T1CitBZn5z/DcwYlTBjPmsvC1al0FrjxO3FmGn/HDwyTeeD1tdIRSKsllrKNl+mVmY0OZWrRLe3W+qU8zXfjZNc/2lscYWz5ipbvJub0xMllwPTagAK6jdlGk04JVnOfmT9lF5pfSm4DTPQl6REGPtzBZbYspYegNBzDU9w/L27lCmBDFCdrOAy30gUHKZmvV36dWfphXXh8sbtzqtBm6xk8884YMjihMZDZXSWxt5nJNQJrl2ZyHlL5rt root@325715fc-7c8f-11eb-b5fa-bafb05f6310a" } ], "kind": "compute#metadata" diff --git a/audit/projects/k8s-infra-e2e-boskos-071/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-071/services/compute/project-info.json index 0e44d6d4fde6..40c1474a04ac 100644 --- a/audit/projects/k8s-infra-e2e-boskos-071/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-071/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIvxrIm116KcgsKNTAHAbDqE3ZmgT5mIs1b0oOaGJWmQYbYjXV4pHJYB2Dy4ko5IT3rXMcxO7IhENbm5b1zPb4Q/lLLPnZzm+36PmoEjky+Vj0tbWN0t/FbqE9jvtq8cgnoIaWqAVws5137mbJyTY4nDgICp1OAcQm7hG7+Pe1T/G0jjprzG5LAuRPS8HRL/7rx08cLfsngqIJ1VzaYGUZ6nqs377sA3SBgbT4AuOWs6MJ1M8tYDjBDMdJbQa96g8IWCnnL4xLhvkfi77ZYKCW0WTmxmIHP4bafTm52yvc+eR/TC34xh43D+y4SrY/pvzCDLBigPmQtHLl67f2Up/D root@3aed3fc6-d8ea-11ea-8c1c-d23af84fd26f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC3WdKVQzDBBKR9IHDHrffIXNZsyqlJOZyVoV00xCoSJxpwVamG5BLyE34qaAr+lYwCLYpm1F5cYjTDdwn6dbvpMR5xKPL3m18lWLTr7OxMI9oG1X0cYhSRbo+iBfG7xaswL3dnPZvWOHG1Idc8zVho3rPvph4NmKHbPIYKp1kE6vLr+dVRfzdeKUmGsub9gKw/iMOLHvVCdVG263WltZ6o2dBd491bwzwFqE+iTenNZTlx6hVe9C76Fh9XKLqY21iVXHmzGa/gphrCX+LmJos1uJlzqTyMcyKfx90+splZsD2bwHFu7lI3mGUpswcdLme2ihr57bkeu6HCIDaHVWi7 root@392c8f7d-d99b-11ea-8c1c-d23af84fd26f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9FjkMaIpzuy46LcDoRu6nD+yGZt9PG03s9NDf8kDD6SO4s6na4VPvP2He1X8cWoLOQCAgMFDt9e3ZyPS8UptR0HdTYVPpzfSj4RxVgi2wsHjAp8TVC4z+OPSFa+UlRDQO3XICm9lIBrzyQuiN6eMCCdjZAivRgZa3a5LUzGEyXq55ytF/jLLjCh4OckNZ/sZ3OncFTxz85B8XWjeiC6mRKBQFILStchKq32CsRjkhFqqO2ffQZxBJdbwMY4ojRT+R3hwWDwyKWjRBIjJOI47x84n7WWj19XxUXs7u+dWIWRFwzyUm7y8v9phGn8k9KaHc+AaFFKH9/qywf3TuvLeD root@a5ce895d-ddd0-11ea-8a0c-be937dd98cfb\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBOa7U/Fas9hmhFryiX638/lSkM5cqrsfDZVCY3nE/EuhG86jVodVfLxkxvqG5dy1+z7EdZPFOanp79ALgzq3MpbJrjebfUO4xohvI8jMGqYn401sB2F82EFGUBOQHb/PPa1R7qPYkVB1HD5/Y4+voKT2ruE/YYqWyJUq6mzGUHDTcG6aagKSam71Ik+6Q5NXiXOKU+aDeqOkJr/MWHJ1IHxipn1y/4X2gi4d7BbyH9Qm7ob0Z05842JbU2PjYuW5sLF0ZK4YJH33jAcr1PKHvmnO3DdIAQX+W0h3KV0Rer9UEIUuAlV/36gj4zD8hrwtLazWZdehintJV69/wtAGx root@b1f76db2-e048-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCeOtr6+psX/RawknDtpUBDI++5H02U4TFpP0EvZq5+Nz8GsWSsxKiRNmqTciys8j18BF1aDtXQhH8ddRYspbt1RxYGRkEIeCeSN5ArJ65j7iClbKp+v8DqHeLU0Re8xmMs8sEQuemUut/WPHIKq+NtsbjlaMyLAPqfMVmrknVmlQdpmYzI0vrEMVLtnpII0amwJOTKErkhjIUHGweMePP4jJS5SPeWYUIHZ7oOV2qs1cn62U2h550p0akOhcHDYHnADPh79CZV7p+vAM3o+nivBGFS6Ki0xh8UgUFZ9AQQO8PXEfSAVT/Jh9WYJyfGcduetWLDuRCaWrJp9urZW5bF root@e29cb9fd-e361-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQChhMjoA9H4BuCqND8lH+xL/K8v4wKYomvQBF/96dk7Ekuxsn04wgRQwDrpt/rlZgxWkLjn8mcABA+yOyiLteZkulE406FjR8tbiqIwExt0Xi4yDm6E1WhFIXD34FaoFzZwwnuscQNJScn2d1pdBiuFnP7+F9oUOfm2EUf994InGiXD4Zj2CU1RqxvQp7mSjqmCw85RmO985ZNkgIie5IUJM0dbWhfkJKWSTBzQGPNw/VPiexU1njqw3japaRyH+HmIAIc//iimwAgVNNUiAFD+2f7T5ePWPDj0sOODGZa3HwOdshSXi3xikcFkuum2cZv0mbm+tfIfzb4V7P5GVG23 root@bbef3b75-e671-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDPPgXGz8AJZiOXKhu/NBp20TS97qImwsptuSTMefyJjRnkWZPEBq5Tyqe8rZOIkxe77kttYJ1+SWuoMFRza5YI7AGme56CiVMndyclBHiVwNL6/q3dUZrNJhYcRZrmxJ+3ALjRl9DhJHbKG5bu5rMgFO7ycKVAsMXAVispjJV/hE4yZxLmryv4dEF9VFTrq3FcrWDDCHVqsNvKPdq9kvlmjckj+2YIyeQLqbHLx5A3TF7OL1qe7hdzPx+bX8rx/tWYhqc6g/AAG/dgWobab0w02H/M/K3W7GW661hg8dMHqML7DlZjlqv5KA3b3c+G4fWo5UIaEbyx0wCIWtx0ug8H root@bba8ee9d-ecc3-11ea-aebe-3e85ddc86bf2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDY4RVvtnWK+ytldHB47pxxjKEaYnZv+3kxT5IY4yqOx5tWU+Bi/MCurtJ7d3yq4tSKgEEpzk0aOvTBsRUdPWpXB49BJiYF2wBUdWPnIOkr0CHS6zW5+T7bkkhCGYCucVhx9fzeDvLvJXn59NG4+QoS3YSmhVWKmukVN7On8ynfinTmNv4bbs4EjuB/Utp8HCOsSKXwNTlc+rHRldLkwRzvq7qf4cbJUjZG4U7aWk6F6zHIn4eYOtOk4OflU7Vwjx9qL6x0OqS4/M/Q4QJUQRacJ7WE4iUog9LQuC3fJVe9fUDUqHtkPjzeIHsoqJzzP76tTLy8iY/Q4W6Pb1iBu3ER root@b884acaf-ee02-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCtRhZRL2H/sNvGOzVqnJ8WBh40CGI6CIR8kj1HA9t5YDj+c7EW508UZ2EylBwD8wKJEuGDW4B105Gphx9epEqWagh2Rmul+k7nB/l+RzSRWh2ea0EPlrJIuMrESyVdQhroUC5DKVBSfvhreuEn5O80ubvLDc9HQWj50GlmUcSQwVukpwwKCP/JOJEzKFKNmjnTvm7riQRb/axcTCBYBqiycdI1JwSG62EBrI1o1QHjl5ko/W6DIm0CrOKgHQ3gj5wU2LkZ35y+zuTdKlr8QHz/+gT0JcV1q/7I8/plYVtoE8qdPV4y/w1T4nBhQZcTQmnTrBB5VFKYpYh+4Mus0avz root@d39427b6-f4dc-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDRWePFOo2DzoIAKqNTINVOqUdxMs3/T7fvDl+a2gGcjQtS9y3UzQBxwvXcrO2GtK4s4JBlT/BJzrNBJi0KDPObnuMRJDOE2vuYXVNbmyyP5BOc5y8gbxEuSR3yujI8r922YuIGbcPYzbObaAe2mzR/PE0WkrSROwKVY/+gRwGbmGbbORNU53HSvtgJBRLMFJtR9M8uLvgYyEykCI/Dngr96/XpL8X0DMoh5OIJUwGXpYkcsfKBe2PqgJjQ+u5C0OBayLiGEiTGyXB0mqMISkUUvw/g0U2FdfuNmvgOl/hDQkrm+bXY+baKkRfxowrpXdCPNleUkfIV34pf+RpHVVcj root@caaa3642-f7a0-11ea-872a-bae3dc204648\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDO5XwOFHaJblOS63b9DvdC7GnR/mwbvwGROmswwrjnl8ZrBs3liBbor7B0lLGBXf1+h9a3gPDP1x+rH31pRH0pR/Y2f331ospimNDyww2sYe/OO/ysbyo1xNX06yEnPQs71YAkKf8RfM1Tj1HeFF6clZJIakqTyz6vxbfyw5jOyhCN4Lb0V9WmgGxX39yNhunXJZm3C5klpyHNkvWaL9H5A1RLRGnaAXdrgWckZxf92yydiBg7KJA3UHUdAdyCNcriDUOgwXmZ8Wiq0joVuLv6VvkSRAkhkJvc047vBkerGMNQgGJyo4I2GPlpgrcyEBQUDGlGUyYNy6i1+f5ClM4R root@865e04b4-058d-11eb-9dc4-ba187aea6a9a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC++1ok/Fr6hiGmc5sSze9bWsrDiQJOqNWuLIxNa0UM+q/Q01PfSrQj9Qti5VADZdyFbLN8vF7zgPvmHaoPLGFhosPDa66vwIZJKFNbtaS1WHIWuITcy4dOF2MtJLKJ7gaPVemSQkzZ2YhV/VrBp5gRbmzxr9SGEcxSEy0zoUcptl0wNcdtzNMzspmmmAXituStAdvSkoQWBbIY0OWS2Giv5tVFJahT7HMsJm8DdyMes88xFFvsexmZjJNLToAAn7e8XODMfgOEXq2rZXxiTFbSjPspd9gbh6uw8D7Z3BlE/r5LICfLdwMmiyL2bf0Ckzoa2bfQY1qDVaW+g/sVW8oD root@62f036c7-132e-11eb-a3c5-629ea79d0103\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZxQqx/iLEFQL6qgjOi9ZnZ659M165F8JrabiE6JGMkTyHVNTC1+zbnH8Xtbo08TBKON+mVEaZWdVfWWlKVQjtyOyoYQ1wjRS5FYgfEfr2f+HyI1ZRqj0El2RM0JTZLylt6oU0IOlM9PgBVwWWdMHJOsVt6OvdN/3jFEZKkyOqb0Ree9mIYmQIvqon4dWfuiJhjgBPKY9e+DNiMP6m3mSuHrAgHngaA4Wvn8yqdEb/l8qFC7zhQZp3oIhDwfgVWHws0/EuVMiR9U4sSce6n/mkEypRIDwBeIyES1AzfTMm/ZAcdUTtsf712i86QOSUjoC8SFWzcqTR297BGsZlI1ev root@2a0e7ba3-16ef-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDwD0N6uPTrCgqh3EqY1rJaO2Xmmhbo1oakK31eB3oxeK2Z3eBdV/DFUXC9blyWY9H1G0h154LclAMLalm1IPSIN772zI0SXAf3ggZDXAbWLB9Z4N2cg9PGI8XE8VZgy7wDGJGW4keFIQEu0u54arxs6tfMkhxxFD+F9OfxyxqEqAKIG26uNuMnZc137bx1i+W13vce8VaXudK2gs9Vd0uT2nahapjK3CZ7B4QAUZG3QwxD2j95Z7W/CTz7Z3wR+LZ9XikQruWjXZZck6jyes8K1i2grhRyc+XXxBhWfr79wSjTNvdCoEWZmiZLguk3C6W/lwL2CcKAwZ8zig6Qt6En root@2e51253d-18b6-11eb-ac0b-9a760af27878\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDXN5of0C8yNMQllXYtmwGTZdYNmHbbOIqPzrbBKo2n/M0KpP5q34RoAN5bJhJkIWU1PH0ue+qm7YK94pPrY7neQJr10SvqOtg3ux4FwD7QvCPx/zm6EqWceE3uXDY0Lxp+b82xMRf5LaRokwhTivuA1tjs13PXEUNqCkZ9dnTi0uINmpH3fYbGWoGQd12MdvZlXgo9U3MqFUF96BQC0TVYVmW1nhbsricR9dooYYZXLtiVcJLh4aChdjjhKI/KIHsCSjMEod5RGFDuglOpK7EvqF1e1yj3PqdjX4fmmdDaI7npWH8WXPQwRBTq0ItATWWn0KIYiuvPP9OqlBHtpWS3 root@a64e8dd5-2476-11eb-bd88-f687e5d66392\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDUIWW9SbfhtEzIXrbVoRJMxUOwwdLtQQgxhDqdI3o1WnwZ9CAXay3uWA3LKK1fSpN54sWUCiIiqcZRhllJ/oPgLebTw7z7U5H5MOtHyifl2aP7+QsPFfkTgMVZpttE8oG9bd3Yfq7BhSBO5Ev2ygveUTb69W3KED03+QLIlFuZfavPk0nB7KbN/FEqMgCf5vGicdAebAW7YkYfGLlvYgWgAddUGHVNyzB5/bjmlabMp1HIrdhoLHVpER8KeLKTv+AUuifONk/LgUOkbBykJshYrDraEMzBTFp8bCu45ktqfZ/pOi1FHUZI55WMluqeiUFYj0WQQtYkWD4rhK67SYx1 root@827018da-24c2-11eb-bd88-f687e5d66392\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDfbWj1twQH2ND0+3ygHww68P0Ovyk7P0JI26cAK9ie5OBwqscsjmMEJ6d5Bj8u02r9Bx/7wyiB8P4ZKJ69lcM7abqBd1j8HRuRxM2PruV/+PD4ePvdc+5/WT4AHIfRJnin5croJNQxu212jsEJRAX60Rrw58MQzMSwRiTAYSw6pey31QJDGT4cWe2Q2nRrmBRR5qowd9TgU8dNl8vnBBBdZENiCoiO8F7JYd3tKqd/7JJyHxfSJqS04Ao0PCjZg8owCIaoh0rZeV4qhg9yFc+Dtsn5MREGTul+QkjGpYYH/0mdTHyLpXYB4NDxw2AOrw5QXiYVbrzTgGtr43Ti6oHd root@b0d1b357-26ee-11eb-bb1f-6e397dbce9be\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDRmDWZZaVfj/ydo1kf8BIfJ13N8zlX4vylu3PfDYkxipaURt6wapcTCwrmrVsPOJjkaSMJ8/WO1wCoMnHShV89TYT5aj6GTjlmWQPiAvAEDAJ+yjXpJmLYvq4BEZ8tGOCm9SDFTyYD6a04XlmsyD9/0u7E5JjoRgNQfboTFoqOOXbYD8Z+lyLQlyUqIOW/AbKYfj5FqPeurVIO7n3DaYJsQeFy22Gn01saAfXdMIkwqsQa3FaFOgCBM/6dIrDce5XLKv7RW/vtCBqkHvFZYp3w4Q61Fannqo5uc+O0qP5HlwNqIg9rc+cDRwaxq5Ahdc8jTCZXc2T79Dpc+Xaq54/x root@4e49cb43-350e-11eb-9896-aabf0c108015\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCnoAdaUd+GqmFt5iz7/JFT8eQgSHr0GnDD+SbjRx+WEf8g32FZJam0OQhhT5+sWqdS3MlLyXIuVoinEKGH0+6LHxZI2X/Tr/D8Kt5tc2lPHWynPtJG3cljx6QhKKzDNTBDYW+UZMVA/aJZjwuAghmA/YjIisdLB1RHWEV6fP6+eKwIjgx6NCqvtOTZ5jN+u+lxAjwJzUD0S0FBM75DBX7mYP1McRTQOhHh0pAKhRebkcUbH/kI9AGOwFszwaLiXCzIAfyji5hKJNmK78WuDmcX8wcyd30djJ+zY0MO81MKukTxQHzc5Ewq4aeStl4SY6PksaDsjXvPmkBy4xPn8tOD root@60647805-3624-11eb-8ecf-c2fbd71c5254\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCkj74L2iDHwImorvKnWLJIf5s6Tno4kSfsgZ3G9tjkzjzaS/rlpoDo0yIwJPSkL8qgNkpGyXhNUGsUa8KtJRK5WvOXYNiIeVZDq6Xp5bVhWcTyHTGii5oZUcy4IMsBBQFkpIp94Xtg7f2Cl125XiiSUfvay5x8IIqR4pQLhNYxTxdwJy2s/RDB+mKoz5gEKiIbklHbJB6vsklZQP7JhCzQGhwEKqpAVbAX3ERvwX4ccXTdykNAw8TbR6DQiZAit+fi/86KYc2RRf2UwkfCZKkGv7wc8RrGYHX2LLzCL07XqSGKeVh7WPCPsuEriKEPgZTfGnqJjOIKYpDjDhaxKw7B root@cb437bd1-4f07-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCpxhROeBynoAHYpnhwhUvNSbjtDzKkxB5IgbpI/Y45AMToMZe6+CLcTVjlYO7o9FGHNNRKskU/W6nD5EOHBCgYcc8E2PDIWxIOPU8qkkX0HA5o9IthtxTbnu7E5Yn0f3jtvOsSuWOMYF+rqnM3ZFiCAZk+SZI9RhhK82z+pnnz0s60gIq0xx//PYiDYkdpBQv402VbJ1DUSnUM/Q1ylq7JOjpWnyoy72kyC1xv2CNuUhAfJ6pRjGF44/kPkwhTEapfB0HjbKslfv00GSI5we4kKSd0xCGlW+dTkWhmdmsj9CTXn6+ZOklgysS00B4N3yW5WoZMy+w583sL1Z/np9q1 root@ca934aae-6afa-11eb-b0f2-e2ce0c220244\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCvqRCqaYeoP+tnu+XG5VppU6ae7lGF0BhkmaH+sWo7J8PpDrIYVtErDKLcV9gzv3ezR/ozyEeQ08MjG2xkgulBxGbMocv+F3WWaptZYcbdbtgbm6VTdW1++GiWain0vn7tFA91kcJEA/yYMIqw4kCozmNHn1yV0/dfnq2nin4eVfGW7TP+/fLAyUoeQxtJCgviOPbzaGtOvqgf0hv30K8Pt3N9gWzCnk3rjWYidRV5Msr4A8b64the6EIHfrPMXy+XB6YYUnRC5k2/qz8mYa3N2ZDU7a9WLGKkoYJasdmHzXbbwyqZbKfyZ29x1obwsrWRRPs+xWcUDxMqxWRkllKj root@ac09e0ee-6d0d-11eb-b7c9-5211a19759cf\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDgAgk6JecQfrX2U5kTeoOhoytqyDH+Ze8q743sU1wMACn15y/rS6Kg5DsxxQ2B3SR0uTnX77yCK8YZJL/+whzhpzuy1fS1EwW+NdjklXIcSGt+goIZI6RayhC9FUWUK/VOLgbYNEhAaliunBvkoOb3+cqHYCgJXVdGzUy3JAZBScxHKp5yfpouxHr5/3kdDf6ix5Mm+v4dAMh93xQlE6KHy2cr9S1SWpZ8/cGZ7Lw173HXDvMvhSyUSeiM5miI8NDHbwN2DOx+nZa1XaRWyG2VLdcA9HXPtm0kr5GCY3ejE8XOMlbCFN77YUmp1uw0n6EMARXiYnZO69QYp9BIiZbL root@c1ad92e2-7410-11eb-997a-9a089b82337c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0WmPVVpREOPi78RefyXGxmS+Sdu/LI/4NCMCMdVrD4OHYnRCv9swBhfnhS+Ivl8HGP6FBA/fxDKKFF+XEL3J0O60joxfxJ0mN7BG1mZ6jaG2SkRtpM+ZRpC9d+AM21JL1rfZW22v3Rq3yz3KICe12VUdZpUQYYBddYerTIx9yjrZwKGYdeXFgB3x2StYhDvA1B/E4SdYtwi8tCLeEUNznWp5WnYdbe/ZY4aVOH0wcSsfYN/ABbmsVJrXzLyi8TrjtjTCq/JKtQ922I5Yav1DEi8GdhcYl0jJV0s8iJj1nfA6UeQqVdTF7t2vZTVzl246T2gXMUSOkWrPPiFxdj9wL root@5a809e2d-776c-11eb-b42e-62dcc321ab6e" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIvxrIm116KcgsKNTAHAbDqE3ZmgT5mIs1b0oOaGJWmQYbYjXV4pHJYB2Dy4ko5IT3rXMcxO7IhENbm5b1zPb4Q/lLLPnZzm+36PmoEjky+Vj0tbWN0t/FbqE9jvtq8cgnoIaWqAVws5137mbJyTY4nDgICp1OAcQm7hG7+Pe1T/G0jjprzG5LAuRPS8HRL/7rx08cLfsngqIJ1VzaYGUZ6nqs377sA3SBgbT4AuOWs6MJ1M8tYDjBDMdJbQa96g8IWCnnL4xLhvkfi77ZYKCW0WTmxmIHP4bafTm52yvc+eR/TC34xh43D+y4SrY/pvzCDLBigPmQtHLl67f2Up/D root@3aed3fc6-d8ea-11ea-8c1c-d23af84fd26f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC3WdKVQzDBBKR9IHDHrffIXNZsyqlJOZyVoV00xCoSJxpwVamG5BLyE34qaAr+lYwCLYpm1F5cYjTDdwn6dbvpMR5xKPL3m18lWLTr7OxMI9oG1X0cYhSRbo+iBfG7xaswL3dnPZvWOHG1Idc8zVho3rPvph4NmKHbPIYKp1kE6vLr+dVRfzdeKUmGsub9gKw/iMOLHvVCdVG263WltZ6o2dBd491bwzwFqE+iTenNZTlx6hVe9C76Fh9XKLqY21iVXHmzGa/gphrCX+LmJos1uJlzqTyMcyKfx90+splZsD2bwHFu7lI3mGUpswcdLme2ihr57bkeu6HCIDaHVWi7 root@392c8f7d-d99b-11ea-8c1c-d23af84fd26f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9FjkMaIpzuy46LcDoRu6nD+yGZt9PG03s9NDf8kDD6SO4s6na4VPvP2He1X8cWoLOQCAgMFDt9e3ZyPS8UptR0HdTYVPpzfSj4RxVgi2wsHjAp8TVC4z+OPSFa+UlRDQO3XICm9lIBrzyQuiN6eMCCdjZAivRgZa3a5LUzGEyXq55ytF/jLLjCh4OckNZ/sZ3OncFTxz85B8XWjeiC6mRKBQFILStchKq32CsRjkhFqqO2ffQZxBJdbwMY4ojRT+R3hwWDwyKWjRBIjJOI47x84n7WWj19XxUXs7u+dWIWRFwzyUm7y8v9phGn8k9KaHc+AaFFKH9/qywf3TuvLeD root@a5ce895d-ddd0-11ea-8a0c-be937dd98cfb\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBOa7U/Fas9hmhFryiX638/lSkM5cqrsfDZVCY3nE/EuhG86jVodVfLxkxvqG5dy1+z7EdZPFOanp79ALgzq3MpbJrjebfUO4xohvI8jMGqYn401sB2F82EFGUBOQHb/PPa1R7qPYkVB1HD5/Y4+voKT2ruE/YYqWyJUq6mzGUHDTcG6aagKSam71Ik+6Q5NXiXOKU+aDeqOkJr/MWHJ1IHxipn1y/4X2gi4d7BbyH9Qm7ob0Z05842JbU2PjYuW5sLF0ZK4YJH33jAcr1PKHvmnO3DdIAQX+W0h3KV0Rer9UEIUuAlV/36gj4zD8hrwtLazWZdehintJV69/wtAGx root@b1f76db2-e048-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCeOtr6+psX/RawknDtpUBDI++5H02U4TFpP0EvZq5+Nz8GsWSsxKiRNmqTciys8j18BF1aDtXQhH8ddRYspbt1RxYGRkEIeCeSN5ArJ65j7iClbKp+v8DqHeLU0Re8xmMs8sEQuemUut/WPHIKq+NtsbjlaMyLAPqfMVmrknVmlQdpmYzI0vrEMVLtnpII0amwJOTKErkhjIUHGweMePP4jJS5SPeWYUIHZ7oOV2qs1cn62U2h550p0akOhcHDYHnADPh79CZV7p+vAM3o+nivBGFS6Ki0xh8UgUFZ9AQQO8PXEfSAVT/Jh9WYJyfGcduetWLDuRCaWrJp9urZW5bF root@e29cb9fd-e361-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQChhMjoA9H4BuCqND8lH+xL/K8v4wKYomvQBF/96dk7Ekuxsn04wgRQwDrpt/rlZgxWkLjn8mcABA+yOyiLteZkulE406FjR8tbiqIwExt0Xi4yDm6E1WhFIXD34FaoFzZwwnuscQNJScn2d1pdBiuFnP7+F9oUOfm2EUf994InGiXD4Zj2CU1RqxvQp7mSjqmCw85RmO985ZNkgIie5IUJM0dbWhfkJKWSTBzQGPNw/VPiexU1njqw3japaRyH+HmIAIc//iimwAgVNNUiAFD+2f7T5ePWPDj0sOODGZa3HwOdshSXi3xikcFkuum2cZv0mbm+tfIfzb4V7P5GVG23 root@bbef3b75-e671-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDPPgXGz8AJZiOXKhu/NBp20TS97qImwsptuSTMefyJjRnkWZPEBq5Tyqe8rZOIkxe77kttYJ1+SWuoMFRza5YI7AGme56CiVMndyclBHiVwNL6/q3dUZrNJhYcRZrmxJ+3ALjRl9DhJHbKG5bu5rMgFO7ycKVAsMXAVispjJV/hE4yZxLmryv4dEF9VFTrq3FcrWDDCHVqsNvKPdq9kvlmjckj+2YIyeQLqbHLx5A3TF7OL1qe7hdzPx+bX8rx/tWYhqc6g/AAG/dgWobab0w02H/M/K3W7GW661hg8dMHqML7DlZjlqv5KA3b3c+G4fWo5UIaEbyx0wCIWtx0ug8H root@bba8ee9d-ecc3-11ea-aebe-3e85ddc86bf2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDY4RVvtnWK+ytldHB47pxxjKEaYnZv+3kxT5IY4yqOx5tWU+Bi/MCurtJ7d3yq4tSKgEEpzk0aOvTBsRUdPWpXB49BJiYF2wBUdWPnIOkr0CHS6zW5+T7bkkhCGYCucVhx9fzeDvLvJXn59NG4+QoS3YSmhVWKmukVN7On8ynfinTmNv4bbs4EjuB/Utp8HCOsSKXwNTlc+rHRldLkwRzvq7qf4cbJUjZG4U7aWk6F6zHIn4eYOtOk4OflU7Vwjx9qL6x0OqS4/M/Q4QJUQRacJ7WE4iUog9LQuC3fJVe9fUDUqHtkPjzeIHsoqJzzP76tTLy8iY/Q4W6Pb1iBu3ER root@b884acaf-ee02-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCtRhZRL2H/sNvGOzVqnJ8WBh40CGI6CIR8kj1HA9t5YDj+c7EW508UZ2EylBwD8wKJEuGDW4B105Gphx9epEqWagh2Rmul+k7nB/l+RzSRWh2ea0EPlrJIuMrESyVdQhroUC5DKVBSfvhreuEn5O80ubvLDc9HQWj50GlmUcSQwVukpwwKCP/JOJEzKFKNmjnTvm7riQRb/axcTCBYBqiycdI1JwSG62EBrI1o1QHjl5ko/W6DIm0CrOKgHQ3gj5wU2LkZ35y+zuTdKlr8QHz/+gT0JcV1q/7I8/plYVtoE8qdPV4y/w1T4nBhQZcTQmnTrBB5VFKYpYh+4Mus0avz root@d39427b6-f4dc-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDRWePFOo2DzoIAKqNTINVOqUdxMs3/T7fvDl+a2gGcjQtS9y3UzQBxwvXcrO2GtK4s4JBlT/BJzrNBJi0KDPObnuMRJDOE2vuYXVNbmyyP5BOc5y8gbxEuSR3yujI8r922YuIGbcPYzbObaAe2mzR/PE0WkrSROwKVY/+gRwGbmGbbORNU53HSvtgJBRLMFJtR9M8uLvgYyEykCI/Dngr96/XpL8X0DMoh5OIJUwGXpYkcsfKBe2PqgJjQ+u5C0OBayLiGEiTGyXB0mqMISkUUvw/g0U2FdfuNmvgOl/hDQkrm+bXY+baKkRfxowrpXdCPNleUkfIV34pf+RpHVVcj root@caaa3642-f7a0-11ea-872a-bae3dc204648\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDO5XwOFHaJblOS63b9DvdC7GnR/mwbvwGROmswwrjnl8ZrBs3liBbor7B0lLGBXf1+h9a3gPDP1x+rH31pRH0pR/Y2f331ospimNDyww2sYe/OO/ysbyo1xNX06yEnPQs71YAkKf8RfM1Tj1HeFF6clZJIakqTyz6vxbfyw5jOyhCN4Lb0V9WmgGxX39yNhunXJZm3C5klpyHNkvWaL9H5A1RLRGnaAXdrgWckZxf92yydiBg7KJA3UHUdAdyCNcriDUOgwXmZ8Wiq0joVuLv6VvkSRAkhkJvc047vBkerGMNQgGJyo4I2GPlpgrcyEBQUDGlGUyYNy6i1+f5ClM4R root@865e04b4-058d-11eb-9dc4-ba187aea6a9a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC++1ok/Fr6hiGmc5sSze9bWsrDiQJOqNWuLIxNa0UM+q/Q01PfSrQj9Qti5VADZdyFbLN8vF7zgPvmHaoPLGFhosPDa66vwIZJKFNbtaS1WHIWuITcy4dOF2MtJLKJ7gaPVemSQkzZ2YhV/VrBp5gRbmzxr9SGEcxSEy0zoUcptl0wNcdtzNMzspmmmAXituStAdvSkoQWBbIY0OWS2Giv5tVFJahT7HMsJm8DdyMes88xFFvsexmZjJNLToAAn7e8XODMfgOEXq2rZXxiTFbSjPspd9gbh6uw8D7Z3BlE/r5LICfLdwMmiyL2bf0Ckzoa2bfQY1qDVaW+g/sVW8oD root@62f036c7-132e-11eb-a3c5-629ea79d0103\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZxQqx/iLEFQL6qgjOi9ZnZ659M165F8JrabiE6JGMkTyHVNTC1+zbnH8Xtbo08TBKON+mVEaZWdVfWWlKVQjtyOyoYQ1wjRS5FYgfEfr2f+HyI1ZRqj0El2RM0JTZLylt6oU0IOlM9PgBVwWWdMHJOsVt6OvdN/3jFEZKkyOqb0Ree9mIYmQIvqon4dWfuiJhjgBPKY9e+DNiMP6m3mSuHrAgHngaA4Wvn8yqdEb/l8qFC7zhQZp3oIhDwfgVWHws0/EuVMiR9U4sSce6n/mkEypRIDwBeIyES1AzfTMm/ZAcdUTtsf712i86QOSUjoC8SFWzcqTR297BGsZlI1ev root@2a0e7ba3-16ef-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDwD0N6uPTrCgqh3EqY1rJaO2Xmmhbo1oakK31eB3oxeK2Z3eBdV/DFUXC9blyWY9H1G0h154LclAMLalm1IPSIN772zI0SXAf3ggZDXAbWLB9Z4N2cg9PGI8XE8VZgy7wDGJGW4keFIQEu0u54arxs6tfMkhxxFD+F9OfxyxqEqAKIG26uNuMnZc137bx1i+W13vce8VaXudK2gs9Vd0uT2nahapjK3CZ7B4QAUZG3QwxD2j95Z7W/CTz7Z3wR+LZ9XikQruWjXZZck6jyes8K1i2grhRyc+XXxBhWfr79wSjTNvdCoEWZmiZLguk3C6W/lwL2CcKAwZ8zig6Qt6En root@2e51253d-18b6-11eb-ac0b-9a760af27878\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDXN5of0C8yNMQllXYtmwGTZdYNmHbbOIqPzrbBKo2n/M0KpP5q34RoAN5bJhJkIWU1PH0ue+qm7YK94pPrY7neQJr10SvqOtg3ux4FwD7QvCPx/zm6EqWceE3uXDY0Lxp+b82xMRf5LaRokwhTivuA1tjs13PXEUNqCkZ9dnTi0uINmpH3fYbGWoGQd12MdvZlXgo9U3MqFUF96BQC0TVYVmW1nhbsricR9dooYYZXLtiVcJLh4aChdjjhKI/KIHsCSjMEod5RGFDuglOpK7EvqF1e1yj3PqdjX4fmmdDaI7npWH8WXPQwRBTq0ItATWWn0KIYiuvPP9OqlBHtpWS3 root@a64e8dd5-2476-11eb-bd88-f687e5d66392\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDUIWW9SbfhtEzIXrbVoRJMxUOwwdLtQQgxhDqdI3o1WnwZ9CAXay3uWA3LKK1fSpN54sWUCiIiqcZRhllJ/oPgLebTw7z7U5H5MOtHyifl2aP7+QsPFfkTgMVZpttE8oG9bd3Yfq7BhSBO5Ev2ygveUTb69W3KED03+QLIlFuZfavPk0nB7KbN/FEqMgCf5vGicdAebAW7YkYfGLlvYgWgAddUGHVNyzB5/bjmlabMp1HIrdhoLHVpER8KeLKTv+AUuifONk/LgUOkbBykJshYrDraEMzBTFp8bCu45ktqfZ/pOi1FHUZI55WMluqeiUFYj0WQQtYkWD4rhK67SYx1 root@827018da-24c2-11eb-bd88-f687e5d66392\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDfbWj1twQH2ND0+3ygHww68P0Ovyk7P0JI26cAK9ie5OBwqscsjmMEJ6d5Bj8u02r9Bx/7wyiB8P4ZKJ69lcM7abqBd1j8HRuRxM2PruV/+PD4ePvdc+5/WT4AHIfRJnin5croJNQxu212jsEJRAX60Rrw58MQzMSwRiTAYSw6pey31QJDGT4cWe2Q2nRrmBRR5qowd9TgU8dNl8vnBBBdZENiCoiO8F7JYd3tKqd/7JJyHxfSJqS04Ao0PCjZg8owCIaoh0rZeV4qhg9yFc+Dtsn5MREGTul+QkjGpYYH/0mdTHyLpXYB4NDxw2AOrw5QXiYVbrzTgGtr43Ti6oHd root@b0d1b357-26ee-11eb-bb1f-6e397dbce9be\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDRmDWZZaVfj/ydo1kf8BIfJ13N8zlX4vylu3PfDYkxipaURt6wapcTCwrmrVsPOJjkaSMJ8/WO1wCoMnHShV89TYT5aj6GTjlmWQPiAvAEDAJ+yjXpJmLYvq4BEZ8tGOCm9SDFTyYD6a04XlmsyD9/0u7E5JjoRgNQfboTFoqOOXbYD8Z+lyLQlyUqIOW/AbKYfj5FqPeurVIO7n3DaYJsQeFy22Gn01saAfXdMIkwqsQa3FaFOgCBM/6dIrDce5XLKv7RW/vtCBqkHvFZYp3w4Q61Fannqo5uc+O0qP5HlwNqIg9rc+cDRwaxq5Ahdc8jTCZXc2T79Dpc+Xaq54/x root@4e49cb43-350e-11eb-9896-aabf0c108015\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCnoAdaUd+GqmFt5iz7/JFT8eQgSHr0GnDD+SbjRx+WEf8g32FZJam0OQhhT5+sWqdS3MlLyXIuVoinEKGH0+6LHxZI2X/Tr/D8Kt5tc2lPHWynPtJG3cljx6QhKKzDNTBDYW+UZMVA/aJZjwuAghmA/YjIisdLB1RHWEV6fP6+eKwIjgx6NCqvtOTZ5jN+u+lxAjwJzUD0S0FBM75DBX7mYP1McRTQOhHh0pAKhRebkcUbH/kI9AGOwFszwaLiXCzIAfyji5hKJNmK78WuDmcX8wcyd30djJ+zY0MO81MKukTxQHzc5Ewq4aeStl4SY6PksaDsjXvPmkBy4xPn8tOD root@60647805-3624-11eb-8ecf-c2fbd71c5254\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCkj74L2iDHwImorvKnWLJIf5s6Tno4kSfsgZ3G9tjkzjzaS/rlpoDo0yIwJPSkL8qgNkpGyXhNUGsUa8KtJRK5WvOXYNiIeVZDq6Xp5bVhWcTyHTGii5oZUcy4IMsBBQFkpIp94Xtg7f2Cl125XiiSUfvay5x8IIqR4pQLhNYxTxdwJy2s/RDB+mKoz5gEKiIbklHbJB6vsklZQP7JhCzQGhwEKqpAVbAX3ERvwX4ccXTdykNAw8TbR6DQiZAit+fi/86KYc2RRf2UwkfCZKkGv7wc8RrGYHX2LLzCL07XqSGKeVh7WPCPsuEriKEPgZTfGnqJjOIKYpDjDhaxKw7B root@cb437bd1-4f07-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCpxhROeBynoAHYpnhwhUvNSbjtDzKkxB5IgbpI/Y45AMToMZe6+CLcTVjlYO7o9FGHNNRKskU/W6nD5EOHBCgYcc8E2PDIWxIOPU8qkkX0HA5o9IthtxTbnu7E5Yn0f3jtvOsSuWOMYF+rqnM3ZFiCAZk+SZI9RhhK82z+pnnz0s60gIq0xx//PYiDYkdpBQv402VbJ1DUSnUM/Q1ylq7JOjpWnyoy72kyC1xv2CNuUhAfJ6pRjGF44/kPkwhTEapfB0HjbKslfv00GSI5we4kKSd0xCGlW+dTkWhmdmsj9CTXn6+ZOklgysS00B4N3yW5WoZMy+w583sL1Z/np9q1 root@ca934aae-6afa-11eb-b0f2-e2ce0c220244\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCvqRCqaYeoP+tnu+XG5VppU6ae7lGF0BhkmaH+sWo7J8PpDrIYVtErDKLcV9gzv3ezR/ozyEeQ08MjG2xkgulBxGbMocv+F3WWaptZYcbdbtgbm6VTdW1++GiWain0vn7tFA91kcJEA/yYMIqw4kCozmNHn1yV0/dfnq2nin4eVfGW7TP+/fLAyUoeQxtJCgviOPbzaGtOvqgf0hv30K8Pt3N9gWzCnk3rjWYidRV5Msr4A8b64the6EIHfrPMXy+XB6YYUnRC5k2/qz8mYa3N2ZDU7a9WLGKkoYJasdmHzXbbwyqZbKfyZ29x1obwsrWRRPs+xWcUDxMqxWRkllKj root@ac09e0ee-6d0d-11eb-b7c9-5211a19759cf\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDgAgk6JecQfrX2U5kTeoOhoytqyDH+Ze8q743sU1wMACn15y/rS6Kg5DsxxQ2B3SR0uTnX77yCK8YZJL/+whzhpzuy1fS1EwW+NdjklXIcSGt+goIZI6RayhC9FUWUK/VOLgbYNEhAaliunBvkoOb3+cqHYCgJXVdGzUy3JAZBScxHKp5yfpouxHr5/3kdDf6ix5Mm+v4dAMh93xQlE6KHy2cr9S1SWpZ8/cGZ7Lw173HXDvMvhSyUSeiM5miI8NDHbwN2DOx+nZa1XaRWyG2VLdcA9HXPtm0kr5GCY3ejE8XOMlbCFN77YUmp1uw0n6EMARXiYnZO69QYp9BIiZbL root@c1ad92e2-7410-11eb-997a-9a089b82337c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0WmPVVpREOPi78RefyXGxmS+Sdu/LI/4NCMCMdVrD4OHYnRCv9swBhfnhS+Ivl8HGP6FBA/fxDKKFF+XEL3J0O60joxfxJ0mN7BG1mZ6jaG2SkRtpM+ZRpC9d+AM21JL1rfZW22v3Rq3yz3KICe12VUdZpUQYYBddYerTIx9yjrZwKGYdeXFgB3x2StYhDvA1B/E4SdYtwi8tCLeEUNznWp5WnYdbe/ZY4aVOH0wcSsfYN/ABbmsVJrXzLyi8TrjtjTCq/JKtQ922I5Yav1DEi8GdhcYl0jJV0s8iJj1nfA6UeQqVdTF7t2vZTVzl246T2gXMUSOkWrPPiFxdj9wL root@5a809e2d-776c-11eb-b42e-62dcc321ab6e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDgRrgtxqsRwpv1km9AGTAn+L6msJgi+c5s+1tEeY0QRF4LWuHMLx/o0lpY8EugM1Jd6UjTqVVeTis92wh3SzTNvE4esB/6VnbmZ9q9nbbJlXirdveVbqMVKyZnXow3RQQ5XHCh8yK5ckdAZ8nBMiclXdADc0mlwXmYH/Bbr0aAtf8rJ8RVys1hDtpTdGxKnDXGrLWqU+ZuV5HDebGmWlWbYr3mGbcp9/AGOvpDhHztd2RY0hyrF6cp9jUC0CF3NHOAc8p9iIk5ER3hv6cQax8VwJUkjKnV6t0qaM6AF4VD9CWVuneVukb2IkVUZk4Y0MjVtsJBzxr9mk1vRUFg+5Bz root@5d89e430-7c41-11eb-9b34-4e1d335ada19" } ], "kind": "compute#metadata" diff --git a/audit/projects/k8s-infra-e2e-boskos-079/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-079/services/compute/project-info.json index 57e0483ef364..c8a9c21ef4da 100644 --- a/audit/projects/k8s-infra-e2e-boskos-079/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-079/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0QjcKTnGj67Mssdnk4VJ48v9M/gx3UaC/+KlS+uuVyIDjdf9OQ5cTQL75ev0klwAy6BymjYBokGW9tYGDOYt/UkQC8RjMWG92y+3h+EPe8Lh1b7Ue9fuKUNVkaVaT+T9M4iIxlJ0Oq83MMH+fMWSJ/6ckLgebnBeUn53J3v6rW4YPjUKfR8+387iDvHW8riR7HIC0kRiTPKAFDd1EtRNGXX/+7zSFZL1TY/GEYPGLIGdDgpO1HZiXXUHylh53hxgsvXexfI7HhihigOISaGdxK7UCcfNND0ylo5kNhn+QXvO7Wbw7b/Ob+ibOc7nKlKJ4EmSmJDPihWcgfwbWHp9n root@747bbe78-dd06-11ea-9424-2680bd79560c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCrVVJLjU9/Jwf+r5tYXQSARkBFm389UmkV2lSd/LhIQWMFZt4Wq1zPW4uhijRl2yTCWfglNur9LljVDmBHzMMW/+eOUQV3lyRSZumVocV8p6JatjDq0SjDgfzLWxnD2gJZWO1meIJ1atD5SkreAuc5JHBr1QnjCLVAmc+skLDHA3hqcm1+WD/pYeHjssyvVz7E0IVwYcUBhAsHwcJVAXYqzh04//CCiYuWOXthh+1NZWXrs2DmMrZHX6RnLmom9Bk7Vkkls/uCU6xTwoOrPiNeP++PlNKBlUTC5kzituqZ12TCkxFhlcc288aZ7mAwozZ3M+iP32nJ624Z9V33Eivz root@2c48f196-e77e-11ea-8112-a64f894a1815\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCtheRSoaHYiP9uWaxfcUPRQjnGwY6bkXnHIPAmTlUCEjWz/x6foRutCGQi9torTe39kPQyckYA5xYrBq3xMvDU6p+st4XjRqxLT4s5sD8CtCy7vW9In3FYosASy2MjmSrVWM+fhzZ7mWkCuVByeEQq+3mIzBmAInQWVZYxoI5CBzcSMJYNRi9dtncSgVY/l2Diu73th+kv5MZVhsACD71PP0J/e+WJ6tsMeKfokXSgF/Uh7BpcVUKkvgJQVNpQCzV+GapaeUSdfDB2/3eTOCMF/PkNmVTVHMSkJxMeR8a2W4pf6UIPzHiziYHCxn3nVK5RRuhS1ZAPAzaoqMQesTXz root@91d500a6-e7fc-11ea-885a-2259550e0d87\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCvHxXFFqpkyMglLtDDoi4lyKIZoGpcwQz211Gsgy7GkSNujJ2C+T2ZYFaj2aZQUH/5EzpekXqNPsGuv4l4DMAAjhtV4II/8h9pPQlp315xZ8aJ+NF3uX43jn+ulrfEmJJW1hke/2DVPZUULFqOFB/3+rXzJAZvHtPM9PQCAxnJYLYksXMofTi8qMihDgTJ00nzZOoVRlAGiQO1FZRLaHqOmtutLisiGfHkivXudQCA5+ilSQ4unSkWDmE3f7VYzrD4x88lLKy/nPEcrWQ44pgBMJNSRUWrLtRYeBMnTv42/f8V2zp6iashY9q7ZqKUEx4K+Fh42UwkUDOsqwnFcNFp root@2ef02bdd-e9f6-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDDDhokOvn13a6wGcjY/Wi1f4l+EWJI9XrLBXto70YvjRxvtpZIBogMFxkMSG9RFdAI7NHDI7qSSYQ0NzS6fJ+T8B07xhqbqQx59/e32L/WH2TeAd5827AIRCRRWs13ynSaxV6Qo6jkhvo/KJMIpMLYi8KwjwregJkUnxAx6AibUTnRHLGbgWp1Wpmeoe4avauPMo4Z/5YJb+0qi2/1bzDCpcJeKBrF8yyZoOhJ0nGISTT5pl9hiNSZGu3JxCDwQi251nst73ikvot6ZFFwrW+Kie0X7JP+yeXfVGLZ7V/6BRLcTCaRcI/x4T+QejEqAGAq6zY60TzJdJVKb0eiYUHF root@76f3c4f2-eac0-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmCt9CzvYtQN1EKoNVkkQTEFr7k1fLNFOHDWD0jNeXbtrN7hVj4hBY0c6cLVp7Ofmsj/ckR6wsnTjlOJqN3weiBkI3LuyIEOVAEKt1+7BTQNKIo4GHP/mAvF6BKcTQjJ8ro/QTEDbImwFIs1bedWeIZk9jotB44R4Qev89mYhyF0zvbINvdEus6/68oIpHDs62j5kjv2NYNPFUcST2GJU/jC7GE1YS1MPQNLwOPM8T3dd89JN9QktUHemz87Oz/o8mo3+ysTd+V1pUHIqslVvZoJ/HpF0Y5r2+JeQXE8Fzqbimsz+HeuKz7auvXY66HuPK6QnkMFCCMSRtpgzDp/0D root@2fd5bd01-f27e-11ea-bd49-066a8cf01e04\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+Uhcs/Smhtj4O7SsUKTE6Wz144f0uk5nhadml9MwCdtL1dALq2IKKmQFdEli7MdzIvgnnIpx0gkJxsNNM9OXtSmREeoPwKFcG0NATK1r1anHAObtiWBPluz0744JXSYRMorbsXp6h0UQx1AZdw2fukucWmjjn9reCzST3AFyvxhGTN1hslkmNpmyVedL4eNXZG+ytZuYDJr/KNfeGOKVedp/cMdjwDuYNzCoTQAC9iEoRHOGJE2ECB9q8BOEFdxvHy2C295nG5ax3Xd9ezNd66wOal7raLMN26PV/B83YAa4bCn2sTYRY3oMlfB4xuSEIbpsaeZ6130uQnAOJQZHn root@92089a39-f325-11ea-84bd-b6fb6d83c68d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBXtyKszCvHvJiXDRQt0YVJUjGfJFS6rciDRg517HiqvlI+rlTWV5/MuX3fQEkdpCmTOK0lACrFsTCOcKvQGA6zwdqgtBTMXsfoFx0EyTltMEFpxPm03wTINxq2hGs2fOzMPOqNri/35StI1CwCDNV/izp4qcxSX0ervf+OFeHRG6szGsVhUZE8xPkX3XQsdQv/xNTb8JelJTZIAK8Udm+O721KnSxhphhm/NhMSRYnaQqTV9u6IIegzvrHyImdJjqQJlEAIFv+JgYqaBbDUILDyjpTraqAXPLnrVxqg0oD/D5OulThVsNCRvhZf7Pc03GEymtAASA1oyGHULMQpnL root@b545e1d6-f902-11ea-926e-7e7ea190b727\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCJZ7O1f9bp9NNdFFGJGOUjyo/JGaFAWFIYQ9XCWRJYCU+TFCbHHrZtfFGRQ1O5GMkE0QU89DM3vtRc50UeC/nCRxTYAXv1MYmPVU5VsLnJysDLLs+vrlC8rbh3E1mmHT2DaiK7JZsGA16S/hPvIwvOo3sEbcAcXVwXWHiOtm4mi/yUXywbnl0hdrpLSjWxVy2mMWthYNjK2bPCX613yJ9qZQWMj1oJpZtJuu4A7G6uFexgHvnxlIX8HtVfADZYK7s86wd+ASCYYOwURAAmT3UlUnIDgcJZnlFqqeJrWfYpVGj+yG0nQdeQ9qt+e16yp6ueJQQeQvkhJlrwm5g7FEh root@63ebaf18-02b0-11eb-aa74-ba383c228abc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqTCFVbBaCQuc2IT3Nm/Qy6dL5451eal8+Ue0I3Z6UPC7KQSh3aPt/dS7HPeb4Ymp+dV880LX3vVBiAaOgkmppls2JOemnAeQYMaV/1UOI3J/7juqFbtUrcvY2eeaRD4TIupAmBXrIFisJJ8zUDZ13ZLTohGiAwX57rQ0wLTei9CBH5qiBOj8IU+/JreAE6nXvihAUN6x0/5eTobbPnj4HaN5Plc0FbJZCCga3EaQeqZjj1HFnyxd+K22dgqffYq1Mh4us2XIZ/679IvB8KwpJ/fhh6svihZD9B7la1tgwjiPetpVWAXUxVLok5KDm/IOcXyNWcddta7NbrYkQyA2F root@f39bc3b3-060b-11eb-9dc4-ba187aea6a9a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0TfMv0irST4wiG/szwy5524JW2JtPasApRo8w/uOf95rkMhXGxM3nYw2irR1JXpcikDIp7vICNgnYI453IaoCYyvnR9v/BW3SLGGO13RieI24kwHAR1yHdElumTOv511nK5OPqh0oty1gZObSyrPolqs5apuNxNXrIvh3vVZYXS+Q6aiWeEIa3QeVn27DaOBkR0qnq9x7OuYsg6+a+U8KiLsXzX8H09z2iPfeOFvAGMvS/1GeRnjz7fYFLxsSVx/JBnxcheg67QfMSbrfQow5DMleG4X0pFOHKqbI5LH03QZtscYu4PH1SPdHT3t0sEQmjAoFhLu6pJQLvCc5Engr root@ae72fa16-209c-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDUN+qEIlKb0aCOUjEfPD/fe9f04CdSR3HVnfWoUPqE0gzY9rA/L4GJhQpDEjuiWQv3Bqw4MFq+MhHMOsocE55ypySJbPwNBtT+jtW6+GOUFHdAIAiE4ufBKku5LGeICZdO9meZJ7aoJXROSAGfaRgF99B3DcVMqi8FDGwZuUvBEbJErSk0ZZQcTtmcGGPlgSlFZuOqxQWHY/L1gVVzLrJF5ZIp4vA9xp+OaDVvNOGO5C8js6ASdQu+zCiYKKtLcre+gnv/25BO31AZuo8NtxVz0XeP/kRfE/lLMhOShFopzJpd5WlzkCPGYJW0W34nIgQmOHz1majgf/3mHApsyX1L root@5c439a94-3199-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDDlluFE/KSK3SF3/lBclSejvvUPUWvBhNfkVpiUyn+QTeo9dpl33a2SqzysNbQfuVSthg9q0lRC/Vk3PNVFcYawXi7H09NHkKGC9Yxty7FsiUK/A5ffqbqgm8m0e0vZR2GWxj0MwKRND3A/RSRuReK7+7KEQvmCqABi7o/KGuIm+nHNCtd0vF42Ll4xzvkUgkbLku18frpS3y5wn8IiO37zutW9FAptsXR+R8wbllHS7Kvx296qV7hH5vIFEyGHJnHD3Cyw8C6/FtCqOzKYNmlDkm9/2m0n1orXPx/DNOgVWt+Gz8CBxtMMksdSK36Ab/kATI1Rkhh51mS2YObWzoV root@858786b3-3689-11eb-a25d-22a534811c55\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDA1hyGpFHNEi1ZGDBaZf02r50FUcehdIbu+z94iNBvcYB4bXhv3H1rSlktRc8v3clF5iiUBmfj0y8k6hh0QK+YEgNAa6nQBLOstKV6xqALTzusuUS/jmaYgd1WN6lWhCSptnRtugfWkUrpZqzXkoyGknaRyAxrgoTErDVP0CZbbHLTIyc7k06d8bG3kFsxMzVXmXwV7zdGGO2OZuPPGfJF7U1ygS9Iahjm2oqpetBz+HJs+H/uco/8NtspW2rszVizhg1jo2ulmq0ScD5Q7pox+aXrQBpSiHQjPReIExQt7+w1FJaaqIV/ARglMKB1CaFtconJSE5cQ0vodjAOMZav root@e155ff32-3ebb-11eb-8da8-6258f8057dc0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCZ/B3GARed3ptNL6Wq1N7FiUbXpstT446jiS9+zvNd1NRJzxSOITNOgRzG4fC1lnSN8j91uyE3D/cvBDUkLl0qa5Mu/WD3qwLWs5R0rHw3C2nB+imOqYKgEISuQcKTnY87bsQgXwhTrXGbAnMBIr3dnOUwewDFjAXY/WZpEevhDo5ufRecokPWh4zxmkHMvaEFJQmCCsJjDtzrjhudiipddaE8dJQ0/AIYItUNIiHugxFDGco4+1Y30D4iI2TAXEQvLsih1EwvtEUhKM8datKXn36YUZBBK0NIwBsb5RWNFJw7pcH4/LCs0B2udDjUkUv0gfr5NFHgzz3YhMjl4fll root@fa613402-4933-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDPpXMmvrFqQVCxsvmb82fpmgHlR1jsiT8okw1l7IGgPzVpUXy8Ojw7NEr2mq83i0jStnpW3Vfvwzfwq6M5txdC4bYPLCw/rFzH+M3QbrvWN6hJWf0yFJpdbCdhQ36+4EFOt+Oa/92BHtlrf2CiKsIDS3RxIdL8u/aOqKJZ6S/XwoWrZU5jj1YhoC35Ykt2ZQpIOnhw5xBNZbaoksbEsqyr70c0S4KBIGiEHOXiAb6A9auq6DHefni38+bNYUu13LFOhETlIyUtZyDLDhjRgUfSSR7Vc9wsgqFkU0r4EdzCgnadX5oREkhlwAXWWoabi5ryebCea7GMuUy3ne2AzlSv root@c34714cb-6d72-11eb-9500-fecae3290f4d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZLwbFlhYnoo0Ri47RiZhyQ74Ybg4hlEGnIk2usQcjKv0S/JFS2vdGq1t43/f+2j6q5NeW1rTA63KcWVpHcBhcPwUT95Ejv2JhhQN/JJQtannbzFOgoMXDnXMfAoykPAxAGXhWz0jN5yfWr6T0w/KOZSJ+AAYjAwnuBGanz1X06uUXSulXYcAWgg3ZRy3GB2joWYR8DGwiw9DiqONK9qucGVGIueuiTJZBr76hHSYtli+c+Z+mcZWagPiz827ozJg53MKFIfIBCXLJvzoqxd8NZP2RuXMPmmrCC2C1Pg7v35CF6aNQLuiTxDKc1/k8iCS85yHW2MU5h5P4JCorBHBl root@5253ee08-7b92-11eb-9b34-4e1d335ada19" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0QjcKTnGj67Mssdnk4VJ48v9M/gx3UaC/+KlS+uuVyIDjdf9OQ5cTQL75ev0klwAy6BymjYBokGW9tYGDOYt/UkQC8RjMWG92y+3h+EPe8Lh1b7Ue9fuKUNVkaVaT+T9M4iIxlJ0Oq83MMH+fMWSJ/6ckLgebnBeUn53J3v6rW4YPjUKfR8+387iDvHW8riR7HIC0kRiTPKAFDd1EtRNGXX/+7zSFZL1TY/GEYPGLIGdDgpO1HZiXXUHylh53hxgsvXexfI7HhihigOISaGdxK7UCcfNND0ylo5kNhn+QXvO7Wbw7b/Ob+ibOc7nKlKJ4EmSmJDPihWcgfwbWHp9n root@747bbe78-dd06-11ea-9424-2680bd79560c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCrVVJLjU9/Jwf+r5tYXQSARkBFm389UmkV2lSd/LhIQWMFZt4Wq1zPW4uhijRl2yTCWfglNur9LljVDmBHzMMW/+eOUQV3lyRSZumVocV8p6JatjDq0SjDgfzLWxnD2gJZWO1meIJ1atD5SkreAuc5JHBr1QnjCLVAmc+skLDHA3hqcm1+WD/pYeHjssyvVz7E0IVwYcUBhAsHwcJVAXYqzh04//CCiYuWOXthh+1NZWXrs2DmMrZHX6RnLmom9Bk7Vkkls/uCU6xTwoOrPiNeP++PlNKBlUTC5kzituqZ12TCkxFhlcc288aZ7mAwozZ3M+iP32nJ624Z9V33Eivz root@2c48f196-e77e-11ea-8112-a64f894a1815\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCtheRSoaHYiP9uWaxfcUPRQjnGwY6bkXnHIPAmTlUCEjWz/x6foRutCGQi9torTe39kPQyckYA5xYrBq3xMvDU6p+st4XjRqxLT4s5sD8CtCy7vW9In3FYosASy2MjmSrVWM+fhzZ7mWkCuVByeEQq+3mIzBmAInQWVZYxoI5CBzcSMJYNRi9dtncSgVY/l2Diu73th+kv5MZVhsACD71PP0J/e+WJ6tsMeKfokXSgF/Uh7BpcVUKkvgJQVNpQCzV+GapaeUSdfDB2/3eTOCMF/PkNmVTVHMSkJxMeR8a2W4pf6UIPzHiziYHCxn3nVK5RRuhS1ZAPAzaoqMQesTXz root@91d500a6-e7fc-11ea-885a-2259550e0d87\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCvHxXFFqpkyMglLtDDoi4lyKIZoGpcwQz211Gsgy7GkSNujJ2C+T2ZYFaj2aZQUH/5EzpekXqNPsGuv4l4DMAAjhtV4II/8h9pPQlp315xZ8aJ+NF3uX43jn+ulrfEmJJW1hke/2DVPZUULFqOFB/3+rXzJAZvHtPM9PQCAxnJYLYksXMofTi8qMihDgTJ00nzZOoVRlAGiQO1FZRLaHqOmtutLisiGfHkivXudQCA5+ilSQ4unSkWDmE3f7VYzrD4x88lLKy/nPEcrWQ44pgBMJNSRUWrLtRYeBMnTv42/f8V2zp6iashY9q7ZqKUEx4K+Fh42UwkUDOsqwnFcNFp root@2ef02bdd-e9f6-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDDDhokOvn13a6wGcjY/Wi1f4l+EWJI9XrLBXto70YvjRxvtpZIBogMFxkMSG9RFdAI7NHDI7qSSYQ0NzS6fJ+T8B07xhqbqQx59/e32L/WH2TeAd5827AIRCRRWs13ynSaxV6Qo6jkhvo/KJMIpMLYi8KwjwregJkUnxAx6AibUTnRHLGbgWp1Wpmeoe4avauPMo4Z/5YJb+0qi2/1bzDCpcJeKBrF8yyZoOhJ0nGISTT5pl9hiNSZGu3JxCDwQi251nst73ikvot6ZFFwrW+Kie0X7JP+yeXfVGLZ7V/6BRLcTCaRcI/x4T+QejEqAGAq6zY60TzJdJVKb0eiYUHF root@76f3c4f2-eac0-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmCt9CzvYtQN1EKoNVkkQTEFr7k1fLNFOHDWD0jNeXbtrN7hVj4hBY0c6cLVp7Ofmsj/ckR6wsnTjlOJqN3weiBkI3LuyIEOVAEKt1+7BTQNKIo4GHP/mAvF6BKcTQjJ8ro/QTEDbImwFIs1bedWeIZk9jotB44R4Qev89mYhyF0zvbINvdEus6/68oIpHDs62j5kjv2NYNPFUcST2GJU/jC7GE1YS1MPQNLwOPM8T3dd89JN9QktUHemz87Oz/o8mo3+ysTd+V1pUHIqslVvZoJ/HpF0Y5r2+JeQXE8Fzqbimsz+HeuKz7auvXY66HuPK6QnkMFCCMSRtpgzDp/0D root@2fd5bd01-f27e-11ea-bd49-066a8cf01e04\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+Uhcs/Smhtj4O7SsUKTE6Wz144f0uk5nhadml9MwCdtL1dALq2IKKmQFdEli7MdzIvgnnIpx0gkJxsNNM9OXtSmREeoPwKFcG0NATK1r1anHAObtiWBPluz0744JXSYRMorbsXp6h0UQx1AZdw2fukucWmjjn9reCzST3AFyvxhGTN1hslkmNpmyVedL4eNXZG+ytZuYDJr/KNfeGOKVedp/cMdjwDuYNzCoTQAC9iEoRHOGJE2ECB9q8BOEFdxvHy2C295nG5ax3Xd9ezNd66wOal7raLMN26PV/B83YAa4bCn2sTYRY3oMlfB4xuSEIbpsaeZ6130uQnAOJQZHn root@92089a39-f325-11ea-84bd-b6fb6d83c68d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBXtyKszCvHvJiXDRQt0YVJUjGfJFS6rciDRg517HiqvlI+rlTWV5/MuX3fQEkdpCmTOK0lACrFsTCOcKvQGA6zwdqgtBTMXsfoFx0EyTltMEFpxPm03wTINxq2hGs2fOzMPOqNri/35StI1CwCDNV/izp4qcxSX0ervf+OFeHRG6szGsVhUZE8xPkX3XQsdQv/xNTb8JelJTZIAK8Udm+O721KnSxhphhm/NhMSRYnaQqTV9u6IIegzvrHyImdJjqQJlEAIFv+JgYqaBbDUILDyjpTraqAXPLnrVxqg0oD/D5OulThVsNCRvhZf7Pc03GEymtAASA1oyGHULMQpnL root@b545e1d6-f902-11ea-926e-7e7ea190b727\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCJZ7O1f9bp9NNdFFGJGOUjyo/JGaFAWFIYQ9XCWRJYCU+TFCbHHrZtfFGRQ1O5GMkE0QU89DM3vtRc50UeC/nCRxTYAXv1MYmPVU5VsLnJysDLLs+vrlC8rbh3E1mmHT2DaiK7JZsGA16S/hPvIwvOo3sEbcAcXVwXWHiOtm4mi/yUXywbnl0hdrpLSjWxVy2mMWthYNjK2bPCX613yJ9qZQWMj1oJpZtJuu4A7G6uFexgHvnxlIX8HtVfADZYK7s86wd+ASCYYOwURAAmT3UlUnIDgcJZnlFqqeJrWfYpVGj+yG0nQdeQ9qt+e16yp6ueJQQeQvkhJlrwm5g7FEh root@63ebaf18-02b0-11eb-aa74-ba383c228abc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqTCFVbBaCQuc2IT3Nm/Qy6dL5451eal8+Ue0I3Z6UPC7KQSh3aPt/dS7HPeb4Ymp+dV880LX3vVBiAaOgkmppls2JOemnAeQYMaV/1UOI3J/7juqFbtUrcvY2eeaRD4TIupAmBXrIFisJJ8zUDZ13ZLTohGiAwX57rQ0wLTei9CBH5qiBOj8IU+/JreAE6nXvihAUN6x0/5eTobbPnj4HaN5Plc0FbJZCCga3EaQeqZjj1HFnyxd+K22dgqffYq1Mh4us2XIZ/679IvB8KwpJ/fhh6svihZD9B7la1tgwjiPetpVWAXUxVLok5KDm/IOcXyNWcddta7NbrYkQyA2F root@f39bc3b3-060b-11eb-9dc4-ba187aea6a9a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0TfMv0irST4wiG/szwy5524JW2JtPasApRo8w/uOf95rkMhXGxM3nYw2irR1JXpcikDIp7vICNgnYI453IaoCYyvnR9v/BW3SLGGO13RieI24kwHAR1yHdElumTOv511nK5OPqh0oty1gZObSyrPolqs5apuNxNXrIvh3vVZYXS+Q6aiWeEIa3QeVn27DaOBkR0qnq9x7OuYsg6+a+U8KiLsXzX8H09z2iPfeOFvAGMvS/1GeRnjz7fYFLxsSVx/JBnxcheg67QfMSbrfQow5DMleG4X0pFOHKqbI5LH03QZtscYu4PH1SPdHT3t0sEQmjAoFhLu6pJQLvCc5Engr root@ae72fa16-209c-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDUN+qEIlKb0aCOUjEfPD/fe9f04CdSR3HVnfWoUPqE0gzY9rA/L4GJhQpDEjuiWQv3Bqw4MFq+MhHMOsocE55ypySJbPwNBtT+jtW6+GOUFHdAIAiE4ufBKku5LGeICZdO9meZJ7aoJXROSAGfaRgF99B3DcVMqi8FDGwZuUvBEbJErSk0ZZQcTtmcGGPlgSlFZuOqxQWHY/L1gVVzLrJF5ZIp4vA9xp+OaDVvNOGO5C8js6ASdQu+zCiYKKtLcre+gnv/25BO31AZuo8NtxVz0XeP/kRfE/lLMhOShFopzJpd5WlzkCPGYJW0W34nIgQmOHz1majgf/3mHApsyX1L root@5c439a94-3199-11eb-84c2-b68ef41a6728\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDDlluFE/KSK3SF3/lBclSejvvUPUWvBhNfkVpiUyn+QTeo9dpl33a2SqzysNbQfuVSthg9q0lRC/Vk3PNVFcYawXi7H09NHkKGC9Yxty7FsiUK/A5ffqbqgm8m0e0vZR2GWxj0MwKRND3A/RSRuReK7+7KEQvmCqABi7o/KGuIm+nHNCtd0vF42Ll4xzvkUgkbLku18frpS3y5wn8IiO37zutW9FAptsXR+R8wbllHS7Kvx296qV7hH5vIFEyGHJnHD3Cyw8C6/FtCqOzKYNmlDkm9/2m0n1orXPx/DNOgVWt+Gz8CBxtMMksdSK36Ab/kATI1Rkhh51mS2YObWzoV root@858786b3-3689-11eb-a25d-22a534811c55\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDA1hyGpFHNEi1ZGDBaZf02r50FUcehdIbu+z94iNBvcYB4bXhv3H1rSlktRc8v3clF5iiUBmfj0y8k6hh0QK+YEgNAa6nQBLOstKV6xqALTzusuUS/jmaYgd1WN6lWhCSptnRtugfWkUrpZqzXkoyGknaRyAxrgoTErDVP0CZbbHLTIyc7k06d8bG3kFsxMzVXmXwV7zdGGO2OZuPPGfJF7U1ygS9Iahjm2oqpetBz+HJs+H/uco/8NtspW2rszVizhg1jo2ulmq0ScD5Q7pox+aXrQBpSiHQjPReIExQt7+w1FJaaqIV/ARglMKB1CaFtconJSE5cQ0vodjAOMZav root@e155ff32-3ebb-11eb-8da8-6258f8057dc0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCZ/B3GARed3ptNL6Wq1N7FiUbXpstT446jiS9+zvNd1NRJzxSOITNOgRzG4fC1lnSN8j91uyE3D/cvBDUkLl0qa5Mu/WD3qwLWs5R0rHw3C2nB+imOqYKgEISuQcKTnY87bsQgXwhTrXGbAnMBIr3dnOUwewDFjAXY/WZpEevhDo5ufRecokPWh4zxmkHMvaEFJQmCCsJjDtzrjhudiipddaE8dJQ0/AIYItUNIiHugxFDGco4+1Y30D4iI2TAXEQvLsih1EwvtEUhKM8datKXn36YUZBBK0NIwBsb5RWNFJw7pcH4/LCs0B2udDjUkUv0gfr5NFHgzz3YhMjl4fll root@fa613402-4933-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDPpXMmvrFqQVCxsvmb82fpmgHlR1jsiT8okw1l7IGgPzVpUXy8Ojw7NEr2mq83i0jStnpW3Vfvwzfwq6M5txdC4bYPLCw/rFzH+M3QbrvWN6hJWf0yFJpdbCdhQ36+4EFOt+Oa/92BHtlrf2CiKsIDS3RxIdL8u/aOqKJZ6S/XwoWrZU5jj1YhoC35Ykt2ZQpIOnhw5xBNZbaoksbEsqyr70c0S4KBIGiEHOXiAb6A9auq6DHefni38+bNYUu13LFOhETlIyUtZyDLDhjRgUfSSR7Vc9wsgqFkU0r4EdzCgnadX5oREkhlwAXWWoabi5ryebCea7GMuUy3ne2AzlSv root@c34714cb-6d72-11eb-9500-fecae3290f4d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZLwbFlhYnoo0Ri47RiZhyQ74Ybg4hlEGnIk2usQcjKv0S/JFS2vdGq1t43/f+2j6q5NeW1rTA63KcWVpHcBhcPwUT95Ejv2JhhQN/JJQtannbzFOgoMXDnXMfAoykPAxAGXhWz0jN5yfWr6T0w/KOZSJ+AAYjAwnuBGanz1X06uUXSulXYcAWgg3ZRy3GB2joWYR8DGwiw9DiqONK9qucGVGIueuiTJZBr76hHSYtli+c+Z+mcZWagPiz827ozJg53MKFIfIBCXLJvzoqxd8NZP2RuXMPmmrCC2C1Pg7v35CF6aNQLuiTxDKc1/k8iCS85yHW2MU5h5P4JCorBHBl root@5253ee08-7b92-11eb-9b34-4e1d335ada19\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCrDjN02W5C2tsrD7kNnCpNMJ4RFBCOMCoRbX0m3R+483mVvWYxO/g5yGRzYZAOjFTSD3oW6H9O3JyJhJlfcXRRzz+zjEEIxzXDIksmkEX5jRcyCj9rMV+JakIy40g1XcUi+YeyQYQkPOy9CWXt6CNgMghcbjWu8EjLSGGvp4b9w1O4St0k2lNTyrYNdFbuNvPJjZak47OciyrMliAIk9MTpm2pw/FI3+ZVtfHpa8zxrwtABSqIitorma2DJqBPjWy0dNcyNmq/LxnjeTa6F2xiu2PaPWa2BiDhlieiE7MVgK+nFgDwnXNQwvAoinkFiFa2UfVlfIKA7k9Vctm75+jR root@52fb1aee-7c43-11eb-9b34-4e1d335ada19" } ], "kind": "compute#metadata" diff --git a/audit/projects/k8s-infra-e2e-boskos-088/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-088/services/compute/project-info.json index a7234d13aef7..3e1b612e43ca 100644 --- a/audit/projects/k8s-infra-e2e-boskos-088/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-088/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCUQ+5h+6sqhD8wp2k54QrJFcqi3AMba/A2x6HEbtjOJB3Vr7lhjEjt9P2SQLbrceiA/DmWuPNVIDfm3KGWNqa993qjVcUd3CqZaYI1EYGq/WVcq8RoJATwe0wt/vsV4BEpHymwpp2QhVfubhnCyMSWrJtO1LBB4YR/ZvtXyEshJofMKGDItDznr/syZPdE87rv79QPjScZiFzQVUy/hpfWlmgvDWn6UkUS1Y7f7LjEWKAWbWzAuaPIYbThznlrr5yDLJCxqaAbKuDqHYUvS3Fv6dGXZt8k0Hd/qCMo2UYhYDRiFSs94NfDsoUlx6pAyuYG9INEObWk86J0tKNgybil root@2a15c21a-e242-11ea-a87b-7e1d84ccc038\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC16pVhrBBXS7YREt4zQfLMBcoxSPItVYzRVI4hMLvug6crp1dwxmbwdTGwEndsOBGLFxFj/VSkipefLcck9ENJlaeuzV7BlhmH9bisgzI6ig5D2jk7Y4IhbYb+A4Gl+MoDCJpT70yPvXOd97AhJBxHvyqiFdDbMAG652DMwr8z8e77xHolRyA0Y7i7dP8O92aGaq2jDnfq1bp7LKIGoh+vJMKzYSSb7mGPsZ0oYwM4xuFPFpmYAGNfElTnUjZPO6tHhJsVh1XFZL9gL+iWFyi/DtMKyvYfORATfuJN1zutQAgq+XqFOvPg4S5/IXwCQc3MA5qu63U2R5PjMng/xQFl root@3ebe1691-e409-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCsPnJxiHNzg+J6rCckqnf4t4XmpuUh0+SoTdlJ1+/DKNSNFuufkz14IVsAA9+9KgZkce/fZnj7ksageiMErygFvBIjFiXD/grNyqAAYdklAnQTvJnYpzzYSSq7FIMQ6IhS2I9OrxP8pHFygjcXidArCMDQdPSUMtvyiZuGrgDHKFXSHgVzz4CGdMiy18sQa6mz2aO0doC0IFnpx7d0QKMsvHeJTyKbjDg+QypViommO0FLAhG68rZ/MO8gfABgM4iV3FvfKntRrF82Kmtl64AYbEwAmMyrEDsP4HD0oHeQPgW1QR5O/U1+epe9tRaS4kU7ElsEa+C0xVh6F3qHWST root@25f6f62c-ee81-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDpNdNYDEy5WX2e4V8ZF8DJhJeVhQdgOWvB1vs4lVd/89t7lNycgRfti/HAP/s/k2xhG09ej2ObAQSS0eLCn5bemUrVXiGPjGCz274yFbgEVq7rv/nl1hM2icXsl2akVx1gifOseblxN9lnhPt3sIIkvwXdPVWq57RKIbygD7D20Goqk1QgPvvHWZ62kHArbeEQ4bJAlufAW6/mw96c62GkUJGohyyC0R87SBDMaLYL17GDtp/Cw0oukLNoDwiDuvMe+LSPuv+T+m0sMo/FmPy/4SspL89qds6fZedbAUsDHK40531HFfybWZkFS2SsgMj5JYkeTSh95N3b0c8yM+vx root@a3cfa34d-ef87-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDFghSLi3zRiwBsAi5GMhZ1RQ002P7uT9Ks2676qhHwAWhUR1pvi+ooE73DODumnNv1JIWPKZC1oEN9j8hOxoiny2Y5s68vivk6flzjCYlrxsCgAtRFsFqVdzUtdfww4qRO+RVrY2EIC7NOg5WgDpNeTcwPB+MxQpcqSNbo9t3QjQ+KgP2CwR0Ti3GW1bERrx8wXhGv+U6ov/pExHoPKm1rnhO5rBAWnEnqKHccniA8tIH5ZEkPNLmzi3QF3x3gK2Q1292P4QwvcIKPR+/bXOisE25yLFPO6SAeVbFwfp13TNC8jqwpFvBxVA0PF4WQA+/NhtQd+HjAsDGyQS1ovj0R root@1fee4dd0-f46e-11ea-8508-9a96569b20f1\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7hJBr84nOvWfdKxN1jPUbXhdV9oXeSGrxu4BAN7Rjll7wgZQVZ2DkxEuqI3CafN9v6A27dF+ercGs4GnRiIE0YKHnjZtUr4GUzLP0eDoqxIvYMsZ/ytXbnaNpGg8YJuFqI6bO7sTwHgFiwIG5Wea+eL4twRbIwCrS7FdAdT1nsN79C81n5/SzfTQzU92bmqM51lW8N2+8whZPC1rVU9Er8OacoLhfk3hygahjRt6N/FJcmQFnsvzVFQq7vUOZ9eG9Yq3DCQLHDMX7m7rW8ba8+9ncZbUehsYMv7aueca40I/FxvYVBtHh7Mb4RYCOyYvO2b/8+DwfSfP79KFz7/yZ root@a9526d06-0490-11eb-a932-82154e1dffc3\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDidpvb2gC0wdoQRuDsnLHdBKerDOI29EhKDCochyijGj2nDuORSO0fi2wouk/QUbqISPygv+0QHEROcw5wlk/+dUpCbLU5krBqKwwGskS2DE9z6T5cZMcsVKXggSbBEWZzaSSE/TULzTwB7Hjg7y3u8uk/S9b1r2fmmhuN2SGWw5IN2KKXgUvRf2FXm19ZuF+ASgvJbBsFQmrb317w5DmtiphoTOwmNfe8CVNnOUVvhntv3DYHY8KGQVfAJJkVwJYBOyuYIC8jyZxlyAGgftDTf8bC41XWvy7Yr9rW4v69J5LZ1bhhOjNZq8S6JcuwE3gtAPTrljMZsIWwAP9eVbNT root@d9ba87b9-1dd8-11eb-8e42-66e2cea7f923\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+1JLmTP5YB49+IaF5TgtT7Nfu9tljOSKhYdWyR6Xpn6ldkbjCkEAqhMGYYKLshZrMONSVQ76UuAWAH8/m6J3YtC62+1ilKV77RHM8E/WZpYc/msWAB1MagThRXDi0AkWGp5vMeQVxLgUgs/2qlI+/+DLNorYH4xNzLLX8VsfPIwxOqhMWtIap26WwHy/gh4fMGoDpeSS6okooteVisyxLudT5Dt58jF4qoEjcMzH8HYv8TtrO8clGQ1RKOZm/ghB8n3/6lUpRiWwX28xBV/k+1u9KtpcvPwFbIhEcsXxlw3K1qhy3hUSRvP9WlqnjyM9MRHpV1AWzXDRvJB4rGVjN root@a291114e-1e24-11eb-8d52-9233771f1447\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9SJs8Gx2hIYeCfRidd5/rIWlAzGCfyBlmIMnfnlACV1zUurGPwaZtGyppImIxZWz17V+FI3QiBPdXaxCXydqNPVQT+H8OiwT2OZMp30lypz32vGg10FIhDzpxn880MXPCMd4/8cvmbPWkHO6xYhswkwfchyIa7pDwIqQRPhiwFeUuHu9N1EF6klzjDfqcSvKjhXBfSeqfySuehaRhZy+SdxNNX8ef8kU8LugVoRn5JPxB3PExp5pH2ocdjz48dg23I70agN7ENE5EpJ4czAbM0l0E6sxRQ9ayKVMU+zvYmNzFVpnXgWaFX5lWuX+xiugFStoy41u/nA0ylO/DT71D root@d7601552-2966-11eb-a35d-7a1d48297fba\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDPusBFNUwi35FvsUjia8nWHNNKVrqP2pXY2nvBOVIR7UQzfTI3xS7MyuKNWyvd0nPQlfVrmIGnadBMdhtIbFB33WL6C/hACcEAye9s2+CbRwS4fR7Oyqi+7LZCBqLki3l1Qma42wPaLEzd9glUzIqfJtLYD7moAgIgm5vXm5zgDTVR8sH5uBFZ4pfrxXe13h7KSmxqLInbRbjK83SPQQ6ie+gkKimIqmkaQYavQ4JocFXVTLV16LY4YCv6lFJ3OTdKQEETe0Jire3BIHW2+Gh2hfZm5hqNOfHHawKg6eW3XtUhpPx2R3WxSq9+oEHmYhl3oeLK6TBPpYLaGJzlc5dD root@7ba43b2a-2cc2-11eb-a59c-42dfb897bae6\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC3cYxcQNfN0+G8A2WhcqvYJWFY3vY42GBnNc/+EK8mqprOHswiEhEwMQplqUYt2I7EbO1yOOULUH2dWJsbcW1BO8sjk0oGhRPRQbZp+OtbhWW7Nx4d80arF8QGu5QQO3ma8gfiZQb3H0Pyq3V3cpNoeRM1sJJijb3XiO2ABJFiZmWzQ6LTTP5D5qSy0Y70bGXj/RbzawSjN6DfLnbsIe8IbnDLSIy0gXQCCyJn7amD72NOrGNvTFQkSsX38ORFyUdZ4p2SP186FTL+rzPth060bc4gZ/NS7RFCxrrshS+ReRaZ1+VT4MoAiEACfSpEUqmKJWs1b3iDUO5O+vawreC/ root@b2026fdd-4707-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDbeQpPknHvF51yBUO02yxqpT9jHYcpSlAUFlbDr/SILGwIF6VEILKyPT8YprhYI2pv2QhQdc+7hWx8wPa3LFm85qYfc9369mUydesxX0lnti4LXpmlZWKfQdaavTjWeQSP+OqZcm3XD6d4bt4tE5FL8YQyo1l2mKjZ817wELYxmmlGOo/y9V2hhjEdcHuCHJeudkiCd/Dx9b59HMa21/CISg50OIqSLokAeYg1RmXtEscpzPF/2CaMvj5whYfNYrDUHgU5Uc88W1y7m98dUzp/WOp4RHf+ElXoetJictVCHQXjUt/GZd72/WE9Seb1PU5d+nbzJ+DXU6AztTIgXmrj root@5f62fd60-59cb-11eb-88de-22d0764934dc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC6j4s/mVp0efq258svexyIySTohDbngTQ9ZMdntvmRlRtqDjd1toB3IBYOfO69GF5i9ajVNMmEPyw6iz/Oc7+46N+cbIudAisccvuF6vLqjw9LFLWl3rfkRH3vCuIk3/v/0qfy9aHOfx0n26o0o/dVNobNanhkxRJYEdai57rYcnxUL2xT3iMPLqan6thX1cfRkH69nal7xJ7V/YOqvAFQSEf52FjtH7eJ9PD5PLagWHQ/jD2exj3Fa1vY1/zGZS5VL2mSRzb6XmjrvlTzalQToC//6A1zPP4dumzqg4Cnp7M/YTbJ/jjGl1Xp/3RFeE7lTe6lcUgiUhr2Jfv4S+vJ root@83d6d734-5ca8-11eb-9ec6-4e9464752f0a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC4KnB9ssF6BxLoRDVETkjnAfGipR3iR/o64cE+LDufgy+g53M4Twm/5fMM9XW8yaPUtRwVUzNEQ4GpcGenpOIY3VGqdx1BBwPpnsw+5ZG9vuKXgQDb/Cmnj+g5yKlpWh4zoA2ZNApA/dicthq6BRaqfxeUXxYpDmbjRH/tWDRRcsGuLD/IINl3nHTA8udE5f4CtcEYMQttIVthPjX+gPXrVhYX6Tjcg741KZeNr/hgLMndCVvuwlQTtK7dDnTVysUhEmHq8lNFME2Gi0ho5uW98HRsqTxcY4O/IEQPkTNDwk/9jC0siH/va42BR6kSfbyieOKCJnnMpTHAHq1kMZr7 root@86b27df3-6082-11eb-b996-722e0b015734\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDwbOYCnBdwoJYRkOiWYiVQm9XTLZN9RUJTenoQ/8+q0l1ZWq/B8BNvcenXyXjhMCjF1lbd/7Y5FWcNAqYhYfwPf2/jCN9aZ2axVBg2/OwSnHANlgU9vhxvnl0WNTsEF5I7u55N5g20wS3OTMD0y3Nmb6PQNJDrVIlmafvDCxcEnY6kv7ySQZx1YvVv/htnff1Bv8Pm+a5MznbPOl4hgO5ygQPoQ7XaIohDomyez3WxrF6dSfK602TDC67MIyk08OONDnEocPUwCFyjn5zb+I26n2X2n4tkTRwrh7GNVFp8EUbx+FJFX/O6oRsGtASprhuKDWA6CvA1SLk9BxbKkZFf root@a77229d4-6198-11eb-b18b-866c5f3dcaf5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDnEBTX4m4d8KiafuHn/ousaGJJKabzA6oeXro9yHlJNpGbT4fqZ5DZ8tnTjAlMWvy1AQ3SbsWk/8Kqks513l8ODa2wOkeDt78wbNeiq1+QMloCgOqrPBZQFWAH+SUSEqcwohcMIFtpA5W/T2PXAFfPjgt4DPi+U7JycUQvlv4FnRZtiyds+lHMmYx1w1F9H+K0Ghe3QRtb62qoKqJCdc3t/gcszxiBzXPZNuwpy2+AjaiFsdty5buPgrCGP7zJgCzi9vx4VoZYF8X8r588sjuzV50vbTQbIK5k2vTEx4KU6QzWuxt2YBzH4iByEm8Kvs+NkPO4wPvgylb2vWegztvv root@f2e49893-6262-11eb-bd55-a20b0ecfb997\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDI4vAKMXNSF4Xb+Q8ljYrt4Z1jULKROhc8pTVmK/NYc7OdD+UaAR6qWV3Dkq+eSO/f1FbTotEGfEFS0hFKAq+yzQcsBU07QPyGbhkRU9GA3PtSpXCj7mmQoMplx6DVeGtVllqRa6NxjtOxK6vldsU3mBCIqJXnmFRr+AYEtOXwW2jtAWQq+mrV06lmJ/nzMhLGSBVUd/nEKuNXhNdT26FZ4Zak6K2KcsxRo+yBhOp08xapaRQppBo58pReesaQbJcxKhUC8MyvV2yF5fF6hElAhdr35bX4QWmRFRsmPe0ZjKJaqIrCyrLKXPnhA5qt3i1nRZDqlFHpV8wM2+jpXAS3 root@a45c5ef3-6a95-11eb-b0f2-e2ce0c220244\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCS72uxm96MBetRSgvTHGWfWal80JxsMB4wnV/OA/HAqAKJDF+qJ5dLHQixlTOfWMnw0AjzTkwukOZbkiaDvbn0Sb4a324mgKkQDPWFut9Qa985oWdPv5FFwdOLqnQ9c0kb750+kcIRg1K/QxdDnUgy8iawvLJP8DteYuAFAVRVpmCMepC2/VQSQ3ExCfvDgt9L6NBs5SXGDa4PFFNWmzS6LOBrSc9E5AZMu7jh6rhHpMsNG3h3cq2SHHUcLIZARUvg/rl7bwcCPKEyenAOud5P4ydbA3Qi5yLlBe8MgWuvOLdW+woFnb/0m2okEi/5z3JhwVarYPzlse/j97NJ00Gf root@49dfe659-6bde-11eb-a3fb-f6d36e2c66f2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDA4p5aOat+h9PIS1koGONG3a0Q6REbZ7GzI/15CSfz2A6x7UfWEedGvhS4dvT2JofNOJfhmXLt4I48Y1FoAuU7+iza9bfEOnc+y3ubqZUEcSZ9hnLGkBBiluBaTmKhwLKJjYw/4JxhvBd23LIBzeQMDbmbZ8tJqjKazaYGpg98HplUHa4Yi95tcTF6nXBW7c6nDOUQ5neuON4m4SgG/yPzRj7yhB5fBc9LGWIkFOFw/RDDFaPIs3tVhYgDnE6nmnI6utN2diB3NpXprtJgl/erfJ5/HKhY0lm0qQqjQJeQveXR5lWRVJlZ+FKFWc2vum6cj/jY0t9b7Cq4z1VRU1Y3 root@65f12969-776a-11eb-b42e-62dcc321ab6e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIQKS3m03g5SUzyzZO4WHekUlNtGhCD2PCYxntYp8cTEnlTdZtfPlVloNMs6E71qLgGY2ApF+u3JqVUXP69t20MW7I7DgO9O7XkiV7+12xcwGofUaCNaRALcjfqRHTg51lQ3nZzA13sqZ4EC0cgRGyi+2AJbbyV3x8diUuBqmhWkaY/c7LdfBQRVenwHBWq/EfFS04Jv8zYb5BEmN/Qt8Tsg09Ah1w1qnYXKgfNev3k3UewWVHjXlX5ZZpO73KGgndokXZGR9T/4b1GD+HYhreQhWno/nU6ofSFEikAzPaIDmupm5ckredvcY0p+8Z8j5saV26pO8hFxoaNIm1CPVH root@86f5bcde-7880-11eb-a92b-f2148a2022dd\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDFTSH/rQ1hStXL1veXZtcH0WWKdY83h0nmqowGSczpvRhhnFKQ1turvWzJgQuoPRXY/7vhUhY9jGcqetsJJ3ddLbhrvNrnvmwxVn/gXJxHP1IQtASPemybbS2IcSg7bRVy3cDWZ11XLyxCm4Nk6JfSoFDReHruRBYhNATn/HdqXJtsdPFFVf+gdJx5yT92ydSG1dhNHM/2B6lghEN1QqTbBPtWqTyzpbgpTP6hfKGSH9Q2p9IGACZbjUmyMU5d/FVfFuxBHpwcO4KfwrN9ERSvPuQ8ql7OqzCxETeZwbNxSJXH9N1lePhSXbA9BDsTK8+d8U25qpImK93mfv5soHOx root@c1d361c7-794a-11eb-a603-2218f636630c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDDMdV/O+q7PTIJ2xbxeSMamjZz3QehWQYmCuAkTdBUBLlbBLaort5FAV7u8rsRJIJe637s+7BhSRzDaIrmTOAg9SRmopFH/6aAzvST5LBIr07GmfJQ03//pUaRvijEnQSw4o7EE5tu9eNMlktpfO5674WBTFk+qTX7BNWNFrGUm1MZZQwWy1aj1Nj16BBZFuuqok5wJljf6ABbMUcBhqy337F1aFcbiSuSJdWA8Viw0wPvWp9+RVdcjMNnr/eXJ2CIby9i7KbkxRCI1rJepnZXMDcNu+5gg49Eew2ipuUUdTLg6/nP68Y9TlSutAyii9lGh7SJylJZ4E03UoUH9SJl root@b46108ea-7aae-11eb-a603-2218f636630c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJ0FcEQqZdihIw7H0CANfG9B740ZckVbDnNZ1FP147kQWMuxumIrF7NAK+4MtvR2P0JMSDrgzUgdXInvudC8Gvm4Clhfd5eB2qyUpTV/whBzvWPsgc6lXpqEBE63JEXFalpAyFw15rrcgetFVDq0ASLNkWUqLMBuIuvd+yUvbbuiPKjABzrX+T5Gf/5dB6wMS31TbFnKUoLr+0vGaAG9KPI4dS0MaOy+7qqdh+MaGBrhVT2RJaz2A2qYeBu+wUOcr+4aV6WJRYdh/dWCqlhDlp1mnRBlHx0JOLA4Nll+jNVmGFIIPFNsQEcg/52vy2tdE2ri4x63moNvTwPtb0xY3B root@38418a72-7b2b-11eb-9b34-4e1d335ada19\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEmvd0xOBs0BQEx/WXCVX1U0SXgFoL+CaPYIIkhukrWtJ0cHFwR1B+CYCT7lGskp1A8HLErTj8oA6p61Pz3hOX7zhQl0KUnNJXfi+1EjsubAbDDBMlfF47aCZLHJzRzWKK570B5q4+aJsPDrf/9dNghn5uQobaTQWfDPMSHMiRNQ0pEaU3S5cEiMaGUBCWadLl3+GNvj9XglOSKp8/YeHBr/002zmkfm2bVUOXV6AHLAmrcA+/85WxF2u1RhK+fhaPUq/T7uAAfqluYO9sJ/FVa1LOhCSHELeL4gv5ehP5dRYcaS8/w2fga0fLSq/QjYA30OFrExPy7UcA+W7y6vhP root@ca089b41-7b5d-11eb-9b34-4e1d335ada19" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCUQ+5h+6sqhD8wp2k54QrJFcqi3AMba/A2x6HEbtjOJB3Vr7lhjEjt9P2SQLbrceiA/DmWuPNVIDfm3KGWNqa993qjVcUd3CqZaYI1EYGq/WVcq8RoJATwe0wt/vsV4BEpHymwpp2QhVfubhnCyMSWrJtO1LBB4YR/ZvtXyEshJofMKGDItDznr/syZPdE87rv79QPjScZiFzQVUy/hpfWlmgvDWn6UkUS1Y7f7LjEWKAWbWzAuaPIYbThznlrr5yDLJCxqaAbKuDqHYUvS3Fv6dGXZt8k0Hd/qCMo2UYhYDRiFSs94NfDsoUlx6pAyuYG9INEObWk86J0tKNgybil root@2a15c21a-e242-11ea-a87b-7e1d84ccc038\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC16pVhrBBXS7YREt4zQfLMBcoxSPItVYzRVI4hMLvug6crp1dwxmbwdTGwEndsOBGLFxFj/VSkipefLcck9ENJlaeuzV7BlhmH9bisgzI6ig5D2jk7Y4IhbYb+A4Gl+MoDCJpT70yPvXOd97AhJBxHvyqiFdDbMAG652DMwr8z8e77xHolRyA0Y7i7dP8O92aGaq2jDnfq1bp7LKIGoh+vJMKzYSSb7mGPsZ0oYwM4xuFPFpmYAGNfElTnUjZPO6tHhJsVh1XFZL9gL+iWFyi/DtMKyvYfORATfuJN1zutQAgq+XqFOvPg4S5/IXwCQc3MA5qu63U2R5PjMng/xQFl root@3ebe1691-e409-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCsPnJxiHNzg+J6rCckqnf4t4XmpuUh0+SoTdlJ1+/DKNSNFuufkz14IVsAA9+9KgZkce/fZnj7ksageiMErygFvBIjFiXD/grNyqAAYdklAnQTvJnYpzzYSSq7FIMQ6IhS2I9OrxP8pHFygjcXidArCMDQdPSUMtvyiZuGrgDHKFXSHgVzz4CGdMiy18sQa6mz2aO0doC0IFnpx7d0QKMsvHeJTyKbjDg+QypViommO0FLAhG68rZ/MO8gfABgM4iV3FvfKntRrF82Kmtl64AYbEwAmMyrEDsP4HD0oHeQPgW1QR5O/U1+epe9tRaS4kU7ElsEa+C0xVh6F3qHWST root@25f6f62c-ee81-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDpNdNYDEy5WX2e4V8ZF8DJhJeVhQdgOWvB1vs4lVd/89t7lNycgRfti/HAP/s/k2xhG09ej2ObAQSS0eLCn5bemUrVXiGPjGCz274yFbgEVq7rv/nl1hM2icXsl2akVx1gifOseblxN9lnhPt3sIIkvwXdPVWq57RKIbygD7D20Goqk1QgPvvHWZ62kHArbeEQ4bJAlufAW6/mw96c62GkUJGohyyC0R87SBDMaLYL17GDtp/Cw0oukLNoDwiDuvMe+LSPuv+T+m0sMo/FmPy/4SspL89qds6fZedbAUsDHK40531HFfybWZkFS2SsgMj5JYkeTSh95N3b0c8yM+vx root@a3cfa34d-ef87-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDFghSLi3zRiwBsAi5GMhZ1RQ002P7uT9Ks2676qhHwAWhUR1pvi+ooE73DODumnNv1JIWPKZC1oEN9j8hOxoiny2Y5s68vivk6flzjCYlrxsCgAtRFsFqVdzUtdfww4qRO+RVrY2EIC7NOg5WgDpNeTcwPB+MxQpcqSNbo9t3QjQ+KgP2CwR0Ti3GW1bERrx8wXhGv+U6ov/pExHoPKm1rnhO5rBAWnEnqKHccniA8tIH5ZEkPNLmzi3QF3x3gK2Q1292P4QwvcIKPR+/bXOisE25yLFPO6SAeVbFwfp13TNC8jqwpFvBxVA0PF4WQA+/NhtQd+HjAsDGyQS1ovj0R root@1fee4dd0-f46e-11ea-8508-9a96569b20f1\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7hJBr84nOvWfdKxN1jPUbXhdV9oXeSGrxu4BAN7Rjll7wgZQVZ2DkxEuqI3CafN9v6A27dF+ercGs4GnRiIE0YKHnjZtUr4GUzLP0eDoqxIvYMsZ/ytXbnaNpGg8YJuFqI6bO7sTwHgFiwIG5Wea+eL4twRbIwCrS7FdAdT1nsN79C81n5/SzfTQzU92bmqM51lW8N2+8whZPC1rVU9Er8OacoLhfk3hygahjRt6N/FJcmQFnsvzVFQq7vUOZ9eG9Yq3DCQLHDMX7m7rW8ba8+9ncZbUehsYMv7aueca40I/FxvYVBtHh7Mb4RYCOyYvO2b/8+DwfSfP79KFz7/yZ root@a9526d06-0490-11eb-a932-82154e1dffc3\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDidpvb2gC0wdoQRuDsnLHdBKerDOI29EhKDCochyijGj2nDuORSO0fi2wouk/QUbqISPygv+0QHEROcw5wlk/+dUpCbLU5krBqKwwGskS2DE9z6T5cZMcsVKXggSbBEWZzaSSE/TULzTwB7Hjg7y3u8uk/S9b1r2fmmhuN2SGWw5IN2KKXgUvRf2FXm19ZuF+ASgvJbBsFQmrb317w5DmtiphoTOwmNfe8CVNnOUVvhntv3DYHY8KGQVfAJJkVwJYBOyuYIC8jyZxlyAGgftDTf8bC41XWvy7Yr9rW4v69J5LZ1bhhOjNZq8S6JcuwE3gtAPTrljMZsIWwAP9eVbNT root@d9ba87b9-1dd8-11eb-8e42-66e2cea7f923\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+1JLmTP5YB49+IaF5TgtT7Nfu9tljOSKhYdWyR6Xpn6ldkbjCkEAqhMGYYKLshZrMONSVQ76UuAWAH8/m6J3YtC62+1ilKV77RHM8E/WZpYc/msWAB1MagThRXDi0AkWGp5vMeQVxLgUgs/2qlI+/+DLNorYH4xNzLLX8VsfPIwxOqhMWtIap26WwHy/gh4fMGoDpeSS6okooteVisyxLudT5Dt58jF4qoEjcMzH8HYv8TtrO8clGQ1RKOZm/ghB8n3/6lUpRiWwX28xBV/k+1u9KtpcvPwFbIhEcsXxlw3K1qhy3hUSRvP9WlqnjyM9MRHpV1AWzXDRvJB4rGVjN root@a291114e-1e24-11eb-8d52-9233771f1447\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9SJs8Gx2hIYeCfRidd5/rIWlAzGCfyBlmIMnfnlACV1zUurGPwaZtGyppImIxZWz17V+FI3QiBPdXaxCXydqNPVQT+H8OiwT2OZMp30lypz32vGg10FIhDzpxn880MXPCMd4/8cvmbPWkHO6xYhswkwfchyIa7pDwIqQRPhiwFeUuHu9N1EF6klzjDfqcSvKjhXBfSeqfySuehaRhZy+SdxNNX8ef8kU8LugVoRn5JPxB3PExp5pH2ocdjz48dg23I70agN7ENE5EpJ4czAbM0l0E6sxRQ9ayKVMU+zvYmNzFVpnXgWaFX5lWuX+xiugFStoy41u/nA0ylO/DT71D root@d7601552-2966-11eb-a35d-7a1d48297fba\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDPusBFNUwi35FvsUjia8nWHNNKVrqP2pXY2nvBOVIR7UQzfTI3xS7MyuKNWyvd0nPQlfVrmIGnadBMdhtIbFB33WL6C/hACcEAye9s2+CbRwS4fR7Oyqi+7LZCBqLki3l1Qma42wPaLEzd9glUzIqfJtLYD7moAgIgm5vXm5zgDTVR8sH5uBFZ4pfrxXe13h7KSmxqLInbRbjK83SPQQ6ie+gkKimIqmkaQYavQ4JocFXVTLV16LY4YCv6lFJ3OTdKQEETe0Jire3BIHW2+Gh2hfZm5hqNOfHHawKg6eW3XtUhpPx2R3WxSq9+oEHmYhl3oeLK6TBPpYLaGJzlc5dD root@7ba43b2a-2cc2-11eb-a59c-42dfb897bae6\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC3cYxcQNfN0+G8A2WhcqvYJWFY3vY42GBnNc/+EK8mqprOHswiEhEwMQplqUYt2I7EbO1yOOULUH2dWJsbcW1BO8sjk0oGhRPRQbZp+OtbhWW7Nx4d80arF8QGu5QQO3ma8gfiZQb3H0Pyq3V3cpNoeRM1sJJijb3XiO2ABJFiZmWzQ6LTTP5D5qSy0Y70bGXj/RbzawSjN6DfLnbsIe8IbnDLSIy0gXQCCyJn7amD72NOrGNvTFQkSsX38ORFyUdZ4p2SP186FTL+rzPth060bc4gZ/NS7RFCxrrshS+ReRaZ1+VT4MoAiEACfSpEUqmKJWs1b3iDUO5O+vawreC/ root@b2026fdd-4707-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDbeQpPknHvF51yBUO02yxqpT9jHYcpSlAUFlbDr/SILGwIF6VEILKyPT8YprhYI2pv2QhQdc+7hWx8wPa3LFm85qYfc9369mUydesxX0lnti4LXpmlZWKfQdaavTjWeQSP+OqZcm3XD6d4bt4tE5FL8YQyo1l2mKjZ817wELYxmmlGOo/y9V2hhjEdcHuCHJeudkiCd/Dx9b59HMa21/CISg50OIqSLokAeYg1RmXtEscpzPF/2CaMvj5whYfNYrDUHgU5Uc88W1y7m98dUzp/WOp4RHf+ElXoetJictVCHQXjUt/GZd72/WE9Seb1PU5d+nbzJ+DXU6AztTIgXmrj root@5f62fd60-59cb-11eb-88de-22d0764934dc\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC6j4s/mVp0efq258svexyIySTohDbngTQ9ZMdntvmRlRtqDjd1toB3IBYOfO69GF5i9ajVNMmEPyw6iz/Oc7+46N+cbIudAisccvuF6vLqjw9LFLWl3rfkRH3vCuIk3/v/0qfy9aHOfx0n26o0o/dVNobNanhkxRJYEdai57rYcnxUL2xT3iMPLqan6thX1cfRkH69nal7xJ7V/YOqvAFQSEf52FjtH7eJ9PD5PLagWHQ/jD2exj3Fa1vY1/zGZS5VL2mSRzb6XmjrvlTzalQToC//6A1zPP4dumzqg4Cnp7M/YTbJ/jjGl1Xp/3RFeE7lTe6lcUgiUhr2Jfv4S+vJ root@83d6d734-5ca8-11eb-9ec6-4e9464752f0a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC4KnB9ssF6BxLoRDVETkjnAfGipR3iR/o64cE+LDufgy+g53M4Twm/5fMM9XW8yaPUtRwVUzNEQ4GpcGenpOIY3VGqdx1BBwPpnsw+5ZG9vuKXgQDb/Cmnj+g5yKlpWh4zoA2ZNApA/dicthq6BRaqfxeUXxYpDmbjRH/tWDRRcsGuLD/IINl3nHTA8udE5f4CtcEYMQttIVthPjX+gPXrVhYX6Tjcg741KZeNr/hgLMndCVvuwlQTtK7dDnTVysUhEmHq8lNFME2Gi0ho5uW98HRsqTxcY4O/IEQPkTNDwk/9jC0siH/va42BR6kSfbyieOKCJnnMpTHAHq1kMZr7 root@86b27df3-6082-11eb-b996-722e0b015734\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDwbOYCnBdwoJYRkOiWYiVQm9XTLZN9RUJTenoQ/8+q0l1ZWq/B8BNvcenXyXjhMCjF1lbd/7Y5FWcNAqYhYfwPf2/jCN9aZ2axVBg2/OwSnHANlgU9vhxvnl0WNTsEF5I7u55N5g20wS3OTMD0y3Nmb6PQNJDrVIlmafvDCxcEnY6kv7ySQZx1YvVv/htnff1Bv8Pm+a5MznbPOl4hgO5ygQPoQ7XaIohDomyez3WxrF6dSfK602TDC67MIyk08OONDnEocPUwCFyjn5zb+I26n2X2n4tkTRwrh7GNVFp8EUbx+FJFX/O6oRsGtASprhuKDWA6CvA1SLk9BxbKkZFf root@a77229d4-6198-11eb-b18b-866c5f3dcaf5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDnEBTX4m4d8KiafuHn/ousaGJJKabzA6oeXro9yHlJNpGbT4fqZ5DZ8tnTjAlMWvy1AQ3SbsWk/8Kqks513l8ODa2wOkeDt78wbNeiq1+QMloCgOqrPBZQFWAH+SUSEqcwohcMIFtpA5W/T2PXAFfPjgt4DPi+U7JycUQvlv4FnRZtiyds+lHMmYx1w1F9H+K0Ghe3QRtb62qoKqJCdc3t/gcszxiBzXPZNuwpy2+AjaiFsdty5buPgrCGP7zJgCzi9vx4VoZYF8X8r588sjuzV50vbTQbIK5k2vTEx4KU6QzWuxt2YBzH4iByEm8Kvs+NkPO4wPvgylb2vWegztvv root@f2e49893-6262-11eb-bd55-a20b0ecfb997\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDI4vAKMXNSF4Xb+Q8ljYrt4Z1jULKROhc8pTVmK/NYc7OdD+UaAR6qWV3Dkq+eSO/f1FbTotEGfEFS0hFKAq+yzQcsBU07QPyGbhkRU9GA3PtSpXCj7mmQoMplx6DVeGtVllqRa6NxjtOxK6vldsU3mBCIqJXnmFRr+AYEtOXwW2jtAWQq+mrV06lmJ/nzMhLGSBVUd/nEKuNXhNdT26FZ4Zak6K2KcsxRo+yBhOp08xapaRQppBo58pReesaQbJcxKhUC8MyvV2yF5fF6hElAhdr35bX4QWmRFRsmPe0ZjKJaqIrCyrLKXPnhA5qt3i1nRZDqlFHpV8wM2+jpXAS3 root@a45c5ef3-6a95-11eb-b0f2-e2ce0c220244\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCS72uxm96MBetRSgvTHGWfWal80JxsMB4wnV/OA/HAqAKJDF+qJ5dLHQixlTOfWMnw0AjzTkwukOZbkiaDvbn0Sb4a324mgKkQDPWFut9Qa985oWdPv5FFwdOLqnQ9c0kb750+kcIRg1K/QxdDnUgy8iawvLJP8DteYuAFAVRVpmCMepC2/VQSQ3ExCfvDgt9L6NBs5SXGDa4PFFNWmzS6LOBrSc9E5AZMu7jh6rhHpMsNG3h3cq2SHHUcLIZARUvg/rl7bwcCPKEyenAOud5P4ydbA3Qi5yLlBe8MgWuvOLdW+woFnb/0m2okEi/5z3JhwVarYPzlse/j97NJ00Gf root@49dfe659-6bde-11eb-a3fb-f6d36e2c66f2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDA4p5aOat+h9PIS1koGONG3a0Q6REbZ7GzI/15CSfz2A6x7UfWEedGvhS4dvT2JofNOJfhmXLt4I48Y1FoAuU7+iza9bfEOnc+y3ubqZUEcSZ9hnLGkBBiluBaTmKhwLKJjYw/4JxhvBd23LIBzeQMDbmbZ8tJqjKazaYGpg98HplUHa4Yi95tcTF6nXBW7c6nDOUQ5neuON4m4SgG/yPzRj7yhB5fBc9LGWIkFOFw/RDDFaPIs3tVhYgDnE6nmnI6utN2diB3NpXprtJgl/erfJ5/HKhY0lm0qQqjQJeQveXR5lWRVJlZ+FKFWc2vum6cj/jY0t9b7Cq4z1VRU1Y3 root@65f12969-776a-11eb-b42e-62dcc321ab6e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIQKS3m03g5SUzyzZO4WHekUlNtGhCD2PCYxntYp8cTEnlTdZtfPlVloNMs6E71qLgGY2ApF+u3JqVUXP69t20MW7I7DgO9O7XkiV7+12xcwGofUaCNaRALcjfqRHTg51lQ3nZzA13sqZ4EC0cgRGyi+2AJbbyV3x8diUuBqmhWkaY/c7LdfBQRVenwHBWq/EfFS04Jv8zYb5BEmN/Qt8Tsg09Ah1w1qnYXKgfNev3k3UewWVHjXlX5ZZpO73KGgndokXZGR9T/4b1GD+HYhreQhWno/nU6ofSFEikAzPaIDmupm5ckredvcY0p+8Z8j5saV26pO8hFxoaNIm1CPVH root@86f5bcde-7880-11eb-a92b-f2148a2022dd\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDFTSH/rQ1hStXL1veXZtcH0WWKdY83h0nmqowGSczpvRhhnFKQ1turvWzJgQuoPRXY/7vhUhY9jGcqetsJJ3ddLbhrvNrnvmwxVn/gXJxHP1IQtASPemybbS2IcSg7bRVy3cDWZ11XLyxCm4Nk6JfSoFDReHruRBYhNATn/HdqXJtsdPFFVf+gdJx5yT92ydSG1dhNHM/2B6lghEN1QqTbBPtWqTyzpbgpTP6hfKGSH9Q2p9IGACZbjUmyMU5d/FVfFuxBHpwcO4KfwrN9ERSvPuQ8ql7OqzCxETeZwbNxSJXH9N1lePhSXbA9BDsTK8+d8U25qpImK93mfv5soHOx root@c1d361c7-794a-11eb-a603-2218f636630c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDDMdV/O+q7PTIJ2xbxeSMamjZz3QehWQYmCuAkTdBUBLlbBLaort5FAV7u8rsRJIJe637s+7BhSRzDaIrmTOAg9SRmopFH/6aAzvST5LBIr07GmfJQ03//pUaRvijEnQSw4o7EE5tu9eNMlktpfO5674WBTFk+qTX7BNWNFrGUm1MZZQwWy1aj1Nj16BBZFuuqok5wJljf6ABbMUcBhqy337F1aFcbiSuSJdWA8Viw0wPvWp9+RVdcjMNnr/eXJ2CIby9i7KbkxRCI1rJepnZXMDcNu+5gg49Eew2ipuUUdTLg6/nP68Y9TlSutAyii9lGh7SJylJZ4E03UoUH9SJl root@b46108ea-7aae-11eb-a603-2218f636630c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJ0FcEQqZdihIw7H0CANfG9B740ZckVbDnNZ1FP147kQWMuxumIrF7NAK+4MtvR2P0JMSDrgzUgdXInvudC8Gvm4Clhfd5eB2qyUpTV/whBzvWPsgc6lXpqEBE63JEXFalpAyFw15rrcgetFVDq0ASLNkWUqLMBuIuvd+yUvbbuiPKjABzrX+T5Gf/5dB6wMS31TbFnKUoLr+0vGaAG9KPI4dS0MaOy+7qqdh+MaGBrhVT2RJaz2A2qYeBu+wUOcr+4aV6WJRYdh/dWCqlhDlp1mnRBlHx0JOLA4Nll+jNVmGFIIPFNsQEcg/52vy2tdE2ri4x63moNvTwPtb0xY3B root@38418a72-7b2b-11eb-9b34-4e1d335ada19\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEmvd0xOBs0BQEx/WXCVX1U0SXgFoL+CaPYIIkhukrWtJ0cHFwR1B+CYCT7lGskp1A8HLErTj8oA6p61Pz3hOX7zhQl0KUnNJXfi+1EjsubAbDDBMlfF47aCZLHJzRzWKK570B5q4+aJsPDrf/9dNghn5uQobaTQWfDPMSHMiRNQ0pEaU3S5cEiMaGUBCWadLl3+GNvj9XglOSKp8/YeHBr/002zmkfm2bVUOXV6AHLAmrcA+/85WxF2u1RhK+fhaPUq/T7uAAfqluYO9sJ/FVa1LOhCSHELeL4gv5ehP5dRYcaS8/w2fga0fLSq/QjYA30OFrExPy7UcA+W7y6vhP root@ca089b41-7b5d-11eb-9b34-4e1d335ada19\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDlZOaJQX3b9Yy7DImdVx/wg1Wfqfr1CTycPzufvV0YRTArOQJoXY81ZxD7KT1CiuJX2dkucdoqNDoPMd0j4z0f8VqHwQ7FIwZla/UkuY/SsixkclI6RydRRnyhPsvrmqt5JQV25Bg+sTcqTJoRm/4s8gG6mVS0KjzTc6+N5LG+hnj724rvQJ7aHDE+o3b/ChRSvUS0UHdCDpDXYI6ZhmjziukKJ+fEEMvwpwNfcSL4dfiq/yla9veMR8DJy7NeeA8sYaQRZWyRPAQezKa+9iKBCW/fYUlR9Zj3Ss0UIH6sHy+zWTg2yDZ201bAYg8odMJxMEcbHAGJrNVsMYkLtq/T root@ac7581ea-7c5a-11eb-b5fa-bafb05f6310a" } ], "kind": "compute#metadata" diff --git a/audit/projects/k8s-infra-e2e-boskos-099/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-099/services/compute/project-info.json index d64ead3d180e..5f169fecf348 100644 --- a/audit/projects/k8s-infra-e2e-boskos-099/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-099/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCa8IfabflaT3YXHN6zw99HnWJYk418To3wm9NH8poO2AcogajKaPit+DMDRqBjcZOqPZIJAgcWnM+YC97aMY40hN62uxIhrLT0m7E0/45IX8IDjpA6JDlbeFNItk5GT4Z0TzhFWA3JxmBkPaRfmc51eT/uNyYLab77hfCmfwsFEwOSu/jjMCThObwHMNaB08oSc2YxhApWmjyMP5leo0d0GqBvN/Vke0aFBXHtMrIfeKA01WkQ+fE2bc8Dp9xpY69JXok8oVyadsnSIDTjqZ4+bVYtA22gWBoJ6ktwB7CmOKAFbyH9IOQ5YMF5iApx+596p1SwZjl81jAUManRusHj root@2494de16-de26-11ea-8a0c-be937dd98cfb\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDOpUrk2lmtfuCxNpAFYbE5KekW4B3XBNBq1de4Xz/WMYa9jOHZJsNO+BEyxgu2VXhbKdrSHE6tAV7ryhjCmrisSU98K0fYkNjqE1DQgJhogBCk6Hm+cVN3OgDiGQiB34V846gYcSaqPQKJnttBh2zeQ3c2F1XkyrNwFB3/u7tppH3RpfwPQcjHqO9rUMbYrhELvFyLNjs3wvEL5EotgkjS0fGQvJ0QTKWotpehJ8d97I7wxgCxLGPQTusUU2bHsTBz2j+vB+6VVckSMXwzkPqY2zsyPyWdLWLX9lH/nYIAvOJvVDH2VKn/DKbSgp6iFfsOk9kjoWLKCu6KsfXvIjCF root@a01868a8-df09-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2JZxCgARfCvIQFMWBFMXCHGPIWdsDpiIuVtiAV/jvccDDne9WyiUqzYPEoKOiMxjZhA7s5MpimMY8PZoNeH9kq8KC5pcVaBOGVlUXiOSf0yqPMdbqLEhmYqcPe7EyA+ly8EYdK2T7uaMQiE3yy+3BTTBLIR25pWpvd3pX4ihu35wdu/ylbjKjkNIm+7/KAS2ChzrBwAsz1dp3dJgUJJr4N+bOCjzh4jPwzdEWOk9JkPPI/M+CLazjt6iVI2rnDX/ksDDWtSEWQoxb9NdRYsvwGAJjFfE98MAguAs/lSQGLlfLn/oeuV39xCCrr9gobG7ol8IOTOojNE/AsXwkYAr3 root@9b69c4f9-e935-11ea-aa1a-c6580c04344b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCjB8kJM1msnoBAxHjz+EyZ7wqQdSVoHUZ8dsCZyEqvffWJRNXvYRBN5R4SYqEpQLL+O7uFSu0+jvRhdcTA3GsgQ2vCppu/QlCiCdjGiCdFJhcVje5awpou0o+QAyZmWPZU2Sm9b+VZC8xObOUAchLKkr2BoRGI3tswLjED8dUGJs3aGY/k0DJfKfk32ttZoa0zWBWEZOgMJIhYFCSPlQPU/yIUh+yICFG2x3gqNNTX535o9b5TRPgmEzfMF5P6SaFEUsOtZLWnEP8FMFeE+MgUItvgt6L+gW9QB/Nws0XFECWffkqo1vZhzpCvOLJuE0zJt9jwYxM1TEj/ksIp3DIJ root@895c16b3-e9e6-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDcMS+XucUIHjWTV9JHQEAKtvBalzxcoEaIeNqTN1jL4M8eKcPf16P28BLk1/O+GL2LvIyZGxlkMJqKTSC6otBz+esaF522zgsM4pjLjV0inxrxX4Z8wzGZWMcHDuFyLpoG9w9ruRT3YGMVSyhquSYSrsdZ1LsnGfwXVH+rkKFAf1/x3maPGMrMTSikWO+5jskkdNSawK4McooVt5HKuDZaIM4EpPLtQbRZPjLfJLF5JK4uPtb6xL6voL+Fch7pKChZAITDf6XJnbU2qBpUR9BDhJXSzoCDzoa5DjzbwGxUUNfzse3Wv2FvCr0aLjNJCiXrU6835pMKSITaBqpZb4wH root@b76ac091-ef64-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDuA52BP77ehBU2np4ItgyDjc3VhI0Xzr0hBEWPjBPft8NuZGmNhRsRIEP2/O9TKafml3fMQnhVb7ISWj3l5rSoKB20xKviLc6Hovtp1QuUI30xcw9wQcLZS7rYo1NWAEN1BpSgUBOhsGuAkb71ExVxOnrxYKOFNi/Hc42ziFaLO0In1Eu7mLRv9SOWDiOWpq8U7eUUcgBtD6vJBKytFOA6f+j2TJVlKlhWk2NzzXM4PP1JrJGe0uM/YMqkmhew6omRQOOFEZ8QKf/YlvBadfwnkn2/c512B4Zf8JkjFP4mfoC3GFe4P82NYyxGfg3USwxTji5ChggkTCOUS8pSENdb root@fe9abbd2-f190-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJ+YNVEHWhQbkn0poLe/5jc+WQnn6RoGKDucZhFd8JllMI+dVGYNqNAQWJykTe5mZcxb84B1QPVEW2SulxcN4/qKpnH/OHVqcDPW1hxO93pHFasPOuTzRNYf1wIFP74lcPi/H1F5RvtAMrTCoI8yuiZYYyapc4AIt79OgMhPnM1zmQFvAQPx2G8QzO15cFdyMX+IOWS3RDggNWq8Nt8MeUg6B0t+x6PD96A5cIxZMrezybu1I/FgKatBtg91d89HE18+zVR9hnXyBtTDZ6MmEBqqH0yRWDFwe/ZuukTiUvMAnnhbkfRpe0AjggugjwIaOea+AT+3xxmovR22CqKe7p root@5ca9c8f3-f7d3-11ea-872a-bae3dc204648\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSYdhcotAUmA/RDRhFAB29ASCL8IcoVKTt2WNwJyfhuSZ5uIqdv6WRb/tXQ4prr6NeNkzrTSoIkzfkqrMoEUxdV319bVZYP4kWpCqDe47J0pJqkAmta0Wvd0gjiGOXIRGTYPabqEreUfcyrZGtOGXpsMRkhXwGxShIuLwpAkdYetbC3LGTcTLPIgGg02vE9wBOEdCYzwLB6alC3i51zIMuchVa+I+7peEbqlFLAR9OdDJtIAxs6cXMiVbfpHAlhd2q/pKBPxFkqw4jvsQZM4CelWW5XtRMhr56psuE4JK3M8iMd1jAvwCtl8KWBLjUa2rlH7XwnKri/JWiEXmM6NG9 root@7c2b051c-0b7a-11eb-82af-de22b9665164\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCvF0wQIdhn8puO+H+ra1zxtyIpe83egEZh8IrqWVEbuPLV8+EFTWMX37C+qtxQIxE/ssehqoYTtVWk2Z7nHDf4/rpJxR941J5bsjTn5i++WIYEWGIw6oPU86sV9kZc9lLvjg1AMT+qh+54m/HSrrLf164RCL0mw86f5HbRbi00DoXsx7z8QFswJmb+atwvGiIWAxFROkowJqL9eC+ReUeWqKJuiJtSvDsjMU1k8zmbWIvWunFg6aOd48bTcMMvfxpUDXfujqKw7+dT0B3E3oZqDegCwkAy62wuWWLzfPnoAjYsMHTO+MfL0ICKjgB+RVqaTpmp+i3CrBoCj7KlWje/ root@2c631327-158d-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJgGUOrtXYjFHNn68vFTnomGGN9jgJW2DWl0vGu3WOHPksWAo/AHYaFuFWEAWRA+A7KCWd9IezjChadcf6KaksUmXAov38zUSoYT5dEWJlaLMAE2EjB7pOlWLF1Fhs3wa5YH3GXTy1Kurvk/TL6MmOvOynR87q8lUex8mkLlEhGShpQPMmXTQAEPZBrTcDuDo7bryrrzPLLL7W1/8zywg7TSGOsQh3ADeD7jKcK+4vY0U260Nvyv0egjh+vkzbMzbWoWzNf75tK++TRX9MlkqvJPMW4h39t2IhBejAyAq1/7/5Waar3/UkmUmC3S6MI+tnebFOzBOS3CRqnYbQzgAN root@0786f7cf-15d9-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEE1VWuDF+Svn2J3/ZEm0FERMWVnTdwISGoA3YfwL3Qky//aN0QPq3XdrEQKhch1cKXqg+Lfdpc9x7wT3LaOzyuJb1p7fr+7dzEWZBsM3DX44DjxGIx32nWWqq4ghledah+5/Dapt2TkU01PDOjPffkIgLSa7qa/8eHov2UyoIAYQndn9EF2hbK8JoNCqVQN3ICNcJQmeOy/HazQEMvbvnfkEHG74aUS4dEyMsP+LYp1h8ZZnpQImMhHaZrKq0zsOaPEXj3o1G+J+9GMZ4B/0r4BecKEtNd/0Axn7yET50qs0FtQl/rpRMwULI6HbQh1IhWCOH/HcDJSw5JGVAKo6T root@2bde9439-22e2-11eb-bccb-526de22ef413\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2i7+LSce+KoRb6OU5DyFOCJsC+rkeNtGjUSylteLB275Fwj6STuJwaMmWSD4pK2H8enxOAJRfXR6vhQ2maNlUEKTrVfBNCfFdLiweASUFtjuB8LSksGMIzqFmrKIYVky+zPGqv8vylxs0XAtyoTRJgkQF9/5k26Tt/1TrTPLyip7mzthe1Z2V2WuGcbLp55+4ZErqtDJaVIuGC5F/IY6bABJciuAud5H0bqPGqcMlE4Ar0KiRcXl2A5M1f29bTo3MHxRmf72x9NOoXixQm//1ng3KY+u5GtVBzdLr5JSOY5sV3y7joNSLg3lOPIm45Qo3yYrGDQFAcI1WC12EvJF1 root@03bd04d6-5199-11eb-86b7-56818f023517\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDOZCtfOdry4BymnptatDF9LfJrE+qoqSLmFLV8i++AREwP/QPj5/Op04T2rS/ibBPfUcSjVJNaXckgV0PDZFKZVfeL1KBtXy+bY38FDl9h6ODSdmH0a66YZC1b8B5WpN/yuLGqr4fHvJmgB86VKfmW7i0+YVL8fLC6qRRIUO6y6BgrPewdNawtev5P4u/T+AT2HDeUGSsf3Q8OMNHO++ekA0WC/oaaWIhRYcaNa8S7VEU7+9PomAWiP/wMCaXS3TlQ1tCPHnWO/l87OiO8zFPk7cHH0Of/i5iDId7OtnHp0JY5GPu6++jlS7sm9lgaLphsIASrW3GMLwzDRrA79QXf root@3b27f826-5c8f-11eb-9ec6-4e9464752f0a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/fP/CtR/2WBQpgJkCXn/Z5U60tfeqyhdtjSHBMwVmoKXD0BlKo2HM7Jc3IH4kX/zrfRu4ndxgi3UB7RzjXM2tSlzP/jFfFSE06sKONmhh3gksCxj/p51ZU8/df8ExIUM6bBp0oz3yVLh3OX7JDk0eGWQ9YQ3g4Ak7tHDZJHF8v6qH4k2I2cbuloTgjekZvZW2Cztt4ugInWWVWO1VP1pWhQSx9++w0zSYQBLTrc1TXt8mRdR08UR0yFG6cDsXuxSS+TP0r1yiDPXBxczSCelb1KGUH45VuLJ8QTrM9KbP7EFqoqbFCJwLJadPGXwT6kTbXH5suTUVCSMsl0uDr/GZ root@c08d6270-6ed4-11eb-9500-fecae3290f4d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCz0aZSRt80eNyZ85nxNWSYHdfZG6JTALJgz3aUvyAn2NE5VYWzO6jzZlZp1kmdog7CqMeEzZPn7VD8rb5Y9hD6Ph8+h/6NV8eKWfcIovag7PJ/2ekbDnTzg0ENCTe7kmZX6FEc8Xry8F0e1GoGnMWLQsbC8orT58RI8Mm7abmuy+ogI1/5nY8fAfcllSqRqgsr9LjYecGIQWaCcUjrwlmtOskLUE16PS+jYNaB3Zo6zVjI5v9Syp1P7fF8lR0dMS1/lATKsca5IJ1ipoXDJdBWB11Q4GDpU4B4xj53CPHY0y1TSyN/CuBnrcS1pI5Ep2blzFz+6fSda0GnzOwC0Xsh root@fd8cb0de-7a16-11eb-a603-2218f636630c" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCa8IfabflaT3YXHN6zw99HnWJYk418To3wm9NH8poO2AcogajKaPit+DMDRqBjcZOqPZIJAgcWnM+YC97aMY40hN62uxIhrLT0m7E0/45IX8IDjpA6JDlbeFNItk5GT4Z0TzhFWA3JxmBkPaRfmc51eT/uNyYLab77hfCmfwsFEwOSu/jjMCThObwHMNaB08oSc2YxhApWmjyMP5leo0d0GqBvN/Vke0aFBXHtMrIfeKA01WkQ+fE2bc8Dp9xpY69JXok8oVyadsnSIDTjqZ4+bVYtA22gWBoJ6ktwB7CmOKAFbyH9IOQ5YMF5iApx+596p1SwZjl81jAUManRusHj root@2494de16-de26-11ea-8a0c-be937dd98cfb\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDOpUrk2lmtfuCxNpAFYbE5KekW4B3XBNBq1de4Xz/WMYa9jOHZJsNO+BEyxgu2VXhbKdrSHE6tAV7ryhjCmrisSU98K0fYkNjqE1DQgJhogBCk6Hm+cVN3OgDiGQiB34V846gYcSaqPQKJnttBh2zeQ3c2F1XkyrNwFB3/u7tppH3RpfwPQcjHqO9rUMbYrhELvFyLNjs3wvEL5EotgkjS0fGQvJ0QTKWotpehJ8d97I7wxgCxLGPQTusUU2bHsTBz2j+vB+6VVckSMXwzkPqY2zsyPyWdLWLX9lH/nYIAvOJvVDH2VKn/DKbSgp6iFfsOk9kjoWLKCu6KsfXvIjCF root@a01868a8-df09-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2JZxCgARfCvIQFMWBFMXCHGPIWdsDpiIuVtiAV/jvccDDne9WyiUqzYPEoKOiMxjZhA7s5MpimMY8PZoNeH9kq8KC5pcVaBOGVlUXiOSf0yqPMdbqLEhmYqcPe7EyA+ly8EYdK2T7uaMQiE3yy+3BTTBLIR25pWpvd3pX4ihu35wdu/ylbjKjkNIm+7/KAS2ChzrBwAsz1dp3dJgUJJr4N+bOCjzh4jPwzdEWOk9JkPPI/M+CLazjt6iVI2rnDX/ksDDWtSEWQoxb9NdRYsvwGAJjFfE98MAguAs/lSQGLlfLn/oeuV39xCCrr9gobG7ol8IOTOojNE/AsXwkYAr3 root@9b69c4f9-e935-11ea-aa1a-c6580c04344b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCjB8kJM1msnoBAxHjz+EyZ7wqQdSVoHUZ8dsCZyEqvffWJRNXvYRBN5R4SYqEpQLL+O7uFSu0+jvRhdcTA3GsgQ2vCppu/QlCiCdjGiCdFJhcVje5awpou0o+QAyZmWPZU2Sm9b+VZC8xObOUAchLKkr2BoRGI3tswLjED8dUGJs3aGY/k0DJfKfk32ttZoa0zWBWEZOgMJIhYFCSPlQPU/yIUh+yICFG2x3gqNNTX535o9b5TRPgmEzfMF5P6SaFEUsOtZLWnEP8FMFeE+MgUItvgt6L+gW9QB/Nws0XFECWffkqo1vZhzpCvOLJuE0zJt9jwYxM1TEj/ksIp3DIJ root@895c16b3-e9e6-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDcMS+XucUIHjWTV9JHQEAKtvBalzxcoEaIeNqTN1jL4M8eKcPf16P28BLk1/O+GL2LvIyZGxlkMJqKTSC6otBz+esaF522zgsM4pjLjV0inxrxX4Z8wzGZWMcHDuFyLpoG9w9ruRT3YGMVSyhquSYSrsdZ1LsnGfwXVH+rkKFAf1/x3maPGMrMTSikWO+5jskkdNSawK4McooVt5HKuDZaIM4EpPLtQbRZPjLfJLF5JK4uPtb6xL6voL+Fch7pKChZAITDf6XJnbU2qBpUR9BDhJXSzoCDzoa5DjzbwGxUUNfzse3Wv2FvCr0aLjNJCiXrU6835pMKSITaBqpZb4wH root@b76ac091-ef64-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDuA52BP77ehBU2np4ItgyDjc3VhI0Xzr0hBEWPjBPft8NuZGmNhRsRIEP2/O9TKafml3fMQnhVb7ISWj3l5rSoKB20xKviLc6Hovtp1QuUI30xcw9wQcLZS7rYo1NWAEN1BpSgUBOhsGuAkb71ExVxOnrxYKOFNi/Hc42ziFaLO0In1Eu7mLRv9SOWDiOWpq8U7eUUcgBtD6vJBKytFOA6f+j2TJVlKlhWk2NzzXM4PP1JrJGe0uM/YMqkmhew6omRQOOFEZ8QKf/YlvBadfwnkn2/c512B4Zf8JkjFP4mfoC3GFe4P82NYyxGfg3USwxTji5ChggkTCOUS8pSENdb root@fe9abbd2-f190-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJ+YNVEHWhQbkn0poLe/5jc+WQnn6RoGKDucZhFd8JllMI+dVGYNqNAQWJykTe5mZcxb84B1QPVEW2SulxcN4/qKpnH/OHVqcDPW1hxO93pHFasPOuTzRNYf1wIFP74lcPi/H1F5RvtAMrTCoI8yuiZYYyapc4AIt79OgMhPnM1zmQFvAQPx2G8QzO15cFdyMX+IOWS3RDggNWq8Nt8MeUg6B0t+x6PD96A5cIxZMrezybu1I/FgKatBtg91d89HE18+zVR9hnXyBtTDZ6MmEBqqH0yRWDFwe/ZuukTiUvMAnnhbkfRpe0AjggugjwIaOea+AT+3xxmovR22CqKe7p root@5ca9c8f3-f7d3-11ea-872a-bae3dc204648\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSYdhcotAUmA/RDRhFAB29ASCL8IcoVKTt2WNwJyfhuSZ5uIqdv6WRb/tXQ4prr6NeNkzrTSoIkzfkqrMoEUxdV319bVZYP4kWpCqDe47J0pJqkAmta0Wvd0gjiGOXIRGTYPabqEreUfcyrZGtOGXpsMRkhXwGxShIuLwpAkdYetbC3LGTcTLPIgGg02vE9wBOEdCYzwLB6alC3i51zIMuchVa+I+7peEbqlFLAR9OdDJtIAxs6cXMiVbfpHAlhd2q/pKBPxFkqw4jvsQZM4CelWW5XtRMhr56psuE4JK3M8iMd1jAvwCtl8KWBLjUa2rlH7XwnKri/JWiEXmM6NG9 root@7c2b051c-0b7a-11eb-82af-de22b9665164\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCvF0wQIdhn8puO+H+ra1zxtyIpe83egEZh8IrqWVEbuPLV8+EFTWMX37C+qtxQIxE/ssehqoYTtVWk2Z7nHDf4/rpJxR941J5bsjTn5i++WIYEWGIw6oPU86sV9kZc9lLvjg1AMT+qh+54m/HSrrLf164RCL0mw86f5HbRbi00DoXsx7z8QFswJmb+atwvGiIWAxFROkowJqL9eC+ReUeWqKJuiJtSvDsjMU1k8zmbWIvWunFg6aOd48bTcMMvfxpUDXfujqKw7+dT0B3E3oZqDegCwkAy62wuWWLzfPnoAjYsMHTO+MfL0ICKjgB+RVqaTpmp+i3CrBoCj7KlWje/ root@2c631327-158d-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJgGUOrtXYjFHNn68vFTnomGGN9jgJW2DWl0vGu3WOHPksWAo/AHYaFuFWEAWRA+A7KCWd9IezjChadcf6KaksUmXAov38zUSoYT5dEWJlaLMAE2EjB7pOlWLF1Fhs3wa5YH3GXTy1Kurvk/TL6MmOvOynR87q8lUex8mkLlEhGShpQPMmXTQAEPZBrTcDuDo7bryrrzPLLL7W1/8zywg7TSGOsQh3ADeD7jKcK+4vY0U260Nvyv0egjh+vkzbMzbWoWzNf75tK++TRX9MlkqvJPMW4h39t2IhBejAyAq1/7/5Waar3/UkmUmC3S6MI+tnebFOzBOS3CRqnYbQzgAN root@0786f7cf-15d9-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEE1VWuDF+Svn2J3/ZEm0FERMWVnTdwISGoA3YfwL3Qky//aN0QPq3XdrEQKhch1cKXqg+Lfdpc9x7wT3LaOzyuJb1p7fr+7dzEWZBsM3DX44DjxGIx32nWWqq4ghledah+5/Dapt2TkU01PDOjPffkIgLSa7qa/8eHov2UyoIAYQndn9EF2hbK8JoNCqVQN3ICNcJQmeOy/HazQEMvbvnfkEHG74aUS4dEyMsP+LYp1h8ZZnpQImMhHaZrKq0zsOaPEXj3o1G+J+9GMZ4B/0r4BecKEtNd/0Axn7yET50qs0FtQl/rpRMwULI6HbQh1IhWCOH/HcDJSw5JGVAKo6T root@2bde9439-22e2-11eb-bccb-526de22ef413\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2i7+LSce+KoRb6OU5DyFOCJsC+rkeNtGjUSylteLB275Fwj6STuJwaMmWSD4pK2H8enxOAJRfXR6vhQ2maNlUEKTrVfBNCfFdLiweASUFtjuB8LSksGMIzqFmrKIYVky+zPGqv8vylxs0XAtyoTRJgkQF9/5k26Tt/1TrTPLyip7mzthe1Z2V2WuGcbLp55+4ZErqtDJaVIuGC5F/IY6bABJciuAud5H0bqPGqcMlE4Ar0KiRcXl2A5M1f29bTo3MHxRmf72x9NOoXixQm//1ng3KY+u5GtVBzdLr5JSOY5sV3y7joNSLg3lOPIm45Qo3yYrGDQFAcI1WC12EvJF1 root@03bd04d6-5199-11eb-86b7-56818f023517\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDOZCtfOdry4BymnptatDF9LfJrE+qoqSLmFLV8i++AREwP/QPj5/Op04T2rS/ibBPfUcSjVJNaXckgV0PDZFKZVfeL1KBtXy+bY38FDl9h6ODSdmH0a66YZC1b8B5WpN/yuLGqr4fHvJmgB86VKfmW7i0+YVL8fLC6qRRIUO6y6BgrPewdNawtev5P4u/T+AT2HDeUGSsf3Q8OMNHO++ekA0WC/oaaWIhRYcaNa8S7VEU7+9PomAWiP/wMCaXS3TlQ1tCPHnWO/l87OiO8zFPk7cHH0Of/i5iDId7OtnHp0JY5GPu6++jlS7sm9lgaLphsIASrW3GMLwzDRrA79QXf root@3b27f826-5c8f-11eb-9ec6-4e9464752f0a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/fP/CtR/2WBQpgJkCXn/Z5U60tfeqyhdtjSHBMwVmoKXD0BlKo2HM7Jc3IH4kX/zrfRu4ndxgi3UB7RzjXM2tSlzP/jFfFSE06sKONmhh3gksCxj/p51ZU8/df8ExIUM6bBp0oz3yVLh3OX7JDk0eGWQ9YQ3g4Ak7tHDZJHF8v6qH4k2I2cbuloTgjekZvZW2Cztt4ugInWWVWO1VP1pWhQSx9++w0zSYQBLTrc1TXt8mRdR08UR0yFG6cDsXuxSS+TP0r1yiDPXBxczSCelb1KGUH45VuLJ8QTrM9KbP7EFqoqbFCJwLJadPGXwT6kTbXH5suTUVCSMsl0uDr/GZ root@c08d6270-6ed4-11eb-9500-fecae3290f4d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCz0aZSRt80eNyZ85nxNWSYHdfZG6JTALJgz3aUvyAn2NE5VYWzO6jzZlZp1kmdog7CqMeEzZPn7VD8rb5Y9hD6Ph8+h/6NV8eKWfcIovag7PJ/2ekbDnTzg0ENCTe7kmZX6FEc8Xry8F0e1GoGnMWLQsbC8orT58RI8Mm7abmuy+ogI1/5nY8fAfcllSqRqgsr9LjYecGIQWaCcUjrwlmtOskLUE16PS+jYNaB3Zo6zVjI5v9Syp1P7fF8lR0dMS1/lATKsca5IJ1ipoXDJdBWB11Q4GDpU4B4xj53CPHY0y1TSyN/CuBnrcS1pI5Ep2blzFz+6fSda0GnzOwC0Xsh root@fd8cb0de-7a16-11eb-a603-2218f636630c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC4ytKBahKDZ112nsAR8DTAX63pBJ4s4O/PX345S7R2u0kZuZJNYW7FD/DKs2BQhUpq5SFsj00L5n8wsd6JnCEV1PmaVon8jgH9lbWCMitWVhmLgRaMB+iC3CW4KpWcKx3E9JI+gbC/L6F+PrtP5fbyChDXxHkZeweJbeoNYD/e74A9upYgrJjEcxTg/5q5sM/himzvmeBJiJs+gOy0tZcecI69zAZlvKVs8b++TfX+mitT7qERKpuT8byrYon/+TtYWUieVCjGNIyMfy4gytY4Mwzv/+L1bGazE2ojlBlcTuNIXjm04M9az46x2NSTfOmCqvbDdgOdNTbdDnbdL5kv root@f60df912-7c73-11eb-b5fa-bafb05f6310a" } ], "kind": "compute#metadata" diff --git a/audit/projects/k8s-infra-e2e-boskos-116/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-116/services/compute/project-info.json index 2f7b32329817..7fd1f2ab3908 100644 --- a/audit/projects/k8s-infra-e2e-boskos-116/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-116/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDI29iHeZBIrrIqznSVxzsi9ilzsySHdc61iLhTNMkajyqeySrxlF93ayJ0NKM4LOTkCL2k/VBKMBwe3dZ/tcralaWdTHmeQT4c5UUrSfm62At7dS0nGm3XqGFvtD9PIRue67Loj4FTAGl5NepNrNmWGW1h6xSUj6MUNRIV3OsYmrx7jICJLKUg43X67z9VQTzlaJcyfBR1r3bP8gGlExrI2Uoy79sekqkQkDGIDvMneL1XdB4AIQhAdBv1nzZcJrstRA9YMCDDa3JcF1Po14V6x1sWVC96Um4XLkh1NiXjI7+1Jgv+A00gpYrhtKfDBIzKeUBurOp3uORRoqgSYfCp root@6dabaa92-de3f-11ea-8a0c-be937dd98cfb\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDVy67xVcTQkzCA1HCaQMat48fgl91NJn6XZ3fr9ClxnKyA6cOz5/oVbdnXy629efBYbolHML0fhx95XeeNDWgEMZsW8h5TJCoUG2V5h3hbv0KSldMIwYlXQQieMdbgttdy2UFATfypQBZKPYzBnRoRcRi2ijigC+EJjWHqVVWlqZn/wj+27FBUEBGu2G2mLQ0f/KrBnaxCHSJTeQxnTpY4FOgBKVebGtudolRcV6GgCNyCqIRSR65OxJauR3aPBneWRRY7y9MAmGi+5jmAFLfRbou0CqenF5TmGzXFByQ5wfJdLPvBy0Why7gHhRFziLueZny6yZEj7dqp+A6yKQVr root@c51e7a37-debd-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJnwmx8B5KE55mQuSMbD1MgHgf+1h9o7qgt4cbreSctFq/SGks8xcQO05+htlNmRpHqH7GRnYhzFkb5apzwUPeGX3Xzr+R7JwKxpY3TWXI8gtI3lMUyoAnP+BSxDaJ00daXi78ylpe0eBv/4bjEBw1zjjWE6c0sQqdrWRgpPc8W9MiUdC0LF//tVyCdWTmnu978yaof6XqZrSUaqp/3G59PQWjV+si3UlZ7/nAc0WsQazj8BUpyoFNHckniKbfC4+xKxMggYpLTv/fhoxDg+vs+iHdKR49yyUABbS/lT77HEciJLXw6ife3A9g6JhPkMvOwKz9EhcDlWnsG94vhdil root@e7e33a51-e084-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC78wNTIAE5/isLHdK7ez6z4xXFjOecN1ueLyU/xwNknHSoyU1IKmX1NQUNmr7Zw9BxkvdCb+qrT651PlDNbYlRsZ863+klG2DdElesWcmaejUcUpzLqazMylacCBTzI5d7lmL5fgwZfAvKAoTTnSOD1fFmcdcGxtfLJZu2EVLB3pwWktXVvGr5RMayt8TUPLMNm8of1wmIB1Am7bR9V4O1jc8aYdpMqMQAzFWEtS3r5rYIlV4rGjkqgx1yurOq0NEpBWapy8oMLDiWK/9PTBhRDkwtwv6m2w+dyjDv2XXKORWUgioACbWrSWl8gDsetlk21eGWvOjEkC+FFQqkhqaP root@dff0bbbb-ed28-11ea-aebe-3e85ddc86bf2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDPcB2bIL1KBRVCEmA2QQUqnZWqYlrMOd6b/e8orx1TmjNaSzDvq6MHsNDqB8hGbjFkBOJ29rV4kx6r4ZsVDXIF3G/s/U8dkpHDT5Sk9TwO76Wu09QE3HAD87IWp1m2tgm1jsCtzABSbAXkd/G26VEHWxdVqg9nzBg4IEWJFwDf5xromhgHoWG89SYZ8rWRF9/WRTe4sOZJ/rlB1N+ewnTn3GSFITfaN/9tn6fB+6otXRlWXrNR5fW7/jAic7V8Ojmu1TSkUpEXvpjITvvs9MtFxA70yAaxrZMVhn3Kq9GkLqFF1kg14ls7qqJqUdv+QwcDW6x4/zlponnguj5XWwHx root@1ae5bd84-f658-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBFS8QQjQeW8dsgYF1XFmKHCWYNfkGBkPcLuUewMrIRshAt1LvWsUSEOY5oVlDFzZwbssB5BCvvGpMRcbK9nOmAUS9nd/sHs+AZKxI8qxIVTrEJz/LumTtGBsVDI8ibSXHLKL88RHKF8Wq9XAGm0EGEa5gNqlLmVqDAK969n+EbEz6cKSguwbqrL8einP+0xnXD3hkJUJ2hZe2jSp8OFOq0CJmwkrfn2OqwfGSkLNdwPfM/HNWzC9Bughi/CEUSuupkWxN4n+Uw27O3KZEHbcO18sgx04ET0HgsvQ4MR4II2O/WCOlTwU+hwn4/5cv4pga6YoSVxoEuah1juTB00M/ root@a63f1922-f7ec-11ea-872a-bae3dc204648\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQChYCD64/cGt++o/hyBQyZhQnn25YbJf8cOT5uQ7DrR7OEBC9bqXUbXJIcUiWzapZGg8p4nAwy5dIJbR810vnPwUrrRcX3mlSbno2qL2zcYkT3NNqB3KPqYzBChcGTkCoPmwVr3zJQRdr/J3QzjNvBa0mlOs44Gejt97Z04mlC1qfOWBqHsoHAd9uPbCLQz4KXnt53MfyVu5keabZsTLKuhUNjv2IXdys19dPZumwHEseFqVbBR9tH3cioAItJhc6u9uqDyjyppCJqaGWsW6BnG6+sd9YETr9jav9MWfbzzSsDSxV3DMYVwrHsB2+98f3O8JFqYWvC8Gt38DLEUfsgN root@c497e9d7-fa18-11ea-9c73-86173d37727b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZ/MWusRocproeYXzwBBwj4J1KKnoEu/1j7lC7qWMOVsenNKenl2H19OBw0otVk0SjsYupC5NdhYQWx7+MBfsyYWX/57YNEDiEtbZFjvnOQigBEcB3qmOSs38v1e4jPO48zWyK4EKLLJkYhPGk+5DQVelcMi8aaCMmudOLrYe3frSEXKiGQoDJkGE707704o2905F9mxJmDknaHrSwTYXjgXXO7qj6VVuQu5hYAmCQdf/j5jf4a8yjI9Sr3z5EbjVo/kj2NgjsL8oX1DKpi+5u1dyI+fPL+kZNbxkGspNd38QI0XItUq0FPLIcuhWKKSVUgJgEVdtjT+XLo584o0Qj root@1dc901ca-0e25-11eb-9c65-0a69ced3f66e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCv0/cLh/mIydJ/fd0bS+qIEV/n7VFpDgxcHoS72H+xbEygTl2SW/8znbx8ijeXu4HGEuv3IbyZG0IYYFHJwA/0G739/eSi2dGdabJF5px5R+xUdYSTq+E1nUBeWllIISKRij9DccGDSTqCyUOy36XEB24c9NCVoYhs77gcWPImIO/ljCPWUejo9oDEScaGYCpvDrRkxUv1X0Vq4ckzeTs7SAs5HKdlcwGrdjzPa2/83YhBV7yJVC0KoVeWrO2Y5MD1CgRO/DczELY8oNo4j5Y7D/WEyNapooxGdUAzfN7/GarENQnjQ7GJQF6J8BW0FNISYPz8R4t+39a4ttgNgyOF root@976ceef0-3527-11eb-9896-aabf0c108015\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+5revjOE8mHzSSTf1elH9NpgS10s55dUwk+U/n8/AUd1NlQDmYU7O9zkz6dF5VWH5MU3umL8P8+y6R0UebCWJ1G9s0/qLPv3RDcVBIVy6k4cNLjBup1FL5X3uABRuMQOGABnthpHkeU/yIT0mOEALSljJxG7pxm+iIx/nD9lTP0/BdTG1fHSk1Np9Dv9D181ofkyrxIGmXReovVrLBD47MfqaqT40LHeFl1hHR2BKd2esaku1YaNVppz2Gb6Pt2OmvGNCA8ETbnxUfiX74tEfdF6w+PI7zzR3IWaeHnIBWSDG2fLhCalFukgRVKRm0UqGk0yxyVAiFYoIaC0/J2jl root@3c5caee9-3670-11eb-a25d-22a534811c55\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9RRODFCtX+zlJM3wAyeu6u3QBPNb+5IUhOzZzL83IsPR+m+GNZFHtxkCDpnEvsPz3ovmlxprIrqH6iucWwDxzYK2gGbXk3xkvbw8SxOZB9rdzuYk7Dcvkz7kEkz9hAqQvRSsImHxvTCcZYKXxmefECoBdiq56YihqSv7Ki2btbMvYWFvPVyThElAG6Q3rCAeDUS9T3ccRE5G1DYftF0H0snKX5F3NSUMb34K8CFYtqdsmHRei82srepsa5fRjkpe4r+bkpO68q9G3DWazeDY7Fu9qIJ2zLMyk/vu0bID0FCFmzeIStKgANDDAMem+BWCy1jD/XVCji1sS4qT8BczH root@8ff64f20-448f-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDfSQq56IxDi7T+aDCK75c0HfEq3gx4g4EvIUm9Q54MnGh5dpQRZUMIGN1HZll9Ye/AYYjVbAmwxDbogMoXEJtq8SdU92TEjwhnwHWoBupWwSRgOfTReh3cpoXLEHz/BW1eaRtew5r5BzP7Zuq0Whky4+D/TLCjDO96HVIv5FqwyfWO/ANH9IHNCnQoIl+8dNZlH9rZjS6Sll0vmXevwh/vfogG2pkkXo+3JCzm/rUaj2hqOA9D+c49VADD4ZdYTiu4T/+tf8KNZfU8zFq1nFw+xlOjJVuYiGw2TdbrXA70+0DEUoUlN+jqzfdK+pENZvAFYKtjYvi0vtDy8CeqMcbt root@cd3d02ab-4a30-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDXdhrAKbOksf9pVOl9/IOFR1QEUJya3GrYKR4RHcbfe2FYcEhtdd78/B0KP/R/4dQA09KSicoCtKjcQGnL6x/jE4XzwuoeWkQpgFrZtUT/hg8sCuq3AWOxVI7I4RAWX6iCyIoBWct2wdV/952lUlvs5TxTN3TutXz0f5xoH40CdT207I6oufcg8qdeOKBPlYqKCp/GW1436TazVA2rFGwq0SACFuM5goSS2TpANclxxJK+HCYOBpZUW99W4b0bJfHlqbd2M7wdWNDb56Na4PEUynBcTYp1SRxQ0Aznra8gOF5ZgqeYDwhRCQLPyBiY8XrkhyBNrTM2FZSQ2gU1NJjb root@bb0f9907-517f-11eb-86b7-56818f023517\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDs0wIo+uxUEuiIO1DRKA58UHT7Gjx8dp1Eh1iofZL6EjsfzJPZnO2Ddqj9bv4gsq9RPdfU6euHXvXUzMH6awXDojKvJILsjio7eMz9RE0Y6o3qSdRyz/pyl2htrBuDddUMx1w17GjNdTvIVIEgJzta1xJJupbXxDyWP+9n5yOJZ7jg87ugPMTIyOB/+AA3WcSwxbubitdjlr4LWgV9MTZJKz7FCDiuDlCqRvWc03ULGv7bITqSxnOK6OQYVYRJzPWW+zO95Rzud0sNXr1Oz4CaD2qPfHkvrwm+fGLY3IFTstOuTIxS36zZJoevuQvz509oUVbwFzTnt6qI6kDxu9Th root@9c61d1cb-5dbe-11eb-ae8c-a2b7430778f5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDRNoInpk34wY9MJCak6kt8oJN0wTaGYwCR5aILs41wBM5OeLm5J0ovc/y1hb41OmGaMFM3IwUt2de1Uv/SgGBmxEKuP6LZV0NPxWp22fxyNRzGsxqUt16Sf7DieTJPPQt+NzS/oUMqGFGZQfWgGgQlzJbjJjwZlOi4tyoHz/tIKn20fIAYUBLOoA0MLt63SZhuoGGnKtY8ZOoGPxu1eW8BNWAX65WJg8yHUHanGkOaUS6rUcjctDxnK5+gRwKdKx3SPUvadVwHLKOT4hnDrSNXPT+fHBXAYvq4GtEvQFG0jw+otaRhgUs+3u3E6Z13g9+HWCwD1OGHxowqZY3WkOrP root@f99843b8-63c4-11eb-af4a-7eb1b39743c0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC12snUwHBeZlsyUGdgnVLjrqVSs/e4Gso5LC2u/TDAzy0nD02Fd76V7lam9B0VHH2Zd8CJPcYkHrwuqJYCffS8nFiiRQJPNVH1qeKUCSeheBGrPRDtkh0qG3SSmwsQIG2RsU0Fkk7RhaBYpRQU7XpLC/wyqD0TeDiZkqbdV9NriXJV763aQv5XCwYg2w4am+MwCeLpAw7+JZr0WRag8910kbjMKToYwpMV0DpoaJ5cNB4YsMZP532gpEmot7i6wqYiQsDg9uRfzfeXcnN/I8PHHfhY4t0r6rh8nLe6jv52EBb1vL2tCdijiRLERzNQ0n+kqa5PZjnnocaRE17RdnEJ root@ca49fa1d-6a49-11eb-b0f2-e2ce0c220244\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCyn72cOIvTgE+lvYp63Ep1D1QlJK9rxV8WcyA+RtzCVg0gOBE31WwyOVUxag6tyVWYlkpm8ZgdXN5KXaD2MfmUrcz8GZC7sVAZxo3oO6/0ztIsLhC4GB+uzlm2x2S1ECqXhg9WpD2+nD489+pR4YtLl4j7mZZuGEiAnnyGPJElnO9/jdiXlxF9NcBwdJlzTajA3qw0ZBc9gWcIGL47Kw/SQNjWpZfce1SA9d/q4qR21qB9ZCif1X1y7fs3mXU3L80k4azi5XA8jVDoZingrDAuYVD/lEZcwtjHPmRaOOE1wiCSuPUCHHAOspS5aqajwxCrw538EuNHHMT7zypc0R0d root@08e2b1cb-7a15-11eb-a603-2218f636630c" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDI29iHeZBIrrIqznSVxzsi9ilzsySHdc61iLhTNMkajyqeySrxlF93ayJ0NKM4LOTkCL2k/VBKMBwe3dZ/tcralaWdTHmeQT4c5UUrSfm62At7dS0nGm3XqGFvtD9PIRue67Loj4FTAGl5NepNrNmWGW1h6xSUj6MUNRIV3OsYmrx7jICJLKUg43X67z9VQTzlaJcyfBR1r3bP8gGlExrI2Uoy79sekqkQkDGIDvMneL1XdB4AIQhAdBv1nzZcJrstRA9YMCDDa3JcF1Po14V6x1sWVC96Um4XLkh1NiXjI7+1Jgv+A00gpYrhtKfDBIzKeUBurOp3uORRoqgSYfCp root@6dabaa92-de3f-11ea-8a0c-be937dd98cfb\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDVy67xVcTQkzCA1HCaQMat48fgl91NJn6XZ3fr9ClxnKyA6cOz5/oVbdnXy629efBYbolHML0fhx95XeeNDWgEMZsW8h5TJCoUG2V5h3hbv0KSldMIwYlXQQieMdbgttdy2UFATfypQBZKPYzBnRoRcRi2ijigC+EJjWHqVVWlqZn/wj+27FBUEBGu2G2mLQ0f/KrBnaxCHSJTeQxnTpY4FOgBKVebGtudolRcV6GgCNyCqIRSR65OxJauR3aPBneWRRY7y9MAmGi+5jmAFLfRbou0CqenF5TmGzXFByQ5wfJdLPvBy0Why7gHhRFziLueZny6yZEj7dqp+A6yKQVr root@c51e7a37-debd-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJnwmx8B5KE55mQuSMbD1MgHgf+1h9o7qgt4cbreSctFq/SGks8xcQO05+htlNmRpHqH7GRnYhzFkb5apzwUPeGX3Xzr+R7JwKxpY3TWXI8gtI3lMUyoAnP+BSxDaJ00daXi78ylpe0eBv/4bjEBw1zjjWE6c0sQqdrWRgpPc8W9MiUdC0LF//tVyCdWTmnu978yaof6XqZrSUaqp/3G59PQWjV+si3UlZ7/nAc0WsQazj8BUpyoFNHckniKbfC4+xKxMggYpLTv/fhoxDg+vs+iHdKR49yyUABbS/lT77HEciJLXw6ife3A9g6JhPkMvOwKz9EhcDlWnsG94vhdil root@e7e33a51-e084-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC78wNTIAE5/isLHdK7ez6z4xXFjOecN1ueLyU/xwNknHSoyU1IKmX1NQUNmr7Zw9BxkvdCb+qrT651PlDNbYlRsZ863+klG2DdElesWcmaejUcUpzLqazMylacCBTzI5d7lmL5fgwZfAvKAoTTnSOD1fFmcdcGxtfLJZu2EVLB3pwWktXVvGr5RMayt8TUPLMNm8of1wmIB1Am7bR9V4O1jc8aYdpMqMQAzFWEtS3r5rYIlV4rGjkqgx1yurOq0NEpBWapy8oMLDiWK/9PTBhRDkwtwv6m2w+dyjDv2XXKORWUgioACbWrSWl8gDsetlk21eGWvOjEkC+FFQqkhqaP root@dff0bbbb-ed28-11ea-aebe-3e85ddc86bf2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDPcB2bIL1KBRVCEmA2QQUqnZWqYlrMOd6b/e8orx1TmjNaSzDvq6MHsNDqB8hGbjFkBOJ29rV4kx6r4ZsVDXIF3G/s/U8dkpHDT5Sk9TwO76Wu09QE3HAD87IWp1m2tgm1jsCtzABSbAXkd/G26VEHWxdVqg9nzBg4IEWJFwDf5xromhgHoWG89SYZ8rWRF9/WRTe4sOZJ/rlB1N+ewnTn3GSFITfaN/9tn6fB+6otXRlWXrNR5fW7/jAic7V8Ojmu1TSkUpEXvpjITvvs9MtFxA70yAaxrZMVhn3Kq9GkLqFF1kg14ls7qqJqUdv+QwcDW6x4/zlponnguj5XWwHx root@1ae5bd84-f658-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBFS8QQjQeW8dsgYF1XFmKHCWYNfkGBkPcLuUewMrIRshAt1LvWsUSEOY5oVlDFzZwbssB5BCvvGpMRcbK9nOmAUS9nd/sHs+AZKxI8qxIVTrEJz/LumTtGBsVDI8ibSXHLKL88RHKF8Wq9XAGm0EGEa5gNqlLmVqDAK969n+EbEz6cKSguwbqrL8einP+0xnXD3hkJUJ2hZe2jSp8OFOq0CJmwkrfn2OqwfGSkLNdwPfM/HNWzC9Bughi/CEUSuupkWxN4n+Uw27O3KZEHbcO18sgx04ET0HgsvQ4MR4II2O/WCOlTwU+hwn4/5cv4pga6YoSVxoEuah1juTB00M/ root@a63f1922-f7ec-11ea-872a-bae3dc204648\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQChYCD64/cGt++o/hyBQyZhQnn25YbJf8cOT5uQ7DrR7OEBC9bqXUbXJIcUiWzapZGg8p4nAwy5dIJbR810vnPwUrrRcX3mlSbno2qL2zcYkT3NNqB3KPqYzBChcGTkCoPmwVr3zJQRdr/J3QzjNvBa0mlOs44Gejt97Z04mlC1qfOWBqHsoHAd9uPbCLQz4KXnt53MfyVu5keabZsTLKuhUNjv2IXdys19dPZumwHEseFqVbBR9tH3cioAItJhc6u9uqDyjyppCJqaGWsW6BnG6+sd9YETr9jav9MWfbzzSsDSxV3DMYVwrHsB2+98f3O8JFqYWvC8Gt38DLEUfsgN root@c497e9d7-fa18-11ea-9c73-86173d37727b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZ/MWusRocproeYXzwBBwj4J1KKnoEu/1j7lC7qWMOVsenNKenl2H19OBw0otVk0SjsYupC5NdhYQWx7+MBfsyYWX/57YNEDiEtbZFjvnOQigBEcB3qmOSs38v1e4jPO48zWyK4EKLLJkYhPGk+5DQVelcMi8aaCMmudOLrYe3frSEXKiGQoDJkGE707704o2905F9mxJmDknaHrSwTYXjgXXO7qj6VVuQu5hYAmCQdf/j5jf4a8yjI9Sr3z5EbjVo/kj2NgjsL8oX1DKpi+5u1dyI+fPL+kZNbxkGspNd38QI0XItUq0FPLIcuhWKKSVUgJgEVdtjT+XLo584o0Qj root@1dc901ca-0e25-11eb-9c65-0a69ced3f66e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCv0/cLh/mIydJ/fd0bS+qIEV/n7VFpDgxcHoS72H+xbEygTl2SW/8znbx8ijeXu4HGEuv3IbyZG0IYYFHJwA/0G739/eSi2dGdabJF5px5R+xUdYSTq+E1nUBeWllIISKRij9DccGDSTqCyUOy36XEB24c9NCVoYhs77gcWPImIO/ljCPWUejo9oDEScaGYCpvDrRkxUv1X0Vq4ckzeTs7SAs5HKdlcwGrdjzPa2/83YhBV7yJVC0KoVeWrO2Y5MD1CgRO/DczELY8oNo4j5Y7D/WEyNapooxGdUAzfN7/GarENQnjQ7GJQF6J8BW0FNISYPz8R4t+39a4ttgNgyOF root@976ceef0-3527-11eb-9896-aabf0c108015\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+5revjOE8mHzSSTf1elH9NpgS10s55dUwk+U/n8/AUd1NlQDmYU7O9zkz6dF5VWH5MU3umL8P8+y6R0UebCWJ1G9s0/qLPv3RDcVBIVy6k4cNLjBup1FL5X3uABRuMQOGABnthpHkeU/yIT0mOEALSljJxG7pxm+iIx/nD9lTP0/BdTG1fHSk1Np9Dv9D181ofkyrxIGmXReovVrLBD47MfqaqT40LHeFl1hHR2BKd2esaku1YaNVppz2Gb6Pt2OmvGNCA8ETbnxUfiX74tEfdF6w+PI7zzR3IWaeHnIBWSDG2fLhCalFukgRVKRm0UqGk0yxyVAiFYoIaC0/J2jl root@3c5caee9-3670-11eb-a25d-22a534811c55\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9RRODFCtX+zlJM3wAyeu6u3QBPNb+5IUhOzZzL83IsPR+m+GNZFHtxkCDpnEvsPz3ovmlxprIrqH6iucWwDxzYK2gGbXk3xkvbw8SxOZB9rdzuYk7Dcvkz7kEkz9hAqQvRSsImHxvTCcZYKXxmefECoBdiq56YihqSv7Ki2btbMvYWFvPVyThElAG6Q3rCAeDUS9T3ccRE5G1DYftF0H0snKX5F3NSUMb34K8CFYtqdsmHRei82srepsa5fRjkpe4r+bkpO68q9G3DWazeDY7Fu9qIJ2zLMyk/vu0bID0FCFmzeIStKgANDDAMem+BWCy1jD/XVCji1sS4qT8BczH root@8ff64f20-448f-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDfSQq56IxDi7T+aDCK75c0HfEq3gx4g4EvIUm9Q54MnGh5dpQRZUMIGN1HZll9Ye/AYYjVbAmwxDbogMoXEJtq8SdU92TEjwhnwHWoBupWwSRgOfTReh3cpoXLEHz/BW1eaRtew5r5BzP7Zuq0Whky4+D/TLCjDO96HVIv5FqwyfWO/ANH9IHNCnQoIl+8dNZlH9rZjS6Sll0vmXevwh/vfogG2pkkXo+3JCzm/rUaj2hqOA9D+c49VADD4ZdYTiu4T/+tf8KNZfU8zFq1nFw+xlOjJVuYiGw2TdbrXA70+0DEUoUlN+jqzfdK+pENZvAFYKtjYvi0vtDy8CeqMcbt root@cd3d02ab-4a30-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDXdhrAKbOksf9pVOl9/IOFR1QEUJya3GrYKR4RHcbfe2FYcEhtdd78/B0KP/R/4dQA09KSicoCtKjcQGnL6x/jE4XzwuoeWkQpgFrZtUT/hg8sCuq3AWOxVI7I4RAWX6iCyIoBWct2wdV/952lUlvs5TxTN3TutXz0f5xoH40CdT207I6oufcg8qdeOKBPlYqKCp/GW1436TazVA2rFGwq0SACFuM5goSS2TpANclxxJK+HCYOBpZUW99W4b0bJfHlqbd2M7wdWNDb56Na4PEUynBcTYp1SRxQ0Aznra8gOF5ZgqeYDwhRCQLPyBiY8XrkhyBNrTM2FZSQ2gU1NJjb root@bb0f9907-517f-11eb-86b7-56818f023517\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDs0wIo+uxUEuiIO1DRKA58UHT7Gjx8dp1Eh1iofZL6EjsfzJPZnO2Ddqj9bv4gsq9RPdfU6euHXvXUzMH6awXDojKvJILsjio7eMz9RE0Y6o3qSdRyz/pyl2htrBuDddUMx1w17GjNdTvIVIEgJzta1xJJupbXxDyWP+9n5yOJZ7jg87ugPMTIyOB/+AA3WcSwxbubitdjlr4LWgV9MTZJKz7FCDiuDlCqRvWc03ULGv7bITqSxnOK6OQYVYRJzPWW+zO95Rzud0sNXr1Oz4CaD2qPfHkvrwm+fGLY3IFTstOuTIxS36zZJoevuQvz509oUVbwFzTnt6qI6kDxu9Th root@9c61d1cb-5dbe-11eb-ae8c-a2b7430778f5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDRNoInpk34wY9MJCak6kt8oJN0wTaGYwCR5aILs41wBM5OeLm5J0ovc/y1hb41OmGaMFM3IwUt2de1Uv/SgGBmxEKuP6LZV0NPxWp22fxyNRzGsxqUt16Sf7DieTJPPQt+NzS/oUMqGFGZQfWgGgQlzJbjJjwZlOi4tyoHz/tIKn20fIAYUBLOoA0MLt63SZhuoGGnKtY8ZOoGPxu1eW8BNWAX65WJg8yHUHanGkOaUS6rUcjctDxnK5+gRwKdKx3SPUvadVwHLKOT4hnDrSNXPT+fHBXAYvq4GtEvQFG0jw+otaRhgUs+3u3E6Z13g9+HWCwD1OGHxowqZY3WkOrP root@f99843b8-63c4-11eb-af4a-7eb1b39743c0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC12snUwHBeZlsyUGdgnVLjrqVSs/e4Gso5LC2u/TDAzy0nD02Fd76V7lam9B0VHH2Zd8CJPcYkHrwuqJYCffS8nFiiRQJPNVH1qeKUCSeheBGrPRDtkh0qG3SSmwsQIG2RsU0Fkk7RhaBYpRQU7XpLC/wyqD0TeDiZkqbdV9NriXJV763aQv5XCwYg2w4am+MwCeLpAw7+JZr0WRag8910kbjMKToYwpMV0DpoaJ5cNB4YsMZP532gpEmot7i6wqYiQsDg9uRfzfeXcnN/I8PHHfhY4t0r6rh8nLe6jv52EBb1vL2tCdijiRLERzNQ0n+kqa5PZjnnocaRE17RdnEJ root@ca49fa1d-6a49-11eb-b0f2-e2ce0c220244\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCyn72cOIvTgE+lvYp63Ep1D1QlJK9rxV8WcyA+RtzCVg0gOBE31WwyOVUxag6tyVWYlkpm8ZgdXN5KXaD2MfmUrcz8GZC7sVAZxo3oO6/0ztIsLhC4GB+uzlm2x2S1ECqXhg9WpD2+nD489+pR4YtLl4j7mZZuGEiAnnyGPJElnO9/jdiXlxF9NcBwdJlzTajA3qw0ZBc9gWcIGL47Kw/SQNjWpZfce1SA9d/q4qR21qB9ZCif1X1y7fs3mXU3L80k4azi5XA8jVDoZingrDAuYVD/lEZcwtjHPmRaOOE1wiCSuPUCHHAOspS5aqajwxCrw538EuNHHMT7zypc0R0d root@08e2b1cb-7a15-11eb-a603-2218f636630c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDpE4e5+Po2nu1TVGEM8nsjr4l7OC7jqagPIJ2tcFVjzs/iZFhgvut6DuFhUOILGYFt2mOWNgTC2zQjxkJoBIAAntOp7G0qCYW0Io/XDFS5dL3EiK26JZ6H+xlbqxLc55uicrG/MyPlTeLk5mzy2qVw9+LvPCjj1u2IvJvih1n4UZImN7cBR9e+mLqlGe6h5jKE5oj3pkZNbr7p5lThLnz7yYVI5bbsB37qgJF15U6NLIQYnWzRJq5W8++TbHyYRSu4JcZUe7PNUvOT9OwBAgLGcbAkjfRQutll1jdVtyANYg4TfmFLLCgzAJ6zxrMSqkn+HU69Pvt3lHmMcgHC7MjH root@a05984e7-7c5c-11eb-b5fa-bafb05f6310a" } ], "kind": "compute#metadata" diff --git a/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2-asia/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2-asia/bucketpolicyonly.txt deleted file mode 100644 index 77bd606f98f4..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2-asia/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-f8bd36ffd2-asia: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2-asia/cors.txt b/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2-asia/cors.txt deleted file mode 100644 index 9ea7e05de740..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2-asia/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-f8bd36ffd2-asia/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2-asia/iam.json b/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2-asia/iam.json deleted file mode 100644 index 07b5f14b1e66..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2-asia/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-120", - "projectOwner:k8s-infra-e2e-boskos-120" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-120" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2-asia/logging.txt b/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2-asia/logging.txt deleted file mode 100644 index e8458f74b6e7..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2-asia/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-f8bd36ffd2-asia/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2-eu/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2-eu/bucketpolicyonly.txt deleted file mode 100644 index 624248930441..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2-eu/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-f8bd36ffd2-eu: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2-eu/cors.txt b/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2-eu/cors.txt deleted file mode 100644 index 1d4e0d9d31f0..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2-eu/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-f8bd36ffd2-eu/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2-eu/iam.json b/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2-eu/iam.json deleted file mode 100644 index 07b5f14b1e66..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2-eu/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-120", - "projectOwner:k8s-infra-e2e-boskos-120" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-120" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2-eu/logging.txt b/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2-eu/logging.txt deleted file mode 100644 index 8cdb13294476..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2-eu/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-f8bd36ffd2-eu/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2/bucketpolicyonly.txt deleted file mode 100644 index 892288920214..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-f8bd36ffd2: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2/cors.txt b/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2/cors.txt deleted file mode 100644 index 3ae615548002..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-f8bd36ffd2/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2/iam.json b/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2/iam.json deleted file mode 100644 index 07b5f14b1e66..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-120", - "projectOwner:k8s-infra-e2e-boskos-120" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-120" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2/logging.txt b/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2/logging.txt deleted file mode 100644 index 0d9e36b5187f..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-120/buckets/kubernetes-staging-f8bd36ffd2/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-f8bd36ffd2/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-120/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-120/services/compute/project-info.json index 6e314a30724f..e69de29bb2d1 100644 --- a/audit/projects/k8s-infra-e2e-boskos-120/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-120/services/compute/project-info.json @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDeSGyXeR8Lb1eK+YvUmTh+j1J6e/EU97wwH0B0PfJWoMWCZvieB13ix90griZ/5HWInMwPhj2wldvhGSrHTrmPUDZ55rIji9bOKJ5hd8HK0Zr8cu/cuwMEY4xmCVxXVksCzN8ZxQvH4l1kIV//qreSYMtPHAT9JXDQs/KWhZlRfcKNTjbH1gUeNFIDK+NV0Spdovcbb9vc5YE0fjh9ZSdob9xIZ5R2vMnjhv1spkCAkQA5H321dhfGV91j5arMCdYZ3KNT0AnbFV3A7LMuhbY2UgX9Y+r72TAOv4ldteZYYxdUH+W3L1onW04al0SWf06em9O+MdGpqisTTLzqm4IR root@0e4db416-ded7-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDoWR9XC9/Id8dm/GTEUlP643gr+LT0Q64S13QXNOxLlEDzKBEW/IcM+Xg1ckhhNQ/CCpBTgLsvRTnqdZdeHqDZDNCqCOs1zmSIv8b1o1W0+QRvk5UnHlROWIJq4GGnbwx+F+bXSufLoy7rn7F/fzgRBaYDka1ILzs/MG48JBRoE5xfp8Vn+dHFqTRmjqWzR5V2jScRG9fBIGM293DjqmF2NuwLuUutQZEVnxOsxjJx3pCOrnObeEYokZFu6sw6rf788HE2WiW5vpyjbpj4So15ql6bDF2o5gESOSekmtVNAODg4yp4V0O2TmrqkZKnNZ6QGGsf7QJrVKMuCWdkk8Z9 root@68ee7be3-e02f-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDI0y5B7FsO9KGLvvEqW/BPtNxYmiUscowsycLOZAMY+A22WJz9e3TUC+/NGGqCtZ2hj8vdErLoIlb+6Qmz6AB9JP/3IYvt2q0vT7fSVIj1DRllze1SITqfhJ3+RRV3F/XcaXikFwwpsrpyIVSOmNqa26gjhDsMcj00iTdcFCfUayoBghDZVPhsdSPDsBwq9XBWDOaghl84OVmMqh77Y/ORCqH+uMALNAbo1YnkFfBnUNlErDKQmCZXdyyWQZXCyX8+AjurbhoBpb7CZRWoCJ2AV8XixC0MkJrRQGbBTSM1mPvCKUpQhqsBtb4FVqZfKMapcKBRmcsCm5oa+ELNiNkP root@d0f2544f-eb61-11ea-b653-e644ef4dd131\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDY+n2CKqMow0lgKGvYSsKglKwEimFHb7DHRslPg/xpqootXLJpXLK2TXQesBhXvMisj+4zoRMevDVsd1Dktlp+w7Z2TrG2BKON8PYxv37hXsogcZCqzvGqN8xysnUSbO5fwtk1CZCpTd+3dfBIPvXVTlnpZ7DSldYz0NTtd/fcAtgJBfrBQRvXvgneBzkaGHviDdmDFqDWJVgQ4katcHDude3MuUw68KmS9zbic1NhR5699dwqZxcl9Z8EMHkROOwjvXxznUZbf0unPxw0MeJFr6nyDMjHoM8aaY+It2LAaaSOijDvrZnzCg8//fO2c7dFWYB55hhIMyer0l95ee/Z root@7e92296a-f348-11ea-84bd-b6fb6d83c68d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0smf7TixagUV8N4RCzCMkLQ81m2/XNqUUPgCT0qzmsfcBCU3OIlk2OS3f7dbSBFY7716TIW8u4CjrECLOWFgPlpjP5StoBwbZMglafyxNJQ4YaSivF5shKJSqVeg2LqpT7kEqwFvf+0K+dHiaImLyiPxWWfBdedGfxcucdOSDQCXo3rI7tm03L1b5DBSEM8nZ/Ummq6TRKMhqi/hjZDgZF5NVkPE5dQOoWqctFBdyq1gIw2QwwR+kqbdCWTluzCGpXe6RwfbmiyXzhVTePjrd7vpuahbl5UKoMPvIHJLJpQaPM0eoj2rqfOS3zKK2/iGrcw8OwMMTvxfrqcvKwSHj root@2610604c-f656-11ea-a70f-5aa2e503d61b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDUa17CThxpUbo9lPJ6TPo7+c4aGt9R8vxGF4DdB6zngE1jFEnYmvIKQ6jpKoI4ylmKcfjasue1/Gu834B+BbqCymjFMZ4sgvWSzvkUVgNIrtu+SmZhkyvQU1aM3uDjHAeKp2Uq4p1xu8SKEK42iy3iPaZHZpfjJf0a/YHaH1BloCVCqbYM8EcTCahDouPDuIxMa/VP8kE7oXvbBV6GKkFDtoCRwsgNYTRkc4qESrS6NnzQS4hJ40ffVnk/asMF24cAkUskGRb3mmMQOitDfUJzAVpGuhKST2580NVdrbBSYEIZ6bweKZRaz80ZyYL5OUJ1HXbtbmYOKXKoPsK5PqDx root@fe62e8a1-f91b-11ea-926e-7e7ea190b727\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC5wtU0dZ+f+4XeVK2VQzvBKdSzUjvrRJVWVGV4zTPvRosLoN/rzl0LPd8k1PwVF07QQSYvfTL9etr+uIM8o70/owP4aE/8VavJzdFFuMREhKoz6wifYUqr46eFnSbrBR2ve6jZSibG3Wa9vWoO/UX10PXTyhN+dJLAA7TE3jxxjQ9WawmwUF14OEjX07v09YrQHvcdYSsmWU365K2vbrU+PCDPG6ReyzOJ7Wnun0Rtt1j0/JyUak5q/1cj10+w3mJuT38nNSvYX6gTIp/0z9+7Xo0vCpstzSc3lFQ/wmyI4txEDVqu2gEu+ebGotEMGAL34CHeWV6MkKJCf5oIPg/T root@53dd74b1-1ae2-11eb-99f1-c6d701d1e283\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDnByj6A/Rne29JE7w/AsMWF3LfsjED7f4tBS89EaVSRTXWGqWtA/knzXXo4CPsZ+BTA7S5v/hYo/lmvH8S9J4NagKsMkl/jvcqGJXDNlnv9IBpdm+ArkYb+ywDKaHIihn3jKKQ4Ji7E5Pah+DkPANB8JFaxOcHh2obwW+VDuDLq8atkAE3EeaIWXsu38ATW8Nejl/KYHFdWTS1/7ITuzpc4UBYxaTGaOvCPQoTelvMHGgSngjxKCd3Qp3G9CuwqFWyHgqc4mE6R/KmoLe8eUGsaC5iv+ubx+YsidJ1NK/fXnDGa4N/X8ZMQiF+JZSbx4eiNSH+FzZr9FXnuTnkB1g/ root@58e6f461-1e0b-11eb-8d52-9233771f1447\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDnIOpawGzl4mNMe/kGwdNQjTw9crpdtgepWmFl9EA8OCuWnVhuvhsK1nV3CfHmcO1myzTcD7kDPqzBhRqlVpL3FPy5TLjNTIk4JIYXZ/5JDPnLFwQzTS92alKFl83brw0mNpeLd/oIwLPNTlgglPEROsqDznc2xUboOVOsOCZAThnaLOvdM89X1vKQmjaWMiNpyNQiy9smE6XsVFWCMF0cXh6rYG1OqeCZqea8ZF1xc+AEQkw4XQRhrVRZ3bIZXkgIkOiJqZID38LqIY1grKVKHo5QgEmqULFrumyDCIiqPr8uKPFkhI8S2R2VCguvAVO5y6euuHO/ibdjsMuc9egt root@a9520ced-379f-11eb-a25d-22a534811c55\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC3l7474t6iy/MEvC6mESaAFepRu/bWsRS09QUL8YAtb3++zHTJn31HYiG0VDcrVIp4SMosYoc4CGwtaFsQ6y6C8dNhaU18SrenMdyhOckDt2sHqZO1IVlaIcPvcjrkk5as3Z1yuLjdPrgsRxNa8+RwrCXAKJquhb+pqUSgKg/OeCOufyZ/JLrURI1ZJzzztoL9iRmhBNZKmx0YIOtO6TarpvBtCaftyokGBkbv7/gX4qzmtFuU7kScyImVoBMxA08UE2B0vPAqFd5RCcCaf/VO7ppfTeZrUiQVUxnc6qfFHxNyAJ++nyQopb7G8Lc+sHc1aWk8xnnz0gVPkPAgZ/1n root@84c9a426-389c-11eb-a25d-22a534811c55\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDPZqEQcEor505wwExiDBtAZDQc3xPDtxybUsc11h5b9x2bJ5ks0OTNiG0HAH0jRQMz1fX0DqSoaOri5DFfM9HvzoVTIep6nQcOSzes9OAEVveWksLKaWehy4kSk9bFogNq0Lf81qduqRp5DWJqwuMnQiNtMDQr/ud2GG0KLcY8FgwFmcHNZzTupyc0oPH4kNL1SEEyUHfMEc1R8XiI+yBEPfn89rGtV8G8AuhSzAP9jcTtBowWwhht2L+rTXRAWViMVyIKNWmay7t6xQvZsPvyPn2+2b80x0xoDckW/uFX7mgaB804UnlIHd9K+Tb2nrLiAuBX+J0tGoVN5cGf936f root@c7cd8a58-3f6c-11eb-a0eb-a663209ac437\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9qi58VJsPT9oP+8q7ZG/ktUOTrkQ7VReuzGT/LRvaF8bMyPoxRG0ay3guQNRHoEE8g1TbKaY/4U52lnCHyQvwyJS/JPevtQdF4T5zy847oLzfwLP6p1p+3MmxLVJSl+m3SnmbbeBcKS3fUqf0yKMpkU6EeNsX0IsiV2fOjyYX03wWRYx/NczsPmYIkiD9bHw0EfWud3U/77OrrHXYD0vsV/ikdsOH7Mv6+QQUmT4qNXmJ2BPAVDgrXsCR+t4wB9rM+1Jqu7n4o2Bcoigv9DS0kxkeQdraKP6TQsWBrx3+V+FntHfI6pijUw7MZefPyPrbYA7lFbqscU616hrIWINR root@b633527d-417f-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDN5w3yOC5idtvbKGGGt8+es7emRnr6ekxs//F4FC1yqYXk5RmUtO5ypN7S4RB0rEyFzR6vJ+EhqCc685k5HTKukJM8Y3ZGWdUQQmi5hvXIhs5YDZhejJAx5rd/sOFzv/rM+LeyMhPa778Wk6smcTgNWl3Gyx0yCljyGo1M3xmHefvoZOtBYJzYtjc7QjCvbZpss3l1YOS/kUdImik6fppeoJ/D92v5ZD91kmfRdYwX/pngEJkGrcVZIiDqeSGSSvtPs7BSc7Y7GhDq55Mv7UrAKDEjs5YvZ5vi65ZhLA2dVpsfTFuvP8rHps/C4mkE1TJqpV0hBJnP8XoxSiQc0Ofr root@3906492c-4e24-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC6fevqLVWyMnksNQ2U7vS8OEQdaYCqNaxKLJc8gFMVusAK2cYzBLTLgNOtVXGYuMeXAb8kBoRCFknOjpBAjZkaL3M8I4/nQI9u0sisbCKX0MLn1sRWUHfU2fI+P/Z4zikji8alQLnLGopfI7SrhXVRXbpon1Xc1OGNigWx9piBzP/e4RmOKvqufFLW1zDA5r2QMwkH/HT8Z/APMtm56iWfAlgi9EavDLnk1fEEjYvWQBQA8988cShtxFP2MuGtaRdLKM2ESJ/hqP1MYbw0SIS7sWdPFB2x2pm1rBs/mT51urw0/K6eVlYcrQy6pwQnBxb4SxaPpNxANxxgPHtOjN/t root@33897c6a-727c-11eb-9339-6a677f18a690" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-10T11:25:28.921-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "191832892243-compute@developer.gserviceaccount.com", - "id": "8570512086342053879", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-120", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-120", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-01/buckets/kubernetes-staging-a0b6b040d4/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-01/buckets/kubernetes-staging-a0b6b040d4/bucketpolicyonly.txt deleted file mode 100644 index 9cdf96ba13ba..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-01/buckets/kubernetes-staging-a0b6b040d4/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-a0b6b040d4: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-01/buckets/kubernetes-staging-a0b6b040d4/cors.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-01/buckets/kubernetes-staging-a0b6b040d4/cors.txt deleted file mode 100644 index 5bd5de0c217d..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-01/buckets/kubernetes-staging-a0b6b040d4/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-a0b6b040d4/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-01/buckets/kubernetes-staging-a0b6b040d4/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-01/buckets/kubernetes-staging-a0b6b040d4/iam.json deleted file mode 100644 index c382af84c656..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-01/buckets/kubernetes-staging-a0b6b040d4/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-gpu-01", - "projectOwner:k8s-infra-e2e-boskos-gpu-01" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-gpu-01" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-01/buckets/kubernetes-staging-a0b6b040d4/logging.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-01/buckets/kubernetes-staging-a0b6b040d4/logging.txt deleted file mode 100644 index d68196854f49..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-01/buckets/kubernetes-staging-a0b6b040d4/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-a0b6b040d4/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-01/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-01/description.json deleted file mode 100644 index d6cb130299c8..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-01/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-07T19:38:52.853Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-gpu-01", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-gpu-01", - "projectNumber": "220512457637" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-01/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-01/iam.json deleted file mode 100644 index 7bea6c446944..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-01/iam.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-220512457637@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-220512457637@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:220512457637-compute@developer.gserviceaccount.com", - "serviceAccount:220512457637@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-01/service-accounts/220512457637-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-01/service-accounts/220512457637-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 460ddbf4e553..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-01/service-accounts/220512457637-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "220512457637-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-gpu-01/serviceAccounts/220512457637-compute@developer.gserviceaccount.com", - "oauth2ClientId": "100298958778775807046", - "projectId": "k8s-infra-e2e-boskos-gpu-01", - "uniqueId": "100298958778775807046" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-01/service-accounts/220512457637-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-01/service-accounts/220512457637-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-01/service-accounts/220512457637-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-01/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-gpu-01/services/compute/project-info.json deleted file mode 100644 index 794839d5b627..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-01/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-07T12:39:02.680-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "220512457637-compute@developer.gserviceaccount.com", - "id": "8041866388899369785", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-gpu-01", - "quotas": [ - { - "limit": 5000, - "metric": "SNAPSHOTS" - }, - { - "limit": 15, - "metric": "NETWORKS" - }, - { - "limit": 200, - "metric": "FIREWALLS" - }, - { - "limit": 2000, - "metric": "IMAGES" - }, - { - "limit": 21, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 250, - "metric": "ROUTES" - }, - { - "limit": 45, - "metric": "FORWARDING_RULES" - }, - { - "limit": 150, - "metric": "TARGET_POOLS" - }, - { - "limit": 150, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 69, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 150, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 30, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 30, - "metric": "URL_MAPS" - }, - { - "limit": 9, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 300, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 15, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 30, - "metric": "VPN_TUNNELS" - }, - { - "limit": 9, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 10, - "metric": "ROUTERS" - }, - { - "limit": 30, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 30, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 30, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 175, - "metric": "SUBNETWORKS" - }, - { - "limit": 30, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 100, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 45, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 300, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 15, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 2000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 15, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 45, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-gpu-01", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-01/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-01/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-01/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-02/buckets/kubernetes-staging-2abfb0e14f/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-02/buckets/kubernetes-staging-2abfb0e14f/bucketpolicyonly.txt deleted file mode 100644 index 9a8767d6060c..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-02/buckets/kubernetes-staging-2abfb0e14f/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-2abfb0e14f: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-02/buckets/kubernetes-staging-2abfb0e14f/cors.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-02/buckets/kubernetes-staging-2abfb0e14f/cors.txt deleted file mode 100644 index 0b608fa8e895..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-02/buckets/kubernetes-staging-2abfb0e14f/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-2abfb0e14f/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-02/buckets/kubernetes-staging-2abfb0e14f/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-02/buckets/kubernetes-staging-2abfb0e14f/iam.json deleted file mode 100644 index cf17554debb1..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-02/buckets/kubernetes-staging-2abfb0e14f/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-gpu-02", - "projectOwner:k8s-infra-e2e-boskos-gpu-02" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-gpu-02" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-02/buckets/kubernetes-staging-2abfb0e14f/logging.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-02/buckets/kubernetes-staging-2abfb0e14f/logging.txt deleted file mode 100644 index 4c4a967ac65b..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-02/buckets/kubernetes-staging-2abfb0e14f/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-2abfb0e14f/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-02/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-02/description.json deleted file mode 100644 index 5d08f53b9fd3..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-02/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-07T19:40:55.256Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-gpu-02", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-gpu-02", - "projectNumber": "627137184414" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-02/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-02/iam.json deleted file mode 100644 index d81cb1983976..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-02/iam.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-627137184414@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-627137184414@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:627137184414-compute@developer.gserviceaccount.com", - "serviceAccount:627137184414@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-02/service-accounts/627137184414-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-02/service-accounts/627137184414-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index b41b948f1468..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-02/service-accounts/627137184414-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "627137184414-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-gpu-02/serviceAccounts/627137184414-compute@developer.gserviceaccount.com", - "oauth2ClientId": "109493456843441753898", - "projectId": "k8s-infra-e2e-boskos-gpu-02", - "uniqueId": "109493456843441753898" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-02/service-accounts/627137184414-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-02/service-accounts/627137184414-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-02/service-accounts/627137184414-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-02/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-gpu-02/services/compute/project-info.json deleted file mode 100644 index 7ba41b1d77d2..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-02/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-07T12:41:06.017-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "627137184414-compute@developer.gserviceaccount.com", - "id": "182103574686208190", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-gpu-02", - "quotas": [ - { - "limit": 5000, - "metric": "SNAPSHOTS" - }, - { - "limit": 15, - "metric": "NETWORKS" - }, - { - "limit": 200, - "metric": "FIREWALLS" - }, - { - "limit": 2000, - "metric": "IMAGES" - }, - { - "limit": 21, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 250, - "metric": "ROUTES" - }, - { - "limit": 45, - "metric": "FORWARDING_RULES" - }, - { - "limit": 150, - "metric": "TARGET_POOLS" - }, - { - "limit": 150, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 69, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 150, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 30, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 30, - "metric": "URL_MAPS" - }, - { - "limit": 9, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 300, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 15, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 30, - "metric": "VPN_TUNNELS" - }, - { - "limit": 9, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 10, - "metric": "ROUTERS" - }, - { - "limit": 30, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 30, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 30, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 175, - "metric": "SUBNETWORKS" - }, - { - "limit": 30, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 100, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 45, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 300, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 15, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 2000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 15, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 45, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-gpu-02", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-02/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-02/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-02/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-03/buckets/kubernetes-staging-38aad5d74f/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-03/buckets/kubernetes-staging-38aad5d74f/bucketpolicyonly.txt deleted file mode 100644 index 8dce25200c26..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-03/buckets/kubernetes-staging-38aad5d74f/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-38aad5d74f: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-03/buckets/kubernetes-staging-38aad5d74f/cors.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-03/buckets/kubernetes-staging-38aad5d74f/cors.txt deleted file mode 100644 index 1dfc45fa8a9e..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-03/buckets/kubernetes-staging-38aad5d74f/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-38aad5d74f/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-03/buckets/kubernetes-staging-38aad5d74f/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-03/buckets/kubernetes-staging-38aad5d74f/iam.json deleted file mode 100644 index 153c669919c9..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-03/buckets/kubernetes-staging-38aad5d74f/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-gpu-03", - "projectOwner:k8s-infra-e2e-boskos-gpu-03" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-gpu-03" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-03/buckets/kubernetes-staging-38aad5d74f/logging.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-03/buckets/kubernetes-staging-38aad5d74f/logging.txt deleted file mode 100644 index 3da15a0e2d3d..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-03/buckets/kubernetes-staging-38aad5d74f/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-38aad5d74f/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-03/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-03/description.json deleted file mode 100644 index b7595b3cdb08..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-03/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-07T19:42:52.759Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-gpu-03", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-gpu-03", - "projectNumber": "910061531590" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-03/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-03/iam.json deleted file mode 100644 index d467f8c59283..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-03/iam.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-910061531590@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-910061531590@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:910061531590-compute@developer.gserviceaccount.com", - "serviceAccount:910061531590@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-03/service-accounts/910061531590-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-03/service-accounts/910061531590-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 446c921ba3ab..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-03/service-accounts/910061531590-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "910061531590-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-gpu-03/serviceAccounts/910061531590-compute@developer.gserviceaccount.com", - "oauth2ClientId": "105320867006220998427", - "projectId": "k8s-infra-e2e-boskos-gpu-03", - "uniqueId": "105320867006220998427" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-03/service-accounts/910061531590-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-03/service-accounts/910061531590-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-03/service-accounts/910061531590-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-03/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-gpu-03/services/compute/project-info.json deleted file mode 100644 index 9a5cbd2f71ca..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-03/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-07T12:43:03.135-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "910061531590-compute@developer.gserviceaccount.com", - "id": "5440990943568203817", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-gpu-03", - "quotas": [ - { - "limit": 5000, - "metric": "SNAPSHOTS" - }, - { - "limit": 15, - "metric": "NETWORKS" - }, - { - "limit": 200, - "metric": "FIREWALLS" - }, - { - "limit": 2000, - "metric": "IMAGES" - }, - { - "limit": 21, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 250, - "metric": "ROUTES" - }, - { - "limit": 45, - "metric": "FORWARDING_RULES" - }, - { - "limit": 150, - "metric": "TARGET_POOLS" - }, - { - "limit": 150, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 69, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 150, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 30, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 30, - "metric": "URL_MAPS" - }, - { - "limit": 9, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 300, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 15, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 30, - "metric": "VPN_TUNNELS" - }, - { - "limit": 9, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 10, - "metric": "ROUTERS" - }, - { - "limit": 30, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 30, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 30, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 175, - "metric": "SUBNETWORKS" - }, - { - "limit": 30, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 100, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 45, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 300, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 15, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 2000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 15, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 45, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-gpu-03", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-03/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-03/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-03/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-04/buckets/kubernetes-staging-8ebe77e78f/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-04/buckets/kubernetes-staging-8ebe77e78f/bucketpolicyonly.txt deleted file mode 100644 index c54a5ed5ef07..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-04/buckets/kubernetes-staging-8ebe77e78f/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-8ebe77e78f: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-04/buckets/kubernetes-staging-8ebe77e78f/cors.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-04/buckets/kubernetes-staging-8ebe77e78f/cors.txt deleted file mode 100644 index 863d2d449e45..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-04/buckets/kubernetes-staging-8ebe77e78f/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-8ebe77e78f/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-04/buckets/kubernetes-staging-8ebe77e78f/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-04/buckets/kubernetes-staging-8ebe77e78f/iam.json deleted file mode 100644 index b9194e12b7b1..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-04/buckets/kubernetes-staging-8ebe77e78f/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-gpu-04", - "projectOwner:k8s-infra-e2e-boskos-gpu-04" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-gpu-04" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-04/buckets/kubernetes-staging-8ebe77e78f/logging.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-04/buckets/kubernetes-staging-8ebe77e78f/logging.txt deleted file mode 100644 index 79e30bc2b848..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-04/buckets/kubernetes-staging-8ebe77e78f/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-8ebe77e78f/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-04/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-04/description.json deleted file mode 100644 index a4e8151a4758..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-04/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-07T19:45:13.562Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-gpu-04", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-gpu-04", - "projectNumber": "887670065934" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-04/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-04/iam.json deleted file mode 100644 index 353a8448bf79..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-04/iam.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-887670065934@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-887670065934@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:887670065934-compute@developer.gserviceaccount.com", - "serviceAccount:887670065934@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-04/service-accounts/887670065934-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-04/service-accounts/887670065934-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index e20ca934344e..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-04/service-accounts/887670065934-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "887670065934-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-gpu-04/serviceAccounts/887670065934-compute@developer.gserviceaccount.com", - "oauth2ClientId": "102931344885479175746", - "projectId": "k8s-infra-e2e-boskos-gpu-04", - "uniqueId": "102931344885479175746" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-04/service-accounts/887670065934-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-04/service-accounts/887670065934-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-04/service-accounts/887670065934-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-04/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-gpu-04/services/compute/project-info.json deleted file mode 100644 index 4f9cc691b629..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-04/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-07T12:45:23.331-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "887670065934-compute@developer.gserviceaccount.com", - "id": "412132668621197756", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-gpu-04", - "quotas": [ - { - "limit": 5000, - "metric": "SNAPSHOTS" - }, - { - "limit": 15, - "metric": "NETWORKS" - }, - { - "limit": 200, - "metric": "FIREWALLS" - }, - { - "limit": 2000, - "metric": "IMAGES" - }, - { - "limit": 21, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 250, - "metric": "ROUTES" - }, - { - "limit": 45, - "metric": "FORWARDING_RULES" - }, - { - "limit": 150, - "metric": "TARGET_POOLS" - }, - { - "limit": 150, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 69, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 150, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 30, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 30, - "metric": "URL_MAPS" - }, - { - "limit": 9, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 300, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 15, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 30, - "metric": "VPN_TUNNELS" - }, - { - "limit": 9, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 10, - "metric": "ROUTERS" - }, - { - "limit": 30, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 30, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 30, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 175, - "metric": "SUBNETWORKS" - }, - { - "limit": 30, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 100, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 45, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 300, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 15, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 2000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 15, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 45, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-gpu-04", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-04/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-04/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-04/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-05/buckets/kubernetes-staging-b48eda6f1a/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-05/buckets/kubernetes-staging-b48eda6f1a/bucketpolicyonly.txt deleted file mode 100644 index 0a502e8d8b8e..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-05/buckets/kubernetes-staging-b48eda6f1a/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-b48eda6f1a: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-05/buckets/kubernetes-staging-b48eda6f1a/cors.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-05/buckets/kubernetes-staging-b48eda6f1a/cors.txt deleted file mode 100644 index 45e01dab6665..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-05/buckets/kubernetes-staging-b48eda6f1a/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-b48eda6f1a/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-05/buckets/kubernetes-staging-b48eda6f1a/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-05/buckets/kubernetes-staging-b48eda6f1a/iam.json deleted file mode 100644 index 943edb7b26de..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-05/buckets/kubernetes-staging-b48eda6f1a/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-gpu-05", - "projectOwner:k8s-infra-e2e-boskos-gpu-05" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-gpu-05" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-05/buckets/kubernetes-staging-b48eda6f1a/logging.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-05/buckets/kubernetes-staging-b48eda6f1a/logging.txt deleted file mode 100644 index cacf00fb8d69..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-05/buckets/kubernetes-staging-b48eda6f1a/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-b48eda6f1a/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-05/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-05/description.json deleted file mode 100644 index 509fe671372c..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-05/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-07T19:47:08.933Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-gpu-05", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-gpu-05", - "projectNumber": "135385633554" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-05/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-05/iam.json deleted file mode 100644 index 8734fb22facf..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-05/iam.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-135385633554@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-135385633554@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:135385633554-compute@developer.gserviceaccount.com", - "serviceAccount:135385633554@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-05/service-accounts/135385633554-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-05/service-accounts/135385633554-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 058c688538c3..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-05/service-accounts/135385633554-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "135385633554-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-gpu-05/serviceAccounts/135385633554-compute@developer.gserviceaccount.com", - "oauth2ClientId": "115937758963933882229", - "projectId": "k8s-infra-e2e-boskos-gpu-05", - "uniqueId": "115937758963933882229" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-05/service-accounts/135385633554-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-05/service-accounts/135385633554-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-05/service-accounts/135385633554-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-05/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-gpu-05/services/compute/project-info.json deleted file mode 100644 index b9d64c9ea43f..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-05/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-07T12:47:19.585-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "135385633554-compute@developer.gserviceaccount.com", - "id": "1001145205149143336", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-gpu-05", - "quotas": [ - { - "limit": 5000, - "metric": "SNAPSHOTS" - }, - { - "limit": 15, - "metric": "NETWORKS" - }, - { - "limit": 200, - "metric": "FIREWALLS" - }, - { - "limit": 2000, - "metric": "IMAGES" - }, - { - "limit": 21, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 250, - "metric": "ROUTES" - }, - { - "limit": 45, - "metric": "FORWARDING_RULES" - }, - { - "limit": 150, - "metric": "TARGET_POOLS" - }, - { - "limit": 150, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 69, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 150, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 30, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 30, - "metric": "URL_MAPS" - }, - { - "limit": 9, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 300, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 15, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 30, - "metric": "VPN_TUNNELS" - }, - { - "limit": 9, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 10, - "metric": "ROUTERS" - }, - { - "limit": 30, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 30, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 30, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 175, - "metric": "SUBNETWORKS" - }, - { - "limit": 30, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 100, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 45, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 300, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 15, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 2000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 15, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 45, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-gpu-05", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-05/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-05/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-05/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-06/buckets/kubernetes-staging-cca279e715/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-06/buckets/kubernetes-staging-cca279e715/bucketpolicyonly.txt deleted file mode 100644 index 37dbf1730f44..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-06/buckets/kubernetes-staging-cca279e715/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-cca279e715: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-06/buckets/kubernetes-staging-cca279e715/cors.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-06/buckets/kubernetes-staging-cca279e715/cors.txt deleted file mode 100644 index eb10f60fc0c6..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-06/buckets/kubernetes-staging-cca279e715/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-cca279e715/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-06/buckets/kubernetes-staging-cca279e715/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-06/buckets/kubernetes-staging-cca279e715/iam.json deleted file mode 100644 index e361839e5d83..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-06/buckets/kubernetes-staging-cca279e715/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-gpu-06", - "projectOwner:k8s-infra-e2e-boskos-gpu-06" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-gpu-06" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-06/buckets/kubernetes-staging-cca279e715/logging.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-06/buckets/kubernetes-staging-cca279e715/logging.txt deleted file mode 100644 index 0cc39c74ab73..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-06/buckets/kubernetes-staging-cca279e715/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-cca279e715/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-06/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-06/description.json deleted file mode 100644 index de1cb64e81f1..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-06/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-07T19:49:16.235Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-gpu-06", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-gpu-06", - "projectNumber": "574702544726" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-06/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-06/iam.json deleted file mode 100644 index 0cca53764ce4..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-06/iam.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-574702544726@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-574702544726@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:574702544726-compute@developer.gserviceaccount.com", - "serviceAccount:574702544726@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-06/service-accounts/574702544726-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-06/service-accounts/574702544726-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 7bdc23e07d8c..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-06/service-accounts/574702544726-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "574702544726-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-gpu-06/serviceAccounts/574702544726-compute@developer.gserviceaccount.com", - "oauth2ClientId": "101198495662120322139", - "projectId": "k8s-infra-e2e-boskos-gpu-06", - "uniqueId": "101198495662120322139" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-06/service-accounts/574702544726-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-06/service-accounts/574702544726-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-06/service-accounts/574702544726-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-06/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-gpu-06/services/compute/project-info.json deleted file mode 100644 index 6d78d6e423de..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-06/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-07T12:49:26.647-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "574702544726-compute@developer.gserviceaccount.com", - "id": "3804526137988615849", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-gpu-06", - "quotas": [ - { - "limit": 5000, - "metric": "SNAPSHOTS" - }, - { - "limit": 15, - "metric": "NETWORKS" - }, - { - "limit": 200, - "metric": "FIREWALLS" - }, - { - "limit": 2000, - "metric": "IMAGES" - }, - { - "limit": 21, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 250, - "metric": "ROUTES" - }, - { - "limit": 45, - "metric": "FORWARDING_RULES" - }, - { - "limit": 150, - "metric": "TARGET_POOLS" - }, - { - "limit": 150, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 69, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 150, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 30, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 30, - "metric": "URL_MAPS" - }, - { - "limit": 9, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 300, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 15, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 30, - "metric": "VPN_TUNNELS" - }, - { - "limit": 9, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 10, - "metric": "ROUTERS" - }, - { - "limit": 30, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 30, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 30, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 175, - "metric": "SUBNETWORKS" - }, - { - "limit": 30, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 100, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 45, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 300, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 15, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 2000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 15, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 45, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-gpu-06", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-06/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-06/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-06/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-07/buckets/kubernetes-staging-227c85f357/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-07/buckets/kubernetes-staging-227c85f357/bucketpolicyonly.txt deleted file mode 100644 index 9ac41cdcca8e..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-07/buckets/kubernetes-staging-227c85f357/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-227c85f357: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-07/buckets/kubernetes-staging-227c85f357/cors.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-07/buckets/kubernetes-staging-227c85f357/cors.txt deleted file mode 100644 index 74092512ca13..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-07/buckets/kubernetes-staging-227c85f357/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-227c85f357/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-07/buckets/kubernetes-staging-227c85f357/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-07/buckets/kubernetes-staging-227c85f357/iam.json deleted file mode 100644 index 6f338dc28724..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-07/buckets/kubernetes-staging-227c85f357/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-gpu-07", - "projectOwner:k8s-infra-e2e-boskos-gpu-07" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-gpu-07" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-07/buckets/kubernetes-staging-227c85f357/logging.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-07/buckets/kubernetes-staging-227c85f357/logging.txt deleted file mode 100644 index e3da1b77d477..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-07/buckets/kubernetes-staging-227c85f357/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-227c85f357/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-07/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-07/description.json deleted file mode 100644 index 1a8d8329ee57..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-07/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-07T19:51:02.169Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-gpu-07", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-gpu-07", - "projectNumber": "593515467300" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-07/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-07/iam.json deleted file mode 100644 index 2552c356d95b..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-07/iam.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-593515467300@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-593515467300@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:593515467300-compute@developer.gserviceaccount.com", - "serviceAccount:593515467300@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-07/service-accounts/593515467300-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-07/service-accounts/593515467300-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 110b211773a8..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-07/service-accounts/593515467300-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "593515467300-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-gpu-07/serviceAccounts/593515467300-compute@developer.gserviceaccount.com", - "oauth2ClientId": "115166631286598779859", - "projectId": "k8s-infra-e2e-boskos-gpu-07", - "uniqueId": "115166631286598779859" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-07/service-accounts/593515467300-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-07/service-accounts/593515467300-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-07/service-accounts/593515467300-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-07/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-gpu-07/services/compute/project-info.json deleted file mode 100644 index bfbc61ae07dc..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-07/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-07T12:51:12.945-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "593515467300-compute@developer.gserviceaccount.com", - "id": "7721290966228799071", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-gpu-07", - "quotas": [ - { - "limit": 5000, - "metric": "SNAPSHOTS" - }, - { - "limit": 15, - "metric": "NETWORKS" - }, - { - "limit": 200, - "metric": "FIREWALLS" - }, - { - "limit": 2000, - "metric": "IMAGES" - }, - { - "limit": 21, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 250, - "metric": "ROUTES" - }, - { - "limit": 45, - "metric": "FORWARDING_RULES" - }, - { - "limit": 150, - "metric": "TARGET_POOLS" - }, - { - "limit": 150, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 69, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 150, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 30, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 30, - "metric": "URL_MAPS" - }, - { - "limit": 9, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 300, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 15, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 30, - "metric": "VPN_TUNNELS" - }, - { - "limit": 9, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 10, - "metric": "ROUTERS" - }, - { - "limit": 30, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 30, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 30, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 175, - "metric": "SUBNETWORKS" - }, - { - "limit": 30, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 100, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 45, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 300, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 15, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 2000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 15, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 45, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-gpu-07", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-07/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-07/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-07/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-08/buckets/kubernetes-staging-544928283b/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-08/buckets/kubernetes-staging-544928283b/bucketpolicyonly.txt deleted file mode 100644 index f4d7deb89404..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-08/buckets/kubernetes-staging-544928283b/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-544928283b: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-08/buckets/kubernetes-staging-544928283b/cors.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-08/buckets/kubernetes-staging-544928283b/cors.txt deleted file mode 100644 index 1a974703d3c1..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-08/buckets/kubernetes-staging-544928283b/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-544928283b/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-08/buckets/kubernetes-staging-544928283b/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-08/buckets/kubernetes-staging-544928283b/iam.json deleted file mode 100644 index 0875b1a9d44c..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-08/buckets/kubernetes-staging-544928283b/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-gpu-08", - "projectOwner:k8s-infra-e2e-boskos-gpu-08" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-gpu-08" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-08/buckets/kubernetes-staging-544928283b/logging.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-08/buckets/kubernetes-staging-544928283b/logging.txt deleted file mode 100644 index e377c3564454..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-08/buckets/kubernetes-staging-544928283b/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-544928283b/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-08/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-08/description.json deleted file mode 100644 index ea8ff1004ca4..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-08/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-07T19:53:05.871Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-gpu-08", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-gpu-08", - "projectNumber": "693828359310" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-08/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-08/iam.json deleted file mode 100644 index ba6d46aca86f..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-08/iam.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-693828359310@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-693828359310@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:693828359310-compute@developer.gserviceaccount.com", - "serviceAccount:693828359310@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-08/service-accounts/693828359310-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-08/service-accounts/693828359310-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 3b7f2bc99144..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-08/service-accounts/693828359310-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "693828359310-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-gpu-08/serviceAccounts/693828359310-compute@developer.gserviceaccount.com", - "oauth2ClientId": "109341712657002955723", - "projectId": "k8s-infra-e2e-boskos-gpu-08", - "uniqueId": "109341712657002955723" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-08/service-accounts/693828359310-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-08/service-accounts/693828359310-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-08/service-accounts/693828359310-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-08/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-gpu-08/services/compute/project-info.json deleted file mode 100644 index 3ca09bfa0023..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-08/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-07T12:53:16.056-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "693828359310-compute@developer.gserviceaccount.com", - "id": "8955621969613557700", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-gpu-08", - "quotas": [ - { - "limit": 5000, - "metric": "SNAPSHOTS" - }, - { - "limit": 15, - "metric": "NETWORKS" - }, - { - "limit": 200, - "metric": "FIREWALLS" - }, - { - "limit": 2000, - "metric": "IMAGES" - }, - { - "limit": 21, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 250, - "metric": "ROUTES" - }, - { - "limit": 45, - "metric": "FORWARDING_RULES" - }, - { - "limit": 150, - "metric": "TARGET_POOLS" - }, - { - "limit": 150, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 69, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 150, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 30, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 30, - "metric": "URL_MAPS" - }, - { - "limit": 9, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 300, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 15, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 30, - "metric": "VPN_TUNNELS" - }, - { - "limit": 9, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 10, - "metric": "ROUTERS" - }, - { - "limit": 30, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 30, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 30, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 175, - "metric": "SUBNETWORKS" - }, - { - "limit": 30, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 100, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 45, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 300, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 15, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 2000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 15, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 45, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-gpu-08", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-08/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-08/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-08/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-09/buckets/kubernetes-staging-328989ca07/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-09/buckets/kubernetes-staging-328989ca07/bucketpolicyonly.txt deleted file mode 100644 index 178548edefff..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-09/buckets/kubernetes-staging-328989ca07/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-328989ca07: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-09/buckets/kubernetes-staging-328989ca07/cors.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-09/buckets/kubernetes-staging-328989ca07/cors.txt deleted file mode 100644 index a69aaa494df0..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-09/buckets/kubernetes-staging-328989ca07/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-328989ca07/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-09/buckets/kubernetes-staging-328989ca07/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-09/buckets/kubernetes-staging-328989ca07/iam.json deleted file mode 100644 index e2e1a4533833..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-09/buckets/kubernetes-staging-328989ca07/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-gpu-09", - "projectOwner:k8s-infra-e2e-boskos-gpu-09" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-gpu-09" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-09/buckets/kubernetes-staging-328989ca07/logging.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-09/buckets/kubernetes-staging-328989ca07/logging.txt deleted file mode 100644 index 11328b3ac25c..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-09/buckets/kubernetes-staging-328989ca07/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-328989ca07/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-09/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-09/description.json deleted file mode 100644 index 7755c8596cbb..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-09/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-07T19:54:48.162Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-gpu-09", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-gpu-09", - "projectNumber": "136773320006" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-09/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-09/iam.json deleted file mode 100644 index cb7cbba9d9e0..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-09/iam.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-136773320006@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-136773320006@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:136773320006-compute@developer.gserviceaccount.com", - "serviceAccount:136773320006@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-09/service-accounts/136773320006-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-09/service-accounts/136773320006-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 19c2c4220c92..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-09/service-accounts/136773320006-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "136773320006-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-gpu-09/serviceAccounts/136773320006-compute@developer.gserviceaccount.com", - "oauth2ClientId": "117947059727975623742", - "projectId": "k8s-infra-e2e-boskos-gpu-09", - "uniqueId": "117947059727975623742" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-09/service-accounts/136773320006-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-09/service-accounts/136773320006-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-09/service-accounts/136773320006-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-09/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-gpu-09/services/compute/project-info.json deleted file mode 100644 index d2923d5d03e7..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-09/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-07T12:54:58.580-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "136773320006-compute@developer.gserviceaccount.com", - "id": "3744160437067845501", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-gpu-09", - "quotas": [ - { - "limit": 5000, - "metric": "SNAPSHOTS" - }, - { - "limit": 15, - "metric": "NETWORKS" - }, - { - "limit": 200, - "metric": "FIREWALLS" - }, - { - "limit": 2000, - "metric": "IMAGES" - }, - { - "limit": 21, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 250, - "metric": "ROUTES" - }, - { - "limit": 45, - "metric": "FORWARDING_RULES" - }, - { - "limit": 150, - "metric": "TARGET_POOLS" - }, - { - "limit": 150, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 69, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 150, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 30, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 30, - "metric": "URL_MAPS" - }, - { - "limit": 9, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 300, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 15, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 30, - "metric": "VPN_TUNNELS" - }, - { - "limit": 9, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 10, - "metric": "ROUTERS" - }, - { - "limit": 30, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 30, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 30, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 175, - "metric": "SUBNETWORKS" - }, - { - "limit": 30, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 100, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 45, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 300, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 15, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 2000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 15, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 45, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-gpu-09", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-09/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-09/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-09/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-10/buckets/kubernetes-staging-b4ee4f94c2/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-10/buckets/kubernetes-staging-b4ee4f94c2/bucketpolicyonly.txt deleted file mode 100644 index 99ee4c602c89..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-10/buckets/kubernetes-staging-b4ee4f94c2/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-b4ee4f94c2: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-10/buckets/kubernetes-staging-b4ee4f94c2/cors.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-10/buckets/kubernetes-staging-b4ee4f94c2/cors.txt deleted file mode 100644 index 502328751cf0..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-10/buckets/kubernetes-staging-b4ee4f94c2/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-b4ee4f94c2/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-10/buckets/kubernetes-staging-b4ee4f94c2/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-10/buckets/kubernetes-staging-b4ee4f94c2/iam.json deleted file mode 100644 index 65ddd9835486..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-10/buckets/kubernetes-staging-b4ee4f94c2/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-gpu-10", - "projectOwner:k8s-infra-e2e-boskos-gpu-10" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-gpu-10" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-10/buckets/kubernetes-staging-b4ee4f94c2/logging.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-10/buckets/kubernetes-staging-b4ee4f94c2/logging.txt deleted file mode 100644 index 971f423671aa..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-10/buckets/kubernetes-staging-b4ee4f94c2/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-b4ee4f94c2/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-10/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-10/description.json deleted file mode 100644 index e2167c640b86..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-10/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-07T19:56:58.075Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-gpu-10", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-gpu-10", - "projectNumber": "441369562578" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-10/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-10/iam.json deleted file mode 100644 index 4d72ed505c21..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-10/iam.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-441369562578@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-441369562578@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:441369562578-compute@developer.gserviceaccount.com", - "serviceAccount:441369562578@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-10/service-accounts/441369562578-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-gpu-10/service-accounts/441369562578-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 91c5a5fe4f95..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-10/service-accounts/441369562578-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "441369562578-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-gpu-10/serviceAccounts/441369562578-compute@developer.gserviceaccount.com", - "oauth2ClientId": "115433193364334766782", - "projectId": "k8s-infra-e2e-boskos-gpu-10", - "uniqueId": "115433193364334766782" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-10/service-accounts/441369562578-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-10/service-accounts/441369562578-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-10/service-accounts/441369562578-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-10/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-gpu-10/services/compute/project-info.json deleted file mode 100644 index 56858fb50300..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-10/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-07T12:57:08.073-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "441369562578-compute@developer.gserviceaccount.com", - "id": "3193708005254237436", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-gpu-10", - "quotas": [ - { - "limit": 5000, - "metric": "SNAPSHOTS" - }, - { - "limit": 15, - "metric": "NETWORKS" - }, - { - "limit": 200, - "metric": "FIREWALLS" - }, - { - "limit": 2000, - "metric": "IMAGES" - }, - { - "limit": 21, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 250, - "metric": "ROUTES" - }, - { - "limit": 45, - "metric": "FORWARDING_RULES" - }, - { - "limit": 150, - "metric": "TARGET_POOLS" - }, - { - "limit": 150, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 69, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 150, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 30, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 30, - "metric": "URL_MAPS" - }, - { - "limit": 9, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 300, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 15, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 30, - "metric": "VPN_TUNNELS" - }, - { - "limit": 9, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 10, - "metric": "ROUTERS" - }, - { - "limit": 30, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 30, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 30, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 175, - "metric": "SUBNETWORKS" - }, - { - "limit": 30, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 100, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 45, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 300, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 15, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 2000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 15, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 45, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-gpu-10", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-10/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-gpu-10/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-10/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-01/buckets/artifacts.k8s-infra-e2e-boskos-scale-01.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-01/buckets/artifacts.k8s-infra-e2e-boskos-scale-01.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 2aace5d16189..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-01/buckets/artifacts.k8s-infra-e2e-boskos-scale-01.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-infra-e2e-boskos-scale-01.appspot.com: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-01/buckets/artifacts.k8s-infra-e2e-boskos-scale-01.appspot.com/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-01/buckets/artifacts.k8s-infra-e2e-boskos-scale-01.appspot.com/cors.txt deleted file mode 100644 index bcbecf8dab2c..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-01/buckets/artifacts.k8s-infra-e2e-boskos-scale-01.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-infra-e2e-boskos-scale-01.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-01/buckets/artifacts.k8s-infra-e2e-boskos-scale-01.appspot.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-01/buckets/artifacts.k8s-infra-e2e-boskos-scale-01.appspot.com/iam.json deleted file mode 100644 index 4b7496cc72a3..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-01/buckets/artifacts.k8s-infra-e2e-boskos-scale-01.appspot.com/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-01", - "projectOwner:k8s-infra-e2e-boskos-scale-01" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-01" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-01/buckets/artifacts.k8s-infra-e2e-boskos-scale-01.appspot.com/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-01/buckets/artifacts.k8s-infra-e2e-boskos-scale-01.appspot.com/logging.txt deleted file mode 100644 index 815dbc2b91b8..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-01/buckets/artifacts.k8s-infra-e2e-boskos-scale-01.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-infra-e2e-boskos-scale-01.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-01/buckets/kubernetes-staging-0164ec21c8/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-01/buckets/kubernetes-staging-0164ec21c8/bucketpolicyonly.txt deleted file mode 100644 index 1c9aa00f47bc..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-01/buckets/kubernetes-staging-0164ec21c8/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-0164ec21c8: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-01/buckets/kubernetes-staging-0164ec21c8/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-01/buckets/kubernetes-staging-0164ec21c8/cors.txt deleted file mode 100644 index 081818a706ae..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-01/buckets/kubernetes-staging-0164ec21c8/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-0164ec21c8/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-01/buckets/kubernetes-staging-0164ec21c8/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-01/buckets/kubernetes-staging-0164ec21c8/iam.json deleted file mode 100644 index 4b7496cc72a3..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-01/buckets/kubernetes-staging-0164ec21c8/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-01", - "projectOwner:k8s-infra-e2e-boskos-scale-01" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-01" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-01/buckets/kubernetes-staging-0164ec21c8/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-01/buckets/kubernetes-staging-0164ec21c8/logging.txt deleted file mode 100644 index bd74f7b74d93..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-01/buckets/kubernetes-staging-0164ec21c8/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-0164ec21c8/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-01/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-01/description.json deleted file mode 100644 index 47a36451c580..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-01/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-05-26T23:20:18.783Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-scale-01", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-scale-01", - "projectNumber": "40460865376" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-01/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-01/iam.json deleted file mode 100644 index d9100e6775f3..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-01/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-40460865376@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-40460865376@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:40460865376-compute@developer.gserviceaccount.com", - "serviceAccount:40460865376@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-01/service-accounts/40460865376-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-01/service-accounts/40460865376-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index fe2a01715074..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-01/service-accounts/40460865376-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "40460865376-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-scale-01/serviceAccounts/40460865376-compute@developer.gserviceaccount.com", - "oauth2ClientId": "104531253745867244065", - "projectId": "k8s-infra-e2e-boskos-scale-01", - "uniqueId": "104531253745867244065" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-01/service-accounts/40460865376-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-01/service-accounts/40460865376-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-01/service-accounts/40460865376-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-01/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-01/services/compute/project-info.json deleted file mode 100644 index 646ced6c1a35..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-01/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-05-26T16:20:31.143-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "40460865376-compute@developer.gserviceaccount.com", - "id": "5770691874643778257", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-scale-01", - "quotas": [ - { - "limit": 5000, - "metric": "SNAPSHOTS" - }, - { - "limit": 15, - "metric": "NETWORKS" - }, - { - "limit": 200, - "metric": "FIREWALLS" - }, - { - "limit": 2000, - "metric": "IMAGES" - }, - { - "limit": 21, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 250, - "metric": "ROUTES" - }, - { - "limit": 45, - "metric": "FORWARDING_RULES" - }, - { - "limit": 150, - "metric": "TARGET_POOLS" - }, - { - "limit": 150, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 69, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 150, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 30, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 30, - "metric": "URL_MAPS" - }, - { - "limit": 9, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 300, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 15, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 30, - "metric": "VPN_TUNNELS" - }, - { - "limit": 9, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 10, - "metric": "ROUTERS" - }, - { - "limit": 30, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 30, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 30, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 175, - "metric": "SUBNETWORKS" - }, - { - "limit": 30, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 100, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 45, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 300, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 15, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 2000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 15, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-01", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-01/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-01/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-01/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-02/buckets/kubernetes-staging-5c678d1e86/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-02/buckets/kubernetes-staging-5c678d1e86/bucketpolicyonly.txt deleted file mode 100644 index 3ada59a15439..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-02/buckets/kubernetes-staging-5c678d1e86/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-5c678d1e86: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-02/buckets/kubernetes-staging-5c678d1e86/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-02/buckets/kubernetes-staging-5c678d1e86/cors.txt deleted file mode 100644 index d8e11b5bbde5..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-02/buckets/kubernetes-staging-5c678d1e86/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-5c678d1e86/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-02/buckets/kubernetes-staging-5c678d1e86/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-02/buckets/kubernetes-staging-5c678d1e86/iam.json deleted file mode 100644 index 524436a323f9..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-02/buckets/kubernetes-staging-5c678d1e86/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-02", - "projectOwner:k8s-infra-e2e-boskos-scale-02" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-02" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-02/buckets/kubernetes-staging-5c678d1e86/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-02/buckets/kubernetes-staging-5c678d1e86/logging.txt deleted file mode 100644 index 3e265fc519cb..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-02/buckets/kubernetes-staging-5c678d1e86/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-5c678d1e86/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-02/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-02/description.json deleted file mode 100644 index b62b3fce6240..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-02/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-05-26T23:25:53.498Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-scale-02", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-scale-02", - "projectNumber": "660290009727" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-02/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-02/iam.json deleted file mode 100644 index 9b6f0c3a4071..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-02/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-660290009727@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-660290009727@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:660290009727-compute@developer.gserviceaccount.com", - "serviceAccount:660290009727@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-02/service-accounts/660290009727-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-02/service-accounts/660290009727-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 68c28c05b727..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-02/service-accounts/660290009727-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "660290009727-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-scale-02/serviceAccounts/660290009727-compute@developer.gserviceaccount.com", - "oauth2ClientId": "115516548101087659210", - "projectId": "k8s-infra-e2e-boskos-scale-02", - "uniqueId": "115516548101087659210" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-02/service-accounts/660290009727-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-02/service-accounts/660290009727-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-02/service-accounts/660290009727-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-02/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-02/services/compute/project-info.json deleted file mode 100644 index 53de4d0e308e..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-02/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-05-26T16:26:04.482-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "660290009727-compute@developer.gserviceaccount.com", - "id": "1411381574798154595", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-scale-02", - "quotas": [ - { - "limit": 5000, - "metric": "SNAPSHOTS" - }, - { - "limit": 15, - "metric": "NETWORKS" - }, - { - "limit": 200, - "metric": "FIREWALLS" - }, - { - "limit": 2000, - "metric": "IMAGES" - }, - { - "limit": 21, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 250, - "metric": "ROUTES" - }, - { - "limit": 45, - "metric": "FORWARDING_RULES" - }, - { - "limit": 150, - "metric": "TARGET_POOLS" - }, - { - "limit": 150, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 69, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 150, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 30, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 30, - "metric": "URL_MAPS" - }, - { - "limit": 9, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 300, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 15, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 30, - "metric": "VPN_TUNNELS" - }, - { - "limit": 9, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 10, - "metric": "ROUTERS" - }, - { - "limit": 30, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 30, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 30, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 175, - "metric": "SUBNETWORKS" - }, - { - "limit": 30, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 100, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 45, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 300, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 15, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 2000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 15, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-02", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-02/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-02/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-02/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-03/buckets/kubernetes-staging-29955e8a71/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-03/buckets/kubernetes-staging-29955e8a71/bucketpolicyonly.txt deleted file mode 100644 index 02d8017531af..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-03/buckets/kubernetes-staging-29955e8a71/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-29955e8a71: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-03/buckets/kubernetes-staging-29955e8a71/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-03/buckets/kubernetes-staging-29955e8a71/cors.txt deleted file mode 100644 index 95858649adc6..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-03/buckets/kubernetes-staging-29955e8a71/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-29955e8a71/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-03/buckets/kubernetes-staging-29955e8a71/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-03/buckets/kubernetes-staging-29955e8a71/iam.json deleted file mode 100644 index 876c7c33b571..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-03/buckets/kubernetes-staging-29955e8a71/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-03", - "projectOwner:k8s-infra-e2e-boskos-scale-03" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-03" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-03/buckets/kubernetes-staging-29955e8a71/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-03/buckets/kubernetes-staging-29955e8a71/logging.txt deleted file mode 100644 index 785d638de55a..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-03/buckets/kubernetes-staging-29955e8a71/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-29955e8a71/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-03/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-03/description.json deleted file mode 100644 index 244425504fb2..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-03/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-05-26T23:28:25.051Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-scale-03", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-scale-03", - "projectNumber": "647280784790" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-03/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-03/iam.json deleted file mode 100644 index 470801d86b35..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-03/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-647280784790@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-647280784790@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:647280784790-compute@developer.gserviceaccount.com", - "serviceAccount:647280784790@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-03/service-accounts/647280784790-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-03/service-accounts/647280784790-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 9ee7a8f3f9cf..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-03/service-accounts/647280784790-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "647280784790-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-scale-03/serviceAccounts/647280784790-compute@developer.gserviceaccount.com", - "oauth2ClientId": "100151099779485603662", - "projectId": "k8s-infra-e2e-boskos-scale-03", - "uniqueId": "100151099779485603662" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-03/service-accounts/647280784790-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-03/service-accounts/647280784790-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-03/service-accounts/647280784790-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-03/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-03/services/compute/project-info.json deleted file mode 100644 index 7cd57b0f15f2..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-03/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-05-26T16:28:37.003-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "647280784790-compute@developer.gserviceaccount.com", - "id": "7082145677322492107", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-scale-03", - "quotas": [ - { - "limit": 5000, - "metric": "SNAPSHOTS" - }, - { - "limit": 15, - "metric": "NETWORKS" - }, - { - "limit": 200, - "metric": "FIREWALLS" - }, - { - "limit": 2000, - "metric": "IMAGES" - }, - { - "limit": 21, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 250, - "metric": "ROUTES" - }, - { - "limit": 45, - "metric": "FORWARDING_RULES" - }, - { - "limit": 150, - "metric": "TARGET_POOLS" - }, - { - "limit": 150, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 69, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 150, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 30, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 30, - "metric": "URL_MAPS" - }, - { - "limit": 9, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 300, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 15, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 30, - "metric": "VPN_TUNNELS" - }, - { - "limit": 9, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 10, - "metric": "ROUTERS" - }, - { - "limit": 30, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 30, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 30, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 175, - "metric": "SUBNETWORKS" - }, - { - "limit": 30, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 100, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 45, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 300, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 15, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 2000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 15, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-03", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-03/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-03/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-03/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-04/buckets/artifacts.k8s-infra-e2e-boskos-scale-04.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-04/buckets/artifacts.k8s-infra-e2e-boskos-scale-04.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 2818b16dd0bc..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-04/buckets/artifacts.k8s-infra-e2e-boskos-scale-04.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-infra-e2e-boskos-scale-04.appspot.com: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-04/buckets/artifacts.k8s-infra-e2e-boskos-scale-04.appspot.com/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-04/buckets/artifacts.k8s-infra-e2e-boskos-scale-04.appspot.com/cors.txt deleted file mode 100644 index 174a05e9146f..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-04/buckets/artifacts.k8s-infra-e2e-boskos-scale-04.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-infra-e2e-boskos-scale-04.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-04/buckets/artifacts.k8s-infra-e2e-boskos-scale-04.appspot.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-04/buckets/artifacts.k8s-infra-e2e-boskos-scale-04.appspot.com/iam.json deleted file mode 100644 index 3d0329d8f74c..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-04/buckets/artifacts.k8s-infra-e2e-boskos-scale-04.appspot.com/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-04", - "projectOwner:k8s-infra-e2e-boskos-scale-04" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-04" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-04/buckets/artifacts.k8s-infra-e2e-boskos-scale-04.appspot.com/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-04/buckets/artifacts.k8s-infra-e2e-boskos-scale-04.appspot.com/logging.txt deleted file mode 100644 index e04373e9ec2f..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-04/buckets/artifacts.k8s-infra-e2e-boskos-scale-04.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-infra-e2e-boskos-scale-04.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-04/buckets/kubernetes-staging-195efd44db/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-04/buckets/kubernetes-staging-195efd44db/bucketpolicyonly.txt deleted file mode 100644 index f952bd3aebcc..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-04/buckets/kubernetes-staging-195efd44db/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-195efd44db: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-04/buckets/kubernetes-staging-195efd44db/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-04/buckets/kubernetes-staging-195efd44db/cors.txt deleted file mode 100644 index 24a969811b0c..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-04/buckets/kubernetes-staging-195efd44db/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-195efd44db/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-04/buckets/kubernetes-staging-195efd44db/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-04/buckets/kubernetes-staging-195efd44db/iam.json deleted file mode 100644 index 3d0329d8f74c..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-04/buckets/kubernetes-staging-195efd44db/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-04", - "projectOwner:k8s-infra-e2e-boskos-scale-04" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-04" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-04/buckets/kubernetes-staging-195efd44db/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-04/buckets/kubernetes-staging-195efd44db/logging.txt deleted file mode 100644 index a589c61fccb0..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-04/buckets/kubernetes-staging-195efd44db/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-195efd44db/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-04/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-04/description.json deleted file mode 100644 index d7ad47ec4d90..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-04/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-05-26T23:31:18.369Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-scale-04", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-scale-04", - "projectNumber": "881216629017" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-04/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-04/iam.json deleted file mode 100644 index 4ad8b5889b4d..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-04/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-881216629017@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-881216629017@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:881216629017-compute@developer.gserviceaccount.com", - "serviceAccount:881216629017@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-04/service-accounts/881216629017-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-04/service-accounts/881216629017-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 2e17b33dfbc4..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-04/service-accounts/881216629017-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "881216629017-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-scale-04/serviceAccounts/881216629017-compute@developer.gserviceaccount.com", - "oauth2ClientId": "109635661273499876135", - "projectId": "k8s-infra-e2e-boskos-scale-04", - "uniqueId": "109635661273499876135" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-04/service-accounts/881216629017-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-04/service-accounts/881216629017-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-04/service-accounts/881216629017-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-04/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-04/services/compute/project-info.json deleted file mode 100644 index 11239388d824..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-04/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-05-26T16:31:29.365-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "881216629017-compute@developer.gserviceaccount.com", - "id": "8007870425652533310", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-scale-04", - "quotas": [ - { - "limit": 5000, - "metric": "SNAPSHOTS" - }, - { - "limit": 15, - "metric": "NETWORKS" - }, - { - "limit": 200, - "metric": "FIREWALLS" - }, - { - "limit": 2000, - "metric": "IMAGES" - }, - { - "limit": 21, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 250, - "metric": "ROUTES" - }, - { - "limit": 45, - "metric": "FORWARDING_RULES" - }, - { - "limit": 150, - "metric": "TARGET_POOLS" - }, - { - "limit": 150, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 69, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 150, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 30, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 30, - "metric": "URL_MAPS" - }, - { - "limit": 9, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 300, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 15, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 30, - "metric": "VPN_TUNNELS" - }, - { - "limit": 9, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 10, - "metric": "ROUTERS" - }, - { - "limit": 30, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 30, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 30, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 175, - "metric": "SUBNETWORKS" - }, - { - "limit": 30, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 100, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 45, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 300, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 15, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 2000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 15, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-04", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-04/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-04/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-04/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-05/buckets/kubernetes-staging-65062dd307/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-05/buckets/kubernetes-staging-65062dd307/bucketpolicyonly.txt deleted file mode 100644 index 7e4dfcaa1061..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-05/buckets/kubernetes-staging-65062dd307/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-65062dd307: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-05/buckets/kubernetes-staging-65062dd307/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-05/buckets/kubernetes-staging-65062dd307/cors.txt deleted file mode 100644 index 2468c0abbe2b..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-05/buckets/kubernetes-staging-65062dd307/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-65062dd307/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-05/buckets/kubernetes-staging-65062dd307/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-05/buckets/kubernetes-staging-65062dd307/iam.json deleted file mode 100644 index d9fb158132d4..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-05/buckets/kubernetes-staging-65062dd307/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-05", - "projectOwner:k8s-infra-e2e-boskos-scale-05" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-05" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-05/buckets/kubernetes-staging-65062dd307/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-05/buckets/kubernetes-staging-65062dd307/logging.txt deleted file mode 100644 index f45f0965529d..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-05/buckets/kubernetes-staging-65062dd307/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-65062dd307/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-05/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-05/description.json deleted file mode 100644 index 29add26688e6..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-05/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-05-26T23:34:09.150Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-scale-05", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-scale-05", - "projectNumber": "303929844117" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-05/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-05/iam.json deleted file mode 100644 index 55151d102c63..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-05/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-303929844117@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-303929844117@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:303929844117-compute@developer.gserviceaccount.com", - "serviceAccount:303929844117@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-05/service-accounts/303929844117-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-05/service-accounts/303929844117-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 797e734c05e9..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-05/service-accounts/303929844117-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "303929844117-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-scale-05/serviceAccounts/303929844117-compute@developer.gserviceaccount.com", - "oauth2ClientId": "104531693407975921739", - "projectId": "k8s-infra-e2e-boskos-scale-05", - "uniqueId": "104531693407975921739" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-05/service-accounts/303929844117-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-05/service-accounts/303929844117-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-05/service-accounts/303929844117-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-05/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-05/services/compute/project-info.json deleted file mode 100644 index b46e8781f42a..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-05/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-05-26T16:34:21.606-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "303929844117-compute@developer.gserviceaccount.com", - "id": "3399347203962050962", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-scale-05", - "quotas": [ - { - "limit": 5000, - "metric": "SNAPSHOTS" - }, - { - "limit": 15, - "metric": "NETWORKS" - }, - { - "limit": 200, - "metric": "FIREWALLS" - }, - { - "limit": 2000, - "metric": "IMAGES" - }, - { - "limit": 21, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 250, - "metric": "ROUTES" - }, - { - "limit": 45, - "metric": "FORWARDING_RULES" - }, - { - "limit": 150, - "metric": "TARGET_POOLS" - }, - { - "limit": 150, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 69, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 150, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 30, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 30, - "metric": "URL_MAPS" - }, - { - "limit": 9, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 300, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 15, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 30, - "metric": "VPN_TUNNELS" - }, - { - "limit": 9, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 10, - "metric": "ROUTERS" - }, - { - "limit": 30, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 30, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 30, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 175, - "metric": "SUBNETWORKS" - }, - { - "limit": 30, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 100, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 45, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 300, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 15, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 2000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 15, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-05", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-05/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-05/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-05/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-06/buckets/kubernetes-staging-74a4e984af/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-06/buckets/kubernetes-staging-74a4e984af/bucketpolicyonly.txt deleted file mode 100644 index a67250fe2070..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-06/buckets/kubernetes-staging-74a4e984af/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-74a4e984af: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-06/buckets/kubernetes-staging-74a4e984af/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-06/buckets/kubernetes-staging-74a4e984af/cors.txt deleted file mode 100644 index ccf460089dba..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-06/buckets/kubernetes-staging-74a4e984af/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-74a4e984af/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-06/buckets/kubernetes-staging-74a4e984af/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-06/buckets/kubernetes-staging-74a4e984af/iam.json deleted file mode 100644 index 135a7f9184fe..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-06/buckets/kubernetes-staging-74a4e984af/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-06", - "projectOwner:k8s-infra-e2e-boskos-scale-06" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-06" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-06/buckets/kubernetes-staging-74a4e984af/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-06/buckets/kubernetes-staging-74a4e984af/logging.txt deleted file mode 100644 index 733f8cb69935..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-06/buckets/kubernetes-staging-74a4e984af/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-74a4e984af/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-06/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-06/description.json deleted file mode 100644 index 625656172eb3..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-06/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-19T23:15:58.114Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-scale-06", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-scale-06", - "projectNumber": "896865780972" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-06/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-06/iam.json deleted file mode 100644 index 5a359ede73ed..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-06/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-896865780972@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-896865780972@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:896865780972-compute@developer.gserviceaccount.com", - "serviceAccount:896865780972@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-06/service-accounts/896865780972-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-06/service-accounts/896865780972-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 0d45d68b25c0..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-06/service-accounts/896865780972-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "896865780972-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-scale-06/serviceAccounts/896865780972-compute@developer.gserviceaccount.com", - "oauth2ClientId": "100022940934816975100", - "projectId": "k8s-infra-e2e-boskos-scale-06", - "uniqueId": "100022940934816975100" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-06/service-accounts/896865780972-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-06/service-accounts/896865780972-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-06/service-accounts/896865780972-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-06/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-06/services/compute/project-info.json deleted file mode 100644 index 35c485e6ed63..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-06/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-19T16:16:08.246-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "896865780972-compute@developer.gserviceaccount.com", - "id": "7303069290286025816", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-scale-06", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-06", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-06/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-06/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-06/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-07/buckets/kubernetes-staging-a06fd56271/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-07/buckets/kubernetes-staging-a06fd56271/bucketpolicyonly.txt deleted file mode 100644 index 18c8c7f0a857..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-07/buckets/kubernetes-staging-a06fd56271/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-a06fd56271: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-07/buckets/kubernetes-staging-a06fd56271/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-07/buckets/kubernetes-staging-a06fd56271/cors.txt deleted file mode 100644 index 3889bd0c263f..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-07/buckets/kubernetes-staging-a06fd56271/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-a06fd56271/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-07/buckets/kubernetes-staging-a06fd56271/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-07/buckets/kubernetes-staging-a06fd56271/iam.json deleted file mode 100644 index 102ebb6f0a0b..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-07/buckets/kubernetes-staging-a06fd56271/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-07", - "projectOwner:k8s-infra-e2e-boskos-scale-07" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-07" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-07/buckets/kubernetes-staging-a06fd56271/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-07/buckets/kubernetes-staging-a06fd56271/logging.txt deleted file mode 100644 index 77d683d92b9c..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-07/buckets/kubernetes-staging-a06fd56271/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-a06fd56271/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-07/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-07/description.json deleted file mode 100644 index a990601adf57..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-07/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-19T23:18:03.416Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-scale-07", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-scale-07", - "projectNumber": "908953038229" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-07/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-07/iam.json deleted file mode 100644 index 1347b6c35e77..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-07/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-908953038229@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-908953038229@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:908953038229-compute@developer.gserviceaccount.com", - "serviceAccount:908953038229@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-07/service-accounts/908953038229-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-07/service-accounts/908953038229-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 147bcf7b2fd8..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-07/service-accounts/908953038229-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "908953038229-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-scale-07/serviceAccounts/908953038229-compute@developer.gserviceaccount.com", - "oauth2ClientId": "101674490025563401550", - "projectId": "k8s-infra-e2e-boskos-scale-07", - "uniqueId": "101674490025563401550" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-07/service-accounts/908953038229-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-07/service-accounts/908953038229-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-07/service-accounts/908953038229-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-07/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-07/services/compute/project-info.json deleted file mode 100644 index 614014b7363c..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-07/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-19T16:18:13.749-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "908953038229-compute@developer.gserviceaccount.com", - "id": "5020832580972318170", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-scale-07", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-07", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-07/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-07/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-07/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-08/buckets/kubernetes-staging-181e2e3096/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-08/buckets/kubernetes-staging-181e2e3096/bucketpolicyonly.txt deleted file mode 100644 index fad4903d5652..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-08/buckets/kubernetes-staging-181e2e3096/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-181e2e3096: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-08/buckets/kubernetes-staging-181e2e3096/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-08/buckets/kubernetes-staging-181e2e3096/cors.txt deleted file mode 100644 index 119621183814..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-08/buckets/kubernetes-staging-181e2e3096/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-181e2e3096/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-08/buckets/kubernetes-staging-181e2e3096/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-08/buckets/kubernetes-staging-181e2e3096/iam.json deleted file mode 100644 index 979cbe4334d2..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-08/buckets/kubernetes-staging-181e2e3096/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-08", - "projectOwner:k8s-infra-e2e-boskos-scale-08" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-08" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-08/buckets/kubernetes-staging-181e2e3096/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-08/buckets/kubernetes-staging-181e2e3096/logging.txt deleted file mode 100644 index 6bff18361049..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-08/buckets/kubernetes-staging-181e2e3096/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-181e2e3096/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-08/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-08/description.json deleted file mode 100644 index 36dee61bbea4..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-08/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-19T23:20:04.795Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-scale-08", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-scale-08", - "projectNumber": "380176220624" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-08/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-08/iam.json deleted file mode 100644 index b50d14f25c53..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-08/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-380176220624@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-380176220624@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:380176220624-compute@developer.gserviceaccount.com", - "serviceAccount:380176220624@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-08/service-accounts/380176220624-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-08/service-accounts/380176220624-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 80bd54e733d9..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-08/service-accounts/380176220624-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "380176220624-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-scale-08/serviceAccounts/380176220624-compute@developer.gserviceaccount.com", - "oauth2ClientId": "101025234962604210991", - "projectId": "k8s-infra-e2e-boskos-scale-08", - "uniqueId": "101025234962604210991" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-08/service-accounts/380176220624-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-08/service-accounts/380176220624-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-08/service-accounts/380176220624-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-08/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-08/services/compute/project-info.json deleted file mode 100644 index a075bb5e6429..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-08/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-19T16:20:15.462-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "380176220624-compute@developer.gserviceaccount.com", - "id": "6538252618367503680", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-scale-08", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-08", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-08/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-08/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-08/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-09/buckets/artifacts.k8s-infra-e2e-boskos-scale-09.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-09/buckets/artifacts.k8s-infra-e2e-boskos-scale-09.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 4ec0338998b3..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-09/buckets/artifacts.k8s-infra-e2e-boskos-scale-09.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-infra-e2e-boskos-scale-09.appspot.com: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-09/buckets/artifacts.k8s-infra-e2e-boskos-scale-09.appspot.com/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-09/buckets/artifacts.k8s-infra-e2e-boskos-scale-09.appspot.com/cors.txt deleted file mode 100644 index 51c4626c18e1..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-09/buckets/artifacts.k8s-infra-e2e-boskos-scale-09.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-infra-e2e-boskos-scale-09.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-09/buckets/artifacts.k8s-infra-e2e-boskos-scale-09.appspot.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-09/buckets/artifacts.k8s-infra-e2e-boskos-scale-09.appspot.com/iam.json deleted file mode 100644 index dabadc23447b..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-09/buckets/artifacts.k8s-infra-e2e-boskos-scale-09.appspot.com/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-09", - "projectOwner:k8s-infra-e2e-boskos-scale-09" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-09" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-09/buckets/artifacts.k8s-infra-e2e-boskos-scale-09.appspot.com/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-09/buckets/artifacts.k8s-infra-e2e-boskos-scale-09.appspot.com/logging.txt deleted file mode 100644 index b0da32d649bf..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-09/buckets/artifacts.k8s-infra-e2e-boskos-scale-09.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-infra-e2e-boskos-scale-09.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-09/buckets/kubernetes-staging-11e949d58c/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-09/buckets/kubernetes-staging-11e949d58c/bucketpolicyonly.txt deleted file mode 100644 index ec63ef5dd53f..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-09/buckets/kubernetes-staging-11e949d58c/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-11e949d58c: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-09/buckets/kubernetes-staging-11e949d58c/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-09/buckets/kubernetes-staging-11e949d58c/cors.txt deleted file mode 100644 index 5c7b450e19d2..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-09/buckets/kubernetes-staging-11e949d58c/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-11e949d58c/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-09/buckets/kubernetes-staging-11e949d58c/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-09/buckets/kubernetes-staging-11e949d58c/iam.json deleted file mode 100644 index dabadc23447b..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-09/buckets/kubernetes-staging-11e949d58c/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-09", - "projectOwner:k8s-infra-e2e-boskos-scale-09" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-09" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-09/buckets/kubernetes-staging-11e949d58c/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-09/buckets/kubernetes-staging-11e949d58c/logging.txt deleted file mode 100644 index 92dead19c46d..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-09/buckets/kubernetes-staging-11e949d58c/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-11e949d58c/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-09/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-09/description.json deleted file mode 100644 index 3dd76ab7364d..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-09/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-19T23:21:47.201Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-scale-09", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-scale-09", - "projectNumber": "514023723791" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-09/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-09/iam.json deleted file mode 100644 index 9f5c2e33b040..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-09/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-514023723791@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-514023723791@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:514023723791-compute@developer.gserviceaccount.com", - "serviceAccount:514023723791@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-09/service-accounts/514023723791-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-09/service-accounts/514023723791-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index e43f64460462..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-09/service-accounts/514023723791-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "514023723791-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-scale-09/serviceAccounts/514023723791-compute@developer.gserviceaccount.com", - "oauth2ClientId": "115616162590942918592", - "projectId": "k8s-infra-e2e-boskos-scale-09", - "uniqueId": "115616162590942918592" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-09/service-accounts/514023723791-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-09/service-accounts/514023723791-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-09/service-accounts/514023723791-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-09/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-09/services/compute/project-info.json deleted file mode 100644 index 74ea4e349e29..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-09/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-19T16:21:58.645-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "514023723791-compute@developer.gserviceaccount.com", - "id": "3157123606971943673", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-scale-09", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-09", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-09/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-09/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-09/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-10/buckets/artifacts.k8s-infra-e2e-boskos-scale-10.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-10/buckets/artifacts.k8s-infra-e2e-boskos-scale-10.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index edc7116f58ec..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-10/buckets/artifacts.k8s-infra-e2e-boskos-scale-10.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-infra-e2e-boskos-scale-10.appspot.com: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-10/buckets/artifacts.k8s-infra-e2e-boskos-scale-10.appspot.com/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-10/buckets/artifacts.k8s-infra-e2e-boskos-scale-10.appspot.com/cors.txt deleted file mode 100644 index 918cb110e979..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-10/buckets/artifacts.k8s-infra-e2e-boskos-scale-10.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-infra-e2e-boskos-scale-10.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-10/buckets/artifacts.k8s-infra-e2e-boskos-scale-10.appspot.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-10/buckets/artifacts.k8s-infra-e2e-boskos-scale-10.appspot.com/iam.json deleted file mode 100644 index ea9fc8422627..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-10/buckets/artifacts.k8s-infra-e2e-boskos-scale-10.appspot.com/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-10", - "projectOwner:k8s-infra-e2e-boskos-scale-10" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-10" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-10/buckets/artifacts.k8s-infra-e2e-boskos-scale-10.appspot.com/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-10/buckets/artifacts.k8s-infra-e2e-boskos-scale-10.appspot.com/logging.txt deleted file mode 100644 index a4e616356df0..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-10/buckets/artifacts.k8s-infra-e2e-boskos-scale-10.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-infra-e2e-boskos-scale-10.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-10/buckets/kubernetes-staging-fd68dabe88/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-10/buckets/kubernetes-staging-fd68dabe88/bucketpolicyonly.txt deleted file mode 100644 index 64b51dc0e9ff..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-10/buckets/kubernetes-staging-fd68dabe88/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-fd68dabe88: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-10/buckets/kubernetes-staging-fd68dabe88/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-10/buckets/kubernetes-staging-fd68dabe88/cors.txt deleted file mode 100644 index 710c8845e59a..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-10/buckets/kubernetes-staging-fd68dabe88/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-fd68dabe88/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-10/buckets/kubernetes-staging-fd68dabe88/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-10/buckets/kubernetes-staging-fd68dabe88/iam.json deleted file mode 100644 index ea9fc8422627..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-10/buckets/kubernetes-staging-fd68dabe88/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-10", - "projectOwner:k8s-infra-e2e-boskos-scale-10" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-10" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-10/buckets/kubernetes-staging-fd68dabe88/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-10/buckets/kubernetes-staging-fd68dabe88/logging.txt deleted file mode 100644 index f9641b59cee1..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-10/buckets/kubernetes-staging-fd68dabe88/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-fd68dabe88/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-10/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-10/description.json deleted file mode 100644 index 5aa996a6d338..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-10/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-19T23:23:54.072Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-scale-10", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-scale-10", - "projectNumber": "832452291707" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-10/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-10/iam.json deleted file mode 100644 index 10cc68d630f9..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-10/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-832452291707@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-832452291707@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:832452291707-compute@developer.gserviceaccount.com", - "serviceAccount:832452291707@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-10/service-accounts/832452291707-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-10/service-accounts/832452291707-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index f4e6094eabd5..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-10/service-accounts/832452291707-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "832452291707-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-scale-10/serviceAccounts/832452291707-compute@developer.gserviceaccount.com", - "oauth2ClientId": "104737072951398405868", - "projectId": "k8s-infra-e2e-boskos-scale-10", - "uniqueId": "104737072951398405868" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-10/service-accounts/832452291707-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-10/service-accounts/832452291707-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-10/service-accounts/832452291707-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-10/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-10/services/compute/project-info.json deleted file mode 100644 index 93493efe1a3f..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-10/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-19T16:24:04.925-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "832452291707-compute@developer.gserviceaccount.com", - "id": "5894295699093195387", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-scale-10", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-10", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-10/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-10/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-10/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-11/buckets/kubernetes-staging-20b0a8d25a/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-11/buckets/kubernetes-staging-20b0a8d25a/bucketpolicyonly.txt deleted file mode 100644 index 18023ab5980d..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-11/buckets/kubernetes-staging-20b0a8d25a/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-20b0a8d25a: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-11/buckets/kubernetes-staging-20b0a8d25a/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-11/buckets/kubernetes-staging-20b0a8d25a/cors.txt deleted file mode 100644 index c8056ae10589..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-11/buckets/kubernetes-staging-20b0a8d25a/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-20b0a8d25a/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-11/buckets/kubernetes-staging-20b0a8d25a/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-11/buckets/kubernetes-staging-20b0a8d25a/iam.json deleted file mode 100644 index a0b36616a86b..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-11/buckets/kubernetes-staging-20b0a8d25a/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-11", - "projectOwner:k8s-infra-e2e-boskos-scale-11" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-11" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-11/buckets/kubernetes-staging-20b0a8d25a/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-11/buckets/kubernetes-staging-20b0a8d25a/logging.txt deleted file mode 100644 index 6cc4012e0cc8..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-11/buckets/kubernetes-staging-20b0a8d25a/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-20b0a8d25a/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-11/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-11/description.json deleted file mode 100644 index 6f58f6798d80..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-11/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-19T23:25:56.587Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-scale-11", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-scale-11", - "projectNumber": "835090643128" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-11/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-11/iam.json deleted file mode 100644 index 8227d51ce4c2..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-11/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-835090643128@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-835090643128@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:835090643128-compute@developer.gserviceaccount.com", - "serviceAccount:835090643128@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-11/service-accounts/835090643128-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-11/service-accounts/835090643128-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 5a50d768b192..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-11/service-accounts/835090643128-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "835090643128-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-scale-11/serviceAccounts/835090643128-compute@developer.gserviceaccount.com", - "oauth2ClientId": "107451015651544656503", - "projectId": "k8s-infra-e2e-boskos-scale-11", - "uniqueId": "107451015651544656503" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-11/service-accounts/835090643128-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-11/service-accounts/835090643128-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-11/service-accounts/835090643128-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-11/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-11/services/compute/project-info.json deleted file mode 100644 index f12f4153fc6a..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-11/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-19T16:26:05.721-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "835090643128-compute@developer.gserviceaccount.com", - "id": "7029727259352108002", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-scale-11", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-11", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-11/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-11/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-11/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-12/buckets/kubernetes-staging-7c618dfabd/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-12/buckets/kubernetes-staging-7c618dfabd/bucketpolicyonly.txt deleted file mode 100644 index a896245aa1a6..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-12/buckets/kubernetes-staging-7c618dfabd/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-7c618dfabd: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-12/buckets/kubernetes-staging-7c618dfabd/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-12/buckets/kubernetes-staging-7c618dfabd/cors.txt deleted file mode 100644 index 34deaae3d77d..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-12/buckets/kubernetes-staging-7c618dfabd/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-7c618dfabd/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-12/buckets/kubernetes-staging-7c618dfabd/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-12/buckets/kubernetes-staging-7c618dfabd/iam.json deleted file mode 100644 index 47e4de2f5f40..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-12/buckets/kubernetes-staging-7c618dfabd/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-12", - "projectOwner:k8s-infra-e2e-boskos-scale-12" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-12" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-12/buckets/kubernetes-staging-7c618dfabd/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-12/buckets/kubernetes-staging-7c618dfabd/logging.txt deleted file mode 100644 index 4da8a20e247e..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-12/buckets/kubernetes-staging-7c618dfabd/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-7c618dfabd/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-12/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-12/description.json deleted file mode 100644 index 6d1dfba0cdfd..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-12/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-19T23:27:54.395Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-scale-12", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-scale-12", - "projectNumber": "692227742238" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-12/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-12/iam.json deleted file mode 100644 index b660d1aa4bed..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-12/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-692227742238@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-692227742238@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:692227742238-compute@developer.gserviceaccount.com", - "serviceAccount:692227742238@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/iam.serviceAccountUser" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-12/service-accounts/692227742238-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-12/service-accounts/692227742238-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index f17be43c60c9..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-12/service-accounts/692227742238-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "692227742238-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-scale-12/serviceAccounts/692227742238-compute@developer.gserviceaccount.com", - "oauth2ClientId": "107315553107056386426", - "projectId": "k8s-infra-e2e-boskos-scale-12", - "uniqueId": "107315553107056386426" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-12/service-accounts/692227742238-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-12/service-accounts/692227742238-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-12/service-accounts/692227742238-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-12/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-12/services/compute/project-info.json deleted file mode 100644 index 276bdffb3cd8..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-12/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\n" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-19T16:28:04.094-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "692227742238-compute@developer.gserviceaccount.com", - "id": "4012746543341767532", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-scale-12", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-12", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-12/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-12/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-12/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-13/buckets/kubernetes-staging-5e1d5383f0/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-13/buckets/kubernetes-staging-5e1d5383f0/bucketpolicyonly.txt deleted file mode 100644 index 839cb0ae82a2..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-13/buckets/kubernetes-staging-5e1d5383f0/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-5e1d5383f0: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-13/buckets/kubernetes-staging-5e1d5383f0/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-13/buckets/kubernetes-staging-5e1d5383f0/cors.txt deleted file mode 100644 index f6aff15a9014..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-13/buckets/kubernetes-staging-5e1d5383f0/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-5e1d5383f0/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-13/buckets/kubernetes-staging-5e1d5383f0/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-13/buckets/kubernetes-staging-5e1d5383f0/iam.json deleted file mode 100644 index fc6fcd767d95..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-13/buckets/kubernetes-staging-5e1d5383f0/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-13", - "projectOwner:k8s-infra-e2e-boskos-scale-13" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-13" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-13/buckets/kubernetes-staging-5e1d5383f0/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-13/buckets/kubernetes-staging-5e1d5383f0/logging.txt deleted file mode 100644 index 12ecd58bd29a..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-13/buckets/kubernetes-staging-5e1d5383f0/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-5e1d5383f0/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-13/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-13/description.json deleted file mode 100644 index 88a3122336a8..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-13/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-19T23:29:52.869Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-scale-13", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-scale-13", - "projectNumber": "717643192189" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-13/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-13/iam.json deleted file mode 100644 index 788d93d3061c..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-13/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-717643192189@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-717643192189@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:717643192189-compute@developer.gserviceaccount.com", - "serviceAccount:717643192189@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-13/service-accounts/717643192189-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-13/service-accounts/717643192189-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index be623e1d5615..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-13/service-accounts/717643192189-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "717643192189-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-scale-13/serviceAccounts/717643192189-compute@developer.gserviceaccount.com", - "oauth2ClientId": "106529918226753821901", - "projectId": "k8s-infra-e2e-boskos-scale-13", - "uniqueId": "106529918226753821901" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-13/service-accounts/717643192189-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-13/service-accounts/717643192189-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-13/service-accounts/717643192189-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-13/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-13/services/compute/project-info.json deleted file mode 100644 index 9ca428a68b03..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-13/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-19T16:30:03.360-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "717643192189-compute@developer.gserviceaccount.com", - "id": "9191155923132877589", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-scale-13", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-13", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-13/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-13/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-13/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-14/buckets/kubernetes-staging-fbef914a88/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-14/buckets/kubernetes-staging-fbef914a88/bucketpolicyonly.txt deleted file mode 100644 index aed816fec6a9..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-14/buckets/kubernetes-staging-fbef914a88/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-fbef914a88: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-14/buckets/kubernetes-staging-fbef914a88/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-14/buckets/kubernetes-staging-fbef914a88/cors.txt deleted file mode 100644 index 15a772f6ff3e..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-14/buckets/kubernetes-staging-fbef914a88/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-fbef914a88/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-14/buckets/kubernetes-staging-fbef914a88/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-14/buckets/kubernetes-staging-fbef914a88/iam.json deleted file mode 100644 index c5f246fa003c..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-14/buckets/kubernetes-staging-fbef914a88/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-14", - "projectOwner:k8s-infra-e2e-boskos-scale-14" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-14" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-14/buckets/kubernetes-staging-fbef914a88/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-14/buckets/kubernetes-staging-fbef914a88/logging.txt deleted file mode 100644 index 34225f078d72..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-14/buckets/kubernetes-staging-fbef914a88/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-fbef914a88/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-14/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-14/description.json deleted file mode 100644 index cc879b37e068..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-14/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-19T23:32:03.018Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-scale-14", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-scale-14", - "projectNumber": "852293948802" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-14/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-14/iam.json deleted file mode 100644 index 0948aca054a5..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-14/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-852293948802@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-852293948802@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:852293948802-compute@developer.gserviceaccount.com", - "serviceAccount:852293948802@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-14/service-accounts/852293948802-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-14/service-accounts/852293948802-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 7b000d140472..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-14/service-accounts/852293948802-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "852293948802-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-scale-14/serviceAccounts/852293948802-compute@developer.gserviceaccount.com", - "oauth2ClientId": "118273172606953267206", - "projectId": "k8s-infra-e2e-boskos-scale-14", - "uniqueId": "118273172606953267206" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-14/service-accounts/852293948802-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-14/service-accounts/852293948802-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-14/service-accounts/852293948802-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-14/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-14/services/compute/project-info.json deleted file mode 100644 index dcf56bceffb6..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-14/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-19T16:32:26.836-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "852293948802-compute@developer.gserviceaccount.com", - "id": "7299601701194958949", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-scale-14", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-14", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-14/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-14/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-14/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-15/buckets/artifacts.k8s-infra-e2e-boskos-scale-15.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-15/buckets/artifacts.k8s-infra-e2e-boskos-scale-15.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 7502492f65d3..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-15/buckets/artifacts.k8s-infra-e2e-boskos-scale-15.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-infra-e2e-boskos-scale-15.appspot.com: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-15/buckets/artifacts.k8s-infra-e2e-boskos-scale-15.appspot.com/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-15/buckets/artifacts.k8s-infra-e2e-boskos-scale-15.appspot.com/cors.txt deleted file mode 100644 index b8a3f5216fcc..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-15/buckets/artifacts.k8s-infra-e2e-boskos-scale-15.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-infra-e2e-boskos-scale-15.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-15/buckets/artifacts.k8s-infra-e2e-boskos-scale-15.appspot.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-15/buckets/artifacts.k8s-infra-e2e-boskos-scale-15.appspot.com/iam.json deleted file mode 100644 index 031f3e5dbb40..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-15/buckets/artifacts.k8s-infra-e2e-boskos-scale-15.appspot.com/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-15", - "projectOwner:k8s-infra-e2e-boskos-scale-15" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-15" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-15/buckets/artifacts.k8s-infra-e2e-boskos-scale-15.appspot.com/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-15/buckets/artifacts.k8s-infra-e2e-boskos-scale-15.appspot.com/logging.txt deleted file mode 100644 index 96899f9295c1..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-15/buckets/artifacts.k8s-infra-e2e-boskos-scale-15.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-infra-e2e-boskos-scale-15.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-15/buckets/kubernetes-staging-0a4b05dea6/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-15/buckets/kubernetes-staging-0a4b05dea6/bucketpolicyonly.txt deleted file mode 100644 index 9adfc6793b61..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-15/buckets/kubernetes-staging-0a4b05dea6/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-0a4b05dea6: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-15/buckets/kubernetes-staging-0a4b05dea6/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-15/buckets/kubernetes-staging-0a4b05dea6/cors.txt deleted file mode 100644 index 2f0e777c73a7..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-15/buckets/kubernetes-staging-0a4b05dea6/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-0a4b05dea6/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-15/buckets/kubernetes-staging-0a4b05dea6/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-15/buckets/kubernetes-staging-0a4b05dea6/iam.json deleted file mode 100644 index 031f3e5dbb40..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-15/buckets/kubernetes-staging-0a4b05dea6/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-15", - "projectOwner:k8s-infra-e2e-boskos-scale-15" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-15" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-15/buckets/kubernetes-staging-0a4b05dea6/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-15/buckets/kubernetes-staging-0a4b05dea6/logging.txt deleted file mode 100644 index d92e311c3af2..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-15/buckets/kubernetes-staging-0a4b05dea6/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-0a4b05dea6/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-15/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-15/description.json deleted file mode 100644 index 3925511cf1e6..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-15/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-19T23:34:12.127Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-scale-15", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-scale-15", - "projectNumber": "392103292135" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-15/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-15/iam.json deleted file mode 100644 index a1959edf39e1..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-15/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-392103292135@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-392103292135@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:392103292135-compute@developer.gserviceaccount.com", - "serviceAccount:392103292135@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-15/service-accounts/392103292135-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-15/service-accounts/392103292135-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 0e215bebeaac..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-15/service-accounts/392103292135-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "392103292135-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-scale-15/serviceAccounts/392103292135-compute@developer.gserviceaccount.com", - "oauth2ClientId": "103285314938452126888", - "projectId": "k8s-infra-e2e-boskos-scale-15", - "uniqueId": "103285314938452126888" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-15/service-accounts/392103292135-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-15/service-accounts/392103292135-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-15/service-accounts/392103292135-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-15/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-15/services/compute/project-info.json deleted file mode 100644 index bca35e3043aa..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-15/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-19T16:34:22.332-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "392103292135-compute@developer.gserviceaccount.com", - "id": "1191169530581223441", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-scale-15", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-15", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-15/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-15/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-15/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-16/buckets/artifacts.k8s-infra-e2e-boskos-scale-16.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-16/buckets/artifacts.k8s-infra-e2e-boskos-scale-16.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 791fa24c9233..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-16/buckets/artifacts.k8s-infra-e2e-boskos-scale-16.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-infra-e2e-boskos-scale-16.appspot.com: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-16/buckets/artifacts.k8s-infra-e2e-boskos-scale-16.appspot.com/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-16/buckets/artifacts.k8s-infra-e2e-boskos-scale-16.appspot.com/cors.txt deleted file mode 100644 index 6e8c2dd46e4d..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-16/buckets/artifacts.k8s-infra-e2e-boskos-scale-16.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-infra-e2e-boskos-scale-16.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-16/buckets/artifacts.k8s-infra-e2e-boskos-scale-16.appspot.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-16/buckets/artifacts.k8s-infra-e2e-boskos-scale-16.appspot.com/iam.json deleted file mode 100644 index d5a79f651453..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-16/buckets/artifacts.k8s-infra-e2e-boskos-scale-16.appspot.com/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-16", - "projectOwner:k8s-infra-e2e-boskos-scale-16" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-16" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-16/buckets/artifacts.k8s-infra-e2e-boskos-scale-16.appspot.com/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-16/buckets/artifacts.k8s-infra-e2e-boskos-scale-16.appspot.com/logging.txt deleted file mode 100644 index cc287897bd49..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-16/buckets/artifacts.k8s-infra-e2e-boskos-scale-16.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-infra-e2e-boskos-scale-16.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-16/buckets/kubernetes-staging-796a61e53e/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-16/buckets/kubernetes-staging-796a61e53e/bucketpolicyonly.txt deleted file mode 100644 index f0281ec6bede..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-16/buckets/kubernetes-staging-796a61e53e/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-796a61e53e: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-16/buckets/kubernetes-staging-796a61e53e/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-16/buckets/kubernetes-staging-796a61e53e/cors.txt deleted file mode 100644 index 7944417b3018..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-16/buckets/kubernetes-staging-796a61e53e/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-796a61e53e/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-16/buckets/kubernetes-staging-796a61e53e/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-16/buckets/kubernetes-staging-796a61e53e/iam.json deleted file mode 100644 index d5a79f651453..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-16/buckets/kubernetes-staging-796a61e53e/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-16", - "projectOwner:k8s-infra-e2e-boskos-scale-16" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-16" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-16/buckets/kubernetes-staging-796a61e53e/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-16/buckets/kubernetes-staging-796a61e53e/logging.txt deleted file mode 100644 index e1f0fe1a2ea7..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-16/buckets/kubernetes-staging-796a61e53e/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-796a61e53e/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-16/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-16/description.json deleted file mode 100644 index f1a18918ac28..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-16/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-30T02:10:19.241Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-scale-16", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-scale-16", - "projectNumber": "151914219077" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-16/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-16/iam.json deleted file mode 100644 index 298ff329adcf..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-16/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-151914219077@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-151914219077@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:151914219077-compute@developer.gserviceaccount.com", - "serviceAccount:151914219077@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-16/service-accounts/151914219077-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-16/service-accounts/151914219077-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index b0e0559a2fc1..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-16/service-accounts/151914219077-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "151914219077-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-scale-16/serviceAccounts/151914219077-compute@developer.gserviceaccount.com", - "oauth2ClientId": "112038540141358578478", - "projectId": "k8s-infra-e2e-boskos-scale-16", - "uniqueId": "112038540141358578478" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-16/service-accounts/151914219077-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-16/service-accounts/151914219077-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-16/service-accounts/151914219077-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-16/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-16/services/compute/project-info.json deleted file mode 100644 index 635acafaef4a..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-16/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-29T19:10:29.413-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "151914219077-compute@developer.gserviceaccount.com", - "id": "3636483957696410746", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-scale-16", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-16", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-16/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-16/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-16/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-17/buckets/kubernetes-staging-1024101f72/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-17/buckets/kubernetes-staging-1024101f72/bucketpolicyonly.txt deleted file mode 100644 index 25e2354c9c79..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-17/buckets/kubernetes-staging-1024101f72/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-1024101f72: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-17/buckets/kubernetes-staging-1024101f72/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-17/buckets/kubernetes-staging-1024101f72/cors.txt deleted file mode 100644 index b387d101f647..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-17/buckets/kubernetes-staging-1024101f72/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-1024101f72/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-17/buckets/kubernetes-staging-1024101f72/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-17/buckets/kubernetes-staging-1024101f72/iam.json deleted file mode 100644 index 21505fb8ebff..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-17/buckets/kubernetes-staging-1024101f72/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-17", - "projectOwner:k8s-infra-e2e-boskos-scale-17" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-17" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-17/buckets/kubernetes-staging-1024101f72/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-17/buckets/kubernetes-staging-1024101f72/logging.txt deleted file mode 100644 index 82d5613289b2..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-17/buckets/kubernetes-staging-1024101f72/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-1024101f72/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-17/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-17/description.json deleted file mode 100644 index f665185803b7..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-17/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-30T02:12:01.842Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-scale-17", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-scale-17", - "projectNumber": "529310953145" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-17/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-17/iam.json deleted file mode 100644 index 4c6904a0f615..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-17/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-529310953145@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-529310953145@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:529310953145-compute@developer.gserviceaccount.com", - "serviceAccount:529310953145@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-17/service-accounts/529310953145-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-17/service-accounts/529310953145-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index cf3d67760e59..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-17/service-accounts/529310953145-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "529310953145-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-scale-17/serviceAccounts/529310953145-compute@developer.gserviceaccount.com", - "oauth2ClientId": "106235671746981045917", - "projectId": "k8s-infra-e2e-boskos-scale-17", - "uniqueId": "106235671746981045917" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-17/service-accounts/529310953145-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-17/service-accounts/529310953145-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-17/service-accounts/529310953145-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-17/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-17/services/compute/project-info.json deleted file mode 100644 index c59684dcd7e1..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-17/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-29T19:12:12.325-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "529310953145-compute@developer.gserviceaccount.com", - "id": "4297585587552433171", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-scale-17", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-17", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-17/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-17/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-17/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-18/buckets/kubernetes-staging-b19c823631/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-18/buckets/kubernetes-staging-b19c823631/bucketpolicyonly.txt deleted file mode 100644 index 0dfdf998f0b5..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-18/buckets/kubernetes-staging-b19c823631/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-b19c823631: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-18/buckets/kubernetes-staging-b19c823631/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-18/buckets/kubernetes-staging-b19c823631/cors.txt deleted file mode 100644 index 1b4a5bbb3993..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-18/buckets/kubernetes-staging-b19c823631/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-b19c823631/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-18/buckets/kubernetes-staging-b19c823631/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-18/buckets/kubernetes-staging-b19c823631/iam.json deleted file mode 100644 index 5b7454221d44..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-18/buckets/kubernetes-staging-b19c823631/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-18", - "projectOwner:k8s-infra-e2e-boskos-scale-18" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-18" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-18/buckets/kubernetes-staging-b19c823631/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-18/buckets/kubernetes-staging-b19c823631/logging.txt deleted file mode 100644 index b9152ec385b7..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-18/buckets/kubernetes-staging-b19c823631/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-b19c823631/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-18/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-18/description.json deleted file mode 100644 index c5c5c88b5ae2..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-18/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-30T02:14:00.913Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-scale-18", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-scale-18", - "projectNumber": "219627249712" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-18/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-18/iam.json deleted file mode 100644 index 7e4aa5280e09..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-18/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-219627249712@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-219627249712@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:219627249712-compute@developer.gserviceaccount.com", - "serviceAccount:219627249712@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-18/service-accounts/219627249712-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-18/service-accounts/219627249712-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index c815aa945971..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-18/service-accounts/219627249712-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "219627249712-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-scale-18/serviceAccounts/219627249712-compute@developer.gserviceaccount.com", - "oauth2ClientId": "116344388628337807506", - "projectId": "k8s-infra-e2e-boskos-scale-18", - "uniqueId": "116344388628337807506" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-18/service-accounts/219627249712-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-18/service-accounts/219627249712-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-18/service-accounts/219627249712-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-18/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-18/services/compute/project-info.json deleted file mode 100644 index 641eb4214128..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-18/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-29T19:14:11.226-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "219627249712-compute@developer.gserviceaccount.com", - "id": "4408577588409578908", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-scale-18", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-18", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-18/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-18/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-18/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-19/buckets/kubernetes-staging-a838a56397/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-19/buckets/kubernetes-staging-a838a56397/bucketpolicyonly.txt deleted file mode 100644 index 1f88972e1cec..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-19/buckets/kubernetes-staging-a838a56397/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-a838a56397: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-19/buckets/kubernetes-staging-a838a56397/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-19/buckets/kubernetes-staging-a838a56397/cors.txt deleted file mode 100644 index a283132c45e8..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-19/buckets/kubernetes-staging-a838a56397/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-a838a56397/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-19/buckets/kubernetes-staging-a838a56397/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-19/buckets/kubernetes-staging-a838a56397/iam.json deleted file mode 100644 index c4d7b1827d19..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-19/buckets/kubernetes-staging-a838a56397/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-19", - "projectOwner:k8s-infra-e2e-boskos-scale-19" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-19" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-19/buckets/kubernetes-staging-a838a56397/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-19/buckets/kubernetes-staging-a838a56397/logging.txt deleted file mode 100644 index d279c012e994..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-19/buckets/kubernetes-staging-a838a56397/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-a838a56397/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-19/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-19/description.json deleted file mode 100644 index 0da3cb82e94c..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-19/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-30T02:15:57.714Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-scale-19", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-scale-19", - "projectNumber": "175011321769" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-19/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-19/iam.json deleted file mode 100644 index b7953b3b3466..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-19/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-175011321769@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-175011321769@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:175011321769-compute@developer.gserviceaccount.com", - "serviceAccount:175011321769@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-19/service-accounts/175011321769-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-19/service-accounts/175011321769-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 2452fd26b219..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-19/service-accounts/175011321769-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "175011321769-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-scale-19/serviceAccounts/175011321769-compute@developer.gserviceaccount.com", - "oauth2ClientId": "111846440325128355861", - "projectId": "k8s-infra-e2e-boskos-scale-19", - "uniqueId": "111846440325128355861" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-19/service-accounts/175011321769-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-19/service-accounts/175011321769-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-19/service-accounts/175011321769-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-19/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-19/services/compute/project-info.json deleted file mode 100644 index 79575ec0223d..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-19/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-29T19:16:08.774-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "175011321769-compute@developer.gserviceaccount.com", - "id": "8812702504734602503", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-scale-19", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-19", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-19/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-19/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-19/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-20/buckets/kubernetes-staging-ca6ab02e3a/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-20/buckets/kubernetes-staging-ca6ab02e3a/bucketpolicyonly.txt deleted file mode 100644 index 5b8c548fef96..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-20/buckets/kubernetes-staging-ca6ab02e3a/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-ca6ab02e3a: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-20/buckets/kubernetes-staging-ca6ab02e3a/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-20/buckets/kubernetes-staging-ca6ab02e3a/cors.txt deleted file mode 100644 index de180faf5994..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-20/buckets/kubernetes-staging-ca6ab02e3a/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-ca6ab02e3a/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-20/buckets/kubernetes-staging-ca6ab02e3a/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-20/buckets/kubernetes-staging-ca6ab02e3a/iam.json deleted file mode 100644 index d77e8a94fdb4..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-20/buckets/kubernetes-staging-ca6ab02e3a/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-20", - "projectOwner:k8s-infra-e2e-boskos-scale-20" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-20" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-20/buckets/kubernetes-staging-ca6ab02e3a/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-20/buckets/kubernetes-staging-ca6ab02e3a/logging.txt deleted file mode 100644 index d05c2a8d1a02..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-20/buckets/kubernetes-staging-ca6ab02e3a/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-ca6ab02e3a/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-20/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-20/description.json deleted file mode 100644 index fd62c13fbb52..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-20/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-30T02:18:04.749Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-scale-20", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-scale-20", - "projectNumber": "893407088392" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-20/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-20/iam.json deleted file mode 100644 index 968124f261a4..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-20/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-893407088392@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-893407088392@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:893407088392-compute@developer.gserviceaccount.com", - "serviceAccount:893407088392@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-20/service-accounts/893407088392-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-20/service-accounts/893407088392-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 51a5181ac681..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-20/service-accounts/893407088392-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "893407088392-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-scale-20/serviceAccounts/893407088392-compute@developer.gserviceaccount.com", - "oauth2ClientId": "113831919145132085239", - "projectId": "k8s-infra-e2e-boskos-scale-20", - "uniqueId": "113831919145132085239" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-20/service-accounts/893407088392-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-20/service-accounts/893407088392-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-20/service-accounts/893407088392-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-20/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-20/services/compute/project-info.json deleted file mode 100644 index 72e891db6433..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-20/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-29T19:18:15.540-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "893407088392-compute@developer.gserviceaccount.com", - "id": "4806916297372119688", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-scale-20", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-20", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-20/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-20/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-20/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-21/buckets/kubernetes-staging-cafbdc7173/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-21/buckets/kubernetes-staging-cafbdc7173/bucketpolicyonly.txt deleted file mode 100644 index 022ffc9d7bb7..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-21/buckets/kubernetes-staging-cafbdc7173/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-cafbdc7173: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-21/buckets/kubernetes-staging-cafbdc7173/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-21/buckets/kubernetes-staging-cafbdc7173/cors.txt deleted file mode 100644 index 6d8cb189b34a..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-21/buckets/kubernetes-staging-cafbdc7173/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-cafbdc7173/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-21/buckets/kubernetes-staging-cafbdc7173/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-21/buckets/kubernetes-staging-cafbdc7173/iam.json deleted file mode 100644 index d0840218dcae..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-21/buckets/kubernetes-staging-cafbdc7173/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-21", - "projectOwner:k8s-infra-e2e-boskos-scale-21" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-21" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-21/buckets/kubernetes-staging-cafbdc7173/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-21/buckets/kubernetes-staging-cafbdc7173/logging.txt deleted file mode 100644 index c33dc9502e9e..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-21/buckets/kubernetes-staging-cafbdc7173/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-cafbdc7173/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-21/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-21/description.json deleted file mode 100644 index 5b4fd5c67197..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-21/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-30T02:20:40.101Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-scale-21", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-scale-21", - "projectNumber": "961368471244" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-21/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-21/iam.json deleted file mode 100644 index 95e7f32f2db1..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-21/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-961368471244@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-961368471244@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:961368471244-compute@developer.gserviceaccount.com", - "serviceAccount:961368471244@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-21/service-accounts/961368471244-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-21/service-accounts/961368471244-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 4102674e8bde..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-21/service-accounts/961368471244-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "961368471244-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-scale-21/serviceAccounts/961368471244-compute@developer.gserviceaccount.com", - "oauth2ClientId": "113978923717436125234", - "projectId": "k8s-infra-e2e-boskos-scale-21", - "uniqueId": "113978923717436125234" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-21/service-accounts/961368471244-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-21/service-accounts/961368471244-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-21/service-accounts/961368471244-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-21/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-21/services/compute/project-info.json deleted file mode 100644 index d645738247ae..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-21/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-29T19:20:50.228-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "961368471244-compute@developer.gserviceaccount.com", - "id": "7053830654477644781", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-scale-21", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-21", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-21/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-21/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-21/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-22/buckets/kubernetes-staging-f73abc16be/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-22/buckets/kubernetes-staging-f73abc16be/bucketpolicyonly.txt deleted file mode 100644 index 06a04d612930..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-22/buckets/kubernetes-staging-f73abc16be/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-f73abc16be: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-22/buckets/kubernetes-staging-f73abc16be/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-22/buckets/kubernetes-staging-f73abc16be/cors.txt deleted file mode 100644 index 503efd29211a..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-22/buckets/kubernetes-staging-f73abc16be/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-f73abc16be/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-22/buckets/kubernetes-staging-f73abc16be/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-22/buckets/kubernetes-staging-f73abc16be/iam.json deleted file mode 100644 index e9a299c1103a..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-22/buckets/kubernetes-staging-f73abc16be/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-22", - "projectOwner:k8s-infra-e2e-boskos-scale-22" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-22" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-22/buckets/kubernetes-staging-f73abc16be/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-22/buckets/kubernetes-staging-f73abc16be/logging.txt deleted file mode 100644 index 11dd17784f3d..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-22/buckets/kubernetes-staging-f73abc16be/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-f73abc16be/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-22/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-22/description.json deleted file mode 100644 index 8c9140534050..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-22/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-30T02:22:41.558Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-scale-22", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-scale-22", - "projectNumber": "370249020154" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-22/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-22/iam.json deleted file mode 100644 index bf4c33f04fda..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-22/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-370249020154@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-370249020154@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:370249020154-compute@developer.gserviceaccount.com", - "serviceAccount:370249020154@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-22/service-accounts/370249020154-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-22/service-accounts/370249020154-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 07c1e708d3a0..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-22/service-accounts/370249020154-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "370249020154-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-scale-22/serviceAccounts/370249020154-compute@developer.gserviceaccount.com", - "oauth2ClientId": "105764939377645011608", - "projectId": "k8s-infra-e2e-boskos-scale-22", - "uniqueId": "105764939377645011608" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-22/service-accounts/370249020154-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-22/service-accounts/370249020154-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-22/service-accounts/370249020154-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-22/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-22/services/compute/project-info.json deleted file mode 100644 index c8213be16e35..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-22/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-29T19:22:52.165-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "370249020154-compute@developer.gserviceaccount.com", - "id": "2334775650560684948", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-scale-22", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-22", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-22/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-22/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-22/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-23/buckets/kubernetes-staging-e390e86ba0/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-23/buckets/kubernetes-staging-e390e86ba0/bucketpolicyonly.txt deleted file mode 100644 index 885a5aa33b8a..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-23/buckets/kubernetes-staging-e390e86ba0/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-e390e86ba0: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-23/buckets/kubernetes-staging-e390e86ba0/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-23/buckets/kubernetes-staging-e390e86ba0/cors.txt deleted file mode 100644 index 03255f21984d..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-23/buckets/kubernetes-staging-e390e86ba0/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-e390e86ba0/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-23/buckets/kubernetes-staging-e390e86ba0/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-23/buckets/kubernetes-staging-e390e86ba0/iam.json deleted file mode 100644 index aecd1b310dae..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-23/buckets/kubernetes-staging-e390e86ba0/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-23", - "projectOwner:k8s-infra-e2e-boskos-scale-23" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-23" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-23/buckets/kubernetes-staging-e390e86ba0/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-23/buckets/kubernetes-staging-e390e86ba0/logging.txt deleted file mode 100644 index d9c1718da7f0..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-23/buckets/kubernetes-staging-e390e86ba0/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-e390e86ba0/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-23/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-23/description.json deleted file mode 100644 index b584eb0c9b23..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-23/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-30T02:24:48.907Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-scale-23", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-scale-23", - "projectNumber": "610500652130" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-23/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-23/iam.json deleted file mode 100644 index 9c4cf96e32ee..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-23/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-610500652130@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-610500652130@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:610500652130-compute@developer.gserviceaccount.com", - "serviceAccount:610500652130@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-23/service-accounts/610500652130-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-23/service-accounts/610500652130-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index c93fa3f2703c..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-23/service-accounts/610500652130-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "610500652130-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-scale-23/serviceAccounts/610500652130-compute@developer.gserviceaccount.com", - "oauth2ClientId": "101771127651825434805", - "projectId": "k8s-infra-e2e-boskos-scale-23", - "uniqueId": "101771127651825434805" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-23/service-accounts/610500652130-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-23/service-accounts/610500652130-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-23/service-accounts/610500652130-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-23/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-23/services/compute/project-info.json deleted file mode 100644 index 36d205ccf3d0..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-23/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-29T19:24:59.124-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "610500652130-compute@developer.gserviceaccount.com", - "id": "5827181414850147093", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-scale-23", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-23", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-23/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-23/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-23/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-24/buckets/kubernetes-staging-337e491d8f/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-24/buckets/kubernetes-staging-337e491d8f/bucketpolicyonly.txt deleted file mode 100644 index 4571c0786559..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-24/buckets/kubernetes-staging-337e491d8f/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-337e491d8f: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-24/buckets/kubernetes-staging-337e491d8f/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-24/buckets/kubernetes-staging-337e491d8f/cors.txt deleted file mode 100644 index 89d7993025ec..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-24/buckets/kubernetes-staging-337e491d8f/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-337e491d8f/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-24/buckets/kubernetes-staging-337e491d8f/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-24/buckets/kubernetes-staging-337e491d8f/iam.json deleted file mode 100644 index 118b5e51eb97..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-24/buckets/kubernetes-staging-337e491d8f/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-24", - "projectOwner:k8s-infra-e2e-boskos-scale-24" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-24" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-24/buckets/kubernetes-staging-337e491d8f/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-24/buckets/kubernetes-staging-337e491d8f/logging.txt deleted file mode 100644 index f0489f468ba1..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-24/buckets/kubernetes-staging-337e491d8f/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-337e491d8f/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-24/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-24/description.json deleted file mode 100644 index 2f5bf1629930..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-24/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-30T02:26:57.036Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-scale-24", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-scale-24", - "projectNumber": "211820429131" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-24/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-24/iam.json deleted file mode 100644 index ab8334092e92..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-24/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-211820429131@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-211820429131@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:211820429131-compute@developer.gserviceaccount.com", - "serviceAccount:211820429131@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-24/service-accounts/211820429131-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-24/service-accounts/211820429131-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 367f03742ca0..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-24/service-accounts/211820429131-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "211820429131-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-scale-24/serviceAccounts/211820429131-compute@developer.gserviceaccount.com", - "oauth2ClientId": "103946014425762103333", - "projectId": "k8s-infra-e2e-boskos-scale-24", - "uniqueId": "103946014425762103333" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-24/service-accounts/211820429131-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-24/service-accounts/211820429131-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-24/service-accounts/211820429131-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-24/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-24/services/compute/project-info.json deleted file mode 100644 index 92375bc3afbe..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-24/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nmaciejborsz:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDqAYjBN7i1Mj9zAKbXLzlFauBn6UpuIcAro5tsLjx4+KUfbmuomYuKQlAjBoRwAayDZCQYXTWuDnFBaY2qFMgm6JJdIUvPTJu5C7DLTLKyafBOren733OzApW9Sz9O/oFlIKaG13M9VBUr1C72kvwjw1he6c9qbgQNVeSyXdTEu1aF9X9AB1bPVMASupY0b0X6mwkG/geqR1FX4TW5oPY/H0uXp50acRQOhVaiQwN92fOwDEFhMVPBCmvuh4g7Uw7Pj9d1jNY9rCsPa9zR8x6+EzjZd4cscREWaHmKUhY/vKYQkS34b+UtNHGj8JdgFEIpflbjzgr3arSF3Vuj7azz maciejborsz@maciejborsz-l.waw.corp.google.com" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-29T19:27:06.990-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "211820429131-compute@developer.gserviceaccount.com", - "id": "523493839104028821", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-scale-24", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-24", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-24/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-24/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-24/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-25/buckets/kubernetes-staging-976424fe04/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-25/buckets/kubernetes-staging-976424fe04/bucketpolicyonly.txt deleted file mode 100644 index fc53133baf7d..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-25/buckets/kubernetes-staging-976424fe04/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-976424fe04: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-25/buckets/kubernetes-staging-976424fe04/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-25/buckets/kubernetes-staging-976424fe04/cors.txt deleted file mode 100644 index 8483019ff820..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-25/buckets/kubernetes-staging-976424fe04/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-976424fe04/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-25/buckets/kubernetes-staging-976424fe04/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-25/buckets/kubernetes-staging-976424fe04/iam.json deleted file mode 100644 index 34a7e97eafef..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-25/buckets/kubernetes-staging-976424fe04/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-25", - "projectOwner:k8s-infra-e2e-boskos-scale-25" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-25" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-25/buckets/kubernetes-staging-976424fe04/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-25/buckets/kubernetes-staging-976424fe04/logging.txt deleted file mode 100644 index 519c8edd4e0c..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-25/buckets/kubernetes-staging-976424fe04/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-976424fe04/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-25/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-25/description.json deleted file mode 100644 index 94b75e311f0d..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-25/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-30T02:28:52.432Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-scale-25", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-scale-25", - "projectNumber": "500629287260" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-25/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-25/iam.json deleted file mode 100644 index 2840087883c6..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-25/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-500629287260@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-500629287260@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:500629287260-compute@developer.gserviceaccount.com", - "serviceAccount:500629287260@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-25/service-accounts/500629287260-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-25/service-accounts/500629287260-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index afe6a74d6393..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-25/service-accounts/500629287260-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "500629287260-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-scale-25/serviceAccounts/500629287260-compute@developer.gserviceaccount.com", - "oauth2ClientId": "100112741496382875571", - "projectId": "k8s-infra-e2e-boskos-scale-25", - "uniqueId": "100112741496382875571" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-25/service-accounts/500629287260-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-25/service-accounts/500629287260-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-25/service-accounts/500629287260-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-25/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-25/services/compute/project-info.json deleted file mode 100644 index a51424da3d95..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-25/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-29T19:29:02.842-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "500629287260-compute@developer.gserviceaccount.com", - "id": "5995130342819147777", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-scale-25", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-25", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-25/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-25/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-25/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-26/buckets/kubernetes-staging-1731323934/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-26/buckets/kubernetes-staging-1731323934/bucketpolicyonly.txt deleted file mode 100644 index d29545c68463..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-26/buckets/kubernetes-staging-1731323934/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-1731323934: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-26/buckets/kubernetes-staging-1731323934/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-26/buckets/kubernetes-staging-1731323934/cors.txt deleted file mode 100644 index 406a1145218e..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-26/buckets/kubernetes-staging-1731323934/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-1731323934/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-26/buckets/kubernetes-staging-1731323934/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-26/buckets/kubernetes-staging-1731323934/iam.json deleted file mode 100644 index db09ae12367e..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-26/buckets/kubernetes-staging-1731323934/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-26", - "projectOwner:k8s-infra-e2e-boskos-scale-26" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-26" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-26/buckets/kubernetes-staging-1731323934/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-26/buckets/kubernetes-staging-1731323934/logging.txt deleted file mode 100644 index 2b1f85d2184b..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-26/buckets/kubernetes-staging-1731323934/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-1731323934/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-26/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-26/description.json deleted file mode 100644 index 46dcd0660cf0..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-26/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-30T02:30:55.731Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-scale-26", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-scale-26", - "projectNumber": "257675618203" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-26/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-26/iam.json deleted file mode 100644 index ad879c801317..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-26/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-257675618203@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-257675618203@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:257675618203-compute@developer.gserviceaccount.com", - "serviceAccount:257675618203@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-26/service-accounts/257675618203-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-26/service-accounts/257675618203-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 94103de99cf1..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-26/service-accounts/257675618203-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "257675618203-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-scale-26/serviceAccounts/257675618203-compute@developer.gserviceaccount.com", - "oauth2ClientId": "116314234950010636675", - "projectId": "k8s-infra-e2e-boskos-scale-26", - "uniqueId": "116314234950010636675" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-26/service-accounts/257675618203-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-26/service-accounts/257675618203-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-26/service-accounts/257675618203-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-26/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-26/services/compute/project-info.json deleted file mode 100644 index dd6661de5643..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-26/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-29T19:31:06.216-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "257675618203-compute@developer.gserviceaccount.com", - "id": "4731662874003812742", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-scale-26", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-26", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-26/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-26/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-26/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-27/buckets/artifacts.k8s-infra-e2e-boskos-scale-27.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-27/buckets/artifacts.k8s-infra-e2e-boskos-scale-27.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index d60c87f5c603..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-27/buckets/artifacts.k8s-infra-e2e-boskos-scale-27.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-infra-e2e-boskos-scale-27.appspot.com: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-27/buckets/artifacts.k8s-infra-e2e-boskos-scale-27.appspot.com/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-27/buckets/artifacts.k8s-infra-e2e-boskos-scale-27.appspot.com/cors.txt deleted file mode 100644 index 2924402b6b1c..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-27/buckets/artifacts.k8s-infra-e2e-boskos-scale-27.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-infra-e2e-boskos-scale-27.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-27/buckets/artifacts.k8s-infra-e2e-boskos-scale-27.appspot.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-27/buckets/artifacts.k8s-infra-e2e-boskos-scale-27.appspot.com/iam.json deleted file mode 100644 index 89111e8cf94f..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-27/buckets/artifacts.k8s-infra-e2e-boskos-scale-27.appspot.com/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-27", - "projectOwner:k8s-infra-e2e-boskos-scale-27" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-27" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-27/buckets/artifacts.k8s-infra-e2e-boskos-scale-27.appspot.com/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-27/buckets/artifacts.k8s-infra-e2e-boskos-scale-27.appspot.com/logging.txt deleted file mode 100644 index f778ae26f3ed..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-27/buckets/artifacts.k8s-infra-e2e-boskos-scale-27.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-infra-e2e-boskos-scale-27.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-27/buckets/kubernetes-staging-9cbbfe23c9/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-27/buckets/kubernetes-staging-9cbbfe23c9/bucketpolicyonly.txt deleted file mode 100644 index 3264937626e7..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-27/buckets/kubernetes-staging-9cbbfe23c9/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-9cbbfe23c9: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-27/buckets/kubernetes-staging-9cbbfe23c9/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-27/buckets/kubernetes-staging-9cbbfe23c9/cors.txt deleted file mode 100644 index 28147138efcd..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-27/buckets/kubernetes-staging-9cbbfe23c9/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-9cbbfe23c9/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-27/buckets/kubernetes-staging-9cbbfe23c9/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-27/buckets/kubernetes-staging-9cbbfe23c9/iam.json deleted file mode 100644 index 89111e8cf94f..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-27/buckets/kubernetes-staging-9cbbfe23c9/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-27", - "projectOwner:k8s-infra-e2e-boskos-scale-27" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-27" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-27/buckets/kubernetes-staging-9cbbfe23c9/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-27/buckets/kubernetes-staging-9cbbfe23c9/logging.txt deleted file mode 100644 index 3b3bcefca183..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-27/buckets/kubernetes-staging-9cbbfe23c9/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-9cbbfe23c9/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-27/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-27/description.json deleted file mode 100644 index af2f4c845421..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-27/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-30T02:32:51.088Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-scale-27", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-scale-27", - "projectNumber": "440111527817" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-27/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-27/iam.json deleted file mode 100644 index c854960a436d..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-27/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-440111527817@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-440111527817@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:440111527817-compute@developer.gserviceaccount.com", - "serviceAccount:440111527817@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-27/service-accounts/440111527817-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-27/service-accounts/440111527817-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 07745a8459b4..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-27/service-accounts/440111527817-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "440111527817-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-scale-27/serviceAccounts/440111527817-compute@developer.gserviceaccount.com", - "oauth2ClientId": "101952926448371160078", - "projectId": "k8s-infra-e2e-boskos-scale-27", - "uniqueId": "101952926448371160078" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-27/service-accounts/440111527817-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-27/service-accounts/440111527817-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-27/service-accounts/440111527817-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-27/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-27/services/compute/project-info.json deleted file mode 100644 index 75728df22ed8..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-27/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-29T19:33:01.626-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "440111527817-compute@developer.gserviceaccount.com", - "id": "2828011545964228914", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-scale-27", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-27", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-27/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-27/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-27/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-28/buckets/kubernetes-staging-db70fd0d28/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-28/buckets/kubernetes-staging-db70fd0d28/bucketpolicyonly.txt deleted file mode 100644 index 51449cb75ff5..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-28/buckets/kubernetes-staging-db70fd0d28/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-db70fd0d28: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-28/buckets/kubernetes-staging-db70fd0d28/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-28/buckets/kubernetes-staging-db70fd0d28/cors.txt deleted file mode 100644 index 97d7e11dbc5a..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-28/buckets/kubernetes-staging-db70fd0d28/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-db70fd0d28/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-28/buckets/kubernetes-staging-db70fd0d28/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-28/buckets/kubernetes-staging-db70fd0d28/iam.json deleted file mode 100644 index 107d36de08f6..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-28/buckets/kubernetes-staging-db70fd0d28/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-28", - "projectOwner:k8s-infra-e2e-boskos-scale-28" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-28" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-28/buckets/kubernetes-staging-db70fd0d28/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-28/buckets/kubernetes-staging-db70fd0d28/logging.txt deleted file mode 100644 index 4d67eaccdb5c..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-28/buckets/kubernetes-staging-db70fd0d28/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-db70fd0d28/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-28/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-28/description.json deleted file mode 100644 index b5cb655851b0..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-28/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-30T02:34:59.530Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-scale-28", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-scale-28", - "projectNumber": "199724281835" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-28/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-28/iam.json deleted file mode 100644 index e4c21cf863d1..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-28/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-199724281835@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-199724281835@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:199724281835-compute@developer.gserviceaccount.com", - "serviceAccount:199724281835@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-28/service-accounts/199724281835-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-28/service-accounts/199724281835-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 571db7d5bdd9..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-28/service-accounts/199724281835-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "199724281835-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-scale-28/serviceAccounts/199724281835-compute@developer.gserviceaccount.com", - "oauth2ClientId": "108204388479844202310", - "projectId": "k8s-infra-e2e-boskos-scale-28", - "uniqueId": "108204388479844202310" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-28/service-accounts/199724281835-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-28/service-accounts/199724281835-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-28/service-accounts/199724281835-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-28/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-28/services/compute/project-info.json deleted file mode 100644 index d184aab92d43..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-28/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-29T19:35:11.291-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "199724281835-compute@developer.gserviceaccount.com", - "id": "2899977949256527536", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-scale-28", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-28", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-28/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-28/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-28/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-29/buckets/kubernetes-staging-95c32ef316/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-29/buckets/kubernetes-staging-95c32ef316/bucketpolicyonly.txt deleted file mode 100644 index 4ffe0051d4cc..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-29/buckets/kubernetes-staging-95c32ef316/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-95c32ef316: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-29/buckets/kubernetes-staging-95c32ef316/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-29/buckets/kubernetes-staging-95c32ef316/cors.txt deleted file mode 100644 index 74072e2d8243..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-29/buckets/kubernetes-staging-95c32ef316/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-95c32ef316/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-29/buckets/kubernetes-staging-95c32ef316/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-29/buckets/kubernetes-staging-95c32ef316/iam.json deleted file mode 100644 index 1a4636f67ca6..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-29/buckets/kubernetes-staging-95c32ef316/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-29", - "projectOwner:k8s-infra-e2e-boskos-scale-29" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-29" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-29/buckets/kubernetes-staging-95c32ef316/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-29/buckets/kubernetes-staging-95c32ef316/logging.txt deleted file mode 100644 index 544e642241d1..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-29/buckets/kubernetes-staging-95c32ef316/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-95c32ef316/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-29/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-29/description.json deleted file mode 100644 index 25d60b5ea0ad..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-29/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-30T02:37:04.460Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-scale-29", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-scale-29", - "projectNumber": "718923874112" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-29/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-29/iam.json deleted file mode 100644 index 2d09caa80965..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-29/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-718923874112@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-718923874112@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:718923874112-compute@developer.gserviceaccount.com", - "serviceAccount:718923874112@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-29/service-accounts/718923874112-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-29/service-accounts/718923874112-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index d8bf2bfb9226..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-29/service-accounts/718923874112-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "718923874112-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-scale-29/serviceAccounts/718923874112-compute@developer.gserviceaccount.com", - "oauth2ClientId": "116709224701301223722", - "projectId": "k8s-infra-e2e-boskos-scale-29", - "uniqueId": "116709224701301223722" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-29/service-accounts/718923874112-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-29/service-accounts/718923874112-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-29/service-accounts/718923874112-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-29/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-29/services/compute/project-info.json deleted file mode 100644 index 8b94f67a4914..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-29/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-29T19:37:15.972-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "718923874112-compute@developer.gserviceaccount.com", - "id": "5764112822290525748", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-scale-29", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-29", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-29/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-29/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-29/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-30/buckets/kubernetes-staging-70df00502e/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-boskos-scale-30/buckets/kubernetes-staging-70df00502e/bucketpolicyonly.txt deleted file mode 100644 index 010854718ba9..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-30/buckets/kubernetes-staging-70df00502e/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-70df00502e: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-30/buckets/kubernetes-staging-70df00502e/cors.txt b/audit/projects/k8s-infra-e2e-boskos-scale-30/buckets/kubernetes-staging-70df00502e/cors.txt deleted file mode 100644 index 48134a14d367..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-30/buckets/kubernetes-staging-70df00502e/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-70df00502e/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-30/buckets/kubernetes-staging-70df00502e/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-30/buckets/kubernetes-staging-70df00502e/iam.json deleted file mode 100644 index 537c78749e60..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-30/buckets/kubernetes-staging-70df00502e/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-boskos-scale-30", - "projectOwner:k8s-infra-e2e-boskos-scale-30" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-boskos-scale-30" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-30/buckets/kubernetes-staging-70df00502e/logging.txt b/audit/projects/k8s-infra-e2e-boskos-scale-30/buckets/kubernetes-staging-70df00502e/logging.txt deleted file mode 100644 index 8708bf100e2a..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-30/buckets/kubernetes-staging-70df00502e/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-70df00502e/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-30/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-30/description.json deleted file mode 100644 index a0277970f772..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-30/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-30T02:39:23.469Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-boskos-scale-30", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-boskos-scale-30", - "projectNumber": "17885835863" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-30/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-30/iam.json deleted file mode 100644 index 32b534481a19..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-30/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-17885835863@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-17885835863@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:17885835863-compute@developer.gserviceaccount.com", - "serviceAccount:17885835863@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-30/service-accounts/17885835863-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-boskos-scale-30/service-accounts/17885835863-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index e03dca3631ff..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-30/service-accounts/17885835863-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "17885835863-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-boskos-scale-30/serviceAccounts/17885835863-compute@developer.gserviceaccount.com", - "oauth2ClientId": "113186858498590616627", - "projectId": "k8s-infra-e2e-boskos-scale-30", - "uniqueId": "113186858498590616627" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-30/service-accounts/17885835863-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-30/service-accounts/17885835863-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-30/service-accounts/17885835863-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-30/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-scale-30/services/compute/project-info.json deleted file mode 100644 index bda507eaa25d..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-30/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-29T19:39:34.764-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "17885835863-compute@developer.gserviceaccount.com", - "id": "5854497445507411849", - "kind": "compute#project", - "name": "k8s-infra-e2e-boskos-scale-30", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-boskos-scale-30", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-30/services/enabled.txt b/audit/projects/k8s-infra-e2e-boskos-scale-30/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-boskos-scale-30/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-gce-project/description.json b/audit/projects/k8s-infra-e2e-gce-project/description.json deleted file mode 100644 index 1899e7abc3b8..000000000000 --- a/audit/projects/k8s-infra-e2e-gce-project/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-05-01T00:01:12.490Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-gce-project", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-gce-project", - "projectNumber": "302382158096" -} diff --git a/audit/projects/k8s-infra-e2e-gce-project/iam.json b/audit/projects/k8s-infra-e2e-gce-project/iam.json deleted file mode 100644 index fafdbead457d..000000000000 --- a/audit/projects/k8s-infra-e2e-gce-project/iam.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-302382158096@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-302382158096@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:302382158096-compute@developer.gserviceaccount.com", - "serviceAccount:302382158096@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-gce-project/service-accounts/302382158096-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-gce-project/service-accounts/302382158096-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 78ceb5f4e536..000000000000 --- a/audit/projects/k8s-infra-e2e-gce-project/service-accounts/302382158096-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "302382158096-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-gce-project/serviceAccounts/302382158096-compute@developer.gserviceaccount.com", - "oauth2ClientId": "104899080692491762246", - "projectId": "k8s-infra-e2e-gce-project", - "uniqueId": "104899080692491762246" -} diff --git a/audit/projects/k8s-infra-e2e-gce-project/service-accounts/302382158096-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-gce-project/service-accounts/302382158096-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-gce-project/service-accounts/302382158096-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-gce-project/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-gce-project/services/compute/project-info.json deleted file mode 100644 index 8069c9de12b9..000000000000 --- a/audit/projects/k8s-infra-e2e-gce-project/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\n" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-04-30T17:01:22.898-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "302382158096-compute@developer.gserviceaccount.com", - "id": "295463627212118077", - "kind": "compute#project", - "name": "k8s-infra-e2e-gce-project", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-gce-project", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-gce-project/services/enabled.txt b/audit/projects/k8s-infra-e2e-gce-project/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-gce-project/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-gpu-project/buckets/kubernetes-staging-cfeccb2cc5/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-gpu-project/buckets/kubernetes-staging-cfeccb2cc5/bucketpolicyonly.txt deleted file mode 100644 index e5f18548a014..000000000000 --- a/audit/projects/k8s-infra-e2e-gpu-project/buckets/kubernetes-staging-cfeccb2cc5/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-cfeccb2cc5: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-gpu-project/buckets/kubernetes-staging-cfeccb2cc5/cors.txt b/audit/projects/k8s-infra-e2e-gpu-project/buckets/kubernetes-staging-cfeccb2cc5/cors.txt deleted file mode 100644 index 5feb471d3cb5..000000000000 --- a/audit/projects/k8s-infra-e2e-gpu-project/buckets/kubernetes-staging-cfeccb2cc5/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-cfeccb2cc5/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-gpu-project/buckets/kubernetes-staging-cfeccb2cc5/iam.json b/audit/projects/k8s-infra-e2e-gpu-project/buckets/kubernetes-staging-cfeccb2cc5/iam.json deleted file mode 100644 index 9aed3a4ed779..000000000000 --- a/audit/projects/k8s-infra-e2e-gpu-project/buckets/kubernetes-staging-cfeccb2cc5/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-gpu-project", - "projectOwner:k8s-infra-e2e-gpu-project" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-gpu-project" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-gpu-project/buckets/kubernetes-staging-cfeccb2cc5/logging.txt b/audit/projects/k8s-infra-e2e-gpu-project/buckets/kubernetes-staging-cfeccb2cc5/logging.txt deleted file mode 100644 index 14ce2e410766..000000000000 --- a/audit/projects/k8s-infra-e2e-gpu-project/buckets/kubernetes-staging-cfeccb2cc5/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-cfeccb2cc5/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-gpu-project/description.json b/audit/projects/k8s-infra-e2e-gpu-project/description.json deleted file mode 100644 index ea66161cca84..000000000000 --- a/audit/projects/k8s-infra-e2e-gpu-project/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-04T20:37:34.652Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-gpu-project", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-gpu-project", - "projectNumber": "438213416405" -} diff --git a/audit/projects/k8s-infra-e2e-gpu-project/iam.json b/audit/projects/k8s-infra-e2e-gpu-project/iam.json deleted file mode 100644 index cb5ffefaf9ed..000000000000 --- a/audit/projects/k8s-infra-e2e-gpu-project/iam.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-438213416405@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-438213416405@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:438213416405-compute@developer.gserviceaccount.com", - "serviceAccount:438213416405@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-gpu-project/service-accounts/438213416405-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-gpu-project/service-accounts/438213416405-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 7c39cd49b773..000000000000 --- a/audit/projects/k8s-infra-e2e-gpu-project/service-accounts/438213416405-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "438213416405-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-gpu-project/serviceAccounts/438213416405-compute@developer.gserviceaccount.com", - "oauth2ClientId": "107993938133854595799", - "projectId": "k8s-infra-e2e-gpu-project", - "uniqueId": "107993938133854595799" -} diff --git a/audit/projects/k8s-infra-e2e-gpu-project/service-accounts/438213416405-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-gpu-project/service-accounts/438213416405-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-gpu-project/service-accounts/438213416405-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-gpu-project/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-gpu-project/services/compute/project-info.json deleted file mode 100644 index 4bf1c0a1ee90..000000000000 --- a/audit/projects/k8s-infra-e2e-gpu-project/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-04T13:37:45.315-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "438213416405-compute@developer.gserviceaccount.com", - "id": "3006934282871798262", - "kind": "compute#project", - "name": "k8s-infra-e2e-gpu-project", - "quotas": [ - { - "limit": 5000, - "metric": "SNAPSHOTS" - }, - { - "limit": 15, - "metric": "NETWORKS" - }, - { - "limit": 200, - "metric": "FIREWALLS" - }, - { - "limit": 2000, - "metric": "IMAGES" - }, - { - "limit": 21, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 250, - "metric": "ROUTES" - }, - { - "limit": 45, - "metric": "FORWARDING_RULES" - }, - { - "limit": 150, - "metric": "TARGET_POOLS" - }, - { - "limit": 150, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 69, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 150, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 30, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 30, - "metric": "URL_MAPS" - }, - { - "limit": 9, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 300, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 15, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 30, - "metric": "VPN_TUNNELS" - }, - { - "limit": 9, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 10, - "metric": "ROUTERS" - }, - { - "limit": 30, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 30, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 30, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 175, - "metric": "SUBNETWORKS" - }, - { - "limit": 30, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 100, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 45, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 300, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 15, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 2000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 15, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 45, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-gpu-project", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-gpu-project/services/enabled.txt b/audit/projects/k8s-infra-e2e-gpu-project/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-gpu-project/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-ingress-project/buckets/kubernetes-staging-39e765ac61-asia/bucketpolicyonly.txt b/audit/projects/k8s-infra-e2e-ingress-project/buckets/kubernetes-staging-39e765ac61-asia/bucketpolicyonly.txt deleted file mode 100644 index 7834a2db9ce4..000000000000 --- a/audit/projects/k8s-infra-e2e-ingress-project/buckets/kubernetes-staging-39e765ac61-asia/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes-staging-39e765ac61-asia: - Enabled: False - diff --git a/audit/projects/k8s-infra-e2e-ingress-project/buckets/kubernetes-staging-39e765ac61-asia/cors.txt b/audit/projects/k8s-infra-e2e-ingress-project/buckets/kubernetes-staging-39e765ac61-asia/cors.txt deleted file mode 100644 index 64f8388586d4..000000000000 --- a/audit/projects/k8s-infra-e2e-ingress-project/buckets/kubernetes-staging-39e765ac61-asia/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-39e765ac61-asia/ has no CORS configuration. diff --git a/audit/projects/k8s-infra-e2e-ingress-project/buckets/kubernetes-staging-39e765ac61-asia/iam.json b/audit/projects/k8s-infra-e2e-ingress-project/buckets/kubernetes-staging-39e765ac61-asia/iam.json deleted file mode 100644 index d36ec99dd05b..000000000000 --- a/audit/projects/k8s-infra-e2e-ingress-project/buckets/kubernetes-staging-39e765ac61-asia/iam.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:k8s-infra-e2e-ingress-project", - "projectOwner:k8s-infra-e2e-ingress-project" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-infra-e2e-ingress-project" - ], - "role": "roles/storage.legacyBucketReader" - } - ] -} diff --git a/audit/projects/k8s-infra-e2e-ingress-project/buckets/kubernetes-staging-39e765ac61-asia/logging.txt b/audit/projects/k8s-infra-e2e-ingress-project/buckets/kubernetes-staging-39e765ac61-asia/logging.txt deleted file mode 100644 index 8c0e83f93d60..000000000000 --- a/audit/projects/k8s-infra-e2e-ingress-project/buckets/kubernetes-staging-39e765ac61-asia/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes-staging-39e765ac61-asia/ has no logging configuration. diff --git a/audit/projects/k8s-infra-e2e-ingress-project/description.json b/audit/projects/k8s-infra-e2e-ingress-project/description.json deleted file mode 100644 index 484a79780d4a..000000000000 --- a/audit/projects/k8s-infra-e2e-ingress-project/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-04T20:39:45.006Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-ingress-project", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-ingress-project", - "projectNumber": "741153779759" -} diff --git a/audit/projects/k8s-infra-e2e-ingress-project/iam.json b/audit/projects/k8s-infra-e2e-ingress-project/iam.json deleted file mode 100644 index 27cc998ad22b..000000000000 --- a/audit/projects/k8s-infra-e2e-ingress-project/iam.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-741153779759@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-741153779759@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:741153779759-compute@developer.gserviceaccount.com", - "serviceAccount:741153779759@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-ingress-project/service-accounts/741153779759-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-ingress-project/service-accounts/741153779759-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index c7a13493a0a4..000000000000 --- a/audit/projects/k8s-infra-e2e-ingress-project/service-accounts/741153779759-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "741153779759-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-ingress-project/serviceAccounts/741153779759-compute@developer.gserviceaccount.com", - "oauth2ClientId": "101670064479606026189", - "projectId": "k8s-infra-e2e-ingress-project", - "uniqueId": "101670064479606026189" -} diff --git a/audit/projects/k8s-infra-e2e-ingress-project/service-accounts/741153779759-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-ingress-project/service-accounts/741153779759-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-ingress-project/service-accounts/741153779759-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-ingress-project/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-ingress-project/services/compute/project-info.json deleted file mode 100644 index 686c558494aa..000000000000 --- a/audit/projects/k8s-infra-e2e-ingress-project/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-08-04T13:39:56.468-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "741153779759-compute@developer.gserviceaccount.com", - "id": "5169880856814451059", - "kind": "compute#project", - "name": "k8s-infra-e2e-ingress-project", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-ingress-project", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-ingress-project/services/enabled.txt b/audit/projects/k8s-infra-e2e-ingress-project/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-ingress-project/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-node-e2e-project/description.json b/audit/projects/k8s-infra-e2e-node-e2e-project/description.json deleted file mode 100644 index de7b2a64ed43..000000000000 --- a/audit/projects/k8s-infra-e2e-node-e2e-project/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-05-01T00:03:32.673Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-node-e2e-project", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-node-e2e-project", - "projectNumber": "855765450555" -} diff --git a/audit/projects/k8s-infra-e2e-node-e2e-project/iam.json b/audit/projects/k8s-infra-e2e-node-e2e-project/iam.json deleted file mode 100644 index 612e479daf6e..000000000000 --- a/audit/projects/k8s-infra-e2e-node-e2e-project/iam.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-855765450555@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-855765450555@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:855765450555-compute@developer.gserviceaccount.com", - "serviceAccount:855765450555@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-node-e2e-project/service-accounts/855765450555-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-node-e2e-project/service-accounts/855765450555-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 26f30036bf47..000000000000 --- a/audit/projects/k8s-infra-e2e-node-e2e-project/service-accounts/855765450555-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "855765450555-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-node-e2e-project/serviceAccounts/855765450555-compute@developer.gserviceaccount.com", - "oauth2ClientId": "118233734876699559886", - "projectId": "k8s-infra-e2e-node-e2e-project", - "uniqueId": "118233734876699559886" -} diff --git a/audit/projects/k8s-infra-e2e-node-e2e-project/service-accounts/855765450555-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-node-e2e-project/service-accounts/855765450555-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-node-e2e-project/service-accounts/855765450555-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-node-e2e-project/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-node-e2e-project/services/compute/project-info.json deleted file mode 100644 index 2b737c34c0c2..000000000000 --- a/audit/projects/k8s-infra-e2e-node-e2e-project/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\n" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-04-30T17:03:42.840-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "855765450555-compute@developer.gserviceaccount.com", - "id": "1605083010704005553", - "kind": "compute#project", - "name": "k8s-infra-e2e-node-e2e-project", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-node-e2e-project", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-node-e2e-project/services/enabled.txt b/audit/projects/k8s-infra-e2e-node-e2e-project/services/enabled.txt deleted file mode 100644 index 3b60c8454c14..000000000000 --- a/audit/projects/k8s-infra-e2e-node-e2e-project/services/enabled.txt +++ /dev/null @@ -1,9 +0,0 @@ -NAME TITLE -compute.googleapis.com Compute Engine API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-e2e-scale-project/description.json b/audit/projects/k8s-infra-e2e-scale-project/description.json deleted file mode 100644 index 17167be83f97..000000000000 --- a/audit/projects/k8s-infra-e2e-scale-project/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-05-07T03:03:20.846Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-e2e-scale-project", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-e2e-scale-project", - "projectNumber": "189277497252" -} diff --git a/audit/projects/k8s-infra-e2e-scale-project/iam.json b/audit/projects/k8s-infra-e2e-scale-project/iam.json deleted file mode 100644 index 7810d241a0f4..000000000000 --- a/audit/projects/k8s-infra-e2e-scale-project/iam.json +++ /dev/null @@ -1,41 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "serviceAccount:service-189277497252@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-189277497252@container-engine-robot.iam.gserviceaccount.com" - ], - "role": "roles/container.serviceAgent" - }, - { - "members": [ - "serviceAccount:189277497252-compute@developer.gserviceaccount.com", - "serviceAccount:189277497252@cloudservices.gserviceaccount.com", - "serviceAccount:boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com", - "serviceAccount:service-189277497252@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-e2e-scale-project/service-accounts/189277497252-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-e2e-scale-project/service-accounts/189277497252-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 1fc209d344d6..000000000000 --- a/audit/projects/k8s-infra-e2e-scale-project/service-accounts/189277497252-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "189277497252-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-e2e-scale-project/serviceAccounts/189277497252-compute@developer.gserviceaccount.com", - "oauth2ClientId": "113062251711481257214", - "projectId": "k8s-infra-e2e-scale-project", - "uniqueId": "113062251711481257214" -} diff --git a/audit/projects/k8s-infra-e2e-scale-project/service-accounts/189277497252-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-e2e-scale-project/service-accounts/189277497252-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-e2e-scale-project/service-accounts/189277497252-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-e2e-scale-project/services/bigquery/bigquery.datasets.json b/audit/projects/k8s-infra-e2e-scale-project/services/bigquery/bigquery.datasets.json deleted file mode 100644 index e69de29bb2d1..000000000000 diff --git a/audit/projects/k8s-infra-e2e-scale-project/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-scale-project/services/compute/project-info.json deleted file mode 100644 index 1edbbbcf3ba6..000000000000 --- a/audit/projects/k8s-infra-e2e-scale-project/services/compute/project-info.json +++ /dev/null @@ -1,177 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-05-06T20:03:31.813-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "189277497252-compute@developer.gserviceaccount.com", - "id": "493078826304062572", - "kind": "compute#project", - "name": "k8s-infra-e2e-scale-project", - "quotas": [ - { - "limit": 5000, - "metric": "SNAPSHOTS" - }, - { - "limit": 15, - "metric": "NETWORKS" - }, - { - "limit": 200, - "metric": "FIREWALLS" - }, - { - "limit": 2000, - "metric": "IMAGES" - }, - { - "limit": 21, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 250, - "metric": "ROUTES" - }, - { - "limit": 45, - "metric": "FORWARDING_RULES" - }, - { - "limit": 150, - "metric": "TARGET_POOLS" - }, - { - "limit": 150, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 69, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 150, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 30, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 30, - "metric": "URL_MAPS" - }, - { - "limit": 9, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 300, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 15, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 30, - "metric": "VPN_TUNNELS" - }, - { - "limit": 9, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 10, - "metric": "ROUTERS" - }, - { - "limit": 30, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 30, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 30, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 175, - "metric": "SUBNETWORKS" - }, - { - "limit": 30, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 100, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 45, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 300, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 15, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 2000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 15, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-e2e-scale-project", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-e2e-scale-project/services/container/clusters.txt b/audit/projects/k8s-infra-e2e-scale-project/services/container/clusters.txt deleted file mode 100644 index e69de29bb2d1..000000000000 diff --git a/audit/projects/k8s-infra-e2e-scale-project/services/enabled.txt b/audit/projects/k8s-infra-e2e-scale-project/services/enabled.txt deleted file mode 100644 index 3b9386ef41b2..000000000000 --- a/audit/projects/k8s-infra-e2e-scale-project/services/enabled.txt +++ /dev/null @@ -1,14 +0,0 @@ -NAME TITLE -bigquery.googleapis.com BigQuery API -bigquerystorage.googleapis.com BigQuery Storage API -compute.googleapis.com Compute Engine API -container.googleapis.com Kubernetes Engine API -containerregistry.googleapis.com Container Registry API -iam.googleapis.com Identity and Access Management (IAM) API -iamcredentials.googleapis.com IAM Service Account Credentials API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-prow-build-trusted/description.json b/audit/projects/k8s-infra-prow-build-trusted/description.json deleted file mode 100644 index 68c51680ea72..000000000000 --- a/audit/projects/k8s-infra-prow-build-trusted/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-04-30T23:40:44.839Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-prow-build-trusted", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-prow-build-trusted", - "projectNumber": "180382678033" -} diff --git a/audit/projects/k8s-infra-prow-build-trusted/iam.json b/audit/projects/k8s-infra-prow-build-trusted/iam.json deleted file mode 100644 index 36ec27a77188..000000000000 --- a/audit/projects/k8s-infra-prow-build-trusted/iam.json +++ /dev/null @@ -1,92 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-cluster-admins@kubernetes.io" - ], - "role": "projects/k8s-infra-prow-build-trusted/roles/ServiceAccountLister" - }, - { - "members": [ - "serviceAccount:180382678033@cloudbuild.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "serviceAccount:service-180382678033@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-180382678033@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "group:k8s-infra-cluster-admins@kubernetes.io" - ], - "role": "roles/compute.viewer" - }, - { - "members": [ - "group:k8s-infra-cluster-admins@kubernetes.io" - ], - "role": "roles/container.admin" - }, - { - "members": [ - "group:gke-security-groups@kubernetes.io" - ], - "role": "roles/container.clusterViewer" - }, - { - "members": [ - "serviceAccount:prow-deployer@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/container.developer" - }, - { - "members": [ - "serviceAccount:service-180382678033@container-engine-robot.iam.gserviceaccount.com" - ], - "role": "roles/container.serviceAgent" - }, - { - "members": [ - "serviceAccount:180382678033-compute@developer.gserviceaccount.com", - "serviceAccount:180382678033@cloudservices.gserviceaccount.com", - "serviceAccount:service-180382678033@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "serviceAccount:gke-nodes-prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/logging.logWriter" - }, - { - "members": [ - "serviceAccount:gke-nodes-prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/monitoring.metricWriter" - }, - { - "members": [ - "serviceAccount:gke-nodes-prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/monitoring.viewer" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-prow-build-trusted/roles/ServiceAccountLister.json b/audit/projects/k8s-infra-prow-build-trusted/roles/ServiceAccountLister.json deleted file mode 100644 index 16888cdb33f1..000000000000 --- a/audit/projects/k8s-infra-prow-build-trusted/roles/ServiceAccountLister.json +++ /dev/null @@ -1,9 +0,0 @@ -{ - "description": "Can list ServiceAccounts.", - "includedPermissions": [ - "iam.serviceAccounts.list" - ], - "name": "projects/k8s-infra-prow-build-trusted/roles/ServiceAccountLister", - "stage": "GA", - "title": "Service Account Lister" -} diff --git a/audit/projects/k8s-infra-prow-build-trusted/secrets/cncf-ci-github-token/description.json b/audit/projects/k8s-infra-prow-build-trusted/secrets/cncf-ci-github-token/description.json deleted file mode 100644 index dc44137a3beb..000000000000 --- a/audit/projects/k8s-infra-prow-build-trusted/secrets/cncf-ci-github-token/description.json +++ /dev/null @@ -1,10 +0,0 @@ -{ - "createTime": "2021-02-11T04:21:30.200768Z", - "labels": { - "sig": "testing" - }, - "name": "projects/180382678033/secrets/cncf-ci-github-token", - "replication": { - "automatic": {} - } -} diff --git a/audit/projects/k8s-infra-prow-build-trusted/secrets/cncf-ci-github-token/iam.json b/audit/projects/k8s-infra-prow-build-trusted/secrets/cncf-ci-github-token/iam.json deleted file mode 100644 index 88345e09455d..000000000000 --- a/audit/projects/k8s-infra-prow-build-trusted/secrets/cncf-ci-github-token/iam.json +++ /dev/null @@ -1,12 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:hh@ii.coop" - ], - "role": "roles/secretmanager.admin" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-prow-build-trusted/secrets/cncf-ci-github-token/versions.json b/audit/projects/k8s-infra-prow-build-trusted/secrets/cncf-ci-github-token/versions.json deleted file mode 100644 index 6f3774332bea..000000000000 --- a/audit/projects/k8s-infra-prow-build-trusted/secrets/cncf-ci-github-token/versions.json +++ /dev/null @@ -1,10 +0,0 @@ -[ - { - "createTime": "2021-02-11T20:01:09.472963Z", - "name": "projects/180382678033/secrets/cncf-ci-github-token/versions/1", - "replicationStatus": { - "automatic": {} - }, - "state": "ENABLED" - } -] diff --git a/audit/projects/k8s-infra-prow-build-trusted/service-accounts/180382678033-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-prow-build-trusted/service-accounts/180382678033-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index d6bef494ccdc..000000000000 --- a/audit/projects/k8s-infra-prow-build-trusted/service-accounts/180382678033-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "180382678033-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-prow-build-trusted/serviceAccounts/180382678033-compute@developer.gserviceaccount.com", - "oauth2ClientId": "109607001040581615842", - "projectId": "k8s-infra-prow-build-trusted", - "uniqueId": "109607001040581615842" -} diff --git a/audit/projects/k8s-infra-prow-build-trusted/service-accounts/180382678033-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-prow-build-trusted/service-accounts/180382678033-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-prow-build-trusted/service-accounts/180382678033-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-prow-build-trusted/service-accounts/gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/description.json b/audit/projects/k8s-infra-prow-build-trusted/service-accounts/gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/description.json deleted file mode 100644 index e55799699fca..000000000000 --- a/audit/projects/k8s-infra-prow-build-trusted/service-accounts/gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "gcb-builder", - "email": "gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com", - "name": "projects/k8s-infra-prow-build-trusted/serviceAccounts/gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com", - "oauth2ClientId": "112742619569156756728", - "projectId": "k8s-infra-prow-build-trusted", - "uniqueId": "112742619569156756728" -} diff --git a/audit/projects/k8s-infra-prow-build-trusted/service-accounts/gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-prow-build-trusted/service-accounts/gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/iam.json deleted file mode 100644 index 4e79b0550615..000000000000 --- a/audit/projects/k8s-infra-prow-build-trusted/service-accounts/gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/iam.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:k8s-infra-prow-build-trusted.svc.id.goog[test-pods/gcb-builder]" - ], - "role": "roles/iam.workloadIdentityUser" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-prow-build-trusted/service-accounts/gke-nodes-prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/description.json b/audit/projects/k8s-infra-prow-build-trusted/service-accounts/gke-nodes-prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/description.json deleted file mode 100644 index 888c41dc049c..000000000000 --- a/audit/projects/k8s-infra-prow-build-trusted/service-accounts/gke-nodes-prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Nodes in GKE cluster 'prow-build-trusted'", - "email": "gke-nodes-prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com", - "name": "projects/k8s-infra-prow-build-trusted/serviceAccounts/gke-nodes-prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com", - "oauth2ClientId": "115531411197821643772", - "projectId": "k8s-infra-prow-build-trusted", - "uniqueId": "115531411197821643772" -} diff --git a/audit/projects/k8s-infra-prow-build-trusted/service-accounts/gke-nodes-prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-prow-build-trusted/service-accounts/gke-nodes-prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-prow-build-trusted/service-accounts/gke-nodes-prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-prow-build-trusted/service-accounts/prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/description.json b/audit/projects/k8s-infra-prow-build-trusted/service-accounts/prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/description.json deleted file mode 100644 index ed80c2dffc48..000000000000 --- a/audit/projects/k8s-infra-prow-build-trusted/service-accounts/prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Used by pods in 'prow-build-trusted' GKE cluster", - "email": "prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com", - "name": "projects/k8s-infra-prow-build-trusted/serviceAccounts/prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com", - "oauth2ClientId": "100468422900474789171", - "projectId": "k8s-infra-prow-build-trusted", - "uniqueId": "100468422900474789171" -} diff --git a/audit/projects/k8s-infra-prow-build-trusted/service-accounts/prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-prow-build-trusted/service-accounts/prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/iam.json deleted file mode 100644 index 7181fbf982be..000000000000 --- a/audit/projects/k8s-infra-prow-build-trusted/service-accounts/prow-build-trusted@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/iam.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:k8s-infra-prow-build-trusted.svc.id.goog[test-pods/prow-build-trusted]" - ], - "role": "roles/iam.workloadIdentityUser" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-prow-build-trusted/service-accounts/prow-deployer@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/description.json b/audit/projects/k8s-infra-prow-build-trusted/service-accounts/prow-deployer@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/description.json deleted file mode 100644 index 4893807b0833..000000000000 --- a/audit/projects/k8s-infra-prow-build-trusted/service-accounts/prow-deployer@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "prow-deployer", - "email": "prow-deployer@k8s-infra-prow-build-trusted.iam.gserviceaccount.com", - "name": "projects/k8s-infra-prow-build-trusted/serviceAccounts/prow-deployer@k8s-infra-prow-build-trusted.iam.gserviceaccount.com", - "oauth2ClientId": "108520437172201123758", - "projectId": "k8s-infra-prow-build-trusted", - "uniqueId": "108520437172201123758" -} diff --git a/audit/projects/k8s-infra-prow-build-trusted/service-accounts/prow-deployer@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-prow-build-trusted/service-accounts/prow-deployer@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/iam.json deleted file mode 100644 index 025312b1dd3f..000000000000 --- a/audit/projects/k8s-infra-prow-build-trusted/service-accounts/prow-deployer@k8s-infra-prow-build-trusted.iam.gserviceaccount.com/iam.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:k8s-infra-prow-build-trusted.svc.id.goog[test-pods/prow-deployer]" - ], - "role": "roles/iam.workloadIdentityUser" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-prow-build-trusted/services/bigquery/bigquery.datasets.json b/audit/projects/k8s-infra-prow-build-trusted/services/bigquery/bigquery.datasets.json deleted file mode 100644 index e69de29bb2d1..000000000000 diff --git a/audit/projects/k8s-infra-prow-build-trusted/services/compute/project-info.json b/audit/projects/k8s-infra-prow-build-trusted/services/compute/project-info.json deleted file mode 100644 index a90a25534dfd..000000000000 --- a/audit/projects/k8s-infra-prow-build-trusted/services/compute/project-info.json +++ /dev/null @@ -1,181 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "gke-prow-build-trusted-8f83dcb7-cidr", - "value": "default:10.4.0.0/14" - }, - { - "key": "sshKeys", - "value": "gke-8f83dcb7a83817de2408:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDcqrAFbHYlsvt25hXLlNR1ZfOixmZUoaPh99ueAu1i94A507qQtfe4QbrQBIvR5r49QOpkDzL6kF0eluXbeLuke8blq7eMYVDOd9NWihUvVc40m79OCzxBXNWgd85en0JcPPuQS+SDNdCqf5CFvv93x3/NnU9riLNOQV6SOK+nTVmoNfKmrKqw0PgrwEFrxM8Wf3XDvSGmEqzT93Jpeij10Wn1tUDOODnPQAODYZQIRUp0WrJnenfE8UzUX75nbRCjiRfOcrQn4vmyMZ1XBkuv7HnbArsHWSRaEcJtF4C8wQx6sLdzw3o6F6LgwVQVEyc4EZJOPfDV+ysy6SnHROd1 gke-8f83dcb7a83817de2408@gke-8f83dcb7a83817de2408\ngke-8f83dcb7a83817de2408:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCVYGyDIkhLSSK6fUovrMQ+4IDeIoLBtVfcYPIQuEoOxS7CDxx1W6m5Hlrxp9pKV9wlQbDy9GbhbqZztisReG3zB11w71g9AMxTVc/IQpDVzOt++Nb4rFIJI46a3lLXuY8MMpH+ch483qtOWEz9hvuvbdqVZ2vLebvUW7oITiZUGaGnGfIjGe1tIDc3DGpBSV/71aJ4Uf235SuZy1D14Uiw6FeNnH7jEpEQdKm2t+wYE02M83DfC6HcQZcV42fvQopuYO9KrCtCA6Op+LBRCdtIKM9PAGik5seT5050bNznHGyqLTcqClT8qzQzzsLbAPnvMEiEGQlNKUH4VosJpAB7 gke-8f83dcb7a83817de2408@gke-8f83dcb7a83817de2408\ngke-8f83dcb7a83817de2408:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCaGRrHYdKzserLbKq4F90jANA1Og3gF79f4cOQ0N8skGqQkrwgFRh+Nb+PtT/Brr0uhZZB0bjdLBrcLWR5VoZQV+zCD/hmjLNBMWWx7satLnqShp2c2Q6db+IBwEuLfD152NqIZMAjgUELI8YmpoyG39u0blzDiDHj4LR2XzgCktYKPRwiPGWvx3I+sNk4YEnTAFynT9kXa601jzBwxr+VvSAMNSJXYf20aISLoPov+28gO5St970NOWjQYcQ8BQAi7jaTbizQOyd+92RWPsPksvvmAafhtqu3Lm5j9tA4ZqJFfX60WTMPeu4viUMf+tJrGNZmrNsFCb4Xvilly9a3 gke-8f83dcb7a83817de2408@gke-8f83dcb7a83817de2408" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-04-30T16:41:21.119-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "180382678033-compute@developer.gserviceaccount.com", - "id": "7420505769285967055", - "kind": "compute#project", - "name": "k8s-infra-prow-build-trusted", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-prow-build-trusted", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-prow-build-trusted/services/container/clusters.txt b/audit/projects/k8s-infra-prow-build-trusted/services/container/clusters.txt deleted file mode 100644 index 5507f2186e9c..000000000000 --- a/audit/projects/k8s-infra-prow-build-trusted/services/container/clusters.txt +++ /dev/null @@ -1 +0,0 @@ -prow-build-trusted us-central1 us-central1-a;us-central1-f;us-central1-b RUNNING diff --git a/audit/projects/k8s-infra-prow-build-trusted/services/enabled.txt b/audit/projects/k8s-infra-prow-build-trusted/services/enabled.txt deleted file mode 100644 index d2af82da1bc3..000000000000 --- a/audit/projects/k8s-infra-prow-build-trusted/services/enabled.txt +++ /dev/null @@ -1,18 +0,0 @@ -NAME TITLE -bigquery.googleapis.com BigQuery API -bigquerystorage.googleapis.com BigQuery Storage API -cloudbuild.googleapis.com Cloud Build API -compute.googleapis.com Compute Engine API -container.googleapis.com Kubernetes Engine API -containerregistry.googleapis.com Container Registry API -iam.googleapis.com Identity and Access Management (IAM) API -iamcredentials.googleapis.com IAM Service Account Credentials API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -serviceusage.googleapis.com Service Usage API -stackdriver.googleapis.com Stackdriver API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-infra-prow-build/description.json b/audit/projects/k8s-infra-prow-build/description.json deleted file mode 100644 index d187b84530f9..000000000000 --- a/audit/projects/k8s-infra-prow-build/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-04-30T20:05:50.398Z", - "lifecycleState": "ACTIVE", - "name": "k8s-infra-prow-build", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-infra-prow-build", - "projectNumber": "773781448124" -} diff --git a/audit/projects/k8s-infra-prow-build/iam.json b/audit/projects/k8s-infra-prow-build/iam.json deleted file mode 100644 index f7febb55455d..000000000000 --- a/audit/projects/k8s-infra-prow-build/iam.json +++ /dev/null @@ -1,98 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-prow-viewers@kubernetes.io" - ], - "role": "organizations/758905017065/roles/prow.viewer" - }, - { - "members": [ - "group:k8s-infra-cluster-admins@kubernetes.io" - ], - "role": "projects/k8s-infra-prow-build/roles/ServiceAccountLister" - }, - { - "members": [ - "serviceAccount:773781448124@cloudbuild.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "serviceAccount:service-773781448124@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-773781448124@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "group:k8s-infra-cluster-admins@kubernetes.io" - ], - "role": "roles/compute.viewer" - }, - { - "members": [ - "group:k8s-infra-cluster-admins@kubernetes.io" - ], - "role": "roles/container.admin" - }, - { - "members": [ - "group:gke-security-groups@kubernetes.io" - ], - "role": "roles/container.clusterViewer" - }, - { - "members": [ - "serviceAccount:prow-deployer@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/container.developer" - }, - { - "members": [ - "serviceAccount:service-773781448124@container-engine-robot.iam.gserviceaccount.com" - ], - "role": "roles/container.serviceAgent" - }, - { - "members": [ - "serviceAccount:773781448124-compute@developer.gserviceaccount.com", - "serviceAccount:773781448124@cloudservices.gserviceaccount.com", - "serviceAccount:service-773781448124@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "serviceAccount:gke-nodes-prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/logging.logWriter" - }, - { - "members": [ - "serviceAccount:gke-nodes-prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/monitoring.metricWriter" - }, - { - "members": [ - "serviceAccount:gke-nodes-prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/monitoring.viewer" - }, - { - "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" - ], - "role": "roles/owner" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-prow-build/roles/ServiceAccountLister.json b/audit/projects/k8s-infra-prow-build/roles/ServiceAccountLister.json deleted file mode 100644 index a8de264731cf..000000000000 --- a/audit/projects/k8s-infra-prow-build/roles/ServiceAccountLister.json +++ /dev/null @@ -1,9 +0,0 @@ -{ - "description": "Can list ServiceAccounts.", - "includedPermissions": [ - "iam.serviceAccounts.list" - ], - "name": "projects/k8s-infra-prow-build/roles/ServiceAccountLister", - "stage": "GA", - "title": "Service Account Lister" -} diff --git a/audit/projects/k8s-infra-prow-build/service-accounts/773781448124-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-prow-build/service-accounts/773781448124-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 1a8377d4e698..000000000000 --- a/audit/projects/k8s-infra-prow-build/service-accounts/773781448124-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "773781448124-compute@developer.gserviceaccount.com", - "name": "projects/k8s-infra-prow-build/serviceAccounts/773781448124-compute@developer.gserviceaccount.com", - "oauth2ClientId": "110102664279275968667", - "projectId": "k8s-infra-prow-build", - "uniqueId": "110102664279275968667" -} diff --git a/audit/projects/k8s-infra-prow-build/service-accounts/773781448124-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-prow-build/service-accounts/773781448124-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-prow-build/service-accounts/773781448124-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-prow-build/service-accounts/boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com/description.json b/audit/projects/k8s-infra-prow-build/service-accounts/boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com/description.json deleted file mode 100644 index 6fa0f2a1b408..000000000000 --- a/audit/projects/k8s-infra-prow-build/service-accounts/boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Used by boskos-janitor in 'prow-build' GKE cluster", - "email": "boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "name": "projects/k8s-infra-prow-build/serviceAccounts/boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com", - "oauth2ClientId": "113384456787846499978", - "projectId": "k8s-infra-prow-build", - "uniqueId": "113384456787846499978" -} diff --git a/audit/projects/k8s-infra-prow-build/service-accounts/boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-prow-build/service-accounts/boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com/iam.json deleted file mode 100644 index 33e95c023041..000000000000 --- a/audit/projects/k8s-infra-prow-build/service-accounts/boskos-janitor@k8s-infra-prow-build.iam.gserviceaccount.com/iam.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:k8s-infra-prow-build.svc.id.goog[test-pods/boskos-janitor]" - ], - "role": "roles/iam.workloadIdentityUser" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-prow-build/service-accounts/gke-nodes-prow-build@k8s-infra-prow-build.iam.gserviceaccount.com/description.json b/audit/projects/k8s-infra-prow-build/service-accounts/gke-nodes-prow-build@k8s-infra-prow-build.iam.gserviceaccount.com/description.json deleted file mode 100644 index 99ced80a975b..000000000000 --- a/audit/projects/k8s-infra-prow-build/service-accounts/gke-nodes-prow-build@k8s-infra-prow-build.iam.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Nodes in GKE cluster 'prow-build'", - "email": "gke-nodes-prow-build@k8s-infra-prow-build.iam.gserviceaccount.com", - "name": "projects/k8s-infra-prow-build/serviceAccounts/gke-nodes-prow-build@k8s-infra-prow-build.iam.gserviceaccount.com", - "oauth2ClientId": "110227136526245655726", - "projectId": "k8s-infra-prow-build", - "uniqueId": "110227136526245655726" -} diff --git a/audit/projects/k8s-infra-prow-build/service-accounts/gke-nodes-prow-build@k8s-infra-prow-build.iam.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-prow-build/service-accounts/gke-nodes-prow-build@k8s-infra-prow-build.iam.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-infra-prow-build/service-accounts/gke-nodes-prow-build@k8s-infra-prow-build.iam.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-infra-prow-build/service-accounts/prow-build@k8s-infra-prow-build.iam.gserviceaccount.com/description.json b/audit/projects/k8s-infra-prow-build/service-accounts/prow-build@k8s-infra-prow-build.iam.gserviceaccount.com/description.json deleted file mode 100644 index e9c6bc682e18..000000000000 --- a/audit/projects/k8s-infra-prow-build/service-accounts/prow-build@k8s-infra-prow-build.iam.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Used by pods in 'prow-build' GKE cluster", - "email": "prow-build@k8s-infra-prow-build.iam.gserviceaccount.com", - "name": "projects/k8s-infra-prow-build/serviceAccounts/prow-build@k8s-infra-prow-build.iam.gserviceaccount.com", - "oauth2ClientId": "107361654189119518833", - "projectId": "k8s-infra-prow-build", - "uniqueId": "107361654189119518833" -} diff --git a/audit/projects/k8s-infra-prow-build/service-accounts/prow-build@k8s-infra-prow-build.iam.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-prow-build/service-accounts/prow-build@k8s-infra-prow-build.iam.gserviceaccount.com/iam.json deleted file mode 100644 index 2fd429f4d551..000000000000 --- a/audit/projects/k8s-infra-prow-build/service-accounts/prow-build@k8s-infra-prow-build.iam.gserviceaccount.com/iam.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:k8s-infra-prow-build.svc.id.goog[test-pods/prow-build]" - ], - "role": "roles/iam.workloadIdentityUser" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-infra-prow-build/services/bigquery/bigquery.datasets.json b/audit/projects/k8s-infra-prow-build/services/bigquery/bigquery.datasets.json deleted file mode 100644 index e69de29bb2d1..000000000000 diff --git a/audit/projects/k8s-infra-prow-build/services/compute/project-info.json b/audit/projects/k8s-infra-prow-build/services/compute/project-info.json deleted file mode 100644 index 62c936ccfaea..000000000000 --- a/audit/projects/k8s-infra-prow-build/services/compute/project-info.json +++ /dev/null @@ -1,185 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "gke-prow-build-8d7225b7-cidr", - "value": "default:10.32.0.0/14" - }, - { - "key": "sshKeys", - "value": "gke-8d7225b757872b0f06a6:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD2x5DoWU6zKsjIs0srrMdc3CupZyCk6uiJUZ6KeRb3s7MmKQ3GCngTaTmRT3eJJwvzGBHbqAGHayQVIDX8NIw8PBh7qS1wtwZXGiRGkQM9xZGnDGlLDh5/OPgsAZxvmO9WX0y1voN5Q9k26J47aVC/cVQetMD0UVYYE+fACq6Nwz7KtBoFuVE99e9QaqvJc7g3WzeOFcRj8FPtFKSskwVOIgbR4sEdY/TAlibyM3eTnnjIAKugNX78R+V9rSXDOl/OCAkx22Cy+TrF5VVzvGR4r8MytyoYupr6DLnNIqtPPnzQbx+GA+x4NBGjOB/MGidY2lTIc+qAoXX1aSOrQ+ff gke-8d7225b757872b0f06a6@gke-8d7225b757872b0f06a6\ngke-8d7225b757872b0f06a6:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0TwjNFdXL0OC2Qt0dfP64bpc6Yy5vH353AiZ/0V9WJJ5n7Qrk7oQbbtGXYuWYs/+cPx7sA3jGh6CRNkPPTl/0gVrud1XM07gMkBlr8ulyHUIBFG3jEmDipedNHYIioVz6w4ZJhQcDe83n+MTW8a2iNFU8ihqfmjMcyj5q4q8c1jA1zWv06cKG3rlfTHM7E1Y1g/twmgymNkj55vMHfax3Zdh3zsjBqAsAhWLTCCPLpU39qXg90uDnzunoXQ0rmGVliJyhrHfeJlY5trC8C1M0dI4DVRpeT2PtS9YTMoJ017hA+To848af9S5bnpQ0eHhqaMGsAjwuaxULXIPEZZqz gke-8d7225b757872b0f06a6@gke-8d7225b757872b0f06a6\ngke-8d7225b757872b0f06a6:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDbYis3+c9yPGIVnC1PzVTlLVFf+8C67ElBXCFm75E6H3J3chHxAk8kc9VKEk6MoqNEL1xWH9B0GI+IeWcqJC8IhaPAv/FDqub2IUf0YZCUnjU48Y709DodM1+IQZZcmM4bDaiRzGoB+0H9TI2rL2jhb17xckvztWLTf4aKxgRUWn655FORnrcs7064kH8c4c+W+qgUlG1P5Vad6H1EmnFG6AB488kf9y5dE7A1tDQqX/Ssf5atcGlHMR/5gdTqEF2nx40j1btDBAlHOBSBOEsNOHe7xGKi+KDlyvJEjuZbq7yVY36+twXalxwO+b2wRjV++OZ1fk9oKE9CJjxMA+1r gke-8d7225b757872b0f06a6@gke-8d7225b757872b0f06a6" - }, - { - "key": "ssh-keys", - "value": "spiffxp:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCpkTcxcoyyH/fEAAY3pRCXJqewZ68piwWCIxR/hUpWX8FEwRIOih6yNsuS+BiKID9yEBVjuEOVLIrG/0aqF7OJEqnYyriHfsYDzwmIu8h9v5AhQBwZq5eDIdqiHqYM6+7S1y5L/cmW5dYAgKzNd2qeR0n4xuFfgMXcsraKoqJsiyW8CMz/f64C710k9rp0YHSS/v8kR2Q4ypz9TzVazefTCfHpDbTFMhdgKPTjQODmYLOWlSsIwIo4h7GNViAONmAjH7+2rXg6139dMxect5/HAlSG3G+92YHMOB3GCMDM+GpLrJeCOx4HZRDU7ix+JKCKjOAZndomxkVdkxH7TrkH google-ssh {\"userName\":\"spiffxp@google.com\",\"expireOn\":\"2020-10-22T18:47:27+0000\"}\nspiffxp:ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBKZcHfJn+tLvb6Qc6xdvI3KCwUAGLdXR17KuavgOO4OWeBS2nDfwdZN6VDcOPzWnAWqGieRlcJzmI6EQbZ5FM7k= google-ssh {\"userName\":\"spiffxp@google.com\",\"expireOn\":\"2020-10-22T18:47:26+0000\"}\n" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-04-30T13:57:24.496-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "773781448124-compute@developer.gserviceaccount.com", - "id": "15110083642295643", - "kind": "compute#project", - "name": "k8s-infra-prow-build", - "quotas": [ - { - "limit": 5000, - "metric": "SNAPSHOTS" - }, - { - "limit": 15, - "metric": "NETWORKS" - }, - { - "limit": 200, - "metric": "FIREWALLS" - }, - { - "limit": 2000, - "metric": "IMAGES" - }, - { - "limit": 21, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 250, - "metric": "ROUTES" - }, - { - "limit": 45, - "metric": "FORWARDING_RULES" - }, - { - "limit": 150, - "metric": "TARGET_POOLS" - }, - { - "limit": 150, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 69, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 150, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 30, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 30, - "metric": "URL_MAPS" - }, - { - "limit": 9, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 300, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 15, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 30, - "metric": "VPN_TUNNELS" - }, - { - "limit": 9, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 10, - "metric": "ROUTERS" - }, - { - "limit": 30, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 30, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 30, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 175, - "metric": "SUBNETWORKS" - }, - { - "limit": 30, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 100, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 45, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 300, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 15, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 2000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 15, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 45, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-prow-build", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-infra-prow-build/services/container/clusters.txt b/audit/projects/k8s-infra-prow-build/services/container/clusters.txt deleted file mode 100644 index 969a5fbab376..000000000000 --- a/audit/projects/k8s-infra-prow-build/services/container/clusters.txt +++ /dev/null @@ -1 +0,0 @@ -prow-build us-central1 us-central1-c;us-central1-f;us-central1-b RUNNING diff --git a/audit/projects/k8s-infra-prow-build/services/enabled.txt b/audit/projects/k8s-infra-prow-build/services/enabled.txt deleted file mode 100644 index 4b12e4992dd4..000000000000 --- a/audit/projects/k8s-infra-prow-build/services/enabled.txt +++ /dev/null @@ -1,21 +0,0 @@ -NAME TITLE -bigquery.googleapis.com BigQuery API -bigquerystorage.googleapis.com BigQuery Storage API -cloudbuild.googleapis.com Cloud Build API -compute.googleapis.com Compute Engine API -container.googleapis.com Kubernetes Engine API -containerregistry.googleapis.com Container Registry API -deploymentmanager.googleapis.com Cloud Deployment Manager V2 API -iam.googleapis.com Identity and Access Management (IAM) API -iamcredentials.googleapis.com IAM Service Account Credentials API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -serviceusage.googleapis.com Service Usage API -stackdriver.googleapis.com Stackdriver API -staging-container.sandbox.googleapis.com Kubernetes Engine API (Staging) -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage -test-container.sandbox.googleapis.com Kubernetes Engine API (Test) diff --git a/audit/projects/k8s-release-test-prod/buckets/artifacts.k8s-release-test-prod.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-release-test-prod/buckets/artifacts.k8s-release-test-prod.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index e392c5a4e645..000000000000 --- a/audit/projects/k8s-release-test-prod/buckets/artifacts.k8s-release-test-prod.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-release-test-prod.appspot.com: - Enabled: True - LockedTime: 2020-01-28 00:34:20.347000+00:00 - diff --git a/audit/projects/k8s-release-test-prod/buckets/artifacts.k8s-release-test-prod.appspot.com/cors.txt b/audit/projects/k8s-release-test-prod/buckets/artifacts.k8s-release-test-prod.appspot.com/cors.txt deleted file mode 100644 index a09d7dee952c..000000000000 --- a/audit/projects/k8s-release-test-prod/buckets/artifacts.k8s-release-test-prod.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-release-test-prod.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-release-test-prod/buckets/artifacts.k8s-release-test-prod.appspot.com/iam.json b/audit/projects/k8s-release-test-prod/buckets/artifacts.k8s-release-test-prod.appspot.com/iam.json deleted file mode 100644 index cc4c7629e1ea..000000000000 --- a/audit/projects/k8s-release-test-prod/buckets/artifacts.k8s-release-test-prod.appspot.com/iam.json +++ /dev/null @@ -1,41 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-release-test-prod", - "projectOwner:k8s-release-test-prod" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io", - "projectViewer:k8s-release-test-prod" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-release-test-prod/buckets/artifacts.k8s-release-test-prod.appspot.com/logging.txt b/audit/projects/k8s-release-test-prod/buckets/artifacts.k8s-release-test-prod.appspot.com/logging.txt deleted file mode 100644 index 1e14ec283a27..000000000000 --- a/audit/projects/k8s-release-test-prod/buckets/artifacts.k8s-release-test-prod.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-release-test-prod.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-release-test-prod/buckets/asia.artifacts.k8s-release-test-prod.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-release-test-prod/buckets/asia.artifacts.k8s-release-test-prod.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 5afd667168c2..000000000000 --- a/audit/projects/k8s-release-test-prod/buckets/asia.artifacts.k8s-release-test-prod.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://asia.artifacts.k8s-release-test-prod.appspot.com: - Enabled: True - LockedTime: 2019-10-07 22:07:29.774000+00:00 - diff --git a/audit/projects/k8s-release-test-prod/buckets/asia.artifacts.k8s-release-test-prod.appspot.com/cors.txt b/audit/projects/k8s-release-test-prod/buckets/asia.artifacts.k8s-release-test-prod.appspot.com/cors.txt deleted file mode 100644 index f4505cde1579..000000000000 --- a/audit/projects/k8s-release-test-prod/buckets/asia.artifacts.k8s-release-test-prod.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://asia.artifacts.k8s-release-test-prod.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-release-test-prod/buckets/asia.artifacts.k8s-release-test-prod.appspot.com/iam.json b/audit/projects/k8s-release-test-prod/buckets/asia.artifacts.k8s-release-test-prod.appspot.com/iam.json deleted file mode 100644 index 78b6581be00b..000000000000 --- a/audit/projects/k8s-release-test-prod/buckets/asia.artifacts.k8s-release-test-prod.appspot.com/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-release-test-prod", - "projectOwner:k8s-release-test-prod", - "serviceAccount:k8s-infra-gcr-promoter@k8s-release-test-prod.iam.gserviceaccount.com" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-kubernetes@kubernetes.io", - "projectViewer:k8s-release-test-prod" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-kubernetes@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-kubernetes@kubernetes.io", - "serviceAccount:k8s-infra-gcr-promoter@k8s-release-test-prod.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-release-test-prod/buckets/asia.artifacts.k8s-release-test-prod.appspot.com/logging.txt b/audit/projects/k8s-release-test-prod/buckets/asia.artifacts.k8s-release-test-prod.appspot.com/logging.txt deleted file mode 100644 index 88bb4d74266f..000000000000 --- a/audit/projects/k8s-release-test-prod/buckets/asia.artifacts.k8s-release-test-prod.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://asia.artifacts.k8s-release-test-prod.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-release-test-prod/buckets/eu.artifacts.k8s-release-test-prod.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-release-test-prod/buckets/eu.artifacts.k8s-release-test-prod.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 5d05b6a7c7fc..000000000000 --- a/audit/projects/k8s-release-test-prod/buckets/eu.artifacts.k8s-release-test-prod.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://eu.artifacts.k8s-release-test-prod.appspot.com: - Enabled: True - LockedTime: 2019-10-07 22:06:47.116000+00:00 - diff --git a/audit/projects/k8s-release-test-prod/buckets/eu.artifacts.k8s-release-test-prod.appspot.com/cors.txt b/audit/projects/k8s-release-test-prod/buckets/eu.artifacts.k8s-release-test-prod.appspot.com/cors.txt deleted file mode 100644 index bd3a8b6fe751..000000000000 --- a/audit/projects/k8s-release-test-prod/buckets/eu.artifacts.k8s-release-test-prod.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://eu.artifacts.k8s-release-test-prod.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-release-test-prod/buckets/eu.artifacts.k8s-release-test-prod.appspot.com/iam.json b/audit/projects/k8s-release-test-prod/buckets/eu.artifacts.k8s-release-test-prod.appspot.com/iam.json deleted file mode 100644 index 78b6581be00b..000000000000 --- a/audit/projects/k8s-release-test-prod/buckets/eu.artifacts.k8s-release-test-prod.appspot.com/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-release-test-prod", - "projectOwner:k8s-release-test-prod", - "serviceAccount:k8s-infra-gcr-promoter@k8s-release-test-prod.iam.gserviceaccount.com" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-kubernetes@kubernetes.io", - "projectViewer:k8s-release-test-prod" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-kubernetes@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-kubernetes@kubernetes.io", - "serviceAccount:k8s-infra-gcr-promoter@k8s-release-test-prod.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-release-test-prod/buckets/eu.artifacts.k8s-release-test-prod.appspot.com/logging.txt b/audit/projects/k8s-release-test-prod/buckets/eu.artifacts.k8s-release-test-prod.appspot.com/logging.txt deleted file mode 100644 index fe3cb68dad03..000000000000 --- a/audit/projects/k8s-release-test-prod/buckets/eu.artifacts.k8s-release-test-prod.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://eu.artifacts.k8s-release-test-prod.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod-gcb/bucketpolicyonly.txt b/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod-gcb/bucketpolicyonly.txt deleted file mode 100644 index 66d84f774d75..000000000000 --- a/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-release-test-prod-gcb: - Enabled: True - LockedTime: 2020-01-28 00:34:56.848000+00:00 - diff --git a/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod-gcb/cors.txt b/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod-gcb/cors.txt deleted file mode 100644 index 17c9fa899fa2..000000000000 --- a/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-release-test-prod-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod-gcb/iam.json b/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod-gcb/iam.json deleted file mode 100644 index 2e0ccc05af56..000000000000 --- a/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod-gcb/iam.json +++ /dev/null @@ -1,52 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-release-test-prod", - "projectOwner:k8s-release-test-prod" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io", - "projectViewer:k8s-release-test-prod" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod-gcb/logging.txt b/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod-gcb/logging.txt deleted file mode 100644 index 423235da3758..000000000000 --- a/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-release-test-prod-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod/bucketpolicyonly.txt b/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod/bucketpolicyonly.txt deleted file mode 100644 index e818143724c0..000000000000 --- a/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-release-test-prod: - Enabled: True - LockedTime: 2019-10-08 22:17:03.831000+00:00 - diff --git a/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod/cors.txt b/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod/cors.txt deleted file mode 100644 index 067b995e1d9c..000000000000 --- a/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-release-test-prod/ has no CORS configuration. diff --git a/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod/iam.json b/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod/iam.json deleted file mode 100644 index fd87050fc3b9..000000000000 --- a/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-release-test-prod", - "projectOwner:k8s-release-test-prod" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io", - "projectViewer:k8s-release-test-prod", - "serviceAccount:615281671549@cloudbuild.gserviceaccount.com" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io", - "serviceAccount:615281671549@cloudbuild.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io", - "serviceAccount:615281671549@cloudbuild.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod/logging.txt b/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod/logging.txt deleted file mode 100644 index 3298e0ff2d46..000000000000 --- a/audit/projects/k8s-release-test-prod/buckets/k8s-release-test-prod/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-release-test-prod/ has no logging configuration. diff --git a/audit/projects/k8s-release-test-prod/buckets/us.artifacts.k8s-release-test-prod.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-release-test-prod/buckets/us.artifacts.k8s-release-test-prod.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index ff6b1ed14807..000000000000 --- a/audit/projects/k8s-release-test-prod/buckets/us.artifacts.k8s-release-test-prod.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://us.artifacts.k8s-release-test-prod.appspot.com: - Enabled: True - LockedTime: 2019-10-07 22:06:09.422000+00:00 - diff --git a/audit/projects/k8s-release-test-prod/buckets/us.artifacts.k8s-release-test-prod.appspot.com/cors.txt b/audit/projects/k8s-release-test-prod/buckets/us.artifacts.k8s-release-test-prod.appspot.com/cors.txt deleted file mode 100644 index bcbff6b50444..000000000000 --- a/audit/projects/k8s-release-test-prod/buckets/us.artifacts.k8s-release-test-prod.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://us.artifacts.k8s-release-test-prod.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-release-test-prod/buckets/us.artifacts.k8s-release-test-prod.appspot.com/iam.json b/audit/projects/k8s-release-test-prod/buckets/us.artifacts.k8s-release-test-prod.appspot.com/iam.json deleted file mode 100644 index 78b6581be00b..000000000000 --- a/audit/projects/k8s-release-test-prod/buckets/us.artifacts.k8s-release-test-prod.appspot.com/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-release-test-prod", - "projectOwner:k8s-release-test-prod", - "serviceAccount:k8s-infra-gcr-promoter@k8s-release-test-prod.iam.gserviceaccount.com" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-kubernetes@kubernetes.io", - "projectViewer:k8s-release-test-prod" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-kubernetes@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-kubernetes@kubernetes.io", - "serviceAccount:k8s-infra-gcr-promoter@k8s-release-test-prod.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-release-test-prod/buckets/us.artifacts.k8s-release-test-prod.appspot.com/logging.txt b/audit/projects/k8s-release-test-prod/buckets/us.artifacts.k8s-release-test-prod.appspot.com/logging.txt deleted file mode 100644 index d9d2a1fea573..000000000000 --- a/audit/projects/k8s-release-test-prod/buckets/us.artifacts.k8s-release-test-prod.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://us.artifacts.k8s-release-test-prod.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-release-test-prod/description.json b/audit/projects/k8s-release-test-prod/description.json deleted file mode 100644 index 740deff80cea..000000000000 --- a/audit/projects/k8s-release-test-prod/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2019-07-09T22:05:11.907Z", - "lifecycleState": "ACTIVE", - "name": "k8s-release-test-prod", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-release-test-prod", - "projectNumber": "925892675446" -} diff --git a/audit/projects/k8s-release-test-prod/iam.json b/audit/projects/k8s-release-test-prod/iam.json deleted file mode 100644 index c735197e4345..000000000000 --- a/audit/projects/k8s-release-test-prod/iam.json +++ /dev/null @@ -1,81 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:925892675446@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-925892675446@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io" - ], - "role": "roles/cloudkms.admin" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io" - ], - "role": "roles/cloudkms.cryptoKeyEncrypterDecrypter" - }, - { - "members": [ - "serviceAccount:service-925892675446@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-925892675446@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:925892675446-compute@developer.gserviceaccount.com", - "serviceAccount:925892675446@cloudservices.gserviceaccount.com", - "serviceAccount:service-925892675446@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io", - "group:k8s-infra-release-viewers@kubernetes.io", - "group:k8s-infra-staging-kubernetes@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-release-test-prod/service-accounts/925892675446-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-release-test-prod/service-accounts/925892675446-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 2b911c7373c7..000000000000 --- a/audit/projects/k8s-release-test-prod/service-accounts/925892675446-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "925892675446-compute@developer.gserviceaccount.com", - "name": "projects/k8s-release-test-prod/serviceAccounts/925892675446-compute@developer.gserviceaccount.com", - "oauth2ClientId": "113219924149219724443", - "projectId": "k8s-release-test-prod", - "uniqueId": "113219924149219724443" -} diff --git a/audit/projects/k8s-release-test-prod/service-accounts/925892675446-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-release-test-prod/service-accounts/925892675446-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-release-test-prod/service-accounts/925892675446-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-release-test-prod/service-accounts/k8s-infra-gcr-promoter@k8s-release-test-prod.iam.gserviceaccount.com/description.json b/audit/projects/k8s-release-test-prod/service-accounts/k8s-infra-gcr-promoter@k8s-release-test-prod.iam.gserviceaccount.com/description.json deleted file mode 100644 index 712f67092b1c..000000000000 --- a/audit/projects/k8s-release-test-prod/service-accounts/k8s-infra-gcr-promoter@k8s-release-test-prod.iam.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "k8s-infra container image promoter", - "email": "k8s-infra-gcr-promoter@k8s-release-test-prod.iam.gserviceaccount.com", - "name": "projects/k8s-release-test-prod/serviceAccounts/k8s-infra-gcr-promoter@k8s-release-test-prod.iam.gserviceaccount.com", - "oauth2ClientId": "105695964713766714110", - "projectId": "k8s-release-test-prod", - "uniqueId": "105695964713766714110" -} diff --git a/audit/projects/k8s-release-test-prod/service-accounts/k8s-infra-gcr-promoter@k8s-release-test-prod.iam.gserviceaccount.com/iam.json b/audit/projects/k8s-release-test-prod/service-accounts/k8s-infra-gcr-promoter@k8s-release-test-prod.iam.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-release-test-prod/service-accounts/k8s-infra-gcr-promoter@k8s-release-test-prod.iam.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-release-test-prod/services/compute/project-info.json b/audit/projects/k8s-release-test-prod/services/compute/project-info.json deleted file mode 100644 index 3f160d85646c..000000000000 --- a/audit/projects/k8s-release-test-prod/services/compute/project-info.json +++ /dev/null @@ -1,171 +0,0 @@ -{ - "commonInstanceMetadata": { - "kind": "compute#metadata" - }, - "creationTimestamp": "2019-07-10T09:51:44.043-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "925892675446-compute@developer.gserviceaccount.com", - "id": "6576985402275244367", - "kind": "compute#project", - "name": "k8s-release-test-prod", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-release-test-prod", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-release-test-prod/services/enabled.txt b/audit/projects/k8s-release-test-prod/services/enabled.txt deleted file mode 100644 index f9b130781404..000000000000 --- a/audit/projects/k8s-release-test-prod/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -compute.googleapis.com Compute Engine API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-release/buckets/artifacts.k8s-release.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-release/buckets/artifacts.k8s-release.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index a8e12f611f49..000000000000 --- a/audit/projects/k8s-release/buckets/artifacts.k8s-release.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-release.appspot.com: - Enabled: True - LockedTime: 2020-11-05 20:49:48.627000+00:00 - diff --git a/audit/projects/k8s-release/buckets/artifacts.k8s-release.appspot.com/cors.txt b/audit/projects/k8s-release/buckets/artifacts.k8s-release.appspot.com/cors.txt deleted file mode 100644 index 40d610b3990e..000000000000 --- a/audit/projects/k8s-release/buckets/artifacts.k8s-release.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-release.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-release/buckets/artifacts.k8s-release.appspot.com/iam.json b/audit/projects/k8s-release/buckets/artifacts.k8s-release.appspot.com/iam.json deleted file mode 100644 index c29862cf2b96..000000000000 --- a/audit/projects/k8s-release/buckets/artifacts.k8s-release.appspot.com/iam.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-release", - "projectOwner:k8s-release" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-release" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-release/buckets/artifacts.k8s-release.appspot.com/logging.txt b/audit/projects/k8s-release/buckets/artifacts.k8s-release.appspot.com/logging.txt deleted file mode 100644 index bdb41e5c5239..000000000000 --- a/audit/projects/k8s-release/buckets/artifacts.k8s-release.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-release.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-release/buckets/k8s-release-dev-asia/bucketpolicyonly.txt b/audit/projects/k8s-release/buckets/k8s-release-dev-asia/bucketpolicyonly.txt deleted file mode 100644 index c5f8c7defa57..000000000000 --- a/audit/projects/k8s-release/buckets/k8s-release-dev-asia/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-release-dev-asia: - Enabled: True - LockedTime: 2020-11-29 23:11:21.538000+00:00 - diff --git a/audit/projects/k8s-release/buckets/k8s-release-dev-asia/cors.txt b/audit/projects/k8s-release/buckets/k8s-release-dev-asia/cors.txt deleted file mode 100644 index feec9e3a0987..000000000000 --- a/audit/projects/k8s-release/buckets/k8s-release-dev-asia/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-release-dev-asia/ has no CORS configuration. diff --git a/audit/projects/k8s-release/buckets/k8s-release-dev-asia/iam.json b/audit/projects/k8s-release/buckets/k8s-release-dev-asia/iam.json deleted file mode 100644 index 2be7d4b581ac..000000000000 --- a/audit/projects/k8s-release/buckets/k8s-release-dev-asia/iam.json +++ /dev/null @@ -1,41 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-release", - "projectOwner:k8s-release" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-release" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-release/buckets/k8s-release-dev-asia/logging.txt b/audit/projects/k8s-release/buckets/k8s-release-dev-asia/logging.txt deleted file mode 100644 index 090d7b7cfbf7..000000000000 --- a/audit/projects/k8s-release/buckets/k8s-release-dev-asia/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-release-dev-asia/ has no logging configuration. diff --git a/audit/projects/k8s-release/buckets/k8s-release-dev-eu/bucketpolicyonly.txt b/audit/projects/k8s-release/buckets/k8s-release-dev-eu/bucketpolicyonly.txt deleted file mode 100644 index 3235ff7dfc01..000000000000 --- a/audit/projects/k8s-release/buckets/k8s-release-dev-eu/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-release-dev-eu: - Enabled: True - LockedTime: 2020-11-29 23:11:50.322000+00:00 - diff --git a/audit/projects/k8s-release/buckets/k8s-release-dev-eu/cors.txt b/audit/projects/k8s-release/buckets/k8s-release-dev-eu/cors.txt deleted file mode 100644 index 45ac4490eb43..000000000000 --- a/audit/projects/k8s-release/buckets/k8s-release-dev-eu/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-release-dev-eu/ has no CORS configuration. diff --git a/audit/projects/k8s-release/buckets/k8s-release-dev-eu/iam.json b/audit/projects/k8s-release/buckets/k8s-release-dev-eu/iam.json deleted file mode 100644 index 2be7d4b581ac..000000000000 --- a/audit/projects/k8s-release/buckets/k8s-release-dev-eu/iam.json +++ /dev/null @@ -1,41 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-release", - "projectOwner:k8s-release" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-release" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-release/buckets/k8s-release-dev-eu/logging.txt b/audit/projects/k8s-release/buckets/k8s-release-dev-eu/logging.txt deleted file mode 100644 index 02f7c5904c39..000000000000 --- a/audit/projects/k8s-release/buckets/k8s-release-dev-eu/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-release-dev-eu/ has no logging configuration. diff --git a/audit/projects/k8s-release/buckets/k8s-release-dev/bucketpolicyonly.txt b/audit/projects/k8s-release/buckets/k8s-release-dev/bucketpolicyonly.txt deleted file mode 100644 index bb8937fc93b6..000000000000 --- a/audit/projects/k8s-release/buckets/k8s-release-dev/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-release-dev: - Enabled: True - LockedTime: 2020-11-29 23:10:52.826000+00:00 - diff --git a/audit/projects/k8s-release/buckets/k8s-release-dev/cors.txt b/audit/projects/k8s-release/buckets/k8s-release-dev/cors.txt deleted file mode 100644 index 1cd5f8d841d7..000000000000 --- a/audit/projects/k8s-release/buckets/k8s-release-dev/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-release-dev/ has no CORS configuration. diff --git a/audit/projects/k8s-release/buckets/k8s-release-dev/iam.json b/audit/projects/k8s-release/buckets/k8s-release-dev/iam.json deleted file mode 100644 index 2be7d4b581ac..000000000000 --- a/audit/projects/k8s-release/buckets/k8s-release-dev/iam.json +++ /dev/null @@ -1,41 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-release", - "projectOwner:k8s-release" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-release" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-release/buckets/k8s-release-dev/logging.txt b/audit/projects/k8s-release/buckets/k8s-release-dev/logging.txt deleted file mode 100644 index ca4931fa5539..000000000000 --- a/audit/projects/k8s-release/buckets/k8s-release-dev/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-release-dev/ has no logging configuration. diff --git a/audit/projects/k8s-release/buckets/k8s-release-gcb/bucketpolicyonly.txt b/audit/projects/k8s-release/buckets/k8s-release-gcb/bucketpolicyonly.txt deleted file mode 100644 index 0fea1c6e6f73..000000000000 --- a/audit/projects/k8s-release/buckets/k8s-release-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-release-gcb: - Enabled: True - LockedTime: 2020-11-05 20:50:43.122000+00:00 - diff --git a/audit/projects/k8s-release/buckets/k8s-release-gcb/cors.txt b/audit/projects/k8s-release/buckets/k8s-release-gcb/cors.txt deleted file mode 100644 index 817679b219d3..000000000000 --- a/audit/projects/k8s-release/buckets/k8s-release-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-release-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-release/buckets/k8s-release-gcb/iam.json b/audit/projects/k8s-release/buckets/k8s-release-gcb/iam.json deleted file mode 100644 index 4f8ae0abaaa4..000000000000 --- a/audit/projects/k8s-release/buckets/k8s-release-gcb/iam.json +++ /dev/null @@ -1,48 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-release", - "projectOwner:k8s-release" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-release" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-release/buckets/k8s-release-gcb/logging.txt b/audit/projects/k8s-release/buckets/k8s-release-gcb/logging.txt deleted file mode 100644 index e73ca85d6d67..000000000000 --- a/audit/projects/k8s-release/buckets/k8s-release-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-release-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-release/buckets/k8s-release-pull/bucketpolicyonly.txt b/audit/projects/k8s-release/buckets/k8s-release-pull/bucketpolicyonly.txt deleted file mode 100644 index 1dca819a2b42..000000000000 --- a/audit/projects/k8s-release/buckets/k8s-release-pull/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-release-pull: - Enabled: True - LockedTime: 2020-11-29 23:12:16.142000+00:00 - diff --git a/audit/projects/k8s-release/buckets/k8s-release-pull/cors.txt b/audit/projects/k8s-release/buckets/k8s-release-pull/cors.txt deleted file mode 100644 index 7fdbafa25704..000000000000 --- a/audit/projects/k8s-release/buckets/k8s-release-pull/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-release-pull/ has no CORS configuration. diff --git a/audit/projects/k8s-release/buckets/k8s-release-pull/iam.json b/audit/projects/k8s-release/buckets/k8s-release-pull/iam.json deleted file mode 100644 index 27e77b9aff14..000000000000 --- a/audit/projects/k8s-release/buckets/k8s-release-pull/iam.json +++ /dev/null @@ -1,43 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-release", - "projectOwner:k8s-release" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-release", - "serviceAccount:project-304687256732@storage-transfer-service.iam.gserviceaccount.com" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io", - "serviceAccount:project-304687256732@storage-transfer-service.iam.gserviceaccount.com", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-release/buckets/k8s-release-pull/logging.txt b/audit/projects/k8s-release/buckets/k8s-release-pull/logging.txt deleted file mode 100644 index bb9c521109ea..000000000000 --- a/audit/projects/k8s-release/buckets/k8s-release-pull/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-release-pull/ has no logging configuration. diff --git a/audit/projects/k8s-release/buckets/k8s-release/bucketpolicyonly.txt b/audit/projects/k8s-release/buckets/k8s-release/bucketpolicyonly.txt deleted file mode 100644 index 72aeb3b5ec9a..000000000000 --- a/audit/projects/k8s-release/buckets/k8s-release/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-release: - Enabled: True - LockedTime: 2020-11-05 20:50:19.121000+00:00 - diff --git a/audit/projects/k8s-release/buckets/k8s-release/cors.txt b/audit/projects/k8s-release/buckets/k8s-release/cors.txt deleted file mode 100644 index 8448536e9779..000000000000 --- a/audit/projects/k8s-release/buckets/k8s-release/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-release/ has no CORS configuration. diff --git a/audit/projects/k8s-release/buckets/k8s-release/iam.json b/audit/projects/k8s-release/buckets/k8s-release/iam.json deleted file mode 100644 index c29862cf2b96..000000000000 --- a/audit/projects/k8s-release/buckets/k8s-release/iam.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-release", - "projectOwner:k8s-release" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-release" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-release/buckets/k8s-release/logging.txt b/audit/projects/k8s-release/buckets/k8s-release/logging.txt deleted file mode 100644 index 3c4ec0350bb4..000000000000 --- a/audit/projects/k8s-release/buckets/k8s-release/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-release/ has no logging configuration. diff --git a/audit/projects/k8s-release/description.json b/audit/projects/k8s-release/description.json deleted file mode 100644 index ef67e20fce77..000000000000 --- a/audit/projects/k8s-release/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-04T20:07:15.795Z", - "lifecycleState": "ACTIVE", - "name": "k8s-release", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-release", - "projectNumber": "304687256732" -} diff --git a/audit/projects/k8s-release/iam.json b/audit/projects/k8s-release/iam.json deleted file mode 100644 index 32926c3ec53d..000000000000 --- a/audit/projects/k8s-release/iam.json +++ /dev/null @@ -1,66 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:304687256732@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-304687256732@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io" - ], - "role": "roles/cloudkms.admin" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io" - ], - "role": "roles/cloudkms.cryptoKeyEncrypterDecrypter" - }, - { - "members": [ - "serviceAccount:service-304687256732@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io", - "group:k8s-infra-release-viewers@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-release/services/enabled.txt b/audit/projects/k8s-release/services/enabled.txt deleted file mode 100644 index d0f1e5a23de2..000000000000 --- a/audit/projects/k8s-release/services/enabled.txt +++ /dev/null @@ -1,10 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containerregistry.googleapis.com Container Registry API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -pubsub.googleapis.com Cloud Pub/Sub API -stackdriver.googleapis.com Stackdriver API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-releng-prod/description.json b/audit/projects/k8s-releng-prod/description.json deleted file mode 100644 index 7c0026332c1f..000000000000 --- a/audit/projects/k8s-releng-prod/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-03-06T23:27:29.234Z", - "lifecycleState": "ACTIVE", - "name": "k8s-releng-prod", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-releng-prod", - "projectNumber": "689098785215" -} diff --git a/audit/projects/k8s-releng-prod/iam.json b/audit/projects/k8s-releng-prod/iam.json deleted file mode 100644 index 9b34de93b47f..000000000000 --- a/audit/projects/k8s-releng-prod/iam.json +++ /dev/null @@ -1,29 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io" - ], - "role": "roles/cloudkms.admin" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io" - ], - "role": "roles/cloudkms.cryptoKeyEncrypterDecrypter" - }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-release-admins@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-releng-prod/services/enabled.txt b/audit/projects/k8s-releng-prod/services/enabled.txt deleted file mode 100644 index a7fb2612daf5..000000000000 --- a/audit/projects/k8s-releng-prod/services/enabled.txt +++ /dev/null @@ -1,2 +0,0 @@ -NAME TITLE -cloudkms.googleapis.com Cloud Key Management Service (KMS) API diff --git a/audit/projects/k8s-staging-addon-manager/buckets/artifacts.k8s-staging-addon-manager.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-addon-manager/buckets/artifacts.k8s-staging-addon-manager.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 734ea935bf5d..000000000000 --- a/audit/projects/k8s-staging-addon-manager/buckets/artifacts.k8s-staging-addon-manager.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-addon-manager.appspot.com: - Enabled: True - LockedTime: 2020-12-29 15:50:11.853000+00:00 - diff --git a/audit/projects/k8s-staging-addon-manager/buckets/artifacts.k8s-staging-addon-manager.appspot.com/cors.txt b/audit/projects/k8s-staging-addon-manager/buckets/artifacts.k8s-staging-addon-manager.appspot.com/cors.txt deleted file mode 100644 index f6980ef2a0d4..000000000000 --- a/audit/projects/k8s-staging-addon-manager/buckets/artifacts.k8s-staging-addon-manager.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-addon-manager.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-addon-manager/buckets/artifacts.k8s-staging-addon-manager.appspot.com/iam.json b/audit/projects/k8s-staging-addon-manager/buckets/artifacts.k8s-staging-addon-manager.appspot.com/iam.json deleted file mode 100644 index 0aeed7ac7879..000000000000 --- a/audit/projects/k8s-staging-addon-manager/buckets/artifacts.k8s-staging-addon-manager.appspot.com/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-addon-manager", - "projectOwner:k8s-staging-addon-manager" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-addon-manager" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-addon-manager@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-addon-manager@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-addon-manager/buckets/artifacts.k8s-staging-addon-manager.appspot.com/logging.txt b/audit/projects/k8s-staging-addon-manager/buckets/artifacts.k8s-staging-addon-manager.appspot.com/logging.txt deleted file mode 100644 index 8bbf7a727703..000000000000 --- a/audit/projects/k8s-staging-addon-manager/buckets/artifacts.k8s-staging-addon-manager.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-addon-manager.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager-gcb/bucketpolicyonly.txt deleted file mode 100644 index 9031723e911c..000000000000 --- a/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-addon-manager-gcb: - Enabled: True - LockedTime: 2020-12-29 15:50:59.044000+00:00 - diff --git a/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager-gcb/cors.txt b/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager-gcb/cors.txt deleted file mode 100644 index db406e36631f..000000000000 --- a/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-addon-manager-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager-gcb/iam.json b/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager-gcb/iam.json deleted file mode 100644 index a98593d2a8f5..000000000000 --- a/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-addon-manager", - "projectOwner:k8s-staging-addon-manager" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-addon-manager" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-addon-manager@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-addon-manager@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager-gcb/logging.txt b/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager-gcb/logging.txt deleted file mode 100644 index 5792acde43bb..000000000000 --- a/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-addon-manager-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager/bucketpolicyonly.txt b/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager/bucketpolicyonly.txt deleted file mode 100644 index 08e861252ecc..000000000000 --- a/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-addon-manager: - Enabled: True - LockedTime: 2020-12-29 15:50:35.841000+00:00 - diff --git a/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager/cors.txt b/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager/cors.txt deleted file mode 100644 index 0b694f6c4f59..000000000000 --- a/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-addon-manager/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager/iam.json b/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager/iam.json deleted file mode 100644 index 0aeed7ac7879..000000000000 --- a/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-addon-manager", - "projectOwner:k8s-staging-addon-manager" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-addon-manager" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-addon-manager@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-addon-manager@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager/logging.txt b/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager/logging.txt deleted file mode 100644 index b1f025f9883b..000000000000 --- a/audit/projects/k8s-staging-addon-manager/buckets/k8s-staging-addon-manager/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-addon-manager/ has no logging configuration. diff --git a/audit/projects/k8s-staging-addon-manager/description.json b/audit/projects/k8s-staging-addon-manager/description.json deleted file mode 100644 index 5eed1e5e9d6a..000000000000 --- a/audit/projects/k8s-staging-addon-manager/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-09-30T15:49:21.676Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-addon-manager", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-addon-manager", - "projectNumber": "103321906213" -} diff --git a/audit/projects/k8s-staging-addon-manager/iam.json b/audit/projects/k8s-staging-addon-manager/iam.json deleted file mode 100644 index a18f2814b774..000000000000 --- a/audit/projects/k8s-staging-addon-manager/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:103321906213@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-addon-manager@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-103321906213@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-103321906213@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-103321906213@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-103321906213@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-addon-manager@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-addon-manager@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-addon-manager/services/enabled.txt b/audit/projects/k8s-staging-addon-manager/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-addon-manager/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-apisnoop/buckets/artifacts.k8s-staging-apisnoop.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-apisnoop/buckets/artifacts.k8s-staging-apisnoop.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 29687a69a2d2..000000000000 --- a/audit/projects/k8s-staging-apisnoop/buckets/artifacts.k8s-staging-apisnoop.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-apisnoop.appspot.com: - Enabled: True - LockedTime: 2020-04-20 18:12:38.944000+00:00 - diff --git a/audit/projects/k8s-staging-apisnoop/buckets/artifacts.k8s-staging-apisnoop.appspot.com/cors.txt b/audit/projects/k8s-staging-apisnoop/buckets/artifacts.k8s-staging-apisnoop.appspot.com/cors.txt deleted file mode 100644 index 5c495996178e..000000000000 --- a/audit/projects/k8s-staging-apisnoop/buckets/artifacts.k8s-staging-apisnoop.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-apisnoop.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-apisnoop/buckets/artifacts.k8s-staging-apisnoop.appspot.com/iam.json b/audit/projects/k8s-staging-apisnoop/buckets/artifacts.k8s-staging-apisnoop.appspot.com/iam.json deleted file mode 100644 index 2db83f0c01d1..000000000000 --- a/audit/projects/k8s-staging-apisnoop/buckets/artifacts.k8s-staging-apisnoop.appspot.com/iam.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-apisnoop", - "projectOwner:k8s-staging-apisnoop" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-apisnoop@kubernetes.io", - "projectViewer:k8s-staging-apisnoop" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-apisnoop@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-apisnoop@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-apisnoop/buckets/artifacts.k8s-staging-apisnoop.appspot.com/logging.txt b/audit/projects/k8s-staging-apisnoop/buckets/artifacts.k8s-staging-apisnoop.appspot.com/logging.txt deleted file mode 100644 index 85bf1c28afa4..000000000000 --- a/audit/projects/k8s-staging-apisnoop/buckets/artifacts.k8s-staging-apisnoop.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-apisnoop.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-apisnoop/buckets/k8s-staging-apisnoop-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-apisnoop/buckets/k8s-staging-apisnoop-gcb/bucketpolicyonly.txt deleted file mode 100644 index facb1ed50497..000000000000 --- a/audit/projects/k8s-staging-apisnoop/buckets/k8s-staging-apisnoop-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-apisnoop-gcb: - Enabled: True - LockedTime: 2020-04-20 18:13:19.615000+00:00 - diff --git a/audit/projects/k8s-staging-apisnoop/buckets/k8s-staging-apisnoop-gcb/cors.txt b/audit/projects/k8s-staging-apisnoop/buckets/k8s-staging-apisnoop-gcb/cors.txt deleted file mode 100644 index af5c8e4f78a7..000000000000 --- a/audit/projects/k8s-staging-apisnoop/buckets/k8s-staging-apisnoop-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-apisnoop-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-apisnoop/buckets/k8s-staging-apisnoop-gcb/iam.json b/audit/projects/k8s-staging-apisnoop/buckets/k8s-staging-apisnoop-gcb/iam.json deleted file mode 100644 index 0b16243a3a07..000000000000 --- a/audit/projects/k8s-staging-apisnoop/buckets/k8s-staging-apisnoop-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-apisnoop", - "projectOwner:k8s-staging-apisnoop" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-apisnoop" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-apisnoop@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-apisnoop@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-apisnoop/buckets/k8s-staging-apisnoop-gcb/logging.txt b/audit/projects/k8s-staging-apisnoop/buckets/k8s-staging-apisnoop-gcb/logging.txt deleted file mode 100644 index ade87e555701..000000000000 --- a/audit/projects/k8s-staging-apisnoop/buckets/k8s-staging-apisnoop-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-apisnoop-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-apisnoop/buckets/k8s-staging-apisnoop/bucketpolicyonly.txt b/audit/projects/k8s-staging-apisnoop/buckets/k8s-staging-apisnoop/bucketpolicyonly.txt deleted file mode 100644 index b2b05eeb6a31..000000000000 --- a/audit/projects/k8s-staging-apisnoop/buckets/k8s-staging-apisnoop/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-apisnoop: - Enabled: True - LockedTime: 2020-04-20 18:13:01.916000+00:00 - diff --git a/audit/projects/k8s-staging-apisnoop/buckets/k8s-staging-apisnoop/cors.txt b/audit/projects/k8s-staging-apisnoop/buckets/k8s-staging-apisnoop/cors.txt deleted file mode 100644 index c4658cc77611..000000000000 --- a/audit/projects/k8s-staging-apisnoop/buckets/k8s-staging-apisnoop/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-apisnoop/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-apisnoop/buckets/k8s-staging-apisnoop/iam.json b/audit/projects/k8s-staging-apisnoop/buckets/k8s-staging-apisnoop/iam.json deleted file mode 100644 index b5744df02953..000000000000 --- a/audit/projects/k8s-staging-apisnoop/buckets/k8s-staging-apisnoop/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-apisnoop", - "projectOwner:k8s-staging-apisnoop" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-apisnoop" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-apisnoop@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-apisnoop@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-apisnoop/buckets/k8s-staging-apisnoop/logging.txt b/audit/projects/k8s-staging-apisnoop/buckets/k8s-staging-apisnoop/logging.txt deleted file mode 100644 index 1033a37b04a3..000000000000 --- a/audit/projects/k8s-staging-apisnoop/buckets/k8s-staging-apisnoop/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-apisnoop/ has no logging configuration. diff --git a/audit/projects/k8s-staging-apisnoop/description.json b/audit/projects/k8s-staging-apisnoop/description.json deleted file mode 100644 index fc4cc3eac6dc..000000000000 --- a/audit/projects/k8s-staging-apisnoop/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-01-21T18:11:47.702Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-apisnoop", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-apisnoop", - "projectNumber": "782271650518" -} diff --git a/audit/projects/k8s-staging-apisnoop/iam.json b/audit/projects/k8s-staging-apisnoop/iam.json deleted file mode 100644 index 63a99f51e030..000000000000 --- a/audit/projects/k8s-staging-apisnoop/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:782271650518@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-apisnoop@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-782271650518@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-782271650518@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-782271650518@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-782271650518@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-apisnoop@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-apisnoop@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-apisnoop/services/enabled.txt b/audit/projects/k8s-staging-apisnoop/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-apisnoop/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-artifact-promoter/buckets/artifacts.k8s-staging-artifact-promoter.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-artifact-promoter/buckets/artifacts.k8s-staging-artifact-promoter.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 6ddef81aee5d..000000000000 --- a/audit/projects/k8s-staging-artifact-promoter/buckets/artifacts.k8s-staging-artifact-promoter.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-artifact-promoter.appspot.com: - Enabled: True - LockedTime: 2019-11-18 00:07:16.224000+00:00 - diff --git a/audit/projects/k8s-staging-artifact-promoter/buckets/artifacts.k8s-staging-artifact-promoter.appspot.com/cors.txt b/audit/projects/k8s-staging-artifact-promoter/buckets/artifacts.k8s-staging-artifact-promoter.appspot.com/cors.txt deleted file mode 100644 index a3196af226a2..000000000000 --- a/audit/projects/k8s-staging-artifact-promoter/buckets/artifacts.k8s-staging-artifact-promoter.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-artifact-promoter.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-artifact-promoter/buckets/artifacts.k8s-staging-artifact-promoter.appspot.com/iam.json b/audit/projects/k8s-staging-artifact-promoter/buckets/artifacts.k8s-staging-artifact-promoter.appspot.com/iam.json deleted file mode 100644 index 92647e56f9f6..000000000000 --- a/audit/projects/k8s-staging-artifact-promoter/buckets/artifacts.k8s-staging-artifact-promoter.appspot.com/iam.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-artifact-promoter", - "projectOwner:k8s-staging-artifact-promoter" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-artifact-promoter@kubernetes.io", - "projectViewer:k8s-staging-artifact-promoter" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-artifact-promoter@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-artifact-promoter@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-artifact-promoter/buckets/artifacts.k8s-staging-artifact-promoter.appspot.com/logging.txt b/audit/projects/k8s-staging-artifact-promoter/buckets/artifacts.k8s-staging-artifact-promoter.appspot.com/logging.txt deleted file mode 100644 index a3ffc83a3860..000000000000 --- a/audit/projects/k8s-staging-artifact-promoter/buckets/artifacts.k8s-staging-artifact-promoter.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-artifact-promoter.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-artifact-promoter/buckets/k8s-staging-artifact-promoter-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-artifact-promoter/buckets/k8s-staging-artifact-promoter-gcb/bucketpolicyonly.txt deleted file mode 100644 index 4e9aaca0bf70..000000000000 --- a/audit/projects/k8s-staging-artifact-promoter/buckets/k8s-staging-artifact-promoter-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-artifact-promoter-gcb: - Enabled: True - LockedTime: 2019-12-10 16:15:17.716000+00:00 - diff --git a/audit/projects/k8s-staging-artifact-promoter/buckets/k8s-staging-artifact-promoter-gcb/cors.txt b/audit/projects/k8s-staging-artifact-promoter/buckets/k8s-staging-artifact-promoter-gcb/cors.txt deleted file mode 100644 index 48bffac3a0e4..000000000000 --- a/audit/projects/k8s-staging-artifact-promoter/buckets/k8s-staging-artifact-promoter-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-artifact-promoter-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-artifact-promoter/buckets/k8s-staging-artifact-promoter-gcb/iam.json b/audit/projects/k8s-staging-artifact-promoter/buckets/k8s-staging-artifact-promoter-gcb/iam.json deleted file mode 100644 index 3b509f709a36..000000000000 --- a/audit/projects/k8s-staging-artifact-promoter/buckets/k8s-staging-artifact-promoter-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-artifact-promoter", - "projectOwner:k8s-staging-artifact-promoter" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-artifact-promoter" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-artifact-promoter@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-artifact-promoter@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-artifact-promoter/buckets/k8s-staging-artifact-promoter-gcb/logging.txt b/audit/projects/k8s-staging-artifact-promoter/buckets/k8s-staging-artifact-promoter-gcb/logging.txt deleted file mode 100644 index 3232f217e247..000000000000 --- a/audit/projects/k8s-staging-artifact-promoter/buckets/k8s-staging-artifact-promoter-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-artifact-promoter-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-artifact-promoter/buckets/k8s-staging-artifact-promoter/bucketpolicyonly.txt b/audit/projects/k8s-staging-artifact-promoter/buckets/k8s-staging-artifact-promoter/bucketpolicyonly.txt deleted file mode 100644 index d47c034e70c9..000000000000 --- a/audit/projects/k8s-staging-artifact-promoter/buckets/k8s-staging-artifact-promoter/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-artifact-promoter: - Enabled: True - LockedTime: 2019-11-18 00:07:35.916000+00:00 - diff --git a/audit/projects/k8s-staging-artifact-promoter/buckets/k8s-staging-artifact-promoter/cors.txt b/audit/projects/k8s-staging-artifact-promoter/buckets/k8s-staging-artifact-promoter/cors.txt deleted file mode 100644 index 86ec6b471ddf..000000000000 --- a/audit/projects/k8s-staging-artifact-promoter/buckets/k8s-staging-artifact-promoter/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-artifact-promoter/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-artifact-promoter/buckets/k8s-staging-artifact-promoter/iam.json b/audit/projects/k8s-staging-artifact-promoter/buckets/k8s-staging-artifact-promoter/iam.json deleted file mode 100644 index aaaf4f16f9fa..000000000000 --- a/audit/projects/k8s-staging-artifact-promoter/buckets/k8s-staging-artifact-promoter/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-artifact-promoter", - "projectOwner:k8s-staging-artifact-promoter" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-artifact-promoter" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-artifact-promoter@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-artifact-promoter@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-artifact-promoter/buckets/k8s-staging-artifact-promoter/logging.txt b/audit/projects/k8s-staging-artifact-promoter/buckets/k8s-staging-artifact-promoter/logging.txt deleted file mode 100644 index 498850f0febc..000000000000 --- a/audit/projects/k8s-staging-artifact-promoter/buckets/k8s-staging-artifact-promoter/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-artifact-promoter/ has no logging configuration. diff --git a/audit/projects/k8s-staging-artifact-promoter/description.json b/audit/projects/k8s-staging-artifact-promoter/description.json deleted file mode 100644 index 994958f36a66..000000000000 --- a/audit/projects/k8s-staging-artifact-promoter/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2019-08-20T00:06:26.042Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-artifact-promoter", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-artifact-promoter", - "projectNumber": "675573440409" -} diff --git a/audit/projects/k8s-staging-artifact-promoter/iam.json b/audit/projects/k8s-staging-artifact-promoter/iam.json deleted file mode 100644 index b4a5bf11f517..000000000000 --- a/audit/projects/k8s-staging-artifact-promoter/iam.json +++ /dev/null @@ -1,76 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:675573440409@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-artifact-promoter@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-675573440409@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-675573440409@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-675573440409@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-675573440409@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:675573440409-compute@developer.gserviceaccount.com", - "serviceAccount:675573440409@cloudservices.gserviceaccount.com", - "serviceAccount:service-675573440409@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-artifact-promoter@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-artifact-promoter@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-artifact-promoter/service-accounts/675573440409-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-staging-artifact-promoter/service-accounts/675573440409-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 431d2eed1e40..000000000000 --- a/audit/projects/k8s-staging-artifact-promoter/service-accounts/675573440409-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "675573440409-compute@developer.gserviceaccount.com", - "name": "projects/k8s-staging-artifact-promoter/serviceAccounts/675573440409-compute@developer.gserviceaccount.com", - "oauth2ClientId": "108245092545964877064", - "projectId": "k8s-staging-artifact-promoter", - "uniqueId": "108245092545964877064" -} diff --git a/audit/projects/k8s-staging-artifact-promoter/service-accounts/675573440409-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-staging-artifact-promoter/service-accounts/675573440409-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-staging-artifact-promoter/service-accounts/675573440409-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-staging-artifact-promoter/services/compute/project-info.json b/audit/projects/k8s-staging-artifact-promoter/services/compute/project-info.json deleted file mode 100644 index dd6d7217a9c3..000000000000 --- a/audit/projects/k8s-staging-artifact-promoter/services/compute/project-info.json +++ /dev/null @@ -1,171 +0,0 @@ -{ - "commonInstanceMetadata": { - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-05-06T21:55:38.693-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "675573440409-compute@developer.gserviceaccount.com", - "id": "1279192389912504869", - "kind": "compute#project", - "name": "k8s-staging-artifact-promoter", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-staging-artifact-promoter", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-staging-artifact-promoter/services/enabled.txt b/audit/projects/k8s-staging-artifact-promoter/services/enabled.txt deleted file mode 100644 index 661451636fab..000000000000 --- a/audit/projects/k8s-staging-artifact-promoter/services/enabled.txt +++ /dev/null @@ -1,13 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -compute.googleapis.com Compute Engine API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-autoscaling/buckets/artifacts.k8s-staging-autoscaling.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-autoscaling/buckets/artifacts.k8s-staging-autoscaling.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 9f92656084dd..000000000000 --- a/audit/projects/k8s-staging-autoscaling/buckets/artifacts.k8s-staging-autoscaling.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-autoscaling.appspot.com: - Enabled: True - LockedTime: 2020-06-18 19:01:27.162000+00:00 - diff --git a/audit/projects/k8s-staging-autoscaling/buckets/artifacts.k8s-staging-autoscaling.appspot.com/cors.txt b/audit/projects/k8s-staging-autoscaling/buckets/artifacts.k8s-staging-autoscaling.appspot.com/cors.txt deleted file mode 100644 index 7ca030b91581..000000000000 --- a/audit/projects/k8s-staging-autoscaling/buckets/artifacts.k8s-staging-autoscaling.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-autoscaling.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-autoscaling/buckets/artifacts.k8s-staging-autoscaling.appspot.com/iam.json b/audit/projects/k8s-staging-autoscaling/buckets/artifacts.k8s-staging-autoscaling.appspot.com/iam.json deleted file mode 100644 index 78b2e22aa0e1..000000000000 --- a/audit/projects/k8s-staging-autoscaling/buckets/artifacts.k8s-staging-autoscaling.appspot.com/iam.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-autoscaling", - "projectOwner:k8s-staging-autoscaling" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-autoscaling@kubernetes.io", - "projectViewer:k8s-staging-autoscaling" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-autoscaling@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-autoscaling@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-autoscaling/buckets/artifacts.k8s-staging-autoscaling.appspot.com/logging.txt b/audit/projects/k8s-staging-autoscaling/buckets/artifacts.k8s-staging-autoscaling.appspot.com/logging.txt deleted file mode 100644 index c72e77d15661..000000000000 --- a/audit/projects/k8s-staging-autoscaling/buckets/artifacts.k8s-staging-autoscaling.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-autoscaling.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-autoscaling/buckets/k8s-staging-autoscaling-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-autoscaling/buckets/k8s-staging-autoscaling-gcb/bucketpolicyonly.txt deleted file mode 100644 index 1af6292e1eb6..000000000000 --- a/audit/projects/k8s-staging-autoscaling/buckets/k8s-staging-autoscaling-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-autoscaling-gcb: - Enabled: True - LockedTime: 2020-06-18 19:02:10.119000+00:00 - diff --git a/audit/projects/k8s-staging-autoscaling/buckets/k8s-staging-autoscaling-gcb/cors.txt b/audit/projects/k8s-staging-autoscaling/buckets/k8s-staging-autoscaling-gcb/cors.txt deleted file mode 100644 index 33addc8308e5..000000000000 --- a/audit/projects/k8s-staging-autoscaling/buckets/k8s-staging-autoscaling-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-autoscaling-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-autoscaling/buckets/k8s-staging-autoscaling-gcb/iam.json b/audit/projects/k8s-staging-autoscaling/buckets/k8s-staging-autoscaling-gcb/iam.json deleted file mode 100644 index a7ea2603ec47..000000000000 --- a/audit/projects/k8s-staging-autoscaling/buckets/k8s-staging-autoscaling-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-autoscaling", - "projectOwner:k8s-staging-autoscaling" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-autoscaling" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-autoscaling@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-autoscaling@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-autoscaling/buckets/k8s-staging-autoscaling-gcb/logging.txt b/audit/projects/k8s-staging-autoscaling/buckets/k8s-staging-autoscaling-gcb/logging.txt deleted file mode 100644 index b630723aecf5..000000000000 --- a/audit/projects/k8s-staging-autoscaling/buckets/k8s-staging-autoscaling-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-autoscaling-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-autoscaling/buckets/k8s-staging-autoscaling/bucketpolicyonly.txt b/audit/projects/k8s-staging-autoscaling/buckets/k8s-staging-autoscaling/bucketpolicyonly.txt deleted file mode 100644 index 9b60f78e5515..000000000000 --- a/audit/projects/k8s-staging-autoscaling/buckets/k8s-staging-autoscaling/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-autoscaling: - Enabled: True - LockedTime: 2020-06-18 19:01:50.417000+00:00 - diff --git a/audit/projects/k8s-staging-autoscaling/buckets/k8s-staging-autoscaling/cors.txt b/audit/projects/k8s-staging-autoscaling/buckets/k8s-staging-autoscaling/cors.txt deleted file mode 100644 index 5474f99e6265..000000000000 --- a/audit/projects/k8s-staging-autoscaling/buckets/k8s-staging-autoscaling/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-autoscaling/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-autoscaling/buckets/k8s-staging-autoscaling/iam.json b/audit/projects/k8s-staging-autoscaling/buckets/k8s-staging-autoscaling/iam.json deleted file mode 100644 index f7eb4a485725..000000000000 --- a/audit/projects/k8s-staging-autoscaling/buckets/k8s-staging-autoscaling/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-autoscaling", - "projectOwner:k8s-staging-autoscaling" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-autoscaling" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-autoscaling@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-autoscaling@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-autoscaling/buckets/k8s-staging-autoscaling/logging.txt b/audit/projects/k8s-staging-autoscaling/buckets/k8s-staging-autoscaling/logging.txt deleted file mode 100644 index 1c03821e617c..000000000000 --- a/audit/projects/k8s-staging-autoscaling/buckets/k8s-staging-autoscaling/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-autoscaling/ has no logging configuration. diff --git a/audit/projects/k8s-staging-autoscaling/description.json b/audit/projects/k8s-staging-autoscaling/description.json deleted file mode 100644 index 43421e53465a..000000000000 --- a/audit/projects/k8s-staging-autoscaling/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-03-20T19:00:32.292Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-autoscaling", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-autoscaling", - "projectNumber": "371644685964" -} diff --git a/audit/projects/k8s-staging-autoscaling/iam.json b/audit/projects/k8s-staging-autoscaling/iam.json deleted file mode 100644 index cacc23a9bc56..000000000000 --- a/audit/projects/k8s-staging-autoscaling/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:371644685964@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-autoscaling@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-371644685964@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-371644685964@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-371644685964@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-371644685964@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-autoscaling@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-autoscaling@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-autoscaling/services/enabled.txt b/audit/projects/k8s-staging-autoscaling/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-autoscaling/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-bootkube/buckets/artifacts.k8s-staging-bootkube.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-bootkube/buckets/artifacts.k8s-staging-bootkube.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 5b9186fb5105..000000000000 --- a/audit/projects/k8s-staging-bootkube/buckets/artifacts.k8s-staging-bootkube.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-bootkube.appspot.com: - Enabled: True - LockedTime: 2020-09-07 22:17:57.029000+00:00 - diff --git a/audit/projects/k8s-staging-bootkube/buckets/artifacts.k8s-staging-bootkube.appspot.com/cors.txt b/audit/projects/k8s-staging-bootkube/buckets/artifacts.k8s-staging-bootkube.appspot.com/cors.txt deleted file mode 100644 index c38970753d0d..000000000000 --- a/audit/projects/k8s-staging-bootkube/buckets/artifacts.k8s-staging-bootkube.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-bootkube.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-bootkube/buckets/artifacts.k8s-staging-bootkube.appspot.com/iam.json b/audit/projects/k8s-staging-bootkube/buckets/artifacts.k8s-staging-bootkube.appspot.com/iam.json deleted file mode 100644 index 9df7393fd8c6..000000000000 --- a/audit/projects/k8s-staging-bootkube/buckets/artifacts.k8s-staging-bootkube.appspot.com/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-bootkube", - "projectOwner:k8s-staging-bootkube" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-bootkube" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-bootkube@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-bootkube@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-bootkube/buckets/artifacts.k8s-staging-bootkube.appspot.com/logging.txt b/audit/projects/k8s-staging-bootkube/buckets/artifacts.k8s-staging-bootkube.appspot.com/logging.txt deleted file mode 100644 index 1fc4ee77e944..000000000000 --- a/audit/projects/k8s-staging-bootkube/buckets/artifacts.k8s-staging-bootkube.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-bootkube.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube-gcb/bucketpolicyonly.txt deleted file mode 100644 index d2b846d18e4e..000000000000 --- a/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-bootkube-gcb: - Enabled: True - LockedTime: 2020-09-07 22:18:42.337000+00:00 - diff --git a/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube-gcb/cors.txt b/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube-gcb/cors.txt deleted file mode 100644 index 1a0cb09919a7..000000000000 --- a/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-bootkube-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube-gcb/iam.json b/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube-gcb/iam.json deleted file mode 100644 index 6525e97c6b11..000000000000 --- a/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-bootkube", - "projectOwner:k8s-staging-bootkube" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-bootkube" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-bootkube@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-bootkube@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube-gcb/logging.txt b/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube-gcb/logging.txt deleted file mode 100644 index 90ff90ab9741..000000000000 --- a/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-bootkube-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube/bucketpolicyonly.txt b/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube/bucketpolicyonly.txt deleted file mode 100644 index db417ee6a44b..000000000000 --- a/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-bootkube: - Enabled: True - LockedTime: 2020-09-07 22:18:20.834000+00:00 - diff --git a/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube/cors.txt b/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube/cors.txt deleted file mode 100644 index 990585a05c3c..000000000000 --- a/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-bootkube/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube/iam.json b/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube/iam.json deleted file mode 100644 index 9df7393fd8c6..000000000000 --- a/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-bootkube", - "projectOwner:k8s-staging-bootkube" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-bootkube" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-bootkube@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-bootkube@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube/logging.txt b/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube/logging.txt deleted file mode 100644 index 5bde852175b7..000000000000 --- a/audit/projects/k8s-staging-bootkube/buckets/k8s-staging-bootkube/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-bootkube/ has no logging configuration. diff --git a/audit/projects/k8s-staging-bootkube/description.json b/audit/projects/k8s-staging-bootkube/description.json deleted file mode 100644 index 8779acae1e9d..000000000000 --- a/audit/projects/k8s-staging-bootkube/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-05-20T12:00:31.878Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-bootkube", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-bootkube", - "projectNumber": "48439280800" -} diff --git a/audit/projects/k8s-staging-bootkube/iam.json b/audit/projects/k8s-staging-bootkube/iam.json deleted file mode 100644 index e2de3521596a..000000000000 --- a/audit/projects/k8s-staging-bootkube/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:48439280800@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-bootkube@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-48439280800@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-48439280800@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-48439280800@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-48439280800@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-bootkube@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-bootkube@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-bootkube/services/enabled.txt b/audit/projects/k8s-staging-bootkube/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-bootkube/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-boskos/buckets/artifacts.k8s-staging-boskos.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-boskos/buckets/artifacts.k8s-staging-boskos.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 1dec8e57c3e8..000000000000 --- a/audit/projects/k8s-staging-boskos/buckets/artifacts.k8s-staging-boskos.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-boskos.appspot.com: - Enabled: True - LockedTime: 2020-08-24 18:53:27.723000+00:00 - diff --git a/audit/projects/k8s-staging-boskos/buckets/artifacts.k8s-staging-boskos.appspot.com/cors.txt b/audit/projects/k8s-staging-boskos/buckets/artifacts.k8s-staging-boskos.appspot.com/cors.txt deleted file mode 100644 index 7e72b637a224..000000000000 --- a/audit/projects/k8s-staging-boskos/buckets/artifacts.k8s-staging-boskos.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-boskos.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-boskos/buckets/artifacts.k8s-staging-boskos.appspot.com/iam.json b/audit/projects/k8s-staging-boskos/buckets/artifacts.k8s-staging-boskos.appspot.com/iam.json deleted file mode 100644 index 67d76767b1f5..000000000000 --- a/audit/projects/k8s-staging-boskos/buckets/artifacts.k8s-staging-boskos.appspot.com/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-boskos", - "projectOwner:k8s-staging-boskos" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-boskos" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-boskos@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-boskos@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-boskos/buckets/artifacts.k8s-staging-boskos.appspot.com/logging.txt b/audit/projects/k8s-staging-boskos/buckets/artifacts.k8s-staging-boskos.appspot.com/logging.txt deleted file mode 100644 index a7d147658b4a..000000000000 --- a/audit/projects/k8s-staging-boskos/buckets/artifacts.k8s-staging-boskos.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-boskos.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos-gcb/bucketpolicyonly.txt deleted file mode 100644 index 2a19a8b6bc8c..000000000000 --- a/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-boskos-gcb: - Enabled: True - LockedTime: 2020-08-24 18:54:18.423000+00:00 - diff --git a/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos-gcb/cors.txt b/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos-gcb/cors.txt deleted file mode 100644 index 7b656d5ae20b..000000000000 --- a/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-boskos-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos-gcb/iam.json b/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos-gcb/iam.json deleted file mode 100644 index 344d7718880f..000000000000 --- a/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-boskos", - "projectOwner:k8s-staging-boskos" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-boskos" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-boskos@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-boskos@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos-gcb/logging.txt b/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos-gcb/logging.txt deleted file mode 100644 index 514a7955bdd8..000000000000 --- a/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-boskos-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos/bucketpolicyonly.txt b/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos/bucketpolicyonly.txt deleted file mode 100644 index 983a7ebd1ccc..000000000000 --- a/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-boskos: - Enabled: True - LockedTime: 2020-08-24 18:53:51.124000+00:00 - diff --git a/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos/cors.txt b/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos/cors.txt deleted file mode 100644 index dcf52cf7f90f..000000000000 --- a/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-boskos/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos/iam.json b/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos/iam.json deleted file mode 100644 index 67d76767b1f5..000000000000 --- a/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-boskos", - "projectOwner:k8s-staging-boskos" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-boskos" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-boskos@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-boskos@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos/logging.txt b/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos/logging.txt deleted file mode 100644 index a5cf09708bb5..000000000000 --- a/audit/projects/k8s-staging-boskos/buckets/k8s-staging-boskos/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-boskos/ has no logging configuration. diff --git a/audit/projects/k8s-staging-boskos/description.json b/audit/projects/k8s-staging-boskos/description.json deleted file mode 100644 index f435e10585cd..000000000000 --- a/audit/projects/k8s-staging-boskos/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-05-26T18:52:21.673Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-boskos", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-boskos", - "projectNumber": "41305360102" -} diff --git a/audit/projects/k8s-staging-boskos/iam.json b/audit/projects/k8s-staging-boskos/iam.json deleted file mode 100644 index 0bfd08bceba8..000000000000 --- a/audit/projects/k8s-staging-boskos/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:41305360102@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-boskos@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-41305360102@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-41305360102@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-41305360102@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-41305360102@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-boskos@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-boskos@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-boskos/services/enabled.txt b/audit/projects/k8s-staging-boskos/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-boskos/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-build-image/buckets/artifacts.k8s-staging-build-image.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-build-image/buckets/artifacts.k8s-staging-build-image.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 5256a285e875..000000000000 --- a/audit/projects/k8s-staging-build-image/buckets/artifacts.k8s-staging-build-image.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-build-image.appspot.com: - Enabled: True - LockedTime: 2019-10-07 10:35:37.980000+00:00 - diff --git a/audit/projects/k8s-staging-build-image/buckets/artifacts.k8s-staging-build-image.appspot.com/cors.txt b/audit/projects/k8s-staging-build-image/buckets/artifacts.k8s-staging-build-image.appspot.com/cors.txt deleted file mode 100644 index 27b49b6be6c6..000000000000 --- a/audit/projects/k8s-staging-build-image/buckets/artifacts.k8s-staging-build-image.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-build-image.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-build-image/buckets/artifacts.k8s-staging-build-image.appspot.com/iam.json b/audit/projects/k8s-staging-build-image/buckets/artifacts.k8s-staging-build-image.appspot.com/iam.json deleted file mode 100644 index 3dd565cda7d5..000000000000 --- a/audit/projects/k8s-staging-build-image/buckets/artifacts.k8s-staging-build-image.appspot.com/iam.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-build-image", - "projectOwner:k8s-staging-build-image" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-build-image@kubernetes.io", - "projectViewer:k8s-staging-build-image" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-build-image@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-build-image@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-build-image/buckets/artifacts.k8s-staging-build-image.appspot.com/logging.txt b/audit/projects/k8s-staging-build-image/buckets/artifacts.k8s-staging-build-image.appspot.com/logging.txt deleted file mode 100644 index 44fc7ce181cc..000000000000 --- a/audit/projects/k8s-staging-build-image/buckets/artifacts.k8s-staging-build-image.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-build-image.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-build-image/buckets/k8s-staging-build-image-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-build-image/buckets/k8s-staging-build-image-gcb/bucketpolicyonly.txt deleted file mode 100644 index 06a04b16f89c..000000000000 --- a/audit/projects/k8s-staging-build-image/buckets/k8s-staging-build-image-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-build-image-gcb: - Enabled: True - LockedTime: 2019-12-10 16:16:20.712000+00:00 - diff --git a/audit/projects/k8s-staging-build-image/buckets/k8s-staging-build-image-gcb/cors.txt b/audit/projects/k8s-staging-build-image/buckets/k8s-staging-build-image-gcb/cors.txt deleted file mode 100644 index c23db89d44ac..000000000000 --- a/audit/projects/k8s-staging-build-image/buckets/k8s-staging-build-image-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-build-image-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-build-image/buckets/k8s-staging-build-image-gcb/iam.json b/audit/projects/k8s-staging-build-image/buckets/k8s-staging-build-image-gcb/iam.json deleted file mode 100644 index c7f000af3ac2..000000000000 --- a/audit/projects/k8s-staging-build-image/buckets/k8s-staging-build-image-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-build-image", - "projectOwner:k8s-staging-build-image" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-build-image" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-build-image@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-build-image@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-build-image/buckets/k8s-staging-build-image-gcb/logging.txt b/audit/projects/k8s-staging-build-image/buckets/k8s-staging-build-image-gcb/logging.txt deleted file mode 100644 index 27773cc7ac54..000000000000 --- a/audit/projects/k8s-staging-build-image/buckets/k8s-staging-build-image-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-build-image-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-build-image/buckets/k8s-staging-build-image/bucketpolicyonly.txt b/audit/projects/k8s-staging-build-image/buckets/k8s-staging-build-image/bucketpolicyonly.txt deleted file mode 100644 index 17f8635f24c6..000000000000 --- a/audit/projects/k8s-staging-build-image/buckets/k8s-staging-build-image/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-build-image: - Enabled: True - LockedTime: 2019-10-07 15:29:15.523000+00:00 - diff --git a/audit/projects/k8s-staging-build-image/buckets/k8s-staging-build-image/cors.txt b/audit/projects/k8s-staging-build-image/buckets/k8s-staging-build-image/cors.txt deleted file mode 100644 index f57c8efe1258..000000000000 --- a/audit/projects/k8s-staging-build-image/buckets/k8s-staging-build-image/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-build-image/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-build-image/buckets/k8s-staging-build-image/iam.json b/audit/projects/k8s-staging-build-image/buckets/k8s-staging-build-image/iam.json deleted file mode 100644 index 3239860bf1bf..000000000000 --- a/audit/projects/k8s-staging-build-image/buckets/k8s-staging-build-image/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-build-image", - "projectOwner:k8s-staging-build-image" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-build-image" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-build-image@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-build-image@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-build-image/buckets/k8s-staging-build-image/logging.txt b/audit/projects/k8s-staging-build-image/buckets/k8s-staging-build-image/logging.txt deleted file mode 100644 index a39725a16a52..000000000000 --- a/audit/projects/k8s-staging-build-image/buckets/k8s-staging-build-image/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-build-image/ has no logging configuration. diff --git a/audit/projects/k8s-staging-build-image/description.json b/audit/projects/k8s-staging-build-image/description.json deleted file mode 100644 index 7d1203b5d496..000000000000 --- a/audit/projects/k8s-staging-build-image/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2019-07-09T10:34:49.364Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-build-image", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-build-image", - "projectNumber": "960211007710" -} diff --git a/audit/projects/k8s-staging-build-image/iam.json b/audit/projects/k8s-staging-build-image/iam.json deleted file mode 100644 index 5b242c2f45ba..000000000000 --- a/audit/projects/k8s-staging-build-image/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:960211007710@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-build-image@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-960211007710@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-960211007710@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-960211007710@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-960211007710@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-build-image@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-build-image@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-build-image/services/enabled.txt b/audit/projects/k8s-staging-build-image/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-build-image/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-capi-docker/buckets/artifacts.k8s-staging-capi-docker.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-capi-docker/buckets/artifacts.k8s-staging-capi-docker.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 5ed637af670f..000000000000 --- a/audit/projects/k8s-staging-capi-docker/buckets/artifacts.k8s-staging-capi-docker.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-capi-docker.appspot.com: - Enabled: True - LockedTime: 2019-12-05 20:57:06.954000+00:00 - diff --git a/audit/projects/k8s-staging-capi-docker/buckets/artifacts.k8s-staging-capi-docker.appspot.com/cors.txt b/audit/projects/k8s-staging-capi-docker/buckets/artifacts.k8s-staging-capi-docker.appspot.com/cors.txt deleted file mode 100644 index aee6eaf2308e..000000000000 --- a/audit/projects/k8s-staging-capi-docker/buckets/artifacts.k8s-staging-capi-docker.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-capi-docker.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-capi-docker/buckets/artifacts.k8s-staging-capi-docker.appspot.com/iam.json b/audit/projects/k8s-staging-capi-docker/buckets/artifacts.k8s-staging-capi-docker.appspot.com/iam.json deleted file mode 100644 index 76e7cacffbba..000000000000 --- a/audit/projects/k8s-staging-capi-docker/buckets/artifacts.k8s-staging-capi-docker.appspot.com/iam.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-capi-docker", - "projectOwner:k8s-staging-capi-docker" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-capi-docker@kubernetes.io", - "projectViewer:k8s-staging-capi-docker" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-capi-docker@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-capi-docker@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-capi-docker/buckets/artifacts.k8s-staging-capi-docker.appspot.com/logging.txt b/audit/projects/k8s-staging-capi-docker/buckets/artifacts.k8s-staging-capi-docker.appspot.com/logging.txt deleted file mode 100644 index 5f3cacf41729..000000000000 --- a/audit/projects/k8s-staging-capi-docker/buckets/artifacts.k8s-staging-capi-docker.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-capi-docker.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-capi-docker/buckets/k8s-staging-capi-docker-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-capi-docker/buckets/k8s-staging-capi-docker-gcb/bucketpolicyonly.txt deleted file mode 100644 index 256aa2f1932f..000000000000 --- a/audit/projects/k8s-staging-capi-docker/buckets/k8s-staging-capi-docker-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-capi-docker-gcb: - Enabled: True - LockedTime: 2019-12-10 16:23:09.914000+00:00 - diff --git a/audit/projects/k8s-staging-capi-docker/buckets/k8s-staging-capi-docker-gcb/cors.txt b/audit/projects/k8s-staging-capi-docker/buckets/k8s-staging-capi-docker-gcb/cors.txt deleted file mode 100644 index 2aec7d258dfa..000000000000 --- a/audit/projects/k8s-staging-capi-docker/buckets/k8s-staging-capi-docker-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-capi-docker-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-capi-docker/buckets/k8s-staging-capi-docker-gcb/iam.json b/audit/projects/k8s-staging-capi-docker/buckets/k8s-staging-capi-docker-gcb/iam.json deleted file mode 100644 index 0ea1228a3169..000000000000 --- a/audit/projects/k8s-staging-capi-docker/buckets/k8s-staging-capi-docker-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-capi-docker", - "projectOwner:k8s-staging-capi-docker" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-capi-docker" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-capi-docker@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-capi-docker@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-capi-docker/buckets/k8s-staging-capi-docker-gcb/logging.txt b/audit/projects/k8s-staging-capi-docker/buckets/k8s-staging-capi-docker-gcb/logging.txt deleted file mode 100644 index fead7419576f..000000000000 --- a/audit/projects/k8s-staging-capi-docker/buckets/k8s-staging-capi-docker-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-capi-docker-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-capi-docker/buckets/k8s-staging-capi-docker/bucketpolicyonly.txt b/audit/projects/k8s-staging-capi-docker/buckets/k8s-staging-capi-docker/bucketpolicyonly.txt deleted file mode 100644 index 33bc1f78598f..000000000000 --- a/audit/projects/k8s-staging-capi-docker/buckets/k8s-staging-capi-docker/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-capi-docker: - Enabled: True - LockedTime: 2019-12-05 20:57:34.231000+00:00 - diff --git a/audit/projects/k8s-staging-capi-docker/buckets/k8s-staging-capi-docker/cors.txt b/audit/projects/k8s-staging-capi-docker/buckets/k8s-staging-capi-docker/cors.txt deleted file mode 100644 index 8080b6ff3235..000000000000 --- a/audit/projects/k8s-staging-capi-docker/buckets/k8s-staging-capi-docker/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-capi-docker/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-capi-docker/buckets/k8s-staging-capi-docker/iam.json b/audit/projects/k8s-staging-capi-docker/buckets/k8s-staging-capi-docker/iam.json deleted file mode 100644 index 7cf874074a9c..000000000000 --- a/audit/projects/k8s-staging-capi-docker/buckets/k8s-staging-capi-docker/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-capi-docker", - "projectOwner:k8s-staging-capi-docker" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-capi-docker" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-capi-docker@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-capi-docker@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-capi-docker/buckets/k8s-staging-capi-docker/logging.txt b/audit/projects/k8s-staging-capi-docker/buckets/k8s-staging-capi-docker/logging.txt deleted file mode 100644 index 7cb8de72503c..000000000000 --- a/audit/projects/k8s-staging-capi-docker/buckets/k8s-staging-capi-docker/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-capi-docker/ has no logging configuration. diff --git a/audit/projects/k8s-staging-capi-docker/description.json b/audit/projects/k8s-staging-capi-docker/description.json deleted file mode 100644 index eec86586af73..000000000000 --- a/audit/projects/k8s-staging-capi-docker/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2019-09-06T20:56:13.955Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-capi-docker", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-capi-docker", - "projectNumber": "44019431644" -} diff --git a/audit/projects/k8s-staging-capi-docker/iam.json b/audit/projects/k8s-staging-capi-docker/iam.json deleted file mode 100644 index 49e8f2bc8230..000000000000 --- a/audit/projects/k8s-staging-capi-docker/iam.json +++ /dev/null @@ -1,76 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:44019431644@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-capi-docker@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-44019431644@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-44019431644@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-44019431644@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-44019431644@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:44019431644-compute@developer.gserviceaccount.com", - "serviceAccount:44019431644@cloudservices.gserviceaccount.com", - "serviceAccount:service-44019431644@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-capi-docker@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-capi-docker@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-capi-docker/service-accounts/44019431644-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-staging-capi-docker/service-accounts/44019431644-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index dd0aae8c930f..000000000000 --- a/audit/projects/k8s-staging-capi-docker/service-accounts/44019431644-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "44019431644-compute@developer.gserviceaccount.com", - "name": "projects/k8s-staging-capi-docker/serviceAccounts/44019431644-compute@developer.gserviceaccount.com", - "oauth2ClientId": "108793772350733493223", - "projectId": "k8s-staging-capi-docker", - "uniqueId": "108793772350733493223" -} diff --git a/audit/projects/k8s-staging-capi-docker/service-accounts/44019431644-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-staging-capi-docker/service-accounts/44019431644-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-staging-capi-docker/service-accounts/44019431644-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-staging-capi-docker/services/compute/project-info.json b/audit/projects/k8s-staging-capi-docker/services/compute/project-info.json deleted file mode 100644 index 85663d82e338..000000000000 --- a/audit/projects/k8s-staging-capi-docker/services/compute/project-info.json +++ /dev/null @@ -1,171 +0,0 @@ -{ - "commonInstanceMetadata": { - "kind": "compute#metadata" - }, - "creationTimestamp": "2021-02-16T16:34:10.559-08:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "44019431644-compute@developer.gserviceaccount.com", - "id": "1894482911793633901", - "kind": "compute#project", - "name": "k8s-staging-capi-docker", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-staging-capi-docker", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-staging-capi-docker/services/dns/info.json b/audit/projects/k8s-staging-capi-docker/services/dns/info.json deleted file mode 100644 index a8b96d9e2c07..000000000000 --- a/audit/projects/k8s-staging-capi-docker/services/dns/info.json +++ /dev/null @@ -1,53 +0,0 @@ -{ - "id": "k8s-staging-capi-docker", - "kind": "dns#project", - "number": "44019431644", - "quota": { - "dnsKeysPerManagedZone": 4, - "kind": "dns#quota", - "managedZones": 10000, - "managedZonesPerNetwork": 10000, - "networksPerManagedZone": 100, - "networksPerPolicy": 100, - "policies": 100, - "resourceRecordsPerRrset": 100, - "rrsetAdditionsPerChange": 1000, - "rrsetDeletionsPerChange": 1000, - "rrsetsPerManagedZone": 10000, - "targetNameServersPerManagedZone": 50, - "targetNameServersPerPolicy": 50, - "totalRrdataSizePerChange": 100000, - "whitelistedKeySpecs": [ - { - "algorithm": "ecdsap256sha256", - "kind": "dns#dnsKeySpec" - }, - { - "algorithm": "ecdsap384sha384", - "kind": "dns#dnsKeySpec" - }, - { - "algorithm": "rsasha256", - "keyLength": 2048, - "kind": "dns#dnsKeySpec" - }, - { - "algorithm": "rsasha256", - "keyLength": 1024, - "keyType": "zoneSigning", - "kind": "dns#dnsKeySpec" - }, - { - "algorithm": "rsasha512", - "keyLength": 2048, - "kind": "dns#dnsKeySpec" - }, - { - "algorithm": "rsasha512", - "keyLength": 1024, - "keyType": "zoneSigning", - "kind": "dns#dnsKeySpec" - } - ] - } -} diff --git a/audit/projects/k8s-staging-capi-docker/services/dns/zones.json b/audit/projects/k8s-staging-capi-docker/services/dns/zones.json deleted file mode 100644 index fe51488c7066..000000000000 --- a/audit/projects/k8s-staging-capi-docker/services/dns/zones.json +++ /dev/null @@ -1 +0,0 @@ -[] diff --git a/audit/projects/k8s-staging-capi-docker/services/enabled.txt b/audit/projects/k8s-staging-capi-docker/services/enabled.txt deleted file mode 100644 index da913ca321e0..000000000000 --- a/audit/projects/k8s-staging-capi-docker/services/enabled.txt +++ /dev/null @@ -1,14 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -compute.googleapis.com Compute Engine API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -dns.googleapis.com Cloud DNS API -logging.googleapis.com Cloud Logging API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-capi-kubeadm/buckets/artifacts.k8s-staging-capi-kubeadm.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-capi-kubeadm/buckets/artifacts.k8s-staging-capi-kubeadm.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 635a7aa99c40..000000000000 --- a/audit/projects/k8s-staging-capi-kubeadm/buckets/artifacts.k8s-staging-capi-kubeadm.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-capi-kubeadm.appspot.com: - Enabled: True - LockedTime: 2019-10-17 14:22:46.324000+00:00 - diff --git a/audit/projects/k8s-staging-capi-kubeadm/buckets/artifacts.k8s-staging-capi-kubeadm.appspot.com/cors.txt b/audit/projects/k8s-staging-capi-kubeadm/buckets/artifacts.k8s-staging-capi-kubeadm.appspot.com/cors.txt deleted file mode 100644 index b6d133ab402b..000000000000 --- a/audit/projects/k8s-staging-capi-kubeadm/buckets/artifacts.k8s-staging-capi-kubeadm.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-capi-kubeadm.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-capi-kubeadm/buckets/artifacts.k8s-staging-capi-kubeadm.appspot.com/iam.json b/audit/projects/k8s-staging-capi-kubeadm/buckets/artifacts.k8s-staging-capi-kubeadm.appspot.com/iam.json deleted file mode 100644 index c209e3f96894..000000000000 --- a/audit/projects/k8s-staging-capi-kubeadm/buckets/artifacts.k8s-staging-capi-kubeadm.appspot.com/iam.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-capi-kubeadm", - "projectOwner:k8s-staging-capi-kubeadm" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-capi-kubeadm@kubernetes.io", - "projectViewer:k8s-staging-capi-kubeadm" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-capi-kubeadm@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-capi-kubeadm@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-capi-kubeadm/buckets/artifacts.k8s-staging-capi-kubeadm.appspot.com/logging.txt b/audit/projects/k8s-staging-capi-kubeadm/buckets/artifacts.k8s-staging-capi-kubeadm.appspot.com/logging.txt deleted file mode 100644 index 44da7cc1c295..000000000000 --- a/audit/projects/k8s-staging-capi-kubeadm/buckets/artifacts.k8s-staging-capi-kubeadm.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-capi-kubeadm.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-capi-kubeadm/buckets/k8s-staging-capi-kubeadm-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-capi-kubeadm/buckets/k8s-staging-capi-kubeadm-gcb/bucketpolicyonly.txt deleted file mode 100644 index 3cd04c9465d7..000000000000 --- a/audit/projects/k8s-staging-capi-kubeadm/buckets/k8s-staging-capi-kubeadm-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-capi-kubeadm-gcb: - Enabled: True - LockedTime: 2019-12-10 16:22:06.807000+00:00 - diff --git a/audit/projects/k8s-staging-capi-kubeadm/buckets/k8s-staging-capi-kubeadm-gcb/cors.txt b/audit/projects/k8s-staging-capi-kubeadm/buckets/k8s-staging-capi-kubeadm-gcb/cors.txt deleted file mode 100644 index fbe0d40c536d..000000000000 --- a/audit/projects/k8s-staging-capi-kubeadm/buckets/k8s-staging-capi-kubeadm-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-capi-kubeadm-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-capi-kubeadm/buckets/k8s-staging-capi-kubeadm-gcb/iam.json b/audit/projects/k8s-staging-capi-kubeadm/buckets/k8s-staging-capi-kubeadm-gcb/iam.json deleted file mode 100644 index 7203e40dd76c..000000000000 --- a/audit/projects/k8s-staging-capi-kubeadm/buckets/k8s-staging-capi-kubeadm-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-capi-kubeadm", - "projectOwner:k8s-staging-capi-kubeadm" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-capi-kubeadm" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-capi-kubeadm@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-capi-kubeadm@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-capi-kubeadm/buckets/k8s-staging-capi-kubeadm-gcb/logging.txt b/audit/projects/k8s-staging-capi-kubeadm/buckets/k8s-staging-capi-kubeadm-gcb/logging.txt deleted file mode 100644 index 4f1713b2b942..000000000000 --- a/audit/projects/k8s-staging-capi-kubeadm/buckets/k8s-staging-capi-kubeadm-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-capi-kubeadm-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-capi-kubeadm/buckets/k8s-staging-capi-kubeadm/bucketpolicyonly.txt b/audit/projects/k8s-staging-capi-kubeadm/buckets/k8s-staging-capi-kubeadm/bucketpolicyonly.txt deleted file mode 100644 index 91527f16e2e4..000000000000 --- a/audit/projects/k8s-staging-capi-kubeadm/buckets/k8s-staging-capi-kubeadm/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-capi-kubeadm: - Enabled: True - LockedTime: 2019-10-17 14:23:08.018000+00:00 - diff --git a/audit/projects/k8s-staging-capi-kubeadm/buckets/k8s-staging-capi-kubeadm/cors.txt b/audit/projects/k8s-staging-capi-kubeadm/buckets/k8s-staging-capi-kubeadm/cors.txt deleted file mode 100644 index e304661ab792..000000000000 --- a/audit/projects/k8s-staging-capi-kubeadm/buckets/k8s-staging-capi-kubeadm/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-capi-kubeadm/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-capi-kubeadm/buckets/k8s-staging-capi-kubeadm/iam.json b/audit/projects/k8s-staging-capi-kubeadm/buckets/k8s-staging-capi-kubeadm/iam.json deleted file mode 100644 index 936fea660a46..000000000000 --- a/audit/projects/k8s-staging-capi-kubeadm/buckets/k8s-staging-capi-kubeadm/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-capi-kubeadm", - "projectOwner:k8s-staging-capi-kubeadm" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-capi-kubeadm" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-capi-kubeadm@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-capi-kubeadm@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-capi-kubeadm/buckets/k8s-staging-capi-kubeadm/logging.txt b/audit/projects/k8s-staging-capi-kubeadm/buckets/k8s-staging-capi-kubeadm/logging.txt deleted file mode 100644 index 261813824149..000000000000 --- a/audit/projects/k8s-staging-capi-kubeadm/buckets/k8s-staging-capi-kubeadm/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-capi-kubeadm/ has no logging configuration. diff --git a/audit/projects/k8s-staging-capi-kubeadm/description.json b/audit/projects/k8s-staging-capi-kubeadm/description.json deleted file mode 100644 index a177d50c8759..000000000000 --- a/audit/projects/k8s-staging-capi-kubeadm/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2019-07-19T14:21:55.099Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-capi-kubeadm", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-capi-kubeadm", - "projectNumber": "778608689920" -} diff --git a/audit/projects/k8s-staging-capi-kubeadm/iam.json b/audit/projects/k8s-staging-capi-kubeadm/iam.json deleted file mode 100644 index 00379dcb600e..000000000000 --- a/audit/projects/k8s-staging-capi-kubeadm/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:778608689920@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-capi-kubeadm@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-778608689920@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-778608689920@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-778608689920@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-778608689920@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-capi-kubeadm@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-capi-kubeadm@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-capi-kubeadm/services/enabled.txt b/audit/projects/k8s-staging-capi-kubeadm/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-capi-kubeadm/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-capi-openstack/buckets/artifacts.k8s-staging-capi-openstack.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-capi-openstack/buckets/artifacts.k8s-staging-capi-openstack.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 13a151f0b5b0..000000000000 --- a/audit/projects/k8s-staging-capi-openstack/buckets/artifacts.k8s-staging-capi-openstack.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-capi-openstack.appspot.com: - Enabled: True - LockedTime: 2019-12-03 19:19:31.878000+00:00 - diff --git a/audit/projects/k8s-staging-capi-openstack/buckets/artifacts.k8s-staging-capi-openstack.appspot.com/cors.txt b/audit/projects/k8s-staging-capi-openstack/buckets/artifacts.k8s-staging-capi-openstack.appspot.com/cors.txt deleted file mode 100644 index 463ca257bbe0..000000000000 --- a/audit/projects/k8s-staging-capi-openstack/buckets/artifacts.k8s-staging-capi-openstack.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-capi-openstack.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-capi-openstack/buckets/artifacts.k8s-staging-capi-openstack.appspot.com/iam.json b/audit/projects/k8s-staging-capi-openstack/buckets/artifacts.k8s-staging-capi-openstack.appspot.com/iam.json deleted file mode 100644 index aaf3a71b2dcc..000000000000 --- a/audit/projects/k8s-staging-capi-openstack/buckets/artifacts.k8s-staging-capi-openstack.appspot.com/iam.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-capi-openstack", - "projectOwner:k8s-staging-capi-openstack" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-capi-openstack@kubernetes.io", - "projectViewer:k8s-staging-capi-openstack" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-capi-openstack@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-capi-openstack@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-capi-openstack/buckets/artifacts.k8s-staging-capi-openstack.appspot.com/logging.txt b/audit/projects/k8s-staging-capi-openstack/buckets/artifacts.k8s-staging-capi-openstack.appspot.com/logging.txt deleted file mode 100644 index dca4844fe1d2..000000000000 --- a/audit/projects/k8s-staging-capi-openstack/buckets/artifacts.k8s-staging-capi-openstack.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-capi-openstack.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-capi-openstack/buckets/k8s-staging-capi-openstack-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-capi-openstack/buckets/k8s-staging-capi-openstack-gcb/bucketpolicyonly.txt deleted file mode 100644 index 9fe648ace931..000000000000 --- a/audit/projects/k8s-staging-capi-openstack/buckets/k8s-staging-capi-openstack-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-capi-openstack-gcb: - Enabled: True - LockedTime: 2019-12-10 16:21:06.109000+00:00 - diff --git a/audit/projects/k8s-staging-capi-openstack/buckets/k8s-staging-capi-openstack-gcb/cors.txt b/audit/projects/k8s-staging-capi-openstack/buckets/k8s-staging-capi-openstack-gcb/cors.txt deleted file mode 100644 index 93e47d9cf854..000000000000 --- a/audit/projects/k8s-staging-capi-openstack/buckets/k8s-staging-capi-openstack-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-capi-openstack-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-capi-openstack/buckets/k8s-staging-capi-openstack-gcb/iam.json b/audit/projects/k8s-staging-capi-openstack/buckets/k8s-staging-capi-openstack-gcb/iam.json deleted file mode 100644 index 496d566d199d..000000000000 --- a/audit/projects/k8s-staging-capi-openstack/buckets/k8s-staging-capi-openstack-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-capi-openstack", - "projectOwner:k8s-staging-capi-openstack" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-capi-openstack" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-capi-openstack@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-capi-openstack@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-capi-openstack/buckets/k8s-staging-capi-openstack-gcb/logging.txt b/audit/projects/k8s-staging-capi-openstack/buckets/k8s-staging-capi-openstack-gcb/logging.txt deleted file mode 100644 index 8172be1186dd..000000000000 --- a/audit/projects/k8s-staging-capi-openstack/buckets/k8s-staging-capi-openstack-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-capi-openstack-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-capi-openstack/buckets/k8s-staging-capi-openstack/bucketpolicyonly.txt b/audit/projects/k8s-staging-capi-openstack/buckets/k8s-staging-capi-openstack/bucketpolicyonly.txt deleted file mode 100644 index 6f49d47527e5..000000000000 --- a/audit/projects/k8s-staging-capi-openstack/buckets/k8s-staging-capi-openstack/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-capi-openstack: - Enabled: True - LockedTime: 2019-12-03 19:19:56.673000+00:00 - diff --git a/audit/projects/k8s-staging-capi-openstack/buckets/k8s-staging-capi-openstack/cors.txt b/audit/projects/k8s-staging-capi-openstack/buckets/k8s-staging-capi-openstack/cors.txt deleted file mode 100644 index aaf8308d4577..000000000000 --- a/audit/projects/k8s-staging-capi-openstack/buckets/k8s-staging-capi-openstack/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-capi-openstack/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-capi-openstack/buckets/k8s-staging-capi-openstack/iam.json b/audit/projects/k8s-staging-capi-openstack/buckets/k8s-staging-capi-openstack/iam.json deleted file mode 100644 index c23ae1cacd04..000000000000 --- a/audit/projects/k8s-staging-capi-openstack/buckets/k8s-staging-capi-openstack/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-capi-openstack", - "projectOwner:k8s-staging-capi-openstack" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-capi-openstack" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-capi-openstack@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-capi-openstack@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-capi-openstack/buckets/k8s-staging-capi-openstack/logging.txt b/audit/projects/k8s-staging-capi-openstack/buckets/k8s-staging-capi-openstack/logging.txt deleted file mode 100644 index 001b0908aef2..000000000000 --- a/audit/projects/k8s-staging-capi-openstack/buckets/k8s-staging-capi-openstack/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-capi-openstack/ has no logging configuration. diff --git a/audit/projects/k8s-staging-capi-openstack/description.json b/audit/projects/k8s-staging-capi-openstack/description.json deleted file mode 100644 index d7ff00e5e9a9..000000000000 --- a/audit/projects/k8s-staging-capi-openstack/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2019-09-04T19:18:44.090Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-capi-openstack", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-capi-openstack", - "projectNumber": "129051311436" -} diff --git a/audit/projects/k8s-staging-capi-openstack/iam.json b/audit/projects/k8s-staging-capi-openstack/iam.json deleted file mode 100644 index d8d733608fce..000000000000 --- a/audit/projects/k8s-staging-capi-openstack/iam.json +++ /dev/null @@ -1,76 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:129051311436@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-capi-openstack@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-129051311436@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-129051311436@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-129051311436@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-129051311436@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:129051311436-compute@developer.gserviceaccount.com", - "serviceAccount:129051311436@cloudservices.gserviceaccount.com", - "serviceAccount:service-129051311436@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-capi-openstack@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-capi-openstack@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-capi-openstack/service-accounts/129051311436-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-staging-capi-openstack/service-accounts/129051311436-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index f67cbb591203..000000000000 --- a/audit/projects/k8s-staging-capi-openstack/service-accounts/129051311436-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "129051311436-compute@developer.gserviceaccount.com", - "name": "projects/k8s-staging-capi-openstack/serviceAccounts/129051311436-compute@developer.gserviceaccount.com", - "oauth2ClientId": "114522581576441073468", - "projectId": "k8s-staging-capi-openstack", - "uniqueId": "114522581576441073468" -} diff --git a/audit/projects/k8s-staging-capi-openstack/service-accounts/129051311436-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-staging-capi-openstack/service-accounts/129051311436-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-staging-capi-openstack/service-accounts/129051311436-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-staging-capi-openstack/services/compute/project-info.json b/audit/projects/k8s-staging-capi-openstack/services/compute/project-info.json deleted file mode 100644 index 13944aaefccc..000000000000 --- a/audit/projects/k8s-staging-capi-openstack/services/compute/project-info.json +++ /dev/null @@ -1,171 +0,0 @@ -{ - "commonInstanceMetadata": { - "kind": "compute#metadata" - }, - "creationTimestamp": "2019-09-11T13:09:53.115-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "129051311436-compute@developer.gserviceaccount.com", - "id": "1191636999154756222", - "kind": "compute#project", - "name": "k8s-staging-capi-openstack", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-staging-capi-openstack", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-staging-capi-openstack/services/enabled.txt b/audit/projects/k8s-staging-capi-openstack/services/enabled.txt deleted file mode 100644 index 661451636fab..000000000000 --- a/audit/projects/k8s-staging-capi-openstack/services/enabled.txt +++ /dev/null @@ -1,13 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -compute.googleapis.com Compute Engine API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-capi-vsphere/buckets/artifacts.k8s-staging-capi-vsphere.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-capi-vsphere/buckets/artifacts.k8s-staging-capi-vsphere.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 8b9b6c1437ac..000000000000 --- a/audit/projects/k8s-staging-capi-vsphere/buckets/artifacts.k8s-staging-capi-vsphere.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-capi-vsphere.appspot.com: - Enabled: True - LockedTime: 2020-06-04 15:39:34.369000+00:00 - diff --git a/audit/projects/k8s-staging-capi-vsphere/buckets/artifacts.k8s-staging-capi-vsphere.appspot.com/cors.txt b/audit/projects/k8s-staging-capi-vsphere/buckets/artifacts.k8s-staging-capi-vsphere.appspot.com/cors.txt deleted file mode 100644 index 00ca8cfc38be..000000000000 --- a/audit/projects/k8s-staging-capi-vsphere/buckets/artifacts.k8s-staging-capi-vsphere.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-capi-vsphere.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-capi-vsphere/buckets/artifacts.k8s-staging-capi-vsphere.appspot.com/iam.json b/audit/projects/k8s-staging-capi-vsphere/buckets/artifacts.k8s-staging-capi-vsphere.appspot.com/iam.json deleted file mode 100644 index 93a8cf356d43..000000000000 --- a/audit/projects/k8s-staging-capi-vsphere/buckets/artifacts.k8s-staging-capi-vsphere.appspot.com/iam.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-capi-vsphere", - "projectOwner:k8s-staging-capi-vsphere" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-capi-vsphere@kubernetes.io", - "projectViewer:k8s-staging-capi-vsphere" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-capi-vsphere@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-capi-vsphere@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-capi-vsphere/buckets/artifacts.k8s-staging-capi-vsphere.appspot.com/logging.txt b/audit/projects/k8s-staging-capi-vsphere/buckets/artifacts.k8s-staging-capi-vsphere.appspot.com/logging.txt deleted file mode 100644 index 34d9990b9a32..000000000000 --- a/audit/projects/k8s-staging-capi-vsphere/buckets/artifacts.k8s-staging-capi-vsphere.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-capi-vsphere.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-capi-vsphere/buckets/k8s-staging-capi-vsphere-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-capi-vsphere/buckets/k8s-staging-capi-vsphere-gcb/bucketpolicyonly.txt deleted file mode 100644 index 1e228cde8b9e..000000000000 --- a/audit/projects/k8s-staging-capi-vsphere/buckets/k8s-staging-capi-vsphere-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-capi-vsphere-gcb: - Enabled: True - LockedTime: 2020-06-04 15:40:18.341000+00:00 - diff --git a/audit/projects/k8s-staging-capi-vsphere/buckets/k8s-staging-capi-vsphere-gcb/cors.txt b/audit/projects/k8s-staging-capi-vsphere/buckets/k8s-staging-capi-vsphere-gcb/cors.txt deleted file mode 100644 index 5b9bf3f13922..000000000000 --- a/audit/projects/k8s-staging-capi-vsphere/buckets/k8s-staging-capi-vsphere-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-capi-vsphere-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-capi-vsphere/buckets/k8s-staging-capi-vsphere-gcb/iam.json b/audit/projects/k8s-staging-capi-vsphere/buckets/k8s-staging-capi-vsphere-gcb/iam.json deleted file mode 100644 index bfefb55c718d..000000000000 --- a/audit/projects/k8s-staging-capi-vsphere/buckets/k8s-staging-capi-vsphere-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-capi-vsphere", - "projectOwner:k8s-staging-capi-vsphere" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-capi-vsphere" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-capi-vsphere@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-capi-vsphere@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-capi-vsphere/buckets/k8s-staging-capi-vsphere-gcb/logging.txt b/audit/projects/k8s-staging-capi-vsphere/buckets/k8s-staging-capi-vsphere-gcb/logging.txt deleted file mode 100644 index d1fffc6b2b30..000000000000 --- a/audit/projects/k8s-staging-capi-vsphere/buckets/k8s-staging-capi-vsphere-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-capi-vsphere-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-capi-vsphere/buckets/k8s-staging-capi-vsphere/bucketpolicyonly.txt b/audit/projects/k8s-staging-capi-vsphere/buckets/k8s-staging-capi-vsphere/bucketpolicyonly.txt deleted file mode 100644 index 1a421ebd0f50..000000000000 --- a/audit/projects/k8s-staging-capi-vsphere/buckets/k8s-staging-capi-vsphere/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-capi-vsphere: - Enabled: True - LockedTime: 2020-06-04 15:39:58.184000+00:00 - diff --git a/audit/projects/k8s-staging-capi-vsphere/buckets/k8s-staging-capi-vsphere/cors.txt b/audit/projects/k8s-staging-capi-vsphere/buckets/k8s-staging-capi-vsphere/cors.txt deleted file mode 100644 index 415cf3032e65..000000000000 --- a/audit/projects/k8s-staging-capi-vsphere/buckets/k8s-staging-capi-vsphere/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-capi-vsphere/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-capi-vsphere/buckets/k8s-staging-capi-vsphere/iam.json b/audit/projects/k8s-staging-capi-vsphere/buckets/k8s-staging-capi-vsphere/iam.json deleted file mode 100644 index 90ea959a34b7..000000000000 --- a/audit/projects/k8s-staging-capi-vsphere/buckets/k8s-staging-capi-vsphere/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-capi-vsphere", - "projectOwner:k8s-staging-capi-vsphere" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-capi-vsphere" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-capi-vsphere@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-capi-vsphere@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-capi-vsphere/buckets/k8s-staging-capi-vsphere/logging.txt b/audit/projects/k8s-staging-capi-vsphere/buckets/k8s-staging-capi-vsphere/logging.txt deleted file mode 100644 index ed38fa8ed23b..000000000000 --- a/audit/projects/k8s-staging-capi-vsphere/buckets/k8s-staging-capi-vsphere/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-capi-vsphere/ has no logging configuration. diff --git a/audit/projects/k8s-staging-capi-vsphere/description.json b/audit/projects/k8s-staging-capi-vsphere/description.json deleted file mode 100644 index c2e56918adf0..000000000000 --- a/audit/projects/k8s-staging-capi-vsphere/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-03-06T15:38:42.269Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-capi-vsphere", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-capi-vsphere", - "projectNumber": "459565607671" -} diff --git a/audit/projects/k8s-staging-capi-vsphere/iam.json b/audit/projects/k8s-staging-capi-vsphere/iam.json deleted file mode 100644 index 023846f2be62..000000000000 --- a/audit/projects/k8s-staging-capi-vsphere/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:459565607671@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-capi-vsphere@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-459565607671@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-459565607671@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-459565607671@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-459565607671@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-capi-vsphere@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-capi-vsphere@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-capi-vsphere/services/enabled.txt b/audit/projects/k8s-staging-capi-vsphere/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-capi-vsphere/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-ci-images/buckets/artifacts.k8s-staging-ci-images.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-ci-images/buckets/artifacts.k8s-staging-ci-images.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 8293cbe67694..000000000000 --- a/audit/projects/k8s-staging-ci-images/buckets/artifacts.k8s-staging-ci-images.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-ci-images.appspot.com: - Enabled: True - LockedTime: 2021-01-24 01:03:30.641000+00:00 - diff --git a/audit/projects/k8s-staging-ci-images/buckets/artifacts.k8s-staging-ci-images.appspot.com/cors.txt b/audit/projects/k8s-staging-ci-images/buckets/artifacts.k8s-staging-ci-images.appspot.com/cors.txt deleted file mode 100644 index ce16a9d2793c..000000000000 --- a/audit/projects/k8s-staging-ci-images/buckets/artifacts.k8s-staging-ci-images.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-ci-images.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-ci-images/buckets/artifacts.k8s-staging-ci-images.appspot.com/iam.json b/audit/projects/k8s-staging-ci-images/buckets/artifacts.k8s-staging-ci-images.appspot.com/iam.json deleted file mode 100644 index 22075a4759c3..000000000000 --- a/audit/projects/k8s-staging-ci-images/buckets/artifacts.k8s-staging-ci-images.appspot.com/iam.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-ci-images", - "projectOwner:k8s-staging-ci-images" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-ci-images" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-ci-images@kubernetes.io", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-ci-images@kubernetes.io", - "serviceAccount:prow-build@k8s-infra-prow-build.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-ci-images/buckets/artifacts.k8s-staging-ci-images.appspot.com/logging.txt b/audit/projects/k8s-staging-ci-images/buckets/artifacts.k8s-staging-ci-images.appspot.com/logging.txt deleted file mode 100644 index 3ec94047b008..000000000000 --- a/audit/projects/k8s-staging-ci-images/buckets/artifacts.k8s-staging-ci-images.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-ci-images.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images-gcb/bucketpolicyonly.txt deleted file mode 100644 index af8b97f01dbe..000000000000 --- a/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-ci-images-gcb: - Enabled: True - LockedTime: 2021-01-24 01:04:26.841000+00:00 - diff --git a/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images-gcb/cors.txt b/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images-gcb/cors.txt deleted file mode 100644 index aa89228118bb..000000000000 --- a/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-ci-images-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images-gcb/iam.json b/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images-gcb/iam.json deleted file mode 100644 index 6f6b961b9f24..000000000000 --- a/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-ci-images", - "projectOwner:k8s-staging-ci-images" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-ci-images" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-ci-images@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-ci-images@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images-gcb/logging.txt b/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images-gcb/logging.txt deleted file mode 100644 index 9e46edcc2f13..000000000000 --- a/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-ci-images-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images/bucketpolicyonly.txt b/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images/bucketpolicyonly.txt deleted file mode 100644 index d73c66b7daac..000000000000 --- a/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-ci-images: - Enabled: True - LockedTime: 2021-01-24 01:04:00.640000+00:00 - diff --git a/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images/cors.txt b/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images/cors.txt deleted file mode 100644 index ecb3dc0de97f..000000000000 --- a/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-ci-images/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images/iam.json b/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images/iam.json deleted file mode 100644 index 5a5263913bc8..000000000000 --- a/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-ci-images", - "projectOwner:k8s-staging-ci-images" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-ci-images" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-ci-images@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-ci-images@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images/logging.txt b/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images/logging.txt deleted file mode 100644 index f0b0cafebcb6..000000000000 --- a/audit/projects/k8s-staging-ci-images/buckets/k8s-staging-ci-images/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-ci-images/ has no logging configuration. diff --git a/audit/projects/k8s-staging-ci-images/description.json b/audit/projects/k8s-staging-ci-images/description.json deleted file mode 100644 index 6b62566c20a9..000000000000 --- a/audit/projects/k8s-staging-ci-images/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-10-26T01:02:20.737Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-ci-images", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-ci-images", - "projectNumber": "731599680865" -} diff --git a/audit/projects/k8s-staging-ci-images/iam.json b/audit/projects/k8s-staging-ci-images/iam.json deleted file mode 100644 index ad0d7d76f71c..000000000000 --- a/audit/projects/k8s-staging-ci-images/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:731599680865@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-ci-images@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-731599680865@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-731599680865@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-731599680865@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-731599680865@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-ci-images@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-ci-images@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-ci-images/services/enabled.txt b/audit/projects/k8s-staging-ci-images/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-ci-images/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-cip-test/buckets/artifacts.k8s-staging-cip-test.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-cip-test/buckets/artifacts.k8s-staging-cip-test.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 387f2580d081..000000000000 --- a/audit/projects/k8s-staging-cip-test/buckets/artifacts.k8s-staging-cip-test.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-cip-test.appspot.com: - Enabled: True - LockedTime: 2019-07-25 21:51:02.285000+00:00 - diff --git a/audit/projects/k8s-staging-cip-test/buckets/artifacts.k8s-staging-cip-test.appspot.com/cors.txt b/audit/projects/k8s-staging-cip-test/buckets/artifacts.k8s-staging-cip-test.appspot.com/cors.txt deleted file mode 100644 index 3ea801d1b8b4..000000000000 --- a/audit/projects/k8s-staging-cip-test/buckets/artifacts.k8s-staging-cip-test.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-cip-test.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cip-test/buckets/artifacts.k8s-staging-cip-test.appspot.com/iam.json b/audit/projects/k8s-staging-cip-test/buckets/artifacts.k8s-staging-cip-test.appspot.com/iam.json deleted file mode 100644 index 1654c8f41750..000000000000 --- a/audit/projects/k8s-staging-cip-test/buckets/artifacts.k8s-staging-cip-test.appspot.com/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cip-test", - "projectOwner:k8s-staging-cip-test", - "serviceAccount:k8s-infra-gcr-promoter@k8s-cip-test-prod.iam.gserviceaccount.com" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-cip-test@kubernetes.io", - "projectViewer:k8s-staging-cip-test" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cip-test@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cip-test@kubernetes.io", - "serviceAccount:k8s-infra-gcr-promoter@k8s-cip-test-prod.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cip-test/buckets/artifacts.k8s-staging-cip-test.appspot.com/logging.txt b/audit/projects/k8s-staging-cip-test/buckets/artifacts.k8s-staging-cip-test.appspot.com/logging.txt deleted file mode 100644 index 33b78b358da6..000000000000 --- a/audit/projects/k8s-staging-cip-test/buckets/artifacts.k8s-staging-cip-test.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-cip-test.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cip-test/buckets/asia.artifacts.k8s-staging-cip-test.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-cip-test/buckets/asia.artifacts.k8s-staging-cip-test.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 8b430881690f..000000000000 --- a/audit/projects/k8s-staging-cip-test/buckets/asia.artifacts.k8s-staging-cip-test.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://asia.artifacts.k8s-staging-cip-test.appspot.com: - Enabled: True - LockedTime: 2020-01-28 03:58:01.615000+00:00 - diff --git a/audit/projects/k8s-staging-cip-test/buckets/asia.artifacts.k8s-staging-cip-test.appspot.com/cors.txt b/audit/projects/k8s-staging-cip-test/buckets/asia.artifacts.k8s-staging-cip-test.appspot.com/cors.txt deleted file mode 100644 index 0f9e51e121ed..000000000000 --- a/audit/projects/k8s-staging-cip-test/buckets/asia.artifacts.k8s-staging-cip-test.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://asia.artifacts.k8s-staging-cip-test.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cip-test/buckets/asia.artifacts.k8s-staging-cip-test.appspot.com/iam.json b/audit/projects/k8s-staging-cip-test/buckets/asia.artifacts.k8s-staging-cip-test.appspot.com/iam.json deleted file mode 100644 index 3b6fc529f392..000000000000 --- a/audit/projects/k8s-staging-cip-test/buckets/asia.artifacts.k8s-staging-cip-test.appspot.com/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cip-test", - "projectOwner:k8s-staging-cip-test", - "serviceAccount:k8s-infra-gcr-promoter@k8s-staging-cip-test.iam.gserviceaccount.com" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-cip-test@kubernetes.io", - "projectViewer:k8s-staging-cip-test" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cip-test@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cip-test@kubernetes.io", - "serviceAccount:k8s-infra-gcr-promoter@k8s-staging-cip-test.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cip-test/buckets/asia.artifacts.k8s-staging-cip-test.appspot.com/logging.txt b/audit/projects/k8s-staging-cip-test/buckets/asia.artifacts.k8s-staging-cip-test.appspot.com/logging.txt deleted file mode 100644 index a99494cde9d2..000000000000 --- a/audit/projects/k8s-staging-cip-test/buckets/asia.artifacts.k8s-staging-cip-test.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://asia.artifacts.k8s-staging-cip-test.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cip-test/buckets/eu.artifacts.k8s-staging-cip-test.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-cip-test/buckets/eu.artifacts.k8s-staging-cip-test.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index ed2eb50678fc..000000000000 --- a/audit/projects/k8s-staging-cip-test/buckets/eu.artifacts.k8s-staging-cip-test.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://eu.artifacts.k8s-staging-cip-test.appspot.com: - Enabled: True - LockedTime: 2020-01-28 03:57:28.936000+00:00 - diff --git a/audit/projects/k8s-staging-cip-test/buckets/eu.artifacts.k8s-staging-cip-test.appspot.com/cors.txt b/audit/projects/k8s-staging-cip-test/buckets/eu.artifacts.k8s-staging-cip-test.appspot.com/cors.txt deleted file mode 100644 index 511b1e01de48..000000000000 --- a/audit/projects/k8s-staging-cip-test/buckets/eu.artifacts.k8s-staging-cip-test.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://eu.artifacts.k8s-staging-cip-test.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cip-test/buckets/eu.artifacts.k8s-staging-cip-test.appspot.com/iam.json b/audit/projects/k8s-staging-cip-test/buckets/eu.artifacts.k8s-staging-cip-test.appspot.com/iam.json deleted file mode 100644 index 3b6fc529f392..000000000000 --- a/audit/projects/k8s-staging-cip-test/buckets/eu.artifacts.k8s-staging-cip-test.appspot.com/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cip-test", - "projectOwner:k8s-staging-cip-test", - "serviceAccount:k8s-infra-gcr-promoter@k8s-staging-cip-test.iam.gserviceaccount.com" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-cip-test@kubernetes.io", - "projectViewer:k8s-staging-cip-test" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cip-test@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cip-test@kubernetes.io", - "serviceAccount:k8s-infra-gcr-promoter@k8s-staging-cip-test.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cip-test/buckets/eu.artifacts.k8s-staging-cip-test.appspot.com/logging.txt b/audit/projects/k8s-staging-cip-test/buckets/eu.artifacts.k8s-staging-cip-test.appspot.com/logging.txt deleted file mode 100644 index fa39d432ef2d..000000000000 --- a/audit/projects/k8s-staging-cip-test/buckets/eu.artifacts.k8s-staging-cip-test.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://eu.artifacts.k8s-staging-cip-test.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cip-test/buckets/k8s-staging-cip-test-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-cip-test/buckets/k8s-staging-cip-test-gcb/bucketpolicyonly.txt deleted file mode 100644 index 6a9072219650..000000000000 --- a/audit/projects/k8s-staging-cip-test/buckets/k8s-staging-cip-test-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-cip-test-gcb: - Enabled: True - LockedTime: 2019-12-10 16:17:19.108000+00:00 - diff --git a/audit/projects/k8s-staging-cip-test/buckets/k8s-staging-cip-test-gcb/cors.txt b/audit/projects/k8s-staging-cip-test/buckets/k8s-staging-cip-test-gcb/cors.txt deleted file mode 100644 index 494b54aa1258..000000000000 --- a/audit/projects/k8s-staging-cip-test/buckets/k8s-staging-cip-test-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cip-test-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cip-test/buckets/k8s-staging-cip-test-gcb/iam.json b/audit/projects/k8s-staging-cip-test/buckets/k8s-staging-cip-test-gcb/iam.json deleted file mode 100644 index c258b1fdaa2b..000000000000 --- a/audit/projects/k8s-staging-cip-test/buckets/k8s-staging-cip-test-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cip-test", - "projectOwner:k8s-staging-cip-test" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-cip-test" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cip-test@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cip-test@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cip-test/buckets/k8s-staging-cip-test-gcb/logging.txt b/audit/projects/k8s-staging-cip-test/buckets/k8s-staging-cip-test-gcb/logging.txt deleted file mode 100644 index 1818058c539b..000000000000 --- a/audit/projects/k8s-staging-cip-test/buckets/k8s-staging-cip-test-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cip-test-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cip-test/buckets/k8s-staging-cip-test/bucketpolicyonly.txt b/audit/projects/k8s-staging-cip-test/buckets/k8s-staging-cip-test/bucketpolicyonly.txt deleted file mode 100644 index 104a490725fb..000000000000 --- a/audit/projects/k8s-staging-cip-test/buckets/k8s-staging-cip-test/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-cip-test: - Enabled: True - LockedTime: 2019-10-06 19:34:17.419000+00:00 - diff --git a/audit/projects/k8s-staging-cip-test/buckets/k8s-staging-cip-test/cors.txt b/audit/projects/k8s-staging-cip-test/buckets/k8s-staging-cip-test/cors.txt deleted file mode 100644 index d968ec317014..000000000000 --- a/audit/projects/k8s-staging-cip-test/buckets/k8s-staging-cip-test/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cip-test/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cip-test/buckets/k8s-staging-cip-test/iam.json b/audit/projects/k8s-staging-cip-test/buckets/k8s-staging-cip-test/iam.json deleted file mode 100644 index fed74e0e658a..000000000000 --- a/audit/projects/k8s-staging-cip-test/buckets/k8s-staging-cip-test/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cip-test", - "projectOwner:k8s-staging-cip-test" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-cip-test" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cip-test@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cip-test@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cip-test/buckets/k8s-staging-cip-test/logging.txt b/audit/projects/k8s-staging-cip-test/buckets/k8s-staging-cip-test/logging.txt deleted file mode 100644 index 5b1903d2d0a4..000000000000 --- a/audit/projects/k8s-staging-cip-test/buckets/k8s-staging-cip-test/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cip-test/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cip-test/buckets/us.artifacts.k8s-staging-cip-test.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-cip-test/buckets/us.artifacts.k8s-staging-cip-test.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 9293efccdde6..000000000000 --- a/audit/projects/k8s-staging-cip-test/buckets/us.artifacts.k8s-staging-cip-test.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://us.artifacts.k8s-staging-cip-test.appspot.com: - Enabled: True - LockedTime: 2020-01-28 03:56:55.245000+00:00 - diff --git a/audit/projects/k8s-staging-cip-test/buckets/us.artifacts.k8s-staging-cip-test.appspot.com/cors.txt b/audit/projects/k8s-staging-cip-test/buckets/us.artifacts.k8s-staging-cip-test.appspot.com/cors.txt deleted file mode 100644 index bbe53bff9915..000000000000 --- a/audit/projects/k8s-staging-cip-test/buckets/us.artifacts.k8s-staging-cip-test.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://us.artifacts.k8s-staging-cip-test.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cip-test/buckets/us.artifacts.k8s-staging-cip-test.appspot.com/iam.json b/audit/projects/k8s-staging-cip-test/buckets/us.artifacts.k8s-staging-cip-test.appspot.com/iam.json deleted file mode 100644 index 3b6fc529f392..000000000000 --- a/audit/projects/k8s-staging-cip-test/buckets/us.artifacts.k8s-staging-cip-test.appspot.com/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cip-test", - "projectOwner:k8s-staging-cip-test", - "serviceAccount:k8s-infra-gcr-promoter@k8s-staging-cip-test.iam.gserviceaccount.com" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-cip-test@kubernetes.io", - "projectViewer:k8s-staging-cip-test" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cip-test@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cip-test@kubernetes.io", - "serviceAccount:k8s-infra-gcr-promoter@k8s-staging-cip-test.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cip-test/buckets/us.artifacts.k8s-staging-cip-test.appspot.com/logging.txt b/audit/projects/k8s-staging-cip-test/buckets/us.artifacts.k8s-staging-cip-test.appspot.com/logging.txt deleted file mode 100644 index 6ba6a5019e38..000000000000 --- a/audit/projects/k8s-staging-cip-test/buckets/us.artifacts.k8s-staging-cip-test.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://us.artifacts.k8s-staging-cip-test.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cip-test/description.json b/audit/projects/k8s-staging-cip-test/description.json deleted file mode 100644 index 5e73de96779c..000000000000 --- a/audit/projects/k8s-staging-cip-test/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2019-04-03T19:51:12.995Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-cip-test", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-cip-test", - "projectNumber": "324460563566" -} diff --git a/audit/projects/k8s-staging-cip-test/iam.json b/audit/projects/k8s-staging-cip-test/iam.json deleted file mode 100644 index de1fef665ea2..000000000000 --- a/audit/projects/k8s-staging-cip-test/iam.json +++ /dev/null @@ -1,76 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:324460563566@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-cip-test@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-324460563566@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-324460563566@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-324460563566@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-324460563566@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:324460563566-compute@developer.gserviceaccount.com", - "serviceAccount:324460563566@cloudservices.gserviceaccount.com", - "serviceAccount:service-324460563566@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-cip-test@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cip-test@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-cip-test/service-accounts/324460563566-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-staging-cip-test/service-accounts/324460563566-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 61f6bd2bd1ca..000000000000 --- a/audit/projects/k8s-staging-cip-test/service-accounts/324460563566-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "324460563566-compute@developer.gserviceaccount.com", - "name": "projects/k8s-staging-cip-test/serviceAccounts/324460563566-compute@developer.gserviceaccount.com", - "oauth2ClientId": "101237046382178675324", - "projectId": "k8s-staging-cip-test", - "uniqueId": "101237046382178675324" -} diff --git a/audit/projects/k8s-staging-cip-test/service-accounts/324460563566-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-staging-cip-test/service-accounts/324460563566-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-staging-cip-test/service-accounts/324460563566-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-staging-cip-test/service-accounts/k8s-infra-gcr-promoter@k8s-staging-cip-test.iam.gserviceaccount.com/description.json b/audit/projects/k8s-staging-cip-test/service-accounts/k8s-infra-gcr-promoter@k8s-staging-cip-test.iam.gserviceaccount.com/description.json deleted file mode 100644 index d0b7844b9cad..000000000000 --- a/audit/projects/k8s-staging-cip-test/service-accounts/k8s-infra-gcr-promoter@k8s-staging-cip-test.iam.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "k8s-infra container image promoter", - "email": "k8s-infra-gcr-promoter@k8s-staging-cip-test.iam.gserviceaccount.com", - "name": "projects/k8s-staging-cip-test/serviceAccounts/k8s-infra-gcr-promoter@k8s-staging-cip-test.iam.gserviceaccount.com", - "oauth2ClientId": "106163575317668102143", - "projectId": "k8s-staging-cip-test", - "uniqueId": "106163575317668102143" -} diff --git a/audit/projects/k8s-staging-cip-test/service-accounts/k8s-infra-gcr-promoter@k8s-staging-cip-test.iam.gserviceaccount.com/iam.json b/audit/projects/k8s-staging-cip-test/service-accounts/k8s-infra-gcr-promoter@k8s-staging-cip-test.iam.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-staging-cip-test/service-accounts/k8s-infra-gcr-promoter@k8s-staging-cip-test.iam.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-staging-cip-test/services/bigquery/bigquery.datasets.json b/audit/projects/k8s-staging-cip-test/services/bigquery/bigquery.datasets.json deleted file mode 100644 index e69de29bb2d1..000000000000 diff --git a/audit/projects/k8s-staging-cip-test/services/compute/project-info.json b/audit/projects/k8s-staging-cip-test/services/compute/project-info.json deleted file mode 100644 index f7fd8861bd17..000000000000 --- a/audit/projects/k8s-staging-cip-test/services/compute/project-info.json +++ /dev/null @@ -1,171 +0,0 @@ -{ - "commonInstanceMetadata": { - "kind": "compute#metadata" - }, - "creationTimestamp": "2019-04-05T15:41:27.369-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "324460563566-compute@developer.gserviceaccount.com", - "id": "1907738506999523192", - "kind": "compute#project", - "name": "k8s-staging-cip-test", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-staging-cip-test", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-staging-cip-test/services/enabled.txt b/audit/projects/k8s-staging-cip-test/services/enabled.txt deleted file mode 100644 index 8feac853adf8..000000000000 --- a/audit/projects/k8s-staging-cip-test/services/enabled.txt +++ /dev/null @@ -1,24 +0,0 @@ -NAME TITLE -bigquery.googleapis.com BigQuery API -bigquery.googleapis.com BigQuery API -bigquerystorage.googleapis.com BigQuery Storage API -cloudapis.googleapis.com Google Cloud APIs -cloudbuild.googleapis.com Cloud Build API -clouddebugger.googleapis.com Cloud Debugger API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -cloudtrace.googleapis.com Cloud Trace API -compute.googleapis.com Compute Engine API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -datastore.googleapis.com Cloud Datastore API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -servicemanagement.googleapis.com Service Management API -serviceusage.googleapis.com Service Usage API -sql-component.googleapis.com Cloud SQL -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/artifacts.k8s-staging-cloud-provider-gcp.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/artifacts.k8s-staging-cloud-provider-gcp.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index f9231ca427b5..000000000000 --- a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/artifacts.k8s-staging-cloud-provider-gcp.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-cloud-provider-gcp.appspot.com: - Enabled: True - LockedTime: 2020-10-15 21:52:41.223000+00:00 - diff --git a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/artifacts.k8s-staging-cloud-provider-gcp.appspot.com/cors.txt b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/artifacts.k8s-staging-cloud-provider-gcp.appspot.com/cors.txt deleted file mode 100644 index 537244271968..000000000000 --- a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/artifacts.k8s-staging-cloud-provider-gcp.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-cloud-provider-gcp.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/artifacts.k8s-staging-cloud-provider-gcp.appspot.com/iam.json b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/artifacts.k8s-staging-cloud-provider-gcp.appspot.com/iam.json deleted file mode 100644 index f022a6b45f57..000000000000 --- a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/artifacts.k8s-staging-cloud-provider-gcp.appspot.com/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cloud-provider-gcp", - "projectOwner:k8s-staging-cloud-provider-gcp" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-cloud-provider-gcp" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cloud-provider-gcp@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cloud-provider-gcp@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/artifacts.k8s-staging-cloud-provider-gcp.appspot.com/logging.txt b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/artifacts.k8s-staging-cloud-provider-gcp.appspot.com/logging.txt deleted file mode 100644 index aea61ba78b94..000000000000 --- a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/artifacts.k8s-staging-cloud-provider-gcp.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-cloud-provider-gcp.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp-gcb/bucketpolicyonly.txt deleted file mode 100644 index 2f55be3bd556..000000000000 --- a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-cloud-provider-gcp-gcb: - Enabled: True - LockedTime: 2020-10-15 21:53:28.123000+00:00 - diff --git a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp-gcb/cors.txt b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp-gcb/cors.txt deleted file mode 100644 index 74f31f61f05e..000000000000 --- a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cloud-provider-gcp-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp-gcb/iam.json b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp-gcb/iam.json deleted file mode 100644 index 537a67859c65..000000000000 --- a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cloud-provider-gcp", - "projectOwner:k8s-staging-cloud-provider-gcp" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-cloud-provider-gcp" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cloud-provider-gcp@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cloud-provider-gcp@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp-gcb/logging.txt b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp-gcb/logging.txt deleted file mode 100644 index b7cd397e5f5d..000000000000 --- a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cloud-provider-gcp-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp/bucketpolicyonly.txt b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp/bucketpolicyonly.txt deleted file mode 100644 index a1692ed1508f..000000000000 --- a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-cloud-provider-gcp: - Enabled: True - LockedTime: 2020-10-15 21:53:03.842000+00:00 - diff --git a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp/cors.txt b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp/cors.txt deleted file mode 100644 index 3223a23f6e27..000000000000 --- a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cloud-provider-gcp/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp/iam.json b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp/iam.json deleted file mode 100644 index f022a6b45f57..000000000000 --- a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cloud-provider-gcp", - "projectOwner:k8s-staging-cloud-provider-gcp" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-cloud-provider-gcp" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cloud-provider-gcp@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cloud-provider-gcp@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp/logging.txt b/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp/logging.txt deleted file mode 100644 index b7dd1bf1b66b..000000000000 --- a/audit/projects/k8s-staging-cloud-provider-gcp/buckets/k8s-staging-cloud-provider-gcp/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cloud-provider-gcp/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cloud-provider-gcp/description.json b/audit/projects/k8s-staging-cloud-provider-gcp/description.json deleted file mode 100644 index 2e1cae589052..000000000000 --- a/audit/projects/k8s-staging-cloud-provider-gcp/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-07-17T16:04:12.032Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-cloud-provider-gcp", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-cloud-provider-gcp", - "projectNumber": "67010995753" -} diff --git a/audit/projects/k8s-staging-cloud-provider-gcp/iam.json b/audit/projects/k8s-staging-cloud-provider-gcp/iam.json deleted file mode 100644 index 50903a4fdf67..000000000000 --- a/audit/projects/k8s-staging-cloud-provider-gcp/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:67010995753@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-cloud-provider-gcp@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-67010995753@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-67010995753@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-67010995753@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-67010995753@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-cloud-provider-gcp@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cloud-provider-gcp@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-cloud-provider-gcp/services/enabled.txt b/audit/projects/k8s-staging-cloud-provider-gcp/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-cloud-provider-gcp/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-cluster-addons/buckets/artifacts.k8s-staging-cluster-addons.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-cluster-addons/buckets/artifacts.k8s-staging-cluster-addons.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 52c0958698d7..000000000000 --- a/audit/projects/k8s-staging-cluster-addons/buckets/artifacts.k8s-staging-cluster-addons.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-cluster-addons.appspot.com: - Enabled: True - LockedTime: 2020-11-12 18:42:03.526000+00:00 - diff --git a/audit/projects/k8s-staging-cluster-addons/buckets/artifacts.k8s-staging-cluster-addons.appspot.com/cors.txt b/audit/projects/k8s-staging-cluster-addons/buckets/artifacts.k8s-staging-cluster-addons.appspot.com/cors.txt deleted file mode 100644 index 37835af53e3d..000000000000 --- a/audit/projects/k8s-staging-cluster-addons/buckets/artifacts.k8s-staging-cluster-addons.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-cluster-addons.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cluster-addons/buckets/artifacts.k8s-staging-cluster-addons.appspot.com/iam.json b/audit/projects/k8s-staging-cluster-addons/buckets/artifacts.k8s-staging-cluster-addons.appspot.com/iam.json deleted file mode 100644 index a8df20cf2af0..000000000000 --- a/audit/projects/k8s-staging-cluster-addons/buckets/artifacts.k8s-staging-cluster-addons.appspot.com/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cluster-addons", - "projectOwner:k8s-staging-cluster-addons" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-cluster-addons" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-addons@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cluster-addons@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cluster-addons/buckets/artifacts.k8s-staging-cluster-addons.appspot.com/logging.txt b/audit/projects/k8s-staging-cluster-addons/buckets/artifacts.k8s-staging-cluster-addons.appspot.com/logging.txt deleted file mode 100644 index 87975c1e18a2..000000000000 --- a/audit/projects/k8s-staging-cluster-addons/buckets/artifacts.k8s-staging-cluster-addons.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-cluster-addons.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons-gcb/bucketpolicyonly.txt deleted file mode 100644 index bd46dfbcd328..000000000000 --- a/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-cluster-addons-gcb: - Enabled: True - LockedTime: 2020-11-12 18:42:48.525000+00:00 - diff --git a/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons-gcb/cors.txt b/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons-gcb/cors.txt deleted file mode 100644 index 1b9cd82ec75c..000000000000 --- a/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cluster-addons-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons-gcb/iam.json b/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons-gcb/iam.json deleted file mode 100644 index 001de2439daf..000000000000 --- a/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cluster-addons", - "projectOwner:k8s-staging-cluster-addons" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-cluster-addons" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-addons@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cluster-addons@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons-gcb/logging.txt b/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons-gcb/logging.txt deleted file mode 100644 index 7a9f3e5a2943..000000000000 --- a/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cluster-addons-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons/bucketpolicyonly.txt b/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons/bucketpolicyonly.txt deleted file mode 100644 index b02fb6ee41f8..000000000000 --- a/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-cluster-addons: - Enabled: True - LockedTime: 2020-11-12 18:42:26.724000+00:00 - diff --git a/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons/cors.txt b/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons/cors.txt deleted file mode 100644 index 19af27a71b08..000000000000 --- a/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cluster-addons/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons/iam.json b/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons/iam.json deleted file mode 100644 index a8df20cf2af0..000000000000 --- a/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cluster-addons", - "projectOwner:k8s-staging-cluster-addons" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-cluster-addons" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-addons@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cluster-addons@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons/logging.txt b/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons/logging.txt deleted file mode 100644 index 323ff0447ce3..000000000000 --- a/audit/projects/k8s-staging-cluster-addons/buckets/k8s-staging-cluster-addons/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cluster-addons/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cluster-addons/description.json b/audit/projects/k8s-staging-cluster-addons/description.json deleted file mode 100644 index cf79ef541f95..000000000000 --- a/audit/projects/k8s-staging-cluster-addons/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-08-14T18:41:09.035Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-cluster-addons", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-cluster-addons", - "projectNumber": "239900365888" -} diff --git a/audit/projects/k8s-staging-cluster-addons/iam.json b/audit/projects/k8s-staging-cluster-addons/iam.json deleted file mode 100644 index f4279ad84442..000000000000 --- a/audit/projects/k8s-staging-cluster-addons/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:239900365888@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-addons@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-239900365888@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-239900365888@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-239900365888@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-239900365888@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-addons@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cluster-addons@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-cluster-addons/services/enabled.txt b/audit/projects/k8s-staging-cluster-addons/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-cluster-addons/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-cluster-api-aws/buckets/artifacts.k8s-staging-cluster-api-aws.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-cluster-api-aws/buckets/artifacts.k8s-staging-cluster-api-aws.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 676dbbd8b53a..000000000000 --- a/audit/projects/k8s-staging-cluster-api-aws/buckets/artifacts.k8s-staging-cluster-api-aws.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-cluster-api-aws.appspot.com: - Enabled: True - LockedTime: 2019-10-06 16:51:20.826000+00:00 - diff --git a/audit/projects/k8s-staging-cluster-api-aws/buckets/artifacts.k8s-staging-cluster-api-aws.appspot.com/cors.txt b/audit/projects/k8s-staging-cluster-api-aws/buckets/artifacts.k8s-staging-cluster-api-aws.appspot.com/cors.txt deleted file mode 100644 index e418d1999d8c..000000000000 --- a/audit/projects/k8s-staging-cluster-api-aws/buckets/artifacts.k8s-staging-cluster-api-aws.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-cluster-api-aws.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cluster-api-aws/buckets/artifacts.k8s-staging-cluster-api-aws.appspot.com/iam.json b/audit/projects/k8s-staging-cluster-api-aws/buckets/artifacts.k8s-staging-cluster-api-aws.appspot.com/iam.json deleted file mode 100644 index 1403ce269bfc..000000000000 --- a/audit/projects/k8s-staging-cluster-api-aws/buckets/artifacts.k8s-staging-cluster-api-aws.appspot.com/iam.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cluster-api-aws", - "projectOwner:k8s-staging-cluster-api-aws" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-api-aws@kubernetes.io", - "projectViewer:k8s-staging-cluster-api-aws" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-api-aws@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cluster-api-aws@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cluster-api-aws/buckets/artifacts.k8s-staging-cluster-api-aws.appspot.com/logging.txt b/audit/projects/k8s-staging-cluster-api-aws/buckets/artifacts.k8s-staging-cluster-api-aws.appspot.com/logging.txt deleted file mode 100644 index 028378d2443c..000000000000 --- a/audit/projects/k8s-staging-cluster-api-aws/buckets/artifacts.k8s-staging-cluster-api-aws.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-cluster-api-aws.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cluster-api-aws/buckets/k8s-staging-cluster-api-aws-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-cluster-api-aws/buckets/k8s-staging-cluster-api-aws-gcb/bucketpolicyonly.txt deleted file mode 100644 index ff38ea4c582f..000000000000 --- a/audit/projects/k8s-staging-cluster-api-aws/buckets/k8s-staging-cluster-api-aws-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-cluster-api-aws-gcb: - Enabled: True - LockedTime: 2019-12-10 16:19:05.213000+00:00 - diff --git a/audit/projects/k8s-staging-cluster-api-aws/buckets/k8s-staging-cluster-api-aws-gcb/cors.txt b/audit/projects/k8s-staging-cluster-api-aws/buckets/k8s-staging-cluster-api-aws-gcb/cors.txt deleted file mode 100644 index bf4057af85d8..000000000000 --- a/audit/projects/k8s-staging-cluster-api-aws/buckets/k8s-staging-cluster-api-aws-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cluster-api-aws-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cluster-api-aws/buckets/k8s-staging-cluster-api-aws-gcb/iam.json b/audit/projects/k8s-staging-cluster-api-aws/buckets/k8s-staging-cluster-api-aws-gcb/iam.json deleted file mode 100644 index 558b96aea71b..000000000000 --- a/audit/projects/k8s-staging-cluster-api-aws/buckets/k8s-staging-cluster-api-aws-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cluster-api-aws", - "projectOwner:k8s-staging-cluster-api-aws" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-cluster-api-aws" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-api-aws@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cluster-api-aws@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cluster-api-aws/buckets/k8s-staging-cluster-api-aws-gcb/logging.txt b/audit/projects/k8s-staging-cluster-api-aws/buckets/k8s-staging-cluster-api-aws-gcb/logging.txt deleted file mode 100644 index 60a00efbfe31..000000000000 --- a/audit/projects/k8s-staging-cluster-api-aws/buckets/k8s-staging-cluster-api-aws-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cluster-api-aws-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cluster-api-aws/buckets/k8s-staging-cluster-api-aws/bucketpolicyonly.txt b/audit/projects/k8s-staging-cluster-api-aws/buckets/k8s-staging-cluster-api-aws/bucketpolicyonly.txt deleted file mode 100644 index 13d82086f31d..000000000000 --- a/audit/projects/k8s-staging-cluster-api-aws/buckets/k8s-staging-cluster-api-aws/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-cluster-api-aws: - Enabled: True - LockedTime: 2019-10-06 19:40:06.826000+00:00 - diff --git a/audit/projects/k8s-staging-cluster-api-aws/buckets/k8s-staging-cluster-api-aws/cors.txt b/audit/projects/k8s-staging-cluster-api-aws/buckets/k8s-staging-cluster-api-aws/cors.txt deleted file mode 100644 index c1eeaf773329..000000000000 --- a/audit/projects/k8s-staging-cluster-api-aws/buckets/k8s-staging-cluster-api-aws/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cluster-api-aws/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cluster-api-aws/buckets/k8s-staging-cluster-api-aws/iam.json b/audit/projects/k8s-staging-cluster-api-aws/buckets/k8s-staging-cluster-api-aws/iam.json deleted file mode 100644 index 64a854d57076..000000000000 --- a/audit/projects/k8s-staging-cluster-api-aws/buckets/k8s-staging-cluster-api-aws/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cluster-api-aws", - "projectOwner:k8s-staging-cluster-api-aws" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-cluster-api-aws" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-api-aws@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cluster-api-aws@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cluster-api-aws/buckets/k8s-staging-cluster-api-aws/logging.txt b/audit/projects/k8s-staging-cluster-api-aws/buckets/k8s-staging-cluster-api-aws/logging.txt deleted file mode 100644 index e401c3076456..000000000000 --- a/audit/projects/k8s-staging-cluster-api-aws/buckets/k8s-staging-cluster-api-aws/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cluster-api-aws/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cluster-api-aws/description.json b/audit/projects/k8s-staging-cluster-api-aws/description.json deleted file mode 100644 index 32f34a9e185f..000000000000 --- a/audit/projects/k8s-staging-cluster-api-aws/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2019-07-08T16:38:22.868Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-cluster-api-aws", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-cluster-api-aws", - "projectNumber": "433651898792" -} diff --git a/audit/projects/k8s-staging-cluster-api-aws/iam.json b/audit/projects/k8s-staging-cluster-api-aws/iam.json deleted file mode 100644 index ee0b51c0233b..000000000000 --- a/audit/projects/k8s-staging-cluster-api-aws/iam.json +++ /dev/null @@ -1,76 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:433651898792@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-api-aws@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-433651898792@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-433651898792@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-433651898792@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-433651898792@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:433651898792-compute@developer.gserviceaccount.com", - "serviceAccount:433651898792@cloudservices.gserviceaccount.com", - "serviceAccount:service-433651898792@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-api-aws@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cluster-api-aws@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-cluster-api-aws/service-accounts/433651898792-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-staging-cluster-api-aws/service-accounts/433651898792-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 16a0ef19d7de..000000000000 --- a/audit/projects/k8s-staging-cluster-api-aws/service-accounts/433651898792-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "433651898792-compute@developer.gserviceaccount.com", - "name": "projects/k8s-staging-cluster-api-aws/serviceAccounts/433651898792-compute@developer.gserviceaccount.com", - "oauth2ClientId": "114251534546438878491", - "projectId": "k8s-staging-cluster-api-aws", - "uniqueId": "114251534546438878491" -} diff --git a/audit/projects/k8s-staging-cluster-api-aws/service-accounts/433651898792-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-staging-cluster-api-aws/service-accounts/433651898792-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-staging-cluster-api-aws/service-accounts/433651898792-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-staging-cluster-api-aws/services/compute/project-info.json b/audit/projects/k8s-staging-cluster-api-aws/services/compute/project-info.json deleted file mode 100644 index 690ce8b6bf71..000000000000 --- a/audit/projects/k8s-staging-cluster-api-aws/services/compute/project-info.json +++ /dev/null @@ -1,171 +0,0 @@ -{ - "commonInstanceMetadata": { - "kind": "compute#metadata" - }, - "creationTimestamp": "2019-07-24T09:10:39.578-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "433651898792-compute@developer.gserviceaccount.com", - "id": "3226456422251576336", - "kind": "compute#project", - "name": "k8s-staging-cluster-api-aws", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-staging-cluster-api-aws", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-staging-cluster-api-aws/services/enabled.txt b/audit/projects/k8s-staging-cluster-api-aws/services/enabled.txt deleted file mode 100644 index 661451636fab..000000000000 --- a/audit/projects/k8s-staging-cluster-api-aws/services/enabled.txt +++ /dev/null @@ -1,13 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -compute.googleapis.com Compute Engine API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-cluster-api-azure/buckets/artifacts.k8s-staging-cluster-api-azure.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-cluster-api-azure/buckets/artifacts.k8s-staging-cluster-api-azure.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 727feacc343d..000000000000 --- a/audit/projects/k8s-staging-cluster-api-azure/buckets/artifacts.k8s-staging-cluster-api-azure.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-cluster-api-azure.appspot.com: - Enabled: True - LockedTime: 2019-12-22 16:09:30.035000+00:00 - diff --git a/audit/projects/k8s-staging-cluster-api-azure/buckets/artifacts.k8s-staging-cluster-api-azure.appspot.com/cors.txt b/audit/projects/k8s-staging-cluster-api-azure/buckets/artifacts.k8s-staging-cluster-api-azure.appspot.com/cors.txt deleted file mode 100644 index 97f908070dff..000000000000 --- a/audit/projects/k8s-staging-cluster-api-azure/buckets/artifacts.k8s-staging-cluster-api-azure.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-cluster-api-azure.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cluster-api-azure/buckets/artifacts.k8s-staging-cluster-api-azure.appspot.com/iam.json b/audit/projects/k8s-staging-cluster-api-azure/buckets/artifacts.k8s-staging-cluster-api-azure.appspot.com/iam.json deleted file mode 100644 index 36d0448b1e74..000000000000 --- a/audit/projects/k8s-staging-cluster-api-azure/buckets/artifacts.k8s-staging-cluster-api-azure.appspot.com/iam.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cluster-api-azure", - "projectOwner:k8s-staging-cluster-api-azure" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-api-azure@kubernetes.io", - "projectViewer:k8s-staging-cluster-api-azure" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-api-azure@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cluster-api-azure@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cluster-api-azure/buckets/artifacts.k8s-staging-cluster-api-azure.appspot.com/logging.txt b/audit/projects/k8s-staging-cluster-api-azure/buckets/artifacts.k8s-staging-cluster-api-azure.appspot.com/logging.txt deleted file mode 100644 index 97b2d1c0f3d0..000000000000 --- a/audit/projects/k8s-staging-cluster-api-azure/buckets/artifacts.k8s-staging-cluster-api-azure.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-cluster-api-azure.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cluster-api-azure/buckets/k8s-staging-cluster-api-azure-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-cluster-api-azure/buckets/k8s-staging-cluster-api-azure-gcb/bucketpolicyonly.txt deleted file mode 100644 index df5fbbc902f9..000000000000 --- a/audit/projects/k8s-staging-cluster-api-azure/buckets/k8s-staging-cluster-api-azure-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-cluster-api-azure-gcb: - Enabled: True - LockedTime: 2019-12-22 16:10:06.410000+00:00 - diff --git a/audit/projects/k8s-staging-cluster-api-azure/buckets/k8s-staging-cluster-api-azure-gcb/cors.txt b/audit/projects/k8s-staging-cluster-api-azure/buckets/k8s-staging-cluster-api-azure-gcb/cors.txt deleted file mode 100644 index 23092d5c8ed9..000000000000 --- a/audit/projects/k8s-staging-cluster-api-azure/buckets/k8s-staging-cluster-api-azure-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cluster-api-azure-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cluster-api-azure/buckets/k8s-staging-cluster-api-azure-gcb/iam.json b/audit/projects/k8s-staging-cluster-api-azure/buckets/k8s-staging-cluster-api-azure-gcb/iam.json deleted file mode 100644 index fc7b05558d50..000000000000 --- a/audit/projects/k8s-staging-cluster-api-azure/buckets/k8s-staging-cluster-api-azure-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cluster-api-azure", - "projectOwner:k8s-staging-cluster-api-azure" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-cluster-api-azure" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-api-azure@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cluster-api-azure@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cluster-api-azure/buckets/k8s-staging-cluster-api-azure-gcb/logging.txt b/audit/projects/k8s-staging-cluster-api-azure/buckets/k8s-staging-cluster-api-azure-gcb/logging.txt deleted file mode 100644 index 4abdd540a26c..000000000000 --- a/audit/projects/k8s-staging-cluster-api-azure/buckets/k8s-staging-cluster-api-azure-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cluster-api-azure-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cluster-api-azure/buckets/k8s-staging-cluster-api-azure/bucketpolicyonly.txt b/audit/projects/k8s-staging-cluster-api-azure/buckets/k8s-staging-cluster-api-azure/bucketpolicyonly.txt deleted file mode 100644 index a23de4561477..000000000000 --- a/audit/projects/k8s-staging-cluster-api-azure/buckets/k8s-staging-cluster-api-azure/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-cluster-api-azure: - Enabled: True - LockedTime: 2019-12-22 16:09:49.431000+00:00 - diff --git a/audit/projects/k8s-staging-cluster-api-azure/buckets/k8s-staging-cluster-api-azure/cors.txt b/audit/projects/k8s-staging-cluster-api-azure/buckets/k8s-staging-cluster-api-azure/cors.txt deleted file mode 100644 index ef432de5fdb8..000000000000 --- a/audit/projects/k8s-staging-cluster-api-azure/buckets/k8s-staging-cluster-api-azure/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cluster-api-azure/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cluster-api-azure/buckets/k8s-staging-cluster-api-azure/iam.json b/audit/projects/k8s-staging-cluster-api-azure/buckets/k8s-staging-cluster-api-azure/iam.json deleted file mode 100644 index 65b9dc6964a3..000000000000 --- a/audit/projects/k8s-staging-cluster-api-azure/buckets/k8s-staging-cluster-api-azure/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cluster-api-azure", - "projectOwner:k8s-staging-cluster-api-azure" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-cluster-api-azure" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-api-azure@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cluster-api-azure@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cluster-api-azure/buckets/k8s-staging-cluster-api-azure/logging.txt b/audit/projects/k8s-staging-cluster-api-azure/buckets/k8s-staging-cluster-api-azure/logging.txt deleted file mode 100644 index 9d5987b3e664..000000000000 --- a/audit/projects/k8s-staging-cluster-api-azure/buckets/k8s-staging-cluster-api-azure/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cluster-api-azure/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cluster-api-azure/description.json b/audit/projects/k8s-staging-cluster-api-azure/description.json deleted file mode 100644 index 614a7e5fa7d3..000000000000 --- a/audit/projects/k8s-staging-cluster-api-azure/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2019-09-23T16:08:49.700Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-cluster-api-azure", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-cluster-api-azure", - "projectNumber": "1087109869165" -} diff --git a/audit/projects/k8s-staging-cluster-api-azure/iam.json b/audit/projects/k8s-staging-cluster-api-azure/iam.json deleted file mode 100644 index 81fe953b330b..000000000000 --- a/audit/projects/k8s-staging-cluster-api-azure/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:1087109869165@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-api-azure@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-1087109869165@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-1087109869165@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-1087109869165@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-1087109869165@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-api-azure@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cluster-api-azure@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-cluster-api-azure/services/enabled.txt b/audit/projects/k8s-staging-cluster-api-azure/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-cluster-api-azure/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-cluster-api-do/buckets/artifacts.k8s-staging-cluster-api-do.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-cluster-api-do/buckets/artifacts.k8s-staging-cluster-api-do.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 19687b2dbfcb..000000000000 --- a/audit/projects/k8s-staging-cluster-api-do/buckets/artifacts.k8s-staging-cluster-api-do.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-cluster-api-do.appspot.com: - Enabled: True - LockedTime: 2020-06-18 19:27:02.469000+00:00 - diff --git a/audit/projects/k8s-staging-cluster-api-do/buckets/artifacts.k8s-staging-cluster-api-do.appspot.com/cors.txt b/audit/projects/k8s-staging-cluster-api-do/buckets/artifacts.k8s-staging-cluster-api-do.appspot.com/cors.txt deleted file mode 100644 index 3c3fc7729b3b..000000000000 --- a/audit/projects/k8s-staging-cluster-api-do/buckets/artifacts.k8s-staging-cluster-api-do.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-cluster-api-do.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cluster-api-do/buckets/artifacts.k8s-staging-cluster-api-do.appspot.com/iam.json b/audit/projects/k8s-staging-cluster-api-do/buckets/artifacts.k8s-staging-cluster-api-do.appspot.com/iam.json deleted file mode 100644 index 9721feb4a15b..000000000000 --- a/audit/projects/k8s-staging-cluster-api-do/buckets/artifacts.k8s-staging-cluster-api-do.appspot.com/iam.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cluster-api-do", - "projectOwner:k8s-staging-cluster-api-do" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-api-do@kubernetes.io", - "projectViewer:k8s-staging-cluster-api-do" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-api-do@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cluster-api-do@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cluster-api-do/buckets/artifacts.k8s-staging-cluster-api-do.appspot.com/logging.txt b/audit/projects/k8s-staging-cluster-api-do/buckets/artifacts.k8s-staging-cluster-api-do.appspot.com/logging.txt deleted file mode 100644 index 145806c7f228..000000000000 --- a/audit/projects/k8s-staging-cluster-api-do/buckets/artifacts.k8s-staging-cluster-api-do.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-cluster-api-do.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cluster-api-do/buckets/k8s-staging-cluster-api-do-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-cluster-api-do/buckets/k8s-staging-cluster-api-do-gcb/bucketpolicyonly.txt deleted file mode 100644 index 3ef80578ff9d..000000000000 --- a/audit/projects/k8s-staging-cluster-api-do/buckets/k8s-staging-cluster-api-do-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-cluster-api-do-gcb: - Enabled: True - LockedTime: 2020-06-18 19:27:47.046000+00:00 - diff --git a/audit/projects/k8s-staging-cluster-api-do/buckets/k8s-staging-cluster-api-do-gcb/cors.txt b/audit/projects/k8s-staging-cluster-api-do/buckets/k8s-staging-cluster-api-do-gcb/cors.txt deleted file mode 100644 index 76eeace56f9c..000000000000 --- a/audit/projects/k8s-staging-cluster-api-do/buckets/k8s-staging-cluster-api-do-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cluster-api-do-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cluster-api-do/buckets/k8s-staging-cluster-api-do-gcb/iam.json b/audit/projects/k8s-staging-cluster-api-do/buckets/k8s-staging-cluster-api-do-gcb/iam.json deleted file mode 100644 index 8dde774e7b8d..000000000000 --- a/audit/projects/k8s-staging-cluster-api-do/buckets/k8s-staging-cluster-api-do-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cluster-api-do", - "projectOwner:k8s-staging-cluster-api-do" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-cluster-api-do" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-api-do@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cluster-api-do@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cluster-api-do/buckets/k8s-staging-cluster-api-do-gcb/logging.txt b/audit/projects/k8s-staging-cluster-api-do/buckets/k8s-staging-cluster-api-do-gcb/logging.txt deleted file mode 100644 index 3437a98688fd..000000000000 --- a/audit/projects/k8s-staging-cluster-api-do/buckets/k8s-staging-cluster-api-do-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cluster-api-do-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cluster-api-do/buckets/k8s-staging-cluster-api-do/bucketpolicyonly.txt b/audit/projects/k8s-staging-cluster-api-do/buckets/k8s-staging-cluster-api-do/bucketpolicyonly.txt deleted file mode 100644 index d960dfebbf39..000000000000 --- a/audit/projects/k8s-staging-cluster-api-do/buckets/k8s-staging-cluster-api-do/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-cluster-api-do: - Enabled: True - LockedTime: 2020-06-18 19:27:27.941000+00:00 - diff --git a/audit/projects/k8s-staging-cluster-api-do/buckets/k8s-staging-cluster-api-do/cors.txt b/audit/projects/k8s-staging-cluster-api-do/buckets/k8s-staging-cluster-api-do/cors.txt deleted file mode 100644 index f89a92060d2b..000000000000 --- a/audit/projects/k8s-staging-cluster-api-do/buckets/k8s-staging-cluster-api-do/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cluster-api-do/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cluster-api-do/buckets/k8s-staging-cluster-api-do/iam.json b/audit/projects/k8s-staging-cluster-api-do/buckets/k8s-staging-cluster-api-do/iam.json deleted file mode 100644 index 8de7090b8e76..000000000000 --- a/audit/projects/k8s-staging-cluster-api-do/buckets/k8s-staging-cluster-api-do/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cluster-api-do", - "projectOwner:k8s-staging-cluster-api-do" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-cluster-api-do" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-api-do@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cluster-api-do@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cluster-api-do/buckets/k8s-staging-cluster-api-do/logging.txt b/audit/projects/k8s-staging-cluster-api-do/buckets/k8s-staging-cluster-api-do/logging.txt deleted file mode 100644 index 32246a6ce7b4..000000000000 --- a/audit/projects/k8s-staging-cluster-api-do/buckets/k8s-staging-cluster-api-do/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cluster-api-do/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cluster-api-do/description.json b/audit/projects/k8s-staging-cluster-api-do/description.json deleted file mode 100644 index 61a6a6cf4edb..000000000000 --- a/audit/projects/k8s-staging-cluster-api-do/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-03-20T19:26:12.162Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-cluster-api-do", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-cluster-api-do", - "projectNumber": "226017735054" -} diff --git a/audit/projects/k8s-staging-cluster-api-do/iam.json b/audit/projects/k8s-staging-cluster-api-do/iam.json deleted file mode 100644 index 348d16cbd361..000000000000 --- a/audit/projects/k8s-staging-cluster-api-do/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:226017735054@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-api-do@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-226017735054@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-226017735054@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-226017735054@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-226017735054@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-api-do@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cluster-api-do@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-cluster-api-do/services/enabled.txt b/audit/projects/k8s-staging-cluster-api-do/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-cluster-api-do/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-cluster-api-gcp/buckets/artifacts.k8s-staging-cluster-api-gcp.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-cluster-api-gcp/buckets/artifacts.k8s-staging-cluster-api-gcp.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 8c379c7f348a..000000000000 --- a/audit/projects/k8s-staging-cluster-api-gcp/buckets/artifacts.k8s-staging-cluster-api-gcp.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-cluster-api-gcp.appspot.com: - Enabled: True - LockedTime: 2019-12-10 14:04:03.734000+00:00 - diff --git a/audit/projects/k8s-staging-cluster-api-gcp/buckets/artifacts.k8s-staging-cluster-api-gcp.appspot.com/cors.txt b/audit/projects/k8s-staging-cluster-api-gcp/buckets/artifacts.k8s-staging-cluster-api-gcp.appspot.com/cors.txt deleted file mode 100644 index 1180e8a57433..000000000000 --- a/audit/projects/k8s-staging-cluster-api-gcp/buckets/artifacts.k8s-staging-cluster-api-gcp.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-cluster-api-gcp.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cluster-api-gcp/buckets/artifacts.k8s-staging-cluster-api-gcp.appspot.com/iam.json b/audit/projects/k8s-staging-cluster-api-gcp/buckets/artifacts.k8s-staging-cluster-api-gcp.appspot.com/iam.json deleted file mode 100644 index 725dad07826e..000000000000 --- a/audit/projects/k8s-staging-cluster-api-gcp/buckets/artifacts.k8s-staging-cluster-api-gcp.appspot.com/iam.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cluster-api-gcp", - "projectOwner:k8s-staging-cluster-api-gcp" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-api-gcp@kubernetes.io", - "projectViewer:k8s-staging-cluster-api-gcp" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-api-gcp@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cluster-api-gcp@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cluster-api-gcp/buckets/artifacts.k8s-staging-cluster-api-gcp.appspot.com/logging.txt b/audit/projects/k8s-staging-cluster-api-gcp/buckets/artifacts.k8s-staging-cluster-api-gcp.appspot.com/logging.txt deleted file mode 100644 index 854c9f1d0121..000000000000 --- a/audit/projects/k8s-staging-cluster-api-gcp/buckets/artifacts.k8s-staging-cluster-api-gcp.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-cluster-api-gcp.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cluster-api-gcp/buckets/k8s-staging-cluster-api-gcp-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-cluster-api-gcp/buckets/k8s-staging-cluster-api-gcp-gcb/bucketpolicyonly.txt deleted file mode 100644 index ba378fbdbd0b..000000000000 --- a/audit/projects/k8s-staging-cluster-api-gcp/buckets/k8s-staging-cluster-api-gcp-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-cluster-api-gcp-gcb: - Enabled: True - LockedTime: 2019-12-10 16:20:03.612000+00:00 - diff --git a/audit/projects/k8s-staging-cluster-api-gcp/buckets/k8s-staging-cluster-api-gcp-gcb/cors.txt b/audit/projects/k8s-staging-cluster-api-gcp/buckets/k8s-staging-cluster-api-gcp-gcb/cors.txt deleted file mode 100644 index 2d9ff7203635..000000000000 --- a/audit/projects/k8s-staging-cluster-api-gcp/buckets/k8s-staging-cluster-api-gcp-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cluster-api-gcp-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cluster-api-gcp/buckets/k8s-staging-cluster-api-gcp-gcb/iam.json b/audit/projects/k8s-staging-cluster-api-gcp/buckets/k8s-staging-cluster-api-gcp-gcb/iam.json deleted file mode 100644 index 59f819b346d0..000000000000 --- a/audit/projects/k8s-staging-cluster-api-gcp/buckets/k8s-staging-cluster-api-gcp-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cluster-api-gcp", - "projectOwner:k8s-staging-cluster-api-gcp" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-cluster-api-gcp" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-api-gcp@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cluster-api-gcp@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cluster-api-gcp/buckets/k8s-staging-cluster-api-gcp-gcb/logging.txt b/audit/projects/k8s-staging-cluster-api-gcp/buckets/k8s-staging-cluster-api-gcp-gcb/logging.txt deleted file mode 100644 index 4a9579feaedb..000000000000 --- a/audit/projects/k8s-staging-cluster-api-gcp/buckets/k8s-staging-cluster-api-gcp-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cluster-api-gcp-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cluster-api-gcp/buckets/k8s-staging-cluster-api-gcp/bucketpolicyonly.txt b/audit/projects/k8s-staging-cluster-api-gcp/buckets/k8s-staging-cluster-api-gcp/bucketpolicyonly.txt deleted file mode 100644 index 793d2e3cc267..000000000000 --- a/audit/projects/k8s-staging-cluster-api-gcp/buckets/k8s-staging-cluster-api-gcp/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-cluster-api-gcp: - Enabled: True - LockedTime: 2019-12-10 14:04:32.220000+00:00 - diff --git a/audit/projects/k8s-staging-cluster-api-gcp/buckets/k8s-staging-cluster-api-gcp/cors.txt b/audit/projects/k8s-staging-cluster-api-gcp/buckets/k8s-staging-cluster-api-gcp/cors.txt deleted file mode 100644 index 4f4906dc7b27..000000000000 --- a/audit/projects/k8s-staging-cluster-api-gcp/buckets/k8s-staging-cluster-api-gcp/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cluster-api-gcp/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cluster-api-gcp/buckets/k8s-staging-cluster-api-gcp/iam.json b/audit/projects/k8s-staging-cluster-api-gcp/buckets/k8s-staging-cluster-api-gcp/iam.json deleted file mode 100644 index 8de387926b73..000000000000 --- a/audit/projects/k8s-staging-cluster-api-gcp/buckets/k8s-staging-cluster-api-gcp/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cluster-api-gcp", - "projectOwner:k8s-staging-cluster-api-gcp" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-cluster-api-gcp" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-api-gcp@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cluster-api-gcp@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cluster-api-gcp/buckets/k8s-staging-cluster-api-gcp/logging.txt b/audit/projects/k8s-staging-cluster-api-gcp/buckets/k8s-staging-cluster-api-gcp/logging.txt deleted file mode 100644 index 27529dd76739..000000000000 --- a/audit/projects/k8s-staging-cluster-api-gcp/buckets/k8s-staging-cluster-api-gcp/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cluster-api-gcp/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cluster-api-gcp/description.json b/audit/projects/k8s-staging-cluster-api-gcp/description.json deleted file mode 100644 index 30ca8949218c..000000000000 --- a/audit/projects/k8s-staging-cluster-api-gcp/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2019-09-11T14:03:09.769Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-cluster-api-gcp", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-cluster-api-gcp", - "projectNumber": "606075400249" -} diff --git a/audit/projects/k8s-staging-cluster-api-gcp/iam.json b/audit/projects/k8s-staging-cluster-api-gcp/iam.json deleted file mode 100644 index 4eb3bfe64b69..000000000000 --- a/audit/projects/k8s-staging-cluster-api-gcp/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:606075400249@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-api-gcp@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-606075400249@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-606075400249@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-606075400249@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-606075400249@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-api-gcp@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cluster-api-gcp@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-cluster-api-gcp/services/enabled.txt b/audit/projects/k8s-staging-cluster-api-gcp/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-cluster-api-gcp/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-cluster-api/buckets/artifacts.k8s-staging-cluster-api.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-cluster-api/buckets/artifacts.k8s-staging-cluster-api.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index b7613a2a7ecc..000000000000 --- a/audit/projects/k8s-staging-cluster-api/buckets/artifacts.k8s-staging-cluster-api.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-cluster-api.appspot.com: - Enabled: True - LockedTime: 2019-07-25 21:53:49.020000+00:00 - diff --git a/audit/projects/k8s-staging-cluster-api/buckets/artifacts.k8s-staging-cluster-api.appspot.com/cors.txt b/audit/projects/k8s-staging-cluster-api/buckets/artifacts.k8s-staging-cluster-api.appspot.com/cors.txt deleted file mode 100644 index daaf17043bf9..000000000000 --- a/audit/projects/k8s-staging-cluster-api/buckets/artifacts.k8s-staging-cluster-api.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-cluster-api.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cluster-api/buckets/artifacts.k8s-staging-cluster-api.appspot.com/iam.json b/audit/projects/k8s-staging-cluster-api/buckets/artifacts.k8s-staging-cluster-api.appspot.com/iam.json deleted file mode 100644 index 2056062ab45e..000000000000 --- a/audit/projects/k8s-staging-cluster-api/buckets/artifacts.k8s-staging-cluster-api.appspot.com/iam.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cluster-api", - "projectOwner:k8s-staging-cluster-api" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-api@kubernetes.io", - "projectViewer:k8s-staging-cluster-api" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-api@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cluster-api@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cluster-api/buckets/artifacts.k8s-staging-cluster-api.appspot.com/logging.txt b/audit/projects/k8s-staging-cluster-api/buckets/artifacts.k8s-staging-cluster-api.appspot.com/logging.txt deleted file mode 100644 index c140072f4da4..000000000000 --- a/audit/projects/k8s-staging-cluster-api/buckets/artifacts.k8s-staging-cluster-api.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-cluster-api.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cluster-api/buckets/k8s-staging-cluster-api-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-cluster-api/buckets/k8s-staging-cluster-api-gcb/bucketpolicyonly.txt deleted file mode 100644 index ab9a30667316..000000000000 --- a/audit/projects/k8s-staging-cluster-api/buckets/k8s-staging-cluster-api-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-cluster-api-gcb: - Enabled: True - LockedTime: 2019-12-10 16:18:16.608000+00:00 - diff --git a/audit/projects/k8s-staging-cluster-api/buckets/k8s-staging-cluster-api-gcb/cors.txt b/audit/projects/k8s-staging-cluster-api/buckets/k8s-staging-cluster-api-gcb/cors.txt deleted file mode 100644 index 930d6695a3a2..000000000000 --- a/audit/projects/k8s-staging-cluster-api/buckets/k8s-staging-cluster-api-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cluster-api-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cluster-api/buckets/k8s-staging-cluster-api-gcb/iam.json b/audit/projects/k8s-staging-cluster-api/buckets/k8s-staging-cluster-api-gcb/iam.json deleted file mode 100644 index b3cbabf47363..000000000000 --- a/audit/projects/k8s-staging-cluster-api/buckets/k8s-staging-cluster-api-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cluster-api", - "projectOwner:k8s-staging-cluster-api" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-cluster-api" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-api@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cluster-api@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cluster-api/buckets/k8s-staging-cluster-api-gcb/logging.txt b/audit/projects/k8s-staging-cluster-api/buckets/k8s-staging-cluster-api-gcb/logging.txt deleted file mode 100644 index 1a1e35b4d80f..000000000000 --- a/audit/projects/k8s-staging-cluster-api/buckets/k8s-staging-cluster-api-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cluster-api-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cluster-api/buckets/k8s-staging-cluster-api/bucketpolicyonly.txt b/audit/projects/k8s-staging-cluster-api/buckets/k8s-staging-cluster-api/bucketpolicyonly.txt deleted file mode 100644 index 7e5abfe3aeb4..000000000000 --- a/audit/projects/k8s-staging-cluster-api/buckets/k8s-staging-cluster-api/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-cluster-api: - Enabled: True - LockedTime: 2019-10-06 19:34:45.423000+00:00 - diff --git a/audit/projects/k8s-staging-cluster-api/buckets/k8s-staging-cluster-api/cors.txt b/audit/projects/k8s-staging-cluster-api/buckets/k8s-staging-cluster-api/cors.txt deleted file mode 100644 index 36539760f01b..000000000000 --- a/audit/projects/k8s-staging-cluster-api/buckets/k8s-staging-cluster-api/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cluster-api/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cluster-api/buckets/k8s-staging-cluster-api/iam.json b/audit/projects/k8s-staging-cluster-api/buckets/k8s-staging-cluster-api/iam.json deleted file mode 100644 index 91c15648fff8..000000000000 --- a/audit/projects/k8s-staging-cluster-api/buckets/k8s-staging-cluster-api/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cluster-api", - "projectOwner:k8s-staging-cluster-api" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-cluster-api" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-api@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cluster-api@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cluster-api/buckets/k8s-staging-cluster-api/logging.txt b/audit/projects/k8s-staging-cluster-api/buckets/k8s-staging-cluster-api/logging.txt deleted file mode 100644 index d73a657347ad..000000000000 --- a/audit/projects/k8s-staging-cluster-api/buckets/k8s-staging-cluster-api/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cluster-api/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cluster-api/description.json b/audit/projects/k8s-staging-cluster-api/description.json deleted file mode 100644 index b530142f6a10..000000000000 --- a/audit/projects/k8s-staging-cluster-api/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2019-02-08T19:20:16.394Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-cluster-api", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-cluster-api", - "projectNumber": "190130481896" -} diff --git a/audit/projects/k8s-staging-cluster-api/iam.json b/audit/projects/k8s-staging-cluster-api/iam.json deleted file mode 100644 index c34cafcd4944..000000000000 --- a/audit/projects/k8s-staging-cluster-api/iam.json +++ /dev/null @@ -1,76 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:190130481896@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-api@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-190130481896@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-190130481896@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-190130481896@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-190130481896@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:190130481896-compute@developer.gserviceaccount.com", - "serviceAccount:190130481896@cloudservices.gserviceaccount.com", - "serviceAccount:service-190130481896@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-cluster-api@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cluster-api@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-cluster-api/service-accounts/190130481896-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-staging-cluster-api/service-accounts/190130481896-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 772109ee44d4..000000000000 --- a/audit/projects/k8s-staging-cluster-api/service-accounts/190130481896-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "190130481896-compute@developer.gserviceaccount.com", - "name": "projects/k8s-staging-cluster-api/serviceAccounts/190130481896-compute@developer.gserviceaccount.com", - "oauth2ClientId": "113774457030358190463", - "projectId": "k8s-staging-cluster-api", - "uniqueId": "113774457030358190463" -} diff --git a/audit/projects/k8s-staging-cluster-api/service-accounts/190130481896-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-staging-cluster-api/service-accounts/190130481896-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-staging-cluster-api/service-accounts/190130481896-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-staging-cluster-api/services/bigquery/bigquery.datasets.json b/audit/projects/k8s-staging-cluster-api/services/bigquery/bigquery.datasets.json deleted file mode 100644 index e69de29bb2d1..000000000000 diff --git a/audit/projects/k8s-staging-cluster-api/services/compute/project-info.json b/audit/projects/k8s-staging-cluster-api/services/compute/project-info.json deleted file mode 100644 index 56759d0d8ba8..000000000000 --- a/audit/projects/k8s-staging-cluster-api/services/compute/project-info.json +++ /dev/null @@ -1,171 +0,0 @@ -{ - "commonInstanceMetadata": { - "kind": "compute#metadata" - }, - "creationTimestamp": "2019-04-05T15:41:49.921-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "190130481896-compute@developer.gserviceaccount.com", - "id": "1516574978991613762", - "kind": "compute#project", - "name": "k8s-staging-cluster-api", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-staging-cluster-api", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-staging-cluster-api/services/enabled.txt b/audit/projects/k8s-staging-cluster-api/services/enabled.txt deleted file mode 100644 index 8feac853adf8..000000000000 --- a/audit/projects/k8s-staging-cluster-api/services/enabled.txt +++ /dev/null @@ -1,24 +0,0 @@ -NAME TITLE -bigquery.googleapis.com BigQuery API -bigquery.googleapis.com BigQuery API -bigquerystorage.googleapis.com BigQuery Storage API -cloudapis.googleapis.com Google Cloud APIs -cloudbuild.googleapis.com Cloud Build API -clouddebugger.googleapis.com Cloud Debugger API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -cloudtrace.googleapis.com Cloud Trace API -compute.googleapis.com Compute Engine API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -datastore.googleapis.com Cloud Datastore API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -servicemanagement.googleapis.com Service Management API -serviceusage.googleapis.com Service Usage API -sql-component.googleapis.com Cloud SQL -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-coredns/buckets/artifacts.k8s-staging-coredns.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-coredns/buckets/artifacts.k8s-staging-coredns.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index dda16288fcd8..000000000000 --- a/audit/projects/k8s-staging-coredns/buckets/artifacts.k8s-staging-coredns.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-coredns.appspot.com: - Enabled: True - LockedTime: 2019-07-25 21:54:01.153000+00:00 - diff --git a/audit/projects/k8s-staging-coredns/buckets/artifacts.k8s-staging-coredns.appspot.com/cors.txt b/audit/projects/k8s-staging-coredns/buckets/artifacts.k8s-staging-coredns.appspot.com/cors.txt deleted file mode 100644 index 020a2f83b830..000000000000 --- a/audit/projects/k8s-staging-coredns/buckets/artifacts.k8s-staging-coredns.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-coredns.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-coredns/buckets/artifacts.k8s-staging-coredns.appspot.com/iam.json b/audit/projects/k8s-staging-coredns/buckets/artifacts.k8s-staging-coredns.appspot.com/iam.json deleted file mode 100644 index 5917bee0c4de..000000000000 --- a/audit/projects/k8s-staging-coredns/buckets/artifacts.k8s-staging-coredns.appspot.com/iam.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-coredns", - "projectOwner:k8s-staging-coredns" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-coredns@kubernetes.io", - "projectViewer:k8s-staging-coredns" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-coredns@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-coredns@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-coredns/buckets/artifacts.k8s-staging-coredns.appspot.com/logging.txt b/audit/projects/k8s-staging-coredns/buckets/artifacts.k8s-staging-coredns.appspot.com/logging.txt deleted file mode 100644 index 9e90aaff3897..000000000000 --- a/audit/projects/k8s-staging-coredns/buckets/artifacts.k8s-staging-coredns.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-coredns.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-coredns/buckets/k8s-staging-coredns-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-coredns/buckets/k8s-staging-coredns-gcb/bucketpolicyonly.txt deleted file mode 100644 index 886b8bdea222..000000000000 --- a/audit/projects/k8s-staging-coredns/buckets/k8s-staging-coredns-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-coredns-gcb: - Enabled: True - LockedTime: 2019-12-10 16:24:11.111000+00:00 - diff --git a/audit/projects/k8s-staging-coredns/buckets/k8s-staging-coredns-gcb/cors.txt b/audit/projects/k8s-staging-coredns/buckets/k8s-staging-coredns-gcb/cors.txt deleted file mode 100644 index de67c4a77abf..000000000000 --- a/audit/projects/k8s-staging-coredns/buckets/k8s-staging-coredns-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-coredns-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-coredns/buckets/k8s-staging-coredns-gcb/iam.json b/audit/projects/k8s-staging-coredns/buckets/k8s-staging-coredns-gcb/iam.json deleted file mode 100644 index 0662304e0f50..000000000000 --- a/audit/projects/k8s-staging-coredns/buckets/k8s-staging-coredns-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-coredns", - "projectOwner:k8s-staging-coredns" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-coredns" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-coredns@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-coredns@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-coredns/buckets/k8s-staging-coredns-gcb/logging.txt b/audit/projects/k8s-staging-coredns/buckets/k8s-staging-coredns-gcb/logging.txt deleted file mode 100644 index 6d6b72843911..000000000000 --- a/audit/projects/k8s-staging-coredns/buckets/k8s-staging-coredns-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-coredns-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-coredns/buckets/k8s-staging-coredns/bucketpolicyonly.txt b/audit/projects/k8s-staging-coredns/buckets/k8s-staging-coredns/bucketpolicyonly.txt deleted file mode 100644 index abbddceca65e..000000000000 --- a/audit/projects/k8s-staging-coredns/buckets/k8s-staging-coredns/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-coredns: - Enabled: True - LockedTime: 2019-10-06 19:33:51.820000+00:00 - diff --git a/audit/projects/k8s-staging-coredns/buckets/k8s-staging-coredns/cors.txt b/audit/projects/k8s-staging-coredns/buckets/k8s-staging-coredns/cors.txt deleted file mode 100644 index b49c53ef92d4..000000000000 --- a/audit/projects/k8s-staging-coredns/buckets/k8s-staging-coredns/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-coredns/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-coredns/buckets/k8s-staging-coredns/iam.json b/audit/projects/k8s-staging-coredns/buckets/k8s-staging-coredns/iam.json deleted file mode 100644 index e378aac3366c..000000000000 --- a/audit/projects/k8s-staging-coredns/buckets/k8s-staging-coredns/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-coredns", - "projectOwner:k8s-staging-coredns" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-coredns" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-coredns@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-coredns@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-coredns/buckets/k8s-staging-coredns/logging.txt b/audit/projects/k8s-staging-coredns/buckets/k8s-staging-coredns/logging.txt deleted file mode 100644 index 809c9b301eb4..000000000000 --- a/audit/projects/k8s-staging-coredns/buckets/k8s-staging-coredns/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-coredns/ has no logging configuration. diff --git a/audit/projects/k8s-staging-coredns/description.json b/audit/projects/k8s-staging-coredns/description.json deleted file mode 100644 index 01895ab7172c..000000000000 --- a/audit/projects/k8s-staging-coredns/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2019-02-08T17:59:21.729Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-coredns", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-coredns", - "projectNumber": "848617618266" -} diff --git a/audit/projects/k8s-staging-coredns/iam.json b/audit/projects/k8s-staging-coredns/iam.json deleted file mode 100644 index 3edd75be7679..000000000000 --- a/audit/projects/k8s-staging-coredns/iam.json +++ /dev/null @@ -1,76 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:848617618266@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-coredns@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-848617618266@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-848617618266@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-848617618266@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-848617618266@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:848617618266-compute@developer.gserviceaccount.com", - "serviceAccount:848617618266@cloudservices.gserviceaccount.com", - "serviceAccount:service-848617618266@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-coredns@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-coredns@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-coredns/service-accounts/848617618266-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-staging-coredns/service-accounts/848617618266-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index e7530b7524da..000000000000 --- a/audit/projects/k8s-staging-coredns/service-accounts/848617618266-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "848617618266-compute@developer.gserviceaccount.com", - "name": "projects/k8s-staging-coredns/serviceAccounts/848617618266-compute@developer.gserviceaccount.com", - "oauth2ClientId": "110396744106037191461", - "projectId": "k8s-staging-coredns", - "uniqueId": "110396744106037191461" -} diff --git a/audit/projects/k8s-staging-coredns/service-accounts/848617618266-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-staging-coredns/service-accounts/848617618266-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-staging-coredns/service-accounts/848617618266-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-staging-coredns/services/bigquery/bigquery.datasets.json b/audit/projects/k8s-staging-coredns/services/bigquery/bigquery.datasets.json deleted file mode 100644 index e69de29bb2d1..000000000000 diff --git a/audit/projects/k8s-staging-coredns/services/compute/project-info.json b/audit/projects/k8s-staging-coredns/services/compute/project-info.json deleted file mode 100644 index acc9ffda6e6e..000000000000 --- a/audit/projects/k8s-staging-coredns/services/compute/project-info.json +++ /dev/null @@ -1,171 +0,0 @@ -{ - "commonInstanceMetadata": { - "kind": "compute#metadata" - }, - "creationTimestamp": "2019-02-11T15:03:46.669-08:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "848617618266-compute@developer.gserviceaccount.com", - "id": "7398414115419210173", - "kind": "compute#project", - "name": "k8s-staging-coredns", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-staging-coredns", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-staging-coredns/services/enabled.txt b/audit/projects/k8s-staging-coredns/services/enabled.txt deleted file mode 100644 index 8feac853adf8..000000000000 --- a/audit/projects/k8s-staging-coredns/services/enabled.txt +++ /dev/null @@ -1,24 +0,0 @@ -NAME TITLE -bigquery.googleapis.com BigQuery API -bigquery.googleapis.com BigQuery API -bigquerystorage.googleapis.com BigQuery Storage API -cloudapis.googleapis.com Google Cloud APIs -cloudbuild.googleapis.com Cloud Build API -clouddebugger.googleapis.com Cloud Debugger API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -cloudtrace.googleapis.com Cloud Trace API -compute.googleapis.com Compute Engine API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -datastore.googleapis.com Cloud Datastore API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -servicemanagement.googleapis.com Service Management API -serviceusage.googleapis.com Service Usage API -sql-component.googleapis.com Cloud SQL -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-cpa/buckets/artifacts.k8s-staging-cpa.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-cpa/buckets/artifacts.k8s-staging-cpa.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 85ed5ffe7985..000000000000 --- a/audit/projects/k8s-staging-cpa/buckets/artifacts.k8s-staging-cpa.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-cpa.appspot.com: - Enabled: True - LockedTime: 2020-07-06 22:49:03.917000+00:00 - diff --git a/audit/projects/k8s-staging-cpa/buckets/artifacts.k8s-staging-cpa.appspot.com/cors.txt b/audit/projects/k8s-staging-cpa/buckets/artifacts.k8s-staging-cpa.appspot.com/cors.txt deleted file mode 100644 index c85b255e310a..000000000000 --- a/audit/projects/k8s-staging-cpa/buckets/artifacts.k8s-staging-cpa.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-cpa.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cpa/buckets/artifacts.k8s-staging-cpa.appspot.com/iam.json b/audit/projects/k8s-staging-cpa/buckets/artifacts.k8s-staging-cpa.appspot.com/iam.json deleted file mode 100644 index 941abcc0aedd..000000000000 --- a/audit/projects/k8s-staging-cpa/buckets/artifacts.k8s-staging-cpa.appspot.com/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cpa", - "projectOwner:k8s-staging-cpa" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-cpa" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cpa@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cpa@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cpa/buckets/artifacts.k8s-staging-cpa.appspot.com/logging.txt b/audit/projects/k8s-staging-cpa/buckets/artifacts.k8s-staging-cpa.appspot.com/logging.txt deleted file mode 100644 index 97cab100cd04..000000000000 --- a/audit/projects/k8s-staging-cpa/buckets/artifacts.k8s-staging-cpa.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-cpa.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cpa/buckets/k8s-staging-cpa-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-cpa/buckets/k8s-staging-cpa-gcb/bucketpolicyonly.txt deleted file mode 100644 index bbfd86dd11a1..000000000000 --- a/audit/projects/k8s-staging-cpa/buckets/k8s-staging-cpa-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-cpa-gcb: - Enabled: True - LockedTime: 2020-07-06 22:49:50.325000+00:00 - diff --git a/audit/projects/k8s-staging-cpa/buckets/k8s-staging-cpa-gcb/cors.txt b/audit/projects/k8s-staging-cpa/buckets/k8s-staging-cpa-gcb/cors.txt deleted file mode 100644 index b75875d9eede..000000000000 --- a/audit/projects/k8s-staging-cpa/buckets/k8s-staging-cpa-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cpa-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cpa/buckets/k8s-staging-cpa-gcb/iam.json b/audit/projects/k8s-staging-cpa/buckets/k8s-staging-cpa-gcb/iam.json deleted file mode 100644 index 9625155743fb..000000000000 --- a/audit/projects/k8s-staging-cpa/buckets/k8s-staging-cpa-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cpa", - "projectOwner:k8s-staging-cpa" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-cpa" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cpa@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cpa@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cpa/buckets/k8s-staging-cpa-gcb/logging.txt b/audit/projects/k8s-staging-cpa/buckets/k8s-staging-cpa-gcb/logging.txt deleted file mode 100644 index bb5852762ec9..000000000000 --- a/audit/projects/k8s-staging-cpa/buckets/k8s-staging-cpa-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cpa-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cpa/buckets/k8s-staging-cpa/bucketpolicyonly.txt b/audit/projects/k8s-staging-cpa/buckets/k8s-staging-cpa/bucketpolicyonly.txt deleted file mode 100644 index 17fa136cf63a..000000000000 --- a/audit/projects/k8s-staging-cpa/buckets/k8s-staging-cpa/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-cpa: - Enabled: True - LockedTime: 2020-07-06 22:49:28.724000+00:00 - diff --git a/audit/projects/k8s-staging-cpa/buckets/k8s-staging-cpa/cors.txt b/audit/projects/k8s-staging-cpa/buckets/k8s-staging-cpa/cors.txt deleted file mode 100644 index bbc11d3e3c62..000000000000 --- a/audit/projects/k8s-staging-cpa/buckets/k8s-staging-cpa/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cpa/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cpa/buckets/k8s-staging-cpa/iam.json b/audit/projects/k8s-staging-cpa/buckets/k8s-staging-cpa/iam.json deleted file mode 100644 index 941abcc0aedd..000000000000 --- a/audit/projects/k8s-staging-cpa/buckets/k8s-staging-cpa/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cpa", - "projectOwner:k8s-staging-cpa" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-cpa" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cpa@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cpa@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cpa/buckets/k8s-staging-cpa/logging.txt b/audit/projects/k8s-staging-cpa/buckets/k8s-staging-cpa/logging.txt deleted file mode 100644 index b058f36b5f9e..000000000000 --- a/audit/projects/k8s-staging-cpa/buckets/k8s-staging-cpa/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cpa/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cpa/description.json b/audit/projects/k8s-staging-cpa/description.json deleted file mode 100644 index 0eab5f70a7dc..000000000000 --- a/audit/projects/k8s-staging-cpa/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-04-07T22:48:05.991Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-cpa", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-cpa", - "projectNumber": "644315828680" -} diff --git a/audit/projects/k8s-staging-cpa/iam.json b/audit/projects/k8s-staging-cpa/iam.json deleted file mode 100644 index 2a2e8cc55484..000000000000 --- a/audit/projects/k8s-staging-cpa/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:644315828680@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-cpa@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-644315828680@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-644315828680@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-644315828680@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-644315828680@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-cpa@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cpa@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-cpa/services/enabled.txt b/audit/projects/k8s-staging-cpa/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-cpa/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-cri-tools/buckets/artifacts.k8s-staging-cri-tools.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-cri-tools/buckets/artifacts.k8s-staging-cri-tools.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index d48b23954c0a..000000000000 --- a/audit/projects/k8s-staging-cri-tools/buckets/artifacts.k8s-staging-cri-tools.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-cri-tools.appspot.com: - Enabled: True - LockedTime: 2021-02-17 19:28:32.040000+00:00 - diff --git a/audit/projects/k8s-staging-cri-tools/buckets/artifacts.k8s-staging-cri-tools.appspot.com/cors.txt b/audit/projects/k8s-staging-cri-tools/buckets/artifacts.k8s-staging-cri-tools.appspot.com/cors.txt deleted file mode 100644 index 56f75e13040f..000000000000 --- a/audit/projects/k8s-staging-cri-tools/buckets/artifacts.k8s-staging-cri-tools.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-cri-tools.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cri-tools/buckets/artifacts.k8s-staging-cri-tools.appspot.com/iam.json b/audit/projects/k8s-staging-cri-tools/buckets/artifacts.k8s-staging-cri-tools.appspot.com/iam.json deleted file mode 100644 index 8800ec2218c8..000000000000 --- a/audit/projects/k8s-staging-cri-tools/buckets/artifacts.k8s-staging-cri-tools.appspot.com/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cri-tools", - "projectOwner:k8s-staging-cri-tools" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-cri-tools" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cri-tools@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cri-tools@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cri-tools/buckets/artifacts.k8s-staging-cri-tools.appspot.com/logging.txt b/audit/projects/k8s-staging-cri-tools/buckets/artifacts.k8s-staging-cri-tools.appspot.com/logging.txt deleted file mode 100644 index 79cee9e7d195..000000000000 --- a/audit/projects/k8s-staging-cri-tools/buckets/artifacts.k8s-staging-cri-tools.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-cri-tools.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools-gcb/bucketpolicyonly.txt deleted file mode 100644 index 1f0ae3234f45..000000000000 --- a/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-cri-tools-gcb: - Enabled: True - LockedTime: 2021-02-17 19:29:07.746000+00:00 - diff --git a/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools-gcb/cors.txt b/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools-gcb/cors.txt deleted file mode 100644 index aa024c9ac20b..000000000000 --- a/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cri-tools-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools-gcb/iam.json b/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools-gcb/iam.json deleted file mode 100644 index 1811189d38ca..000000000000 --- a/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cri-tools", - "projectOwner:k8s-staging-cri-tools" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-cri-tools" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cri-tools@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cri-tools@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools-gcb/logging.txt b/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools-gcb/logging.txt deleted file mode 100644 index 3c8d62b5a92d..000000000000 --- a/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cri-tools-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools/bucketpolicyonly.txt b/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools/bucketpolicyonly.txt deleted file mode 100644 index ecaa39829af8..000000000000 --- a/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-cri-tools: - Enabled: True - LockedTime: 2021-02-17 19:28:50.453000+00:00 - diff --git a/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools/cors.txt b/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools/cors.txt deleted file mode 100644 index 675e460d96c1..000000000000 --- a/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cri-tools/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools/iam.json b/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools/iam.json deleted file mode 100644 index 8800ec2218c8..000000000000 --- a/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-cri-tools", - "projectOwner:k8s-staging-cri-tools" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-cri-tools" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-cri-tools@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cri-tools@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools/logging.txt b/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools/logging.txt deleted file mode 100644 index f34ee0058a68..000000000000 --- a/audit/projects/k8s-staging-cri-tools/buckets/k8s-staging-cri-tools/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-cri-tools/ has no logging configuration. diff --git a/audit/projects/k8s-staging-cri-tools/description.json b/audit/projects/k8s-staging-cri-tools/description.json deleted file mode 100644 index abb6113a469f..000000000000 --- a/audit/projects/k8s-staging-cri-tools/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-05-28T17:53:15.737Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-cri-tools", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-cri-tools", - "projectNumber": "565574877728" -} diff --git a/audit/projects/k8s-staging-cri-tools/iam.json b/audit/projects/k8s-staging-cri-tools/iam.json deleted file mode 100644 index 221bc30ae023..000000000000 --- a/audit/projects/k8s-staging-cri-tools/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:565574877728@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-cri-tools@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-565574877728@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-565574877728@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-565574877728@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-565574877728@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-cri-tools@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-cri-tools@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-cri-tools/services/enabled.txt b/audit/projects/k8s-staging-cri-tools/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-cri-tools/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-csi-secrets-store/buckets/artifacts.k8s-staging-csi-secrets-store.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-csi-secrets-store/buckets/artifacts.k8s-staging-csi-secrets-store.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 24198706effd..000000000000 --- a/audit/projects/k8s-staging-csi-secrets-store/buckets/artifacts.k8s-staging-csi-secrets-store.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-csi-secrets-store.appspot.com: - Enabled: True - LockedTime: 2020-06-30 23:26:54.527000+00:00 - diff --git a/audit/projects/k8s-staging-csi-secrets-store/buckets/artifacts.k8s-staging-csi-secrets-store.appspot.com/cors.txt b/audit/projects/k8s-staging-csi-secrets-store/buckets/artifacts.k8s-staging-csi-secrets-store.appspot.com/cors.txt deleted file mode 100644 index 045a6225514d..000000000000 --- a/audit/projects/k8s-staging-csi-secrets-store/buckets/artifacts.k8s-staging-csi-secrets-store.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-csi-secrets-store.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-csi-secrets-store/buckets/artifacts.k8s-staging-csi-secrets-store.appspot.com/iam.json b/audit/projects/k8s-staging-csi-secrets-store/buckets/artifacts.k8s-staging-csi-secrets-store.appspot.com/iam.json deleted file mode 100644 index d37b624ddc16..000000000000 --- a/audit/projects/k8s-staging-csi-secrets-store/buckets/artifacts.k8s-staging-csi-secrets-store.appspot.com/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-csi-secrets-store", - "projectOwner:k8s-staging-csi-secrets-store" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-csi-secrets-store" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-csi-secrets-store@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-csi-secrets-store@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-csi-secrets-store/buckets/artifacts.k8s-staging-csi-secrets-store.appspot.com/logging.txt b/audit/projects/k8s-staging-csi-secrets-store/buckets/artifacts.k8s-staging-csi-secrets-store.appspot.com/logging.txt deleted file mode 100644 index 8e171a09327b..000000000000 --- a/audit/projects/k8s-staging-csi-secrets-store/buckets/artifacts.k8s-staging-csi-secrets-store.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-csi-secrets-store.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-csi-secrets-store/buckets/k8s-staging-csi-secrets-store-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-csi-secrets-store/buckets/k8s-staging-csi-secrets-store-gcb/bucketpolicyonly.txt deleted file mode 100644 index 930908788bd1..000000000000 --- a/audit/projects/k8s-staging-csi-secrets-store/buckets/k8s-staging-csi-secrets-store-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-csi-secrets-store-gcb: - Enabled: True - LockedTime: 2020-06-30 23:27:33.128000+00:00 - diff --git a/audit/projects/k8s-staging-csi-secrets-store/buckets/k8s-staging-csi-secrets-store-gcb/cors.txt b/audit/projects/k8s-staging-csi-secrets-store/buckets/k8s-staging-csi-secrets-store-gcb/cors.txt deleted file mode 100644 index 16c94f8bdb86..000000000000 --- a/audit/projects/k8s-staging-csi-secrets-store/buckets/k8s-staging-csi-secrets-store-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-csi-secrets-store-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-csi-secrets-store/buckets/k8s-staging-csi-secrets-store-gcb/iam.json b/audit/projects/k8s-staging-csi-secrets-store/buckets/k8s-staging-csi-secrets-store-gcb/iam.json deleted file mode 100644 index 7a843b07dffe..000000000000 --- a/audit/projects/k8s-staging-csi-secrets-store/buckets/k8s-staging-csi-secrets-store-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-csi-secrets-store", - "projectOwner:k8s-staging-csi-secrets-store" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-csi-secrets-store" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-csi-secrets-store@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-csi-secrets-store@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-csi-secrets-store/buckets/k8s-staging-csi-secrets-store-gcb/logging.txt b/audit/projects/k8s-staging-csi-secrets-store/buckets/k8s-staging-csi-secrets-store-gcb/logging.txt deleted file mode 100644 index 5df18709a509..000000000000 --- a/audit/projects/k8s-staging-csi-secrets-store/buckets/k8s-staging-csi-secrets-store-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-csi-secrets-store-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-csi-secrets-store/buckets/k8s-staging-csi-secrets-store/bucketpolicyonly.txt b/audit/projects/k8s-staging-csi-secrets-store/buckets/k8s-staging-csi-secrets-store/bucketpolicyonly.txt deleted file mode 100644 index f773fee985c7..000000000000 --- a/audit/projects/k8s-staging-csi-secrets-store/buckets/k8s-staging-csi-secrets-store/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-csi-secrets-store: - Enabled: True - LockedTime: 2020-06-30 23:27:17.520000+00:00 - diff --git a/audit/projects/k8s-staging-csi-secrets-store/buckets/k8s-staging-csi-secrets-store/cors.txt b/audit/projects/k8s-staging-csi-secrets-store/buckets/k8s-staging-csi-secrets-store/cors.txt deleted file mode 100644 index 096dbe3234af..000000000000 --- a/audit/projects/k8s-staging-csi-secrets-store/buckets/k8s-staging-csi-secrets-store/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-csi-secrets-store/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-csi-secrets-store/buckets/k8s-staging-csi-secrets-store/iam.json b/audit/projects/k8s-staging-csi-secrets-store/buckets/k8s-staging-csi-secrets-store/iam.json deleted file mode 100644 index d37b624ddc16..000000000000 --- a/audit/projects/k8s-staging-csi-secrets-store/buckets/k8s-staging-csi-secrets-store/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-csi-secrets-store", - "projectOwner:k8s-staging-csi-secrets-store" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-csi-secrets-store" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-csi-secrets-store@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-csi-secrets-store@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-csi-secrets-store/buckets/k8s-staging-csi-secrets-store/logging.txt b/audit/projects/k8s-staging-csi-secrets-store/buckets/k8s-staging-csi-secrets-store/logging.txt deleted file mode 100644 index 744e96188842..000000000000 --- a/audit/projects/k8s-staging-csi-secrets-store/buckets/k8s-staging-csi-secrets-store/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-csi-secrets-store/ has no logging configuration. diff --git a/audit/projects/k8s-staging-csi-secrets-store/description.json b/audit/projects/k8s-staging-csi-secrets-store/description.json deleted file mode 100644 index 8228ef5d639e..000000000000 --- a/audit/projects/k8s-staging-csi-secrets-store/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-04-01T23:26:08.339Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-csi-secrets-store", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-csi-secrets-store", - "projectNumber": "766197520365" -} diff --git a/audit/projects/k8s-staging-csi-secrets-store/iam.json b/audit/projects/k8s-staging-csi-secrets-store/iam.json deleted file mode 100644 index 2c946ed21cc6..000000000000 --- a/audit/projects/k8s-staging-csi-secrets-store/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:766197520365@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-csi-secrets-store@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-766197520365@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-766197520365@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-766197520365@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-766197520365@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-csi-secrets-store@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-csi-secrets-store@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-csi-secrets-store/services/enabled.txt b/audit/projects/k8s-staging-csi-secrets-store/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-csi-secrets-store/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-csi/buckets/artifacts.k8s-staging-csi.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-csi/buckets/artifacts.k8s-staging-csi.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 3a12151a8064..000000000000 --- a/audit/projects/k8s-staging-csi/buckets/artifacts.k8s-staging-csi.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-csi.appspot.com: - Enabled: True - LockedTime: 2019-07-25 21:53:35.062000+00:00 - diff --git a/audit/projects/k8s-staging-csi/buckets/artifacts.k8s-staging-csi.appspot.com/cors.txt b/audit/projects/k8s-staging-csi/buckets/artifacts.k8s-staging-csi.appspot.com/cors.txt deleted file mode 100644 index 95bda7ac753e..000000000000 --- a/audit/projects/k8s-staging-csi/buckets/artifacts.k8s-staging-csi.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-csi.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-csi/buckets/artifacts.k8s-staging-csi.appspot.com/iam.json b/audit/projects/k8s-staging-csi/buckets/artifacts.k8s-staging-csi.appspot.com/iam.json deleted file mode 100644 index 59ed0d7e7c9f..000000000000 --- a/audit/projects/k8s-staging-csi/buckets/artifacts.k8s-staging-csi.appspot.com/iam.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-csi", - "projectOwner:k8s-staging-csi" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-csi@kubernetes.io", - "projectViewer:k8s-staging-csi" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-csi@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-csi@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-csi/buckets/artifacts.k8s-staging-csi.appspot.com/logging.txt b/audit/projects/k8s-staging-csi/buckets/artifacts.k8s-staging-csi.appspot.com/logging.txt deleted file mode 100644 index b015bc937980..000000000000 --- a/audit/projects/k8s-staging-csi/buckets/artifacts.k8s-staging-csi.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-csi.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-csi/buckets/k8s-staging-csi-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-csi/buckets/k8s-staging-csi-gcb/bucketpolicyonly.txt deleted file mode 100644 index 7a36284c4280..000000000000 --- a/audit/projects/k8s-staging-csi/buckets/k8s-staging-csi-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-csi-gcb: - Enabled: True - LockedTime: 2019-12-10 16:25:14.309000+00:00 - diff --git a/audit/projects/k8s-staging-csi/buckets/k8s-staging-csi-gcb/cors.txt b/audit/projects/k8s-staging-csi/buckets/k8s-staging-csi-gcb/cors.txt deleted file mode 100644 index 6ea4d7bfe2b9..000000000000 --- a/audit/projects/k8s-staging-csi/buckets/k8s-staging-csi-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-csi-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-csi/buckets/k8s-staging-csi-gcb/iam.json b/audit/projects/k8s-staging-csi/buckets/k8s-staging-csi-gcb/iam.json deleted file mode 100644 index 4b0ed0b043ad..000000000000 --- a/audit/projects/k8s-staging-csi/buckets/k8s-staging-csi-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-csi", - "projectOwner:k8s-staging-csi" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-csi" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-csi@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-csi@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-csi/buckets/k8s-staging-csi-gcb/logging.txt b/audit/projects/k8s-staging-csi/buckets/k8s-staging-csi-gcb/logging.txt deleted file mode 100644 index e4d57732bbf0..000000000000 --- a/audit/projects/k8s-staging-csi/buckets/k8s-staging-csi-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-csi-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-csi/buckets/k8s-staging-csi/bucketpolicyonly.txt b/audit/projects/k8s-staging-csi/buckets/k8s-staging-csi/bucketpolicyonly.txt deleted file mode 100644 index 730662d96b57..000000000000 --- a/audit/projects/k8s-staging-csi/buckets/k8s-staging-csi/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-csi: - Enabled: True - LockedTime: 2019-10-06 19:40:32.918000+00:00 - diff --git a/audit/projects/k8s-staging-csi/buckets/k8s-staging-csi/cors.txt b/audit/projects/k8s-staging-csi/buckets/k8s-staging-csi/cors.txt deleted file mode 100644 index a65a318a5800..000000000000 --- a/audit/projects/k8s-staging-csi/buckets/k8s-staging-csi/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-csi/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-csi/buckets/k8s-staging-csi/iam.json b/audit/projects/k8s-staging-csi/buckets/k8s-staging-csi/iam.json deleted file mode 100644 index 824c144a0ffd..000000000000 --- a/audit/projects/k8s-staging-csi/buckets/k8s-staging-csi/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-csi", - "projectOwner:k8s-staging-csi" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-csi" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-csi@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-csi@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-csi/buckets/k8s-staging-csi/logging.txt b/audit/projects/k8s-staging-csi/buckets/k8s-staging-csi/logging.txt deleted file mode 100644 index c431941854da..000000000000 --- a/audit/projects/k8s-staging-csi/buckets/k8s-staging-csi/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-csi/ has no logging configuration. diff --git a/audit/projects/k8s-staging-csi/description.json b/audit/projects/k8s-staging-csi/description.json deleted file mode 100644 index 5710823eb155..000000000000 --- a/audit/projects/k8s-staging-csi/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2019-02-08T22:59:30.578Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-csi", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-csi", - "projectNumber": "874328413592" -} diff --git a/audit/projects/k8s-staging-csi/iam.json b/audit/projects/k8s-staging-csi/iam.json deleted file mode 100644 index 29a76a61c637..000000000000 --- a/audit/projects/k8s-staging-csi/iam.json +++ /dev/null @@ -1,82 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:874328413592@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-csi@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-874328413592@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-874328413592@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-874328413592@container-engine-robot.iam.gserviceaccount.com" - ], - "role": "roles/container.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-874328413592@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-874328413592@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:874328413592-compute@developer.gserviceaccount.com", - "serviceAccount:874328413592@cloudservices.gserviceaccount.com", - "serviceAccount:service-874328413592@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-csi@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-csi@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-csi/service-accounts/874328413592-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-staging-csi/service-accounts/874328413592-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index f325c5ebc3ac..000000000000 --- a/audit/projects/k8s-staging-csi/service-accounts/874328413592-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "874328413592-compute@developer.gserviceaccount.com", - "name": "projects/k8s-staging-csi/serviceAccounts/874328413592-compute@developer.gserviceaccount.com", - "oauth2ClientId": "116156031177379020104", - "projectId": "k8s-staging-csi", - "uniqueId": "116156031177379020104" -} diff --git a/audit/projects/k8s-staging-csi/service-accounts/874328413592-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-staging-csi/service-accounts/874328413592-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-staging-csi/service-accounts/874328413592-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-staging-csi/services/bigquery/bigquery.datasets.json b/audit/projects/k8s-staging-csi/services/bigquery/bigquery.datasets.json deleted file mode 100644 index e69de29bb2d1..000000000000 diff --git a/audit/projects/k8s-staging-csi/services/compute/project-info.json b/audit/projects/k8s-staging-csi/services/compute/project-info.json deleted file mode 100644 index e9807ac182b9..000000000000 --- a/audit/projects/k8s-staging-csi/services/compute/project-info.json +++ /dev/null @@ -1,171 +0,0 @@ -{ - "commonInstanceMetadata": { - "kind": "compute#metadata" - }, - "creationTimestamp": "2019-04-05T15:41:40.479-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "874328413592-compute@developer.gserviceaccount.com", - "id": "202554181734262603", - "kind": "compute#project", - "name": "k8s-staging-csi", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-staging-csi", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-staging-csi/services/enabled.txt b/audit/projects/k8s-staging-csi/services/enabled.txt deleted file mode 100644 index 7733926c054b..000000000000 --- a/audit/projects/k8s-staging-csi/services/enabled.txt +++ /dev/null @@ -1,26 +0,0 @@ -NAME TITLE -bigquery.googleapis.com BigQuery API -bigquery.googleapis.com BigQuery API -bigquerystorage.googleapis.com BigQuery Storage API -cloudapis.googleapis.com Google Cloud APIs -cloudbuild.googleapis.com Cloud Build API -clouddebugger.googleapis.com Cloud Debugger API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -cloudtrace.googleapis.com Cloud Trace API -compute.googleapis.com Compute Engine API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -datastore.googleapis.com Cloud Datastore API -iam.googleapis.com Identity and Access Management (IAM) API -iamcredentials.googleapis.com IAM Service Account Credentials API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -servicemanagement.googleapis.com Service Management API -serviceusage.googleapis.com Service Usage API -sql-component.googleapis.com Cloud SQL -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-descheduler/buckets/artifacts.k8s-staging-descheduler.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-descheduler/buckets/artifacts.k8s-staging-descheduler.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index e22aea1e5c33..000000000000 --- a/audit/projects/k8s-staging-descheduler/buckets/artifacts.k8s-staging-descheduler.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-descheduler.appspot.com: - Enabled: True - LockedTime: 2019-10-15 20:47:12.868000+00:00 - diff --git a/audit/projects/k8s-staging-descheduler/buckets/artifacts.k8s-staging-descheduler.appspot.com/cors.txt b/audit/projects/k8s-staging-descheduler/buckets/artifacts.k8s-staging-descheduler.appspot.com/cors.txt deleted file mode 100644 index 08c59bfa2669..000000000000 --- a/audit/projects/k8s-staging-descheduler/buckets/artifacts.k8s-staging-descheduler.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-descheduler.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-descheduler/buckets/artifacts.k8s-staging-descheduler.appspot.com/iam.json b/audit/projects/k8s-staging-descheduler/buckets/artifacts.k8s-staging-descheduler.appspot.com/iam.json deleted file mode 100644 index 0e37a0a2dc79..000000000000 --- a/audit/projects/k8s-staging-descheduler/buckets/artifacts.k8s-staging-descheduler.appspot.com/iam.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-descheduler", - "projectOwner:k8s-staging-descheduler" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-descheduler@kubernetes.io", - "projectViewer:k8s-staging-descheduler" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-descheduler@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-descheduler@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-descheduler/buckets/artifacts.k8s-staging-descheduler.appspot.com/logging.txt b/audit/projects/k8s-staging-descheduler/buckets/artifacts.k8s-staging-descheduler.appspot.com/logging.txt deleted file mode 100644 index 9075893be8c2..000000000000 --- a/audit/projects/k8s-staging-descheduler/buckets/artifacts.k8s-staging-descheduler.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-descheduler.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-descheduler/buckets/k8s-staging-descheduler-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-descheduler/buckets/k8s-staging-descheduler-gcb/bucketpolicyonly.txt deleted file mode 100644 index d1e2934210bd..000000000000 --- a/audit/projects/k8s-staging-descheduler/buckets/k8s-staging-descheduler-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-descheduler-gcb: - Enabled: True - LockedTime: 2019-12-10 16:26:16.009000+00:00 - diff --git a/audit/projects/k8s-staging-descheduler/buckets/k8s-staging-descheduler-gcb/cors.txt b/audit/projects/k8s-staging-descheduler/buckets/k8s-staging-descheduler-gcb/cors.txt deleted file mode 100644 index 9a38bd3e6afe..000000000000 --- a/audit/projects/k8s-staging-descheduler/buckets/k8s-staging-descheduler-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-descheduler-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-descheduler/buckets/k8s-staging-descheduler-gcb/iam.json b/audit/projects/k8s-staging-descheduler/buckets/k8s-staging-descheduler-gcb/iam.json deleted file mode 100644 index c8cbb60d408c..000000000000 --- a/audit/projects/k8s-staging-descheduler/buckets/k8s-staging-descheduler-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-descheduler", - "projectOwner:k8s-staging-descheduler" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-descheduler" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-descheduler@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-descheduler@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-descheduler/buckets/k8s-staging-descheduler-gcb/logging.txt b/audit/projects/k8s-staging-descheduler/buckets/k8s-staging-descheduler-gcb/logging.txt deleted file mode 100644 index 4ec83fd1dfa6..000000000000 --- a/audit/projects/k8s-staging-descheduler/buckets/k8s-staging-descheduler-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-descheduler-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-descheduler/buckets/k8s-staging-descheduler/bucketpolicyonly.txt b/audit/projects/k8s-staging-descheduler/buckets/k8s-staging-descheduler/bucketpolicyonly.txt deleted file mode 100644 index 9d535227459f..000000000000 --- a/audit/projects/k8s-staging-descheduler/buckets/k8s-staging-descheduler/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-descheduler: - Enabled: True - LockedTime: 2019-10-15 20:47:37.474000+00:00 - diff --git a/audit/projects/k8s-staging-descheduler/buckets/k8s-staging-descheduler/cors.txt b/audit/projects/k8s-staging-descheduler/buckets/k8s-staging-descheduler/cors.txt deleted file mode 100644 index b345669f802f..000000000000 --- a/audit/projects/k8s-staging-descheduler/buckets/k8s-staging-descheduler/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-descheduler/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-descheduler/buckets/k8s-staging-descheduler/iam.json b/audit/projects/k8s-staging-descheduler/buckets/k8s-staging-descheduler/iam.json deleted file mode 100644 index 7413926d7bd7..000000000000 --- a/audit/projects/k8s-staging-descheduler/buckets/k8s-staging-descheduler/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-descheduler", - "projectOwner:k8s-staging-descheduler" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-descheduler" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-descheduler@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-descheduler@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-descheduler/buckets/k8s-staging-descheduler/logging.txt b/audit/projects/k8s-staging-descheduler/buckets/k8s-staging-descheduler/logging.txt deleted file mode 100644 index 306169275f77..000000000000 --- a/audit/projects/k8s-staging-descheduler/buckets/k8s-staging-descheduler/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-descheduler/ has no logging configuration. diff --git a/audit/projects/k8s-staging-descheduler/description.json b/audit/projects/k8s-staging-descheduler/description.json deleted file mode 100644 index d5dfd663b4d6..000000000000 --- a/audit/projects/k8s-staging-descheduler/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2019-07-17T20:46:23.420Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-descheduler", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-descheduler", - "projectNumber": "1009880777024" -} diff --git a/audit/projects/k8s-staging-descheduler/iam.json b/audit/projects/k8s-staging-descheduler/iam.json deleted file mode 100644 index 9860c6e479b1..000000000000 --- a/audit/projects/k8s-staging-descheduler/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:1009880777024@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-descheduler@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-1009880777024@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-1009880777024@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-1009880777024@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-1009880777024@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-descheduler@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-descheduler@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-descheduler/services/enabled.txt b/audit/projects/k8s-staging-descheduler/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-descheduler/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-dns/buckets/artifacts.k8s-staging-dns.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-dns/buckets/artifacts.k8s-staging-dns.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index fa9ec8d3b203..000000000000 --- a/audit/projects/k8s-staging-dns/buckets/artifacts.k8s-staging-dns.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-dns.appspot.com: - Enabled: True - LockedTime: 2020-06-29 03:49:19.224000+00:00 - diff --git a/audit/projects/k8s-staging-dns/buckets/artifacts.k8s-staging-dns.appspot.com/cors.txt b/audit/projects/k8s-staging-dns/buckets/artifacts.k8s-staging-dns.appspot.com/cors.txt deleted file mode 100644 index 7476e6af6c28..000000000000 --- a/audit/projects/k8s-staging-dns/buckets/artifacts.k8s-staging-dns.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-dns.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-dns/buckets/artifacts.k8s-staging-dns.appspot.com/iam.json b/audit/projects/k8s-staging-dns/buckets/artifacts.k8s-staging-dns.appspot.com/iam.json deleted file mode 100644 index a117add5bcb6..000000000000 --- a/audit/projects/k8s-staging-dns/buckets/artifacts.k8s-staging-dns.appspot.com/iam.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-dns", - "projectOwner:k8s-staging-dns" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-dns@kubernetes.io", - "projectViewer:k8s-staging-dns" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-dns@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-dns@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-dns/buckets/artifacts.k8s-staging-dns.appspot.com/logging.txt b/audit/projects/k8s-staging-dns/buckets/artifacts.k8s-staging-dns.appspot.com/logging.txt deleted file mode 100644 index a02a4c278755..000000000000 --- a/audit/projects/k8s-staging-dns/buckets/artifacts.k8s-staging-dns.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-dns.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-dns/buckets/k8s-staging-dns-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-dns/buckets/k8s-staging-dns-gcb/bucketpolicyonly.txt deleted file mode 100644 index 0658520a89b8..000000000000 --- a/audit/projects/k8s-staging-dns/buckets/k8s-staging-dns-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-dns-gcb: - Enabled: True - LockedTime: 2020-06-29 03:49:52.349000+00:00 - diff --git a/audit/projects/k8s-staging-dns/buckets/k8s-staging-dns-gcb/cors.txt b/audit/projects/k8s-staging-dns/buckets/k8s-staging-dns-gcb/cors.txt deleted file mode 100644 index f73e451266b2..000000000000 --- a/audit/projects/k8s-staging-dns/buckets/k8s-staging-dns-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-dns-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-dns/buckets/k8s-staging-dns-gcb/iam.json b/audit/projects/k8s-staging-dns/buckets/k8s-staging-dns-gcb/iam.json deleted file mode 100644 index 3c9ccef10d9b..000000000000 --- a/audit/projects/k8s-staging-dns/buckets/k8s-staging-dns-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-dns", - "projectOwner:k8s-staging-dns" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-dns" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-dns@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-dns@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-dns/buckets/k8s-staging-dns-gcb/logging.txt b/audit/projects/k8s-staging-dns/buckets/k8s-staging-dns-gcb/logging.txt deleted file mode 100644 index c92ab6880be4..000000000000 --- a/audit/projects/k8s-staging-dns/buckets/k8s-staging-dns-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-dns-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-dns/buckets/k8s-staging-dns/bucketpolicyonly.txt b/audit/projects/k8s-staging-dns/buckets/k8s-staging-dns/bucketpolicyonly.txt deleted file mode 100644 index 5463873533e7..000000000000 --- a/audit/projects/k8s-staging-dns/buckets/k8s-staging-dns/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-dns: - Enabled: True - LockedTime: 2020-06-29 03:49:36.640000+00:00 - diff --git a/audit/projects/k8s-staging-dns/buckets/k8s-staging-dns/cors.txt b/audit/projects/k8s-staging-dns/buckets/k8s-staging-dns/cors.txt deleted file mode 100644 index a5d177061f88..000000000000 --- a/audit/projects/k8s-staging-dns/buckets/k8s-staging-dns/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-dns/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-dns/buckets/k8s-staging-dns/iam.json b/audit/projects/k8s-staging-dns/buckets/k8s-staging-dns/iam.json deleted file mode 100644 index 45ea62f403c6..000000000000 --- a/audit/projects/k8s-staging-dns/buckets/k8s-staging-dns/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-dns", - "projectOwner:k8s-staging-dns" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-dns" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-dns@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-dns@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-dns/buckets/k8s-staging-dns/logging.txt b/audit/projects/k8s-staging-dns/buckets/k8s-staging-dns/logging.txt deleted file mode 100644 index 8335efec3f2b..000000000000 --- a/audit/projects/k8s-staging-dns/buckets/k8s-staging-dns/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-dns/ has no logging configuration. diff --git a/audit/projects/k8s-staging-dns/description.json b/audit/projects/k8s-staging-dns/description.json deleted file mode 100644 index 7ac175b04a78..000000000000 --- a/audit/projects/k8s-staging-dns/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-03-31T03:48:35.243Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-dns", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-dns", - "projectNumber": "558098336346" -} diff --git a/audit/projects/k8s-staging-dns/iam.json b/audit/projects/k8s-staging-dns/iam.json deleted file mode 100644 index d1eb5a5a2958..000000000000 --- a/audit/projects/k8s-staging-dns/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:558098336346@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-dns@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-558098336346@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-558098336346@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-558098336346@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-558098336346@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-dns@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-dns@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-dns/services/enabled.txt b/audit/projects/k8s-staging-dns/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-dns/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-e2e-test-images/buckets/artifacts.k8s-staging-e2e-test-images.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-e2e-test-images/buckets/artifacts.k8s-staging-e2e-test-images.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 6fe0b9fa20fb..000000000000 --- a/audit/projects/k8s-staging-e2e-test-images/buckets/artifacts.k8s-staging-e2e-test-images.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-e2e-test-images.appspot.com: - Enabled: True - LockedTime: 2020-03-05 17:23:51.041000+00:00 - diff --git a/audit/projects/k8s-staging-e2e-test-images/buckets/artifacts.k8s-staging-e2e-test-images.appspot.com/cors.txt b/audit/projects/k8s-staging-e2e-test-images/buckets/artifacts.k8s-staging-e2e-test-images.appspot.com/cors.txt deleted file mode 100644 index 8fa33b5096f5..000000000000 --- a/audit/projects/k8s-staging-e2e-test-images/buckets/artifacts.k8s-staging-e2e-test-images.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-e2e-test-images.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-e2e-test-images/buckets/artifacts.k8s-staging-e2e-test-images.appspot.com/iam.json b/audit/projects/k8s-staging-e2e-test-images/buckets/artifacts.k8s-staging-e2e-test-images.appspot.com/iam.json deleted file mode 100644 index 017a0e06bfc1..000000000000 --- a/audit/projects/k8s-staging-e2e-test-images/buckets/artifacts.k8s-staging-e2e-test-images.appspot.com/iam.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-e2e-test-images", - "projectOwner:k8s-staging-e2e-test-images", - "serviceAccount:456067983721@cloudbuild.gserviceaccount.com" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-e2e-test-images@kubernetes.io", - "projectViewer:k8s-staging-e2e-test-images" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-e2e-test-images@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-e2e-test-images@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-e2e-test-images/buckets/artifacts.k8s-staging-e2e-test-images.appspot.com/logging.txt b/audit/projects/k8s-staging-e2e-test-images/buckets/artifacts.k8s-staging-e2e-test-images.appspot.com/logging.txt deleted file mode 100644 index 2b928dba2d7e..000000000000 --- a/audit/projects/k8s-staging-e2e-test-images/buckets/artifacts.k8s-staging-e2e-test-images.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-e2e-test-images.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-e2e-test-images/buckets/k8s-staging-e2e-test-images-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-e2e-test-images/buckets/k8s-staging-e2e-test-images-gcb/bucketpolicyonly.txt deleted file mode 100644 index bbfb9385c0f0..000000000000 --- a/audit/projects/k8s-staging-e2e-test-images/buckets/k8s-staging-e2e-test-images-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-e2e-test-images-gcb: - Enabled: True - LockedTime: 2020-03-05 17:24:25.517000+00:00 - diff --git a/audit/projects/k8s-staging-e2e-test-images/buckets/k8s-staging-e2e-test-images-gcb/cors.txt b/audit/projects/k8s-staging-e2e-test-images/buckets/k8s-staging-e2e-test-images-gcb/cors.txt deleted file mode 100644 index 727f9ffcbe67..000000000000 --- a/audit/projects/k8s-staging-e2e-test-images/buckets/k8s-staging-e2e-test-images-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-e2e-test-images-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-e2e-test-images/buckets/k8s-staging-e2e-test-images-gcb/iam.json b/audit/projects/k8s-staging-e2e-test-images/buckets/k8s-staging-e2e-test-images-gcb/iam.json deleted file mode 100644 index 70394c224f9c..000000000000 --- a/audit/projects/k8s-staging-e2e-test-images/buckets/k8s-staging-e2e-test-images-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-e2e-test-images", - "projectOwner:k8s-staging-e2e-test-images" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-e2e-test-images" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-e2e-test-images@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-e2e-test-images@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-e2e-test-images/buckets/k8s-staging-e2e-test-images-gcb/logging.txt b/audit/projects/k8s-staging-e2e-test-images/buckets/k8s-staging-e2e-test-images-gcb/logging.txt deleted file mode 100644 index 8fa150320a28..000000000000 --- a/audit/projects/k8s-staging-e2e-test-images/buckets/k8s-staging-e2e-test-images-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-e2e-test-images-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-e2e-test-images/buckets/k8s-staging-e2e-test-images/bucketpolicyonly.txt b/audit/projects/k8s-staging-e2e-test-images/buckets/k8s-staging-e2e-test-images/bucketpolicyonly.txt deleted file mode 100644 index ac21a3df9cb2..000000000000 --- a/audit/projects/k8s-staging-e2e-test-images/buckets/k8s-staging-e2e-test-images/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-e2e-test-images: - Enabled: True - LockedTime: 2020-03-05 17:24:10.547000+00:00 - diff --git a/audit/projects/k8s-staging-e2e-test-images/buckets/k8s-staging-e2e-test-images/cors.txt b/audit/projects/k8s-staging-e2e-test-images/buckets/k8s-staging-e2e-test-images/cors.txt deleted file mode 100644 index 67dfd2c566cc..000000000000 --- a/audit/projects/k8s-staging-e2e-test-images/buckets/k8s-staging-e2e-test-images/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-e2e-test-images/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-e2e-test-images/buckets/k8s-staging-e2e-test-images/iam.json b/audit/projects/k8s-staging-e2e-test-images/buckets/k8s-staging-e2e-test-images/iam.json deleted file mode 100644 index edbf459e093e..000000000000 --- a/audit/projects/k8s-staging-e2e-test-images/buckets/k8s-staging-e2e-test-images/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-e2e-test-images", - "projectOwner:k8s-staging-e2e-test-images" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-e2e-test-images" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-e2e-test-images@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-e2e-test-images@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-e2e-test-images/buckets/k8s-staging-e2e-test-images/logging.txt b/audit/projects/k8s-staging-e2e-test-images/buckets/k8s-staging-e2e-test-images/logging.txt deleted file mode 100644 index 734660426181..000000000000 --- a/audit/projects/k8s-staging-e2e-test-images/buckets/k8s-staging-e2e-test-images/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-e2e-test-images/ has no logging configuration. diff --git a/audit/projects/k8s-staging-e2e-test-images/description.json b/audit/projects/k8s-staging-e2e-test-images/description.json deleted file mode 100644 index 4c872e48c89c..000000000000 --- a/audit/projects/k8s-staging-e2e-test-images/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2019-12-06T17:21:30.698Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-e2e-test-images", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-e2e-test-images", - "projectNumber": "456067983721" -} diff --git a/audit/projects/k8s-staging-e2e-test-images/iam.json b/audit/projects/k8s-staging-e2e-test-images/iam.json deleted file mode 100644 index 0bd0c1b03223..000000000000 --- a/audit/projects/k8s-staging-e2e-test-images/iam.json +++ /dev/null @@ -1,88 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:456067983721@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-e2e-test-images@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-456067983721@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-456067983721@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-456067983721@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-456067983721@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-456067983721@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:456067983721-compute@developer.gserviceaccount.com", - "serviceAccount:456067983721@cloudservices.gserviceaccount.com", - "serviceAccount:service-456067983721@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "serviceAccount:456067983721@cloudbuild.gserviceaccount.com" - ], - "role": "roles/secretmanager.secretAccessor" - }, - { - "members": [ - "group:k8s-infra-staging-e2e-test-images@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-e2e-test-images@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-e2e-test-images/service-accounts/456067983721-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-staging-e2e-test-images/service-accounts/456067983721-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index fff3c83ac5f5..000000000000 --- a/audit/projects/k8s-staging-e2e-test-images/service-accounts/456067983721-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "456067983721-compute@developer.gserviceaccount.com", - "name": "projects/k8s-staging-e2e-test-images/serviceAccounts/456067983721-compute@developer.gserviceaccount.com", - "oauth2ClientId": "105757215920619059969", - "projectId": "k8s-staging-e2e-test-images", - "uniqueId": "105757215920619059969" -} diff --git a/audit/projects/k8s-staging-e2e-test-images/service-accounts/456067983721-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-staging-e2e-test-images/service-accounts/456067983721-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-staging-e2e-test-images/service-accounts/456067983721-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-staging-e2e-test-images/services/bigquery/bigquery.datasets.json b/audit/projects/k8s-staging-e2e-test-images/services/bigquery/bigquery.datasets.json deleted file mode 100644 index e69de29bb2d1..000000000000 diff --git a/audit/projects/k8s-staging-e2e-test-images/services/compute/project-info.json b/audit/projects/k8s-staging-e2e-test-images/services/compute/project-info.json deleted file mode 100644 index f753bd4b71a6..000000000000 --- a/audit/projects/k8s-staging-e2e-test-images/services/compute/project-info.json +++ /dev/null @@ -1,171 +0,0 @@ -{ - "commonInstanceMetadata": { - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-05-13T12:40:53.841-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "456067983721-compute@developer.gserviceaccount.com", - "id": "2870902180273058730", - "kind": "compute#project", - "name": "k8s-staging-e2e-test-images", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-staging-e2e-test-images", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-staging-e2e-test-images/services/container/clusters.txt b/audit/projects/k8s-staging-e2e-test-images/services/container/clusters.txt deleted file mode 100644 index e69de29bb2d1..000000000000 diff --git a/audit/projects/k8s-staging-e2e-test-images/services/enabled.txt b/audit/projects/k8s-staging-e2e-test-images/services/enabled.txt deleted file mode 100644 index c77a6232e1f1..000000000000 --- a/audit/projects/k8s-staging-e2e-test-images/services/enabled.txt +++ /dev/null @@ -1,20 +0,0 @@ -NAME TITLE -bigquery.googleapis.com BigQuery API -bigquerystorage.googleapis.com BigQuery Storage API -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -compute.googleapis.com Compute Engine API -container.googleapis.com Kubernetes Engine API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -iam.googleapis.com Identity and Access Management (IAM) API -iamcredentials.googleapis.com IAM Service Account Credentials API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -policytroubleshooter.googleapis.com Policy Troubleshooter API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-etcd/buckets/artifacts.k8s-staging-etcd.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-etcd/buckets/artifacts.k8s-staging-etcd.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 1cb1174518b1..000000000000 --- a/audit/projects/k8s-staging-etcd/buckets/artifacts.k8s-staging-etcd.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-etcd.appspot.com: - Enabled: True - LockedTime: 2020-07-02 17:27:08.625000+00:00 - diff --git a/audit/projects/k8s-staging-etcd/buckets/artifacts.k8s-staging-etcd.appspot.com/cors.txt b/audit/projects/k8s-staging-etcd/buckets/artifacts.k8s-staging-etcd.appspot.com/cors.txt deleted file mode 100644 index 133117518d67..000000000000 --- a/audit/projects/k8s-staging-etcd/buckets/artifacts.k8s-staging-etcd.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-etcd.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-etcd/buckets/artifacts.k8s-staging-etcd.appspot.com/iam.json b/audit/projects/k8s-staging-etcd/buckets/artifacts.k8s-staging-etcd.appspot.com/iam.json deleted file mode 100644 index e9cc0f3ca5b0..000000000000 --- a/audit/projects/k8s-staging-etcd/buckets/artifacts.k8s-staging-etcd.appspot.com/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-etcd", - "projectOwner:k8s-staging-etcd" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-etcd" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-etcd@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-etcd@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-etcd/buckets/artifacts.k8s-staging-etcd.appspot.com/logging.txt b/audit/projects/k8s-staging-etcd/buckets/artifacts.k8s-staging-etcd.appspot.com/logging.txt deleted file mode 100644 index 4a9806a5f989..000000000000 --- a/audit/projects/k8s-staging-etcd/buckets/artifacts.k8s-staging-etcd.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-etcd.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-etcd/buckets/k8s-staging-etcd-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-etcd/buckets/k8s-staging-etcd-gcb/bucketpolicyonly.txt deleted file mode 100644 index 71e8ea09fb7b..000000000000 --- a/audit/projects/k8s-staging-etcd/buckets/k8s-staging-etcd-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-etcd-gcb: - Enabled: True - LockedTime: 2020-07-02 17:27:54.925000+00:00 - diff --git a/audit/projects/k8s-staging-etcd/buckets/k8s-staging-etcd-gcb/cors.txt b/audit/projects/k8s-staging-etcd/buckets/k8s-staging-etcd-gcb/cors.txt deleted file mode 100644 index f7bdb94b5e75..000000000000 --- a/audit/projects/k8s-staging-etcd/buckets/k8s-staging-etcd-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-etcd-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-etcd/buckets/k8s-staging-etcd-gcb/iam.json b/audit/projects/k8s-staging-etcd/buckets/k8s-staging-etcd-gcb/iam.json deleted file mode 100644 index af9838dbb3c4..000000000000 --- a/audit/projects/k8s-staging-etcd/buckets/k8s-staging-etcd-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-etcd", - "projectOwner:k8s-staging-etcd" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-etcd" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-etcd@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-etcd@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-etcd/buckets/k8s-staging-etcd-gcb/logging.txt b/audit/projects/k8s-staging-etcd/buckets/k8s-staging-etcd-gcb/logging.txt deleted file mode 100644 index 856873d82f3c..000000000000 --- a/audit/projects/k8s-staging-etcd/buckets/k8s-staging-etcd-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-etcd-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-etcd/buckets/k8s-staging-etcd/bucketpolicyonly.txt b/audit/projects/k8s-staging-etcd/buckets/k8s-staging-etcd/bucketpolicyonly.txt deleted file mode 100644 index f340444dd3f7..000000000000 --- a/audit/projects/k8s-staging-etcd/buckets/k8s-staging-etcd/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-etcd: - Enabled: True - LockedTime: 2020-07-02 17:27:34.219000+00:00 - diff --git a/audit/projects/k8s-staging-etcd/buckets/k8s-staging-etcd/cors.txt b/audit/projects/k8s-staging-etcd/buckets/k8s-staging-etcd/cors.txt deleted file mode 100644 index 6bc14f7a8a7e..000000000000 --- a/audit/projects/k8s-staging-etcd/buckets/k8s-staging-etcd/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-etcd/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-etcd/buckets/k8s-staging-etcd/iam.json b/audit/projects/k8s-staging-etcd/buckets/k8s-staging-etcd/iam.json deleted file mode 100644 index e9cc0f3ca5b0..000000000000 --- a/audit/projects/k8s-staging-etcd/buckets/k8s-staging-etcd/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-etcd", - "projectOwner:k8s-staging-etcd" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-etcd" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-etcd@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-etcd@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-etcd/buckets/k8s-staging-etcd/logging.txt b/audit/projects/k8s-staging-etcd/buckets/k8s-staging-etcd/logging.txt deleted file mode 100644 index 95e9bb005182..000000000000 --- a/audit/projects/k8s-staging-etcd/buckets/k8s-staging-etcd/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-etcd/ has no logging configuration. diff --git a/audit/projects/k8s-staging-etcd/description.json b/audit/projects/k8s-staging-etcd/description.json deleted file mode 100644 index 17b1fbe1a46e..000000000000 --- a/audit/projects/k8s-staging-etcd/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-04-03T17:25:57.279Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-etcd", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-etcd", - "projectNumber": "329483391043" -} diff --git a/audit/projects/k8s-staging-etcd/iam.json b/audit/projects/k8s-staging-etcd/iam.json deleted file mode 100644 index 55d9e45629c1..000000000000 --- a/audit/projects/k8s-staging-etcd/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:329483391043@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-etcd@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-329483391043@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-329483391043@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-329483391043@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-329483391043@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-etcd@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-etcd@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-etcd/services/enabled.txt b/audit/projects/k8s-staging-etcd/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-etcd/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-etcdadm/buckets/artifacts.k8s-staging-etcdadm.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-etcdadm/buckets/artifacts.k8s-staging-etcdadm.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 8592852b44da..000000000000 --- a/audit/projects/k8s-staging-etcdadm/buckets/artifacts.k8s-staging-etcdadm.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-etcdadm.appspot.com: - Enabled: True - LockedTime: 2020-10-18 21:49:16.431000+00:00 - diff --git a/audit/projects/k8s-staging-etcdadm/buckets/artifacts.k8s-staging-etcdadm.appspot.com/cors.txt b/audit/projects/k8s-staging-etcdadm/buckets/artifacts.k8s-staging-etcdadm.appspot.com/cors.txt deleted file mode 100644 index 7b5a0d7dbf25..000000000000 --- a/audit/projects/k8s-staging-etcdadm/buckets/artifacts.k8s-staging-etcdadm.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-etcdadm.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-etcdadm/buckets/artifacts.k8s-staging-etcdadm.appspot.com/iam.json b/audit/projects/k8s-staging-etcdadm/buckets/artifacts.k8s-staging-etcdadm.appspot.com/iam.json deleted file mode 100644 index 09cff0563121..000000000000 --- a/audit/projects/k8s-staging-etcdadm/buckets/artifacts.k8s-staging-etcdadm.appspot.com/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-etcdadm", - "projectOwner:k8s-staging-etcdadm" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-etcdadm" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-etcdadm@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-etcdadm@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-etcdadm/buckets/artifacts.k8s-staging-etcdadm.appspot.com/logging.txt b/audit/projects/k8s-staging-etcdadm/buckets/artifacts.k8s-staging-etcdadm.appspot.com/logging.txt deleted file mode 100644 index 98fc4d10bff9..000000000000 --- a/audit/projects/k8s-staging-etcdadm/buckets/artifacts.k8s-staging-etcdadm.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-etcdadm.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm-gcb/bucketpolicyonly.txt deleted file mode 100644 index 01e227276629..000000000000 --- a/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-etcdadm-gcb: - Enabled: True - LockedTime: 2020-10-18 21:50:01.422000+00:00 - diff --git a/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm-gcb/cors.txt b/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm-gcb/cors.txt deleted file mode 100644 index fd251d56d688..000000000000 --- a/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-etcdadm-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm-gcb/iam.json b/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm-gcb/iam.json deleted file mode 100644 index 9ffe456a50d1..000000000000 --- a/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-etcdadm", - "projectOwner:k8s-staging-etcdadm" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-etcdadm" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-etcdadm@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-etcdadm@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm-gcb/logging.txt b/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm-gcb/logging.txt deleted file mode 100644 index 60fb67888510..000000000000 --- a/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-etcdadm-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm/bucketpolicyonly.txt b/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm/bucketpolicyonly.txt deleted file mode 100644 index c934ae8ebd16..000000000000 --- a/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-etcdadm: - Enabled: True - LockedTime: 2020-10-18 21:49:39.322000+00:00 - diff --git a/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm/cors.txt b/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm/cors.txt deleted file mode 100644 index d32d196d641b..000000000000 --- a/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-etcdadm/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm/iam.json b/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm/iam.json deleted file mode 100644 index 09cff0563121..000000000000 --- a/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-etcdadm", - "projectOwner:k8s-staging-etcdadm" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-etcdadm" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-etcdadm@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-etcdadm@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm/logging.txt b/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm/logging.txt deleted file mode 100644 index 4ae541e8f54f..000000000000 --- a/audit/projects/k8s-staging-etcdadm/buckets/k8s-staging-etcdadm/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-etcdadm/ has no logging configuration. diff --git a/audit/projects/k8s-staging-etcdadm/description.json b/audit/projects/k8s-staging-etcdadm/description.json deleted file mode 100644 index 7cdf54de5bd2..000000000000 --- a/audit/projects/k8s-staging-etcdadm/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-05-26T18:45:36.970Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-etcdadm", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-etcdadm", - "projectNumber": "621671725592" -} diff --git a/audit/projects/k8s-staging-etcdadm/iam.json b/audit/projects/k8s-staging-etcdadm/iam.json deleted file mode 100644 index 6aa922eb50bd..000000000000 --- a/audit/projects/k8s-staging-etcdadm/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:621671725592@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-etcdadm@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-621671725592@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-621671725592@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-621671725592@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-621671725592@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-etcdadm@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-etcdadm@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-etcdadm/services/enabled.txt b/audit/projects/k8s-staging-etcdadm/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-etcdadm/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-examples/buckets/artifacts.k8s-staging-examples.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-examples/buckets/artifacts.k8s-staging-examples.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 8a53ec2c26a3..000000000000 --- a/audit/projects/k8s-staging-examples/buckets/artifacts.k8s-staging-examples.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-examples.appspot.com: - Enabled: True - LockedTime: 2021-03-06 20:53:36.438000+00:00 - diff --git a/audit/projects/k8s-staging-examples/buckets/artifacts.k8s-staging-examples.appspot.com/cors.txt b/audit/projects/k8s-staging-examples/buckets/artifacts.k8s-staging-examples.appspot.com/cors.txt deleted file mode 100644 index e5637ebe9250..000000000000 --- a/audit/projects/k8s-staging-examples/buckets/artifacts.k8s-staging-examples.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-examples.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-examples/buckets/artifacts.k8s-staging-examples.appspot.com/iam.json b/audit/projects/k8s-staging-examples/buckets/artifacts.k8s-staging-examples.appspot.com/iam.json deleted file mode 100644 index 191d0d839af4..000000000000 --- a/audit/projects/k8s-staging-examples/buckets/artifacts.k8s-staging-examples.appspot.com/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-examples", - "projectOwner:k8s-staging-examples" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-examples" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-examples@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-examples@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-examples/buckets/artifacts.k8s-staging-examples.appspot.com/logging.txt b/audit/projects/k8s-staging-examples/buckets/artifacts.k8s-staging-examples.appspot.com/logging.txt deleted file mode 100644 index ab09a1ddf94d..000000000000 --- a/audit/projects/k8s-staging-examples/buckets/artifacts.k8s-staging-examples.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-examples.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples-gcb/bucketpolicyonly.txt deleted file mode 100644 index 0ec21708c3fe..000000000000 --- a/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-examples-gcb: - Enabled: True - LockedTime: 2021-03-06 20:54:13.538000+00:00 - diff --git a/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples-gcb/cors.txt b/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples-gcb/cors.txt deleted file mode 100644 index a641cf5b6fee..000000000000 --- a/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-examples-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples-gcb/iam.json b/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples-gcb/iam.json deleted file mode 100644 index 8bf7c201cbc5..000000000000 --- a/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-examples", - "projectOwner:k8s-staging-examples" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-examples" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-examples@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-examples@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples-gcb/logging.txt b/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples-gcb/logging.txt deleted file mode 100644 index e66a313a319e..000000000000 --- a/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-examples-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples/bucketpolicyonly.txt b/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples/bucketpolicyonly.txt deleted file mode 100644 index f765e9f8c528..000000000000 --- a/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-examples: - Enabled: True - LockedTime: 2021-03-06 20:53:56.667000+00:00 - diff --git a/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples/cors.txt b/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples/cors.txt deleted file mode 100644 index 6e29310c24b7..000000000000 --- a/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-examples/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples/iam.json b/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples/iam.json deleted file mode 100644 index 191d0d839af4..000000000000 --- a/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-examples", - "projectOwner:k8s-staging-examples" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-examples" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-examples@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-examples@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples/logging.txt b/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples/logging.txt deleted file mode 100644 index 71a36e399a72..000000000000 --- a/audit/projects/k8s-staging-examples/buckets/k8s-staging-examples/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-examples/ has no logging configuration. diff --git a/audit/projects/k8s-staging-examples/description.json b/audit/projects/k8s-staging-examples/description.json deleted file mode 100644 index 43ff0496d37b..000000000000 --- a/audit/projects/k8s-staging-examples/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-12-06T20:52:45.011Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-examples", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-examples", - "projectNumber": "315229499758" -} diff --git a/audit/projects/k8s-staging-examples/iam.json b/audit/projects/k8s-staging-examples/iam.json deleted file mode 100644 index 2cdf9fc12394..000000000000 --- a/audit/projects/k8s-staging-examples/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:315229499758@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-examples@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-315229499758@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-315229499758@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-315229499758@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-315229499758@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-examples@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-examples@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-examples/services/enabled.txt b/audit/projects/k8s-staging-examples/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-examples/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-experimental/buckets/artifacts.k8s-staging-experimental.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-experimental/buckets/artifacts.k8s-staging-experimental.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 0823e465f611..000000000000 --- a/audit/projects/k8s-staging-experimental/buckets/artifacts.k8s-staging-experimental.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-experimental.appspot.com: - Enabled: True - LockedTime: 2021-04-29 15:44:34.938000+00:00 - diff --git a/audit/projects/k8s-staging-experimental/buckets/artifacts.k8s-staging-experimental.appspot.com/cors.txt b/audit/projects/k8s-staging-experimental/buckets/artifacts.k8s-staging-experimental.appspot.com/cors.txt deleted file mode 100644 index f44f52f26918..000000000000 --- a/audit/projects/k8s-staging-experimental/buckets/artifacts.k8s-staging-experimental.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-experimental.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-experimental/buckets/artifacts.k8s-staging-experimental.appspot.com/iam.json b/audit/projects/k8s-staging-experimental/buckets/artifacts.k8s-staging-experimental.appspot.com/iam.json deleted file mode 100644 index 70d9ca21addd..000000000000 --- a/audit/projects/k8s-staging-experimental/buckets/artifacts.k8s-staging-experimental.appspot.com/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-experimental", - "projectOwner:k8s-staging-experimental" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-experimental" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-experimental@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-experimental@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-experimental/buckets/artifacts.k8s-staging-experimental.appspot.com/logging.txt b/audit/projects/k8s-staging-experimental/buckets/artifacts.k8s-staging-experimental.appspot.com/logging.txt deleted file mode 100644 index 360ca174d1a8..000000000000 --- a/audit/projects/k8s-staging-experimental/buckets/artifacts.k8s-staging-experimental.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-experimental.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-experimental/buckets/k8s-staging-experimental-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-experimental/buckets/k8s-staging-experimental-gcb/bucketpolicyonly.txt deleted file mode 100644 index 112a35ef5d87..000000000000 --- a/audit/projects/k8s-staging-experimental/buckets/k8s-staging-experimental-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-experimental-gcb: - Enabled: True - LockedTime: 2021-04-29 15:45:08.539000+00:00 - diff --git a/audit/projects/k8s-staging-experimental/buckets/k8s-staging-experimental-gcb/cors.txt b/audit/projects/k8s-staging-experimental/buckets/k8s-staging-experimental-gcb/cors.txt deleted file mode 100644 index ee824a8c8d92..000000000000 --- a/audit/projects/k8s-staging-experimental/buckets/k8s-staging-experimental-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-experimental-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-experimental/buckets/k8s-staging-experimental-gcb/iam.json b/audit/projects/k8s-staging-experimental/buckets/k8s-staging-experimental-gcb/iam.json deleted file mode 100644 index 54ec2c751d06..000000000000 --- a/audit/projects/k8s-staging-experimental/buckets/k8s-staging-experimental-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-experimental", - "projectOwner:k8s-staging-experimental" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-experimental" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-experimental@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-experimental@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-experimental/buckets/k8s-staging-experimental-gcb/logging.txt b/audit/projects/k8s-staging-experimental/buckets/k8s-staging-experimental-gcb/logging.txt deleted file mode 100644 index 821041eca833..000000000000 --- a/audit/projects/k8s-staging-experimental/buckets/k8s-staging-experimental-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-experimental-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-experimental/buckets/k8s-staging-experimental/bucketpolicyonly.txt b/audit/projects/k8s-staging-experimental/buckets/k8s-staging-experimental/bucketpolicyonly.txt deleted file mode 100644 index 6b22fe7aa1a0..000000000000 --- a/audit/projects/k8s-staging-experimental/buckets/k8s-staging-experimental/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-experimental: - Enabled: True - LockedTime: 2021-04-29 15:44:52.440000+00:00 - diff --git a/audit/projects/k8s-staging-experimental/buckets/k8s-staging-experimental/cors.txt b/audit/projects/k8s-staging-experimental/buckets/k8s-staging-experimental/cors.txt deleted file mode 100644 index 12f503e3426d..000000000000 --- a/audit/projects/k8s-staging-experimental/buckets/k8s-staging-experimental/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-experimental/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-experimental/buckets/k8s-staging-experimental/iam.json b/audit/projects/k8s-staging-experimental/buckets/k8s-staging-experimental/iam.json deleted file mode 100644 index 70d9ca21addd..000000000000 --- a/audit/projects/k8s-staging-experimental/buckets/k8s-staging-experimental/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-experimental", - "projectOwner:k8s-staging-experimental" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-experimental" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-experimental@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-experimental@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-experimental/buckets/k8s-staging-experimental/logging.txt b/audit/projects/k8s-staging-experimental/buckets/k8s-staging-experimental/logging.txt deleted file mode 100644 index 87069fc85cc4..000000000000 --- a/audit/projects/k8s-staging-experimental/buckets/k8s-staging-experimental/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-experimental/ has no logging configuration. diff --git a/audit/projects/k8s-staging-experimental/description.json b/audit/projects/k8s-staging-experimental/description.json deleted file mode 100644 index f0f8a6f5bd27..000000000000 --- a/audit/projects/k8s-staging-experimental/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2021-01-29T15:04:48.922Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-experimental", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-experimental", - "projectNumber": "737067335481" -} diff --git a/audit/projects/k8s-staging-experimental/iam.json b/audit/projects/k8s-staging-experimental/iam.json deleted file mode 100644 index c1bc3819b87d..000000000000 --- a/audit/projects/k8s-staging-experimental/iam.json +++ /dev/null @@ -1,69 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:737067335481@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-experimental@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-737067335481@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-737067335481@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-737067335481@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-737067335481@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-experimental@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-release-viewers@kubernetes.io", - "group:k8s-infra-staging-experimental@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-experimental/services/enabled.txt b/audit/projects/k8s-staging-experimental/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-experimental/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-external-dns/buckets/artifacts.k8s-staging-external-dns.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-external-dns/buckets/artifacts.k8s-staging-external-dns.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 14c1d8f002b6..000000000000 --- a/audit/projects/k8s-staging-external-dns/buckets/artifacts.k8s-staging-external-dns.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-external-dns.appspot.com: - Enabled: True - LockedTime: 2020-03-08 22:29:14.922000+00:00 - diff --git a/audit/projects/k8s-staging-external-dns/buckets/artifacts.k8s-staging-external-dns.appspot.com/cors.txt b/audit/projects/k8s-staging-external-dns/buckets/artifacts.k8s-staging-external-dns.appspot.com/cors.txt deleted file mode 100644 index deecc4ba2b32..000000000000 --- a/audit/projects/k8s-staging-external-dns/buckets/artifacts.k8s-staging-external-dns.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-external-dns.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-external-dns/buckets/artifacts.k8s-staging-external-dns.appspot.com/iam.json b/audit/projects/k8s-staging-external-dns/buckets/artifacts.k8s-staging-external-dns.appspot.com/iam.json deleted file mode 100644 index 101229943d6a..000000000000 --- a/audit/projects/k8s-staging-external-dns/buckets/artifacts.k8s-staging-external-dns.appspot.com/iam.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-external-dns", - "projectOwner:k8s-staging-external-dns" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-external-dns@kubernetes.io", - "projectViewer:k8s-staging-external-dns" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-external-dns@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-external-dns@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-external-dns/buckets/artifacts.k8s-staging-external-dns.appspot.com/logging.txt b/audit/projects/k8s-staging-external-dns/buckets/artifacts.k8s-staging-external-dns.appspot.com/logging.txt deleted file mode 100644 index 1cb3d52c45d4..000000000000 --- a/audit/projects/k8s-staging-external-dns/buckets/artifacts.k8s-staging-external-dns.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-external-dns.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-external-dns/buckets/k8s-staging-external-dns-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-external-dns/buckets/k8s-staging-external-dns-gcb/bucketpolicyonly.txt deleted file mode 100644 index 656b41e05e73..000000000000 --- a/audit/projects/k8s-staging-external-dns/buckets/k8s-staging-external-dns-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-external-dns-gcb: - Enabled: True - LockedTime: 2020-03-08 22:29:51.516000+00:00 - diff --git a/audit/projects/k8s-staging-external-dns/buckets/k8s-staging-external-dns-gcb/cors.txt b/audit/projects/k8s-staging-external-dns/buckets/k8s-staging-external-dns-gcb/cors.txt deleted file mode 100644 index 8a4bfebb6481..000000000000 --- a/audit/projects/k8s-staging-external-dns/buckets/k8s-staging-external-dns-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-external-dns-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-external-dns/buckets/k8s-staging-external-dns-gcb/iam.json b/audit/projects/k8s-staging-external-dns/buckets/k8s-staging-external-dns-gcb/iam.json deleted file mode 100644 index 0d4f6d302d8f..000000000000 --- a/audit/projects/k8s-staging-external-dns/buckets/k8s-staging-external-dns-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-external-dns", - "projectOwner:k8s-staging-external-dns" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-external-dns" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-external-dns@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-external-dns@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-external-dns/buckets/k8s-staging-external-dns-gcb/logging.txt b/audit/projects/k8s-staging-external-dns/buckets/k8s-staging-external-dns-gcb/logging.txt deleted file mode 100644 index b18e90496a64..000000000000 --- a/audit/projects/k8s-staging-external-dns/buckets/k8s-staging-external-dns-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-external-dns-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-external-dns/buckets/k8s-staging-external-dns/bucketpolicyonly.txt b/audit/projects/k8s-staging-external-dns/buckets/k8s-staging-external-dns/bucketpolicyonly.txt deleted file mode 100644 index 2f6471935ca6..000000000000 --- a/audit/projects/k8s-staging-external-dns/buckets/k8s-staging-external-dns/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-external-dns: - Enabled: True - LockedTime: 2020-03-08 22:29:34.317000+00:00 - diff --git a/audit/projects/k8s-staging-external-dns/buckets/k8s-staging-external-dns/cors.txt b/audit/projects/k8s-staging-external-dns/buckets/k8s-staging-external-dns/cors.txt deleted file mode 100644 index 40482f8ecf02..000000000000 --- a/audit/projects/k8s-staging-external-dns/buckets/k8s-staging-external-dns/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-external-dns/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-external-dns/buckets/k8s-staging-external-dns/iam.json b/audit/projects/k8s-staging-external-dns/buckets/k8s-staging-external-dns/iam.json deleted file mode 100644 index 09da336de30d..000000000000 --- a/audit/projects/k8s-staging-external-dns/buckets/k8s-staging-external-dns/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-external-dns", - "projectOwner:k8s-staging-external-dns" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-external-dns" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-external-dns@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-external-dns@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-external-dns/buckets/k8s-staging-external-dns/logging.txt b/audit/projects/k8s-staging-external-dns/buckets/k8s-staging-external-dns/logging.txt deleted file mode 100644 index ffa24d235a33..000000000000 --- a/audit/projects/k8s-staging-external-dns/buckets/k8s-staging-external-dns/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-external-dns/ has no logging configuration. diff --git a/audit/projects/k8s-staging-external-dns/description.json b/audit/projects/k8s-staging-external-dns/description.json deleted file mode 100644 index 688d942f19a2..000000000000 --- a/audit/projects/k8s-staging-external-dns/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2019-12-09T22:28:17.494Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-external-dns", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-external-dns", - "projectNumber": "548739681389" -} diff --git a/audit/projects/k8s-staging-external-dns/iam.json b/audit/projects/k8s-staging-external-dns/iam.json deleted file mode 100644 index 66fc2e22c14b..000000000000 --- a/audit/projects/k8s-staging-external-dns/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:548739681389@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-external-dns@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-548739681389@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-548739681389@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-548739681389@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-548739681389@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-external-dns@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-external-dns@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-external-dns/services/enabled.txt b/audit/projects/k8s-staging-external-dns/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-external-dns/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-git-sync/buckets/artifacts.k8s-staging-git-sync.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-git-sync/buckets/artifacts.k8s-staging-git-sync.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index df7a52d402e2..000000000000 --- a/audit/projects/k8s-staging-git-sync/buckets/artifacts.k8s-staging-git-sync.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-git-sync.appspot.com: - Enabled: True - LockedTime: 2020-12-07 00:06:47.108000+00:00 - diff --git a/audit/projects/k8s-staging-git-sync/buckets/artifacts.k8s-staging-git-sync.appspot.com/cors.txt b/audit/projects/k8s-staging-git-sync/buckets/artifacts.k8s-staging-git-sync.appspot.com/cors.txt deleted file mode 100644 index 779ea47fd0ef..000000000000 --- a/audit/projects/k8s-staging-git-sync/buckets/artifacts.k8s-staging-git-sync.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-git-sync.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-git-sync/buckets/artifacts.k8s-staging-git-sync.appspot.com/iam.json b/audit/projects/k8s-staging-git-sync/buckets/artifacts.k8s-staging-git-sync.appspot.com/iam.json deleted file mode 100644 index 0b9d091b26cc..000000000000 --- a/audit/projects/k8s-staging-git-sync/buckets/artifacts.k8s-staging-git-sync.appspot.com/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-git-sync", - "projectOwner:k8s-staging-git-sync" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-git-sync" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-git-sync@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-git-sync@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-git-sync/buckets/artifacts.k8s-staging-git-sync.appspot.com/logging.txt b/audit/projects/k8s-staging-git-sync/buckets/artifacts.k8s-staging-git-sync.appspot.com/logging.txt deleted file mode 100644 index 80aaa6998782..000000000000 --- a/audit/projects/k8s-staging-git-sync/buckets/artifacts.k8s-staging-git-sync.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-git-sync.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync-gcb/bucketpolicyonly.txt deleted file mode 100644 index 65bd9bea611f..000000000000 --- a/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-git-sync-gcb: - Enabled: True - LockedTime: 2020-12-07 00:07:21.323000+00:00 - diff --git a/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync-gcb/cors.txt b/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync-gcb/cors.txt deleted file mode 100644 index fc3d73344ed2..000000000000 --- a/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-git-sync-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync-gcb/iam.json b/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync-gcb/iam.json deleted file mode 100644 index 796e7cf8bb47..000000000000 --- a/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-git-sync", - "projectOwner:k8s-staging-git-sync" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-git-sync" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-git-sync@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-git-sync@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync-gcb/logging.txt b/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync-gcb/logging.txt deleted file mode 100644 index bb8f92538080..000000000000 --- a/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-git-sync-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync/bucketpolicyonly.txt b/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync/bucketpolicyonly.txt deleted file mode 100644 index e99c18a63c24..000000000000 --- a/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-git-sync: - Enabled: True - LockedTime: 2020-12-07 00:07:04.810000+00:00 - diff --git a/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync/cors.txt b/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync/cors.txt deleted file mode 100644 index a186e23f71b3..000000000000 --- a/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-git-sync/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync/iam.json b/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync/iam.json deleted file mode 100644 index 0b9d091b26cc..000000000000 --- a/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-git-sync", - "projectOwner:k8s-staging-git-sync" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-git-sync" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-git-sync@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-git-sync@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync/logging.txt b/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync/logging.txt deleted file mode 100644 index 3485c8f5be87..000000000000 --- a/audit/projects/k8s-staging-git-sync/buckets/k8s-staging-git-sync/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-git-sync/ has no logging configuration. diff --git a/audit/projects/k8s-staging-git-sync/description.json b/audit/projects/k8s-staging-git-sync/description.json deleted file mode 100644 index 5e9854d0520d..000000000000 --- a/audit/projects/k8s-staging-git-sync/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-09-08T00:05:59.672Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-git-sync", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-git-sync", - "projectNumber": "998209132534" -} diff --git a/audit/projects/k8s-staging-git-sync/iam.json b/audit/projects/k8s-staging-git-sync/iam.json deleted file mode 100644 index a2e49c60923c..000000000000 --- a/audit/projects/k8s-staging-git-sync/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:998209132534@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-git-sync@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-998209132534@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-998209132534@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-998209132534@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-998209132534@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-git-sync@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-git-sync@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-git-sync/services/enabled.txt b/audit/projects/k8s-staging-git-sync/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-git-sync/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-infra-tools/buckets/artifacts.k8s-staging-infra-tools.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-infra-tools/buckets/artifacts.k8s-staging-infra-tools.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index d65a5a5866fa..000000000000 --- a/audit/projects/k8s-staging-infra-tools/buckets/artifacts.k8s-staging-infra-tools.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-infra-tools.appspot.com: - Enabled: True - LockedTime: 2020-07-29 16:49:56.331000+00:00 - diff --git a/audit/projects/k8s-staging-infra-tools/buckets/artifacts.k8s-staging-infra-tools.appspot.com/cors.txt b/audit/projects/k8s-staging-infra-tools/buckets/artifacts.k8s-staging-infra-tools.appspot.com/cors.txt deleted file mode 100644 index eb128ca661af..000000000000 --- a/audit/projects/k8s-staging-infra-tools/buckets/artifacts.k8s-staging-infra-tools.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-infra-tools.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-infra-tools/buckets/artifacts.k8s-staging-infra-tools.appspot.com/iam.json b/audit/projects/k8s-staging-infra-tools/buckets/artifacts.k8s-staging-infra-tools.appspot.com/iam.json deleted file mode 100644 index 8ab5ee738ba2..000000000000 --- a/audit/projects/k8s-staging-infra-tools/buckets/artifacts.k8s-staging-infra-tools.appspot.com/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-infra-tools", - "projectOwner:k8s-staging-infra-tools" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-infra-tools" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-infra-tools@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-infra-tools@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-infra-tools/buckets/artifacts.k8s-staging-infra-tools.appspot.com/logging.txt b/audit/projects/k8s-staging-infra-tools/buckets/artifacts.k8s-staging-infra-tools.appspot.com/logging.txt deleted file mode 100644 index e37f4e0d3041..000000000000 --- a/audit/projects/k8s-staging-infra-tools/buckets/artifacts.k8s-staging-infra-tools.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-infra-tools.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools-gcb/bucketpolicyonly.txt deleted file mode 100644 index e77d515dc4a2..000000000000 --- a/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-infra-tools-gcb: - Enabled: True - LockedTime: 2020-07-29 16:50:49.629000+00:00 - diff --git a/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools-gcb/cors.txt b/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools-gcb/cors.txt deleted file mode 100644 index 65d80c631014..000000000000 --- a/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-infra-tools-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools-gcb/iam.json b/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools-gcb/iam.json deleted file mode 100644 index 2af22e18ce41..000000000000 --- a/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-infra-tools", - "projectOwner:k8s-staging-infra-tools" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-infra-tools" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-infra-tools@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-infra-tools@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools-gcb/logging.txt b/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools-gcb/logging.txt deleted file mode 100644 index 21a08f7b26dc..000000000000 --- a/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-infra-tools-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools/bucketpolicyonly.txt b/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools/bucketpolicyonly.txt deleted file mode 100644 index 9bee0ac94c86..000000000000 --- a/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-infra-tools: - Enabled: True - LockedTime: 2020-07-29 16:50:19.436000+00:00 - diff --git a/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools/cors.txt b/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools/cors.txt deleted file mode 100644 index 071a8c6bde78..000000000000 --- a/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-infra-tools/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools/iam.json b/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools/iam.json deleted file mode 100644 index 8ab5ee738ba2..000000000000 --- a/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-infra-tools", - "projectOwner:k8s-staging-infra-tools" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-infra-tools" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-infra-tools@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-infra-tools@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools/logging.txt b/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools/logging.txt deleted file mode 100644 index d3bc89d24829..000000000000 --- a/audit/projects/k8s-staging-infra-tools/buckets/k8s-staging-infra-tools/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-infra-tools/ has no logging configuration. diff --git a/audit/projects/k8s-staging-infra-tools/description.json b/audit/projects/k8s-staging-infra-tools/description.json deleted file mode 100644 index 96d3e39034ac..000000000000 --- a/audit/projects/k8s-staging-infra-tools/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-04-30T16:49:03.400Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-infra-tools", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-infra-tools", - "projectNumber": "1017132094926" -} diff --git a/audit/projects/k8s-staging-infra-tools/iam.json b/audit/projects/k8s-staging-infra-tools/iam.json deleted file mode 100644 index 814c638d133b..000000000000 --- a/audit/projects/k8s-staging-infra-tools/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:1017132094926@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-infra-tools@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-1017132094926@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-1017132094926@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-1017132094926@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-1017132094926@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-infra-tools@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-infra-tools@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-infra-tools/services/enabled.txt b/audit/projects/k8s-staging-infra-tools/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-infra-tools/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-ingress-nginx/buckets/artifacts.k8s-staging-ingress-nginx.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-ingress-nginx/buckets/artifacts.k8s-staging-ingress-nginx.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 4e4cf2bdd494..000000000000 --- a/audit/projects/k8s-staging-ingress-nginx/buckets/artifacts.k8s-staging-ingress-nginx.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-ingress-nginx.appspot.com: - Enabled: True - LockedTime: 2020-08-24 18:49:22.327000+00:00 - diff --git a/audit/projects/k8s-staging-ingress-nginx/buckets/artifacts.k8s-staging-ingress-nginx.appspot.com/cors.txt b/audit/projects/k8s-staging-ingress-nginx/buckets/artifacts.k8s-staging-ingress-nginx.appspot.com/cors.txt deleted file mode 100644 index 8885db3a396f..000000000000 --- a/audit/projects/k8s-staging-ingress-nginx/buckets/artifacts.k8s-staging-ingress-nginx.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-ingress-nginx.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-ingress-nginx/buckets/artifacts.k8s-staging-ingress-nginx.appspot.com/iam.json b/audit/projects/k8s-staging-ingress-nginx/buckets/artifacts.k8s-staging-ingress-nginx.appspot.com/iam.json deleted file mode 100644 index 0047cab2bd5b..000000000000 --- a/audit/projects/k8s-staging-ingress-nginx/buckets/artifacts.k8s-staging-ingress-nginx.appspot.com/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-ingress-nginx", - "projectOwner:k8s-staging-ingress-nginx" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-ingress-nginx" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-ingress-nginx@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-ingress-nginx@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-ingress-nginx/buckets/artifacts.k8s-staging-ingress-nginx.appspot.com/logging.txt b/audit/projects/k8s-staging-ingress-nginx/buckets/artifacts.k8s-staging-ingress-nginx.appspot.com/logging.txt deleted file mode 100644 index 8cb5943ad9aa..000000000000 --- a/audit/projects/k8s-staging-ingress-nginx/buckets/artifacts.k8s-staging-ingress-nginx.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-ingress-nginx.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx-gcb/bucketpolicyonly.txt deleted file mode 100644 index 50592fc85ef6..000000000000 --- a/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-ingress-nginx-gcb: - Enabled: True - LockedTime: 2020-08-24 18:50:16.825000+00:00 - diff --git a/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx-gcb/cors.txt b/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx-gcb/cors.txt deleted file mode 100644 index 5bdb11b9dc63..000000000000 --- a/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-ingress-nginx-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx-gcb/iam.json b/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx-gcb/iam.json deleted file mode 100644 index 513dbe6f7c56..000000000000 --- a/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-ingress-nginx", - "projectOwner:k8s-staging-ingress-nginx" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-ingress-nginx" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-ingress-nginx@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-ingress-nginx@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx-gcb/logging.txt b/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx-gcb/logging.txt deleted file mode 100644 index 904895ac4708..000000000000 --- a/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-ingress-nginx-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx/bucketpolicyonly.txt b/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx/bucketpolicyonly.txt deleted file mode 100644 index a128404a751f..000000000000 --- a/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-ingress-nginx: - Enabled: True - LockedTime: 2020-08-24 18:49:48.428000+00:00 - diff --git a/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx/cors.txt b/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx/cors.txt deleted file mode 100644 index e2abe67fb1e5..000000000000 --- a/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-ingress-nginx/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx/iam.json b/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx/iam.json deleted file mode 100644 index 0047cab2bd5b..000000000000 --- a/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-ingress-nginx", - "projectOwner:k8s-staging-ingress-nginx" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-ingress-nginx" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-ingress-nginx@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-ingress-nginx@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx/logging.txt b/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx/logging.txt deleted file mode 100644 index 95fa9b1ac454..000000000000 --- a/audit/projects/k8s-staging-ingress-nginx/buckets/k8s-staging-ingress-nginx/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-ingress-nginx/ has no logging configuration. diff --git a/audit/projects/k8s-staging-ingress-nginx/description.json b/audit/projects/k8s-staging-ingress-nginx/description.json deleted file mode 100644 index 3a7c286b4add..000000000000 --- a/audit/projects/k8s-staging-ingress-nginx/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-05-26T18:48:29.135Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-ingress-nginx", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-ingress-nginx", - "projectNumber": "971199482687" -} diff --git a/audit/projects/k8s-staging-ingress-nginx/iam.json b/audit/projects/k8s-staging-ingress-nginx/iam.json deleted file mode 100644 index 0087922c52c2..000000000000 --- a/audit/projects/k8s-staging-ingress-nginx/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:971199482687@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-ingress-nginx@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-971199482687@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-971199482687@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-971199482687@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-971199482687@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-ingress-nginx@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-ingress-nginx@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-ingress-nginx/services/enabled.txt b/audit/projects/k8s-staging-ingress-nginx/services/enabled.txt deleted file mode 100644 index ab1ef15e4e27..000000000000 --- a/audit/projects/k8s-staging-ingress-nginx/services/enabled.txt +++ /dev/null @@ -1,13 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -stackdriver.googleapis.com Stackdriver API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-ingressconformance/buckets/artifacts.k8s-staging-ingressconformance.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-ingressconformance/buckets/artifacts.k8s-staging-ingressconformance.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 3dfe9747c91b..000000000000 --- a/audit/projects/k8s-staging-ingressconformance/buckets/artifacts.k8s-staging-ingressconformance.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-ingressconformance.appspot.com: - Enabled: True - LockedTime: 2020-09-07 21:45:50.021000+00:00 - diff --git a/audit/projects/k8s-staging-ingressconformance/buckets/artifacts.k8s-staging-ingressconformance.appspot.com/cors.txt b/audit/projects/k8s-staging-ingressconformance/buckets/artifacts.k8s-staging-ingressconformance.appspot.com/cors.txt deleted file mode 100644 index 6108a1a5e55f..000000000000 --- a/audit/projects/k8s-staging-ingressconformance/buckets/artifacts.k8s-staging-ingressconformance.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-ingressconformance.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-ingressconformance/buckets/artifacts.k8s-staging-ingressconformance.appspot.com/iam.json b/audit/projects/k8s-staging-ingressconformance/buckets/artifacts.k8s-staging-ingressconformance.appspot.com/iam.json deleted file mode 100644 index 343bb3918df8..000000000000 --- a/audit/projects/k8s-staging-ingressconformance/buckets/artifacts.k8s-staging-ingressconformance.appspot.com/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-ingressconformance", - "projectOwner:k8s-staging-ingressconformance" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-ingressconformance" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-ingressconformance@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-ingressconformance@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-ingressconformance/buckets/artifacts.k8s-staging-ingressconformance.appspot.com/logging.txt b/audit/projects/k8s-staging-ingressconformance/buckets/artifacts.k8s-staging-ingressconformance.appspot.com/logging.txt deleted file mode 100644 index 124425843b51..000000000000 --- a/audit/projects/k8s-staging-ingressconformance/buckets/artifacts.k8s-staging-ingressconformance.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-ingressconformance.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance-gcb/bucketpolicyonly.txt deleted file mode 100644 index c2ad30c9471e..000000000000 --- a/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-ingressconformance-gcb: - Enabled: True - LockedTime: 2020-09-07 21:46:36.427000+00:00 - diff --git a/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance-gcb/cors.txt b/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance-gcb/cors.txt deleted file mode 100644 index c72a55af1593..000000000000 --- a/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-ingressconformance-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance-gcb/iam.json b/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance-gcb/iam.json deleted file mode 100644 index 1be667af9476..000000000000 --- a/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-ingressconformance", - "projectOwner:k8s-staging-ingressconformance" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-ingressconformance" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-ingressconformance@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-ingressconformance@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance-gcb/logging.txt b/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance-gcb/logging.txt deleted file mode 100644 index 8e7c57ac0c41..000000000000 --- a/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-ingressconformance-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance/bucketpolicyonly.txt b/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance/bucketpolicyonly.txt deleted file mode 100644 index eadf85fb1d11..000000000000 --- a/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-ingressconformance: - Enabled: True - LockedTime: 2020-09-07 21:46:13.424000+00:00 - diff --git a/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance/cors.txt b/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance/cors.txt deleted file mode 100644 index 8c4e63d71e65..000000000000 --- a/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-ingressconformance/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance/iam.json b/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance/iam.json deleted file mode 100644 index 343bb3918df8..000000000000 --- a/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-ingressconformance", - "projectOwner:k8s-staging-ingressconformance" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-ingressconformance" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-ingressconformance@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-ingressconformance@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance/logging.txt b/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance/logging.txt deleted file mode 100644 index 6901d0394d82..000000000000 --- a/audit/projects/k8s-staging-ingressconformance/buckets/k8s-staging-ingressconformance/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-ingressconformance/ has no logging configuration. diff --git a/audit/projects/k8s-staging-ingressconformance/description.json b/audit/projects/k8s-staging-ingressconformance/description.json deleted file mode 100644 index e408f9ce5350..000000000000 --- a/audit/projects/k8s-staging-ingressconformance/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-06-09T21:40:42.524Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-ingressconformance", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-ingressconformance", - "projectNumber": "320459285183" -} diff --git a/audit/projects/k8s-staging-ingressconformance/iam.json b/audit/projects/k8s-staging-ingressconformance/iam.json deleted file mode 100644 index 31f0ec950717..000000000000 --- a/audit/projects/k8s-staging-ingressconformance/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:320459285183@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-ingressconformance@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-320459285183@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-320459285183@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-320459285183@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-320459285183@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-ingressconformance@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-ingressconformance@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-ingressconformance/services/enabled.txt b/audit/projects/k8s-staging-ingressconformance/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-ingressconformance/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index f33442775724..000000000000 --- a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-k8s-gsm-tools.appspot.com: - Enabled: True - LockedTime: 2020-10-15 22:23:19.927000+00:00 - diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/cors.txt b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/cors.txt deleted file mode 100644 index 41f847e1c14a..000000000000 --- a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-k8s-gsm-tools.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/iam.json b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/iam.json deleted file mode 100644 index 3fb8dd67686e..000000000000 --- a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/iam.json +++ /dev/null @@ -1,30 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-k8s-gsm-tools", - "projectOwner:k8s-staging-k8s-gsm-tools" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-k8s-gsm-tools" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/logging.txt b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/logging.txt deleted file mode 100644 index fe2f6b11ec70..000000000000 --- a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-k8s-gsm-tools.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/bucketpolicyonly.txt deleted file mode 100644 index ec13889ca209..000000000000 --- a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-k8s-gsm-tools-gcb: - Enabled: True - LockedTime: 2020-10-15 22:24:05.028000+00:00 - diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/cors.txt b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/cors.txt deleted file mode 100644 index bcfc7ad1b3ba..000000000000 --- a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-k8s-gsm-tools-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/iam.json b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/iam.json deleted file mode 100644 index bb97d296470f..000000000000 --- a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/iam.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-k8s-gsm-tools", - "projectOwner:k8s-staging-k8s-gsm-tools" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-k8s-gsm-tools" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/logging.txt b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/logging.txt deleted file mode 100644 index 19c57f7d0b4a..000000000000 --- a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-k8s-gsm-tools-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/bucketpolicyonly.txt b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/bucketpolicyonly.txt deleted file mode 100644 index a23abd7288b9..000000000000 --- a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-k8s-gsm-tools: - Enabled: True - LockedTime: 2020-10-15 22:23:42.127000+00:00 - diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/cors.txt b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/cors.txt deleted file mode 100644 index 6eb00b67c08c..000000000000 --- a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-k8s-gsm-tools/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/iam.json b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/iam.json deleted file mode 100644 index 3fb8dd67686e..000000000000 --- a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/iam.json +++ /dev/null @@ -1,30 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-k8s-gsm-tools", - "projectOwner:k8s-staging-k8s-gsm-tools" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-k8s-gsm-tools" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/logging.txt b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/logging.txt deleted file mode 100644 index 7def2cc5ef44..000000000000 --- a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-k8s-gsm-tools/ has no logging configuration. diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/description.json b/audit/projects/k8s-staging-k8s-gsm-tools/description.json deleted file mode 100644 index 7d35f52407b7..000000000000 --- a/audit/projects/k8s-staging-k8s-gsm-tools/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-07-17T22:22:24.556Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-k8s-gsm-tools", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-k8s-gsm-tools", - "projectNumber": "1073099305721" -} diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/iam.json b/audit/projects/k8s-staging-k8s-gsm-tools/iam.json deleted file mode 100644 index 438898fcb661..000000000000 --- a/audit/projects/k8s-staging-k8s-gsm-tools/iam.json +++ /dev/null @@ -1,55 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:1073099305721@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "serviceAccount:service-1073099305721@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-1073099305721@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-1073099305721@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-1073099305721@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/services/enabled.txt b/audit/projects/k8s-staging-k8s-gsm-tools/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-k8s-gsm-tools/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-kas-network-proxy/buckets/artifacts.k8s-staging-kas-network-proxy.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-kas-network-proxy/buckets/artifacts.k8s-staging-kas-network-proxy.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 2608ca5dc00f..000000000000 --- a/audit/projects/k8s-staging-kas-network-proxy/buckets/artifacts.k8s-staging-kas-network-proxy.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-kas-network-proxy.appspot.com: - Enabled: True - LockedTime: 2020-02-03 17:46:30.043000+00:00 - diff --git a/audit/projects/k8s-staging-kas-network-proxy/buckets/artifacts.k8s-staging-kas-network-proxy.appspot.com/cors.txt b/audit/projects/k8s-staging-kas-network-proxy/buckets/artifacts.k8s-staging-kas-network-proxy.appspot.com/cors.txt deleted file mode 100644 index 1bfb27cd17e6..000000000000 --- a/audit/projects/k8s-staging-kas-network-proxy/buckets/artifacts.k8s-staging-kas-network-proxy.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-kas-network-proxy.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-kas-network-proxy/buckets/artifacts.k8s-staging-kas-network-proxy.appspot.com/iam.json b/audit/projects/k8s-staging-kas-network-proxy/buckets/artifacts.k8s-staging-kas-network-proxy.appspot.com/iam.json deleted file mode 100644 index 19bf4fec3fc8..000000000000 --- a/audit/projects/k8s-staging-kas-network-proxy/buckets/artifacts.k8s-staging-kas-network-proxy.appspot.com/iam.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-kas-network-proxy", - "projectOwner:k8s-staging-kas-network-proxy" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-kas-network-proxy@kubernetes.io", - "projectViewer:k8s-staging-kas-network-proxy" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-kas-network-proxy@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-kas-network-proxy@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-kas-network-proxy/buckets/artifacts.k8s-staging-kas-network-proxy.appspot.com/logging.txt b/audit/projects/k8s-staging-kas-network-proxy/buckets/artifacts.k8s-staging-kas-network-proxy.appspot.com/logging.txt deleted file mode 100644 index 42b9b3205db8..000000000000 --- a/audit/projects/k8s-staging-kas-network-proxy/buckets/artifacts.k8s-staging-kas-network-proxy.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-kas-network-proxy.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-kas-network-proxy/buckets/k8s-staging-kas-network-proxy-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-kas-network-proxy/buckets/k8s-staging-kas-network-proxy-gcb/bucketpolicyonly.txt deleted file mode 100644 index 8c667debbdaa..000000000000 --- a/audit/projects/k8s-staging-kas-network-proxy/buckets/k8s-staging-kas-network-proxy-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-kas-network-proxy-gcb: - Enabled: True - LockedTime: 2020-02-03 17:47:03.643000+00:00 - diff --git a/audit/projects/k8s-staging-kas-network-proxy/buckets/k8s-staging-kas-network-proxy-gcb/cors.txt b/audit/projects/k8s-staging-kas-network-proxy/buckets/k8s-staging-kas-network-proxy-gcb/cors.txt deleted file mode 100644 index e1aa4955bf89..000000000000 --- a/audit/projects/k8s-staging-kas-network-proxy/buckets/k8s-staging-kas-network-proxy-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-kas-network-proxy-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-kas-network-proxy/buckets/k8s-staging-kas-network-proxy-gcb/iam.json b/audit/projects/k8s-staging-kas-network-proxy/buckets/k8s-staging-kas-network-proxy-gcb/iam.json deleted file mode 100644 index 01292e3f9136..000000000000 --- a/audit/projects/k8s-staging-kas-network-proxy/buckets/k8s-staging-kas-network-proxy-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-kas-network-proxy", - "projectOwner:k8s-staging-kas-network-proxy" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-kas-network-proxy" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-kas-network-proxy@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-kas-network-proxy@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-kas-network-proxy/buckets/k8s-staging-kas-network-proxy-gcb/logging.txt b/audit/projects/k8s-staging-kas-network-proxy/buckets/k8s-staging-kas-network-proxy-gcb/logging.txt deleted file mode 100644 index 8daaf77f2fd8..000000000000 --- a/audit/projects/k8s-staging-kas-network-proxy/buckets/k8s-staging-kas-network-proxy-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-kas-network-proxy-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-kas-network-proxy/buckets/k8s-staging-kas-network-proxy/bucketpolicyonly.txt b/audit/projects/k8s-staging-kas-network-proxy/buckets/k8s-staging-kas-network-proxy/bucketpolicyonly.txt deleted file mode 100644 index 8d4df854aa15..000000000000 --- a/audit/projects/k8s-staging-kas-network-proxy/buckets/k8s-staging-kas-network-proxy/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-kas-network-proxy: - Enabled: True - LockedTime: 2020-02-03 17:46:48.221000+00:00 - diff --git a/audit/projects/k8s-staging-kas-network-proxy/buckets/k8s-staging-kas-network-proxy/cors.txt b/audit/projects/k8s-staging-kas-network-proxy/buckets/k8s-staging-kas-network-proxy/cors.txt deleted file mode 100644 index b6d3a0534087..000000000000 --- a/audit/projects/k8s-staging-kas-network-proxy/buckets/k8s-staging-kas-network-proxy/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-kas-network-proxy/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-kas-network-proxy/buckets/k8s-staging-kas-network-proxy/iam.json b/audit/projects/k8s-staging-kas-network-proxy/buckets/k8s-staging-kas-network-proxy/iam.json deleted file mode 100644 index ae7bb986a8de..000000000000 --- a/audit/projects/k8s-staging-kas-network-proxy/buckets/k8s-staging-kas-network-proxy/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-kas-network-proxy", - "projectOwner:k8s-staging-kas-network-proxy" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-kas-network-proxy" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-kas-network-proxy@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-kas-network-proxy@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-kas-network-proxy/buckets/k8s-staging-kas-network-proxy/logging.txt b/audit/projects/k8s-staging-kas-network-proxy/buckets/k8s-staging-kas-network-proxy/logging.txt deleted file mode 100644 index a3eec1dd91fe..000000000000 --- a/audit/projects/k8s-staging-kas-network-proxy/buckets/k8s-staging-kas-network-proxy/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-kas-network-proxy/ has no logging configuration. diff --git a/audit/projects/k8s-staging-kas-network-proxy/description.json b/audit/projects/k8s-staging-kas-network-proxy/description.json deleted file mode 100644 index daa3cf3c8f85..000000000000 --- a/audit/projects/k8s-staging-kas-network-proxy/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2019-11-05T17:45:45.613Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-kas-network-proxy", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-kas-network-proxy", - "projectNumber": "670598002495" -} diff --git a/audit/projects/k8s-staging-kas-network-proxy/iam.json b/audit/projects/k8s-staging-kas-network-proxy/iam.json deleted file mode 100644 index 2e8c6549dc6f..000000000000 --- a/audit/projects/k8s-staging-kas-network-proxy/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:670598002495@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-kas-network-proxy@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-670598002495@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-670598002495@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-670598002495@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-670598002495@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-kas-network-proxy@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-kas-network-proxy@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-kas-network-proxy/services/enabled.txt b/audit/projects/k8s-staging-kas-network-proxy/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-kas-network-proxy/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-kind/buckets/artifacts.k8s-staging-kind.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-kind/buckets/artifacts.k8s-staging-kind.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 7edaa30342f5..000000000000 --- a/audit/projects/k8s-staging-kind/buckets/artifacts.k8s-staging-kind.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-kind.appspot.com: - Enabled: True - LockedTime: 2020-07-14 00:28:37.325000+00:00 - diff --git a/audit/projects/k8s-staging-kind/buckets/artifacts.k8s-staging-kind.appspot.com/cors.txt b/audit/projects/k8s-staging-kind/buckets/artifacts.k8s-staging-kind.appspot.com/cors.txt deleted file mode 100644 index 125307ac41e3..000000000000 --- a/audit/projects/k8s-staging-kind/buckets/artifacts.k8s-staging-kind.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-kind.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-kind/buckets/artifacts.k8s-staging-kind.appspot.com/iam.json b/audit/projects/k8s-staging-kind/buckets/artifacts.k8s-staging-kind.appspot.com/iam.json deleted file mode 100644 index 4bc4c869a4cc..000000000000 --- a/audit/projects/k8s-staging-kind/buckets/artifacts.k8s-staging-kind.appspot.com/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-kind", - "projectOwner:k8s-staging-kind" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-kind" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-kind@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-kind@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-kind/buckets/artifacts.k8s-staging-kind.appspot.com/logging.txt b/audit/projects/k8s-staging-kind/buckets/artifacts.k8s-staging-kind.appspot.com/logging.txt deleted file mode 100644 index 6637e0bbf956..000000000000 --- a/audit/projects/k8s-staging-kind/buckets/artifacts.k8s-staging-kind.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-kind.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-kind/buckets/k8s-staging-kind-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-kind/buckets/k8s-staging-kind-gcb/bucketpolicyonly.txt deleted file mode 100644 index 1767e8626aa3..000000000000 --- a/audit/projects/k8s-staging-kind/buckets/k8s-staging-kind-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-kind-gcb: - Enabled: True - LockedTime: 2020-07-14 00:29:20.840000+00:00 - diff --git a/audit/projects/k8s-staging-kind/buckets/k8s-staging-kind-gcb/cors.txt b/audit/projects/k8s-staging-kind/buckets/k8s-staging-kind-gcb/cors.txt deleted file mode 100644 index 652b332d6ce5..000000000000 --- a/audit/projects/k8s-staging-kind/buckets/k8s-staging-kind-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-kind-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-kind/buckets/k8s-staging-kind-gcb/iam.json b/audit/projects/k8s-staging-kind/buckets/k8s-staging-kind-gcb/iam.json deleted file mode 100644 index c599a5ba7bc1..000000000000 --- a/audit/projects/k8s-staging-kind/buckets/k8s-staging-kind-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-kind", - "projectOwner:k8s-staging-kind" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-kind" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-kind@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-kind@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-kind/buckets/k8s-staging-kind-gcb/logging.txt b/audit/projects/k8s-staging-kind/buckets/k8s-staging-kind-gcb/logging.txt deleted file mode 100644 index dcf93c8e96ed..000000000000 --- a/audit/projects/k8s-staging-kind/buckets/k8s-staging-kind-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-kind-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-kind/buckets/k8s-staging-kind/bucketpolicyonly.txt b/audit/projects/k8s-staging-kind/buckets/k8s-staging-kind/bucketpolicyonly.txt deleted file mode 100644 index 9686c04b2f40..000000000000 --- a/audit/projects/k8s-staging-kind/buckets/k8s-staging-kind/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-kind: - Enabled: True - LockedTime: 2020-07-14 00:29:00.126000+00:00 - diff --git a/audit/projects/k8s-staging-kind/buckets/k8s-staging-kind/cors.txt b/audit/projects/k8s-staging-kind/buckets/k8s-staging-kind/cors.txt deleted file mode 100644 index 43c639152c1a..000000000000 --- a/audit/projects/k8s-staging-kind/buckets/k8s-staging-kind/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-kind/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-kind/buckets/k8s-staging-kind/iam.json b/audit/projects/k8s-staging-kind/buckets/k8s-staging-kind/iam.json deleted file mode 100644 index 4bc4c869a4cc..000000000000 --- a/audit/projects/k8s-staging-kind/buckets/k8s-staging-kind/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-kind", - "projectOwner:k8s-staging-kind" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-kind" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-kind@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-kind@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-kind/buckets/k8s-staging-kind/logging.txt b/audit/projects/k8s-staging-kind/buckets/k8s-staging-kind/logging.txt deleted file mode 100644 index 26cb9797e5b8..000000000000 --- a/audit/projects/k8s-staging-kind/buckets/k8s-staging-kind/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-kind/ has no logging configuration. diff --git a/audit/projects/k8s-staging-kind/description.json b/audit/projects/k8s-staging-kind/description.json deleted file mode 100644 index 24535c7ded50..000000000000 --- a/audit/projects/k8s-staging-kind/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-04-15T00:27:38.298Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-kind", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-kind", - "projectNumber": "220811308229" -} diff --git a/audit/projects/k8s-staging-kind/iam.json b/audit/projects/k8s-staging-kind/iam.json deleted file mode 100644 index bc341d60da35..000000000000 --- a/audit/projects/k8s-staging-kind/iam.json +++ /dev/null @@ -1,69 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:220811308229@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-kind@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-220811308229@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-220811308229@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-220811308229@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-220811308229@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-kind@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-release-viewers@kubernetes.io", - "group:k8s-infra-staging-kind@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-kind/services/enabled.txt b/audit/projects/k8s-staging-kind/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-kind/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-kops/buckets/artifacts.k8s-staging-kops.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-kops/buckets/artifacts.k8s-staging-kops.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 47c5b225d93b..000000000000 --- a/audit/projects/k8s-staging-kops/buckets/artifacts.k8s-staging-kops.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-kops.appspot.com: - Enabled: True - LockedTime: 2019-08-07 00:13:26.130000+00:00 - diff --git a/audit/projects/k8s-staging-kops/buckets/artifacts.k8s-staging-kops.appspot.com/cors.txt b/audit/projects/k8s-staging-kops/buckets/artifacts.k8s-staging-kops.appspot.com/cors.txt deleted file mode 100644 index ad9038f618f3..000000000000 --- a/audit/projects/k8s-staging-kops/buckets/artifacts.k8s-staging-kops.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-kops.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-kops/buckets/artifacts.k8s-staging-kops.appspot.com/iam.json b/audit/projects/k8s-staging-kops/buckets/artifacts.k8s-staging-kops.appspot.com/iam.json deleted file mode 100644 index 9faf204d6f5d..000000000000 --- a/audit/projects/k8s-staging-kops/buckets/artifacts.k8s-staging-kops.appspot.com/iam.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-kops", - "projectOwner:k8s-staging-kops" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-kops@kubernetes.io", - "projectViewer:k8s-staging-kops" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-kops@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-kops@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-kops/buckets/artifacts.k8s-staging-kops.appspot.com/logging.txt b/audit/projects/k8s-staging-kops/buckets/artifacts.k8s-staging-kops.appspot.com/logging.txt deleted file mode 100644 index a92ed3c88dd0..000000000000 --- a/audit/projects/k8s-staging-kops/buckets/artifacts.k8s-staging-kops.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-kops.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-kops/buckets/k8s-staging-kops-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-kops/buckets/k8s-staging-kops-gcb/bucketpolicyonly.txt deleted file mode 100644 index dd1715a146b6..000000000000 --- a/audit/projects/k8s-staging-kops/buckets/k8s-staging-kops-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-kops-gcb: - Enabled: True - LockedTime: 2019-12-10 16:27:19.810000+00:00 - diff --git a/audit/projects/k8s-staging-kops/buckets/k8s-staging-kops-gcb/cors.txt b/audit/projects/k8s-staging-kops/buckets/k8s-staging-kops-gcb/cors.txt deleted file mode 100644 index d9bbb45254bb..000000000000 --- a/audit/projects/k8s-staging-kops/buckets/k8s-staging-kops-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-kops-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-kops/buckets/k8s-staging-kops-gcb/iam.json b/audit/projects/k8s-staging-kops/buckets/k8s-staging-kops-gcb/iam.json deleted file mode 100644 index 7bf36fdd34bc..000000000000 --- a/audit/projects/k8s-staging-kops/buckets/k8s-staging-kops-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-kops", - "projectOwner:k8s-staging-kops" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-kops" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-kops@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-kops@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-kops/buckets/k8s-staging-kops-gcb/logging.txt b/audit/projects/k8s-staging-kops/buckets/k8s-staging-kops-gcb/logging.txt deleted file mode 100644 index 06e9b2ba6193..000000000000 --- a/audit/projects/k8s-staging-kops/buckets/k8s-staging-kops-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-kops-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-kops/buckets/k8s-staging-kops/bucketpolicyonly.txt b/audit/projects/k8s-staging-kops/buckets/k8s-staging-kops/bucketpolicyonly.txt deleted file mode 100644 index a051d08bb64c..000000000000 --- a/audit/projects/k8s-staging-kops/buckets/k8s-staging-kops/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-kops: - Enabled: True - LockedTime: 2019-10-06 19:40:59.218000+00:00 - diff --git a/audit/projects/k8s-staging-kops/buckets/k8s-staging-kops/cors.txt b/audit/projects/k8s-staging-kops/buckets/k8s-staging-kops/cors.txt deleted file mode 100644 index c17de828edb7..000000000000 --- a/audit/projects/k8s-staging-kops/buckets/k8s-staging-kops/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-kops/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-kops/buckets/k8s-staging-kops/iam.json b/audit/projects/k8s-staging-kops/buckets/k8s-staging-kops/iam.json deleted file mode 100644 index a5aae3ca1fac..000000000000 --- a/audit/projects/k8s-staging-kops/buckets/k8s-staging-kops/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-kops", - "projectOwner:k8s-staging-kops" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-kops" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-kops@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-kops@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-kops/buckets/k8s-staging-kops/logging.txt b/audit/projects/k8s-staging-kops/buckets/k8s-staging-kops/logging.txt deleted file mode 100644 index d7c198135e7b..000000000000 --- a/audit/projects/k8s-staging-kops/buckets/k8s-staging-kops/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-kops/ has no logging configuration. diff --git a/audit/projects/k8s-staging-kops/description.json b/audit/projects/k8s-staging-kops/description.json deleted file mode 100644 index 85adf10730e5..000000000000 --- a/audit/projects/k8s-staging-kops/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2019-05-09T00:12:41.418Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-kops", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-kops", - "projectNumber": "889470918518" -} diff --git a/audit/projects/k8s-staging-kops/iam.json b/audit/projects/k8s-staging-kops/iam.json deleted file mode 100644 index 8087c78e48e9..000000000000 --- a/audit/projects/k8s-staging-kops/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:889470918518@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-kops@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-889470918518@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-889470918518@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-889470918518@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-889470918518@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-kops@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-kops@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-kops/services/bigquery/bigquery.datasets.json b/audit/projects/k8s-staging-kops/services/bigquery/bigquery.datasets.json deleted file mode 100644 index e69de29bb2d1..000000000000 diff --git a/audit/projects/k8s-staging-kops/services/enabled.txt b/audit/projects/k8s-staging-kops/services/enabled.txt deleted file mode 100644 index 49f45ad48950..000000000000 --- a/audit/projects/k8s-staging-kops/services/enabled.txt +++ /dev/null @@ -1,22 +0,0 @@ -NAME TITLE -bigquery.googleapis.com BigQuery API -bigquery.googleapis.com BigQuery API -bigquerystorage.googleapis.com BigQuery Storage API -cloudapis.googleapis.com Google Cloud APIs -cloudbuild.googleapis.com Cloud Build API -clouddebugger.googleapis.com Cloud Debugger API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -cloudtrace.googleapis.com Cloud Trace API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -datastore.googleapis.com Cloud Datastore API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -servicemanagement.googleapis.com Service Management API -serviceusage.googleapis.com Service Usage API -sql-component.googleapis.com Cloud SQL -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-kube-state-metrics/buckets/artifacts.k8s-staging-kube-state-metrics.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-kube-state-metrics/buckets/artifacts.k8s-staging-kube-state-metrics.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 19df9a957c3a..000000000000 --- a/audit/projects/k8s-staging-kube-state-metrics/buckets/artifacts.k8s-staging-kube-state-metrics.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-kube-state-metrics.appspot.com: - Enabled: True - LockedTime: 2020-07-30 05:52:44.234000+00:00 - diff --git a/audit/projects/k8s-staging-kube-state-metrics/buckets/artifacts.k8s-staging-kube-state-metrics.appspot.com/cors.txt b/audit/projects/k8s-staging-kube-state-metrics/buckets/artifacts.k8s-staging-kube-state-metrics.appspot.com/cors.txt deleted file mode 100644 index dc266360bbb1..000000000000 --- a/audit/projects/k8s-staging-kube-state-metrics/buckets/artifacts.k8s-staging-kube-state-metrics.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-kube-state-metrics.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-kube-state-metrics/buckets/artifacts.k8s-staging-kube-state-metrics.appspot.com/iam.json b/audit/projects/k8s-staging-kube-state-metrics/buckets/artifacts.k8s-staging-kube-state-metrics.appspot.com/iam.json deleted file mode 100644 index a66f96e59d51..000000000000 --- a/audit/projects/k8s-staging-kube-state-metrics/buckets/artifacts.k8s-staging-kube-state-metrics.appspot.com/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-kube-state-metrics", - "projectOwner:k8s-staging-kube-state-metrics" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-kube-state-metrics" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-kube-state-metrics@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-kube-state-metrics@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-kube-state-metrics/buckets/artifacts.k8s-staging-kube-state-metrics.appspot.com/logging.txt b/audit/projects/k8s-staging-kube-state-metrics/buckets/artifacts.k8s-staging-kube-state-metrics.appspot.com/logging.txt deleted file mode 100644 index 514ed11b8594..000000000000 --- a/audit/projects/k8s-staging-kube-state-metrics/buckets/artifacts.k8s-staging-kube-state-metrics.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-kube-state-metrics.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-kube-state-metrics/buckets/k8s-staging-kube-state-metrics-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-kube-state-metrics/buckets/k8s-staging-kube-state-metrics-gcb/bucketpolicyonly.txt deleted file mode 100644 index 81418359f931..000000000000 --- a/audit/projects/k8s-staging-kube-state-metrics/buckets/k8s-staging-kube-state-metrics-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-kube-state-metrics-gcb: - Enabled: True - LockedTime: 2020-01-20 16:08:26.246000+00:00 - diff --git a/audit/projects/k8s-staging-kube-state-metrics/buckets/k8s-staging-kube-state-metrics-gcb/cors.txt b/audit/projects/k8s-staging-kube-state-metrics/buckets/k8s-staging-kube-state-metrics-gcb/cors.txt deleted file mode 100644 index 63b78e4807e2..000000000000 --- a/audit/projects/k8s-staging-kube-state-metrics/buckets/k8s-staging-kube-state-metrics-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-kube-state-metrics-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-kube-state-metrics/buckets/k8s-staging-kube-state-metrics-gcb/iam.json b/audit/projects/k8s-staging-kube-state-metrics/buckets/k8s-staging-kube-state-metrics-gcb/iam.json deleted file mode 100644 index 46160a0e600d..000000000000 --- a/audit/projects/k8s-staging-kube-state-metrics/buckets/k8s-staging-kube-state-metrics-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-kube-state-metrics", - "projectOwner:k8s-staging-kube-state-metrics" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-kube-state-metrics" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-kube-state-metrics@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-kube-state-metrics@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-kube-state-metrics/buckets/k8s-staging-kube-state-metrics-gcb/logging.txt b/audit/projects/k8s-staging-kube-state-metrics/buckets/k8s-staging-kube-state-metrics-gcb/logging.txt deleted file mode 100644 index 5f7d567f25f9..000000000000 --- a/audit/projects/k8s-staging-kube-state-metrics/buckets/k8s-staging-kube-state-metrics-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-kube-state-metrics-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-kube-state-metrics/buckets/k8s-staging-kube-state-metrics/bucketpolicyonly.txt b/audit/projects/k8s-staging-kube-state-metrics/buckets/k8s-staging-kube-state-metrics/bucketpolicyonly.txt deleted file mode 100644 index 26c0872f92f8..000000000000 --- a/audit/projects/k8s-staging-kube-state-metrics/buckets/k8s-staging-kube-state-metrics/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-kube-state-metrics: - Enabled: True - LockedTime: 2020-01-20 16:07:43.083000+00:00 - diff --git a/audit/projects/k8s-staging-kube-state-metrics/buckets/k8s-staging-kube-state-metrics/cors.txt b/audit/projects/k8s-staging-kube-state-metrics/buckets/k8s-staging-kube-state-metrics/cors.txt deleted file mode 100644 index 50462d8e1d13..000000000000 --- a/audit/projects/k8s-staging-kube-state-metrics/buckets/k8s-staging-kube-state-metrics/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-kube-state-metrics/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-kube-state-metrics/buckets/k8s-staging-kube-state-metrics/iam.json b/audit/projects/k8s-staging-kube-state-metrics/buckets/k8s-staging-kube-state-metrics/iam.json deleted file mode 100644 index a66f96e59d51..000000000000 --- a/audit/projects/k8s-staging-kube-state-metrics/buckets/k8s-staging-kube-state-metrics/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-kube-state-metrics", - "projectOwner:k8s-staging-kube-state-metrics" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-kube-state-metrics" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-kube-state-metrics@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-kube-state-metrics@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-kube-state-metrics/buckets/k8s-staging-kube-state-metrics/logging.txt b/audit/projects/k8s-staging-kube-state-metrics/buckets/k8s-staging-kube-state-metrics/logging.txt deleted file mode 100644 index d2fbb0595f10..000000000000 --- a/audit/projects/k8s-staging-kube-state-metrics/buckets/k8s-staging-kube-state-metrics/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-kube-state-metrics/ has no logging configuration. diff --git a/audit/projects/k8s-staging-kube-state-metrics/description.json b/audit/projects/k8s-staging-kube-state-metrics/description.json deleted file mode 100644 index 1a66820d7496..000000000000 --- a/audit/projects/k8s-staging-kube-state-metrics/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2019-10-22T15:44:31.409Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-kube-state-metrics", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-kube-state-metrics", - "projectNumber": "1023797992882" -} diff --git a/audit/projects/k8s-staging-kube-state-metrics/iam.json b/audit/projects/k8s-staging-kube-state-metrics/iam.json deleted file mode 100644 index 2bcb33277662..000000000000 --- a/audit/projects/k8s-staging-kube-state-metrics/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:1023797992882@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-kube-state-metrics@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-1023797992882@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-1023797992882@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-1023797992882@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-1023797992882@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-kube-state-metrics@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-kube-state-metrics@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-kube-state-metrics/services/enabled.txt b/audit/projects/k8s-staging-kube-state-metrics/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-kube-state-metrics/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-kubeadm/buckets/artifacts.k8s-staging-kubeadm.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-kubeadm/buckets/artifacts.k8s-staging-kubeadm.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 46ba3bb2ba78..000000000000 --- a/audit/projects/k8s-staging-kubeadm/buckets/artifacts.k8s-staging-kubeadm.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-kubeadm.appspot.com: - Enabled: True - LockedTime: 2020-03-05 22:33:51.020000+00:00 - diff --git a/audit/projects/k8s-staging-kubeadm/buckets/artifacts.k8s-staging-kubeadm.appspot.com/cors.txt b/audit/projects/k8s-staging-kubeadm/buckets/artifacts.k8s-staging-kubeadm.appspot.com/cors.txt deleted file mode 100644 index 02d0a9179dfd..000000000000 --- a/audit/projects/k8s-staging-kubeadm/buckets/artifacts.k8s-staging-kubeadm.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-kubeadm.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-kubeadm/buckets/artifacts.k8s-staging-kubeadm.appspot.com/iam.json b/audit/projects/k8s-staging-kubeadm/buckets/artifacts.k8s-staging-kubeadm.appspot.com/iam.json deleted file mode 100644 index f759ae034bb5..000000000000 --- a/audit/projects/k8s-staging-kubeadm/buckets/artifacts.k8s-staging-kubeadm.appspot.com/iam.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-kubeadm", - "projectOwner:k8s-staging-kubeadm" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-kubeadm@kubernetes.io", - "projectViewer:k8s-staging-kubeadm" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-kubeadm@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-kubeadm@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-kubeadm/buckets/artifacts.k8s-staging-kubeadm.appspot.com/logging.txt b/audit/projects/k8s-staging-kubeadm/buckets/artifacts.k8s-staging-kubeadm.appspot.com/logging.txt deleted file mode 100644 index 40f26e348e4a..000000000000 --- a/audit/projects/k8s-staging-kubeadm/buckets/artifacts.k8s-staging-kubeadm.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-kubeadm.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-kubeadm/buckets/k8s-staging-kubeadm-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-kubeadm/buckets/k8s-staging-kubeadm-gcb/bucketpolicyonly.txt deleted file mode 100644 index bb9f44fbe02e..000000000000 --- a/audit/projects/k8s-staging-kubeadm/buckets/k8s-staging-kubeadm-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-kubeadm-gcb: - Enabled: True - LockedTime: 2020-03-05 22:34:24.529000+00:00 - diff --git a/audit/projects/k8s-staging-kubeadm/buckets/k8s-staging-kubeadm-gcb/cors.txt b/audit/projects/k8s-staging-kubeadm/buckets/k8s-staging-kubeadm-gcb/cors.txt deleted file mode 100644 index 014a7fd04547..000000000000 --- a/audit/projects/k8s-staging-kubeadm/buckets/k8s-staging-kubeadm-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-kubeadm-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-kubeadm/buckets/k8s-staging-kubeadm-gcb/iam.json b/audit/projects/k8s-staging-kubeadm/buckets/k8s-staging-kubeadm-gcb/iam.json deleted file mode 100644 index 0c5028f020ea..000000000000 --- a/audit/projects/k8s-staging-kubeadm/buckets/k8s-staging-kubeadm-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-kubeadm", - "projectOwner:k8s-staging-kubeadm" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-kubeadm" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-kubeadm@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-kubeadm@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-kubeadm/buckets/k8s-staging-kubeadm-gcb/logging.txt b/audit/projects/k8s-staging-kubeadm/buckets/k8s-staging-kubeadm-gcb/logging.txt deleted file mode 100644 index dc08cc4cff3d..000000000000 --- a/audit/projects/k8s-staging-kubeadm/buckets/k8s-staging-kubeadm-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-kubeadm-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-kubeadm/buckets/k8s-staging-kubeadm/bucketpolicyonly.txt b/audit/projects/k8s-staging-kubeadm/buckets/k8s-staging-kubeadm/bucketpolicyonly.txt deleted file mode 100644 index 4a75813aa909..000000000000 --- a/audit/projects/k8s-staging-kubeadm/buckets/k8s-staging-kubeadm/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-kubeadm: - Enabled: True - LockedTime: 2020-03-05 22:34:09.517000+00:00 - diff --git a/audit/projects/k8s-staging-kubeadm/buckets/k8s-staging-kubeadm/cors.txt b/audit/projects/k8s-staging-kubeadm/buckets/k8s-staging-kubeadm/cors.txt deleted file mode 100644 index 7cacbc2336a7..000000000000 --- a/audit/projects/k8s-staging-kubeadm/buckets/k8s-staging-kubeadm/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-kubeadm/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-kubeadm/buckets/k8s-staging-kubeadm/iam.json b/audit/projects/k8s-staging-kubeadm/buckets/k8s-staging-kubeadm/iam.json deleted file mode 100644 index 7523018e26bf..000000000000 --- a/audit/projects/k8s-staging-kubeadm/buckets/k8s-staging-kubeadm/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-kubeadm", - "projectOwner:k8s-staging-kubeadm" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-kubeadm" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-kubeadm@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-kubeadm@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-kubeadm/buckets/k8s-staging-kubeadm/logging.txt b/audit/projects/k8s-staging-kubeadm/buckets/k8s-staging-kubeadm/logging.txt deleted file mode 100644 index 1f9a38662b35..000000000000 --- a/audit/projects/k8s-staging-kubeadm/buckets/k8s-staging-kubeadm/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-kubeadm/ has no logging configuration. diff --git a/audit/projects/k8s-staging-kubeadm/description.json b/audit/projects/k8s-staging-kubeadm/description.json deleted file mode 100644 index 037520c3546f..000000000000 --- a/audit/projects/k8s-staging-kubeadm/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2019-12-06T22:32:58.241Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-kubeadm", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-kubeadm", - "projectNumber": "487125676961" -} diff --git a/audit/projects/k8s-staging-kubeadm/iam.json b/audit/projects/k8s-staging-kubeadm/iam.json deleted file mode 100644 index 778b4ab54148..000000000000 --- a/audit/projects/k8s-staging-kubeadm/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:487125676961@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-kubeadm@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-487125676961@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-487125676961@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-487125676961@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-487125676961@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-kubeadm@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-kubeadm@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-kubeadm/services/enabled.txt b/audit/projects/k8s-staging-kubeadm/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-kubeadm/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-kubernetes/buckets/artifacts.k8s-staging-kubernetes.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-kubernetes/buckets/artifacts.k8s-staging-kubernetes.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 6ce0ab631b45..000000000000 --- a/audit/projects/k8s-staging-kubernetes/buckets/artifacts.k8s-staging-kubernetes.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-kubernetes.appspot.com: - Enabled: True - LockedTime: 2020-06-04 23:30:24.021000+00:00 - diff --git a/audit/projects/k8s-staging-kubernetes/buckets/artifacts.k8s-staging-kubernetes.appspot.com/cors.txt b/audit/projects/k8s-staging-kubernetes/buckets/artifacts.k8s-staging-kubernetes.appspot.com/cors.txt deleted file mode 100644 index 68e6f86c2fa9..000000000000 --- a/audit/projects/k8s-staging-kubernetes/buckets/artifacts.k8s-staging-kubernetes.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-kubernetes.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-kubernetes/buckets/artifacts.k8s-staging-kubernetes.appspot.com/iam.json b/audit/projects/k8s-staging-kubernetes/buckets/artifacts.k8s-staging-kubernetes.appspot.com/iam.json deleted file mode 100644 index 981a8b06f4be..000000000000 --- a/audit/projects/k8s-staging-kubernetes/buckets/artifacts.k8s-staging-kubernetes.appspot.com/iam.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-kubernetes", - "projectOwner:k8s-staging-kubernetes", - "serviceAccount:648026197307@cloudbuild.gserviceaccount.com" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-kubernetes@kubernetes.io", - "projectViewer:k8s-staging-kubernetes" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-kubernetes@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-kubernetes@kubernetes.io", - "serviceAccount:648026197307@cloudbuild.gserviceaccount.com" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-kubernetes/buckets/artifacts.k8s-staging-kubernetes.appspot.com/logging.txt b/audit/projects/k8s-staging-kubernetes/buckets/artifacts.k8s-staging-kubernetes.appspot.com/logging.txt deleted file mode 100644 index 57bf50db1bdb..000000000000 --- a/audit/projects/k8s-staging-kubernetes/buckets/artifacts.k8s-staging-kubernetes.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-kubernetes.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-kubernetes/buckets/k8s-staging-kubernetes-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-kubernetes/buckets/k8s-staging-kubernetes-gcb/bucketpolicyonly.txt deleted file mode 100644 index b8d89f3cb16f..000000000000 --- a/audit/projects/k8s-staging-kubernetes/buckets/k8s-staging-kubernetes-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-kubernetes-gcb: - Enabled: True - LockedTime: 2020-06-04 23:31:00.823000+00:00 - diff --git a/audit/projects/k8s-staging-kubernetes/buckets/k8s-staging-kubernetes-gcb/cors.txt b/audit/projects/k8s-staging-kubernetes/buckets/k8s-staging-kubernetes-gcb/cors.txt deleted file mode 100644 index dcf755850123..000000000000 --- a/audit/projects/k8s-staging-kubernetes/buckets/k8s-staging-kubernetes-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-kubernetes-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-kubernetes/buckets/k8s-staging-kubernetes-gcb/iam.json b/audit/projects/k8s-staging-kubernetes/buckets/k8s-staging-kubernetes-gcb/iam.json deleted file mode 100644 index c79066ea28f6..000000000000 --- a/audit/projects/k8s-staging-kubernetes/buckets/k8s-staging-kubernetes-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-kubernetes", - "projectOwner:k8s-staging-kubernetes" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-kubernetes" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-kubernetes@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-kubernetes@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-kubernetes/buckets/k8s-staging-kubernetes-gcb/logging.txt b/audit/projects/k8s-staging-kubernetes/buckets/k8s-staging-kubernetes-gcb/logging.txt deleted file mode 100644 index 69331fc3ee04..000000000000 --- a/audit/projects/k8s-staging-kubernetes/buckets/k8s-staging-kubernetes-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-kubernetes-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-kubernetes/buckets/k8s-staging-kubernetes/bucketpolicyonly.txt b/audit/projects/k8s-staging-kubernetes/buckets/k8s-staging-kubernetes/bucketpolicyonly.txt deleted file mode 100644 index 83dba5f8e12a..000000000000 --- a/audit/projects/k8s-staging-kubernetes/buckets/k8s-staging-kubernetes/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-kubernetes: - Enabled: True - LockedTime: 2020-06-04 23:30:44.022000+00:00 - diff --git a/audit/projects/k8s-staging-kubernetes/buckets/k8s-staging-kubernetes/cors.txt b/audit/projects/k8s-staging-kubernetes/buckets/k8s-staging-kubernetes/cors.txt deleted file mode 100644 index 9376290d23fe..000000000000 --- a/audit/projects/k8s-staging-kubernetes/buckets/k8s-staging-kubernetes/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-kubernetes/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-kubernetes/buckets/k8s-staging-kubernetes/iam.json b/audit/projects/k8s-staging-kubernetes/buckets/k8s-staging-kubernetes/iam.json deleted file mode 100644 index ba0fe58b11cb..000000000000 --- a/audit/projects/k8s-staging-kubernetes/buckets/k8s-staging-kubernetes/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-kubernetes", - "projectOwner:k8s-staging-kubernetes" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-kubernetes" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-kubernetes@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-kubernetes@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-kubernetes/buckets/k8s-staging-kubernetes/logging.txt b/audit/projects/k8s-staging-kubernetes/buckets/k8s-staging-kubernetes/logging.txt deleted file mode 100644 index 551e9a4c23d4..000000000000 --- a/audit/projects/k8s-staging-kubernetes/buckets/k8s-staging-kubernetes/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-kubernetes/ has no logging configuration. diff --git a/audit/projects/k8s-staging-kubernetes/description.json b/audit/projects/k8s-staging-kubernetes/description.json deleted file mode 100644 index a0695afb0980..000000000000 --- a/audit/projects/k8s-staging-kubernetes/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-03-06T23:29:41.824Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-kubernetes", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-kubernetes", - "projectNumber": "615281671549" -} diff --git a/audit/projects/k8s-staging-kubernetes/iam.json b/audit/projects/k8s-staging-kubernetes/iam.json deleted file mode 100644 index 559c1720f33c..000000000000 --- a/audit/projects/k8s-staging-kubernetes/iam.json +++ /dev/null @@ -1,69 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:615281671549@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-kubernetes@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-615281671549@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-615281671549@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-615281671549@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-615281671549@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-kubernetes@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-release-viewers@kubernetes.io", - "group:k8s-infra-staging-kubernetes@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-kubernetes/services/enabled.txt b/audit/projects/k8s-staging-kubernetes/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-kubernetes/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-kustomize/buckets/artifacts.k8s-staging-kustomize.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-kustomize/buckets/artifacts.k8s-staging-kustomize.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index c0ef82c6b964..000000000000 --- a/audit/projects/k8s-staging-kustomize/buckets/artifacts.k8s-staging-kustomize.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-kustomize.appspot.com: - Enabled: True - LockedTime: 2021-01-25 18:42:25.857000+00:00 - diff --git a/audit/projects/k8s-staging-kustomize/buckets/artifacts.k8s-staging-kustomize.appspot.com/cors.txt b/audit/projects/k8s-staging-kustomize/buckets/artifacts.k8s-staging-kustomize.appspot.com/cors.txt deleted file mode 100644 index 59c114238c97..000000000000 --- a/audit/projects/k8s-staging-kustomize/buckets/artifacts.k8s-staging-kustomize.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-kustomize.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-kustomize/buckets/artifacts.k8s-staging-kustomize.appspot.com/iam.json b/audit/projects/k8s-staging-kustomize/buckets/artifacts.k8s-staging-kustomize.appspot.com/iam.json deleted file mode 100644 index 46edb1d92a9e..000000000000 --- a/audit/projects/k8s-staging-kustomize/buckets/artifacts.k8s-staging-kustomize.appspot.com/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-kustomize", - "projectOwner:k8s-staging-kustomize" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-kustomize" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-kustomize@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-kustomize@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-kustomize/buckets/artifacts.k8s-staging-kustomize.appspot.com/logging.txt b/audit/projects/k8s-staging-kustomize/buckets/artifacts.k8s-staging-kustomize.appspot.com/logging.txt deleted file mode 100644 index a31db49fdc6a..000000000000 --- a/audit/projects/k8s-staging-kustomize/buckets/artifacts.k8s-staging-kustomize.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-kustomize.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize-gcb/bucketpolicyonly.txt deleted file mode 100644 index 1fc99e1784c6..000000000000 --- a/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-kustomize-gcb: - Enabled: True - LockedTime: 2021-01-25 18:43:08.140000+00:00 - diff --git a/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize-gcb/cors.txt b/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize-gcb/cors.txt deleted file mode 100644 index 623138683928..000000000000 --- a/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-kustomize-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize-gcb/iam.json b/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize-gcb/iam.json deleted file mode 100644 index 4feb9e803f32..000000000000 --- a/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-kustomize", - "projectOwner:k8s-staging-kustomize" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-kustomize" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-kustomize@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-kustomize@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize-gcb/logging.txt b/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize-gcb/logging.txt deleted file mode 100644 index 856263377260..000000000000 --- a/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-kustomize-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize/bucketpolicyonly.txt b/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize/bucketpolicyonly.txt deleted file mode 100644 index 7a220df16893..000000000000 --- a/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-kustomize: - Enabled: True - LockedTime: 2021-01-25 18:42:48.244000+00:00 - diff --git a/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize/cors.txt b/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize/cors.txt deleted file mode 100644 index 232d09724c6e..000000000000 --- a/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-kustomize/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize/iam.json b/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize/iam.json deleted file mode 100644 index 46edb1d92a9e..000000000000 --- a/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-kustomize", - "projectOwner:k8s-staging-kustomize" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-kustomize" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-kustomize@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-kustomize@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize/logging.txt b/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize/logging.txt deleted file mode 100644 index 002ff6fa4ef8..000000000000 --- a/audit/projects/k8s-staging-kustomize/buckets/k8s-staging-kustomize/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-kustomize/ has no logging configuration. diff --git a/audit/projects/k8s-staging-kustomize/description.json b/audit/projects/k8s-staging-kustomize/description.json deleted file mode 100644 index 71ce74c6c1eb..000000000000 --- a/audit/projects/k8s-staging-kustomize/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-10-27T18:41:33.326Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-kustomize", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-kustomize", - "projectNumber": "660796270509" -} diff --git a/audit/projects/k8s-staging-kustomize/iam.json b/audit/projects/k8s-staging-kustomize/iam.json deleted file mode 100644 index b40fbbaa08ba..000000000000 --- a/audit/projects/k8s-staging-kustomize/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:660796270509@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-kustomize@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-660796270509@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-660796270509@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-660796270509@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-660796270509@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-kustomize@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-kustomize@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-kustomize/services/enabled.txt b/audit/projects/k8s-staging-kustomize/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-kustomize/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-metrics-server/buckets/artifacts.k8s-staging-metrics-server.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-metrics-server/buckets/artifacts.k8s-staging-metrics-server.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index cecb2ae52e14..000000000000 --- a/audit/projects/k8s-staging-metrics-server/buckets/artifacts.k8s-staging-metrics-server.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-metrics-server.appspot.com: - Enabled: True - LockedTime: 2020-03-05 18:50:56.971000+00:00 - diff --git a/audit/projects/k8s-staging-metrics-server/buckets/artifacts.k8s-staging-metrics-server.appspot.com/cors.txt b/audit/projects/k8s-staging-metrics-server/buckets/artifacts.k8s-staging-metrics-server.appspot.com/cors.txt deleted file mode 100644 index 0ba64eb1c8c3..000000000000 --- a/audit/projects/k8s-staging-metrics-server/buckets/artifacts.k8s-staging-metrics-server.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-metrics-server.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-metrics-server/buckets/artifacts.k8s-staging-metrics-server.appspot.com/iam.json b/audit/projects/k8s-staging-metrics-server/buckets/artifacts.k8s-staging-metrics-server.appspot.com/iam.json deleted file mode 100644 index 594ad64dad26..000000000000 --- a/audit/projects/k8s-staging-metrics-server/buckets/artifacts.k8s-staging-metrics-server.appspot.com/iam.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-metrics-server", - "projectOwner:k8s-staging-metrics-server" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-metrics-server@kubernetes.io", - "projectViewer:k8s-staging-metrics-server" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-metrics-server@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-metrics-server@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-metrics-server/buckets/artifacts.k8s-staging-metrics-server.appspot.com/logging.txt b/audit/projects/k8s-staging-metrics-server/buckets/artifacts.k8s-staging-metrics-server.appspot.com/logging.txt deleted file mode 100644 index 3ab9bfaec2da..000000000000 --- a/audit/projects/k8s-staging-metrics-server/buckets/artifacts.k8s-staging-metrics-server.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-metrics-server.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-metrics-server/buckets/k8s-staging-metrics-server-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-metrics-server/buckets/k8s-staging-metrics-server-gcb/bucketpolicyonly.txt deleted file mode 100644 index 0222b92be9cf..000000000000 --- a/audit/projects/k8s-staging-metrics-server/buckets/k8s-staging-metrics-server-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-metrics-server-gcb: - Enabled: True - LockedTime: 2020-03-05 18:51:34.242000+00:00 - diff --git a/audit/projects/k8s-staging-metrics-server/buckets/k8s-staging-metrics-server-gcb/cors.txt b/audit/projects/k8s-staging-metrics-server/buckets/k8s-staging-metrics-server-gcb/cors.txt deleted file mode 100644 index bda8fa9f8373..000000000000 --- a/audit/projects/k8s-staging-metrics-server/buckets/k8s-staging-metrics-server-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-metrics-server-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-metrics-server/buckets/k8s-staging-metrics-server-gcb/iam.json b/audit/projects/k8s-staging-metrics-server/buckets/k8s-staging-metrics-server-gcb/iam.json deleted file mode 100644 index ba1cdb872883..000000000000 --- a/audit/projects/k8s-staging-metrics-server/buckets/k8s-staging-metrics-server-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-metrics-server", - "projectOwner:k8s-staging-metrics-server" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-metrics-server" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-metrics-server@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-metrics-server@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-metrics-server/buckets/k8s-staging-metrics-server-gcb/logging.txt b/audit/projects/k8s-staging-metrics-server/buckets/k8s-staging-metrics-server-gcb/logging.txt deleted file mode 100644 index 4596d176a853..000000000000 --- a/audit/projects/k8s-staging-metrics-server/buckets/k8s-staging-metrics-server-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-metrics-server-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-metrics-server/buckets/k8s-staging-metrics-server/bucketpolicyonly.txt b/audit/projects/k8s-staging-metrics-server/buckets/k8s-staging-metrics-server/bucketpolicyonly.txt deleted file mode 100644 index b85b147524be..000000000000 --- a/audit/projects/k8s-staging-metrics-server/buckets/k8s-staging-metrics-server/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-metrics-server: - Enabled: True - LockedTime: 2020-03-05 18:51:17.560000+00:00 - diff --git a/audit/projects/k8s-staging-metrics-server/buckets/k8s-staging-metrics-server/cors.txt b/audit/projects/k8s-staging-metrics-server/buckets/k8s-staging-metrics-server/cors.txt deleted file mode 100644 index b8fc6201be7b..000000000000 --- a/audit/projects/k8s-staging-metrics-server/buckets/k8s-staging-metrics-server/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-metrics-server/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-metrics-server/buckets/k8s-staging-metrics-server/iam.json b/audit/projects/k8s-staging-metrics-server/buckets/k8s-staging-metrics-server/iam.json deleted file mode 100644 index 7f4f14ec322b..000000000000 --- a/audit/projects/k8s-staging-metrics-server/buckets/k8s-staging-metrics-server/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-metrics-server", - "projectOwner:k8s-staging-metrics-server" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-metrics-server" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-metrics-server@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-metrics-server@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-metrics-server/buckets/k8s-staging-metrics-server/logging.txt b/audit/projects/k8s-staging-metrics-server/buckets/k8s-staging-metrics-server/logging.txt deleted file mode 100644 index cb9c7eb71be4..000000000000 --- a/audit/projects/k8s-staging-metrics-server/buckets/k8s-staging-metrics-server/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-metrics-server/ has no logging configuration. diff --git a/audit/projects/k8s-staging-metrics-server/description.json b/audit/projects/k8s-staging-metrics-server/description.json deleted file mode 100644 index 7f7a57f8dd87..000000000000 --- a/audit/projects/k8s-staging-metrics-server/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2019-12-06T18:50:07.060Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-metrics-server", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-metrics-server", - "projectNumber": "229033024066" -} diff --git a/audit/projects/k8s-staging-metrics-server/iam.json b/audit/projects/k8s-staging-metrics-server/iam.json deleted file mode 100644 index 93b3279985db..000000000000 --- a/audit/projects/k8s-staging-metrics-server/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:229033024066@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-metrics-server@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-229033024066@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-229033024066@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-229033024066@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-229033024066@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-metrics-server@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-metrics-server@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-metrics-server/services/enabled.txt b/audit/projects/k8s-staging-metrics-server/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-metrics-server/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-mirror/buckets/artifacts.k8s-staging-mirror.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-mirror/buckets/artifacts.k8s-staging-mirror.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 6633238d8c8f..000000000000 --- a/audit/projects/k8s-staging-mirror/buckets/artifacts.k8s-staging-mirror.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-mirror.appspot.com: - Enabled: True - LockedTime: 2021-02-19 00:11:17.239000+00:00 - diff --git a/audit/projects/k8s-staging-mirror/buckets/artifacts.k8s-staging-mirror.appspot.com/cors.txt b/audit/projects/k8s-staging-mirror/buckets/artifacts.k8s-staging-mirror.appspot.com/cors.txt deleted file mode 100644 index ffada8cf40d9..000000000000 --- a/audit/projects/k8s-staging-mirror/buckets/artifacts.k8s-staging-mirror.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-mirror.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-mirror/buckets/artifacts.k8s-staging-mirror.appspot.com/iam.json b/audit/projects/k8s-staging-mirror/buckets/artifacts.k8s-staging-mirror.appspot.com/iam.json deleted file mode 100644 index 74caa70de8e3..000000000000 --- a/audit/projects/k8s-staging-mirror/buckets/artifacts.k8s-staging-mirror.appspot.com/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-mirror", - "projectOwner:k8s-staging-mirror" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-mirror" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-mirror@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-mirror@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-mirror/buckets/artifacts.k8s-staging-mirror.appspot.com/logging.txt b/audit/projects/k8s-staging-mirror/buckets/artifacts.k8s-staging-mirror.appspot.com/logging.txt deleted file mode 100644 index 93e4e24231c5..000000000000 --- a/audit/projects/k8s-staging-mirror/buckets/artifacts.k8s-staging-mirror.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-mirror.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror-gcb/bucketpolicyonly.txt deleted file mode 100644 index 78b7f88258b3..000000000000 --- a/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-mirror-gcb: - Enabled: True - LockedTime: 2021-02-19 00:11:54.744000+00:00 - diff --git a/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror-gcb/cors.txt b/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror-gcb/cors.txt deleted file mode 100644 index a7261dd4e45d..000000000000 --- a/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-mirror-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror-gcb/iam.json b/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror-gcb/iam.json deleted file mode 100644 index 6ca93a660878..000000000000 --- a/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-mirror", - "projectOwner:k8s-staging-mirror" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-mirror" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-mirror@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-mirror@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror-gcb/logging.txt b/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror-gcb/logging.txt deleted file mode 100644 index 5d037986996e..000000000000 --- a/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-mirror-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror/bucketpolicyonly.txt b/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror/bucketpolicyonly.txt deleted file mode 100644 index b1b2528fed13..000000000000 --- a/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-mirror: - Enabled: True - LockedTime: 2021-02-19 00:11:37.740000+00:00 - diff --git a/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror/cors.txt b/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror/cors.txt deleted file mode 100644 index 96ba9fb3b3fd..000000000000 --- a/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-mirror/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror/iam.json b/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror/iam.json deleted file mode 100644 index 74caa70de8e3..000000000000 --- a/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-mirror", - "projectOwner:k8s-staging-mirror" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-mirror" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-mirror@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-mirror@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror/logging.txt b/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror/logging.txt deleted file mode 100644 index 2f6e5ddfaf56..000000000000 --- a/audit/projects/k8s-staging-mirror/buckets/k8s-staging-mirror/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-mirror/ has no logging configuration. diff --git a/audit/projects/k8s-staging-mirror/description.json b/audit/projects/k8s-staging-mirror/description.json deleted file mode 100644 index 1406b3e3fd8c..000000000000 --- a/audit/projects/k8s-staging-mirror/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-11-21T00:03:04.613Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-mirror", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-mirror", - "projectNumber": "98327187586" -} diff --git a/audit/projects/k8s-staging-mirror/iam.json b/audit/projects/k8s-staging-mirror/iam.json deleted file mode 100644 index 3db8b2573b5f..000000000000 --- a/audit/projects/k8s-staging-mirror/iam.json +++ /dev/null @@ -1,69 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:98327187586@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-mirror@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-98327187586@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-98327187586@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-98327187586@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-98327187586@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-mirror@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-release-viewers@kubernetes.io", - "group:k8s-infra-staging-mirror@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-mirror/services/enabled.txt b/audit/projects/k8s-staging-mirror/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-mirror/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-multitenancy/buckets/artifacts.k8s-staging-multitenancy.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-multitenancy/buckets/artifacts.k8s-staging-multitenancy.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index ad949121fa3a..000000000000 --- a/audit/projects/k8s-staging-multitenancy/buckets/artifacts.k8s-staging-multitenancy.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-multitenancy.appspot.com: - Enabled: True - LockedTime: 2019-12-03 19:35:47.080000+00:00 - diff --git a/audit/projects/k8s-staging-multitenancy/buckets/artifacts.k8s-staging-multitenancy.appspot.com/cors.txt b/audit/projects/k8s-staging-multitenancy/buckets/artifacts.k8s-staging-multitenancy.appspot.com/cors.txt deleted file mode 100644 index a3596edb6924..000000000000 --- a/audit/projects/k8s-staging-multitenancy/buckets/artifacts.k8s-staging-multitenancy.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-multitenancy.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-multitenancy/buckets/artifacts.k8s-staging-multitenancy.appspot.com/iam.json b/audit/projects/k8s-staging-multitenancy/buckets/artifacts.k8s-staging-multitenancy.appspot.com/iam.json deleted file mode 100644 index 3b9b9978f95a..000000000000 --- a/audit/projects/k8s-staging-multitenancy/buckets/artifacts.k8s-staging-multitenancy.appspot.com/iam.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-multitenancy", - "projectOwner:k8s-staging-multitenancy" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-multitenancy@kubernetes.io", - "projectViewer:k8s-staging-multitenancy" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-multitenancy@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-multitenancy@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-multitenancy/buckets/artifacts.k8s-staging-multitenancy.appspot.com/logging.txt b/audit/projects/k8s-staging-multitenancy/buckets/artifacts.k8s-staging-multitenancy.appspot.com/logging.txt deleted file mode 100644 index 11eb6287be4e..000000000000 --- a/audit/projects/k8s-staging-multitenancy/buckets/artifacts.k8s-staging-multitenancy.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-multitenancy.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-multitenancy/buckets/k8s-staging-multitenancy-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-multitenancy/buckets/k8s-staging-multitenancy-gcb/bucketpolicyonly.txt deleted file mode 100644 index 4c82e80d967e..000000000000 --- a/audit/projects/k8s-staging-multitenancy/buckets/k8s-staging-multitenancy-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-multitenancy-gcb: - Enabled: True - LockedTime: 2019-12-10 16:28:21.908000+00:00 - diff --git a/audit/projects/k8s-staging-multitenancy/buckets/k8s-staging-multitenancy-gcb/cors.txt b/audit/projects/k8s-staging-multitenancy/buckets/k8s-staging-multitenancy-gcb/cors.txt deleted file mode 100644 index ea38d589b874..000000000000 --- a/audit/projects/k8s-staging-multitenancy/buckets/k8s-staging-multitenancy-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-multitenancy-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-multitenancy/buckets/k8s-staging-multitenancy-gcb/iam.json b/audit/projects/k8s-staging-multitenancy/buckets/k8s-staging-multitenancy-gcb/iam.json deleted file mode 100644 index 9cf215565a3a..000000000000 --- a/audit/projects/k8s-staging-multitenancy/buckets/k8s-staging-multitenancy-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-multitenancy", - "projectOwner:k8s-staging-multitenancy" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-multitenancy" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-multitenancy@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-multitenancy@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-multitenancy/buckets/k8s-staging-multitenancy-gcb/logging.txt b/audit/projects/k8s-staging-multitenancy/buckets/k8s-staging-multitenancy-gcb/logging.txt deleted file mode 100644 index c9c7112feb98..000000000000 --- a/audit/projects/k8s-staging-multitenancy/buckets/k8s-staging-multitenancy-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-multitenancy-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-multitenancy/buckets/k8s-staging-multitenancy/bucketpolicyonly.txt b/audit/projects/k8s-staging-multitenancy/buckets/k8s-staging-multitenancy/bucketpolicyonly.txt deleted file mode 100644 index f8dd29665715..000000000000 --- a/audit/projects/k8s-staging-multitenancy/buckets/k8s-staging-multitenancy/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-multitenancy: - Enabled: True - LockedTime: 2019-12-03 19:36:09.646000+00:00 - diff --git a/audit/projects/k8s-staging-multitenancy/buckets/k8s-staging-multitenancy/cors.txt b/audit/projects/k8s-staging-multitenancy/buckets/k8s-staging-multitenancy/cors.txt deleted file mode 100644 index 7d3c6ad85f2c..000000000000 --- a/audit/projects/k8s-staging-multitenancy/buckets/k8s-staging-multitenancy/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-multitenancy/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-multitenancy/buckets/k8s-staging-multitenancy/iam.json b/audit/projects/k8s-staging-multitenancy/buckets/k8s-staging-multitenancy/iam.json deleted file mode 100644 index 1a4ea3b0356b..000000000000 --- a/audit/projects/k8s-staging-multitenancy/buckets/k8s-staging-multitenancy/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-multitenancy", - "projectOwner:k8s-staging-multitenancy" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-multitenancy" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-multitenancy@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-multitenancy@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-multitenancy/buckets/k8s-staging-multitenancy/logging.txt b/audit/projects/k8s-staging-multitenancy/buckets/k8s-staging-multitenancy/logging.txt deleted file mode 100644 index 581e63337c75..000000000000 --- a/audit/projects/k8s-staging-multitenancy/buckets/k8s-staging-multitenancy/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-multitenancy/ has no logging configuration. diff --git a/audit/projects/k8s-staging-multitenancy/description.json b/audit/projects/k8s-staging-multitenancy/description.json deleted file mode 100644 index a6d3109c9c8e..000000000000 --- a/audit/projects/k8s-staging-multitenancy/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2019-09-04T19:34:55.043Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-multitenancy", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-multitenancy", - "projectNumber": "817922591645" -} diff --git a/audit/projects/k8s-staging-multitenancy/iam.json b/audit/projects/k8s-staging-multitenancy/iam.json deleted file mode 100644 index c72a0d682faa..000000000000 --- a/audit/projects/k8s-staging-multitenancy/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:817922591645@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-multitenancy@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-817922591645@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-817922591645@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-817922591645@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-817922591645@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-multitenancy@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-multitenancy@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-multitenancy/services/enabled.txt b/audit/projects/k8s-staging-multitenancy/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-multitenancy/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-networking/buckets/artifacts.k8s-staging-networking.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-networking/buckets/artifacts.k8s-staging-networking.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 41c6a875c908..000000000000 --- a/audit/projects/k8s-staging-networking/buckets/artifacts.k8s-staging-networking.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-networking.appspot.com: - Enabled: True - LockedTime: 2021-01-21 19:24:05.941000+00:00 - diff --git a/audit/projects/k8s-staging-networking/buckets/artifacts.k8s-staging-networking.appspot.com/cors.txt b/audit/projects/k8s-staging-networking/buckets/artifacts.k8s-staging-networking.appspot.com/cors.txt deleted file mode 100644 index ec14ad0c6dcd..000000000000 --- a/audit/projects/k8s-staging-networking/buckets/artifacts.k8s-staging-networking.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-networking.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-networking/buckets/artifacts.k8s-staging-networking.appspot.com/iam.json b/audit/projects/k8s-staging-networking/buckets/artifacts.k8s-staging-networking.appspot.com/iam.json deleted file mode 100644 index b2d7d9a3be6c..000000000000 --- a/audit/projects/k8s-staging-networking/buckets/artifacts.k8s-staging-networking.appspot.com/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-networking", - "projectOwner:k8s-staging-networking" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-networking" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-networking@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-networking@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-networking/buckets/artifacts.k8s-staging-networking.appspot.com/logging.txt b/audit/projects/k8s-staging-networking/buckets/artifacts.k8s-staging-networking.appspot.com/logging.txt deleted file mode 100644 index 860963f0c692..000000000000 --- a/audit/projects/k8s-staging-networking/buckets/artifacts.k8s-staging-networking.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-networking.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking-gcb/bucketpolicyonly.txt deleted file mode 100644 index 1f4085813eaa..000000000000 --- a/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-networking-gcb: - Enabled: True - LockedTime: 2021-01-21 19:24:49.345000+00:00 - diff --git a/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking-gcb/cors.txt b/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking-gcb/cors.txt deleted file mode 100644 index cee22cbb043d..000000000000 --- a/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-networking-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking-gcb/iam.json b/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking-gcb/iam.json deleted file mode 100644 index 91e08b99a45a..000000000000 --- a/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-networking", - "projectOwner:k8s-staging-networking" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-networking" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-networking@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-networking@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking-gcb/logging.txt b/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking-gcb/logging.txt deleted file mode 100644 index d1ceeff9c251..000000000000 --- a/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-networking-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking/bucketpolicyonly.txt b/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking/bucketpolicyonly.txt deleted file mode 100644 index 1495a263bcfd..000000000000 --- a/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-networking: - Enabled: True - LockedTime: 2021-01-21 19:24:27.541000+00:00 - diff --git a/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking/cors.txt b/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking/cors.txt deleted file mode 100644 index f5be675bdd66..000000000000 --- a/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-networking/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking/iam.json b/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking/iam.json deleted file mode 100644 index b2d7d9a3be6c..000000000000 --- a/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-networking", - "projectOwner:k8s-staging-networking" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-networking" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-networking@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-networking@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking/logging.txt b/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking/logging.txt deleted file mode 100644 index 161d8d056e8e..000000000000 --- a/audit/projects/k8s-staging-networking/buckets/k8s-staging-networking/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-networking/ has no logging configuration. diff --git a/audit/projects/k8s-staging-networking/description.json b/audit/projects/k8s-staging-networking/description.json deleted file mode 100644 index d6019fb07dcd..000000000000 --- a/audit/projects/k8s-staging-networking/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-10-23T19:14:43.981Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-networking", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-networking", - "projectNumber": "235137276492" -} diff --git a/audit/projects/k8s-staging-networking/iam.json b/audit/projects/k8s-staging-networking/iam.json deleted file mode 100644 index 4ce9c18b4ca8..000000000000 --- a/audit/projects/k8s-staging-networking/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:235137276492@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-networking@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-235137276492@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-235137276492@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-235137276492@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-235137276492@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-networking@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-networking@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-networking/services/enabled.txt b/audit/projects/k8s-staging-networking/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-networking/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-nfd/buckets/artifacts.k8s-staging-nfd.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-nfd/buckets/artifacts.k8s-staging-nfd.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index e4af4a882af7..000000000000 --- a/audit/projects/k8s-staging-nfd/buckets/artifacts.k8s-staging-nfd.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-nfd.appspot.com: - Enabled: True - LockedTime: 2020-05-07 18:07:49.807000+00:00 - diff --git a/audit/projects/k8s-staging-nfd/buckets/artifacts.k8s-staging-nfd.appspot.com/cors.txt b/audit/projects/k8s-staging-nfd/buckets/artifacts.k8s-staging-nfd.appspot.com/cors.txt deleted file mode 100644 index 46ca117c36d2..000000000000 --- a/audit/projects/k8s-staging-nfd/buckets/artifacts.k8s-staging-nfd.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-nfd.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-nfd/buckets/artifacts.k8s-staging-nfd.appspot.com/iam.json b/audit/projects/k8s-staging-nfd/buckets/artifacts.k8s-staging-nfd.appspot.com/iam.json deleted file mode 100644 index c4cf62470afc..000000000000 --- a/audit/projects/k8s-staging-nfd/buckets/artifacts.k8s-staging-nfd.appspot.com/iam.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-nfd", - "projectOwner:k8s-staging-nfd" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-nfd@kubernetes.io", - "projectViewer:k8s-staging-nfd" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-nfd@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-nfd@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-nfd/buckets/artifacts.k8s-staging-nfd.appspot.com/logging.txt b/audit/projects/k8s-staging-nfd/buckets/artifacts.k8s-staging-nfd.appspot.com/logging.txt deleted file mode 100644 index 6e8ada2c73b9..000000000000 --- a/audit/projects/k8s-staging-nfd/buckets/artifacts.k8s-staging-nfd.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-nfd.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-nfd/buckets/k8s-staging-nfd-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-nfd/buckets/k8s-staging-nfd-gcb/bucketpolicyonly.txt deleted file mode 100644 index 4835c34c7baf..000000000000 --- a/audit/projects/k8s-staging-nfd/buckets/k8s-staging-nfd-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-nfd-gcb: - Enabled: True - LockedTime: 2020-05-07 18:08:25.421000+00:00 - diff --git a/audit/projects/k8s-staging-nfd/buckets/k8s-staging-nfd-gcb/cors.txt b/audit/projects/k8s-staging-nfd/buckets/k8s-staging-nfd-gcb/cors.txt deleted file mode 100644 index 325534fec8c7..000000000000 --- a/audit/projects/k8s-staging-nfd/buckets/k8s-staging-nfd-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-nfd-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-nfd/buckets/k8s-staging-nfd-gcb/iam.json b/audit/projects/k8s-staging-nfd/buckets/k8s-staging-nfd-gcb/iam.json deleted file mode 100644 index 8c8d5b07855f..000000000000 --- a/audit/projects/k8s-staging-nfd/buckets/k8s-staging-nfd-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-nfd", - "projectOwner:k8s-staging-nfd" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-nfd" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-nfd@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-nfd@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-nfd/buckets/k8s-staging-nfd-gcb/logging.txt b/audit/projects/k8s-staging-nfd/buckets/k8s-staging-nfd-gcb/logging.txt deleted file mode 100644 index bbca9b49d60a..000000000000 --- a/audit/projects/k8s-staging-nfd/buckets/k8s-staging-nfd-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-nfd-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-nfd/buckets/k8s-staging-nfd/bucketpolicyonly.txt b/audit/projects/k8s-staging-nfd/buckets/k8s-staging-nfd/bucketpolicyonly.txt deleted file mode 100644 index 93b3447a03c1..000000000000 --- a/audit/projects/k8s-staging-nfd/buckets/k8s-staging-nfd/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-nfd: - Enabled: True - LockedTime: 2020-05-07 18:08:10.219000+00:00 - diff --git a/audit/projects/k8s-staging-nfd/buckets/k8s-staging-nfd/cors.txt b/audit/projects/k8s-staging-nfd/buckets/k8s-staging-nfd/cors.txt deleted file mode 100644 index 0b719e7f43d9..000000000000 --- a/audit/projects/k8s-staging-nfd/buckets/k8s-staging-nfd/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-nfd/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-nfd/buckets/k8s-staging-nfd/iam.json b/audit/projects/k8s-staging-nfd/buckets/k8s-staging-nfd/iam.json deleted file mode 100644 index 312823bcb1e8..000000000000 --- a/audit/projects/k8s-staging-nfd/buckets/k8s-staging-nfd/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-nfd", - "projectOwner:k8s-staging-nfd" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-nfd" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-nfd@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-nfd@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-nfd/buckets/k8s-staging-nfd/logging.txt b/audit/projects/k8s-staging-nfd/buckets/k8s-staging-nfd/logging.txt deleted file mode 100644 index 19cc63949b60..000000000000 --- a/audit/projects/k8s-staging-nfd/buckets/k8s-staging-nfd/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-nfd/ has no logging configuration. diff --git a/audit/projects/k8s-staging-nfd/description.json b/audit/projects/k8s-staging-nfd/description.json deleted file mode 100644 index d402da46c67b..000000000000 --- a/audit/projects/k8s-staging-nfd/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-02-07T18:07:09.801Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-nfd", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-nfd", - "projectNumber": "5125544917" -} diff --git a/audit/projects/k8s-staging-nfd/iam.json b/audit/projects/k8s-staging-nfd/iam.json deleted file mode 100644 index 9b862b00a6a8..000000000000 --- a/audit/projects/k8s-staging-nfd/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:5125544917@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-nfd@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-5125544917@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-5125544917@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-5125544917@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-5125544917@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-nfd@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-nfd@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-nfd/services/enabled.txt b/audit/projects/k8s-staging-nfd/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-nfd/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-npd/buckets/artifacts.k8s-staging-npd.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-npd/buckets/artifacts.k8s-staging-npd.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index fe68de72f8d4..000000000000 --- a/audit/projects/k8s-staging-npd/buckets/artifacts.k8s-staging-npd.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-npd.appspot.com: - Enabled: True - LockedTime: 2020-05-05 17:58:06.223000+00:00 - diff --git a/audit/projects/k8s-staging-npd/buckets/artifacts.k8s-staging-npd.appspot.com/cors.txt b/audit/projects/k8s-staging-npd/buckets/artifacts.k8s-staging-npd.appspot.com/cors.txt deleted file mode 100644 index 4d8580e8cba7..000000000000 --- a/audit/projects/k8s-staging-npd/buckets/artifacts.k8s-staging-npd.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-npd.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-npd/buckets/artifacts.k8s-staging-npd.appspot.com/iam.json b/audit/projects/k8s-staging-npd/buckets/artifacts.k8s-staging-npd.appspot.com/iam.json deleted file mode 100644 index a5112acd4863..000000000000 --- a/audit/projects/k8s-staging-npd/buckets/artifacts.k8s-staging-npd.appspot.com/iam.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-npd", - "projectOwner:k8s-staging-npd" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-npd@kubernetes.io", - "projectViewer:k8s-staging-npd" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-npd@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-npd@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-npd/buckets/artifacts.k8s-staging-npd.appspot.com/logging.txt b/audit/projects/k8s-staging-npd/buckets/artifacts.k8s-staging-npd.appspot.com/logging.txt deleted file mode 100644 index 204f40cbfe0a..000000000000 --- a/audit/projects/k8s-staging-npd/buckets/artifacts.k8s-staging-npd.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-npd.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-npd/buckets/k8s-staging-npd-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-npd/buckets/k8s-staging-npd-gcb/bucketpolicyonly.txt deleted file mode 100644 index b4dafd02a78e..000000000000 --- a/audit/projects/k8s-staging-npd/buckets/k8s-staging-npd-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-npd-gcb: - Enabled: True - LockedTime: 2020-05-05 17:58:41.220000+00:00 - diff --git a/audit/projects/k8s-staging-npd/buckets/k8s-staging-npd-gcb/cors.txt b/audit/projects/k8s-staging-npd/buckets/k8s-staging-npd-gcb/cors.txt deleted file mode 100644 index 3d68047f44b6..000000000000 --- a/audit/projects/k8s-staging-npd/buckets/k8s-staging-npd-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-npd-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-npd/buckets/k8s-staging-npd-gcb/iam.json b/audit/projects/k8s-staging-npd/buckets/k8s-staging-npd-gcb/iam.json deleted file mode 100644 index 5b89d8ec5b21..000000000000 --- a/audit/projects/k8s-staging-npd/buckets/k8s-staging-npd-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-npd", - "projectOwner:k8s-staging-npd" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-npd" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-npd@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-npd@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-npd/buckets/k8s-staging-npd-gcb/logging.txt b/audit/projects/k8s-staging-npd/buckets/k8s-staging-npd-gcb/logging.txt deleted file mode 100644 index f9deffe49da4..000000000000 --- a/audit/projects/k8s-staging-npd/buckets/k8s-staging-npd-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-npd-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-npd/buckets/k8s-staging-npd/bucketpolicyonly.txt b/audit/projects/k8s-staging-npd/buckets/k8s-staging-npd/bucketpolicyonly.txt deleted file mode 100644 index 4f9d31964fd7..000000000000 --- a/audit/projects/k8s-staging-npd/buckets/k8s-staging-npd/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-npd: - Enabled: True - LockedTime: 2020-05-05 17:58:24.218000+00:00 - diff --git a/audit/projects/k8s-staging-npd/buckets/k8s-staging-npd/cors.txt b/audit/projects/k8s-staging-npd/buckets/k8s-staging-npd/cors.txt deleted file mode 100644 index 9f460a1fd14f..000000000000 --- a/audit/projects/k8s-staging-npd/buckets/k8s-staging-npd/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-npd/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-npd/buckets/k8s-staging-npd/iam.json b/audit/projects/k8s-staging-npd/buckets/k8s-staging-npd/iam.json deleted file mode 100644 index b4a830e64571..000000000000 --- a/audit/projects/k8s-staging-npd/buckets/k8s-staging-npd/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-npd", - "projectOwner:k8s-staging-npd" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-npd" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-npd@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-npd@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-npd/buckets/k8s-staging-npd/logging.txt b/audit/projects/k8s-staging-npd/buckets/k8s-staging-npd/logging.txt deleted file mode 100644 index ec5854644112..000000000000 --- a/audit/projects/k8s-staging-npd/buckets/k8s-staging-npd/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-npd/ has no logging configuration. diff --git a/audit/projects/k8s-staging-npd/description.json b/audit/projects/k8s-staging-npd/description.json deleted file mode 100644 index 18936e32167c..000000000000 --- a/audit/projects/k8s-staging-npd/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-02-05T17:57:22.996Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-npd", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-npd", - "projectNumber": "152738448582" -} diff --git a/audit/projects/k8s-staging-npd/iam.json b/audit/projects/k8s-staging-npd/iam.json deleted file mode 100644 index 630b64ec8569..000000000000 --- a/audit/projects/k8s-staging-npd/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:152738448582@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-npd@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-152738448582@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-152738448582@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-152738448582@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-152738448582@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-npd@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-npd@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-npd/services/enabled.txt b/audit/projects/k8s-staging-npd/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-npd/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-provider-aws/buckets/artifacts.k8s-staging-provider-aws.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-provider-aws/buckets/artifacts.k8s-staging-provider-aws.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 9b4cfd7e745d..000000000000 --- a/audit/projects/k8s-staging-provider-aws/buckets/artifacts.k8s-staging-provider-aws.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-provider-aws.appspot.com: - Enabled: True - LockedTime: 2020-08-24 18:43:13.433000+00:00 - diff --git a/audit/projects/k8s-staging-provider-aws/buckets/artifacts.k8s-staging-provider-aws.appspot.com/cors.txt b/audit/projects/k8s-staging-provider-aws/buckets/artifacts.k8s-staging-provider-aws.appspot.com/cors.txt deleted file mode 100644 index b1eba90b777f..000000000000 --- a/audit/projects/k8s-staging-provider-aws/buckets/artifacts.k8s-staging-provider-aws.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-provider-aws.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-provider-aws/buckets/artifacts.k8s-staging-provider-aws.appspot.com/iam.json b/audit/projects/k8s-staging-provider-aws/buckets/artifacts.k8s-staging-provider-aws.appspot.com/iam.json deleted file mode 100644 index 97fcd1418901..000000000000 --- a/audit/projects/k8s-staging-provider-aws/buckets/artifacts.k8s-staging-provider-aws.appspot.com/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-provider-aws", - "projectOwner:k8s-staging-provider-aws" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-provider-aws" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-provider-aws@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-provider-aws@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-provider-aws/buckets/artifacts.k8s-staging-provider-aws.appspot.com/logging.txt b/audit/projects/k8s-staging-provider-aws/buckets/artifacts.k8s-staging-provider-aws.appspot.com/logging.txt deleted file mode 100644 index b39899b2d187..000000000000 --- a/audit/projects/k8s-staging-provider-aws/buckets/artifacts.k8s-staging-provider-aws.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-provider-aws.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws-gcb/bucketpolicyonly.txt deleted file mode 100644 index 8b9dadd91027..000000000000 --- a/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-provider-aws-gcb: - Enabled: True - LockedTime: 2020-08-24 18:44:02.525000+00:00 - diff --git a/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws-gcb/cors.txt b/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws-gcb/cors.txt deleted file mode 100644 index 604cb40d5b63..000000000000 --- a/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-provider-aws-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws-gcb/iam.json b/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws-gcb/iam.json deleted file mode 100644 index 47613fa2c8e7..000000000000 --- a/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-provider-aws", - "projectOwner:k8s-staging-provider-aws" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-provider-aws" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-provider-aws@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-provider-aws@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws-gcb/logging.txt b/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws-gcb/logging.txt deleted file mode 100644 index 20988f60df59..000000000000 --- a/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-provider-aws-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws/bucketpolicyonly.txt b/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws/bucketpolicyonly.txt deleted file mode 100644 index b8b12a48675b..000000000000 --- a/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-provider-aws: - Enabled: True - LockedTime: 2020-08-24 18:43:39.623000+00:00 - diff --git a/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws/cors.txt b/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws/cors.txt deleted file mode 100644 index a1ca23b543c0..000000000000 --- a/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-provider-aws/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws/iam.json b/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws/iam.json deleted file mode 100644 index 97fcd1418901..000000000000 --- a/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-provider-aws", - "projectOwner:k8s-staging-provider-aws" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-provider-aws" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-provider-aws@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-provider-aws@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws/logging.txt b/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws/logging.txt deleted file mode 100644 index 2f6b5676160b..000000000000 --- a/audit/projects/k8s-staging-provider-aws/buckets/k8s-staging-provider-aws/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-provider-aws/ has no logging configuration. diff --git a/audit/projects/k8s-staging-provider-aws/description.json b/audit/projects/k8s-staging-provider-aws/description.json deleted file mode 100644 index 5d1e473d4308..000000000000 --- a/audit/projects/k8s-staging-provider-aws/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-05-26T18:35:22.593Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-provider-aws", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-provider-aws", - "projectNumber": "967205882988" -} diff --git a/audit/projects/k8s-staging-provider-aws/iam.json b/audit/projects/k8s-staging-provider-aws/iam.json deleted file mode 100644 index 614c21cd87e8..000000000000 --- a/audit/projects/k8s-staging-provider-aws/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:967205882988@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-provider-aws@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-967205882988@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-967205882988@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-967205882988@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-967205882988@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-provider-aws@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-provider-aws@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-provider-aws/services/enabled.txt b/audit/projects/k8s-staging-provider-aws/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-provider-aws/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-provider-azure/buckets/artifacts.k8s-staging-provider-azure.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-provider-azure/buckets/artifacts.k8s-staging-provider-azure.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 27e7e780adcf..000000000000 --- a/audit/projects/k8s-staging-provider-azure/buckets/artifacts.k8s-staging-provider-azure.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-provider-azure.appspot.com: - Enabled: True - LockedTime: 2020-03-05 19:33:23.825000+00:00 - diff --git a/audit/projects/k8s-staging-provider-azure/buckets/artifacts.k8s-staging-provider-azure.appspot.com/cors.txt b/audit/projects/k8s-staging-provider-azure/buckets/artifacts.k8s-staging-provider-azure.appspot.com/cors.txt deleted file mode 100644 index 2adf3e2bc3b0..000000000000 --- a/audit/projects/k8s-staging-provider-azure/buckets/artifacts.k8s-staging-provider-azure.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-provider-azure.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-provider-azure/buckets/artifacts.k8s-staging-provider-azure.appspot.com/iam.json b/audit/projects/k8s-staging-provider-azure/buckets/artifacts.k8s-staging-provider-azure.appspot.com/iam.json deleted file mode 100644 index dc82837b662a..000000000000 --- a/audit/projects/k8s-staging-provider-azure/buckets/artifacts.k8s-staging-provider-azure.appspot.com/iam.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-provider-azure", - "projectOwner:k8s-staging-provider-azure" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-provider-azure@kubernetes.io", - "projectViewer:k8s-staging-provider-azure" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-provider-azure@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-provider-azure@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-provider-azure/buckets/artifacts.k8s-staging-provider-azure.appspot.com/logging.txt b/audit/projects/k8s-staging-provider-azure/buckets/artifacts.k8s-staging-provider-azure.appspot.com/logging.txt deleted file mode 100644 index 8fd4fd07df34..000000000000 --- a/audit/projects/k8s-staging-provider-azure/buckets/artifacts.k8s-staging-provider-azure.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-provider-azure.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-provider-azure/buckets/k8s-staging-provider-azure-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-provider-azure/buckets/k8s-staging-provider-azure-gcb/bucketpolicyonly.txt deleted file mode 100644 index 3280c944fd17..000000000000 --- a/audit/projects/k8s-staging-provider-azure/buckets/k8s-staging-provider-azure-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-provider-azure-gcb: - Enabled: True - LockedTime: 2020-03-05 19:34:04.616000+00:00 - diff --git a/audit/projects/k8s-staging-provider-azure/buckets/k8s-staging-provider-azure-gcb/cors.txt b/audit/projects/k8s-staging-provider-azure/buckets/k8s-staging-provider-azure-gcb/cors.txt deleted file mode 100644 index 05889b3f2e9f..000000000000 --- a/audit/projects/k8s-staging-provider-azure/buckets/k8s-staging-provider-azure-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-provider-azure-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-provider-azure/buckets/k8s-staging-provider-azure-gcb/iam.json b/audit/projects/k8s-staging-provider-azure/buckets/k8s-staging-provider-azure-gcb/iam.json deleted file mode 100644 index 112053bd1683..000000000000 --- a/audit/projects/k8s-staging-provider-azure/buckets/k8s-staging-provider-azure-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-provider-azure", - "projectOwner:k8s-staging-provider-azure" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-provider-azure" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-provider-azure@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-provider-azure@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-provider-azure/buckets/k8s-staging-provider-azure-gcb/logging.txt b/audit/projects/k8s-staging-provider-azure/buckets/k8s-staging-provider-azure-gcb/logging.txt deleted file mode 100644 index 5f8fae120426..000000000000 --- a/audit/projects/k8s-staging-provider-azure/buckets/k8s-staging-provider-azure-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-provider-azure-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-provider-azure/buckets/k8s-staging-provider-azure/bucketpolicyonly.txt b/audit/projects/k8s-staging-provider-azure/buckets/k8s-staging-provider-azure/bucketpolicyonly.txt deleted file mode 100644 index 456161b498c5..000000000000 --- a/audit/projects/k8s-staging-provider-azure/buckets/k8s-staging-provider-azure/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-provider-azure: - Enabled: True - LockedTime: 2020-03-05 19:33:46.421000+00:00 - diff --git a/audit/projects/k8s-staging-provider-azure/buckets/k8s-staging-provider-azure/cors.txt b/audit/projects/k8s-staging-provider-azure/buckets/k8s-staging-provider-azure/cors.txt deleted file mode 100644 index 045bffcfa40f..000000000000 --- a/audit/projects/k8s-staging-provider-azure/buckets/k8s-staging-provider-azure/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-provider-azure/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-provider-azure/buckets/k8s-staging-provider-azure/iam.json b/audit/projects/k8s-staging-provider-azure/buckets/k8s-staging-provider-azure/iam.json deleted file mode 100644 index 1755620e2184..000000000000 --- a/audit/projects/k8s-staging-provider-azure/buckets/k8s-staging-provider-azure/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-provider-azure", - "projectOwner:k8s-staging-provider-azure" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-provider-azure" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-provider-azure@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-provider-azure@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-provider-azure/buckets/k8s-staging-provider-azure/logging.txt b/audit/projects/k8s-staging-provider-azure/buckets/k8s-staging-provider-azure/logging.txt deleted file mode 100644 index d297f5b9f63d..000000000000 --- a/audit/projects/k8s-staging-provider-azure/buckets/k8s-staging-provider-azure/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-provider-azure/ has no logging configuration. diff --git a/audit/projects/k8s-staging-provider-azure/description.json b/audit/projects/k8s-staging-provider-azure/description.json deleted file mode 100644 index e967f7cf954f..000000000000 --- a/audit/projects/k8s-staging-provider-azure/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2019-12-06T19:32:34.988Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-provider-azure", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-provider-azure", - "projectNumber": "83539169056" -} diff --git a/audit/projects/k8s-staging-provider-azure/iam.json b/audit/projects/k8s-staging-provider-azure/iam.json deleted file mode 100644 index e2499de3d892..000000000000 --- a/audit/projects/k8s-staging-provider-azure/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:83539169056@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-provider-azure@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-83539169056@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-83539169056@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-83539169056@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-83539169056@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-provider-azure@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-provider-azure@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-provider-azure/services/enabled.txt b/audit/projects/k8s-staging-provider-azure/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-provider-azure/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-provider-openstack/buckets/artifacts.k8s-staging-provider-openstack.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-provider-openstack/buckets/artifacts.k8s-staging-provider-openstack.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 4f1f5de76914..000000000000 --- a/audit/projects/k8s-staging-provider-openstack/buckets/artifacts.k8s-staging-provider-openstack.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-provider-openstack.appspot.com: - Enabled: True - LockedTime: 2021-05-16 15:18:46.461000+00:00 - diff --git a/audit/projects/k8s-staging-provider-openstack/buckets/artifacts.k8s-staging-provider-openstack.appspot.com/cors.txt b/audit/projects/k8s-staging-provider-openstack/buckets/artifacts.k8s-staging-provider-openstack.appspot.com/cors.txt deleted file mode 100644 index d2fa17013e7c..000000000000 --- a/audit/projects/k8s-staging-provider-openstack/buckets/artifacts.k8s-staging-provider-openstack.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-provider-openstack.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-provider-openstack/buckets/artifacts.k8s-staging-provider-openstack.appspot.com/iam.json b/audit/projects/k8s-staging-provider-openstack/buckets/artifacts.k8s-staging-provider-openstack.appspot.com/iam.json deleted file mode 100644 index 17dc1ed840d7..000000000000 --- a/audit/projects/k8s-staging-provider-openstack/buckets/artifacts.k8s-staging-provider-openstack.appspot.com/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-provider-openstack", - "projectOwner:k8s-staging-provider-openstack" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-provider-openstack" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-provider-openstack@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-provider-openstack@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-provider-openstack/buckets/artifacts.k8s-staging-provider-openstack.appspot.com/logging.txt b/audit/projects/k8s-staging-provider-openstack/buckets/artifacts.k8s-staging-provider-openstack.appspot.com/logging.txt deleted file mode 100644 index 6aea68afab5f..000000000000 --- a/audit/projects/k8s-staging-provider-openstack/buckets/artifacts.k8s-staging-provider-openstack.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-provider-openstack.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-provider-openstack/buckets/k8s-staging-provider-openstack-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-provider-openstack/buckets/k8s-staging-provider-openstack-gcb/bucketpolicyonly.txt deleted file mode 100644 index 18a63176a2ac..000000000000 --- a/audit/projects/k8s-staging-provider-openstack/buckets/k8s-staging-provider-openstack-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-provider-openstack-gcb: - Enabled: True - LockedTime: 2021-05-16 15:19:21.741000+00:00 - diff --git a/audit/projects/k8s-staging-provider-openstack/buckets/k8s-staging-provider-openstack-gcb/cors.txt b/audit/projects/k8s-staging-provider-openstack/buckets/k8s-staging-provider-openstack-gcb/cors.txt deleted file mode 100644 index 2bf2d5f5d5c9..000000000000 --- a/audit/projects/k8s-staging-provider-openstack/buckets/k8s-staging-provider-openstack-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-provider-openstack-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-provider-openstack/buckets/k8s-staging-provider-openstack-gcb/iam.json b/audit/projects/k8s-staging-provider-openstack/buckets/k8s-staging-provider-openstack-gcb/iam.json deleted file mode 100644 index f1a19dacfe70..000000000000 --- a/audit/projects/k8s-staging-provider-openstack/buckets/k8s-staging-provider-openstack-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-provider-openstack", - "projectOwner:k8s-staging-provider-openstack" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-provider-openstack" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-provider-openstack@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-provider-openstack@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-provider-openstack/buckets/k8s-staging-provider-openstack-gcb/logging.txt b/audit/projects/k8s-staging-provider-openstack/buckets/k8s-staging-provider-openstack-gcb/logging.txt deleted file mode 100644 index ae46bd630cca..000000000000 --- a/audit/projects/k8s-staging-provider-openstack/buckets/k8s-staging-provider-openstack-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-provider-openstack-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-provider-openstack/buckets/k8s-staging-provider-openstack/bucketpolicyonly.txt b/audit/projects/k8s-staging-provider-openstack/buckets/k8s-staging-provider-openstack/bucketpolicyonly.txt deleted file mode 100644 index 79f0e2bb3649..000000000000 --- a/audit/projects/k8s-staging-provider-openstack/buckets/k8s-staging-provider-openstack/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-provider-openstack: - Enabled: True - LockedTime: 2021-05-16 15:19:04.941000+00:00 - diff --git a/audit/projects/k8s-staging-provider-openstack/buckets/k8s-staging-provider-openstack/cors.txt b/audit/projects/k8s-staging-provider-openstack/buckets/k8s-staging-provider-openstack/cors.txt deleted file mode 100644 index df06efe18a98..000000000000 --- a/audit/projects/k8s-staging-provider-openstack/buckets/k8s-staging-provider-openstack/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-provider-openstack/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-provider-openstack/buckets/k8s-staging-provider-openstack/iam.json b/audit/projects/k8s-staging-provider-openstack/buckets/k8s-staging-provider-openstack/iam.json deleted file mode 100644 index 17dc1ed840d7..000000000000 --- a/audit/projects/k8s-staging-provider-openstack/buckets/k8s-staging-provider-openstack/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-provider-openstack", - "projectOwner:k8s-staging-provider-openstack" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-provider-openstack" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-provider-openstack@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-provider-openstack@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-provider-openstack/buckets/k8s-staging-provider-openstack/logging.txt b/audit/projects/k8s-staging-provider-openstack/buckets/k8s-staging-provider-openstack/logging.txt deleted file mode 100644 index 648cab5ead56..000000000000 --- a/audit/projects/k8s-staging-provider-openstack/buckets/k8s-staging-provider-openstack/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-provider-openstack/ has no logging configuration. diff --git a/audit/projects/k8s-staging-provider-openstack/description.json b/audit/projects/k8s-staging-provider-openstack/description.json deleted file mode 100644 index 50b8b4bda8a1..000000000000 --- a/audit/projects/k8s-staging-provider-openstack/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2021-02-15T15:12:50.913Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-provider-openstack", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-provider-openstack", - "projectNumber": "625174557286" -} diff --git a/audit/projects/k8s-staging-provider-openstack/iam.json b/audit/projects/k8s-staging-provider-openstack/iam.json deleted file mode 100644 index cc5b48444ff1..000000000000 --- a/audit/projects/k8s-staging-provider-openstack/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:625174557286@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-provider-openstack@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-625174557286@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-625174557286@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-625174557286@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-625174557286@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-provider-openstack@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-provider-openstack@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-provider-openstack/services/enabled.txt b/audit/projects/k8s-staging-provider-openstack/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-provider-openstack/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-publishing-bot/buckets/artifacts.k8s-staging-publishing-bot.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-publishing-bot/buckets/artifacts.k8s-staging-publishing-bot.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 15def4ba51a5..000000000000 --- a/audit/projects/k8s-staging-publishing-bot/buckets/artifacts.k8s-staging-publishing-bot.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-publishing-bot.appspot.com: - Enabled: True - LockedTime: 2019-09-23 05:09:51.226000+00:00 - diff --git a/audit/projects/k8s-staging-publishing-bot/buckets/artifacts.k8s-staging-publishing-bot.appspot.com/cors.txt b/audit/projects/k8s-staging-publishing-bot/buckets/artifacts.k8s-staging-publishing-bot.appspot.com/cors.txt deleted file mode 100644 index 89392773f118..000000000000 --- a/audit/projects/k8s-staging-publishing-bot/buckets/artifacts.k8s-staging-publishing-bot.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-publishing-bot.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-publishing-bot/buckets/artifacts.k8s-staging-publishing-bot.appspot.com/iam.json b/audit/projects/k8s-staging-publishing-bot/buckets/artifacts.k8s-staging-publishing-bot.appspot.com/iam.json deleted file mode 100644 index d14ebd369fca..000000000000 --- a/audit/projects/k8s-staging-publishing-bot/buckets/artifacts.k8s-staging-publishing-bot.appspot.com/iam.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-publishing-bot", - "projectOwner:k8s-staging-publishing-bot" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-publishing-bot@kubernetes.io", - "projectViewer:k8s-staging-publishing-bot" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-publishing-bot@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-publishing-bot@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-publishing-bot/buckets/artifacts.k8s-staging-publishing-bot.appspot.com/logging.txt b/audit/projects/k8s-staging-publishing-bot/buckets/artifacts.k8s-staging-publishing-bot.appspot.com/logging.txt deleted file mode 100644 index 35073d34f443..000000000000 --- a/audit/projects/k8s-staging-publishing-bot/buckets/artifacts.k8s-staging-publishing-bot.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-publishing-bot.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-publishing-bot/buckets/k8s-staging-publishing-bot-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-publishing-bot/buckets/k8s-staging-publishing-bot-gcb/bucketpolicyonly.txt deleted file mode 100644 index acb751bb0c93..000000000000 --- a/audit/projects/k8s-staging-publishing-bot/buckets/k8s-staging-publishing-bot-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-publishing-bot-gcb: - Enabled: True - LockedTime: 2019-12-10 16:29:24.514000+00:00 - diff --git a/audit/projects/k8s-staging-publishing-bot/buckets/k8s-staging-publishing-bot-gcb/cors.txt b/audit/projects/k8s-staging-publishing-bot/buckets/k8s-staging-publishing-bot-gcb/cors.txt deleted file mode 100644 index 3a6fe0e9e462..000000000000 --- a/audit/projects/k8s-staging-publishing-bot/buckets/k8s-staging-publishing-bot-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-publishing-bot-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-publishing-bot/buckets/k8s-staging-publishing-bot-gcb/iam.json b/audit/projects/k8s-staging-publishing-bot/buckets/k8s-staging-publishing-bot-gcb/iam.json deleted file mode 100644 index e6d6eeab4f53..000000000000 --- a/audit/projects/k8s-staging-publishing-bot/buckets/k8s-staging-publishing-bot-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-publishing-bot", - "projectOwner:k8s-staging-publishing-bot" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-publishing-bot" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-publishing-bot@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-publishing-bot@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-publishing-bot/buckets/k8s-staging-publishing-bot-gcb/logging.txt b/audit/projects/k8s-staging-publishing-bot/buckets/k8s-staging-publishing-bot-gcb/logging.txt deleted file mode 100644 index 7e7b1e1b5565..000000000000 --- a/audit/projects/k8s-staging-publishing-bot/buckets/k8s-staging-publishing-bot-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-publishing-bot-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-publishing-bot/buckets/k8s-staging-publishing-bot/bucketpolicyonly.txt b/audit/projects/k8s-staging-publishing-bot/buckets/k8s-staging-publishing-bot/bucketpolicyonly.txt deleted file mode 100644 index c50ef8e974e3..000000000000 --- a/audit/projects/k8s-staging-publishing-bot/buckets/k8s-staging-publishing-bot/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-publishing-bot: - Enabled: True - LockedTime: 2019-10-06 19:41:25.325000+00:00 - diff --git a/audit/projects/k8s-staging-publishing-bot/buckets/k8s-staging-publishing-bot/cors.txt b/audit/projects/k8s-staging-publishing-bot/buckets/k8s-staging-publishing-bot/cors.txt deleted file mode 100644 index 7163d7d1154d..000000000000 --- a/audit/projects/k8s-staging-publishing-bot/buckets/k8s-staging-publishing-bot/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-publishing-bot/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-publishing-bot/buckets/k8s-staging-publishing-bot/iam.json b/audit/projects/k8s-staging-publishing-bot/buckets/k8s-staging-publishing-bot/iam.json deleted file mode 100644 index ec6992936cd8..000000000000 --- a/audit/projects/k8s-staging-publishing-bot/buckets/k8s-staging-publishing-bot/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-publishing-bot", - "projectOwner:k8s-staging-publishing-bot" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-publishing-bot" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-publishing-bot@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-publishing-bot@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-publishing-bot/buckets/k8s-staging-publishing-bot/logging.txt b/audit/projects/k8s-staging-publishing-bot/buckets/k8s-staging-publishing-bot/logging.txt deleted file mode 100644 index 74c8d655bc66..000000000000 --- a/audit/projects/k8s-staging-publishing-bot/buckets/k8s-staging-publishing-bot/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-publishing-bot/ has no logging configuration. diff --git a/audit/projects/k8s-staging-publishing-bot/description.json b/audit/projects/k8s-staging-publishing-bot/description.json deleted file mode 100644 index 1308632c8ae4..000000000000 --- a/audit/projects/k8s-staging-publishing-bot/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2019-06-25T05:09:04.610Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-publishing-bot", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-publishing-bot", - "projectNumber": "438481731081" -} diff --git a/audit/projects/k8s-staging-publishing-bot/iam.json b/audit/projects/k8s-staging-publishing-bot/iam.json deleted file mode 100644 index 77ddc1234514..000000000000 --- a/audit/projects/k8s-staging-publishing-bot/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:438481731081@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-publishing-bot@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-438481731081@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-438481731081@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-438481731081@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-438481731081@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-publishing-bot@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-publishing-bot@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-publishing-bot/services/enabled.txt b/audit/projects/k8s-staging-publishing-bot/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-publishing-bot/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-releng-test/buckets/artifacts.k8s-staging-releng-test.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-releng-test/buckets/artifacts.k8s-staging-releng-test.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index f4205ea17ec9..000000000000 --- a/audit/projects/k8s-staging-releng-test/buckets/artifacts.k8s-staging-releng-test.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-releng-test.appspot.com: - Enabled: True - LockedTime: 2021-04-29 15:47:14.246000+00:00 - diff --git a/audit/projects/k8s-staging-releng-test/buckets/artifacts.k8s-staging-releng-test.appspot.com/cors.txt b/audit/projects/k8s-staging-releng-test/buckets/artifacts.k8s-staging-releng-test.appspot.com/cors.txt deleted file mode 100644 index df5e301bc89a..000000000000 --- a/audit/projects/k8s-staging-releng-test/buckets/artifacts.k8s-staging-releng-test.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-releng-test.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-releng-test/buckets/artifacts.k8s-staging-releng-test.appspot.com/iam.json b/audit/projects/k8s-staging-releng-test/buckets/artifacts.k8s-staging-releng-test.appspot.com/iam.json deleted file mode 100644 index 5d1777970073..000000000000 --- a/audit/projects/k8s-staging-releng-test/buckets/artifacts.k8s-staging-releng-test.appspot.com/iam.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-releng-test", - "projectOwner:k8s-staging-releng-test" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-releng-test" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-releng-test@kubernetes.io", - "serviceAccount:gcb-builder-releng-test@k8s-staging-releng-test.iam.gserviceaccount.com" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-releng-test@kubernetes.io", - "serviceAccount:gcb-builder-releng-test@k8s-staging-releng-test.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-releng-test/buckets/artifacts.k8s-staging-releng-test.appspot.com/logging.txt b/audit/projects/k8s-staging-releng-test/buckets/artifacts.k8s-staging-releng-test.appspot.com/logging.txt deleted file mode 100644 index 439e0edf0ffc..000000000000 --- a/audit/projects/k8s-staging-releng-test/buckets/artifacts.k8s-staging-releng-test.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-releng-test.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-releng-test/buckets/k8s-staging-releng-test-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-releng-test/buckets/k8s-staging-releng-test-gcb/bucketpolicyonly.txt deleted file mode 100644 index d1998391f0be..000000000000 --- a/audit/projects/k8s-staging-releng-test/buckets/k8s-staging-releng-test-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-releng-test-gcb: - Enabled: True - LockedTime: 2021-04-29 15:47:48.938000+00:00 - diff --git a/audit/projects/k8s-staging-releng-test/buckets/k8s-staging-releng-test-gcb/cors.txt b/audit/projects/k8s-staging-releng-test/buckets/k8s-staging-releng-test-gcb/cors.txt deleted file mode 100644 index 867cc4956540..000000000000 --- a/audit/projects/k8s-staging-releng-test/buckets/k8s-staging-releng-test-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-releng-test-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-releng-test/buckets/k8s-staging-releng-test-gcb/iam.json b/audit/projects/k8s-staging-releng-test/buckets/k8s-staging-releng-test-gcb/iam.json deleted file mode 100644 index abf141328c88..000000000000 --- a/audit/projects/k8s-staging-releng-test/buckets/k8s-staging-releng-test-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-releng-test", - "projectOwner:k8s-staging-releng-test" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-releng-test" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-releng-test@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-releng-test@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-releng-test/buckets/k8s-staging-releng-test-gcb/logging.txt b/audit/projects/k8s-staging-releng-test/buckets/k8s-staging-releng-test-gcb/logging.txt deleted file mode 100644 index 6e979dfcb92f..000000000000 --- a/audit/projects/k8s-staging-releng-test/buckets/k8s-staging-releng-test-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-releng-test-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-releng-test/buckets/k8s-staging-releng-test/bucketpolicyonly.txt b/audit/projects/k8s-staging-releng-test/buckets/k8s-staging-releng-test/bucketpolicyonly.txt deleted file mode 100644 index 7cc32b3577a1..000000000000 --- a/audit/projects/k8s-staging-releng-test/buckets/k8s-staging-releng-test/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-releng-test: - Enabled: True - LockedTime: 2021-04-29 15:47:30.439000+00:00 - diff --git a/audit/projects/k8s-staging-releng-test/buckets/k8s-staging-releng-test/cors.txt b/audit/projects/k8s-staging-releng-test/buckets/k8s-staging-releng-test/cors.txt deleted file mode 100644 index de21fb66a129..000000000000 --- a/audit/projects/k8s-staging-releng-test/buckets/k8s-staging-releng-test/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-releng-test/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-releng-test/buckets/k8s-staging-releng-test/iam.json b/audit/projects/k8s-staging-releng-test/buckets/k8s-staging-releng-test/iam.json deleted file mode 100644 index 452dd81e2d37..000000000000 --- a/audit/projects/k8s-staging-releng-test/buckets/k8s-staging-releng-test/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-releng-test", - "projectOwner:k8s-staging-releng-test" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-releng-test" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-releng-test@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-releng-test@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-releng-test/buckets/k8s-staging-releng-test/logging.txt b/audit/projects/k8s-staging-releng-test/buckets/k8s-staging-releng-test/logging.txt deleted file mode 100644 index fbd33c0d161f..000000000000 --- a/audit/projects/k8s-staging-releng-test/buckets/k8s-staging-releng-test/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-releng-test/ has no logging configuration. diff --git a/audit/projects/k8s-staging-releng-test/description.json b/audit/projects/k8s-staging-releng-test/description.json deleted file mode 100644 index c3a79c46c9a7..000000000000 --- a/audit/projects/k8s-staging-releng-test/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2021-01-29T15:02:49.545Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-releng-test", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-releng-test", - "projectNumber": "86929635859" -} diff --git a/audit/projects/k8s-staging-releng-test/iam.json b/audit/projects/k8s-staging-releng-test/iam.json deleted file mode 100644 index d44cf27a97a1..000000000000 --- a/audit/projects/k8s-staging-releng-test/iam.json +++ /dev/null @@ -1,69 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:86929635859@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder-releng-test@k8s-staging-releng-test.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-releng-test@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-86929635859@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-86929635859@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-86929635859@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-86929635859@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-releng-test@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-releng-test@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-releng-test/service-accounts/gcb-builder-releng-test@k8s-staging-releng-test.iam.gserviceaccount.com/description.json b/audit/projects/k8s-staging-releng-test/service-accounts/gcb-builder-releng-test@k8s-staging-releng-test.iam.gserviceaccount.com/description.json deleted file mode 100644 index a61fdcaf03db..000000000000 --- a/audit/projects/k8s-staging-releng-test/service-accounts/gcb-builder-releng-test@k8s-staging-releng-test.iam.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "used by k8s-infra-prow-build to trigger GCB, write to GCR for k8s-staging-releng-test", - "email": "gcb-builder-releng-test@k8s-staging-releng-test.iam.gserviceaccount.com", - "name": "projects/k8s-staging-releng-test/serviceAccounts/gcb-builder-releng-test@k8s-staging-releng-test.iam.gserviceaccount.com", - "oauth2ClientId": "106077646816281830376", - "projectId": "k8s-staging-releng-test", - "uniqueId": "106077646816281830376" -} diff --git a/audit/projects/k8s-staging-releng-test/service-accounts/gcb-builder-releng-test@k8s-staging-releng-test.iam.gserviceaccount.com/iam.json b/audit/projects/k8s-staging-releng-test/service-accounts/gcb-builder-releng-test@k8s-staging-releng-test.iam.gserviceaccount.com/iam.json deleted file mode 100644 index 726638d4d868..000000000000 --- a/audit/projects/k8s-staging-releng-test/service-accounts/gcb-builder-releng-test@k8s-staging-releng-test.iam.gserviceaccount.com/iam.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:k8s-infra-prow-build.svc.id.goog[test-pods/gcb-builder-releng-test]" - ], - "role": "roles/iam.workloadIdentityUser" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-releng-test/services/enabled.txt b/audit/projects/k8s-staging-releng-test/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-releng-test/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-releng/buckets/artifacts.k8s-staging-releng.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-releng/buckets/artifacts.k8s-staging-releng.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index e1d07876bfe9..000000000000 --- a/audit/projects/k8s-staging-releng/buckets/artifacts.k8s-staging-releng.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-releng.appspot.com: - Enabled: True - LockedTime: 2020-06-04 23:32:13.116000+00:00 - diff --git a/audit/projects/k8s-staging-releng/buckets/artifacts.k8s-staging-releng.appspot.com/cors.txt b/audit/projects/k8s-staging-releng/buckets/artifacts.k8s-staging-releng.appspot.com/cors.txt deleted file mode 100644 index 870a76a8cd3e..000000000000 --- a/audit/projects/k8s-staging-releng/buckets/artifacts.k8s-staging-releng.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-releng.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-releng/buckets/artifacts.k8s-staging-releng.appspot.com/iam.json b/audit/projects/k8s-staging-releng/buckets/artifacts.k8s-staging-releng.appspot.com/iam.json deleted file mode 100644 index d900032c342f..000000000000 --- a/audit/projects/k8s-staging-releng/buckets/artifacts.k8s-staging-releng.appspot.com/iam.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-releng", - "projectOwner:k8s-staging-releng" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-releng@kubernetes.io", - "projectViewer:k8s-staging-releng" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-releng@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-releng@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-releng/buckets/artifacts.k8s-staging-releng.appspot.com/logging.txt b/audit/projects/k8s-staging-releng/buckets/artifacts.k8s-staging-releng.appspot.com/logging.txt deleted file mode 100644 index 2c06eb37515f..000000000000 --- a/audit/projects/k8s-staging-releng/buckets/artifacts.k8s-staging-releng.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-releng.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-releng/buckets/k8s-staging-releng-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-releng/buckets/k8s-staging-releng-gcb/bucketpolicyonly.txt deleted file mode 100644 index 6976f85e5500..000000000000 --- a/audit/projects/k8s-staging-releng/buckets/k8s-staging-releng-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-releng-gcb: - Enabled: True - LockedTime: 2020-06-04 23:32:49.620000+00:00 - diff --git a/audit/projects/k8s-staging-releng/buckets/k8s-staging-releng-gcb/cors.txt b/audit/projects/k8s-staging-releng/buckets/k8s-staging-releng-gcb/cors.txt deleted file mode 100644 index 75d697001c75..000000000000 --- a/audit/projects/k8s-staging-releng/buckets/k8s-staging-releng-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-releng-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-releng/buckets/k8s-staging-releng-gcb/iam.json b/audit/projects/k8s-staging-releng/buckets/k8s-staging-releng-gcb/iam.json deleted file mode 100644 index 8aea9d8c951a..000000000000 --- a/audit/projects/k8s-staging-releng/buckets/k8s-staging-releng-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-releng", - "projectOwner:k8s-staging-releng" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-releng" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-releng@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-releng@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-releng/buckets/k8s-staging-releng-gcb/logging.txt b/audit/projects/k8s-staging-releng/buckets/k8s-staging-releng-gcb/logging.txt deleted file mode 100644 index c4d277cb22da..000000000000 --- a/audit/projects/k8s-staging-releng/buckets/k8s-staging-releng-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-releng-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-releng/buckets/k8s-staging-releng/bucketpolicyonly.txt b/audit/projects/k8s-staging-releng/buckets/k8s-staging-releng/bucketpolicyonly.txt deleted file mode 100644 index 725903c4b2a2..000000000000 --- a/audit/projects/k8s-staging-releng/buckets/k8s-staging-releng/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-releng: - Enabled: True - LockedTime: 2020-06-04 23:32:32.717000+00:00 - diff --git a/audit/projects/k8s-staging-releng/buckets/k8s-staging-releng/cors.txt b/audit/projects/k8s-staging-releng/buckets/k8s-staging-releng/cors.txt deleted file mode 100644 index ba639dfb743e..000000000000 --- a/audit/projects/k8s-staging-releng/buckets/k8s-staging-releng/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-releng/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-releng/buckets/k8s-staging-releng/iam.json b/audit/projects/k8s-staging-releng/buckets/k8s-staging-releng/iam.json deleted file mode 100644 index 35b0140b9174..000000000000 --- a/audit/projects/k8s-staging-releng/buckets/k8s-staging-releng/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-releng", - "projectOwner:k8s-staging-releng" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-releng" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-releng@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-releng@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-releng/buckets/k8s-staging-releng/logging.txt b/audit/projects/k8s-staging-releng/buckets/k8s-staging-releng/logging.txt deleted file mode 100644 index 54555d249bab..000000000000 --- a/audit/projects/k8s-staging-releng/buckets/k8s-staging-releng/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-releng/ has no logging configuration. diff --git a/audit/projects/k8s-staging-releng/description.json b/audit/projects/k8s-staging-releng/description.json deleted file mode 100644 index b83069ab005d..000000000000 --- a/audit/projects/k8s-staging-releng/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-03-06T23:31:33.707Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-releng", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-releng", - "projectNumber": "117157742389" -} diff --git a/audit/projects/k8s-staging-releng/iam.json b/audit/projects/k8s-staging-releng/iam.json deleted file mode 100644 index 28f53099da4c..000000000000 --- a/audit/projects/k8s-staging-releng/iam.json +++ /dev/null @@ -1,69 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:117157742389@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-releng@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-117157742389@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-117157742389@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-117157742389@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-117157742389@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-releng@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-release-viewers@kubernetes.io", - "group:k8s-infra-staging-releng@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-releng/services/enabled.txt b/audit/projects/k8s-staging-releng/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-releng/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-scheduler-plugins/buckets/artifacts.k8s-staging-scheduler-plugins.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-scheduler-plugins/buckets/artifacts.k8s-staging-scheduler-plugins.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 63fe41432ae8..000000000000 --- a/audit/projects/k8s-staging-scheduler-plugins/buckets/artifacts.k8s-staging-scheduler-plugins.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-scheduler-plugins.appspot.com: - Enabled: True - LockedTime: 2020-12-09 13:42:05.776000+00:00 - diff --git a/audit/projects/k8s-staging-scheduler-plugins/buckets/artifacts.k8s-staging-scheduler-plugins.appspot.com/cors.txt b/audit/projects/k8s-staging-scheduler-plugins/buckets/artifacts.k8s-staging-scheduler-plugins.appspot.com/cors.txt deleted file mode 100644 index 23475e4f21da..000000000000 --- a/audit/projects/k8s-staging-scheduler-plugins/buckets/artifacts.k8s-staging-scheduler-plugins.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-scheduler-plugins.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-scheduler-plugins/buckets/artifacts.k8s-staging-scheduler-plugins.appspot.com/iam.json b/audit/projects/k8s-staging-scheduler-plugins/buckets/artifacts.k8s-staging-scheduler-plugins.appspot.com/iam.json deleted file mode 100644 index b4a644a9d4d9..000000000000 --- a/audit/projects/k8s-staging-scheduler-plugins/buckets/artifacts.k8s-staging-scheduler-plugins.appspot.com/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-scheduler-plugins", - "projectOwner:k8s-staging-scheduler-plugins" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-scheduler-plugins" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-scheduler-plugins@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-scheduler-plugins@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-scheduler-plugins/buckets/artifacts.k8s-staging-scheduler-plugins.appspot.com/logging.txt b/audit/projects/k8s-staging-scheduler-plugins/buckets/artifacts.k8s-staging-scheduler-plugins.appspot.com/logging.txt deleted file mode 100644 index 01b5ca6380a1..000000000000 --- a/audit/projects/k8s-staging-scheduler-plugins/buckets/artifacts.k8s-staging-scheduler-plugins.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-scheduler-plugins.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins-gcb/bucketpolicyonly.txt deleted file mode 100644 index c3b3aec9f06c..000000000000 --- a/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-scheduler-plugins-gcb: - Enabled: True - LockedTime: 2020-12-09 13:42:45.343000+00:00 - diff --git a/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins-gcb/cors.txt b/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins-gcb/cors.txt deleted file mode 100644 index 25a3ec0c4eca..000000000000 --- a/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-scheduler-plugins-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins-gcb/iam.json b/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins-gcb/iam.json deleted file mode 100644 index 68c2c599244e..000000000000 --- a/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-scheduler-plugins", - "projectOwner:k8s-staging-scheduler-plugins" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-scheduler-plugins" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-scheduler-plugins@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-scheduler-plugins@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins-gcb/logging.txt b/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins-gcb/logging.txt deleted file mode 100644 index 7c2ed5e28eed..000000000000 --- a/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-scheduler-plugins-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins/bucketpolicyonly.txt b/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins/bucketpolicyonly.txt deleted file mode 100644 index 9f62c02a36c7..000000000000 --- a/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-scheduler-plugins: - Enabled: True - LockedTime: 2020-12-09 13:42:25.741000+00:00 - diff --git a/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins/cors.txt b/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins/cors.txt deleted file mode 100644 index 0e1897bffc4d..000000000000 --- a/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-scheduler-plugins/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins/iam.json b/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins/iam.json deleted file mode 100644 index b4a644a9d4d9..000000000000 --- a/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-scheduler-plugins", - "projectOwner:k8s-staging-scheduler-plugins" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-scheduler-plugins" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-scheduler-plugins@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-scheduler-plugins@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins/logging.txt b/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins/logging.txt deleted file mode 100644 index b37dd17c6385..000000000000 --- a/audit/projects/k8s-staging-scheduler-plugins/buckets/k8s-staging-scheduler-plugins/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-scheduler-plugins/ has no logging configuration. diff --git a/audit/projects/k8s-staging-scheduler-plugins/description.json b/audit/projects/k8s-staging-scheduler-plugins/description.json deleted file mode 100644 index 32660f1ce858..000000000000 --- a/audit/projects/k8s-staging-scheduler-plugins/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-09-10T13:41:08.256Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-scheduler-plugins", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-scheduler-plugins", - "projectNumber": "96918712006" -} diff --git a/audit/projects/k8s-staging-scheduler-plugins/iam.json b/audit/projects/k8s-staging-scheduler-plugins/iam.json deleted file mode 100644 index c716dcce807c..000000000000 --- a/audit/projects/k8s-staging-scheduler-plugins/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:96918712006@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-scheduler-plugins@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-96918712006@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-96918712006@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-96918712006@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-96918712006@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-scheduler-plugins@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-scheduler-plugins@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-scheduler-plugins/services/enabled.txt b/audit/projects/k8s-staging-scheduler-plugins/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-scheduler-plugins/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-scl-image-builder/buckets/artifacts.k8s-staging-scl-image-builder.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-scl-image-builder/buckets/artifacts.k8s-staging-scl-image-builder.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 0c0b1d04a901..000000000000 --- a/audit/projects/k8s-staging-scl-image-builder/buckets/artifacts.k8s-staging-scl-image-builder.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-scl-image-builder.appspot.com: - Enabled: True - LockedTime: 2020-05-11 21:35:10.915000+00:00 - diff --git a/audit/projects/k8s-staging-scl-image-builder/buckets/artifacts.k8s-staging-scl-image-builder.appspot.com/cors.txt b/audit/projects/k8s-staging-scl-image-builder/buckets/artifacts.k8s-staging-scl-image-builder.appspot.com/cors.txt deleted file mode 100644 index b8802b47ef94..000000000000 --- a/audit/projects/k8s-staging-scl-image-builder/buckets/artifacts.k8s-staging-scl-image-builder.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-scl-image-builder.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-scl-image-builder/buckets/artifacts.k8s-staging-scl-image-builder.appspot.com/iam.json b/audit/projects/k8s-staging-scl-image-builder/buckets/artifacts.k8s-staging-scl-image-builder.appspot.com/iam.json deleted file mode 100644 index 6a07520824fa..000000000000 --- a/audit/projects/k8s-staging-scl-image-builder/buckets/artifacts.k8s-staging-scl-image-builder.appspot.com/iam.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-scl-image-builder", - "projectOwner:k8s-staging-scl-image-builder" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-scl-image-builder@kubernetes.io", - "projectViewer:k8s-staging-scl-image-builder" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-scl-image-builder@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-scl-image-builder@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-scl-image-builder/buckets/artifacts.k8s-staging-scl-image-builder.appspot.com/logging.txt b/audit/projects/k8s-staging-scl-image-builder/buckets/artifacts.k8s-staging-scl-image-builder.appspot.com/logging.txt deleted file mode 100644 index 904381aae184..000000000000 --- a/audit/projects/k8s-staging-scl-image-builder/buckets/artifacts.k8s-staging-scl-image-builder.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-scl-image-builder.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-scl-image-builder/buckets/k8s-staging-scl-image-builder-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-scl-image-builder/buckets/k8s-staging-scl-image-builder-gcb/bucketpolicyonly.txt deleted file mode 100644 index 3bb8824b5911..000000000000 --- a/audit/projects/k8s-staging-scl-image-builder/buckets/k8s-staging-scl-image-builder-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-scl-image-builder-gcb: - Enabled: True - LockedTime: 2020-05-11 21:35:47.823000+00:00 - diff --git a/audit/projects/k8s-staging-scl-image-builder/buckets/k8s-staging-scl-image-builder-gcb/cors.txt b/audit/projects/k8s-staging-scl-image-builder/buckets/k8s-staging-scl-image-builder-gcb/cors.txt deleted file mode 100644 index 0a8cac86a33d..000000000000 --- a/audit/projects/k8s-staging-scl-image-builder/buckets/k8s-staging-scl-image-builder-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-scl-image-builder-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-scl-image-builder/buckets/k8s-staging-scl-image-builder-gcb/iam.json b/audit/projects/k8s-staging-scl-image-builder/buckets/k8s-staging-scl-image-builder-gcb/iam.json deleted file mode 100644 index 2961275200c6..000000000000 --- a/audit/projects/k8s-staging-scl-image-builder/buckets/k8s-staging-scl-image-builder-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-scl-image-builder", - "projectOwner:k8s-staging-scl-image-builder" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-scl-image-builder" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-scl-image-builder@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-scl-image-builder@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-scl-image-builder/buckets/k8s-staging-scl-image-builder-gcb/logging.txt b/audit/projects/k8s-staging-scl-image-builder/buckets/k8s-staging-scl-image-builder-gcb/logging.txt deleted file mode 100644 index dba6c3c632dd..000000000000 --- a/audit/projects/k8s-staging-scl-image-builder/buckets/k8s-staging-scl-image-builder-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-scl-image-builder-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-scl-image-builder/buckets/k8s-staging-scl-image-builder/bucketpolicyonly.txt b/audit/projects/k8s-staging-scl-image-builder/buckets/k8s-staging-scl-image-builder/bucketpolicyonly.txt deleted file mode 100644 index 155b916665aa..000000000000 --- a/audit/projects/k8s-staging-scl-image-builder/buckets/k8s-staging-scl-image-builder/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-scl-image-builder: - Enabled: True - LockedTime: 2020-05-11 21:35:32.621000+00:00 - diff --git a/audit/projects/k8s-staging-scl-image-builder/buckets/k8s-staging-scl-image-builder/cors.txt b/audit/projects/k8s-staging-scl-image-builder/buckets/k8s-staging-scl-image-builder/cors.txt deleted file mode 100644 index 773d09d1fa7a..000000000000 --- a/audit/projects/k8s-staging-scl-image-builder/buckets/k8s-staging-scl-image-builder/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-scl-image-builder/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-scl-image-builder/buckets/k8s-staging-scl-image-builder/iam.json b/audit/projects/k8s-staging-scl-image-builder/buckets/k8s-staging-scl-image-builder/iam.json deleted file mode 100644 index 89c9b4b7a1a3..000000000000 --- a/audit/projects/k8s-staging-scl-image-builder/buckets/k8s-staging-scl-image-builder/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-scl-image-builder", - "projectOwner:k8s-staging-scl-image-builder" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-scl-image-builder" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-scl-image-builder@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-scl-image-builder@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-scl-image-builder/buckets/k8s-staging-scl-image-builder/logging.txt b/audit/projects/k8s-staging-scl-image-builder/buckets/k8s-staging-scl-image-builder/logging.txt deleted file mode 100644 index a23455bb3539..000000000000 --- a/audit/projects/k8s-staging-scl-image-builder/buckets/k8s-staging-scl-image-builder/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-scl-image-builder/ has no logging configuration. diff --git a/audit/projects/k8s-staging-scl-image-builder/description.json b/audit/projects/k8s-staging-scl-image-builder/description.json deleted file mode 100644 index 00546502d00b..000000000000 --- a/audit/projects/k8s-staging-scl-image-builder/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-02-11T21:34:30.213Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-scl-image-builder", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-scl-image-builder", - "projectNumber": "974299031321" -} diff --git a/audit/projects/k8s-staging-scl-image-builder/iam.json b/audit/projects/k8s-staging-scl-image-builder/iam.json deleted file mode 100644 index 58a3bfb4e306..000000000000 --- a/audit/projects/k8s-staging-scl-image-builder/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:974299031321@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-scl-image-builder@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-974299031321@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-974299031321@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-974299031321@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-974299031321@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-scl-image-builder@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-scl-image-builder@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-scl-image-builder/services/enabled.txt b/audit/projects/k8s-staging-scl-image-builder/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-scl-image-builder/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-service-apis/buckets/artifacts.k8s-staging-service-apis.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-service-apis/buckets/artifacts.k8s-staging-service-apis.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 26926029d9fc..000000000000 --- a/audit/projects/k8s-staging-service-apis/buckets/artifacts.k8s-staging-service-apis.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-service-apis.appspot.com: - Enabled: True - LockedTime: 2020-03-16 00:45:29.420000+00:00 - diff --git a/audit/projects/k8s-staging-service-apis/buckets/artifacts.k8s-staging-service-apis.appspot.com/cors.txt b/audit/projects/k8s-staging-service-apis/buckets/artifacts.k8s-staging-service-apis.appspot.com/cors.txt deleted file mode 100644 index 2de929566151..000000000000 --- a/audit/projects/k8s-staging-service-apis/buckets/artifacts.k8s-staging-service-apis.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-service-apis.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-service-apis/buckets/artifacts.k8s-staging-service-apis.appspot.com/iam.json b/audit/projects/k8s-staging-service-apis/buckets/artifacts.k8s-staging-service-apis.appspot.com/iam.json deleted file mode 100644 index 9f64793fb0cb..000000000000 --- a/audit/projects/k8s-staging-service-apis/buckets/artifacts.k8s-staging-service-apis.appspot.com/iam.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-service-apis", - "projectOwner:k8s-staging-service-apis" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-service-apis@kubernetes.io", - "projectViewer:k8s-staging-service-apis" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-service-apis@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-service-apis@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-service-apis/buckets/artifacts.k8s-staging-service-apis.appspot.com/logging.txt b/audit/projects/k8s-staging-service-apis/buckets/artifacts.k8s-staging-service-apis.appspot.com/logging.txt deleted file mode 100644 index f7ce90521f11..000000000000 --- a/audit/projects/k8s-staging-service-apis/buckets/artifacts.k8s-staging-service-apis.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-service-apis.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-service-apis/buckets/k8s-staging-service-apis-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-service-apis/buckets/k8s-staging-service-apis-gcb/bucketpolicyonly.txt deleted file mode 100644 index 3139d2b1a103..000000000000 --- a/audit/projects/k8s-staging-service-apis/buckets/k8s-staging-service-apis-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-service-apis-gcb: - Enabled: True - LockedTime: 2020-03-16 00:46:04.422000+00:00 - diff --git a/audit/projects/k8s-staging-service-apis/buckets/k8s-staging-service-apis-gcb/cors.txt b/audit/projects/k8s-staging-service-apis/buckets/k8s-staging-service-apis-gcb/cors.txt deleted file mode 100644 index 74e5d5d14878..000000000000 --- a/audit/projects/k8s-staging-service-apis/buckets/k8s-staging-service-apis-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-service-apis-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-service-apis/buckets/k8s-staging-service-apis-gcb/iam.json b/audit/projects/k8s-staging-service-apis/buckets/k8s-staging-service-apis-gcb/iam.json deleted file mode 100644 index 79d48c60d764..000000000000 --- a/audit/projects/k8s-staging-service-apis/buckets/k8s-staging-service-apis-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-service-apis", - "projectOwner:k8s-staging-service-apis" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-service-apis" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-service-apis@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-service-apis@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-service-apis/buckets/k8s-staging-service-apis-gcb/logging.txt b/audit/projects/k8s-staging-service-apis/buckets/k8s-staging-service-apis-gcb/logging.txt deleted file mode 100644 index 7b8af32bd4e8..000000000000 --- a/audit/projects/k8s-staging-service-apis/buckets/k8s-staging-service-apis-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-service-apis-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-service-apis/buckets/k8s-staging-service-apis/bucketpolicyonly.txt b/audit/projects/k8s-staging-service-apis/buckets/k8s-staging-service-apis/bucketpolicyonly.txt deleted file mode 100644 index 7699124a58cd..000000000000 --- a/audit/projects/k8s-staging-service-apis/buckets/k8s-staging-service-apis/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-service-apis: - Enabled: True - LockedTime: 2020-03-16 00:45:47.915000+00:00 - diff --git a/audit/projects/k8s-staging-service-apis/buckets/k8s-staging-service-apis/cors.txt b/audit/projects/k8s-staging-service-apis/buckets/k8s-staging-service-apis/cors.txt deleted file mode 100644 index 5e7fbf1c3fd8..000000000000 --- a/audit/projects/k8s-staging-service-apis/buckets/k8s-staging-service-apis/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-service-apis/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-service-apis/buckets/k8s-staging-service-apis/iam.json b/audit/projects/k8s-staging-service-apis/buckets/k8s-staging-service-apis/iam.json deleted file mode 100644 index 8a1fb83ff26e..000000000000 --- a/audit/projects/k8s-staging-service-apis/buckets/k8s-staging-service-apis/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-service-apis", - "projectOwner:k8s-staging-service-apis" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-service-apis" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-service-apis@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-service-apis@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-service-apis/buckets/k8s-staging-service-apis/logging.txt b/audit/projects/k8s-staging-service-apis/buckets/k8s-staging-service-apis/logging.txt deleted file mode 100644 index 7019d04ff7fc..000000000000 --- a/audit/projects/k8s-staging-service-apis/buckets/k8s-staging-service-apis/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-service-apis/ has no logging configuration. diff --git a/audit/projects/k8s-staging-service-apis/description.json b/audit/projects/k8s-staging-service-apis/description.json deleted file mode 100644 index 64c08ca5ec82..000000000000 --- a/audit/projects/k8s-staging-service-apis/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2019-12-17T00:44:47.411Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-service-apis", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-service-apis", - "projectNumber": "1031494980804" -} diff --git a/audit/projects/k8s-staging-service-apis/iam.json b/audit/projects/k8s-staging-service-apis/iam.json deleted file mode 100644 index 3ba8c9b53e27..000000000000 --- a/audit/projects/k8s-staging-service-apis/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:1031494980804@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-service-apis@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-1031494980804@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-1031494980804@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-1031494980804@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-1031494980804@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-service-apis@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-service-apis@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-service-apis/services/enabled.txt b/audit/projects/k8s-staging-service-apis/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-service-apis/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-sig-docs/buckets/artifacts.k8s-staging-sig-docs.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-sig-docs/buckets/artifacts.k8s-staging-sig-docs.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index f45f9ff074a9..000000000000 --- a/audit/projects/k8s-staging-sig-docs/buckets/artifacts.k8s-staging-sig-docs.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-sig-docs.appspot.com: - Enabled: True - LockedTime: 2021-01-03 17:45:17.069000+00:00 - diff --git a/audit/projects/k8s-staging-sig-docs/buckets/artifacts.k8s-staging-sig-docs.appspot.com/cors.txt b/audit/projects/k8s-staging-sig-docs/buckets/artifacts.k8s-staging-sig-docs.appspot.com/cors.txt deleted file mode 100644 index e9885d5a0ac9..000000000000 --- a/audit/projects/k8s-staging-sig-docs/buckets/artifacts.k8s-staging-sig-docs.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-sig-docs.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-sig-docs/buckets/artifacts.k8s-staging-sig-docs.appspot.com/iam.json b/audit/projects/k8s-staging-sig-docs/buckets/artifacts.k8s-staging-sig-docs.appspot.com/iam.json deleted file mode 100644 index 4934ac4c3dd6..000000000000 --- a/audit/projects/k8s-staging-sig-docs/buckets/artifacts.k8s-staging-sig-docs.appspot.com/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-sig-docs", - "projectOwner:k8s-staging-sig-docs" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-sig-docs" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-sig-docs@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-sig-docs@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-sig-docs/buckets/artifacts.k8s-staging-sig-docs.appspot.com/logging.txt b/audit/projects/k8s-staging-sig-docs/buckets/artifacts.k8s-staging-sig-docs.appspot.com/logging.txt deleted file mode 100644 index 1d2c15d411a0..000000000000 --- a/audit/projects/k8s-staging-sig-docs/buckets/artifacts.k8s-staging-sig-docs.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-sig-docs.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs-gcb/bucketpolicyonly.txt deleted file mode 100644 index ee8b32352ee9..000000000000 --- a/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-sig-docs-gcb: - Enabled: True - LockedTime: 2021-01-03 17:46:16.352000+00:00 - diff --git a/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs-gcb/cors.txt b/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs-gcb/cors.txt deleted file mode 100644 index 08f95ea43408..000000000000 --- a/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-sig-docs-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs-gcb/iam.json b/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs-gcb/iam.json deleted file mode 100644 index aa7a5c0b6a1e..000000000000 --- a/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-sig-docs", - "projectOwner:k8s-staging-sig-docs" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-sig-docs" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-sig-docs@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-sig-docs@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs-gcb/logging.txt b/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs-gcb/logging.txt deleted file mode 100644 index 208f0052d143..000000000000 --- a/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-sig-docs-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs/bucketpolicyonly.txt b/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs/bucketpolicyonly.txt deleted file mode 100644 index aa87d84a7510..000000000000 --- a/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-sig-docs: - Enabled: True - LockedTime: 2021-01-03 17:45:44.048000+00:00 - diff --git a/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs/cors.txt b/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs/cors.txt deleted file mode 100644 index ba67eccc0a91..000000000000 --- a/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-sig-docs/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs/iam.json b/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs/iam.json deleted file mode 100644 index 4934ac4c3dd6..000000000000 --- a/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-sig-docs", - "projectOwner:k8s-staging-sig-docs" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-sig-docs" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-sig-docs@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-sig-docs@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs/logging.txt b/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs/logging.txt deleted file mode 100644 index 421e708c9ff9..000000000000 --- a/audit/projects/k8s-staging-sig-docs/buckets/k8s-staging-sig-docs/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-sig-docs/ has no logging configuration. diff --git a/audit/projects/k8s-staging-sig-docs/description.json b/audit/projects/k8s-staging-sig-docs/description.json deleted file mode 100644 index a9cefd3ef324..000000000000 --- a/audit/projects/k8s-staging-sig-docs/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-10-05T17:44:22.198Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-sig-docs", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-sig-docs", - "projectNumber": "563253410071" -} diff --git a/audit/projects/k8s-staging-sig-docs/iam.json b/audit/projects/k8s-staging-sig-docs/iam.json deleted file mode 100644 index fd67ba5c6f96..000000000000 --- a/audit/projects/k8s-staging-sig-docs/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:563253410071@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-sig-docs@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-563253410071@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-563253410071@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-563253410071@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-563253410071@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-sig-docs@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-sig-docs@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-sig-docs/services/enabled.txt b/audit/projects/k8s-staging-sig-docs/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-sig-docs/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-sig-storage/buckets/artifacts.k8s-staging-sig-storage.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-sig-storage/buckets/artifacts.k8s-staging-sig-storage.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 1fd628cfec21..000000000000 --- a/audit/projects/k8s-staging-sig-storage/buckets/artifacts.k8s-staging-sig-storage.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-sig-storage.appspot.com: - Enabled: True - LockedTime: 2020-09-08 03:17:26.822000+00:00 - diff --git a/audit/projects/k8s-staging-sig-storage/buckets/artifacts.k8s-staging-sig-storage.appspot.com/cors.txt b/audit/projects/k8s-staging-sig-storage/buckets/artifacts.k8s-staging-sig-storage.appspot.com/cors.txt deleted file mode 100644 index bd6a0dd11033..000000000000 --- a/audit/projects/k8s-staging-sig-storage/buckets/artifacts.k8s-staging-sig-storage.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-sig-storage.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-sig-storage/buckets/artifacts.k8s-staging-sig-storage.appspot.com/iam.json b/audit/projects/k8s-staging-sig-storage/buckets/artifacts.k8s-staging-sig-storage.appspot.com/iam.json deleted file mode 100644 index 9cc2304ff11c..000000000000 --- a/audit/projects/k8s-staging-sig-storage/buckets/artifacts.k8s-staging-sig-storage.appspot.com/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-sig-storage", - "projectOwner:k8s-staging-sig-storage" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-sig-storage" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-sig-storage@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-sig-storage@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-sig-storage/buckets/artifacts.k8s-staging-sig-storage.appspot.com/logging.txt b/audit/projects/k8s-staging-sig-storage/buckets/artifacts.k8s-staging-sig-storage.appspot.com/logging.txt deleted file mode 100644 index 4db880fdcfec..000000000000 --- a/audit/projects/k8s-staging-sig-storage/buckets/artifacts.k8s-staging-sig-storage.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-sig-storage.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage-gcb/bucketpolicyonly.txt deleted file mode 100644 index c79259a637e9..000000000000 --- a/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-sig-storage-gcb: - Enabled: True - LockedTime: 2020-09-08 03:18:14.421000+00:00 - diff --git a/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage-gcb/cors.txt b/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage-gcb/cors.txt deleted file mode 100644 index ecb08e38d1ed..000000000000 --- a/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-sig-storage-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage-gcb/iam.json b/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage-gcb/iam.json deleted file mode 100644 index 9b45e02849fd..000000000000 --- a/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-sig-storage", - "projectOwner:k8s-staging-sig-storage" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-sig-storage" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-sig-storage@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-sig-storage@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage-gcb/logging.txt b/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage-gcb/logging.txt deleted file mode 100644 index 61fad7657ed8..000000000000 --- a/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-sig-storage-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage/bucketpolicyonly.txt b/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage/bucketpolicyonly.txt deleted file mode 100644 index b421924a8814..000000000000 --- a/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-sig-storage: - Enabled: True - LockedTime: 2020-09-08 03:17:50.721000+00:00 - diff --git a/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage/cors.txt b/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage/cors.txt deleted file mode 100644 index bd3a0c43237a..000000000000 --- a/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-sig-storage/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage/iam.json b/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage/iam.json deleted file mode 100644 index 9cc2304ff11c..000000000000 --- a/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-sig-storage", - "projectOwner:k8s-staging-sig-storage" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-sig-storage" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-sig-storage@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-sig-storage@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage/logging.txt b/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage/logging.txt deleted file mode 100644 index 0ff245252fb3..000000000000 --- a/audit/projects/k8s-staging-sig-storage/buckets/k8s-staging-sig-storage/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-sig-storage/ has no logging configuration. diff --git a/audit/projects/k8s-staging-sig-storage/description.json b/audit/projects/k8s-staging-sig-storage/description.json deleted file mode 100644 index e2a36580c8b7..000000000000 --- a/audit/projects/k8s-staging-sig-storage/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-06-10T03:16:33.040Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-sig-storage", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-sig-storage", - "projectNumber": "272675062337" -} diff --git a/audit/projects/k8s-staging-sig-storage/iam.json b/audit/projects/k8s-staging-sig-storage/iam.json deleted file mode 100644 index 99e50ff82ade..000000000000 --- a/audit/projects/k8s-staging-sig-storage/iam.json +++ /dev/null @@ -1,76 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:272675062337@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-sig-storage@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-272675062337@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-272675062337@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-272675062337@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-272675062337@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:272675062337@cloudservices.gserviceaccount.com", - "serviceAccount:service-272675062337@containerregistry.iam.gserviceaccount.com", - "serviceAccount:272675062337-compute@developer.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-sig-storage@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-sig-storage@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-sig-storage/service-accounts/272675062337-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-staging-sig-storage/service-accounts/272675062337-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 0759c6ff5bcd..000000000000 --- a/audit/projects/k8s-staging-sig-storage/service-accounts/272675062337-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "272675062337-compute@developer.gserviceaccount.com", - "name": "projects/k8s-staging-sig-storage/serviceAccounts/272675062337-compute@developer.gserviceaccount.com", - "oauth2ClientId": "118011729810398942624", - "projectId": "k8s-staging-sig-storage", - "uniqueId": "118011729810398942624" -} diff --git a/audit/projects/k8s-staging-sig-storage/service-accounts/272675062337-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-staging-sig-storage/service-accounts/272675062337-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/k8s-staging-sig-storage/service-accounts/272675062337-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/k8s-staging-sig-storage/services/compute/project-info.json b/audit/projects/k8s-staging-sig-storage/services/compute/project-info.json deleted file mode 100644 index 147cb260ffa9..000000000000 --- a/audit/projects/k8s-staging-sig-storage/services/compute/project-info.json +++ /dev/null @@ -1,171 +0,0 @@ -{ - "commonInstanceMetadata": { - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-12-11T18:11:43.058-08:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "272675062337-compute@developer.gserviceaccount.com", - "id": "7226925129353762865", - "kind": "compute#project", - "name": "k8s-staging-sig-storage", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-staging-sig-storage", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-staging-sig-storage/services/enabled.txt b/audit/projects/k8s-staging-sig-storage/services/enabled.txt deleted file mode 100644 index 661451636fab..000000000000 --- a/audit/projects/k8s-staging-sig-storage/services/enabled.txt +++ /dev/null @@ -1,13 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -compute.googleapis.com Compute Engine API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-slack-infra/buckets/artifacts.k8s-staging-slack-infra.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-slack-infra/buckets/artifacts.k8s-staging-slack-infra.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index ecccb9972c06..000000000000 --- a/audit/projects/k8s-staging-slack-infra/buckets/artifacts.k8s-staging-slack-infra.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-slack-infra.appspot.com: - Enabled: True - LockedTime: 2020-07-29 16:46:51.525000+00:00 - diff --git a/audit/projects/k8s-staging-slack-infra/buckets/artifacts.k8s-staging-slack-infra.appspot.com/cors.txt b/audit/projects/k8s-staging-slack-infra/buckets/artifacts.k8s-staging-slack-infra.appspot.com/cors.txt deleted file mode 100644 index 17bd1a498127..000000000000 --- a/audit/projects/k8s-staging-slack-infra/buckets/artifacts.k8s-staging-slack-infra.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-slack-infra.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-slack-infra/buckets/artifacts.k8s-staging-slack-infra.appspot.com/iam.json b/audit/projects/k8s-staging-slack-infra/buckets/artifacts.k8s-staging-slack-infra.appspot.com/iam.json deleted file mode 100644 index f3717c6eda00..000000000000 --- a/audit/projects/k8s-staging-slack-infra/buckets/artifacts.k8s-staging-slack-infra.appspot.com/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-slack-infra", - "projectOwner:k8s-staging-slack-infra" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-slack-infra" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-slack-infra@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-slack-infra@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-slack-infra/buckets/artifacts.k8s-staging-slack-infra.appspot.com/logging.txt b/audit/projects/k8s-staging-slack-infra/buckets/artifacts.k8s-staging-slack-infra.appspot.com/logging.txt deleted file mode 100644 index af801e1d2e1b..000000000000 --- a/audit/projects/k8s-staging-slack-infra/buckets/artifacts.k8s-staging-slack-infra.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-slack-infra.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra-gcb/bucketpolicyonly.txt deleted file mode 100644 index eb6289dc4ee1..000000000000 --- a/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-slack-infra-gcb: - Enabled: True - LockedTime: 2020-07-29 16:47:37.820000+00:00 - diff --git a/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra-gcb/cors.txt b/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra-gcb/cors.txt deleted file mode 100644 index f2d6b9c0eb3b..000000000000 --- a/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-slack-infra-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra-gcb/iam.json b/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra-gcb/iam.json deleted file mode 100644 index 49d89cace987..000000000000 --- a/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-slack-infra", - "projectOwner:k8s-staging-slack-infra" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-slack-infra" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-slack-infra@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-slack-infra@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra-gcb/logging.txt b/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra-gcb/logging.txt deleted file mode 100644 index 6cee71182dbb..000000000000 --- a/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-slack-infra-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra/bucketpolicyonly.txt b/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra/bucketpolicyonly.txt deleted file mode 100644 index aff3275128a6..000000000000 --- a/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-slack-infra: - Enabled: True - LockedTime: 2020-07-29 16:47:16.216000+00:00 - diff --git a/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra/cors.txt b/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra/cors.txt deleted file mode 100644 index 4e3d8021cef7..000000000000 --- a/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-slack-infra/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra/iam.json b/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra/iam.json deleted file mode 100644 index f3717c6eda00..000000000000 --- a/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-slack-infra", - "projectOwner:k8s-staging-slack-infra" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-slack-infra" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-slack-infra@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-slack-infra@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra/logging.txt b/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra/logging.txt deleted file mode 100644 index c08350630e33..000000000000 --- a/audit/projects/k8s-staging-slack-infra/buckets/k8s-staging-slack-infra/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-slack-infra/ has no logging configuration. diff --git a/audit/projects/k8s-staging-slack-infra/description.json b/audit/projects/k8s-staging-slack-infra/description.json deleted file mode 100644 index 4829123beb39..000000000000 --- a/audit/projects/k8s-staging-slack-infra/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-04-30T16:45:59.137Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-slack-infra", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-slack-infra", - "projectNumber": "470681440884" -} diff --git a/audit/projects/k8s-staging-slack-infra/iam.json b/audit/projects/k8s-staging-slack-infra/iam.json deleted file mode 100644 index f1fcf4d54197..000000000000 --- a/audit/projects/k8s-staging-slack-infra/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:470681440884@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-slack-infra@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-470681440884@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-470681440884@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-470681440884@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-470681440884@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-slack-infra@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-slack-infra@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-slack-infra/services/enabled.txt b/audit/projects/k8s-staging-slack-infra/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-slack-infra/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-sp-operator/buckets/artifacts.k8s-staging-sp-operator.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-sp-operator/buckets/artifacts.k8s-staging-sp-operator.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 2c02420180ca..000000000000 --- a/audit/projects/k8s-staging-sp-operator/buckets/artifacts.k8s-staging-sp-operator.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-sp-operator.appspot.com: - Enabled: True - LockedTime: 2021-01-12 13:37:56.045000+00:00 - diff --git a/audit/projects/k8s-staging-sp-operator/buckets/artifacts.k8s-staging-sp-operator.appspot.com/cors.txt b/audit/projects/k8s-staging-sp-operator/buckets/artifacts.k8s-staging-sp-operator.appspot.com/cors.txt deleted file mode 100644 index 8442e8f4022e..000000000000 --- a/audit/projects/k8s-staging-sp-operator/buckets/artifacts.k8s-staging-sp-operator.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-sp-operator.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-sp-operator/buckets/artifacts.k8s-staging-sp-operator.appspot.com/iam.json b/audit/projects/k8s-staging-sp-operator/buckets/artifacts.k8s-staging-sp-operator.appspot.com/iam.json deleted file mode 100644 index 20e6b1010fa4..000000000000 --- a/audit/projects/k8s-staging-sp-operator/buckets/artifacts.k8s-staging-sp-operator.appspot.com/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-sp-operator", - "projectOwner:k8s-staging-sp-operator" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-sp-operator" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-sp-operator@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-sp-operator@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-sp-operator/buckets/artifacts.k8s-staging-sp-operator.appspot.com/logging.txt b/audit/projects/k8s-staging-sp-operator/buckets/artifacts.k8s-staging-sp-operator.appspot.com/logging.txt deleted file mode 100644 index ebc7e485cc17..000000000000 --- a/audit/projects/k8s-staging-sp-operator/buckets/artifacts.k8s-staging-sp-operator.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-sp-operator.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator-gcb/bucketpolicyonly.txt deleted file mode 100644 index e8dab4e58158..000000000000 --- a/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-sp-operator-gcb: - Enabled: True - LockedTime: 2021-01-12 13:38:38.040000+00:00 - diff --git a/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator-gcb/cors.txt b/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator-gcb/cors.txt deleted file mode 100644 index 9dc7ee8d45d1..000000000000 --- a/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-sp-operator-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator-gcb/iam.json b/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator-gcb/iam.json deleted file mode 100644 index d7371a077e50..000000000000 --- a/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-sp-operator", - "projectOwner:k8s-staging-sp-operator" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-sp-operator" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-sp-operator@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-sp-operator@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator-gcb/logging.txt b/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator-gcb/logging.txt deleted file mode 100644 index f5f32054ec29..000000000000 --- a/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-sp-operator-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator/bucketpolicyonly.txt b/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator/bucketpolicyonly.txt deleted file mode 100644 index f11cb8984c29..000000000000 --- a/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-sp-operator: - Enabled: True - LockedTime: 2021-01-12 13:38:17.242000+00:00 - diff --git a/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator/cors.txt b/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator/cors.txt deleted file mode 100644 index afd4a065bbe6..000000000000 --- a/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-sp-operator/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator/iam.json b/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator/iam.json deleted file mode 100644 index 20e6b1010fa4..000000000000 --- a/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-sp-operator", - "projectOwner:k8s-staging-sp-operator" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-sp-operator" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-sp-operator@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-sp-operator@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator/logging.txt b/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator/logging.txt deleted file mode 100644 index 57630f112f0c..000000000000 --- a/audit/projects/k8s-staging-sp-operator/buckets/k8s-staging-sp-operator/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-sp-operator/ has no logging configuration. diff --git a/audit/projects/k8s-staging-sp-operator/description.json b/audit/projects/k8s-staging-sp-operator/description.json deleted file mode 100644 index 5283210da460..000000000000 --- a/audit/projects/k8s-staging-sp-operator/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-10-14T13:18:07.896Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-sp-operator", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-sp-operator", - "projectNumber": "448637284062" -} diff --git a/audit/projects/k8s-staging-sp-operator/iam.json b/audit/projects/k8s-staging-sp-operator/iam.json deleted file mode 100644 index 5b966c2d5958..000000000000 --- a/audit/projects/k8s-staging-sp-operator/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:448637284062@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-sp-operator@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-448637284062@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-448637284062@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-448637284062@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/containerregistry.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-448637284062@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-sp-operator@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-sp-operator@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-sp-operator/services/enabled.txt b/audit/projects/k8s-staging-sp-operator/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-sp-operator/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-storage-migrator/buckets/artifacts.k8s-staging-storage-migrator.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-storage-migrator/buckets/artifacts.k8s-staging-storage-migrator.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 1bfd38a59177..000000000000 --- a/audit/projects/k8s-staging-storage-migrator/buckets/artifacts.k8s-staging-storage-migrator.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-storage-migrator.appspot.com: - Enabled: True - LockedTime: 2020-12-09 13:43:24.042000+00:00 - diff --git a/audit/projects/k8s-staging-storage-migrator/buckets/artifacts.k8s-staging-storage-migrator.appspot.com/cors.txt b/audit/projects/k8s-staging-storage-migrator/buckets/artifacts.k8s-staging-storage-migrator.appspot.com/cors.txt deleted file mode 100644 index 6d8f29cbb4f2..000000000000 --- a/audit/projects/k8s-staging-storage-migrator/buckets/artifacts.k8s-staging-storage-migrator.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-storage-migrator.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-storage-migrator/buckets/artifacts.k8s-staging-storage-migrator.appspot.com/iam.json b/audit/projects/k8s-staging-storage-migrator/buckets/artifacts.k8s-staging-storage-migrator.appspot.com/iam.json deleted file mode 100644 index 651c461ae33e..000000000000 --- a/audit/projects/k8s-staging-storage-migrator/buckets/artifacts.k8s-staging-storage-migrator.appspot.com/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-storage-migrator", - "projectOwner:k8s-staging-storage-migrator" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-storage-migrator" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-storage-migrator@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-storage-migrator@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-storage-migrator/buckets/artifacts.k8s-staging-storage-migrator.appspot.com/logging.txt b/audit/projects/k8s-staging-storage-migrator/buckets/artifacts.k8s-staging-storage-migrator.appspot.com/logging.txt deleted file mode 100644 index c17c9e0ea660..000000000000 --- a/audit/projects/k8s-staging-storage-migrator/buckets/artifacts.k8s-staging-storage-migrator.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-storage-migrator.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator-gcb/bucketpolicyonly.txt deleted file mode 100644 index d626fad0e393..000000000000 --- a/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-storage-migrator-gcb: - Enabled: True - LockedTime: 2020-12-09 13:44:03.242000+00:00 - diff --git a/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator-gcb/cors.txt b/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator-gcb/cors.txt deleted file mode 100644 index ac0649686e96..000000000000 --- a/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-storage-migrator-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator-gcb/iam.json b/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator-gcb/iam.json deleted file mode 100644 index 9de62f480c2b..000000000000 --- a/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-storage-migrator", - "projectOwner:k8s-staging-storage-migrator" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-storage-migrator" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-storage-migrator@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-storage-migrator@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator-gcb/logging.txt b/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator-gcb/logging.txt deleted file mode 100644 index c2ee846d8a39..000000000000 --- a/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-storage-migrator-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator/bucketpolicyonly.txt b/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator/bucketpolicyonly.txt deleted file mode 100644 index cb17acf4e1f8..000000000000 --- a/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-storage-migrator: - Enabled: True - LockedTime: 2020-12-09 13:43:44.043000+00:00 - diff --git a/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator/cors.txt b/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator/cors.txt deleted file mode 100644 index 431ccdd666c7..000000000000 --- a/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-storage-migrator/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator/iam.json b/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator/iam.json deleted file mode 100644 index 651c461ae33e..000000000000 --- a/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-storage-migrator", - "projectOwner:k8s-staging-storage-migrator" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-storage-migrator" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-storage-migrator@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-storage-migrator@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator/logging.txt b/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator/logging.txt deleted file mode 100644 index b195199781fc..000000000000 --- a/audit/projects/k8s-staging-storage-migrator/buckets/k8s-staging-storage-migrator/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-storage-migrator/ has no logging configuration. diff --git a/audit/projects/k8s-staging-storage-migrator/description.json b/audit/projects/k8s-staging-storage-migrator/description.json deleted file mode 100644 index db3a1ca41162..000000000000 --- a/audit/projects/k8s-staging-storage-migrator/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2020-09-10T13:32:03.114Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-storage-migrator", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-storage-migrator", - "projectNumber": "687417645981" -} diff --git a/audit/projects/k8s-staging-storage-migrator/iam.json b/audit/projects/k8s-staging-storage-migrator/iam.json deleted file mode 100644 index 27532142d13b..000000000000 --- a/audit/projects/k8s-staging-storage-migrator/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:687417645981@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-storage-migrator@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-687417645981@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-687417645981@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-687417645981@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-687417645981@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-storage-migrator@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-storage-migrator@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-storage-migrator/services/enabled.txt b/audit/projects/k8s-staging-storage-migrator/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-storage-migrator/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-txtdirect/buckets/artifacts.k8s-staging-txtdirect.appspot.com/bucketpolicyonly.txt b/audit/projects/k8s-staging-txtdirect/buckets/artifacts.k8s-staging-txtdirect.appspot.com/bucketpolicyonly.txt deleted file mode 100644 index 9e64151e900e..000000000000 --- a/audit/projects/k8s-staging-txtdirect/buckets/artifacts.k8s-staging-txtdirect.appspot.com/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://artifacts.k8s-staging-txtdirect.appspot.com: - Enabled: True - LockedTime: 2020-03-16 22:17:31.612000+00:00 - diff --git a/audit/projects/k8s-staging-txtdirect/buckets/artifacts.k8s-staging-txtdirect.appspot.com/cors.txt b/audit/projects/k8s-staging-txtdirect/buckets/artifacts.k8s-staging-txtdirect.appspot.com/cors.txt deleted file mode 100644 index 2f3cab63d26e..000000000000 --- a/audit/projects/k8s-staging-txtdirect/buckets/artifacts.k8s-staging-txtdirect.appspot.com/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-txtdirect.appspot.com/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-txtdirect/buckets/artifacts.k8s-staging-txtdirect.appspot.com/iam.json b/audit/projects/k8s-staging-txtdirect/buckets/artifacts.k8s-staging-txtdirect.appspot.com/iam.json deleted file mode 100644 index 6bd9e9f2cfd2..000000000000 --- a/audit/projects/k8s-staging-txtdirect/buckets/artifacts.k8s-staging-txtdirect.appspot.com/iam.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-txtdirect", - "projectOwner:k8s-staging-txtdirect" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "group:k8s-infra-staging-txtdirect@kubernetes.io", - "projectViewer:k8s-staging-txtdirect" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-txtdirect@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-txtdirect@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-txtdirect/buckets/artifacts.k8s-staging-txtdirect.appspot.com/logging.txt b/audit/projects/k8s-staging-txtdirect/buckets/artifacts.k8s-staging-txtdirect.appspot.com/logging.txt deleted file mode 100644 index c59012828b54..000000000000 --- a/audit/projects/k8s-staging-txtdirect/buckets/artifacts.k8s-staging-txtdirect.appspot.com/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://artifacts.k8s-staging-txtdirect.appspot.com/ has no logging configuration. diff --git a/audit/projects/k8s-staging-txtdirect/buckets/k8s-staging-txtdirect-gcb/bucketpolicyonly.txt b/audit/projects/k8s-staging-txtdirect/buckets/k8s-staging-txtdirect-gcb/bucketpolicyonly.txt deleted file mode 100644 index c6387132336f..000000000000 --- a/audit/projects/k8s-staging-txtdirect/buckets/k8s-staging-txtdirect-gcb/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-txtdirect-gcb: - Enabled: True - LockedTime: 2020-03-16 22:18:06.318000+00:00 - diff --git a/audit/projects/k8s-staging-txtdirect/buckets/k8s-staging-txtdirect-gcb/cors.txt b/audit/projects/k8s-staging-txtdirect/buckets/k8s-staging-txtdirect-gcb/cors.txt deleted file mode 100644 index f97e1176e167..000000000000 --- a/audit/projects/k8s-staging-txtdirect/buckets/k8s-staging-txtdirect-gcb/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-txtdirect-gcb/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-txtdirect/buckets/k8s-staging-txtdirect-gcb/iam.json b/audit/projects/k8s-staging-txtdirect/buckets/k8s-staging-txtdirect-gcb/iam.json deleted file mode 100644 index 1001451eeff5..000000000000 --- a/audit/projects/k8s-staging-txtdirect/buckets/k8s-staging-txtdirect-gcb/iam.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-txtdirect", - "projectOwner:k8s-staging-txtdirect" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-txtdirect" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-txtdirect@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-txtdirect@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectCreator" - }, - { - "members": [ - "allUsers", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-txtdirect/buckets/k8s-staging-txtdirect-gcb/logging.txt b/audit/projects/k8s-staging-txtdirect/buckets/k8s-staging-txtdirect-gcb/logging.txt deleted file mode 100644 index c71ab7449ea5..000000000000 --- a/audit/projects/k8s-staging-txtdirect/buckets/k8s-staging-txtdirect-gcb/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-txtdirect-gcb/ has no logging configuration. diff --git a/audit/projects/k8s-staging-txtdirect/buckets/k8s-staging-txtdirect/bucketpolicyonly.txt b/audit/projects/k8s-staging-txtdirect/buckets/k8s-staging-txtdirect/bucketpolicyonly.txt deleted file mode 100644 index 2e2a5e617cbf..000000000000 --- a/audit/projects/k8s-staging-txtdirect/buckets/k8s-staging-txtdirect/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-staging-txtdirect: - Enabled: True - LockedTime: 2020-03-16 22:17:50.119000+00:00 - diff --git a/audit/projects/k8s-staging-txtdirect/buckets/k8s-staging-txtdirect/cors.txt b/audit/projects/k8s-staging-txtdirect/buckets/k8s-staging-txtdirect/cors.txt deleted file mode 100644 index 028cddef0f3e..000000000000 --- a/audit/projects/k8s-staging-txtdirect/buckets/k8s-staging-txtdirect/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-txtdirect/ has no CORS configuration. diff --git a/audit/projects/k8s-staging-txtdirect/buckets/k8s-staging-txtdirect/iam.json b/audit/projects/k8s-staging-txtdirect/buckets/k8s-staging-txtdirect/iam.json deleted file mode 100644 index 4c14f24ae64f..000000000000 --- a/audit/projects/k8s-staging-txtdirect/buckets/k8s-staging-txtdirect/iam.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "projectEditor:k8s-staging-txtdirect", - "projectOwner:k8s-staging-txtdirect" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:k8s-staging-txtdirect" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-staging-txtdirect@kubernetes.io" - ], - "role": "roles/storage.legacyBucketWriter" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-txtdirect@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - }, - { - "members": [ - "allUsers" - ], - "role": "roles/storage.objectViewer" - } - ] -} diff --git a/audit/projects/k8s-staging-txtdirect/buckets/k8s-staging-txtdirect/logging.txt b/audit/projects/k8s-staging-txtdirect/buckets/k8s-staging-txtdirect/logging.txt deleted file mode 100644 index 2b5a2c7bbc63..000000000000 --- a/audit/projects/k8s-staging-txtdirect/buckets/k8s-staging-txtdirect/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-staging-txtdirect/ has no logging configuration. diff --git a/audit/projects/k8s-staging-txtdirect/description.json b/audit/projects/k8s-staging-txtdirect/description.json deleted file mode 100644 index b08027cc9824..000000000000 --- a/audit/projects/k8s-staging-txtdirect/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2019-12-17T22:16:50.466Z", - "lifecycleState": "ACTIVE", - "name": "k8s-staging-txtdirect", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "k8s-staging-txtdirect", - "projectNumber": "662592719730" -} diff --git a/audit/projects/k8s-staging-txtdirect/iam.json b/audit/projects/k8s-staging-txtdirect/iam.json deleted file mode 100644 index 08acc36425ff..000000000000 --- a/audit/projects/k8s-staging-txtdirect/iam.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:662592719730@cloudbuild.gserviceaccount.com", - "serviceAccount:deployer@k8s-prow.iam.gserviceaccount.com", - "serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.builds.builder" - }, - { - "members": [ - "group:k8s-infra-staging-txtdirect@kubernetes.io" - ], - "role": "roles/cloudbuild.builds.editor" - }, - { - "members": [ - "serviceAccount:service-662592719730@gcp-sa-cloudbuild.iam.gserviceaccount.com" - ], - "role": "roles/cloudbuild.serviceAgent" - }, - { - "members": [ - "serviceAccount:service-662592719730@container-analysis.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.ServiceAgent" - }, - { - "members": [ - "serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com" - ], - "role": "roles/containeranalysis.occurrences.viewer" - }, - { - "members": [ - "serviceAccount:service-662592719730@gcp-sa-containerscanning.iam.gserviceaccount.com" - ], - "role": "roles/containerscanning.ServiceAgent" - }, - { - "members": [ - "serviceAccount:service-662592719730@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "group:k8s-infra-staging-txtdirect@kubernetes.io" - ], - "role": "roles/serviceusage.serviceUsageConsumer" - }, - { - "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io", - "group:k8s-infra-staging-txtdirect@kubernetes.io" - ], - "role": "roles/viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/k8s-staging-txtdirect/services/enabled.txt b/audit/projects/k8s-staging-txtdirect/services/enabled.txt deleted file mode 100644 index 30cdd842f18a..000000000000 --- a/audit/projects/k8s-staging-txtdirect/services/enabled.txt +++ /dev/null @@ -1,11 +0,0 @@ -NAME TITLE -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -logging.googleapis.com Cloud Logging API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/kubernetes-public/buckets/k8s-infra-clusters-terraform/bucketpolicyonly.txt b/audit/projects/kubernetes-public/buckets/k8s-infra-clusters-terraform/bucketpolicyonly.txt deleted file mode 100644 index 33dc27830ff8..000000000000 --- a/audit/projects/kubernetes-public/buckets/k8s-infra-clusters-terraform/bucketpolicyonly.txt +++ /dev/null @@ -1,4 +0,0 @@ -Bucket Policy Only setting for gs://k8s-infra-clusters-terraform: - Enabled: True - LockedTime: 2019-12-11 16:04:04.915000+00:00 - diff --git a/audit/projects/kubernetes-public/buckets/k8s-infra-clusters-terraform/cors.txt b/audit/projects/kubernetes-public/buckets/k8s-infra-clusters-terraform/cors.txt deleted file mode 100644 index 9463ddaacb5a..000000000000 --- a/audit/projects/kubernetes-public/buckets/k8s-infra-clusters-terraform/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-infra-clusters-terraform/ has no CORS configuration. diff --git a/audit/projects/kubernetes-public/buckets/k8s-infra-clusters-terraform/iam.json b/audit/projects/kubernetes-public/buckets/k8s-infra-clusters-terraform/iam.json deleted file mode 100644 index f81d12fbfefd..000000000000 --- a/audit/projects/kubernetes-public/buckets/k8s-infra-clusters-terraform/iam.json +++ /dev/null @@ -1,24 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-cluster-admins@kubernetes.io", - "projectEditor:kubernetes-public", - "projectOwner:kubernetes-public" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:kubernetes-public" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "group:k8s-infra-cluster-admins@kubernetes.io" - ], - "role": "roles/storage.objectAdmin" - } - ] -} diff --git a/audit/projects/kubernetes-public/buckets/k8s-infra-clusters-terraform/logging.txt b/audit/projects/kubernetes-public/buckets/k8s-infra-clusters-terraform/logging.txt deleted file mode 100644 index 3e29158c299b..000000000000 --- a/audit/projects/kubernetes-public/buckets/k8s-infra-clusters-terraform/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://k8s-infra-clusters-terraform/ has no logging configuration. diff --git a/audit/projects/kubernetes-public/buckets/kubernetes_public_billing/bucketpolicyonly.txt b/audit/projects/kubernetes-public/buckets/kubernetes_public_billing/bucketpolicyonly.txt deleted file mode 100644 index 4c6935db5e78..000000000000 --- a/audit/projects/kubernetes-public/buckets/kubernetes_public_billing/bucketpolicyonly.txt +++ /dev/null @@ -1,3 +0,0 @@ -Bucket Policy Only setting for gs://kubernetes_public_billing: - Enabled: False - diff --git a/audit/projects/kubernetes-public/buckets/kubernetes_public_billing/cors.txt b/audit/projects/kubernetes-public/buckets/kubernetes_public_billing/cors.txt deleted file mode 100644 index fd42275ba860..000000000000 --- a/audit/projects/kubernetes-public/buckets/kubernetes_public_billing/cors.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes_public_billing/ has no CORS configuration. diff --git a/audit/projects/kubernetes-public/buckets/kubernetes_public_billing/iam.json b/audit/projects/kubernetes-public/buckets/kubernetes_public_billing/iam.json deleted file mode 100644 index 45a26630cfa5..000000000000 --- a/audit/projects/kubernetes-public/buckets/kubernetes_public_billing/iam.json +++ /dev/null @@ -1,23 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "projectEditor:kubernetes-public", - "projectOwner:kubernetes-public" - ], - "role": "roles/storage.legacyBucketOwner" - }, - { - "members": [ - "projectViewer:kubernetes-public" - ], - "role": "roles/storage.legacyBucketReader" - }, - { - "members": [ - "serviceAccount:509219875288-kscf0cheafmf4f6tp1auij5me8qakbin@developer.gserviceaccount.com" - ], - "role": "roles/storage.legacyBucketWriter" - } - ] -} diff --git a/audit/projects/kubernetes-public/buckets/kubernetes_public_billing/logging.txt b/audit/projects/kubernetes-public/buckets/kubernetes_public_billing/logging.txt deleted file mode 100644 index e8fc1edb0f68..000000000000 --- a/audit/projects/kubernetes-public/buckets/kubernetes_public_billing/logging.txt +++ /dev/null @@ -1 +0,0 @@ -gs://kubernetes_public_billing/ has no logging configuration. diff --git a/audit/projects/kubernetes-public/description.json b/audit/projects/kubernetes-public/description.json deleted file mode 100644 index 272effc21337..000000000000 --- a/audit/projects/kubernetes-public/description.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "createTime": "2017-07-13T21:17:10.654Z", - "lifecycleState": "ACTIVE", - "name": "kubernetes-public", - "parent": { - "id": "758905017065", - "type": "organization" - }, - "projectId": "kubernetes-public", - "projectNumber": "127754664067" -} diff --git a/audit/projects/kubernetes-public/iam.json b/audit/projects/kubernetes-public/iam.json deleted file mode 100644 index 135096b0b6b3..000000000000 --- a/audit/projects/kubernetes-public/iam.json +++ /dev/null @@ -1,150 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-cluster-admins@kubernetes.io" - ], - "role": "projects/kubernetes-public/roles/ServiceAccountLister" - }, - { - "members": [ - "group:k8s-infra-bigquery-admins@kubernetes.io" - ], - "role": "roles/bigquery.admin" - }, - { - "members": [ - "group:k8s-infra-gcp-accounting@kubernetes.io" - ], - "role": "roles/bigquery.jobUser" - }, - { - "members": [ - "serviceAccount:service-127754664067@gcf-admin-robot.iam.gserviceaccount.com" - ], - "role": "roles/cloudfunctions.serviceAgent" - }, - { - "members": [ - "group:k8s-infra-cluster-admins@kubernetes.io" - ], - "role": "roles/compute.loadBalancerAdmin" - }, - { - "members": [ - "serviceAccount:service-127754664067@compute-system.iam.gserviceaccount.com" - ], - "role": "roles/compute.serviceAgent" - }, - { - "members": [ - "group:k8s-infra-cluster-admins@kubernetes.io" - ], - "role": "roles/compute.viewer" - }, - { - "members": [ - "group:k8s-infra-cluster-admins@kubernetes.io" - ], - "role": "roles/container.admin" - }, - { - "members": [ - "group:gke-security-groups@kubernetes.io" - ], - "role": "roles/container.clusterViewer" - }, - { - "members": [ - "serviceAccount:service-127754664067@container-engine-robot.iam.gserviceaccount.com" - ], - "role": "roles/container.serviceAgent" - }, - { - "members": [ - "group:k8s-infra-dns-admins@kubernetes.io", - "serviceAccount:dns-pusher@kubernetes-public.iam.gserviceaccount.com" - ], - "role": "roles/dns.admin" - }, - { - "members": [ - "serviceAccount:127754664067-compute@developer.gserviceaccount.com", - "serviceAccount:127754664067@cloudservices.gserviceaccount.com", - "serviceAccount:kubernetes-public@appspot.gserviceaccount.com", - "serviceAccount:service-127754664067@containerregistry.iam.gserviceaccount.com" - ], - "role": "roles/editor" - }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/iam.roleAdmin" - }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/iam.securityAdmin" - }, - { - "members": [ - "serviceAccount:service-127754664067@gcp-sa-pubsub.iam.gserviceaccount.com" - ], - "role": "roles/iam.serviceAccountTokenCreator" - }, - { - "members": [ - "serviceAccount:gke-nodes-aaa@kubernetes-public.iam.gserviceaccount.com" - ], - "role": "roles/logging.logWriter" - }, - { - "members": [ - "group:gke-security-groups@kubernetes.io" - ], - "role": "roles/logging.privateLogViewer" - }, - { - "members": [ - "serviceAccount:gke-nodes-aaa@kubernetes-public.iam.gserviceaccount.com" - ], - "role": "roles/monitoring.metricWriter" - }, - { - "members": [ - "group:gke-security-groups@kubernetes.io" - ], - "role": "roles/monitoring.viewer" - }, - { - "members": [ - "user:domain-admin-lf@kubernetes.io", - "user:ihor@cncf.io", - "user:psharma@linuxfoundation.org", - "user:thockin@google.com" - ], - "role": "roles/owner" - }, - { - "members": [ - "serviceAccount:service-127754664067@serverless-robot-prod.iam.gserviceaccount.com" - ], - "role": "roles/run.serviceAgent" - }, - { - "members": [ - "group:k8s-infra-cluster-admins@kubernetes.io" - ], - "role": "roles/stackdriver.accounts.editor" - }, - { - "members": [ - "group:k8s-infra-cluster-admins@kubernetes.io" - ], - "role": "roles/stackdriver.accounts.viewer" - } - ], - "version": 1 -} diff --git a/audit/projects/kubernetes-public/roles/ServiceAccountLister.json b/audit/projects/kubernetes-public/roles/ServiceAccountLister.json deleted file mode 100644 index 8886765ebb84..000000000000 --- a/audit/projects/kubernetes-public/roles/ServiceAccountLister.json +++ /dev/null @@ -1,9 +0,0 @@ -{ - "description": "Can list ServiceAccounts.", - "includedPermissions": [ - "iam.serviceAccounts.list" - ], - "name": "projects/kubernetes-public/roles/ServiceAccountLister", - "stage": "GA", - "title": "Service Account Lister" -} diff --git a/audit/projects/kubernetes-public/secrets/recaptcha/description.json b/audit/projects/kubernetes-public/secrets/recaptcha/description.json deleted file mode 100644 index 39c4787217cc..000000000000 --- a/audit/projects/kubernetes-public/secrets/recaptcha/description.json +++ /dev/null @@ -1,10 +0,0 @@ -{ - "createTime": "2020-05-28T03:40:25.639524Z", - "labels": { - "app": "slack-infra" - }, - "name": "projects/127754664067/secrets/recaptcha", - "replication": { - "automatic": {} - } -} diff --git a/audit/projects/kubernetes-public/secrets/recaptcha/iam.json b/audit/projects/kubernetes-public/secrets/recaptcha/iam.json deleted file mode 100644 index e7b65abc9b8a..000000000000 --- a/audit/projects/kubernetes-public/secrets/recaptcha/iam.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-rbac-slack-infra@kubernetes.io" - ], - "role": "roles/secretmanager.admin" - } - ], - "version": 1 -} diff --git a/audit/projects/kubernetes-public/secrets/recaptcha/versions.json b/audit/projects/kubernetes-public/secrets/recaptcha/versions.json deleted file mode 100644 index 0731173716cc..000000000000 --- a/audit/projects/kubernetes-public/secrets/recaptcha/versions.json +++ /dev/null @@ -1,10 +0,0 @@ -[ - { - "createTime": "2020-05-28T03:40:26.335853Z", - "name": "projects/127754664067/secrets/recaptcha/versions/1", - "replicationStatus": { - "automatic": {} - }, - "state": "ENABLED" - } -] diff --git a/audit/projects/kubernetes-public/secrets/slack-event-log-config/description.json b/audit/projects/kubernetes-public/secrets/slack-event-log-config/description.json deleted file mode 100644 index 837060ef23ad..000000000000 --- a/audit/projects/kubernetes-public/secrets/slack-event-log-config/description.json +++ /dev/null @@ -1,10 +0,0 @@ -{ - "createTime": "2020-05-28T03:40:22.230224Z", - "labels": { - "app": "slack-infra" - }, - "name": "projects/127754664067/secrets/slack-event-log-config", - "replication": { - "automatic": {} - } -} diff --git a/audit/projects/kubernetes-public/secrets/slack-event-log-config/iam.json b/audit/projects/kubernetes-public/secrets/slack-event-log-config/iam.json deleted file mode 100644 index e7b65abc9b8a..000000000000 --- a/audit/projects/kubernetes-public/secrets/slack-event-log-config/iam.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-rbac-slack-infra@kubernetes.io" - ], - "role": "roles/secretmanager.admin" - } - ], - "version": 1 -} diff --git a/audit/projects/kubernetes-public/secrets/slack-event-log-config/versions.json b/audit/projects/kubernetes-public/secrets/slack-event-log-config/versions.json deleted file mode 100644 index af914a2726e9..000000000000 --- a/audit/projects/kubernetes-public/secrets/slack-event-log-config/versions.json +++ /dev/null @@ -1,10 +0,0 @@ -[ - { - "createTime": "2020-05-28T03:40:22.855508Z", - "name": "projects/127754664067/secrets/slack-event-log-config/versions/1", - "replicationStatus": { - "automatic": {} - }, - "state": "ENABLED" - } -] diff --git a/audit/projects/kubernetes-public/secrets/slack-moderator-config/description.json b/audit/projects/kubernetes-public/secrets/slack-moderator-config/description.json deleted file mode 100644 index 670b744ce267..000000000000 --- a/audit/projects/kubernetes-public/secrets/slack-moderator-config/description.json +++ /dev/null @@ -1,10 +0,0 @@ -{ - "createTime": "2020-05-28T03:40:18.073437Z", - "labels": { - "app": "slack-infra" - }, - "name": "projects/127754664067/secrets/slack-moderator-config", - "replication": { - "automatic": {} - } -} diff --git a/audit/projects/kubernetes-public/secrets/slack-moderator-config/iam.json b/audit/projects/kubernetes-public/secrets/slack-moderator-config/iam.json deleted file mode 100644 index e7b65abc9b8a..000000000000 --- a/audit/projects/kubernetes-public/secrets/slack-moderator-config/iam.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-rbac-slack-infra@kubernetes.io" - ], - "role": "roles/secretmanager.admin" - } - ], - "version": 1 -} diff --git a/audit/projects/kubernetes-public/secrets/slack-moderator-config/versions.json b/audit/projects/kubernetes-public/secrets/slack-moderator-config/versions.json deleted file mode 100644 index c8cb96d93fe7..000000000000 --- a/audit/projects/kubernetes-public/secrets/slack-moderator-config/versions.json +++ /dev/null @@ -1,10 +0,0 @@ -[ - { - "createTime": "2020-05-28T03:40:18.876516Z", - "name": "projects/127754664067/secrets/slack-moderator-config/versions/1", - "replicationStatus": { - "automatic": {} - }, - "state": "ENABLED" - } -] diff --git a/audit/projects/kubernetes-public/secrets/slack-moderator-words-config/description.json b/audit/projects/kubernetes-public/secrets/slack-moderator-words-config/description.json deleted file mode 100644 index 0357d2799234..000000000000 --- a/audit/projects/kubernetes-public/secrets/slack-moderator-words-config/description.json +++ /dev/null @@ -1,10 +0,0 @@ -{ - "createTime": "2021-02-23T23:53:36.776896Z", - "labels": { - "app": "slack-infra" - }, - "name": "projects/127754664067/secrets/slack-moderator-words-config", - "replication": { - "automatic": {} - } -} diff --git a/audit/projects/kubernetes-public/secrets/slack-moderator-words-config/iam.json b/audit/projects/kubernetes-public/secrets/slack-moderator-words-config/iam.json deleted file mode 100644 index e7b65abc9b8a..000000000000 --- a/audit/projects/kubernetes-public/secrets/slack-moderator-words-config/iam.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-rbac-slack-infra@kubernetes.io" - ], - "role": "roles/secretmanager.admin" - } - ], - "version": 1 -} diff --git a/audit/projects/kubernetes-public/secrets/slack-moderator-words-config/versions.json b/audit/projects/kubernetes-public/secrets/slack-moderator-words-config/versions.json deleted file mode 100644 index bd55ce6dacb9..000000000000 --- a/audit/projects/kubernetes-public/secrets/slack-moderator-words-config/versions.json +++ /dev/null @@ -1,19 +0,0 @@ -[ - { - "createTime": "2021-02-25T16:11:14.044771Z", - "name": "projects/127754664067/secrets/slack-moderator-words-config/versions/2", - "replicationStatus": { - "automatic": {} - }, - "state": "ENABLED" - }, - { - "createTime": "2021-02-25T16:05:18.014992Z", - "destroyTime": "2021-02-25T16:11:33.616220913Z", - "name": "projects/127754664067/secrets/slack-moderator-words-config/versions/1", - "replicationStatus": { - "automatic": {} - }, - "state": "DESTROYED" - } -] diff --git a/audit/projects/kubernetes-public/secrets/slack-welcomer-config/description.json b/audit/projects/kubernetes-public/secrets/slack-welcomer-config/description.json deleted file mode 100644 index 7dca4f0be7c4..000000000000 --- a/audit/projects/kubernetes-public/secrets/slack-welcomer-config/description.json +++ /dev/null @@ -1,10 +0,0 @@ -{ - "createTime": "2020-05-28T03:40:14.323185Z", - "labels": { - "app": "slack-infra" - }, - "name": "projects/127754664067/secrets/slack-welcomer-config", - "replication": { - "automatic": {} - } -} diff --git a/audit/projects/kubernetes-public/secrets/slack-welcomer-config/iam.json b/audit/projects/kubernetes-public/secrets/slack-welcomer-config/iam.json deleted file mode 100644 index e7b65abc9b8a..000000000000 --- a/audit/projects/kubernetes-public/secrets/slack-welcomer-config/iam.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-rbac-slack-infra@kubernetes.io" - ], - "role": "roles/secretmanager.admin" - } - ], - "version": 1 -} diff --git a/audit/projects/kubernetes-public/secrets/slack-welcomer-config/versions.json b/audit/projects/kubernetes-public/secrets/slack-welcomer-config/versions.json deleted file mode 100644 index 7fa43662b9dc..000000000000 --- a/audit/projects/kubernetes-public/secrets/slack-welcomer-config/versions.json +++ /dev/null @@ -1,10 +0,0 @@ -[ - { - "createTime": "2020-05-28T03:40:15.317636Z", - "name": "projects/127754664067/secrets/slack-welcomer-config/versions/1", - "replicationStatus": { - "automatic": {} - }, - "state": "ENABLED" - } -] diff --git a/audit/projects/kubernetes-public/secrets/slackin-token/description.json b/audit/projects/kubernetes-public/secrets/slackin-token/description.json deleted file mode 100644 index 5cdcf8895958..000000000000 --- a/audit/projects/kubernetes-public/secrets/slackin-token/description.json +++ /dev/null @@ -1,10 +0,0 @@ -{ - "createTime": "2020-05-28T03:40:30.811539Z", - "labels": { - "app": "slack-infra" - }, - "name": "projects/127754664067/secrets/slackin-token", - "replication": { - "automatic": {} - } -} diff --git a/audit/projects/kubernetes-public/secrets/slackin-token/iam.json b/audit/projects/kubernetes-public/secrets/slackin-token/iam.json deleted file mode 100644 index e7b65abc9b8a..000000000000 --- a/audit/projects/kubernetes-public/secrets/slackin-token/iam.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-rbac-slack-infra@kubernetes.io" - ], - "role": "roles/secretmanager.admin" - } - ], - "version": 1 -} diff --git a/audit/projects/kubernetes-public/secrets/slackin-token/versions.json b/audit/projects/kubernetes-public/secrets/slackin-token/versions.json deleted file mode 100644 index a81809e8d913..000000000000 --- a/audit/projects/kubernetes-public/secrets/slackin-token/versions.json +++ /dev/null @@ -1,10 +0,0 @@ -[ - { - "createTime": "2020-05-28T03:40:31.541692Z", - "name": "projects/127754664067/secrets/slackin-token/versions/1", - "replicationStatus": { - "automatic": {} - }, - "state": "ENABLED" - } -] diff --git a/audit/projects/kubernetes-public/secrets/triage-party-github-token/description.json b/audit/projects/kubernetes-public/secrets/triage-party-github-token/description.json deleted file mode 100644 index 3fbfbe0b0c87..000000000000 --- a/audit/projects/kubernetes-public/secrets/triage-party-github-token/description.json +++ /dev/null @@ -1,10 +0,0 @@ -{ - "createTime": "2020-06-25T19:14:21.868654Z", - "labels": { - "app": "triage-party" - }, - "name": "projects/127754664067/secrets/triage-party-github-token", - "replication": { - "automatic": {} - } -} diff --git a/audit/projects/kubernetes-public/secrets/triage-party-github-token/iam.json b/audit/projects/kubernetes-public/secrets/triage-party-github-token/iam.json deleted file mode 100644 index 679650246765..000000000000 --- a/audit/projects/kubernetes-public/secrets/triage-party-github-token/iam.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "group:k8s-infra-rbac-triageparty-release@kubernetes.io" - ], - "role": "roles/secretmanager.admin" - } - ], - "version": 1 -} diff --git a/audit/projects/kubernetes-public/secrets/triage-party-github-token/versions.json b/audit/projects/kubernetes-public/secrets/triage-party-github-token/versions.json deleted file mode 100644 index 36b437d20c1f..000000000000 --- a/audit/projects/kubernetes-public/secrets/triage-party-github-token/versions.json +++ /dev/null @@ -1,10 +0,0 @@ -[ - { - "createTime": "2020-06-25T19:14:22.485364Z", - "name": "projects/127754664067/secrets/triage-party-github-token/versions/1", - "replicationStatus": { - "automatic": {} - }, - "state": "ENABLED" - } -] diff --git a/audit/projects/kubernetes-public/service-accounts/127754664067-compute@developer.gserviceaccount.com/description.json b/audit/projects/kubernetes-public/service-accounts/127754664067-compute@developer.gserviceaccount.com/description.json deleted file mode 100644 index 1d72ad897415..000000000000 --- a/audit/projects/kubernetes-public/service-accounts/127754664067-compute@developer.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Compute Engine default service account", - "email": "127754664067-compute@developer.gserviceaccount.com", - "name": "projects/kubernetes-public/serviceAccounts/127754664067-compute@developer.gserviceaccount.com", - "oauth2ClientId": "108720443019014139260", - "projectId": "kubernetes-public", - "uniqueId": "108720443019014139260" -} diff --git a/audit/projects/kubernetes-public/service-accounts/127754664067-compute@developer.gserviceaccount.com/iam.json b/audit/projects/kubernetes-public/service-accounts/127754664067-compute@developer.gserviceaccount.com/iam.json deleted file mode 100644 index 61a2092b1b7f..000000000000 --- a/audit/projects/kubernetes-public/service-accounts/127754664067-compute@developer.gserviceaccount.com/iam.json +++ /dev/null @@ -1,3 +0,0 @@ -{ - "version": 1 -} diff --git a/audit/projects/kubernetes-public/service-accounts/dns-pusher@kubernetes-public.iam.gserviceaccount.com/description.json b/audit/projects/kubernetes-public/service-accounts/dns-pusher@kubernetes-public.iam.gserviceaccount.com/description.json deleted file mode 100644 index 1a3aa12c6d55..000000000000 --- a/audit/projects/kubernetes-public/service-accounts/dns-pusher@kubernetes-public.iam.gserviceaccount.com/description.json +++ /dev/null @@ -1,9 +0,0 @@ -{ - "description": "Automated DNS pusher", - "displayName": "dns-pusher", - "email": "dns-pusher@kubernetes-public.iam.gserviceaccount.com", - "name": "projects/kubernetes-public/serviceAccounts/dns-pusher@kubernetes-public.iam.gserviceaccount.com", - "oauth2ClientId": "100143166165648589946", - "projectId": "kubernetes-public", - "uniqueId": "100143166165648589946" -} diff --git a/audit/projects/kubernetes-public/service-accounts/dns-pusher@kubernetes-public.iam.gserviceaccount.com/iam.json b/audit/projects/kubernetes-public/service-accounts/dns-pusher@kubernetes-public.iam.gserviceaccount.com/iam.json deleted file mode 100644 index cae11e0cbba5..000000000000 --- a/audit/projects/kubernetes-public/service-accounts/dns-pusher@kubernetes-public.iam.gserviceaccount.com/iam.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:kubernetes-public.svc.id.goog[bart-test/dns-pusher]" - ], - "role": "roles/iam.workloadIdentityUser" - } - ], - "version": 1 -} diff --git a/audit/projects/kubernetes-public/service-accounts/gke-nodes-aaa@kubernetes-public.iam.gserviceaccount.com/description.json b/audit/projects/kubernetes-public/service-accounts/gke-nodes-aaa@kubernetes-public.iam.gserviceaccount.com/description.json deleted file mode 100644 index 50d2b53c26dc..000000000000 --- a/audit/projects/kubernetes-public/service-accounts/gke-nodes-aaa@kubernetes-public.iam.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Nodes in GKE cluster 'aaa'", - "email": "gke-nodes-aaa@kubernetes-public.iam.gserviceaccount.com", - "name": "projects/kubernetes-public/serviceAccounts/gke-nodes-aaa@kubernetes-public.iam.gserviceaccount.com", - "oauth2ClientId": "108417686403743706149", - "projectId": "kubernetes-public", - "uniqueId": "108417686403743706149" -} diff --git a/audit/projects/kubernetes-public/service-accounts/gke-nodes-aaa@kubernetes-public.iam.gserviceaccount.com/iam.json b/audit/projects/kubernetes-public/service-accounts/gke-nodes-aaa@kubernetes-public.iam.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/kubernetes-public/service-accounts/gke-nodes-aaa@kubernetes-public.iam.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/kubernetes-public/service-accounts/k8s-infra-dns-updater@kubernetes-public.iam.gserviceaccount.com/description.json b/audit/projects/kubernetes-public/service-accounts/k8s-infra-dns-updater@kubernetes-public.iam.gserviceaccount.com/description.json deleted file mode 100644 index d1d2ce0501ee..000000000000 --- a/audit/projects/kubernetes-public/service-accounts/k8s-infra-dns-updater@kubernetes-public.iam.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "k8s-infra dns updater", - "email": "k8s-infra-dns-updater@kubernetes-public.iam.gserviceaccount.com", - "name": "projects/kubernetes-public/serviceAccounts/k8s-infra-dns-updater@kubernetes-public.iam.gserviceaccount.com", - "oauth2ClientId": "103924646831481972185", - "projectId": "kubernetes-public", - "uniqueId": "103924646831481972185" -} diff --git a/audit/projects/kubernetes-public/service-accounts/k8s-infra-dns-updater@kubernetes-public.iam.gserviceaccount.com/iam.json b/audit/projects/kubernetes-public/service-accounts/k8s-infra-dns-updater@kubernetes-public.iam.gserviceaccount.com/iam.json deleted file mode 100644 index 116bb7a09505..000000000000 --- a/audit/projects/kubernetes-public/service-accounts/k8s-infra-dns-updater@kubernetes-public.iam.gserviceaccount.com/iam.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:k8s-infra-prow-build-trusted.svc.id.goog[test-pods/k8s-infra-dns-updater]" - ], - "role": "roles/iam.workloadIdentityUser" - } - ], - "version": 1 -} diff --git a/audit/projects/kubernetes-public/service-accounts/k8s-infra-gcp-auditor@kubernetes-public.iam.gserviceaccount.com/description.json b/audit/projects/kubernetes-public/service-accounts/k8s-infra-gcp-auditor@kubernetes-public.iam.gserviceaccount.com/description.json deleted file mode 100644 index 498e656e6896..000000000000 --- a/audit/projects/kubernetes-public/service-accounts/k8s-infra-gcp-auditor@kubernetes-public.iam.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "Grants readonly access to org resources", - "email": "k8s-infra-gcp-auditor@kubernetes-public.iam.gserviceaccount.com", - "name": "projects/kubernetes-public/serviceAccounts/k8s-infra-gcp-auditor@kubernetes-public.iam.gserviceaccount.com", - "oauth2ClientId": "114307448815736377866", - "projectId": "kubernetes-public", - "uniqueId": "114307448815736377866" -} diff --git a/audit/projects/kubernetes-public/service-accounts/k8s-infra-gcp-auditor@kubernetes-public.iam.gserviceaccount.com/iam.json b/audit/projects/kubernetes-public/service-accounts/k8s-infra-gcp-auditor@kubernetes-public.iam.gserviceaccount.com/iam.json deleted file mode 100644 index 06b09be56334..000000000000 --- a/audit/projects/kubernetes-public/service-accounts/k8s-infra-gcp-auditor@kubernetes-public.iam.gserviceaccount.com/iam.json +++ /dev/null @@ -1,12 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:k8s-infra-prow-build-trusted.svc.id.goog[test-pods/k8s-infra-gcp-auditor]", - "serviceAccount:kubernetes-public.svc.id.goog[test-pods/k8s-infra-gcp-auditor]" - ], - "role": "roles/iam.workloadIdentityUser" - } - ], - "version": 1 -} diff --git a/audit/projects/kubernetes-public/service-accounts/k8s-infra-monitoring-viewer@kubernetes-public.iam.gserviceaccount.com/description.json b/audit/projects/kubernetes-public/service-accounts/k8s-infra-monitoring-viewer@kubernetes-public.iam.gserviceaccount.com/description.json deleted file mode 100644 index d00f34e95b62..000000000000 --- a/audit/projects/kubernetes-public/service-accounts/k8s-infra-monitoring-viewer@kubernetes-public.iam.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "k8s-infra monitoring viewer", - "email": "k8s-infra-monitoring-viewer@kubernetes-public.iam.gserviceaccount.com", - "name": "projects/kubernetes-public/serviceAccounts/k8s-infra-monitoring-viewer@kubernetes-public.iam.gserviceaccount.com", - "oauth2ClientId": "109438172956774474706", - "projectId": "kubernetes-public", - "uniqueId": "109438172956774474706" -} diff --git a/audit/projects/kubernetes-public/service-accounts/k8s-infra-monitoring-viewer@kubernetes-public.iam.gserviceaccount.com/iam.json b/audit/projects/kubernetes-public/service-accounts/k8s-infra-monitoring-viewer@kubernetes-public.iam.gserviceaccount.com/iam.json deleted file mode 100644 index 55ff3d2669fc..000000000000 --- a/audit/projects/kubernetes-public/service-accounts/k8s-infra-monitoring-viewer@kubernetes-public.iam.gserviceaccount.com/iam.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "bindings": [ - { - "members": [ - "serviceAccount:kubernetes-public.svc.id.goog[monitoring/k8s-infra-monitoring-viewer]" - ], - "role": "roles/iam.workloadIdentityUser" - } - ], - "version": 1 -} diff --git a/audit/projects/kubernetes-public/service-accounts/kubernetes-public@appspot.gserviceaccount.com/description.json b/audit/projects/kubernetes-public/service-accounts/kubernetes-public@appspot.gserviceaccount.com/description.json deleted file mode 100644 index cd6b68824af5..000000000000 --- a/audit/projects/kubernetes-public/service-accounts/kubernetes-public@appspot.gserviceaccount.com/description.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "displayName": "App Engine default service account", - "email": "kubernetes-public@appspot.gserviceaccount.com", - "name": "projects/kubernetes-public/serviceAccounts/kubernetes-public@appspot.gserviceaccount.com", - "oauth2ClientId": "105254750883748360742", - "projectId": "kubernetes-public", - "uniqueId": "105254750883748360742" -} diff --git a/audit/projects/kubernetes-public/service-accounts/kubernetes-public@appspot.gserviceaccount.com/iam.json b/audit/projects/kubernetes-public/service-accounts/kubernetes-public@appspot.gserviceaccount.com/iam.json deleted file mode 100644 index 0967ef424bce..000000000000 --- a/audit/projects/kubernetes-public/service-accounts/kubernetes-public@appspot.gserviceaccount.com/iam.json +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/audit/projects/kubernetes-public/services/bigquery/bigquery.datasets.json b/audit/projects/kubernetes-public/services/bigquery/bigquery.datasets.json deleted file mode 100644 index e69de29bb2d1..000000000000 diff --git a/audit/projects/kubernetes-public/services/compute/project-info.json b/audit/projects/kubernetes-public/services/compute/project-info.json deleted file mode 100644 index 5921a452035d..000000000000 --- a/audit/projects/kubernetes-public/services/compute/project-info.json +++ /dev/null @@ -1,181 +0,0 @@ -{ - "commonInstanceMetadata": { - "items": [ - { - "key": "gke-aaa-4d0eb763-secondary-ranges", - "value": "services:default:gke-aaa-subnet-4d0eb763:gke-aaa-services-4d0eb763,pods:default:gke-aaa-subnet-4d0eb763:gke-aaa-pods-4d0eb763" - }, - { - "key": "sshKeys", - "value": "\ngke-4d0eb7639c079dd86863:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKXgEw3R4S+t496FUji26QwLbLIUESOgiWTPVTaxqEvQnNQzTV67IPk7JEgKoYV5Dff6Q3D3Zh0EJM1RhpIddhgQLTPOO9/vQcdtf9Vz7yLyL8s/f5ki5Lvj1zCEN7jObBG6KXihHxodPgOeMX4NidKUOAzHXnTCzDBa0JOl4lCUy1KOd803X5F1ZRsL3L2Hxt8o9XarNF1cB0i3Kp++FXVEhPtFy/mmt7nMW3vtibNde4YiUsRbdAX7NVuo5WAleKYLrm4Y+ag3YsVBXHrNc3tTX1qObAcyA1hMq9lj/gojsjMukAev4OpKUarLZ9/3HpJsNHNgiprzsf64D5Gc8N gke-4d0eb7639c079dd86863@gke-4d0eb7639c079dd86863\ngke-4d0eb7639c079dd86863:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQt9qiv2SV6ov+lrjeD5pfqMU02I6BLmUPXJyMPwXAAnukAcBNyO1bS3jUuGWMb/jKRBS/vq8EV8+urAB0pbHUvuCXm4+sV4ijhvft4LX9cZlnC5OrvWnWTWXyWFTAv6fEGMd9MjxjOoBPKzrfDlPcdXNxa+1zCqG2zvDhhGKaEehqdGInnjmlDQbWKRzXB7zcIlf6mjK0VynPeoCpipQX4zRUqhAYKwIvrHDrFoP2hsdv2ohubAJ69PfqOX+QzVQacXbLFCDdN8DUVW7HouHzE2mfKKM2Jc9PFj/9iqG0aq0Yxfw+YAHqXs6T/rpN3nNxBuHdJWeLVrGRXaP/GQVt gke-4d0eb7639c079dd86863@gke-4d0eb7639c079dd86863\ngke-4d0eb7639c079dd86863:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBNMH5E+KJ5ZCzXQHeGo2UviWijMTaOooI8DLkfM6gd1TWbta8QPxbz1R6haOTHwCuBosGe94ldwUgCGHBbCDdgGWvFHYRa7mGRYkqHtmaUafe0esUlfhA1dB3a7d4HvsCEXj2h6ukjA7RCJTH7Xo5Eohe9i61gecg84YNQjyop9mbBnCbwqfxx/z+wy+5kQ0+n5oeTJHT13xvZTcKbX4UuEFziive1J+O9pkXvDPStCRfzd08M39PzTxm9Ipi+10v9bk8KkH8ET0hnLtTJgveBVMszMr1St5JwNfMdTyihEWkAwlzG6v7HBEcude5YHmhypQQ/7/rRIzRV8lofFjn gke-4d0eb7639c079dd86863@gke-4d0eb7639c079dd86863" - } - ], - "kind": "compute#metadata" - }, - "creationTimestamp": "2018-08-31T09:57:25.762-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "127754664067-compute@developer.gserviceaccount.com", - "id": "3358637803203513754", - "kind": "compute#project", - "name": "kubernetes-public", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 100, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/kubernetes-public", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/kubernetes-public/services/container/clusters.txt b/audit/projects/kubernetes-public/services/container/clusters.txt deleted file mode 100644 index 8beba5578b45..000000000000 --- a/audit/projects/kubernetes-public/services/container/clusters.txt +++ /dev/null @@ -1 +0,0 @@ -aaa us-central1 us-central1-c;us-central1-a;us-central1-f RUNNING diff --git a/audit/projects/kubernetes-public/services/dns/info.json b/audit/projects/kubernetes-public/services/dns/info.json deleted file mode 100644 index 791d82f6126c..000000000000 --- a/audit/projects/kubernetes-public/services/dns/info.json +++ /dev/null @@ -1,53 +0,0 @@ -{ - "id": "kubernetes-public", - "kind": "dns#project", - "number": "127754664067", - "quota": { - "dnsKeysPerManagedZone": 4, - "kind": "dns#quota", - "managedZones": 10000, - "managedZonesPerNetwork": 10000, - "networksPerManagedZone": 100, - "networksPerPolicy": 100, - "policies": 100, - "resourceRecordsPerRrset": 100, - "rrsetAdditionsPerChange": 1000, - "rrsetDeletionsPerChange": 1000, - "rrsetsPerManagedZone": 10000, - "targetNameServersPerManagedZone": 50, - "targetNameServersPerPolicy": 50, - "totalRrdataSizePerChange": 100000, - "whitelistedKeySpecs": [ - { - "algorithm": "ecdsap256sha256", - "kind": "dns#dnsKeySpec" - }, - { - "algorithm": "ecdsap384sha384", - "kind": "dns#dnsKeySpec" - }, - { - "algorithm": "rsasha256", - "keyLength": 2048, - "kind": "dns#dnsKeySpec" - }, - { - "algorithm": "rsasha256", - "keyLength": 1024, - "keyType": "zoneSigning", - "kind": "dns#dnsKeySpec" - }, - { - "algorithm": "rsasha512", - "keyLength": 2048, - "kind": "dns#dnsKeySpec" - }, - { - "algorithm": "rsasha512", - "keyLength": 1024, - "keyType": "zoneSigning", - "kind": "dns#dnsKeySpec" - } - ] - } -} diff --git a/audit/projects/kubernetes-public/services/dns/zones.json b/audit/projects/kubernetes-public/services/dns/zones.json deleted file mode 100644 index 264b74f317af..000000000000 --- a/audit/projects/kubernetes-public/services/dns/zones.json +++ /dev/null @@ -1,220 +0,0 @@ -[ - { - "creationTime": "2020-08-02T19:14:51.493Z", - "description": "", - "dnsName": "canary.k8s.dev.", - "id": "501734107680635861", - "kind": "dns#managedZone", - "name": "canary-k8s-dev", - "nameServers": [ - "ns-cloud-d1.googledomains.com.", - "ns-cloud-d2.googledomains.com.", - "ns-cloud-d3.googledomains.com.", - "ns-cloud-d4.googledomains.com." - ], - "visibility": "public" - }, - { - "creationTime": "2019-12-30T21:58:29.800Z", - "description": "", - "dnsName": "canary.k8s-e2e.com.", - "id": "3988438379229497342", - "kind": "dns#managedZone", - "name": "canary-k8s-e2e-com", - "nameServers": [ - "ns-cloud-c1.googledomains.com.", - "ns-cloud-c2.googledomains.com.", - "ns-cloud-c3.googledomains.com.", - "ns-cloud-c4.googledomains.com." - ], - "visibility": "public" - }, - { - "creationTime": "2018-10-09T16:18:27.446Z", - "description": "", - "dnsName": "canary.k8s.io.", - "id": "7690509341659612964", - "kind": "dns#managedZone", - "name": "canary-k8s-io", - "nameServers": [ - "ns-cloud-c1.googledomains.com.", - "ns-cloud-c2.googledomains.com.", - "ns-cloud-c3.googledomains.com.", - "ns-cloud-c4.googledomains.com." - ], - "visibility": "public" - }, - { - "creationTime": "2020-08-02T19:15:15.001Z", - "description": "", - "dnsName": "canary.kubernetes.dev.", - "id": "5739799102251818894", - "kind": "dns#managedZone", - "name": "canary-kubernetes-dev", - "nameServers": [ - "ns-cloud-c1.googledomains.com.", - "ns-cloud-c2.googledomains.com.", - "ns-cloud-c3.googledomains.com.", - "ns-cloud-c4.googledomains.com." - ], - "visibility": "public" - }, - { - "creationTime": "2018-10-09T16:19:40.004Z", - "description": "", - "dnsName": "canary.kubernetes.io.", - "id": "4193576254815248920", - "kind": "dns#managedZone", - "name": "canary-kubernetes-io", - "nameServers": [ - "ns-cloud-b1.googledomains.com.", - "ns-cloud-b2.googledomains.com.", - "ns-cloud-b3.googledomains.com.", - "ns-cloud-b4.googledomains.com." - ], - "visibility": "public" - }, - { - "creationTime": "2019-12-30T21:55:40.366Z", - "description": "", - "dnsName": "canary.x-k8s.io.", - "id": "7552990179268901390", - "kind": "dns#managedZone", - "name": "canary-x-k8s-io", - "nameServers": [ - "ns-cloud-d1.googledomains.com.", - "ns-cloud-d2.googledomains.com.", - "ns-cloud-d3.googledomains.com.", - "ns-cloud-d4.googledomains.com." - ], - "visibility": "public" - }, - { - "creationTime": "2020-08-02T19:13:48.289Z", - "description": "", - "dnsName": "k8s.dev.", - "id": "7461758730733311602", - "kind": "dns#managedZone", - "name": "k8s-dev", - "nameServers": [ - "ns-cloud-a1.googledomains.com.", - "ns-cloud-a2.googledomains.com.", - "ns-cloud-a3.googledomains.com.", - "ns-cloud-a4.googledomains.com." - ], - "visibility": "public" - }, - { - "creationTime": "2019-12-22T23:50:04.476Z", - "description": "", - "dnsName": "k8s-e2e.com.", - "id": "5238219519610662189", - "kind": "dns#managedZone", - "name": "k8s-e2e-com", - "nameServers": [ - "ns-cloud-b1.googledomains.com.", - "ns-cloud-b2.googledomains.com.", - "ns-cloud-b3.googledomains.com.", - "ns-cloud-b4.googledomains.com." - ], - "visibility": "public" - }, - { - "creationTime": "2018-09-07T15:08:37.689Z", - "description": "", - "dnsName": "k8s.io.", - "dnssecConfig": { - "defaultKeySpecs": [ - { - "algorithm": "rsasha256", - "keyLength": 2048, - "keyType": "keySigning", - "kind": "dns#dnsKeySpec" - }, - { - "algorithm": "rsasha256", - "keyLength": 1024, - "keyType": "zoneSigning", - "kind": "dns#dnsKeySpec" - } - ], - "kind": "dns#managedZoneDnsSecConfig", - "nonExistence": "nsec3", - "state": "off" - }, - "id": "8257163024921094127", - "kind": "dns#managedZone", - "name": "k8s-io", - "nameServers": [ - "ns-cloud-d1.googledomains.com.", - "ns-cloud-d2.googledomains.com.", - "ns-cloud-d3.googledomains.com.", - "ns-cloud-d4.googledomains.com." - ], - "visibility": "public" - }, - { - "creationTime": "2020-08-02T19:14:22.451Z", - "description": "", - "dnsName": "kubernetes.dev.", - "id": "1230438774305672617", - "kind": "dns#managedZone", - "name": "kubernetes-dev", - "nameServers": [ - "ns-cloud-b1.googledomains.com.", - "ns-cloud-b2.googledomains.com.", - "ns-cloud-b3.googledomains.com.", - "ns-cloud-b4.googledomains.com." - ], - "visibility": "public" - }, - { - "creationTime": "2018-09-06T16:58:36.444Z", - "description": "", - "dnsName": "kubernetes.io.", - "dnssecConfig": { - "defaultKeySpecs": [ - { - "algorithm": "rsasha256", - "keyLength": 2048, - "keyType": "keySigning", - "kind": "dns#dnsKeySpec" - }, - { - "algorithm": "rsasha256", - "keyLength": 1024, - "keyType": "zoneSigning", - "kind": "dns#dnsKeySpec" - } - ], - "kind": "dns#managedZoneDnsSecConfig", - "nonExistence": "nsec3", - "state": "off" - }, - "id": "8283179273191389843", - "kind": "dns#managedZone", - "name": "kubernetes-io", - "nameServers": [ - "ns-cloud-a1.googledomains.com.", - "ns-cloud-a2.googledomains.com.", - "ns-cloud-a3.googledomains.com.", - "ns-cloud-a4.googledomains.com." - ], - "visibility": "public" - }, - { - "creationTime": "2019-12-22T23:50:34.799Z", - "description": "", - "dnsName": "x-k8s.io.", - "id": "8425721645932383797", - "kind": "dns#managedZone", - "name": "x-k8s-io", - "nameServers": [ - "ns-cloud-e1.googledomains.com.", - "ns-cloud-e2.googledomains.com.", - "ns-cloud-e3.googledomains.com.", - "ns-cloud-e4.googledomains.com." - ], - "visibility": "public" - } -] diff --git a/audit/projects/kubernetes-public/services/enabled.txt b/audit/projects/kubernetes-public/services/enabled.txt deleted file mode 100644 index 1c171c5e4ad3..000000000000 --- a/audit/projects/kubernetes-public/services/enabled.txt +++ /dev/null @@ -1,24 +0,0 @@ -NAME TITLE -bigquery.googleapis.com BigQuery API -bigquery.googleapis.com BigQuery API -bigquerystorage.googleapis.com BigQuery Storage API -clouderrorreporting.googleapis.com Error Reporting API -cloudfunctions.googleapis.com Cloud Functions API -cloudresourcemanager.googleapis.com Cloud Resource Manager API -cloudshell.googleapis.com Cloud Shell API -compute.googleapis.com Compute Engine API -container.googleapis.com Kubernetes Engine API -containerregistry.googleapis.com Container Registry API -dns.googleapis.com Cloud DNS API -iam.googleapis.com Identity and Access Management (IAM) API -iamcredentials.googleapis.com IAM Service Account Credentials API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -serviceusage.googleapis.com Service Usage API -source.googleapis.com Legacy Cloud Source Repositories API -stackdriver.googleapis.com Stackdriver API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage