Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

audit: update as of 2021-10-14 #2932

Merged
merged 1 commit into from
Oct 14, 2021
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 1 addition & 3 deletions audit/projects/k8s-cip-test-prod/services/logging/logs.json
Original file line number Diff line number Diff line change
@@ -1,3 +1 @@
[
"projects/k8s-cip-test-prod/logs/cloudaudit.googleapis.com%2Fsystem_event"
]
[]
11 changes: 11 additions & 0 deletions audit/projects/k8s-infra-kubernetes-io/description.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
{
"createTime": "2021-10-14T17:18:53.028Z",
"lifecycleState": "ACTIVE",
"name": "k8s-infra-kubernetes-io",
"parent": {
"id": "758905017065",
"type": "organization"
},
"projectId": "k8s-infra-kubernetes-io",
"projectNumber": "297021770930"
}
Comment on lines +1 to +11
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Created by #2940

11 changes: 11 additions & 0 deletions audit/projects/k8s-infra-kubernetes-io/iam.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
{
"bindings": [
{
"members": [
"user:spiffxp@google.com"
],
"role": "roles/owner"
Comment on lines +4 to +7
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hmmm need to change this to be the org admins group

}
],
"version": 1
}
6 changes: 6 additions & 0 deletions audit/projects/k8s-infra-kubernetes-io/services/enabled.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
NAME TITLE
billingbudgets.googleapis.com Cloud Billing Budget API
cloudbilling.googleapis.com Cloud Billing API
cloudresourcemanager.googleapis.com Cloud Resource Manager API
monitoring.googleapis.com Cloud Monitoring API
serviceusage.googleapis.com Service Usage API
Original file line number Diff line number Diff line change
@@ -1,4 +1,3 @@
[
"projects/k8s-staging-ci-images/logs/cloudaudit.googleapis.com%2Factivity",
"projects/k8s-staging-ci-images/logs/cloudaudit.googleapis.com%2Fsystem_event"
"projects/k8s-staging-ci-images/logs/cloudaudit.googleapis.com%2Factivity"
]
Original file line number Diff line number Diff line change
@@ -1,7 +1,6 @@
[
"projects/k8s-staging-cluster-api-gcp/logs/cloudaudit.googleapis.com%2Factivity",
"projects/k8s-staging-cluster-api-gcp/logs/cloudaudit.googleapis.com%2Fdata_access",
"projects/k8s-staging-cluster-api-gcp/logs/cloudaudit.googleapis.com%2Fsystem_event",
"projects/k8s-staging-cluster-api-gcp/logs/cloudbuild",
"projects/k8s-staging-cluster-api-gcp/logs/compute.googleapis.com%2Fshielded_vm_integrity"
]
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
{
"bindings": [
{
"members": [
"group:k8s-infra-artifact-admins@kubernetes.io",
"projectEditor:k8s-staging-sig-auth",
"projectOwner:k8s-staging-sig-auth"
],
"role": "roles/storage.legacyBucketOwner"
},
{
"members": [
"projectViewer:k8s-staging-sig-auth"
],
"role": "roles/storage.legacyBucketReader"
},
{
"members": [
"group:k8s-infra-staging-sig-auth@kubernetes.io"
],
"role": "roles/storage.legacyBucketWriter"
},
{
"members": [
"group:k8s-infra-artifact-admins@kubernetes.io",
"group:k8s-infra-staging-sig-auth@kubernetes.io"
],
"role": "roles/storage.objectAdmin"
},
{
"members": [
"allUsers"
],
"role": "roles/storage.objectViewer"
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
{"logBucket": "k8s-infra-artifacts-gcslogs", "logObjectPrefix": "artifacts.k8s-staging-sig-auth.appspot.com"}
Original file line number Diff line number Diff line change
@@ -0,0 +1,20 @@
gs://artifacts.k8s-staging-sig-auth.appspot.com/ :
Storage class: STANDARD
Location type: multi-region
Location constraint: US
Versioning enabled: None
Logging configuration: Present
Website configuration: None
CORS configuration: None
Lifecycle configuration: None
Requester Pays enabled: None
Labels: None
Default KMS key: None
Time created: Thu, 14 Oct 2021 16:38:41 GMT
Time updated: Thu, 14 Oct 2021 16:39:23 GMT
Metageneration: 8
Bucket Policy Only enabled: True
Public access prevention: unspecified
RPO: DEFAULT
ACL: []
Default ACL: []
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
{
"bindings": [
{
"members": [
"group:k8s-infra-artifact-admins@kubernetes.io",
"projectEditor:k8s-staging-sig-auth",
"projectOwner:k8s-staging-sig-auth"
],
"role": "roles/storage.legacyBucketOwner"
},
{
"members": [
"projectViewer:k8s-staging-sig-auth"
],
"role": "roles/storage.legacyBucketReader"
},
{
"members": [
"group:k8s-infra-staging-sig-auth@kubernetes.io"
],
"role": "roles/storage.legacyBucketWriter"
},
{
"members": [
"group:k8s-infra-artifact-admins@kubernetes.io",
"group:k8s-infra-staging-sig-auth@kubernetes.io"
],
"role": "roles/storage.objectAdmin"
},
{
"members": [
"serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com"
],
"role": "roles/storage.objectCreator"
},
{
"members": [
"allUsers",
"serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com"
],
"role": "roles/storage.objectViewer"
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
{"rule": [{"action": {"type": "Delete"}, "condition": {"age": 60}}]}
Original file line number Diff line number Diff line change
@@ -0,0 +1,20 @@
gs://k8s-staging-sig-auth-gcb/ :
Storage class: STANDARD
Location type: multi-region
Location constraint: US
Versioning enabled: None
Logging configuration: None
Website configuration: None
CORS configuration: None
Lifecycle configuration: Present
Requester Pays enabled: None
Labels: None
Default KMS key: None
Time created: Thu, 14 Oct 2021 16:40:03 GMT
Time updated: Thu, 14 Oct 2021 16:40:48 GMT
Metageneration: 10
Bucket Policy Only enabled: True
Public access prevention: unspecified
RPO: DEFAULT
ACL: []
Default ACL: []
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
{
"bindings": [
{
"members": [
"group:k8s-infra-artifact-admins@kubernetes.io",
"projectEditor:k8s-staging-sig-auth",
"projectOwner:k8s-staging-sig-auth"
],
"role": "roles/storage.legacyBucketOwner"
},
{
"members": [
"projectViewer:k8s-staging-sig-auth"
],
"role": "roles/storage.legacyBucketReader"
},
{
"members": [
"group:k8s-infra-staging-sig-auth@kubernetes.io"
],
"role": "roles/storage.legacyBucketWriter"
},
{
"members": [
"group:k8s-infra-artifact-admins@kubernetes.io",
"group:k8s-infra-staging-sig-auth@kubernetes.io"
],
"role": "roles/storage.objectAdmin"
},
{
"members": [
"allUsers"
],
"role": "roles/storage.objectViewer"
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
{"rule": [{"action": {"type": "Delete"}, "condition": {"age": 60}}]}
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
{"logBucket": "k8s-infra-artifacts-gcslogs", "logObjectPrefix": "k8s-staging-sig-auth"}
Original file line number Diff line number Diff line change
@@ -0,0 +1,20 @@
gs://k8s-staging-sig-auth/ :
Storage class: STANDARD
Location type: multi-region
Location constraint: US
Versioning enabled: None
Logging configuration: Present
Website configuration: None
CORS configuration: None
Lifecycle configuration: Present
Requester Pays enabled: None
Labels: None
Default KMS key: None
Time created: Thu, 14 Oct 2021 16:39:28 GMT
Time updated: Thu, 14 Oct 2021 16:39:58 GMT
Metageneration: 9
Bucket Policy Only enabled: True
Public access prevention: unspecified
RPO: DEFAULT
ACL: []
Default ACL: []
11 changes: 11 additions & 0 deletions audit/projects/k8s-staging-sig-auth/description.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
{
"createTime": "2021-10-14T16:37:21.358Z",
"lifecycleState": "ACTIVE",
"name": "k8s-staging-sig-auth",
"parent": {
"id": "758905017065",
"type": "organization"
},
"projectId": "k8s-staging-sig-auth",
"projectNumber": "26063304352"
}
Comment on lines +1 to +11
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Staging project created by #2921

55 changes: 55 additions & 0 deletions audit/projects/k8s-staging-sig-auth/iam.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,55 @@
{
"bindings": [
{
"members": [
"serviceAccount:26063304352@cloudbuild.gserviceaccount.com",
"serviceAccount:gcb-builder@k8s-infra-prow-build-trusted.iam.gserviceaccount.com"
],
"role": "roles/cloudbuild.builds.builder"
},
{
"members": [
"group:k8s-infra-staging-sig-auth@kubernetes.io"
],
"role": "roles/cloudbuild.builds.editor"
},
{
"members": [
"serviceAccount:service-26063304352@gcp-sa-cloudbuild.iam.gserviceaccount.com"
],
"role": "roles/cloudbuild.serviceAgent"
},
{
"members": [
"serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com"
],
"role": "roles/containeranalysis.occurrences.viewer"
},
{
"members": [
"serviceAccount:service-26063304352@containerregistry.iam.gserviceaccount.com"
],
"role": "roles/containerregistry.ServiceAgent"
},
{
"members": [
"serviceAccount:service-26063304352@gcp-sa-pubsub.iam.gserviceaccount.com"
],
"role": "roles/pubsub.serviceAgent"
},
{
"members": [
"group:k8s-infra-staging-sig-auth@kubernetes.io"
],
"role": "roles/serviceusage.serviceUsageConsumer"
},
{
"members": [
"group:k8s-infra-artifact-admins@kubernetes.io",
"group:k8s-infra-staging-sig-auth@kubernetes.io"
],
"role": "roles/viewer"
}
],
"version": 1
}
9 changes: 9 additions & 0 deletions audit/projects/k8s-staging-sig-auth/services/enabled.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
NAME TITLE
cloudbuild.googleapis.com Cloud Build API
cloudkms.googleapis.com Cloud Key Management Service (KMS) API
containerregistry.googleapis.com Container Registry API
logging.googleapis.com Cloud Logging API
pubsub.googleapis.com Cloud Pub/Sub API
secretmanager.googleapis.com Secret Manager API
storage-api.googleapis.com Google Cloud Storage JSON API
storage-component.googleapis.com Cloud Storage
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
[
"projects/k8s-staging-sig-auth/logs/cloudaudit.googleapis.com%2Factivity",
"projects/k8s-staging-sig-auth/logs/cloudaudit.googleapis.com%2Fsystem_event"
]
12 changes: 12 additions & 0 deletions audit/projects/k8s-staging-sig-auth/services/logging/sinks.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
[
{
"destination": "logging.googleapis.com/projects/k8s-staging-sig-auth/locations/global/buckets/_Required",
"filter": "LOG_ID(\"cloudaudit.googleapis.com/activity\") OR LOG_ID(\"externalaudit.googleapis.com/activity\") OR LOG_ID(\"cloudaudit.googleapis.com/system_event\") OR LOG_ID(\"externalaudit.googleapis.com/system_event\") OR LOG_ID(\"cloudaudit.googleapis.com/access_transparency\") OR LOG_ID(\"externalaudit.googleapis.com/access_transparency\")",
"name": "_Required"
},
{
"destination": "logging.googleapis.com/projects/k8s-staging-sig-auth/locations/global/buckets/_Default",
"filter": "NOT LOG_ID(\"cloudaudit.googleapis.com/activity\") AND NOT LOG_ID(\"externalaudit.googleapis.com/activity\") AND NOT LOG_ID(\"cloudaudit.googleapis.com/system_event\") AND NOT LOG_ID(\"externalaudit.googleapis.com/system_event\") AND NOT LOG_ID(\"cloudaudit.googleapis.com/access_transparency\") AND NOT LOG_ID(\"externalaudit.googleapis.com/access_transparency\")",
"name": "_Default"
}
]
29 changes: 29 additions & 0 deletions audit/projects/kubernetes-public/buckets/k8s-infra-tf-gcp/iam.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
{
"bindings": [
{
"members": [
"group:k8s-infra-gcp-org-admins@kubernetes.io"
],
"role": "roles/storage.admin"
},
{
"members": [
"group:k8s-infra-gcp-org-admins@kubernetes.io",
"projectOwner:kubernetes-public"
],
"role": "roles/storage.legacyBucketOwner"
},
{
"members": [
"projectViewer:kubernetes-public"
],
"role": "roles/storage.legacyBucketReader"
},
{
"members": [
"group:k8s-infra-gcp-org-admins@kubernetes.io"
],
"role": "roles/storage.objectAdmin"
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,20 @@
gs://k8s-infra-tf-gcp/ :
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is #2940

Storage class: STANDARD
Location type: multi-region
Location constraint: US
Versioning enabled: None
Logging configuration: None
Website configuration: None
CORS configuration: None
Lifecycle configuration: None
Requester Pays enabled: None
Labels: None
Default KMS key: None
Time created: Thu, 14 Oct 2021 16:46:11 GMT
Time updated: Thu, 14 Oct 2021 16:46:32 GMT
Metageneration: 6
Bucket Policy Only enabled: True
Public access prevention: unspecified
RPO: DEFAULT
ACL: []
Default ACL: []
Loading